WO2021180209A1 - Method for transmitting paging information and communication apparatus - Google Patents

Method for transmitting paging information and communication apparatus Download PDF

Info

Publication number
WO2021180209A1
WO2021180209A1 PCT/CN2021/080482 CN2021080482W WO2021180209A1 WO 2021180209 A1 WO2021180209 A1 WO 2021180209A1 CN 2021080482 W CN2021080482 W CN 2021080482W WO 2021180209 A1 WO2021180209 A1 WO 2021180209A1
Authority
WO
WIPO (PCT)
Prior art keywords
paging
information
message
paging information
nas
Prior art date
Application number
PCT/CN2021/080482
Other languages
French (fr)
Chinese (zh)
Inventor
赵绪文
张博
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2021180209A1 publication Critical patent/WO2021180209A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W68/00User notification, e.g. alerting and paging, for incoming communication, change of service or the like
    • H04W68/005Transmission of information for alerting of incoming communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W68/00User notification, e.g. alerting and paging, for incoming communication, change of service or the like

Definitions

  • This application relates to the field of communication, and more specifically, to a method and communication device for transmitting paging information.
  • the user equipment (UE) is in the idle state, that is, when the air interface connection with the radio access network (RAN) has been released, if the network side has downlink data that needs to be sent to the UE, the user plane function (user plane) Function, UPF) notifies the session management function (session management function, SMF), and then the SMF notifies the access and mobility management function (access and mobility management function, AMF), and the AMF sends a paging message to the RAN.
  • the RAN sends a paging message to the UE according to the paging message sent by the AMF.
  • the UE decides whether to respond to the paging according to the paging information in the paging message.
  • the paging information in the paging message may be leaked or tampered with, which may cause the network to be unable to provide normal services for the UE.
  • This application provides a method and communication device for transmitting paging information. By protecting the paging information in the paging message, the leakage or tampering of the paging information can be avoided, so that the network can provide normal terminal equipment with service.
  • a method for transmitting paging information including: a mobility management network element receives first information from a terminal device; in a case where the terminal device needs to be paged, the mobility management network element responds to the first information according to the first information.
  • the first paging information is secured; the mobility management network element sends the secured first paging information to the terminal device.
  • the session management network element may be a network element with a session management function, such as a session management function (SMF) in a fifth generation (5th generation, 5G) system.
  • SMF session management function
  • the first information is used to indicate that the terminal device includes multiple universal subscriber identity module (Universal Subscriber Identity Module, USIM) cards or to request security protection for paging information.
  • USIM Universal Subscriber Identity Module
  • multiple USIM cards can be understood as two or more USIM cards.
  • the first paging information may be paging information that needs to be sent to the terminal device, and the paging information is used to page the terminal device.
  • the first paging information may be information (or paging information) in the paging message that needs to be sent to the terminal device.
  • the first paging information includes one or more of the following: paging cause (Paging Cause), paging assistance information (Assistance Data for Paging), user identification, paging identification (UE Paging Identity) or access Access Type.
  • Paging Cause paging cause
  • Assistance Data for Paging paging assistance information
  • user identification paging identification
  • UE Paging Identity paging identification
  • access Access Type access Access Type
  • the mobility management network element can perform security protection on the paging information (first paging information) in the paging message according to the instructions of the terminal device, so as to prevent the paging message from being disturbed. Leaking or tampering, so that the network can provide normal services for terminal devices.
  • the security protection of the first paging information includes: performing one or more of the following operations on the first paging information: encryption, Integrity protection or anti-replay protection.
  • the first paging information may include one or more of the following: paging information that needs to be encrypted, paging information that needs integrity protection, and paging information that needs anti-replay protection.
  • the first paging information may be secured by a non-access stratum (NAS) security context.
  • NAS non-access stratum
  • the NAS encryption key and NAS encryption algorithm in the NAS security context can be used to encrypt the paging information that needs to be encrypted in the first paging message; the NAS integrity key and the NAS integrity protection algorithm in the NAS security context can be used
  • the paging information that needs integrity protection in the first paging message is integrity protected; the downlink (DL) NAS counter (Count) is used to prevent replay of the paging information that needs anti-replay protection in the first paging message. ⁇ Put protection.
  • the NAS integrity key and the NAS integrity protection algorithm in the NAS security context may be used to first encrypt the paging information that needs to be encrypted in the first paging message to obtain the encrypted paging information. Then, integrity protection is performed on the encrypted paging information and the paging information that needs integrity protection in the first paging information.
  • the first paging information may be securely protected by a shared key, private key, or public key of the terminal device and the mobility management network element.
  • the mobility management network element receiving the first information from the terminal device includes: the mobility management network element receiving the NAS message from the terminal device, the NAS message including the first information One information.
  • the NAS message can be secured by the NAS security context.
  • the security protection of the NAS message it is helpful to ensure that the first information received by the mobility management network element is actually sent by the terminal device instead of tampered information. This helps to ensure that the mobility management network element can be based on the terminal device’s According to actual needs, determine whether to protect the first paging message.
  • a method for transmitting paging information including: a terminal device sends first information to a mobility management network element; and the terminal device receives the first paging information after security protection from the mobility management network element.
  • the first information is used to indicate that the terminal device includes multiple USIM cards or to request security protection for paging information.
  • the first paging information may be paging information that needs to be sent to the terminal device, and the paging information is used to page the terminal device.
  • the first paging information may be information (or paging information) in the paging message that needs to be sent to the terminal device.
  • the first paging information includes one or more of the following: paging reason, paging auxiliary information, user identification, paging identification, or access type.
  • the user identification may be the UE ID, and the UE ID is the identification of the terminal device.
  • the mobility management network element can perform security protection on the paging information (first paging information) in the paging message according to the instructions of the terminal device, so as to prevent the paging message from being disturbed. Leaking or tampering, so that the network can provide normal services for terminal devices.
  • the method may further include: the terminal device performs security protection on the first paging information after security protection.
  • the security protection includes one or more of the following: encryption, integrity protection, or anti-replay protection.
  • the first paging information may include one or more of the following: paging information that needs to be encrypted, paging information that needs integrity protection, and paging information that needs anti-replay protection.
  • the first paging message is secured by a NAS security context.
  • the first paging information may be securely protected by a shared key, private key, or public key of the terminal device and the mobility management network element.
  • the terminal device sending the first information to the mobility management network element includes: the terminal device sends a NAS message to the mobility management network element, and the NAS message includes The first information.
  • the NAS message is protected by a NAS security context.
  • the security protection of the NAS message it is helpful to ensure that the first information received by the mobility management network element is actually sent by the terminal device instead of tampered information. This helps to ensure that the mobility management network element can be based on the terminal device’s According to actual needs, determine whether to protect the first paging message.
  • a method for transmitting paging information including: an access network device receives first information; when the access network device needs to page a terminal device, the first information is used to page the first information The information is protected by security; the access network device sends the first paging information after security protection to the terminal device.
  • the situation where the terminal device needs to be paged refers to that the access network device receives the paging message sent by the mobility management network element.
  • the first information is used to indicate that the terminal device includes multiple universal subscriber identity module (Universal Subscriber Identity Module, USIM) cards or to request security protection for paging information.
  • USIM Universal Subscriber Identity Module
  • the first paging information may include part or all of the paging information that needs to be sent to the terminal device, and the paging information is used to page the terminal device.
  • the first paging information includes one or more of the following: paging reason, paging auxiliary information, user identification, paging identification, or access type.
  • the user identification may be the UE ID, and the UE ID is the identification of the terminal device.
  • each paging information can be referred to the description of the first aspect, which will not be repeated here.
  • the access network device can perform security protection on the paging information (first paging information) in the paging message according to the first information, so as to avoid the leakage of the paging message Or tampering, so that the network can provide normal services for terminal devices.
  • the security protection of the first paging information includes: performing one or more of the following operations on the first paging information: encryption, Integrity protection or anti-replay protection.
  • the first paging information may include one or more of the following: paging information that needs to be encrypted, paging information that needs integrity protection, and paging information that needs anti-replay protection.
  • the first paging message can be secured by the AS security context.
  • the paging information that needs integrity protection in the first paging message is integrity protected; the downlink (DL) AS counter (Count) is used to prevent replay of the paging information that needs anti-replay protection in the first paging message. ⁇ Put protection.
  • the AS integrity key and the AS integrity protection algorithm in the AS security context can be used to first encrypt the paging information that needs to be encrypted in the first paging message to obtain the encrypted paging information. Then, integrity protection is performed on the encrypted paging information and the paging information that needs integrity protection in the first paging information.
  • the AS encryption key in the AS security context is sometimes also called the RRC key, and the AS encryption algorithm is sometimes also called the RRC encryption algorithm.
  • the AS integrity key in the AS security context is sometimes referred to as a radio resource control (radio resource control, RRC) integrity key, and the AS integrity protection algorithm is sometimes also referred to as the RRC integrity protection algorithm.
  • RRC radio resource control
  • the first paging information may be securely protected by a shared key, private key, or public key of the terminal device and the access network device.
  • the access network device receiving the first information includes: the access network device receiving the first information from a terminal device or a mobility management network element.
  • the access network device receives the first information from the terminal device includes: the access network device receives an air interface message or an RRC message from the terminal device, where the air interface message or the RRC message includes the first information.
  • the air interface message or RRC message is protected by AS security context.
  • the security protection of the air interface message or RRC message is helpful to ensure that the first information received by the access network device is actually sent by the terminal device, rather than the tampered information, which is helpful to ensure that the access network device can follow
  • the actual demand of the terminal device determines whether to protect the first paging information.
  • the access network device receives the first information from the mobility management network element includes: the access network device receives an N1 interface message from the mobility management network element, where the N1 interface message includes the First information; or, the access network device receives a paging message from the mobility management network element, and the paging message includes the first information.
  • the N1 interface is the interface between the mobility management network element and the access network device.
  • the first information of the mobile management network element may be sent by the terminal device.
  • the terminal device may send the first information to the mobility management network element through the AS message.
  • the AS message can be secured by the AS security context. The security protection of the AS message is helpful to ensure that the first information received by the mobility management network element is actually sent by the terminal device, rather than the tampered information, thereby helping to ensure that the first information received by the access network device.
  • the information is actually sent by the terminal device, which in turn helps to ensure that the access network device can determine whether to protect the first paging information according to the actual needs of the terminal device.
  • a method for transmitting paging information including: a mobility management network element receives first information from a terminal device; and the mobility management network element sends the first information to an access network device.
  • the first information is used to indicate that the terminal device includes multiple USIM cards or to request security protection for paging information.
  • the mobility management network element sends the first information to the access network device, so that the access network device can securely protect the paging information in the paging message according to the first information. Therefore, leakage or tampering of paging messages can be avoided, and the network can provide normal services for terminal devices.
  • the mobility management network element receiving the first information from the terminal device includes: the mobility management network element receiving the AS message from the terminal device, so The AS message includes the first information.
  • the AS message is protected by AS security context.
  • the mobility management network element sending the first information to the access network device includes: the mobility management network element sending the N1 interface to the access network device Message, the N1 interface message includes the first information; or, the mobility management network element sends a paging message to the access network device, and the paging message includes the first information.
  • a method for transmitting paging information which includes: a terminal device sends first information to a mobility management network element or an access network device; and the terminal device receives security protected information from the access network device.
  • the first paging message includes: a terminal device sends first information to a mobility management network element or an access network device; and the terminal device receives security protected information from the access network device. The first paging message.
  • the first information is used to indicate that the terminal device includes multiple USIM cards or to request security protection for paging information.
  • the first paging information may include part or all of the paging information that needs to be sent to the terminal device, and the paging information is used to page the terminal device.
  • the first paging information includes one or more of the following: paging reason, paging auxiliary information, user identification, paging identification, or access type.
  • the user identification may be the UE ID, and the UE ID is the identification of the terminal device.
  • each paging information can be referred to the description of the first aspect, which will not be repeated here.
  • the access network device can perform security protection on the paging information (first paging information) in the paging message according to the first information, so as to avoid the leakage of the paging message Or tampering, so that the network can provide normal services for terminal devices.
  • the method may further include: the terminal device performs security protection on the first paging information after security protection.
  • the security protection includes one or more of the following: encryption, integrity protection, or anti-replay protection.
  • the terminal device sending the first information to the mobility management network element includes: the terminal device sends an AS message to the mobility management network element, and the AS message includes the first Information, the AS message is protected by the AS security context.
  • a method for transmitting paging information including: a mobility management network element sends first paging information to a terminal device; the mobility management network element receives a service request message from the terminal device, and the service request message includes the first paging information.
  • the first paging information includes one or more of the following: paging reason, paging assistance information, user identification, paging identification, or access type.
  • the second paging information includes one or more of the following: paging reason, paging auxiliary information, user identification, paging identification, or access type.
  • the mobility management network element checks the second paging information according to the first paging information, including: the mobility management network element checks the second paging information according to the first information and the first paging information. Paging information, to verify the second paging information.
  • the first information may indicate that the terminal device includes multiple USIM cards or request verification of paging information.
  • the method may further include: the mobility management network element receives the first information from the terminal device.
  • the first information is carried in a NAS message. Further, the first information is protected by the NAS security context.
  • the service request message includes the first information.
  • a method for transmitting paging information including: a terminal device receives first paging information; the terminal device sends a service request message to a mobility management network element, the service request message includes the second paging information, the first The paging information is used by the mobility management network element to verify the second paging information.
  • the method further includes: the terminal device sends the first information to the mobility management network element.
  • the first information may indicate that the terminal device includes multiple USIM cards or request verification of paging information.
  • the first information is carried in a NAS message. Further, the first information is protected by the NAS security context.
  • the service request message includes the first information.
  • a communication device which includes modules or units for executing the methods in the first aspect and any one of the possible implementation manners of the first aspect, or includes modules or units for executing the fourth aspect and the fourth aspect.
  • a communication device including a processor.
  • the processor is coupled with the memory and can be used to execute instructions in the memory to implement the method in any one of the first aspect and the first aspect, or the fourth aspect and the fourth aspect.
  • the communication device may further include a memory.
  • the communication device further includes a communication interface, and the processor is coupled with the communication interface.
  • the communication interface is a transceiver, or an input/output interface.
  • the transceiver may be a transceiver circuit.
  • the input/output interface may be an input/output circuit.
  • a communication device which includes modules or units for executing the methods in the second aspect and any one of the possible implementation manners of the second aspect, or includes modules or units for executing the fifth aspect and the fifth aspect.
  • a communication device including a processor.
  • the processor is coupled with the memory, and can be used to execute instructions in the memory to implement the method in any one of the above-mentioned second aspect and the second aspect, or any one of the fifth aspect and the fifth aspect. Or implement the method in the seventh aspect and any one of the possible implementation manners of the seventh aspect.
  • the communication device further includes a memory.
  • the communication device further includes a communication interface, and the processor is coupled with the communication interface.
  • the communication interface is a transceiver, or an input/output interface.
  • the transceiver may be a transceiver circuit.
  • the input/output interface may be an input/output circuit.
  • a communication device which includes modules or units for executing the method in the third aspect and any one of the possible implementation manners of the third aspect.
  • a communication device including a processor.
  • the processor is coupled with the memory and can be used to execute instructions in the memory to implement the third aspect and the method in any one of the possible implementation manners of the third aspect.
  • the communication device further includes a memory.
  • the communication device further includes a communication interface, and the processor is coupled with the communication interface.
  • the communication interface is a transceiver, or an input/output interface.
  • the transceiver may be a transceiver circuit.
  • the input/output interface may be an input/output circuit.
  • a processor including: an input circuit, an output circuit, and a processing circuit.
  • the processing circuit is used to receive signals through the input circuit and transmit signals through the output circuit, so that the processor executes the method in any one of the first aspect and the first aspect, or executes the second aspect and the first aspect.
  • the method in any one of the possible implementation manners of the second aspect, or the method in the third aspect and any one of the possible implementation manners of the third aspect, or the implementation of the fourth aspect and any one of the possible implementation manners of the fourth aspect , Or execute the method in any one of the fifth aspect and the fifth aspect, or execute the method in any one of the sixth aspect and the sixth aspect, or execute the seventh aspect and the first The method in any one of the seven possible implementation modes.
  • the above-mentioned processor may be a chip, the input circuit may be an input pin, the output circuit may be an output pin, and the processing circuit may be a transistor, a gate circuit, a flip-flop, and various logic circuits.
  • the input signal received by the input circuit may be received and input by, for example, but not limited to, a receiver, and the signal output by the output circuit may be, for example, but not limited to, output to the transmitter and transmitted by the transmitter, and the input circuit and output
  • the circuit can be the same circuit, which is used as an input circuit and an output circuit at different times.
  • the embodiments of the present application do not limit the specific implementation manners of the processor and various circuits.
  • a processing device including a processor and a memory.
  • the processor is used to read instructions stored in the memory, receive signals through a receiver, and transmit signals through a transmitter, so as to execute the method in the first aspect and any one of the possible implementations of the first aspect, or execute the second aspect.
  • processors there are one or more processors and one or more memories.
  • the memory may be integrated with the processor, or the memory and the processor may be provided separately.
  • the memory can be a non-transitory (non-transitory) memory, such as a read only memory (ROM), which can be integrated with the processor on the same chip, or can be set in different On the chip, the embodiment of the present application does not limit the type of the memory and the setting mode of the memory and the processor.
  • ROM read only memory
  • the relevant information interaction process may be a process of outputting information from the processor, and receiving information may be a process of receiving information by the processor.
  • the information output by the processing may be output to the transmitter, and the input information received by the processor may come from the receiver.
  • the transmitter and receiver can be collectively referred to as a transceiver.
  • the processing device in the fifteenth aspect described above may be a chip, and the processor may be implemented by hardware or software.
  • the processor When implemented by hardware, the processor may be a logic circuit, an integrated circuit, etc.; when implemented by software
  • the processor may be a general-purpose processor, which is implemented by reading software codes stored in the memory.
  • the memory may be integrated in the processor, may be located outside the processor, and exist independently.
  • a computer program product includes: a computer program (also called code, or instruction), which when the computer program is run, causes the computer to execute the first aspect and the first
  • a computer program also called code, or instruction
  • the method in any possible implementation manner of the aspect, or the method in any one of the seventh aspect and the seventh aspect may be implemented.
  • a computer-readable medium stores a computer program (also called code, or instruction) when it runs on a computer, so that the computer executes the first aspect and the first aspect described above.
  • the method in any one of the possible implementation manners on the one hand, or the method in any one of the possible implementation manners of the second aspect and the second aspect, or the implementation of the third aspect and any one of the possible implementation manners of the third aspect Or implement the method in any one of the fourth aspect and the fourth aspect, or implement the method in any one of the fifth aspect and the fifth aspect, or implement the sixth aspect and the first
  • the method in any one of the possible implementation manners of the six aspects, or the method in any one of the possible implementation manners of the seventh aspect and the seventh aspect is implemented.
  • a communication system including at least two of the aforementioned access network equipment, mobility management network elements, and terminal equipment.
  • Figure 1 is a schematic diagram of a system architecture applied to this application.
  • Figure 2 is a schematic diagram of a UE including multiple USIM cards communicating.
  • Fig. 3 is a schematic flowchart of a method for transmitting paging information provided by the present application.
  • Fig. 4 is a flowchart of a specific example of a method for transmitting paging information.
  • Fig. 5 is a flowchart of another specific example of a method of transmitting paging information.
  • Fig. 6 is a schematic flowchart of another method for transmitting paging information provided by the present application.
  • Fig. 7 is a schematic flowchart of another method for transmitting paging information provided by the present application.
  • Fig. 8 is a schematic block diagram of a communication device provided by the present application.
  • Fig. 9 is a schematic structural diagram of a network device provided by the present application.
  • Fig. 10 is a schematic structural diagram of a terminal device provided by the present application.
  • Fig. 11 is a schematic structural diagram of an access network device provided by the present application.
  • LTE long term evolution
  • FDD frequency division duplex
  • TDD time division duplex
  • UMTS universal mobile telecommunication system
  • WiMAX worldwide interoperability for microwave access
  • 5G fifth generation
  • NR new radio
  • the network elements involved in this application mainly include terminal equipment, access network equipment, and mobility management network elements.
  • the access network device and the terminal device are connected through a wireless air interface, which can manage wireless resources, provide access services for the terminal device, and then complete the forwarding of control signals and user plane data between the terminal device and the core network.
  • the mobility management network element and the access network equipment are connected in a wired or wireless manner, and are mainly used for mobility management and access management.
  • a terminal device can be a user equipment (UE), an access terminal, a user unit, a user station, a mobile station, a mobile station, a remote station, a remote terminal, a mobile device, a user terminal, a terminal, a wireless communication device, a user agent, or User device.
  • the terminal device in the embodiment of the present application may be a mobile phone (mobile phone), a tablet computer (pad), a computer with a wireless transceiver function, a virtual reality (VR) terminal device, and an augmented reality (AR) terminal Equipment, wireless terminals in industrial control, wireless terminals in self-driving, wireless terminals in remote medical, wireless terminals in smart grid, transportation safety ( Wireless terminals in transportation safety, wireless terminals in smart cities, and wireless terminals in smart homes.
  • the access network equipment can be an evolved Node B (eNB), a radio network controller (RNC), a Node B (NB), a base station controller (BSC), Base transceiver station (base transceiver station, BTS), home base station (home evolved NodeB, or home Node B, HNB), baseband unit (baseband unit, BBU), wireless fidelity (wireless fidelity, WIFI) system access point (access point, AP), wireless relay node, wireless backhaul node, transmission point (transmission point, TP), or transmission and reception point (transmission and reception point, TRP), etc.
  • eNB evolved Node B
  • RNC radio network controller
  • NB Node B
  • BSC base station controller
  • BTS Base transceiver station
  • BTS home base station
  • home evolved NodeB home evolved NodeB, or home Node B, HNB
  • baseband unit baseband unit
  • wireless fidelity wireless fidelity
  • WIFI wireless fidelity
  • AP wireless fidelity (wireless fidelity, WI
  • the access network equipment can also be 5G, such as NR, gNB in the system, or transmission point (TRP or TP), one or a group (including multiple antenna panels) antenna panels of the base station in the 5G system, or, It may also be a network node that constitutes a gNB or a transmission point, such as a baseband unit (BBU), or a distributed unit (DU).
  • 5G such as NR, gNB in the system, or transmission point (TRP or TP), one or a group (including multiple antenna panels) antenna panels of the base station in the 5G system, or, It may also be a network node that constitutes a gNB or a transmission point, such as a baseband unit (BBU), or a distributed unit (DU).
  • 5G such as NR, gNB in the system, or transmission point (TRP or TP), one or a group (including multiple antenna panels) antenna panels of the base station in the 5G system, or, It may also be a network node that constitute
  • the gNB may include a centralized unit (CU) and a DU.
  • the gNB may also include an active antenna unit (AAU).
  • the CU implements some of the functions of the gNB, and the DU implements some of the functions of the gNB.
  • the CU is responsible for processing non-real-time protocols and services, and implements radio resource control (radio resource control, RRC) and packet data convergence protocol (packet data convergence protocol, PDCP) layer functions.
  • RRC radio resource control
  • PDCP packet data convergence protocol
  • the DU is responsible for processing the physical layer protocol and real-time services, and realizes the functions of the radio link control (RLC) layer, the media access control (MAC) layer, and the physical (PHY) layer.
  • RLC radio link control
  • MAC media access control
  • PHY physical
  • AAU realizes some physical layer processing functions, radio frequency processing and related functions of active antennas. Since the information of the RRC layer will eventually become the information of the PHY layer, or be transformed from the information of the PHY layer, under this architecture, high-level signaling, such as RRC layer signaling, can also be considered to be sent by the DU , Or, sent by DU+AAU.
  • the network device may be a device including one or more of CU nodes, DU nodes, and AAU nodes.
  • the CU can be divided into network equipment in an access network (radio access network, RAN), and the CU can also be divided into network equipment in a core network (core network, CN), which is not limited in this application.
  • Mobility management network elements can be mobility management entities (MME), network elements with MME functions, access and mobility management functions (AMF), network elements with AMF functions, non-3GPP Interworking function (Non-3GPP interworking function, N3IWF) or Serving GPRS Support Node (Serving GPRS Support Node, SGSN), etc.
  • MME mobility management entities
  • AMF access and mobility management functions
  • N3IWF non-3GPP Interworking function
  • Serving GPRS Support Node Serving GPRS Support Node
  • SGSN Serving GPRS Support Node
  • the naming of network elements may be different.
  • the following uses the naming of network elements in the 5G network as an example to illustrate this application.
  • User equipment (UE) 101 corresponding to terminal equipment.
  • (Radio access network, (R)AN) network element 102 hereinafter referred to as RAN for short, corresponding to access network equipment.
  • the RAN may be NB, eNB, gNB, ng-eNB, or any other access network equipment.
  • User plane function (UPF) 103 used for packet routing and forwarding and quality of service (QoS) processing of user plane data, etc.
  • Data network (DN) 104 a network used to provide data transmission.
  • AMF 105 Corresponding to mobile management network elements.
  • Session management function (SMF) 106 Mainly used for session management, user equipment Internet protocol (IP) address allocation and management, selection of manageable user plane functions, policy control and charging functions End point of the interface and notification of downlink data, etc.
  • IP Internet protocol
  • PCF Policy control function
  • Application function (AF) 108 used for data routing affected by applications, accessing network open function network elements, interacting with the policy framework for policy control, etc.
  • Unified data management (UDM) 109 used to process UE identification, access authentication, registration, and mobility management.
  • Unified data repository (UDR) 110 Mainly includes the following functions: access to contract data, policy data, application data and other types of data.
  • network elements or functions may be network elements in hardware devices, software functions running on dedicated hardware, or virtualization functions instantiated on a platform (for example, a cloud platform).
  • the UPF When the UE is in an idle state, that is, the air interface connection with the RAN has been released, if there is downlink data to be sent to the UE on the network side, the UPF notifies the SMF, and then the SMF notifies the AMF, and the AMF sends a paging message to the RAN.
  • the RAN sends a paging message to the UE according to the paging message sent by the AMF. After receiving the paging message, the UE decides whether to respond to the paging according to the paging information in the paging message.
  • the UE has multiple USIM cards (take 2 USIM cards as an example), and each USIM card has its own international mobile equipment identity (IMEI)/permanent equipment identity (permanent equipment identifier, PEI), each USIM is registered independently, and each USIM belongs to a different public land mobile network (PLMN) network, when USIM1 and PLMN1 have ongoing services, USIM2 is in idle state At this time, if PLMN2 initiates a paging to USIM2 at this time, USIM2 can decide whether to respond to the paging and establish a connection with the network according to the paging message.
  • IMEI international mobile equipment identity
  • PEI permanent equipment identifier
  • the paging cause (Paging Cause) in the paging message represents a high-level mobile terminated service (MT service)
  • USIM2 decides to respond to the paging, and the UE disconnects the connection between USIM1 and PLMN1.
  • the paging reason in the paging message represents a low-level MT service
  • the USIM2 rejects the paging, and the UE maintains the connection between USIM1 and PLMN1.
  • the paging information in the paging message may be leaked or tampered with, which may cause the network to fail to provide normal services for the UE.
  • an attacker can tamper with the paging reason and paging assistance information (Assistance Data for Paging) in the paging message for USIM2.
  • the reason for the call is changed to a high level, causing the UE to determine that it needs to respond to the paging of PLMN2, thereby causing USIM1 to disconnect from PLMN1, affecting the normal business of USIM1, and causing a Denial of Service (DoS) attack on USIM1.
  • the attacker can also tamper with the access type (Access Type) in the paging message, so that the UE cannot respond to the network paging.
  • Access Type access type
  • this application provides a method for transmitting paging information.
  • the paging information By protecting the paging information in the paging message, especially the paging information transmitted through the air interface, the paging information can be prevented from being damaged. Leaking or tampering, so that the network can provide normal services for the UE.
  • the method provided in this application can be applied to scenario one or scenario two.
  • Scenario 1 The UE includes a USIM card, there is downlink data to be transmitted, and the UE is in an idle or inactive state.
  • the UE includes multiple (that is, greater than or equal to 2) USIM cards, and one of the USIM cards in the idle state or in the inactive state has downlink data to be transmitted. Optionally, there is an ongoing service between one of the multiple USIM cards and the network.
  • the UE may be in the multi-receiving and single-sending mode, but the application is not limited to this.
  • the multi-receiving and single-sending mode means that the UE can receive paging messages for multiple USIMs at the same time, but can only send messages or maintain services for one USIM. If one USIM card has business with the network, the other USIM cards should be in idle or inactive state. If the network initiates a paging for a USIM card in an idle state or an inactive state, and the USIM card decides to respond to the paging, another USIM card in service must terminate the connection with the network.
  • the UE in this article may be a device or a chip in the device. If the UE is a chip, the UE includes one or more USIM cards means that the device including the UE includes one or more USIM cards.
  • the information in the paging message is called paging information.
  • the paging cause is paging information
  • the paging identification is also paging information.
  • Fig. 3 is a schematic flowchart of a method for transmitting paging information provided by the present application.
  • the method 300 can be applied to a scenario where the UE or one of the USIM cards is in an idle state or an inactive state. The steps in the method 300 are described below.
  • S301 The network sends downlink data to the UPF.
  • the UPF notifies the SMF that there is downlink data to be transmitted.
  • S303 The SMF notifies the AMF to initiate paging.
  • the AMF can determine whether the UE needs to be paged or a paging message needs to be sent.
  • S304 The AMF determines whether to perform security protection on the first paging information.
  • the first paging information may be part or all of the paging information that needs to be sent to the UE.
  • the first paging information may include one or more of the following: paging reason, paging auxiliary information, user identification, paging identification, or access type.
  • the paging reason may indicate the reason why the paging is currently initiated, or the level of the MT service that triggers the paging, etc.
  • the paging assistance information may indicate other related information for initiating the current paging, such as the type of service that triggers the paging.
  • User ID (UE ID) is used to uniquely identify a user.
  • the paging identifier may indicate the user identifier of one or more users who need to be paged in the current network.
  • the access type may indicate the type of UE access technology, such as 3GPP access, or Non-3GPP access, and so on. For the meaning of the above parameters, please refer to the prior art or related standards.
  • the first paging information may also include paging information that needs to be sent to the RAN, which is not limited in this application.
  • the AMF may determine whether to perform security protection on the first paging information according to the security protection instruction information.
  • the AMF may also perform security protection on the first paging information of any UE including the UE.
  • the AMF may determine whether to perform security protection on the first paging information of the UE according to the local configuration. For example, if the local configuration is to perform security protection on the first paging information of any UE, the AMF determines to perform security protection on the first paging information of the UE.
  • the security protection indication information may indicate whether the UE includes multiple USIM cards, or whether the UE requests security protection for the first paging information. That is to say, the security protection indication information either indicates that the UE includes multiple USIM cards or that the UE requests security protection for the first paging information, or indicates that the UE includes only one USIM card or the UE does not request security for the first paging information. protect. If the security protection indication information indicates that the UE includes multiple USIM cards or the UE requests security protection for the first paging information, the security protection indication information may also be referred to as first information. If the AMF receives the first information, the AMF determines to perform security protection on the first paging information.
  • the sending of the security protection indication information indicates that the UE includes multiple USIM cards, or the UE requests security protection for the first paging information. That is, if the AMF receives the security protection instruction information, the AMF determines to perform security protection on the first paging information; if the AMF does not receive the security protection instruction information, the AMF determines not to perform security protection on the first paging information.
  • the safety protection instruction information may also be referred to as first information.
  • the AMF determines to perform security protection on the first paging information.
  • the security protection indication information may be sent by the UE, or may be sent by a device on the core network side, such as SMF, PCF, UPF, or UDM.
  • the UE may first send the security protection indication information to the RAN when it is in the connected state before, and then the RAN sends it to the AMF.
  • the UE may send security protection indication information to the AMF through a NAS message.
  • the security protection instruction information may be secured by a NAS security context, or the security protection instruction information may be carried by a NAS message that uses the NAS security context for security protection.
  • the NAS security context is generated between the UE and the AMF through the non-access layer security mode command (NAS Security Mode Command, NAS SMC) process after the authentication process is completed between the UE and the network.
  • the NAS security context includes information such as NAS encryption key, NAS integrity key, NAS encryption algorithm, NAS integrity protection algorithm, and uplink (UL)/downlink (DL) NAS counter (Count).
  • NAS encryption key and NAS encryption algorithm are used for encryption (or encryption protection)
  • NAS integrity key and NAS integrity protection algorithm are used for integrity protection
  • DL NAS Count and UL NAS Count are used for anti-replay protection .
  • Anti-replay refers to preventing messages or information from being repeatedly sent to the receiving end.
  • the NAS security context is maintained on the UE and AMF, and NAS security protection is activated. Subsequent NAS messages or information contained in the NAS messages exchanged between the UE and AMF (also called information elements) can be encrypted using the NAS security context (also called information elements). It can be called encryption protection), integrity protection, and/or anti-replay protection.
  • the IE may be any NAS message or information element in the NAS message, for example, may be security protection indication information, first paging information, and so on.
  • the NAS encryption key and NAS encryption algorithm in the NAS security context can be used to encrypt the IE.
  • calculate IE' Enc NAS (K NAS-Enc , IE)
  • IE' is the encrypted IE
  • Enc NAS is the NAS encryption algorithm
  • K NAS-Enc is the NAS encryption key.
  • the NAS integrity key and the NAS integrity protection algorithm in the NAS security context can be used to perform integrity protection on the IE.
  • calculate MAC Int NAS (K NAS-Int , IE)
  • MAC is the message authentication code obtained after integrity protection
  • Int NAS is the NAS integrity protection algorithm
  • K NAS-Int is the NAS integrity Sex key.
  • the NAS encryption key, NAS encryption algorithm, and DL NAS Count (or UL NAS Count) in the NAS security context can be used to simultaneously encrypt and anti-replay the IE.
  • the NAS integrity key, the NAS integrity protection algorithm, and the DL NAS Count (or UL NAS Count) in the NAS security context can be used to simultaneously perform integrity protection and anti-replay protection on the IE.
  • this application does not limit the specific algorithm of the NAS encryption algorithm and the NAS integrity protection algorithm.
  • it can be a Hash or other algorithms.
  • the foregoing UL/DL NAS Count can be replaced with other counters negotiated between the UE and the AMF, such as a counter with a shorter length.
  • the aforementioned NAS security key can also be replaced with another shared key.
  • the shared key is a shared key negotiated by the UE and AMF. For example, you can use the root key K that both the UE and AMF have, and a key that is specifically used to protect the security protection indication information generated through layered deduction; it can also be used UE and the AMF has been negotiated shared key, a dedicated to deduce the key K to protect security instructions 1, for example, according to AMF deduce K K 1.
  • K AMF is a secret key derived from the root key K by the UE and the network after the authentication process. This key is stored in the UE and AMF and can be used to derive the NAS encryption key and integrity key.
  • the security protection instruction information can also be securely protected by a public key or a private key.
  • the public and private keys appear in pairs.
  • the sender uses the public key to calculate a signature for the protected content, and then the receiver uses its own private key to verify the signature is integrity protection; the sender uses the public key to encrypt the protected content. Then the receiver uses its own private key to decrypt it is encryption protection.
  • S305 The AMF performs security protection on the first paging information.
  • Security protection may include one or more of the following: encryption, integrity protection, or anti-replay protection.
  • the AMF can perform encryption, integrity protection, and/or anti-replay protection on the first paging message.
  • the AMF may perform security protection on the first paging information through the NAS security context.
  • the AMF can use the NAS encryption key and the NAS encryption algorithm in the NAS security context to encrypt the paging message that needs to be encrypted in the first paging message.
  • AMF can use the NAS integrity key in the NAS security context and the NAS integrity protection algorithm to perform integrity protection on the paging information that needs integrity protection in the first paging message; or, the AMF can use the NAS security context
  • the NAS integrity key and NAS integrity protection algorithm in the NAS protect the integrity of the encrypted paging message.
  • the AMF can use the DL NAS Count to perform anti-replay protection on the paging information that needs anti-replay protection in the first paging message.
  • the first paging information may include only paging information that needs to be encrypted, or may only include paging information that needs integrity protection, or may only include paging information that needs anti-replay protection.
  • the first paging information may include any two or three of the three items: paging information that needs to be encrypted, paging information that needs integrity protection, and paging information that needs anti-replay protection. It should be understood that the same information in the first paging message may require two or three of the three operations of encryption, integrity protection, and anti-replay protection.
  • This application does not limit the specific information of the paging information that needs to be encrypted, the paging information that needs integrity protection, and the paging information that needs anti-replay protection.
  • the paging information that needs to be encrypted may include paging reason and/or paging auxiliary information.
  • the paging reason may be included in a newly defined container (Container), such as MUSIM_Container, or in an existing NAS container (NAS Container), which is not specifically limited.
  • the container here can be used to notify the UE that the information in the container is encrypted.
  • the data structure of the paging reason may include indication information, which is used to indicate that the cell is encrypted, and the specific form of the indication information is not limited.
  • the paging reason and/or paging auxiliary information may also not be encrypted, and only integrity protection is done.
  • the paging information that requires integrity protection may include a paging identifier and/or an access type.
  • the aforementioned DL NAS Count can be replaced with other counters negotiated between the UE and the AMF, such as a counter with a shorter length.
  • the aforementioned NAS security key can also be replaced with another shared key.
  • the shared key is a shared key negotiated by the UE and AMF. For example, you can use the root key K that both the UE and AMF have, and a key that is specifically used to protect the security protection indication information generated through layered deduction; it can also be used UE and the AMF has been negotiated shared key, to deduce a dedicated secure key K paging indication information protection, such as K AMF according to deduce K paging.
  • K AMF is a secret key derived from the root key K by the UE and the network after the authentication process. This key is stored in the UE and AMF and can be used to derive the NAS encryption key and integrity key.
  • the UE may derive the first intermediate key (IK, CK) according to the root key K, derive the second intermediate key according to the first intermediate key and the service network identity, and derive the anchor key according to the second intermediate key.
  • Kseaf derives K AMF according to Kseaf and K paging according to K AMF .
  • the second intermediate key can be Kausf, or IK' and CK'.
  • AMF and UE can derive K paging based on a fresh parameter and K AMF .
  • the freshness parameter may be a non-access stratum uplink count value or a downlink count value, or a random number.
  • the UE and the AMF can maintain a counter, and K paging can be deduced based on the value of the K AMF and the counter.
  • K paging can be deduced based on the value of the K AMF and the counter.
  • the counter is incremented by 1.
  • the counter may be incremented by 1 each time the value of the counter is used.
  • the first paging message or part of the information in the first paging message can also be protected by a public key or a private key.
  • AMF may not perform security protection, such as encryption.
  • the AMF may generate indication information, which is used to instruct the RAN to adjust the paging frequency, such as controlling the number of UEs that are paged at a time, or paging UEs in batches , In order to achieve the purpose of saving air interface paging channel resources.
  • the AMF sends a paging message to the RAN.
  • the RAN receives the paging message.
  • the paging frequency can be adjusted according to the instructions of the AMF, such as controlling the number of UEs that are paged at a time, or paging UEs in batches, etc. .
  • S307 The RAN sends a paging message to the UE. Accordingly, the UE receives the paging message.
  • the paging message sent by the AMF to the RAN can be recorded as: the first paging message; the paging message sent by the RAN to the UE is recorded as the second paging message.
  • the first paging message includes paging information that needs to be sent to the RAN and paging information that needs to be sent to the UE
  • the second paging message may include the paging information that needs to be sent to the UE.
  • the first paging information is paging information that needs to be sent to the UE
  • both the first paging message and the second paging message include the first paging information after security protection.
  • S308 The UE performs security protection on the received second paging message.
  • the UE decrypts the paging information that needs to be encrypted, performs integrity verification on the paging information that needs integrity protection, and verifies whether the received counter is greater than the local counter for the paging information that needs anti-replay protection. After the UE performs security protection, the first paging information can be obtained.
  • the UE will also be desecured by the NAS security context.
  • the UE uses the NAS encryption key and NAS encryption algorithm in the NAS security context to decrypt the encryption.
  • Paging information such as paging reason.
  • the UE may determine that the information such as the paging reason is encrypted according to the container in the second paging message.
  • the UE may determine that the paging reason is encrypted according to the indication information contained in the paging reason data structure.
  • the AMF uses the NAS integrity key in the NAS security context and the NAS integrity protection algorithm for paging messages that need integrity protection, for the paging messages that need integrity protection, the UE uses the NAS in the NAS security context.
  • the integrity key and NAS integrity protection algorithm verify integrity.
  • the encrypted paging message is used as the encrypted paging cause Paging Cause', and the encrypted paging message is not required.
  • S308 is a reverse operation of S305, and those skilled in the art can learn how to perform security protection based on the description of S305, and this application will not elaborate on it.
  • the UE sends a Service Request (Service Request) message to the AMF.
  • Service Request Service Request
  • the UE determines whether to respond to paging according to part or all of the paging information in the second paging message. For example, the UE may determine whether to respond to paging according to the first paging information. If it is determined to respond to the paging, the UE sends a Service Request (Service Request) message to the AMF.
  • Service Request Service Request
  • the subsequent operations after the UE sends the service request message can refer to the prior art, which will not be described in detail in this application.
  • the UE specifically determines whether to respond to paging according to the paging information reference may also be made to the prior art, which will not be described in detail in this application.
  • AMF can prevent the leakage or tampering of the paging message by protecting the paging information in the paging message, so that the network can provide normal services for the UE. .
  • step S304 described that the AMF can determine whether to perform security protection on the first paging information according to the security protection indication information, and described that the security protection indication information may be sent by the UE.
  • the security protection instruction information received by the AMF is consistent with the security protection instruction information sent by the UE.
  • the following describes how to ensure that the security protection instruction information on which the AMF determines whether to perform security protection on the first paging message is consistent with the security protection instruction information sent by the UE in conjunction with FIG. 4 and FIG. 5.
  • Fig. 4 is a schematic flowchart of a method for transmitting paging information provided by the present application.
  • the method 400 is a specific example of the method 300.
  • S401 The UE sends an initial NAS message to the AMF, where the initial NAS message includes safety protection indication information. Accordingly, the AMF receives the initial NAS message.
  • the initial NAS message may be a registration request message or other NAS messages. It should be noted that the initial NAS message here is not secured.
  • the security protection indication information may be included in the UE capability cell in the initial NAS message, or may be included in the initial NAS message as a new cell alone.
  • S403 Perform an authentication process between the UE and the network.
  • the certification process can refer to the prior art.
  • the AMF sends a second NAS message to the UE, where the second NAS message includes the security protection indication information received by the AMF.
  • the UE receives the second NAS message.
  • the security protection indication information may be included in the UE capability information element in the second NAS message, or may be included in the second NAS message as a new information element alone.
  • the second NAS message can be protected by the NAS security context, such as encryption, integrity protection and/or anti-replay protection.
  • the NAS security context such as encryption, integrity protection and/or anti-replay protection.
  • the UL/DL NAS Count in the NAS security context can also be replaced with other counters negotiated between the UE and the AMF, such as a counter with a shorter length.
  • the NAS security key in the NAS security context can also be replaced with other shared keys.
  • the second NAS message may also be securely protected by a public key or a private key.
  • the second NAS message may be a NAS Security Mode Command (NAS Security Mode Command).
  • S405 The UE performs de-security protection on the second NAS message, such as decryption and/or integrity check, to obtain the security protection indication information in the second NAS message.
  • S406 The UE sends a first NAS message to the AMF.
  • the AMF receives the first NAS message.
  • the security protection indication information may be included in the UE capability information element in the first NAS message, or may be included in the first NAS message as a new information element alone.
  • the first NAS message may be protected by the NAS security context, such as encryption, integrity protection and/or anti-replay protection.
  • the NAS security context such as encryption, integrity protection and/or anti-replay protection.
  • the UL/DL NAS Count in the NAS security context can also be replaced with other counters negotiated between the UE and the AMF, such as a counter with a shorter length.
  • the NAS security key in the NAS security context can also be replaced with other shared keys.
  • the first NAS message may also be securely protected by a public key or a private key.
  • the first NAS message may be a NAS Security Mode Complete (NAS Security Mode Complete) message.
  • the AMF performs security protection on the first NAS message, and obtains and saves (or updates) security protection instruction information.
  • step S405 the UE may also determine whether the security protection instruction information obtained from the second NAS message is the same as the security protection instruction information sent by the UE in step S401.
  • step S411 the AMF may determine whether to perform security protection on the first paging message according to the security protection instruction information stored in step S402.
  • step S406 the UE carries the security protection instruction information in step S401 in the first NAS message.
  • step S411 the AMF may determine whether to perform security protection on the first paging information according to the security protection indication information in the first NAS message.
  • step S405 the UE does not determine whether the security protection indication information obtained from the second NAS message is the same as the security protection indication information sent by the UE in step S401, that is, regardless of the security protection received by the UE Whether the indication information is the same as the security protection indication information sent by it, in step S406, the UE carries the security protection indication information in step S401 in the first NAS message.
  • the AMF may determine whether to perform security protection on the first paging information according to the security protection indication information in the first NAS message.
  • S408 to S410 are the same as S301 to S303, that is, the network has downlink data to send to the UPF, the UPF informs the SMF that there is downlink data to be transmitted, and the SMF informs the AMF to initiate paging.
  • S411 The AMF determines whether to perform security protection on the first paging message.
  • S412 ⁇ S416 are the same as S305 ⁇ S309, you can refer to S305 ⁇ S309.
  • the method for transmitting paging information helps ensure that the security protection indication information received by the AMF is consistent with the security protection indication information sent by the UE, so that the AMF can accurately determine whether it is correct according to the actual needs of the UE.
  • the first paging message is secured.
  • Fig. 5 is a schematic flowchart of a method for transmitting paging information provided by the present application.
  • the method 500 is another specific example of the method 300.
  • S501 The UE sends a first NAS message to the AMF, where the first NAS message includes security protection indication information.
  • the AMF receives the first NAS message.
  • the first NAS message may be the first NAS message after security protection, for example, it may be the first NAS message after encryption and integrity protection are performed.
  • the first NAS message may be a NAS Security Mode Complete (NAS Security Mode Complete) message.
  • the AMF performs de-security protection on the first NAS message, such as decryption and integrity verification, and obtains and saves security protection instruction information.
  • S503 to S505 are the same as S301 to S303, that is, the network has downlink data to send to the UPF, the UPF informs the SMF that there is downlink data to be transmitted, and the SMF informs the AMF to initiate paging.
  • S506 The AMF determines whether to perform security protection on the first paging message. Refer to S304 for this step.
  • S507 ⁇ S511 are the same as S305 ⁇ S309, you can refer to S305 ⁇ S309.
  • the method for transmitting paging information by performing security protection on the first NAS message carrying security protection instruction information, it is beneficial to ensure that the security protection instruction information received by the AMF is consistent with the security protection instruction information sent by the UE. Therefore, it is beneficial for the AMF to accurately determine whether to perform security protection for the first paging information according to the actual needs of the UE.
  • Fig. 6 is a schematic flowchart of a method for transmitting paging information provided by the present application.
  • the method 600 can be applied to a scenario where the UE or one of the USIM cards is in an inactive state. The steps in the method 600 are described below.
  • S601 to S603 are the same as S301 to S303, that is, the network has downlink data to send to the UPF, the UPF informs the SMF that there is downlink data to be transmitted, and the SMF informs the AMF to initiate paging.
  • the AMF sends a paging message to the RAN.
  • the RAN receives the paging message.
  • the paging message sent by the AMF to the RAN can be recorded as: the first paging message; the paging message sent by the RAN to the UE is recorded as the second paging message.
  • the first paging message is the same as the paging message in the prior art, and will not be described in detail here.
  • the first paging message may include first paging information.
  • S605 The RAN determines whether to perform security protection on the first paging information.
  • the first paging information may be part or all of the paging information that needs to be sent to the UE.
  • the first paging information may include one or more of the following: paging reason, paging auxiliary information, user identification, paging identification, or access type.
  • the RAN may determine whether to perform security protection on the first paging information according to the security protection indication information.
  • the RAN may also perform security protection on the first paging information of any UE including the UE.
  • the RAN may determine whether to perform security protection on the first paging information of the UE according to the local configuration. For example, if the local configuration is to perform security protection on the first paging information of any UE, the RAN determines to perform security protection on the first paging information of the UE.
  • the security protection indication information may indicate whether the UE includes multiple USIM cards, or whether the UE requests security protection for the first paging information. That is to say, the security protection indication information either indicates that the UE includes multiple USIM cards or that the UE requests security protection for the first paging information, or indicates that the UE includes only one USIM card or the UE does not request security for the first paging information. protect. If the security protection indication information indicates that the UE includes multiple USIM cards or the UE requests security protection for the first paging information, the security protection indication information may also be referred to as first information. If the RAN receives the first information, the RAN determines to perform security protection on the first paging information.
  • the sending of the security protection indication information indicates that the UE includes multiple USIM cards, or the UE requests security protection for the first paging information. That is, if the RAN receives the security protection instruction information, the RAN determines to perform security protection on the first paging information; if the RAN does not receive the security protection instruction information, the RAN determines not to perform security protection on the first paging information.
  • the safety protection instruction information may also be referred to as first information.
  • the RAN determines to perform security protection on the first paging information.
  • the security protection indication information may be sent by the UE.
  • the UE may send security protection indication information to the RAN through an air interface message or an RRC message.
  • the air interface message or the RRC message may be secured by the AS security context.
  • the air interface message or the RRC message may be an AS Security Mode Complete (AS Security Mode Complete) message, where the AS Security Mode Complete message is secured by the AS security context.
  • AS Security Mode Complete AS Security Mode Complete
  • AS security context is the completion of the authentication process between the UE and the network, and the completion of the non-access layer security mode command (NAS Security Mode Command, NAS SMC) process between the UE and AMF, and the access layer security mode between the UE and the RAN
  • the command (AS Security Mode Command, AS SMC) process is generated.
  • the AS security context includes information such as the AS encryption key and the AS integrity key, the AS encryption algorithm, the AS integrity protection algorithm, and the uplink (UL)/downlink (DL) AS counter (Count).
  • AS encryption key and AS encryption algorithm are used for encryption (or encryption protection)
  • AS integrity key and AS integrity protection algorithm are used for integrity protection
  • DL AS Count and UL AS Count are used for anti-replay protection .
  • Anti-replay refers to preventing messages or information from being repeatedly sent to the receiving end.
  • the AS security context is maintained on the UE and the RAN, and AS security protection is activated.
  • the AS messages or information contained in the AS messages (also called information elements) exchanged between the UE and the RAN can be encrypted using the AS security context (also called information elements). It can be called encryption protection), integrity protection and/or anti-replay protection.
  • the IE may be any AS message or information element in the AS message, for example, it may be security protection indication information, first paging information, and so on.
  • the AS encryption key and AS encryption algorithm in the AS security context can be used to encrypt the IE.
  • calculate IE' Enc AS (K AS-Enc , IE), where IE' is the encrypted IE, Enc AS is the AS encryption algorithm, and K AS-Enc is the AS encryption key.
  • the AS integrity key and the AS integrity protection algorithm in the AS security context can be used to protect the integrity of the IE.
  • calculate MAC Int AS (K AS-Int , IE)
  • MAC is the message authentication code obtained after integrity protection
  • Int AS is the AS integrity protection algorithm
  • K AS-Int is the AS integrity Sex key.
  • the AS encryption key, AS encryption algorithm, and DL AS Count (or UL AS Count) in the AS security context can be used to simultaneously encrypt and anti-replay the IE.
  • the AS integrity key, AS integrity protection algorithm, and DL AS Count (or UL AS Count) in the AS security context can be used to simultaneously perform integrity protection and anti-replay protection on the IE.
  • this application does not limit the specific algorithm of the AS encryption algorithm and the AS integrity protection algorithm.
  • it can be a Hash or other algorithms.
  • the foregoing UL/DL AS Count can be replaced with other counters negotiated between the UE and the RAN, such as a counter with a shorter length.
  • the aforementioned AS security key can also be replaced with another shared key.
  • the shared key is a shared key negotiated between the UE and the RAN. For example, you can use the root key K that both the UE and RAN have, and a key that is specifically used to protect the security protection indication information generated through layered deduction; it can also be used UE and the RAN has been negotiated shared key, a dedicated to deduce the key K to protect security instructions 1, for example, according to RAN deduce K K 1.
  • K RAN is the secret key deduced by K AMF by the UE and RAN after the authentication process. This key is stored in the UE and RAN and can be used to derive the AS encryption key and integrity key.
  • the security protection instruction information can also be securely protected by a public key or a private key.
  • the public and private keys appear in pairs.
  • the sender uses the public key to calculate a signature for the protected content, and then the receiver uses its own private key to verify the signature is integrity protection; the sender uses the public key to encrypt the protected content. Then the receiver uses its own private key to decrypt it is encryption protection.
  • the security protection instruction information may also be sent by the AMF.
  • the AMF can send security protection indication information to the RAN through the N1 interface message or the first paging message.
  • the N1 interface message may be an initial context setup (initial context setup) message.
  • the AMF only when the security protection instruction information is the first information, the AMF sends the security protection instruction information to the RAN.
  • the security protection indication information sent by the AMF may come from the UE or the core network side, such as SMF, PCF, UPF, or UDM.
  • the UE sends the security protection indication information please refer to the description in step S304 above and the description of related steps in the methods 400 and 500, which will not be repeated here.
  • S606 The RAN performs security protection on the first paging information.
  • Security protection may include one or more of the following: encryption, integrity protection, or anti-replay protection.
  • the RAN may perform encryption, integrity protection, and/or anti-replay protection on the first paging message.
  • the RAN may perform security protection on the first paging information through the AS security context.
  • the RAN may use the AS encryption key and the AS encryption algorithm in the AS security context to encrypt the paging message that needs to be encrypted in the first paging message.
  • the RAN may use the AS integrity key and the AS integrity protection algorithm in the AS security context to perform integrity protection on the paging information that needs integrity protection in the first paging message; or, the RAN may use the AS security context
  • the AS integrity key and AS integrity protection algorithm in the Integrity protection algorithm protect the integrity of the encrypted paging message.
  • the RAN can use the DL AS Count to perform anti-replay protection on the paging information that needs anti-replay protection in the first paging information.
  • using the information in the AS security context for security protection is similar to using the information in the NAS security context for security protection, and reference may be made to the above description in step S304, which will not be described in detail here.
  • the first paging information may include only paging information that needs to be encrypted, or may only include paging information that needs integrity protection, or may only include paging information that needs anti-replay protection.
  • the first paging information may include any two or three of the three items: paging information that needs to be encrypted, paging information that needs integrity protection, and paging information that needs anti-replay protection. It should be understood that the same information in the first paging message may require two or three of the three operations of encryption, integrity protection, and anti-replay protection.
  • This application does not limit the specific information of the paging information that needs to be encrypted, the paging information that needs integrity protection, and the paging information that needs anti-replay protection.
  • the paging information that needs to be encrypted may include paging reason and/or paging auxiliary information.
  • the paging reason may be included in a newly defined container (Container), such as MUSIM_Container, or in an existing AS container (AS Container), which is not specifically limited.
  • the container here can be used to notify the UE that the information in the container is encrypted.
  • the data structure of the paging reason may include indication information, which is used to indicate that the cell is encrypted, and the specific form of the indication information is not limited.
  • the paging reason and/or paging auxiliary information may also not be encrypted, and only integrity protection is done.
  • the paging information requiring integrity protection may include a paging identification and/or access type.
  • the aforementioned DL AS Count can be replaced with other counters negotiated between the UE and the RAN, such as a counter with a shorter length.
  • the aforementioned AS security key can also be replaced with another shared key.
  • the shared key is a shared key negotiated between the UE and the RAN. For example, you can use the root key K that both the UE and RAN have, and a key that is specifically used to protect the security protection indication information generated through layered deduction; it can also be used UE and the RAN has been negotiated shared key, to deduce a dedicated secure key K paging indication information protection, such as K RAN according to deduce K paging.
  • K RAN is the secret key deduced by K AMF by the UE and RAN after the authentication process. This key is stored in the UE and RAN and can be used to derive the AS encryption key and integrity key.
  • the first paging message or part of the information in the first paging message can also be protected by a public key or a private key.
  • the RAN may adjust the paging frequency according to the safety protection indication information, such as controlling the number of UEs that are paged at a time, or paging the UEs in batches, so as to save air interface paging channel resources.
  • the safety protection indication information such as controlling the number of UEs that are paged at a time, or paging the UEs in batches, so as to save air interface paging channel resources.
  • the AS encryption key in the AS security context is sometimes also called the RRC key, and the AS encryption algorithm is sometimes also called the RRC encryption algorithm.
  • the AS integrity key in the AS security context is sometimes called the RRC integrity key, and the AS integrity protection algorithm is sometimes called the RRC integrity protection algorithm.
  • the RAN sends a second paging message to the UE, where the second paging message includes the first paging information after security protection.
  • the UE receives the second paging message.
  • S608 The UE performs security protection on the received second paging message.
  • the UE decrypts the paging information that needs to be encrypted, performs integrity verification on the paging information that needs integrity protection, and verifies whether the received counter is greater than the local counter for the paging information that needs anti-replay protection. After the UE performs security protection, the first paging information can be obtained.
  • the UE will also be desecured by the AS security context.
  • the UE uses the AS encryption key and AS encryption algorithm in the AS security context to decrypt it, and get the encryption Paging information, such as paging reason.
  • the UE may determine that the information such as the paging reason is encrypted according to the container in the second paging message.
  • the UE may determine that the paging reason is encrypted according to the indication information contained in the paging reason data structure.
  • the RAN uses the AS integrity key in the AS security context and the AS integrity protection algorithm to protect the paging information that needs integrity protection, for the paging information that needs integrity protection, the UE uses the AS in the AS security context.
  • the integrity key and AS integrity protection algorithm verify integrity.
  • the encrypted paging message is used as the encrypted paging cause, and the encrypted paging message is not required.
  • S608 is a reverse operation of S606, and those skilled in the art can learn how to perform security protection based on the description of S606, and this application will not elaborate on it.
  • S609 The UE sends a Service Request (Service Request) message to the AMF.
  • the UE determines whether to respond to paging according to part or all of the paging information in the first paging message. For example, the UE determines whether to respond to paging according to the first paging information. If it is determined to respond to the paging, the UE sends a Service Request (Service Request) message to the AMF.
  • Service Request Service Request
  • the subsequent operations after the UE sends the service request message can refer to the prior art, which will not be described in detail in this application.
  • the RAN can prevent the leakage or tampering of the paging message by safely protecting the paging information in the paging message, so that the network can provide normal services for the UE. .
  • Fig. 7 is a schematic flowchart of a method for transmitting paging information provided by the present application. The steps in the method 700 are described below.
  • S701 to S703 are the same as S301 to S303, that is, the network has downlink data to send to the UPF, the UPF informs the SMF that there is downlink data to be transmitted, and the SMF informs the AMF to initiate paging.
  • the AMF sends a paging message to the RAN.
  • the RAN receives the paging message.
  • S705 The RAN sends a paging message to the UE. Accordingly, the UE receives the paging message.
  • the paging message sent by the AMF to the RAN can be recorded as: the first paging message; the paging message sent by the RAN to the UE is recorded as the second paging message.
  • the first paging message includes paging information that needs to be sent to the RAN and paging information that needs to be sent to the UE, and the second paging message may include the paging information that needs to be sent to the UE.
  • the first paging message and the second paging message may include the first paging information.
  • the first paging information may be part or all of the paging information that needs to be sent to the UE.
  • the first paging information may include one or more of the following: paging reason, paging auxiliary information, user identification, paging identification, or access type.
  • S706 The UE sends a Service Request (Service Request) message to the AMF.
  • the AMF receives the service request message.
  • the UE determines whether to respond to paging according to part or all of the paging information in the second paging message. For example, the UE may determine whether to respond to paging according to the first paging information. If it is determined to respond to the paging, the UE sends a service request message to the AMF.
  • the service request message includes part or all of the paging information received by the UE, which is hereinafter referred to as the second paging information.
  • the UE may carry the second paging information in the service request message when it determines that it needs to perform paging inspection, for example, if the UE includes multiple USIM cards.
  • the paging information in the second paging information is of the same type as the paging information in the first paging information. For example, if the first paging information includes the paging cause, the second paging information includes the paging cause. If the first paging information includes the access type, the second paging information includes the access type.
  • the service request message may also include first information.
  • the first information is used to indicate that the UE includes multiple USIM cards or the UE requests the AMF to verify the second paging information or the paging information sent by the UE in the service request message.
  • the UE may send security protection indication information to the AMF.
  • security protection indication information For the manner in which the UE sends the security protection indication information to the AMF, please refer to the description in step S304 above and the description of related steps in the methods 400 and 500, which will not be repeated here.
  • the AMF determines whether to check the paging information (ie, the second paging information) in the service request message.
  • the AMF determines to verify the paging information in the service request message.
  • the AMF determines to verify the paging information in the service request message. S708. The AMF verifies the paging information in the service request message.
  • the AMF determines to verify the paging information in the service request message, then in S708, the AMF verifies the paging information in the service request message. That is, the AMF compares whether the first paging information is the same as the paging information in the service request message, and if they are the same, the subsequent procedures are continued, and the subsequent procedures can refer to the prior art; if they are different, the AMF sends abnormal information to the network or the UE.
  • the AMF checks the paging information sent by the UE after responding to the paging, and can determine whether the paging information has been tampered with when it is transmitted over the air interface.
  • the network or user discovers an attack.
  • the size of the sequence numbers of the foregoing processes does not mean the order of execution, and the execution order of the processes should be determined by their functions and internal logic, and should not constitute the implementation process of the embodiments of this application. Any restrictions.
  • Fig. 8 is a schematic block diagram of a communication device provided by the present application.
  • the communication device 1000 may include a transceiving unit 1100 and a processing unit 1200.
  • the transceiver unit 1100 may be used to send information to or receive information from other devices. For example, sending or receiving the first paging message.
  • the processing unit 1200 may be used to perform internal processing of the device, for example, to perform security protection on the first paging message.
  • the communication device 1000 corresponds to a mobility management network element.
  • the communication device 1000 may be a mobility management network element or a chip configured in a mobility management network element, which may include units for performing operations performed by the mobility management network element, and each unit in the communication device 1000 is for The operations performed by the mobility management network element in the above method are implemented.
  • the communication device 1000 may correspond to a mobility management network element (ie, AMF) in any of the methods 300, 400, or 500.
  • the transceiving unit 1100 is configured to receive first information from a terminal device; the processing unit 1200 is configured to perform security protection on the first paging information according to the first information when the terminal device needs to be paged.
  • the transceiving unit 1100 is also used to send the first paging information after security protection to the terminal device.
  • the first information is used to indicate that the terminal device includes multiple global user identity module USIM cards or to request security protection for paging information.
  • the first paging information is secured by a non-access stratum NAS security context.
  • the transceiving unit 1100 is specifically configured to receive a non-access stratum NAS message from the terminal device, where the NAS message includes the first information.
  • the NAS message is protected by a NAS security context.
  • the processing unit 1200 is specifically configured to: perform one or more of the following operations on the first paging information: encryption, integrity protection, or anti-replay protection.
  • the first paging information includes one or more of the following: paging reason, paging assistance information, user identification, paging identification, or access type.
  • the communication device 1000 may correspond to the mobility management network element (ie, AMF) in the method 600.
  • the transceiver unit 1100 is configured to receive the first information from the terminal device, and send the first information to the access network device.
  • the first information is used to indicate that the terminal device includes multiple USIM cards or to request security protection for paging information.
  • the transceiver unit 1100 is specifically configured to: receive an AS message from the terminal device, where the AS message includes the first information.
  • the AS message is protected by AS security context.
  • the transceiver unit 1100 is specifically configured to: send an N1 interface message to the access network device, where the N1 interface message includes the first information; or, send a paging message to the access network device, the paging message Including the first information.
  • the communication device 1000 may correspond to the mobility management network element (ie, AMF) in the method 700.
  • the transceiving unit 1100 is configured to send first paging information to the terminal device, and receive a service request message from the terminal device, the service request message includes the second paging information;
  • the processing unit 1200 is configured to send the first paging information according to the first paging information , To verify the second paging information.
  • the first paging information includes one or more of the following: paging reason, paging assistance information, user identification, paging identification, or access type.
  • the second paging information includes one or more of the following: paging reason, paging auxiliary information, user identification, paging identification, or access type.
  • the processing unit 1200 is specifically configured to: verify the second paging information according to the first information and the first paging information.
  • the first information may indicate that the terminal device includes multiple USIM cards or request verification of paging information.
  • the transceiver unit 1100 is further configured to: receive the first information from the terminal device.
  • the first information is carried in a NAS message. Further, the first information is protected by the NAS security context.
  • the service request message includes the first information.
  • the communication device 1000 corresponds to a terminal device.
  • the communication device 1000 may be a terminal device or a chip configured in the terminal device, which may include a unit for performing operations performed by the terminal device, and each unit in the communication device 1000 is used to implement the above-mentioned method by the terminal device. The operation performed by the device.
  • the communication apparatus 1000 may correspond to the terminal equipment (ie, UE) in any of the methods 300, 400, or 500.
  • the transceiver unit 1100 is configured to send the first information to the mobility management network element; and receive the first paging information after security protection from the mobility management network element.
  • the first information is used to indicate that the device includes multiple global user identity module USIM cards or to request security protection for paging information.
  • the first paging information is secured by a non-access stratum NAS security context.
  • the transceiver unit 1100 is specifically configured to: send a non-access stratum NAS message to the mobility management network element, where the NAS message includes the first information
  • the NAS message is protected by a NAS security context.
  • the security protection includes one or more of the following: encryption, integrity protection, or anti-replay protection.
  • the first paging information includes one or more of the following: paging reason, paging assistance information, user identification, paging identification, or access type.
  • the communication apparatus 1000 may correspond to the terminal equipment (ie, UE) in the method 600.
  • the transceiving unit 1100 is configured to send the first information to the mobility management network element or the access network device; and receive the first paging information after the security protection is performed from the access network device.
  • the first information is used to indicate that the communication device 1000 includes multiple USIM cards or to request security protection for paging information.
  • the first paging information may include part or all of the paging information that needs to be sent to the communication device 1000, and the paging information is used to page the communication device 1000.
  • the first paging information includes one or more of the following: paging reason, paging auxiliary information, user identification, paging identification, or access type.
  • the processing unit 1200 is further configured to perform security protection on the first paging information after security protection.
  • the security protection includes one or more of the following: encryption, integrity protection, or anti-replay protection.
  • the transceiver unit 1100 is specifically configured to send an AS message to a mobility management network element, where the AS message includes the first information, and the AS message performs security protection through the AS security context.
  • the communication apparatus 1000 may correspond to the terminal equipment (ie, UE) in the method 700.
  • the transceiver unit 1100 receives the first paging information; sends a service request message to the mobility management network element, the service request message includes the second paging information, and the first paging information is used for the mobility management network element to respond to the second paging information Perform verification.
  • the transceiver unit 1100 is further configured to send the first information to the mobility management network element.
  • the first information may indicate that the communication device 1000 includes multiple USIM cards or request verification of the paging information.
  • the first information is carried in a NAS message. Further, the first information is protected by the NAS security context.
  • the service request message includes the first information.
  • the communication apparatus 1000 corresponds to an access network device.
  • the communication device 1000 may be an access network device or a chip configured in the access network device, and it may include a unit for performing operations performed by the access network device, and each unit in the communication device 1000 is for The operation performed by the access network device in the above method is realized.
  • the communication apparatus 1000 may correspond to the access network equipment (ie, RAN) in the method 600.
  • the transceiving unit 1100 is used to receive the first information; the processing unit is used to perform security protection on the first paging information according to the first information when the terminal device needs to be paged; the transceiving unit 1100 is also used to: The terminal device sends the first paging message after security protection.
  • the first information is used to indicate that the terminal device includes multiple USIM cards or to request security protection for paging information.
  • the first paging information includes one or more of the following: paging reason, paging assistance information, user identification, paging identification, or access type.
  • the user identification may be the UE ID, and the UE ID is the identification of the terminal device.
  • the processing unit is specifically configured to perform one or more of the following operations on the first paging message: encryption, integrity protection, or anti-replay protection.
  • the first paging information may be secured by the AS security context.
  • the receiving unit 1100 is specifically configured to receive the first information from the terminal device or the mobility management network element.
  • the receiving unit 1100 is specifically configured to receive an air interface message or a radio resource control RRC message from a terminal device, where the air interface message or the RRC message includes the first information.
  • the air interface message or RRC message is protected by AS security context.
  • the receiving unit 1100 is specifically configured to receive an N1 interface message from a mobility management network element, where the N1 interface message includes the first information; or, receive a paging message from the mobility management network element, so The paging message includes the first information.
  • the transceiver unit 1100 in the communication device 1000 may correspond to the transceiver 2300 in the network device 2000 shown in FIG. 9, and the processing unit in the communication device 1000 1200 may correspond to the processor 2100 in the network device 2000 shown in FIG. 9.
  • the transceiver unit 1100 in the communication device 1000 may be an input/output interface.
  • the transceiving unit 1100 in the communication device 1000 may correspond to the transceiver 3002 in the terminal device 3000 shown in FIG. 10, and the processing unit 1200 in the communication device 1000 may It corresponds to the processor 3001 in the terminal device 3000 shown in FIG. 10.
  • the transceiver unit 1100 in the communication device 1000 may correspond to the RRU 4100 in the access network device 4000 shown in FIG. 11, and the processing in the communication device 1000
  • the unit 1200 may correspond to the BBU 4200 in the access network device 4000 shown in FIG. 11.
  • the transceiver unit 1100 in the communication device 1000 may be an input/output interface.
  • Fig. 9 is a schematic structural diagram of a network device provided by an embodiment of the present application.
  • the aforementioned mobility management network element or AMF may be implemented by the network device 2000 shown in FIG. 9. It should be understood that the network device 2000 may be a physical device, or a component of a physical device (for example, an integrated circuit, a chip, etc.).
  • the network device 2000 includes: one or more processors 2100.
  • the processor 2100 may store execution instructions for executing the methods in the embodiments of the present application.
  • the processor 2100 may call an interface to implement receiving and sending functions.
  • the interface may be a logical interface or a physical interface, which is not limited.
  • the interface can be a transceiver circuit or an interface circuit.
  • the transceiver circuits or interface circuits used to implement the receiving and transmitting functions may be separate or integrated.
  • the foregoing transceiver circuit or interface circuit may be used for code/data reading and writing, or the foregoing transceiver circuit or interface circuit may be used for signal transmission or transmission.
  • the interface can be implemented by a transceiver.
  • the network device 2000 may further include a transceiver 2300.
  • the transceiver 2300 may be referred to as a transceiver unit, a transceiver, a transceiver circuit, or a transceiver, etc., for implementing the transceiver function.
  • the network device 2000 may further include a memory 2200.
  • the embodiment of the present application does not specifically limit the specific deployment location of the memory 2200.
  • the memory may be integrated in the processor or independent of the processor.
  • the computer device does not include a memory, the computer device only needs to have processing functions, and the memory can be deployed in other locations (for example, a cloud system).
  • the processor 2100, the memory 2200, and the transceiver 2300 communicate with each other through internal connection paths to transfer control and/or data signals.
  • the network device 2000 may also include other modules, such as a battery.
  • the memory 2200 may store execution instructions for executing the methods in the embodiments of the present application.
  • the processor 2100 may execute the instructions stored in the memory 2200, and combine with other hardware (for example, the transceiver 2300) to complete the steps executed by the method shown above.
  • other hardware for example, the transceiver 2300
  • the processor 2300 may be an integrated circuit chip with signal processing capabilities. In the implementation process, each step of the method can be completed by an integrated logic circuit of hardware in the processor or instructions in the form of software.
  • the above-mentioned processor may be a general-purpose processor, a digital signal processor (digital signal processor, DSP), an application specific integrated circuit (ASIC), a ready-made programmable gate array (field programmable gate array, FPGA) or other Programming logic devices, discrete gates or transistor logic devices, discrete hardware components.
  • DSP digital signal processor
  • ASIC application specific integrated circuit
  • FPGA ready-made programmable gate array
  • Programming logic devices discrete gates or transistor logic devices, discrete hardware components.
  • the methods, steps, and logical block diagrams disclosed in the embodiments of the present application can be implemented or executed.
  • the general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like.
  • the steps of the method disclosed in the embodiments of the present application may be directly embodied as being executed and completed by a hardware decoding processor, or executed and completed by a combination of hardware and software modules in the decoding processor.
  • the software module can be located in random access memory (RAM), flash memory, read-only memory (read-only memory, ROM), programmable read-only memory, or electrically erasable programmable memory, registers, etc. mature in the field Storage medium.
  • the storage medium is located in the memory, and the processor reads the instructions in the memory and completes the steps of the above method in combination with its hardware.
  • the memory 2200 may be a volatile memory or a non-volatile memory, or may include both volatile and non-volatile memory.
  • the non-volatile memory can be read-only memory ROM, programmable read-only memory (programmable ROM, PROM), erasable programmable read-only memory (erasable PROM, EPROM), electrically erasable programmable read-only memory (electrically EPROM, EEPROM) or flash memory.
  • the volatile memory may be random access memory RAM, which acts as an external cache.
  • RAM random access memory
  • static random access memory static random access memory
  • dynamic RAM dynamic RAM
  • DRAM dynamic random access memory
  • synchronous dynamic random access memory synchronous DRAM, SDRAM
  • double data rate synchronous dynamic random access memory double data rate SDRAM, DDR SDRAM
  • enhanced synchronous dynamic random access memory enhanced SDRAM, ESDRAM
  • synchronous connection dynamic random access memory serial DRAM, SLDRAM
  • direct rambus RAM direct rambus RAM
  • the aforementioned network device 2000 may be a general-purpose computer device or a special-purpose computer device.
  • the network device 2000 can be a desktop computer, a portable computer, a network server, a personal digital assistant (PDA), a mobile phone, a tablet computer, a wireless terminal device, a communication device, an embedded device, or the device shown in Figure 9. Similar structure equipment.
  • PDA personal digital assistant
  • the embodiment of the present application does not limit the type of the network device 2000.
  • FIG. 10 is a schematic structural diagram of a terminal device 3000 provided by an embodiment of the present application.
  • the terminal device 3000 includes a processor 3001 and a transceiver 3002.
  • the terminal device 3000 may further include a memory 3003.
  • the processor 3001, the transceiver 3002, and the memory 3003 can communicate with each other through an internal connection path to transfer control and/or data signals.
  • the memory 3003 is used to store computer programs, and the processor 3001 is used to download from the memory 3003 Call and run the computer program to control the transceiver 3002 to send and receive signals.
  • the foregoing processor 3001 and memory 3003 may be combined into a processing device 3004, and the processor 3001 is configured to execute program codes stored in the memory 3003 to implement the foregoing functions. It should be understood that the processing device 3004 shown in the figure is only an example. In specific implementation, the memory 3003 may also be integrated in the processor 3001 or independent of the processor 3001. This application does not limit this.
  • the above-mentioned terminal device 3000 may also include an antenna 3010 for transmitting uplink data or uplink control signaling output by the transceiver 3002 through a wireless signal.
  • the aforementioned terminal device 3000 may further include a power supply 3005 for providing power to various devices or circuits in the terminal device.
  • the terminal device 3000 may also include one or more of the input unit 3006, the display unit 3007, the audio circuit 3008, the camera 3009 and the sensor 3011, etc., the audio circuit It may also include a speaker 30081, a microphone 30082, and so on.
  • the processing device 3004 may be a chip.
  • the processing device 3004 may be a field programmable gate array (FPGA), a general-purpose processor, a digital signal processor (digital signal processor, DSP), or an application specific integrated circuit (ASIC). ), off-the-shelf programmable gate array (FPGA) or other programmable logic devices, discrete gates or transistor logic devices, discrete hardware components, or system on chip (SoC), or central
  • the processor central processor unit, CPU
  • CPU can also be a network processor (NP), a digital signal processing circuit (digital signal processor, DSP), or a microcontroller (microcontroller unit, MCU) ), it can also be a programmable logic device (PLD) or other integrated chips.
  • NP network processor
  • DSP digital signal processor
  • MCU microcontroller unit
  • PLD programmable logic device
  • the methods, steps, and logical block diagrams disclosed in the embodiments of the present application can be implemented or executed.
  • the general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like.
  • the steps of the method disclosed in the embodiments of the present application may be directly embodied as being executed and completed by a hardware decoding processor, or executed and completed by a combination of hardware and software modules in the decoding processor.
  • the software module can be located in a mature storage medium in the field, such as random access memory, flash memory, read-only memory, programmable read-only memory, or electrically erasable programmable memory, registers.
  • the storage medium is located in the memory, and the processor reads the information in the memory and completes the steps of the above method in combination with its hardware.
  • the memory 3003 may be a volatile memory or a non-volatile memory, or may include both volatile and non-volatile memory.
  • the non-volatile memory can be read-only memory (ROM), programmable read-only memory (programmable ROM, PROM), erasable programmable read-only memory (erasable PROM, EPROM), and electrically available Erase programmable read-only memory (electrically EPROM, EEPROM) or flash memory.
  • the volatile memory may be random access memory (RAM), which is used as an external cache.
  • RAM random access memory
  • static random access memory static random access memory
  • dynamic RAM dynamic RAM
  • DRAM dynamic random access memory
  • synchronous dynamic random access memory synchronous DRAM, SDRAM
  • double data rate synchronous dynamic random access memory double data rate SDRAM, DDR SDRAM
  • enhanced synchronous dynamic random access memory enhanced SDRAM, ESDRAM
  • synchronous connection dynamic random access memory serial DRAM, SLDRAM
  • direct rambus RAM direct rambus RAM, DR RAM
  • memories of the systems and methods described herein are intended to include, but are not limited to, these and any other suitable types of memories.
  • FIG. 11 is a schematic structural diagram of an access network device provided by an embodiment of the present application, and may be, for example, a schematic structural diagram of a base station.
  • the base station 4000 performs the functions of the access network equipment (RAN) in the above method embodiment.
  • the base station 4000 may include one or more radio frequency units, such as a remote radio unit (RRU) 4100 and one or more baseband units (BBU) (also known as distributed units ( DU)) 4200.
  • RRU 4100 may be called a transceiver unit or a communication unit.
  • the transceiver unit 4100 may also be called a transceiver, a transceiver circuit, or a transceiver, etc., and it may include at least one antenna 4101 and a radio frequency unit 4102.
  • the transceiver unit 4100 may include a receiving unit and a transmitting unit, the receiving unit may correspond to a receiver (or receiver, receiving circuit), and the transmitting unit may correspond to a transmitter (or transmitter or transmitting circuit).
  • the RRU 4100 part is mainly used for receiving and sending radio frequency signals and converting radio frequency signals and baseband signals.
  • the 4200 part of the BBU is mainly used for baseband processing, base station control, and so on.
  • the RRU 4100 and the BBU 4200 may be physically set together, or may be physically separated, that is, a distributed base station.
  • the BBU 4200 is the control center of the base station, and may also be called a processing unit, which is mainly used to complete baseband processing functions, such as channel coding, multiplexing, modulation, and spreading.
  • the BBU processing unit
  • the BBU may be used to control the base station to execute the operation procedure of the access network device in the foregoing method embodiment.
  • the BBU 4200 may be composed of one or more single boards, and multiple single boards may jointly support a radio access network with a single access standard (such as an LTE network), or support different access standards. Wireless access network (such as LTE network, 5G network or other networks).
  • the BBU 4200 further includes a memory 4201 and a processor 4202.
  • the memory 4201 is used to store necessary instructions and data.
  • the processor 4202 is configured to control the base station to perform necessary actions, for example, to control the base station to execute the operation procedure of the access network device in the foregoing method embodiment.
  • the memory 4201 and the processor 4202 may serve one or more boards. In other words, the memory and the processor can be set separately on each board. It can also be that multiple boards share the same memory and processor. In addition, necessary circuits can be provided on each board.
  • the base station 4000 shown in FIG. 11 can implement various processes involving access network equipment in the foregoing method embodiments.
  • the operation or function of each module in the base station 4000 is to implement the corresponding process in the foregoing method embodiment.
  • the above-mentioned BBU 4200 can be used to perform the actions implemented by the access network device described in the previous method embodiments, and the RRU 4100 can be used to perform the sending or receiving actions of the access network device described in the previous method embodiments.
  • the RRU 4100 can be used to perform the sending or receiving actions of the access network device described in the previous method embodiments.
  • the present application also provides a computer program product, the computer program product comprising: computer program code, when the computer program code runs on a computer, causes the computer to execute any of the foregoing method embodiments executed by the first network element method.
  • the present application also provides a computer-readable storage medium that stores a program code that, when the program code runs on a computer, causes the computer to execute the method executed by the terminal device in the foregoing method embodiment.
  • the present application also provides a computer-readable storage medium that stores program code, and when the program code is run on a computer, the computer executes what is executed by the access network device in the foregoing method embodiment method.
  • the present application also provides a computer-readable storage medium that stores program code, and when the program code is run on a computer, the computer executes the operations executed by the mobility management network element in the foregoing method embodiments. method.
  • This application also provides a system, which includes any two network elements among a terminal device, an access network device, and a mobility management network element.
  • the present application also provides a system, which includes any two network elements involved in any of the foregoing method embodiments.
  • An embodiment of the present application also provides a processing device, including a processor and an interface; the processor is configured to execute a method executed by any network element involved in any of the foregoing method embodiments.
  • the computer may be implemented in whole or in part by software, hardware, firmware, or any combination thereof.
  • software it can be implemented in the form of a computer program product in whole or in part.
  • the computer program product includes one or more computer instructions.
  • the computer may be a general-purpose computer, a special-purpose computer, a computer network, or other programmable devices.
  • the computer instructions may be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another computer-readable storage medium.
  • the computer instructions may be transmitted from a website, computer, server, or data center.
  • the computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server or a data center integrated with one or more available media.
  • the usable medium may be a magnetic medium (for example, a floppy disk, a hard disk, and a magnetic tape), an optical medium (for example, a high-density digital video disc (digital video disc, DVD)), or a semiconductor medium (for example, a solid state disk (solid state disc), SSD)) etc.
  • a component may be, but is not limited to, a process, a processor, an object, an executable file, an execution thread, a program, or a computer running on the processor.
  • the application running on the computing device and the computing device can be components.
  • One or more components can reside in a process or thread of execution, and the components can be located on one computer or distributed between two or more computers.
  • these components can be executed from various computer readable media having various data structures stored thereon.
  • a component can pass a local signal based on a signal having one or more data packets (for example, data from two components that interact with another component in a local system, a distributed system, or a network, such as the Internet that interacts with other systems through a signal). Or remote process to communicate.
  • a signal having one or more data packets for example, data from two components that interact with another component in a local system, a distributed system, or a network, such as the Internet that interacts with other systems through a signal.
  • remote process to communicate for example, data from two components that interact with another component in a local system, a distributed system, or a network, such as the Internet that interacts with other systems through a signal.
  • a corresponding to B means that B is associated with A, and B can be determined according to A.
  • determining B based on A does not mean that B is determined only based on A, and B can also be determined based on A and/or other information.
  • the terminal device and/or the network device can perform some or all of the steps in the embodiments of the present application. These steps or operations are only examples, and the embodiments of the present application may also perform other operations or various operations. Deformation of the operation. In addition, each step may be executed in a different order presented in the embodiments of the present application, and it may not be necessary to perform all the operations in the embodiments of the present application.
  • the disclosed system, device, and method can be implemented in other ways.
  • the device embodiments described above are only illustrative.
  • the division of the units is only a logical function division, and there may be other divisions in actual implementation, for example, multiple units or components may be combined or It can be integrated into another system, or some features can be ignored or not implemented.
  • the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or they may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the objectives of the solutions of the embodiments.
  • the functional units in the various embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
  • the function is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a computer readable storage medium.
  • the technical solution of the present application essentially or the part that contributes to the existing technology or the part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium, including Several instructions are used to make a computer device (which may be a personal computer, a server, or a network device, etc.) execute all or part of the steps of the methods described in the various embodiments of the present application.
  • the aforementioned storage media include: U disk, mobile hard disk, read only memory ROM, random access memory RAM, magnetic disk or optical disk and other media that can store program codes.

Abstract

The embodiments of the present application provide a method for transmitting paging information and a communication apparatus. If a terminal device requests, according to requirements of the terminal device, security protection on paging information in a paging message, in the case where UE needs to be paged, an AMF or an RAN first performs security protection on the paging information, and then sends to the UE the paging information having been subjected to security protection. In this way, leakage or tampering of paging information can be avoided, thereby facilitating a network to provide normal services for UE.

Description

传输寻呼信息的方法和通信装置Method and communication device for transmitting paging information
本申请要求于2020年03月12日提交中国专利局、申请号为202010171168.4、申请名称为“传输寻呼信息的方法和通信装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。This application claims the priority of a Chinese patent application filed with the Chinese Patent Office on March 12, 2020, the application number is 202010171168.4, and the application name is "Method and Communication Device for Transmission of Paging Information", the entire content of which is incorporated herein by reference. Applying.
技术领域Technical field
本申请涉及通信领域,并且更具体地,涉及一种传输寻呼信息的方法和通信装置。This application relates to the field of communication, and more specifically, to a method and communication device for transmitting paging information.
背景技术Background technique
用户设备(user equipment,UE)处于空闲态,即与无线接入网络(radio access network,RAN)的空口连接已经释放时,若网络侧有下行数据需要发送到UE,则用户面功能(user plane function,UPF)通知会话管理功能(session management function,SMF),然后SMF通知接入和移动管理功能(access and mobility management function,AMF),AMF向RAN发送寻呼消息。RAN根据AMF发送的寻呼消息,向UE发送寻呼消息。UE收到寻呼消息后,根据寻呼消息中的寻呼信息,决定是否响应寻呼。The user equipment (UE) is in the idle state, that is, when the air interface connection with the radio access network (RAN) has been released, if the network side has downlink data that needs to be sent to the UE, the user plane function (user plane) Function, UPF) notifies the session management function (session management function, SMF), and then the SMF notifies the access and mobility management function (access and mobility management function, AMF), and the AMF sends a paging message to the RAN. The RAN sends a paging message to the UE according to the paging message sent by the AMF. After receiving the paging message, the UE decides whether to respond to the paging according to the paging information in the paging message.
在寻呼消息的传输过程中,寻呼消息中的寻呼信息可能被泄露或者篡改,从而可能导致网络无法为UE提供正常的服务。During the transmission of the paging message, the paging information in the paging message may be leaked or tampered with, which may cause the network to be unable to provide normal services for the UE.
发明内容Summary of the invention
本申请提供了一种传输寻呼信息的方法和通信装置,通过对寻呼消息中的寻呼信息进行安全保护,能够避免寻呼信息的泄露或者篡改,从而使得网络可以为终端设备提供正常的服务。This application provides a method and communication device for transmitting paging information. By protecting the paging information in the paging message, the leakage or tampering of the paging information can be avoided, so that the network can provide normal terminal equipment with service.
第一方面,提供了一种传输寻呼信息的方法,包括:移动管理网元接收来自终端设备的第一信息;在需要寻呼终端设备的情况下,移动管理网元根据第一信息,对第一寻呼信息进行安全保护;移动管理网元向终端设备发送进行安全保护后的第一寻呼信息。In a first aspect, a method for transmitting paging information is provided, including: a mobility management network element receives first information from a terminal device; in a case where the terminal device needs to be paged, the mobility management network element responds to the first information according to the first information. The first paging information is secured; the mobility management network element sends the secured first paging information to the terminal device.
应理解,需要寻呼终端设备的情况是指移动管理网元接收到会话管理网元发送的通知消息,该通知消息指示移动管理网元寻呼终端设备。会话管理网元可以是具有会话管理功能的网元,如在第五代(5th generation,5G)系统中为会话管理功能(session management function,SMF)。It should be understood that the situation where the terminal device needs to be paged refers to that the mobile management network element receives a notification message sent by the session management network element, and the notification message instructs the mobile management network element to page the terminal device. The session management network element may be a network element with a session management function, such as a session management function (SMF) in a fifth generation (5th generation, 5G) system.
可选地,第一信息用于指示终端设备包括多张全球用户标识模块(universal subscriber identity module,USIM)卡或者请求对寻呼信息进行安全保护。举例来说,多张USIM卡可以理解为两张或两张以上的USIM卡。Optionally, the first information is used to indicate that the terminal device includes multiple universal subscriber identity module (Universal Subscriber Identity Module, USIM) cards or to request security protection for paging information. For example, multiple USIM cards can be understood as two or more USIM cards.
可选地,第一寻呼信息可以是需要发送给终端设备的寻呼信息,寻呼信息用于寻呼终端设备。或者说,第一寻呼信息可以是寻呼消息中需要发送给终端设备的信息(或寻呼信息)。Optionally, the first paging information may be paging information that needs to be sent to the terminal device, and the paging information is used to page the terminal device. In other words, the first paging information may be information (or paging information) in the paging message that needs to be sent to the terminal device.
比如,第一寻呼信息包括下述中的一项或多项:寻呼原因(Paging Cause)、寻呼辅助信息(Assistance Data for Paging)、用户标识、寻呼标识(UE Paging Identity)或接入类型(Access Type)。用户标识可以是UE ID,UE ID为该终端设备的标识。For example, the first paging information includes one or more of the following: paging cause (Paging Cause), paging assistance information (Assistance Data for Paging), user identification, paging identification (UE Paging Identity) or access Access Type. The user identification may be the UE ID, and the UE ID is the identification of the terminal device.
根据本申请提供的传输寻呼信息的方法,移动管理网元可以根据终端设备的指示,对寻呼消息中的寻呼信息(第一寻呼信息)进行安全保护,从而能够避免寻呼消息的泄露或者篡改,进而使得网络可以为终端设备提供正常的服务。According to the method for transmitting paging information provided by the present application, the mobility management network element can perform security protection on the paging information (first paging information) in the paging message according to the instructions of the terminal device, so as to prevent the paging message from being disturbed. Leaking or tampering, so that the network can provide normal services for terminal devices.
结合第一方面,在第一方面的某些实现方式中,所述对第一寻呼信息进行安全保护,包括:对第一寻呼信息进行下述中的一项或多项操作:加密、完整性保护或防重放保护。With reference to the first aspect, in some implementations of the first aspect, the security protection of the first paging information includes: performing one or more of the following operations on the first paging information: encryption, Integrity protection or anti-replay protection.
第一寻呼信息可以包括下述中的一项或多项:需要加密的寻呼信息、需要完整性保护的寻呼信息、需要防重放保护的寻呼信息。The first paging information may include one or more of the following: paging information that needs to be encrypted, paging information that needs integrity protection, and paging information that needs anti-replay protection.
结合第一方面,在第一方面的某些实现方式中,第一寻呼信息可以通过非接入层(non-access stratum,NAS)安全上下文进行安全保护。With reference to the first aspect, in some implementations of the first aspect, the first paging information may be secured by a non-access stratum (NAS) security context.
例如,可以使用NAS安全上下文中的NAS加密密钥和NAS加密算法对第一寻呼信息中需要加密的寻呼信息进行加密;使用NAS安全上下文中的NAS完整性密钥和NAS完整性保护算法第一寻呼信息中需要完整性保护的寻呼信息进行完整性保护;使用下行(downlink,DL)NAS计数器(Count)对第一寻呼信息中需要防重放保护的寻呼信息进行防重放保护。For example, the NAS encryption key and NAS encryption algorithm in the NAS security context can be used to encrypt the paging information that needs to be encrypted in the first paging message; the NAS integrity key and the NAS integrity protection algorithm in the NAS security context can be used The paging information that needs integrity protection in the first paging message is integrity protected; the downlink (DL) NAS counter (Count) is used to prevent replay of the paging information that needs anti-replay protection in the first paging message.放保护。 Put protection.
再如,可以使用NAS安全上下文中的NAS完整性密钥和NAS完整性保护算法对第一寻呼信息中需要加密后的寻呼信息先进行加密,得到加密后的寻呼信息。然后再对加密后的寻呼信息和第一寻呼信息中需要完整性保护的寻呼信息一起进行完整性保护。For another example, the NAS integrity key and the NAS integrity protection algorithm in the NAS security context may be used to first encrypt the paging information that needs to be encrypted in the first paging message to obtain the encrypted paging information. Then, integrity protection is performed on the encrypted paging information and the paging information that needs integrity protection in the first paging information.
通过采用NAS安全上下文对第一寻呼信息进行安全保护,能够避免终端设备和移动管理网元协商专门用于对第一寻呼信息进行安全保护的信息的操作,从而能够节省信令开销。By adopting the NAS security context to securely protect the first paging information, it is possible to prevent the terminal device and the mobility management network element from negotiating an operation dedicated to the security protection of the first paging information, thereby saving signaling overhead.
可选地,第一寻呼信息可以通过终端设备和移动管理网元的共享密钥、私钥或者公钥进行安全保护。Optionally, the first paging information may be securely protected by a shared key, private key, or public key of the terminal device and the mobility management network element.
结合第一方面,在第一方面的某些实现方式中,所述移动管理网元接收来自终端设备的第一信息,包括:移动管理网元接收来自终端设备的NAS消息,该NAS消息包括第一信息。With reference to the first aspect, in some implementations of the first aspect, the mobility management network element receiving the first information from the terminal device includes: the mobility management network element receiving the NAS message from the terminal device, the NAS message including the first information One information.
可选地,该NAS消息可以通过NAS安全上下文进行安全保护。Optionally, the NAS message can be secured by the NAS security context.
通过对该NAS消息进行安全保护,有利于保证移动管理网元接收到的第一信息实际就是终端设备发送的,而不是经过篡改后的信息,这样有利于保证移动管理网元可以根据终端设备的实际需求,确定是否对第一寻呼信息进行安全保护。Through the security protection of the NAS message, it is helpful to ensure that the first information received by the mobility management network element is actually sent by the terminal device instead of tampered information. This helps to ensure that the mobility management network element can be based on the terminal device’s According to actual needs, determine whether to protect the first paging message.
第二方面,提供了一种传输寻呼信息的方法,包括:终端设备向移动管理网元发送第一信息;终端设备接收来自移动管理网元的进行安全保护后的第一寻呼信息。In a second aspect, a method for transmitting paging information is provided, including: a terminal device sends first information to a mobility management network element; and the terminal device receives the first paging information after security protection from the mobility management network element.
可选地,第一信息用于指示终端设备包括多张USIM卡或者请求对寻呼信息进行安全保护。Optionally, the first information is used to indicate that the terminal device includes multiple USIM cards or to request security protection for paging information.
可选地,第一寻呼信息可以是需要发送给终端设备的寻呼信息,寻呼信息用于寻呼终端设备。或者说,第一寻呼信息可以是寻呼消息中需要发送给终端设备的信息(或寻呼信息)。Optionally, the first paging information may be paging information that needs to be sent to the terminal device, and the paging information is used to page the terminal device. In other words, the first paging information may be information (or paging information) in the paging message that needs to be sent to the terminal device.
比如,第一寻呼信息包括下述中的一项或多项:寻呼原因、寻呼辅助信息、用户标识、寻呼标识或接入类型。用户标识可以是UE ID,UE ID为该终端设备的标识。For example, the first paging information includes one or more of the following: paging reason, paging auxiliary information, user identification, paging identification, or access type. The user identification may be the UE ID, and the UE ID is the identification of the terminal device.
根据本申请提供的传输寻呼信息的方法,移动管理网元可以根据终端设备的指示,对寻呼消息中的寻呼信息(第一寻呼信息)进行安全保护,从而能够避免寻呼消息的泄露或者篡改,进而使得网络可以为终端设备提供正常的服务。According to the method for transmitting paging information provided by the present application, the mobility management network element can perform security protection on the paging information (first paging information) in the paging message according to the instructions of the terminal device, so as to prevent the paging message from being disturbed. Leaking or tampering, so that the network can provide normal services for terminal devices.
结合第二方面,在第二方面的某些实现方式中,该方法还可以包括:终端设备对进行安全保护后的第一寻呼信息进行解安全保护。With reference to the second aspect, in some implementation manners of the second aspect, the method may further include: the terminal device performs security protection on the first paging information after security protection.
应理解,解安全保护为安全保护的逆向操作。It should be understood that the solution of security protection is the reverse operation of security protection.
结合第二方面,在第二方面的某些实现方式中,所述安全保护包括下述中的一项或多项:加密、完整性保护或防重放保护。With reference to the second aspect, in some implementations of the second aspect, the security protection includes one or more of the following: encryption, integrity protection, or anti-replay protection.
第一寻呼信息可以包括下述中的一项或多项:需要加密的寻呼信息、需要完整性保护的寻呼信息、需要防重放保护的寻呼信息。The first paging information may include one or more of the following: paging information that needs to be encrypted, paging information that needs integrity protection, and paging information that needs anti-replay protection.
结合第二方面,在第二方面的某些实现方式中,所述第一寻呼信息通过NAS安全上下文进行安全保护。With reference to the second aspect, in some implementation manners of the second aspect, the first paging message is secured by a NAS security context.
通过采用NAS安全上下文对第一寻呼信息进行安全保护,能够避免终端设备和移动管理网元协商专门用于对第一寻呼信息进行安全保护的信息的操作,从而能够节省信令开销。By adopting the NAS security context to securely protect the first paging information, it is possible to prevent the terminal device and the mobility management network element from negotiating an operation dedicated to the security protection of the first paging information, thereby saving signaling overhead.
可选地,第一寻呼信息可以通过终端设备和移动管理网元的共享密钥、私钥或者公钥进行安全保护。Optionally, the first paging information may be securely protected by a shared key, private key, or public key of the terminal device and the mobility management network element.
结合第二方面,在第二方面的某些实现方式中,所述终端设备向移动管理网元发送第一信息,包括:终端设备向所述移动管理网元发送NAS消息,所述NAS消息包括所述第一信息。With reference to the second aspect, in some implementations of the second aspect, the terminal device sending the first information to the mobility management network element includes: the terminal device sends a NAS message to the mobility management network element, and the NAS message includes The first information.
可选地,所述NAS消息通过NAS安全上下文进行安全保护。Optionally, the NAS message is protected by a NAS security context.
通过对该NAS消息进行安全保护,有利于保证移动管理网元接收到的第一信息实际就是终端设备发送的,而不是经过篡改后的信息,这样有利于保证移动管理网元可以根据终端设备的实际需求,确定是否对第一寻呼信息进行安全保护。Through the security protection of the NAS message, it is helpful to ensure that the first information received by the mobility management network element is actually sent by the terminal device instead of tampered information. This helps to ensure that the mobility management network element can be based on the terminal device’s According to actual needs, determine whether to protect the first paging message.
第三方面,提供了一种传输寻呼信息的方法,包括:接入网设备接收第一信息;接入网设备在需要寻呼终端设备的情况下,根据第一信息,对第一寻呼信息进行安全保护;接入网设备向终端设备发送进行安全保护后的第一寻呼信息。In a third aspect, a method for transmitting paging information is provided, including: an access network device receives first information; when the access network device needs to page a terminal device, the first information is used to page the first information The information is protected by security; the access network device sends the first paging information after security protection to the terminal device.
应理解,需要寻呼终端设备的情况是指接入网设备接收到移动管理网元发送的寻呼消息。It should be understood that the situation where the terminal device needs to be paged refers to that the access network device receives the paging message sent by the mobility management network element.
可选地,第一信息用于指示终端设备包括多张全球用户标识模块(universal subscriber identity module,USIM)卡或者请求对寻呼信息进行安全保护。Optionally, the first information is used to indicate that the terminal device includes multiple universal subscriber identity module (Universal Subscriber Identity Module, USIM) cards or to request security protection for paging information.
寻呼消息中的信息都可以称为寻呼信息。可选地,第一寻呼信息可以包括需要发送给终端设备的部分或全部寻呼信息,寻呼信息用于寻呼终端设备。All the information in the paging message can be called paging information. Optionally, the first paging information may include part or all of the paging information that needs to be sent to the terminal device, and the paging information is used to page the terminal device.
比如,第一寻呼信息包括下述中的一项或多项:寻呼原因、寻呼辅助信息、用户标识、寻呼标识或接入类型。用户标识可以是UE ID,UE ID为该终端设备的标识。For example, the first paging information includes one or more of the following: paging reason, paging auxiliary information, user identification, paging identification, or access type. The user identification may be the UE ID, and the UE ID is the identification of the terminal device.
各寻呼信息的含义可以参照第一方面的描述,这里不再赘述。The meaning of each paging information can be referred to the description of the first aspect, which will not be repeated here.
根据本申请提供的传输寻呼信息的方法,接入网设备可以根据第一信息,对寻呼消息 中的寻呼信息(第一寻呼信息)进行安全保护,从而能够避免寻呼消息的泄露或者篡改,进而使得网络可以为终端设备提供正常的服务。According to the method for transmitting paging information provided by the present application, the access network device can perform security protection on the paging information (first paging information) in the paging message according to the first information, so as to avoid the leakage of the paging message Or tampering, so that the network can provide normal services for terminal devices.
结合第三方面,在第三方面的某些实现方式中,所述对第一寻呼信息进行安全保护,包括:对第一寻呼信息进行下述中的一项或多项操作:加密、完整性保护或防重放保护。With reference to the third aspect, in some implementations of the third aspect, the security protection of the first paging information includes: performing one or more of the following operations on the first paging information: encryption, Integrity protection or anti-replay protection.
第一寻呼信息可以包括下述中的一项或多项:需要加密的寻呼信息、需要完整性保护的寻呼信息、需要防重放保护的寻呼信息。The first paging information may include one or more of the following: paging information that needs to be encrypted, paging information that needs integrity protection, and paging information that needs anti-replay protection.
结合第三方面,在第三方面的某些实现方式中,第一寻呼信息可以通过AS安全上下文进行安全保护。With reference to the third aspect, in some implementations of the third aspect, the first paging message can be secured by the AS security context.
例如,可以使用AS安全上下文中的AS加密密钥和AS加密算法对第一寻呼信息中需要加密的寻呼信息进行加密;使用AS安全上下文中的AS完整性密钥和AS完整性保护算法第一寻呼信息中需要完整性保护的寻呼信息进行完整性保护;使用下行(downlink,DL)AS计数器(Count)对第一寻呼信息中需要防重放保护的寻呼信息进行防重放保护。For example, you can use the AS encryption key and AS encryption algorithm in the AS security context to encrypt the paging information that needs to be encrypted in the first paging message; use the AS integrity key and AS integrity protection algorithm in the AS security context The paging information that needs integrity protection in the first paging message is integrity protected; the downlink (DL) AS counter (Count) is used to prevent replay of the paging information that needs anti-replay protection in the first paging message.放保护。 Put protection.
再如,可以使用AS安全上下文中的AS完整性密钥和AS完整性保护算法对第一寻呼信息中需要加密后的寻呼信息先进行加密,得到加密后的寻呼信息。然后再对加密后的寻呼信息和第一寻呼信息中需要完整性保护的寻呼信息一起进行完整性保护。For another example, the AS integrity key and the AS integrity protection algorithm in the AS security context can be used to first encrypt the paging information that needs to be encrypted in the first paging message to obtain the encrypted paging information. Then, integrity protection is performed on the encrypted paging information and the paging information that needs integrity protection in the first paging information.
应理解,AS安全上下文中的AS加密密钥有时也称为RRC密钥,AS加密算法有时也称为RRC加密算法。类似地,AS安全上下文中的AS完整性密钥有时也称为无线资源控制(radio resource control,RRC)完整性密钥,AS完整性保护算法有时也称为RRC完整性保护算法。It should be understood that the AS encryption key in the AS security context is sometimes also called the RRC key, and the AS encryption algorithm is sometimes also called the RRC encryption algorithm. Similarly, the AS integrity key in the AS security context is sometimes referred to as a radio resource control (radio resource control, RRC) integrity key, and the AS integrity protection algorithm is sometimes also referred to as the RRC integrity protection algorithm.
通过采用AS安全上下文对第一寻呼信息进行安全保护,能够避免终端设备和接入网设备协商专门用于对第一寻呼信息进行安全保护的信息的操作,从而能够节省信令开销。By using the AS security context to securely protect the first paging information, it is possible to prevent the terminal device and the access network device from negotiating an operation dedicated to security protection of the first paging information, thereby saving signaling overhead.
可选地,第一寻呼信息可以通过终端设备和接入网设备的共享密钥、私钥或者公钥进行安全保护。Optionally, the first paging information may be securely protected by a shared key, private key, or public key of the terminal device and the access network device.
结合第三方面,在第三方面的某些实现方式中,所述接入网设备接收第一信息,包括:接入网设备接收来自终端设备或者移动管理网元的第一信息。With reference to the third aspect, in some implementation manners of the third aspect, the access network device receiving the first information includes: the access network device receiving the first information from a terminal device or a mobility management network element.
可选地,所述接入网设备接收来自终端设备的第一信息,包括:接入网设备接收来自终端设备的空口消息或者RRC消息,所述空口消息或者RRC消息包括所述第一信息。Optionally, that the access network device receives the first information from the terminal device includes: the access network device receives an air interface message or an RRC message from the terminal device, where the air interface message or the RRC message includes the first information.
进一步地,所述空口消息或者RRC消息通过AS安全上下文进行安全保护。Further, the air interface message or RRC message is protected by AS security context.
通过对该空口消息或者RRC消息进行安全保护,有利于保证接入网设备接收到的第一信息实际就是终端设备发送的,而不是经过篡改后的信息,这样有利于保证接入网设备可以根据终端设备的实际需求,确定是否对第一寻呼信息进行安全保护。The security protection of the air interface message or RRC message is helpful to ensure that the first information received by the access network device is actually sent by the terminal device, rather than the tampered information, which is helpful to ensure that the access network device can follow The actual demand of the terminal device determines whether to protect the first paging information.
可选地,所述接入网设备接收来自所述移动管理网元的所述第一信息,包括:接入网设备接收来自移动管理网元的N1接口消息,所述N1接口消息包括所述第一信息;或者,所述接入网设备接收来自所述移动管理网元的寻呼消息,所述寻呼消息包括所述第一信息。N1接口为移动管理网元和接入网设备之间的接口。Optionally, that the access network device receives the first information from the mobility management network element includes: the access network device receives an N1 interface message from the mobility management network element, where the N1 interface message includes the First information; or, the access network device receives a paging message from the mobility management network element, and the paging message includes the first information. The N1 interface is the interface between the mobility management network element and the access network device.
移动管理网元的第一信息可以是终端设备发送的。比如,终端设备可以通过AS消息向移动管理网元发送第一信息。进一步地,该AS消息可以通过AS安全上下文进行安全保护。通过对该AS消息进行安全保护,有利于保证移动管理网元接收到的第一信息实际就是终端设备发送的,而不是经过篡改后的信息,从而有利于保证接入网设备接收到的第 一信息实际就是终端设备发送的,进而有利于保证接入网设备可以根据终端设备的实际需求,确定是否对第一寻呼信息进行安全保护。The first information of the mobile management network element may be sent by the terminal device. For example, the terminal device may send the first information to the mobility management network element through the AS message. Further, the AS message can be secured by the AS security context. The security protection of the AS message is helpful to ensure that the first information received by the mobility management network element is actually sent by the terminal device, rather than the tampered information, thereby helping to ensure that the first information received by the access network device The information is actually sent by the terminal device, which in turn helps to ensure that the access network device can determine whether to protect the first paging information according to the actual needs of the terminal device.
第四方面,提供了一种传输寻呼信息的方法,包括:移动管理网元接收来自终端设备的第一信息;移动管理网元向接入网设备发送第一信息。In a fourth aspect, a method for transmitting paging information is provided, including: a mobility management network element receives first information from a terminal device; and the mobility management network element sends the first information to an access network device.
可选地,第一信息用于指示终端设备包括多张USIM卡或者请求对寻呼信息进行安全保护。Optionally, the first information is used to indicate that the terminal device includes multiple USIM cards or to request security protection for paging information.
根据本申请提供的传输寻呼信息的方法,移动管理网元通过向接入网设备发送第一信息,可以使得接入网设备根据第一信息对寻呼消息中的寻呼信息进行安全保护,从而能够避免寻呼消息的泄露或者篡改,进而使得网络可以为终端设备提供正常的服务。According to the method for transmitting paging information provided in this application, the mobility management network element sends the first information to the access network device, so that the access network device can securely protect the paging information in the paging message according to the first information. Therefore, leakage or tampering of paging messages can be avoided, and the network can provide normal services for terminal devices.
结合第四方面,在第四方面的某些实现方式中,所述移动管理网元接收来自终端设备的第一信息,包括:所述移动管理网元接收来自所述终端设备的AS消息,所述AS消息包括所述第一信息。With reference to the fourth aspect, in some implementations of the fourth aspect, the mobility management network element receiving the first information from the terminal device includes: the mobility management network element receiving the AS message from the terminal device, so The AS message includes the first information.
可选地,所述AS消息通过AS安全上下文进行安全保护。Optionally, the AS message is protected by AS security context.
结合第四方面,在第四方面的某些实现方式中,所述移动管理网元向接入网设备发送所述第一信息,包括:所述移动管理网元向接入网设备发送N1接口消息,所述N1接口消息包括所述第一信息;或者,所述移动管理网元向接入网设备发送寻呼消息,所述寻呼消息包括所述第一信息。With reference to the fourth aspect, in some implementations of the fourth aspect, the mobility management network element sending the first information to the access network device includes: the mobility management network element sending the N1 interface to the access network device Message, the N1 interface message includes the first information; or, the mobility management network element sends a paging message to the access network device, and the paging message includes the first information.
第五方面,提供了一种传输寻呼信息的方法,包括:终端设备向移动管理网元或接入网设备发送第一信息;所述终端设备接收来自接入网设备的进行安全保护后的第一寻呼信息。In a fifth aspect, a method for transmitting paging information is provided, which includes: a terminal device sends first information to a mobility management network element or an access network device; and the terminal device receives security protected information from the access network device. The first paging message.
可选地,第一信息用于指示终端设备包括多张USIM卡或者请求对寻呼信息进行安全保护。Optionally, the first information is used to indicate that the terminal device includes multiple USIM cards or to request security protection for paging information.
寻呼消息中的信息都可以称为寻呼信息。可选地,第一寻呼信息可以包括需要发送给终端设备的部分或全部寻呼信息,寻呼信息用于寻呼终端设备。All the information in the paging message can be called paging information. Optionally, the first paging information may include part or all of the paging information that needs to be sent to the terminal device, and the paging information is used to page the terminal device.
比如,第一寻呼信息包括下述中的一项或多项:寻呼原因、寻呼辅助信息、用户标识、寻呼标识或接入类型。用户标识可以是UE ID,UE ID为该终端设备的标识。For example, the first paging information includes one or more of the following: paging reason, paging auxiliary information, user identification, paging identification, or access type. The user identification may be the UE ID, and the UE ID is the identification of the terminal device.
各寻呼信息的含义可以参照第一方面的描述,这里不再赘述。The meaning of each paging information can be referred to the description of the first aspect, which will not be repeated here.
根据本申请提供的传输寻呼信息的方法,接入网设备可以根据第一信息,对寻呼消息中的寻呼信息(第一寻呼信息)进行安全保护,从而能够避免寻呼消息的泄露或者篡改,进而使得网络可以为终端设备提供正常的服务。According to the method for transmitting paging information provided by the present application, the access network device can perform security protection on the paging information (first paging information) in the paging message according to the first information, so as to avoid the leakage of the paging message Or tampering, so that the network can provide normal services for terminal devices.
结合第五方面,在第五方面的某些实现方式中,该方法还可以包括:终端设备对进行安全保护后的第一寻呼信息进行解安全保护。With reference to the fifth aspect, in some implementation manners of the fifth aspect, the method may further include: the terminal device performs security protection on the first paging information after security protection.
应理解,解安全保护为安全保护的逆向操作。It should be understood that the solution of security protection is the reverse operation of security protection.
结合第五方面,在第五方面的某些实现方式中,安全保护包括下述中的一项或多项:加密、完整性保护或防重放保护。With reference to the fifth aspect, in some implementations of the fifth aspect, the security protection includes one or more of the following: encryption, integrity protection, or anti-replay protection.
结合第五方面,在第五方面的某些实现方式中,所述终端设备向移动管理网元发送第一信息,包括:终端设备向移动管理网元发送AS消息,所述AS消息包括第一信息,所述AS消息通过AS安全上下文进行安全保护。With reference to the fifth aspect, in some implementations of the fifth aspect, the terminal device sending the first information to the mobility management network element includes: the terminal device sends an AS message to the mobility management network element, and the AS message includes the first Information, the AS message is protected by the AS security context.
通过采用AS安全上下文对第一寻呼信息进行安全保护,能够避免终端设备和接入网 设备协商专门用于对第一寻呼信息进行安全保护的信息的操作,从而能够节省信令开销。By adopting the AS security context to securely protect the first paging information, it is possible to prevent the terminal device and the access network device from negotiating an operation dedicated to security protection of the first paging information, thereby saving signaling overhead.
第六方面,提供了一种传输寻呼信息的方法,包括:移动管理网元向终端设备发送第一寻呼信息;移动管理网元接收来自终端设备的服务请求消息,该服务请求消息包括第二寻呼信息;移动管理网元根据第一寻呼信息,对第二寻呼信息进行校验。In a sixth aspect, a method for transmitting paging information is provided, including: a mobility management network element sends first paging information to a terminal device; the mobility management network element receives a service request message from the terminal device, and the service request message includes the first paging information. Second, paging information: the mobility management network element verifies the second paging information according to the first paging information.
可选地,第一寻呼信息包括下述中的一项或多项:寻呼原因、寻呼辅助信息、用户标识、寻呼标识或接入类型。第二寻呼信息包括下述中的一项或多项:寻呼原因、寻呼辅助信息、用户标识、寻呼标识或接入类型。Optionally, the first paging information includes one or more of the following: paging reason, paging assistance information, user identification, paging identification, or access type. The second paging information includes one or more of the following: paging reason, paging auxiliary information, user identification, paging identification, or access type.
结合第六方面,在第六方面的某些实现方式中,移动管理网元根据第一寻呼信息,对第二寻呼信息进行校验,包括:移动管理网元根据第一信息和第一寻呼信息,对第二寻呼信息进行校验。With reference to the sixth aspect, in some implementations of the sixth aspect, the mobility management network element checks the second paging information according to the first paging information, including: the mobility management network element checks the second paging information according to the first information and the first paging information. Paging information, to verify the second paging information.
示例性的,第一信息可以指示终端设备包括多张USIM卡或者请求对寻呼信息进行校验。Exemplarily, the first information may indicate that the terminal device includes multiple USIM cards or request verification of paging information.
可选地,该方法还可以包括:移动管理网元接收来自终端设备的第一信息。Optionally, the method may further include: the mobility management network element receives the first information from the terminal device.
可选地,第一信息通过NAS消息携带。进一步地,第一信息通过NAS安全上下文进行保护。Optionally, the first information is carried in a NAS message. Further, the first information is protected by the NAS security context.
可选地,服务请求消息包括第一信息。Optionally, the service request message includes the first information.
第七方面,提供了一种传输寻呼信息的方法,包括:终端设备接收第一寻呼信息;终端设备向移动管理网元发送服务请求消息,服务请求消息包括第二寻呼信息,第一寻呼信息用于移动管理网元对第二寻呼信息进行校验。In a seventh aspect, a method for transmitting paging information is provided, including: a terminal device receives first paging information; the terminal device sends a service request message to a mobility management network element, the service request message includes the second paging information, the first The paging information is used by the mobility management network element to verify the second paging information.
结合第七方面,在第七方面的某些实现方式中,该方法还包括:终端设备向移动管理网元发送第一信息。With reference to the seventh aspect, in some implementation manners of the seventh aspect, the method further includes: the terminal device sends the first information to the mobility management network element.
示例性的,第一信息可以指示终端设备包括多张USIM卡或者请求对寻呼信息进行校验。Exemplarily, the first information may indicate that the terminal device includes multiple USIM cards or request verification of paging information.
可选地,第一信息通过NAS消息携带。进一步地,第一信息通过NAS安全上下文进行保护。Optionally, the first information is carried in a NAS message. Further, the first information is protected by the NAS security context.
可选地,服务请求消息包括第一信息。Optionally, the service request message includes the first information.
第八方面,提供了一种通信装置,包括用于执行第一方面以及第一方面中任一种可能实现方式中的方法的各个模块或单元,或包括用于执行第四方面以及第四方面中任一种可能实现方式中的方法的各个模块或单元,或包括用于执行第六方面以及第六方面中任一种可能实现方式中的方法的各个模块或单元。In an eighth aspect, a communication device is provided, which includes modules or units for executing the methods in the first aspect and any one of the possible implementation manners of the first aspect, or includes modules or units for executing the fourth aspect and the fourth aspect Each module or unit of the method in any one of the possible implementation manners, or includes each module or unit used to execute the method in the sixth aspect and any one of the possible implementation manners of the sixth aspect.
第九方面,提供了一种通信装置,包括处理器。该处理器与存储器耦合,可用于执行存储器中的指令,以实现上述第一方面以及第一方面中任一种可能实现方式中的方法,或第四方面以及第四方面中任一种可能实现方式中的方法,或第六方面以及第六方面中任一种可能实现方式中的方法。可选地,该通信装置还可以包括存储器。可选地,该通信装置还包括通信接口,处理器与通信接口耦合。In a ninth aspect, a communication device is provided, including a processor. The processor is coupled with the memory and can be used to execute instructions in the memory to implement the method in any one of the first aspect and the first aspect, or the fourth aspect and the fourth aspect. The method in the manner, or the method in the sixth aspect and any one of the possible implementation manners of the sixth aspect. Optionally, the communication device may further include a memory. Optionally, the communication device further includes a communication interface, and the processor is coupled with the communication interface.
可选地,该通信接口为收发器,或,输入/输出接口。Optionally, the communication interface is a transceiver, or an input/output interface.
可选地,该收发器可以为收发电路。可选地,该输入/输出接口可以为输入/输出电路。Optionally, the transceiver may be a transceiver circuit. Optionally, the input/output interface may be an input/output circuit.
第十方面,提供了一种通信装置,包括用于执行第二方面以及第二方面中任一种可能实现方式中的方法的各个模块或单元,或包括用于执行第五方面以及第五方面中任一种可 能实现方式中的方法的各个模块或单元,或包括用于执行第七方面以及第七方面中任一种可能实现方式中的方法的各个模块或单元。In a tenth aspect, a communication device is provided, which includes modules or units for executing the methods in the second aspect and any one of the possible implementation manners of the second aspect, or includes modules or units for executing the fifth aspect and the fifth aspect Each module or unit of the method in any one of the possible implementation manners, or includes each module or unit used to execute the method in the seventh aspect and any one of the possible implementation manners of the seventh aspect.
第十一方面,提供了一种通信装置,包括处理器。该处理器与存储器耦合,可用于执行存储器中的指令,以实现上述第二方面以及第二方面中任一种可能实现方式中的方法,或第五方面以及第五方面中任一种可能实现方式中的方法,或执行第七方面以及第七方面中任一种可能实现方式中的方法。可选地,该通信装置还包括存储器。可选地,该通信装置还包括通信接口,处理器与通信接口耦合。In an eleventh aspect, a communication device is provided, including a processor. The processor is coupled with the memory, and can be used to execute instructions in the memory to implement the method in any one of the above-mentioned second aspect and the second aspect, or any one of the fifth aspect and the fifth aspect. Or implement the method in the seventh aspect and any one of the possible implementation manners of the seventh aspect. Optionally, the communication device further includes a memory. Optionally, the communication device further includes a communication interface, and the processor is coupled with the communication interface.
可选地,该通信接口为收发器,或,输入/输出接口。Optionally, the communication interface is a transceiver, or an input/output interface.
可选地,该收发器可以为收发电路。可选地,该输入/输出接口可以为输入/输出电路。Optionally, the transceiver may be a transceiver circuit. Optionally, the input/output interface may be an input/output circuit.
第十二方面,提供了一种通信装置,包括用于执行第三方面以及第三方面中任一种可能实现方式中的方法的各个模块或单元。In a twelfth aspect, a communication device is provided, which includes modules or units for executing the method in the third aspect and any one of the possible implementation manners of the third aspect.
第十三方面,提供了一种通信装置,包括处理器。该处理器与存储器耦合,可用于执行存储器中的指令,以实现上述第三方面以及第三方面中任一种可能实现方式中的方法。可选地,该通信装置还包括存储器。可选地,该通信装置还包括通信接口,处理器与通信接口耦合。In a thirteenth aspect, a communication device is provided, including a processor. The processor is coupled with the memory and can be used to execute instructions in the memory to implement the third aspect and the method in any one of the possible implementation manners of the third aspect. Optionally, the communication device further includes a memory. Optionally, the communication device further includes a communication interface, and the processor is coupled with the communication interface.
可选地,该通信接口为收发器,或,输入/输出接口。Optionally, the communication interface is a transceiver, or an input/output interface.
可选地,该收发器可以为收发电路。可选地,该输入/输出接口可以为输入/输出电路。Optionally, the transceiver may be a transceiver circuit. Optionally, the input/output interface may be an input/output circuit.
第十四方面,提供了一种处理器,包括:输入电路、输出电路和处理电路。该处理电路用于通过该输入电路接收信号,并通过该输出电路发射信号,使得该处理器执行第一方面以及第一方面中任一种可能实现方式中的方法,或执行第二方面以及第二方面中任一种可能实现方式中的方法,或执行第三方面以及第三方面中任一种可能实现方式中的方法,或执行第四方面以及第四方面中任一种可能实现方式中的方法,或执行第五方面以及第五方面中任一种可能实现方式中的方法,或执行第六方面以及第六方面中任一种可能实现方式中的方法,或执行第七方面以及第七方面中任一种可能实现方式中的方法。In a fourteenth aspect, a processor is provided, including: an input circuit, an output circuit, and a processing circuit. The processing circuit is used to receive signals through the input circuit and transmit signals through the output circuit, so that the processor executes the method in any one of the first aspect and the first aspect, or executes the second aspect and the first aspect. The method in any one of the possible implementation manners of the second aspect, or the method in the third aspect and any one of the possible implementation manners of the third aspect, or the implementation of the fourth aspect and any one of the possible implementation manners of the fourth aspect , Or execute the method in any one of the fifth aspect and the fifth aspect, or execute the method in any one of the sixth aspect and the sixth aspect, or execute the seventh aspect and the first The method in any one of the seven possible implementation modes.
在具体实现过程中,上述处理器可以为芯片,输入电路可以为输入管脚,输出电路可以为输出管脚,处理电路可以为晶体管、门电路、触发器和各种逻辑电路等。输入电路所接收的输入的信号可以是由例如但不限于接收器接收并输入的,输出电路所输出的信号可以是例如但不限于输出给发射器并由发射器发射的,且输入电路和输出电路可以是同一电路,该电路在不同的时刻分别用作输入电路和输出电路。本申请实施例对处理器及各种电路的具体实现方式不做限定。In the specific implementation process, the above-mentioned processor may be a chip, the input circuit may be an input pin, the output circuit may be an output pin, and the processing circuit may be a transistor, a gate circuit, a flip-flop, and various logic circuits. The input signal received by the input circuit may be received and input by, for example, but not limited to, a receiver, and the signal output by the output circuit may be, for example, but not limited to, output to the transmitter and transmitted by the transmitter, and the input circuit and output The circuit can be the same circuit, which is used as an input circuit and an output circuit at different times. The embodiments of the present application do not limit the specific implementation manners of the processor and various circuits.
第十五方面,提供了一种处理装置,包括处理器和存储器。该处理器用于读取存储器中存储的指令,并可通过接收器接收信号,通过发射器发射信号,以执行第一方面以及第一方面中任一种可能实现方式中的方法,或执行第二方面以及第二方面中任一种可能实现方式中的方法,或执行第三方面以及第三方面中任一种可能实现方式中的方法,或执行第四方面以及第四方面中任一种可能实现方式中的方法,或执行第五方面以及第五方面中任一种可能实现方式中的方法,或执行第六方面以及第六方面中任一种可能实现方式中的方法,或执行第七方面以及第七方面中任一种可能实现方式中的方法。In a fifteenth aspect, a processing device is provided, including a processor and a memory. The processor is used to read instructions stored in the memory, receive signals through a receiver, and transmit signals through a transmitter, so as to execute the method in the first aspect and any one of the possible implementations of the first aspect, or execute the second aspect. The method in any one of the possible implementation manners of the aspect and the second aspect, or the method in any one of the possible implementation manners of the third aspect and the third aspect, or the implementation of any one of the fourth aspect and the fourth aspect The method in the implementation manner, or the method in the fifth aspect and any one of the possible implementation manners of the fifth aspect, or the method in any one of the sixth aspect and the sixth aspect, or the seventh aspect Aspect and the method in any one of the possible implementation manners of the seventh aspect.
可选地,该处理器为一个或多个,该存储器为一个或多个。Optionally, there are one or more processors and one or more memories.
可选地,该存储器可以与该处理器集成在一起,或者该存储器与处理器分离设置。Optionally, the memory may be integrated with the processor, or the memory and the processor may be provided separately.
在具体实现过程中,存储器可以为非瞬时性(non-transitory)存储器,例如只读存储器(read only memory,ROM),其可以与处理器集成在同一块芯片上,也可以分别设置在不同的芯片上,本申请实施例对存储器的类型以及存储器与处理器的设置方式不做限定。In the specific implementation process, the memory can be a non-transitory (non-transitory) memory, such as a read only memory (ROM), which can be integrated with the processor on the same chip, or can be set in different On the chip, the embodiment of the present application does not limit the type of the memory and the setting mode of the memory and the processor.
应理解,相关信息交互过程可以为从处理器输出信息的过程,接收信息可以为处理器接收信息的过程。具体地,处理输出的信息可以输出给发射器,处理器接收的输入信息可以来自接收器。其中,发射器和接收器可以统称为收发器。It should be understood that the relevant information interaction process may be a process of outputting information from the processor, and receiving information may be a process of receiving information by the processor. Specifically, the information output by the processing may be output to the transmitter, and the input information received by the processor may come from the receiver. Among them, the transmitter and receiver can be collectively referred to as a transceiver.
上述第十五方面中的处理装置可以是一个芯片,该处理器可以通过硬件来实现也可以通过软件来实现,当通过硬件实现时,该处理器可以是逻辑电路、集成电路等;当通过软件来实现时,该处理器可以是一个通用处理器,通过读取存储器中存储的软件代码来实现,该存储器可以集成在处理器中,可以位于该处理器之外,独立存在。The processing device in the fifteenth aspect described above may be a chip, and the processor may be implemented by hardware or software. When implemented by hardware, the processor may be a logic circuit, an integrated circuit, etc.; when implemented by software When implemented, the processor may be a general-purpose processor, which is implemented by reading software codes stored in the memory. The memory may be integrated in the processor, may be located outside the processor, and exist independently.
第十六方面,提供了一种计算机程序产品,该计算机程序产品包括:计算机程序(也可以称为代码,或指令),当该计算机程序被运行时,使得计算机执行上述第一方面以及第一方面中任一种可能实现方式中的方法,或执行第二方面以及第二方面中任一种可能实现方式中的方法,或执行第三方面以及第三方面中任一种可能实现方式中的方法,或执行第四方面以及第四方面中任一种可能实现方式中的方法,或执行第五方面以及第五方面中任一种可能实现方式中的方法,或执行第六方面以及第六方面中任一种可能实现方式中的方法,或执行第七方面以及第七方面中任一种可能实现方式中的方法。In a sixteenth aspect, a computer program product is provided. The computer program product includes: a computer program (also called code, or instruction), which when the computer program is run, causes the computer to execute the first aspect and the first The method in any one of the possible implementation manners of the aspect, or the method in any one of the possible implementation manners of the second aspect and the second aspect, or the method in the third aspect and any one of the possible implementation manners of the third aspect Method, or execute the method in any one of the fourth aspect and the fourth aspect, or execute the method in any one of the fifth aspect and the fifth aspect, or execute the sixth aspect and the sixth aspect The method in any possible implementation manner of the aspect, or the method in any one of the seventh aspect and the seventh aspect may be implemented.
第十七方面,提供了一种计算机可读介质,该计算机可读介质存储有计算机程序(也可以称为代码,或指令)当其在计算机上运行时,使得计算机执行上述第一方面以及第一方面中任一种可能实现方式中的方法,或执行第二方面以及第二方面中任一种可能实现方式中的方法,或执行第三方面以及第三方面中任一种可能实现方式中的方法,或执行第四方面以及第四方面中任一种可能实现方式中的方法,或执行第五方面以及第五方面中任一种可能实现方式中的方法,或执行第六方面以及第六方面中任一种可能实现方式中的方法,或执行第七方面以及第七方面中任一种可能实现方式中的方法。In a seventeenth aspect, a computer-readable medium is provided, and the computer-readable medium stores a computer program (also called code, or instruction) when it runs on a computer, so that the computer executes the first aspect and the first aspect described above. The method in any one of the possible implementation manners on the one hand, or the method in any one of the possible implementation manners of the second aspect and the second aspect, or the implementation of the third aspect and any one of the possible implementation manners of the third aspect , Or implement the method in any one of the fourth aspect and the fourth aspect, or implement the method in any one of the fifth aspect and the fifth aspect, or implement the sixth aspect and the first The method in any one of the possible implementation manners of the six aspects, or the method in any one of the possible implementation manners of the seventh aspect and the seventh aspect is implemented.
第十八方面,提供了一种通信系统,包括前述的接入网设备、移动管理网元和终端设备中的至少两项。In an eighteenth aspect, a communication system is provided, including at least two of the aforementioned access network equipment, mobility management network elements, and terminal equipment.
附图说明Description of the drawings
图1是应用于本申请的一个系统架构示意图。Figure 1 is a schematic diagram of a system architecture applied to this application.
图2是包括多张USIM卡的UE进行通信的示意图。Figure 2 is a schematic diagram of a UE including multiple USIM cards communicating.
图3是本申请提供的一种传输寻呼信息的方法的示意性流程图。Fig. 3 is a schematic flowchart of a method for transmitting paging information provided by the present application.
图4是传输寻呼信息的方法的一个具体示例的流程图。Fig. 4 is a flowchart of a specific example of a method for transmitting paging information.
图5是传输寻呼信息的方法的另一具体示例的流程图。Fig. 5 is a flowchart of another specific example of a method of transmitting paging information.
图6是本申请提供的另一种传输寻呼信息的方法的示意性流程图。Fig. 6 is a schematic flowchart of another method for transmitting paging information provided by the present application.
图7是本申请提供的又一种传输寻呼信息的方法的示意性流程图。Fig. 7 is a schematic flowchart of another method for transmitting paging information provided by the present application.
图8是本申请提供的一种通信装置的示意性框图。Fig. 8 is a schematic block diagram of a communication device provided by the present application.
图9是本申请提供的一种网络设备的结构示意图。Fig. 9 is a schematic structural diagram of a network device provided by the present application.
图10是本申请提供的一种终端设备的结构示意图。Fig. 10 is a schematic structural diagram of a terminal device provided by the present application.
图11是本申请提供的一种接入网设备的结构示意图。Fig. 11 is a schematic structural diagram of an access network device provided by the present application.
具体实施方式Detailed ways
下面将结合附图,对本申请中的技术方案进行描述。The technical solution in this application will be described below in conjunction with the accompanying drawings.
本申请提供的技术方案可以应用于各种通信系统,例如:长期演进(long term evolution,LTE)系统、LTE频分双工(frequency division duplex,FDD)系统、LTE时分双工(time division duplex,TDD)、通用移动通信系统(universal mobile telecommunication system,UMTS)、全球互联微波接入(worldwide interoperability for microwave access,WiMAX)通信系统、第五代(5th generation,5G)系统或新无线(new radio,NR)等。The technical solution provided in this application can be applied to various communication systems, such as: long term evolution (LTE) system, LTE frequency division duplex (FDD) system, LTE time division duplex (time division duplex, TDD), universal mobile telecommunication system (UMTS), worldwide interoperability for microwave access (WiMAX) communication system, fifth generation (5G) system or new radio, NR) etc.
本申请所涉及的网元主要包括终端设备、接入网设备和移动管理网元。其中,接入网设备与终端设备之间通过无线空口连接,能够管理无线资源,为终端设备提供接入服务,进而完成控制信号和用户面数据在终端设备和核心网之间的转发。移动管理网元与接入网设备通过有线或者无线的方式连接,主要用于移动性管理和接入管理等。The network elements involved in this application mainly include terminal equipment, access network equipment, and mobility management network elements. Among them, the access network device and the terminal device are connected through a wireless air interface, which can manage wireless resources, provide access services for the terminal device, and then complete the forwarding of control signals and user plane data between the terminal device and the core network. The mobility management network element and the access network equipment are connected in a wired or wireless manner, and are mainly used for mobility management and access management.
终端设备可以是用户设备(user equipment,UE)、接入终端、用户单元、用户站、移动站、移动台、远方站、远程终端、移动设备、用户终端、终端、无线通信设备、用户代理或用户装置。本申请的实施例中的终端设备可以是手机(mobile phone)、平板电脑(pad)、带无线收发功能的电脑、虚拟现实(virtual reality,VR)终端设备、增强现实(augmented reality,AR)终端设备、工业控制(industrial control)中的无线终端、无人驾驶(self driving)中的无线终端、远程医疗(remote medical)中的无线终端、智能电网(smart grid)中的无线终端、运输安全(transportation safety)中的无线终端、智慧城市(smart city)中的无线终端、智慧家庭(smart home)中的无线终端等。A terminal device can be a user equipment (UE), an access terminal, a user unit, a user station, a mobile station, a mobile station, a remote station, a remote terminal, a mobile device, a user terminal, a terminal, a wireless communication device, a user agent, or User device. The terminal device in the embodiment of the present application may be a mobile phone (mobile phone), a tablet computer (pad), a computer with a wireless transceiver function, a virtual reality (VR) terminal device, and an augmented reality (AR) terminal Equipment, wireless terminals in industrial control, wireless terminals in self-driving, wireless terminals in remote medical, wireless terminals in smart grid, transportation safety ( Wireless terminals in transportation safety, wireless terminals in smart cities, and wireless terminals in smart homes.
接入网设备可以是演进型节点B(evolved Node B,eNB)、无线网络控制器(radio network controller,RNC)、节点B(Node B,NB)、基站控制器(base station controller,BSC)、基站收发台(base transceiver station,BTS)、家庭基站(home evolved NodeB,或home Node B,HNB)、基带单元(baseBand unit,BBU),无线保真(wireless fidelity,WIFI)系统中的接入点(access point,AP)、无线中继节点、无线回传节点、传输点(transmission point,TP)或者发送接收点(transmission and reception point,TRP)等。接入网设备还可以为5G,如,NR,系统中的gNB,或,传输点(TRP或TP),5G系统中的基站的一个或一组(包括多个天线面板)天线面板,或者,还可以为构成gNB或传输点的网络节点,如基带单元(BBU),或,分布式单元(distributed unit,DU)等。The access network equipment can be an evolved Node B (eNB), a radio network controller (RNC), a Node B (NB), a base station controller (BSC), Base transceiver station (base transceiver station, BTS), home base station (home evolved NodeB, or home Node B, HNB), baseband unit (baseband unit, BBU), wireless fidelity (wireless fidelity, WIFI) system access point (access point, AP), wireless relay node, wireless backhaul node, transmission point (transmission point, TP), or transmission and reception point (transmission and reception point, TRP), etc. The access network equipment can also be 5G, such as NR, gNB in the system, or transmission point (TRP or TP), one or a group (including multiple antenna panels) antenna panels of the base station in the 5G system, or, It may also be a network node that constitutes a gNB or a transmission point, such as a baseband unit (BBU), or a distributed unit (DU).
在一些部署中,gNB可以包括集中式单元(centralized unit,CU)和DU。gNB还可以包括有源天线单元(active antenna unit,AAU)。CU实现gNB的部分功能,DU实现gNB的部分功能。比如,CU负责处理非实时协议和服务,实现无线资源控制(radio resource control,RRC),分组数据汇聚层协议(packet data convergence protocol,PDCP)层的功能。DU负责处理物理层协议和实时服务,实现无线链路控制(radio link control,RLC)层、媒体接入控制(media access control,MAC)层和物理(physical,PHY)层的功能。AAU实现部分物理层处理功能、射频处理及有源天线的相关功能。由于RRC层的信息最终会变成PHY层的信息,或者,由PHY层的信息转变而来,因而,在这种架构下,高层信令,如RRC层信令,也可以认为是由DU发送的,或者,由DU+AAU发送的。可以理 解的是,网络设备可以为包括CU节点、DU节点、AAU节点中一项或多项的设备。此外,可以将CU划分为接入网(radio access network,RAN)中的网络设备,也可以将CU划分为核心网(core network,CN)中的网络设备,本申请对此不做限定。In some deployments, the gNB may include a centralized unit (CU) and a DU. The gNB may also include an active antenna unit (AAU). The CU implements some of the functions of the gNB, and the DU implements some of the functions of the gNB. For example, the CU is responsible for processing non-real-time protocols and services, and implements radio resource control (radio resource control, RRC) and packet data convergence protocol (packet data convergence protocol, PDCP) layer functions. The DU is responsible for processing the physical layer protocol and real-time services, and realizes the functions of the radio link control (RLC) layer, the media access control (MAC) layer, and the physical (PHY) layer. AAU realizes some physical layer processing functions, radio frequency processing and related functions of active antennas. Since the information of the RRC layer will eventually become the information of the PHY layer, or be transformed from the information of the PHY layer, under this architecture, high-level signaling, such as RRC layer signaling, can also be considered to be sent by the DU , Or, sent by DU+AAU. It can be understood that the network device may be a device including one or more of CU nodes, DU nodes, and AAU nodes. In addition, the CU can be divided into network equipment in an access network (radio access network, RAN), and the CU can also be divided into network equipment in a core network (core network, CN), which is not limited in this application.
移动管理网元可以是移动性管理功能(mobility management entity,MME)、具有MME功能的网元、接入和移动管理功能(access and mobility management function,AMF)、具有AMF功能的网元、非3GPP互通功能(Non-3GPP interworking function,N3IWF)或服务GPRS支持节点(Serving GPRS Support Node,SGSN)等。Mobility management network elements can be mobility management entities (MME), network elements with MME functions, access and mobility management functions (AMF), network elements with AMF functions, non-3GPP Interworking function (Non-3GPP interworking function, N3IWF) or Serving GPRS Support Node (Serving GPRS Support Node, SGSN), etc.
不同的网络系统中,网元命名可能有所不同。下文以5G网络中对网元的命名为例,来对本申请进行说明。In different network systems, the naming of network elements may be different. The following uses the naming of network elements in the 5G network as an example to illustrate this application.
首先,结合图1所示的5G网络架构示意图,对5G网络系统中涉及的主要网元进行简要说明。First, in conjunction with the schematic diagram of the 5G network architecture shown in FIG. 1, the main network elements involved in the 5G network system are briefly described.
1、用户设备(user equipment,UE)101:对应终端设备。1. User equipment (UE) 101: corresponding to terminal equipment.
2、(无线)接入网络(radio access network,(R)AN)网元102:在下文中简称为RAN,对应接入网设备。举例来说,RAN可以是NB,eNB,gNB,ng-eNB,或者其他任何接入网设备。2. (Radio access network, (R)AN) network element 102: hereinafter referred to as RAN for short, corresponding to access network equipment. For example, the RAN may be NB, eNB, gNB, ng-eNB, or any other access network equipment.
3、用户面功能(user plane function,UPF)103:用于分组路由和转发以及用户面数据的服务质量(quality of service,QoS)处理等。3. User plane function (UPF) 103: used for packet routing and forwarding and quality of service (QoS) processing of user plane data, etc.
4、数据网络(data network,DN)104:用于提供传输数据的网络。4. Data network (DN) 104: a network used to provide data transmission.
5、AMF 105:对应移动管理网元。5. AMF 105: Corresponding to mobile management network elements.
6、会话管理功能(session management function,SMF)106:主要用于会话管理、用户设备的网络互连协议(internet protocol,IP)地址分配和管理、选择可管理用户平面功能、策略控制和收费功能接口的终结点以及下行数据通知等。6. Session management function (SMF) 106: Mainly used for session management, user equipment Internet protocol (IP) address allocation and management, selection of manageable user plane functions, policy control and charging functions End point of the interface and notification of downlink data, etc.
7、策略控制功能(policy control function,PCF)107:用于指导网络行为的统一策略框架,为控制面功能网元(例如AMF,SMF等)提供策略规则信息等。7. Policy control function (PCF) 107: a unified policy framework used to guide network behavior, and provide policy rule information for control plane function network elements (such as AMF, SMF, etc.).
8、应用功能(application function,AF)108:用于进行应用影响的数据路由,接入网络开放功能网元,与策略框架交互进行策略控制等。8. Application function (AF) 108: used for data routing affected by applications, accessing network open function network elements, interacting with the policy framework for policy control, etc.
9、统一数据管理(unified data management,UDM)109:用于处理UE标识,接入鉴权,注册以及移动性管理等。9. Unified data management (UDM) 109: used to process UE identification, access authentication, registration, and mobility management.
10、统一数据存储(unified data repository,UDR)110:主要包括以下功能:签约数据、策略数据、应用数据等类型数据的存取功能。10. Unified data repository (UDR) 110: Mainly includes the following functions: access to contract data, policy data, application data and other types of data.
可以理解的是,上述网元或者功能既可以是硬件设备中的网络元件,也可以是在专用硬件上运行软件功能,或者是平台(例如,云平台)上实例化的虚拟化功能。It is understandable that the aforementioned network elements or functions may be network elements in hardware devices, software functions running on dedicated hardware, or virtualization functions instantiated on a platform (for example, a cloud platform).
应理解,在图1所示的网元之间的接口仅是示例,该示例并不应对本申请构成任何限定。It should be understood that the interface between the network elements shown in FIG. 1 is only an example, and this example should not constitute any limitation to this application.
还应理解,上述应用于本申请实施例的网络架构仅是一种举例说明,适用本申请实施例的网络架构并不局限于此,任何能够实现上述各个网元的功能的网络架构都适用于本申请实施例。It should also be understood that the foregoing network architecture applied to the embodiments of the present application is only an example, and the network architecture applicable to the embodiments of the present application is not limited to this. Any network architecture that can implement the functions of the foregoing network elements is applicable to Examples of this application.
当UE处于空闲态,即与RAN的空口连接已经释放时,若网络侧有下行数据需要发送到UE,则UPF通知SMF,然后SMF通知AMF,AMF向RAN发送寻呼消息。RAN 根据AMF发送的寻呼消息,向UE发送寻呼消息。UE收到寻呼消息后,根据寻呼消息中的寻呼信息,决定是否响应寻呼。When the UE is in an idle state, that is, the air interface connection with the RAN has been released, if there is downlink data to be sent to the UE on the network side, the UPF notifies the SMF, and then the SMF notifies the AMF, and the AMF sends a paging message to the RAN. The RAN sends a paging message to the UE according to the paging message sent by the AMF. After receiving the paging message, the UE decides whether to respond to the paging according to the paging information in the paging message.
以图2所示的场景为例,UE有多张USIM卡(以2张USIM卡为例),且各USIM卡有专属的国际移动设备识别码(international mobile equipment identity,IMEI)/永久设备标识(permanent equipment identifier,PEI),各USIM独立注册,各USIM归属于不同的公共陆地移动网(public land mobile network,PLMN)网络的场景下,当USIM1与PLMN1有正在进行的服务,USIM2处于空闲态时,若此时PLMN2向USIM2发起寻呼,则USIM2可以根据寻呼消息决定是否响应寻呼并与网络建立连接。比如,若寻呼消息中的寻呼原因(Paging Cause)代表高级别的移动终止服务(mobile terminated service,MT service),则USIM2决定响应寻呼,UE断开USIM1与PLMN1的连接。或者,若寻呼消息中的寻呼原因代表低级别的MT service,则USIM2拒绝寻呼,UE维持USIM1与PLMN1的连接。Take the scenario shown in Figure 2 as an example, the UE has multiple USIM cards (take 2 USIM cards as an example), and each USIM card has its own international mobile equipment identity (IMEI)/permanent equipment identity (permanent equipment identifier, PEI), each USIM is registered independently, and each USIM belongs to a different public land mobile network (PLMN) network, when USIM1 and PLMN1 have ongoing services, USIM2 is in idle state At this time, if PLMN2 initiates a paging to USIM2 at this time, USIM2 can decide whether to respond to the paging and establish a connection with the network according to the paging message. For example, if the paging cause (Paging Cause) in the paging message represents a high-level mobile terminated service (MT service), USIM2 decides to respond to the paging, and the UE disconnects the connection between USIM1 and PLMN1. Or, if the paging reason in the paging message represents a low-level MT service, the USIM2 rejects the paging, and the UE maintains the connection between USIM1 and PLMN1.
在寻呼消息的传输过程中,尤其是在空口传输过程中,寻呼消息中的寻呼信息可能被泄露或者篡改,从而可能导致网络无法为UE提供正常的服务。During the transmission of the paging message, especially during the air interface transmission, the paging information in the paging message may be leaked or tampered with, which may cause the network to fail to provide normal services for the UE.
以图2所示的场景为例,比如,攻击者可以篡改针对USIM2的寻呼消息中的寻呼原因和寻呼辅助信息(Assistance Data for Paging)等,比如将原本代表低级别MT service的寻呼原因改为高级别的,造成UE判断需要响应PLMN2的寻呼,从而使USIM1断开与PLMN1的连接,影响USIM1的正常业务,造成对USIM1的拒绝服务(Denial of Service,DoS)攻击。攻击者也可以篡改寻呼消息中的接入类型(Access Type),使得UE无法响应网络寻呼。Take the scenario shown in Figure 2 as an example. For example, an attacker can tamper with the paging reason and paging assistance information (Assistance Data for Paging) in the paging message for USIM2. The reason for the call is changed to a high level, causing the UE to determine that it needs to respond to the paging of PLMN2, thereby causing USIM1 to disconnect from PLMN1, affecting the normal business of USIM1, and causing a Denial of Service (DoS) attack on USIM1. The attacker can also tamper with the access type (Access Type) in the paging message, so that the UE cannot respond to the network paging.
有鉴于此,本申请提供了一种传输寻呼信息的方法,通过对寻呼消息中的寻呼信息进行安全保护,尤其是对空口传输的寻呼信息进行安全保护,能够避免寻呼消息的泄露或者篡改,从而使得网络可以为UE提供正常的服务。In view of this, this application provides a method for transmitting paging information. By protecting the paging information in the paging message, especially the paging information transmitted through the air interface, the paging information can be prevented from being damaged. Leaking or tampering, so that the network can provide normal services for the UE.
本申请提供的方法可以应用于场景一,也可以应用于场景二。The method provided in this application can be applied to scenario one or scenario two.
场景一:UE包括一张USIM卡,有下行数据需要传输,并且UE处于空闲态(idle)或非激活(inactive)态。Scenario 1: The UE includes a USIM card, there is downlink data to be transmitted, and the UE is in an idle or inactive state.
场景二:UE包括多张(即,大于或等于2)USIM卡,针对处于空闲态或非激活态的其中一张USIM卡有下行数据需要传输。可选地,该多张USIM卡中其中一张USIM卡与网络之间存在正在进行的业务。Scenario 2: The UE includes multiple (that is, greater than or equal to 2) USIM cards, and one of the USIM cards in the idle state or in the inactive state has downlink data to be transmitted. Optionally, there is an ongoing service between one of the multiple USIM cards and the network.
在场景二中,UE可以处于多收单发模式,但本申请并不限于此。多收单发模式是指,UE可以同时接受针对多张USIM的寻呼消息,但仅能针对一个USIM发送消息或者维持业务。若一个USIM卡与网络有业务,其他USIM卡应处于空闲态或非激活态。若网络针对空闲态或非激活态USIM卡发起寻呼,且该USIM卡决定响应寻呼时,正在进行业务的另一个USIM卡必须终断与网络的连接。In the second scenario, the UE may be in the multi-receiving and single-sending mode, but the application is not limited to this. The multi-receiving and single-sending mode means that the UE can receive paging messages for multiple USIMs at the same time, but can only send messages or maintain services for one USIM. If one USIM card has business with the network, the other USIM cards should be in idle or inactive state. If the network initiates a paging for a USIM card in an idle state or an inactive state, and the USIM card decides to respond to the paging, another USIM card in service must terminate the connection with the network.
需要说明的是,本文中的UE可以是一个装置,也可以是装置中的芯片。若UE为芯片,UE包括一张或多张USIM卡是指,包括该UE的装置包括一张或多张USIM卡。It should be noted that the UE in this article may be a device or a chip in the device. If the UE is a chip, the UE includes one or more USIM cards means that the device including the UE includes one or more USIM cards.
下面,将结合图3至图7,对本申请提供的传输寻呼信息的方法进行说明。应理解,各流程图中所示的步骤或操作并非要全部都执行,并且各流程图中的步骤或操作仅是示例,本申请实施例还可以执行其他操作或者相应操作的变形。Hereinafter, the method for transmitting paging information provided by the present application will be described with reference to FIG. 3 to FIG. 7. It should be understood that not all steps or operations shown in the flowcharts need to be executed, and the steps or operations in the flowcharts are only examples, and the embodiments of the present application may also perform other operations or modifications of corresponding operations.
在本文中,寻呼消息中的信息称为寻呼信息。比如,寻呼原因为寻呼信息,寻呼标识也是寻呼信息。In this article, the information in the paging message is called paging information. For example, the paging cause is paging information, and the paging identification is also paging information.
图3是本申请提供的一种传输寻呼信息的方法的示意性流程图。该方法300可以应用于UE或其中一张USIM卡处于空闲态或非激活态的场景。下面对该方法300中的各步骤进行说明。Fig. 3 is a schematic flowchart of a method for transmitting paging information provided by the present application. The method 300 can be applied to a scenario where the UE or one of the USIM cards is in an idle state or an inactive state. The steps in the method 300 are described below.
S301,网络有下行数据发送到UPF。S301: The network sends downlink data to the UPF.
S302,UPF通知SMF有下行数据需要传输。S302: The UPF notifies the SMF that there is downlink data to be transmitted.
S303,SMF通知AMF发起寻呼。S303: The SMF notifies the AMF to initiate paging.
AMF根据SMF的通知,可以确定需要寻呼UE或者需要发送寻呼消息。According to the SMF notification, the AMF can determine whether the UE needs to be paged or a paging message needs to be sent.
S304,AMF确定是否对第一寻呼信息进行安全保护。S304: The AMF determines whether to perform security protection on the first paging information.
其中,第一寻呼信息可以是需要发送给UE的部分或全部寻呼信息。比如,第一寻呼信息可以包括下述中的一项或多项:寻呼原因、寻呼辅助信息、用户标识、寻呼标识或接入类型。比如,寻呼原因可以表示当前发起寻呼的原因,或触发寻呼的MT service的级别等。寻呼辅助信息可以表示发起当前寻呼的其他相关信息,比如触发寻呼的业务类型等。用户标识(UE ID)用于唯一的标识用户,比如可以是用户永久标识(subscription permanent identifier,SUPI),或用户隐藏标识(subscription concealed identifier,SUCI),或国际移动用户识别码(international mobile subscriber identity,IMSI),或PEI等。寻呼标识可以表示当前网络需要寻呼的一个或多个用户的用户标识。接入类型可以表示UE接入技术的类型,比如3GPP接入,或Non-3GPP接入等。上述各参数的含义可以参见现有技术或相关标准。Wherein, the first paging information may be part or all of the paging information that needs to be sent to the UE. For example, the first paging information may include one or more of the following: paging reason, paging auxiliary information, user identification, paging identification, or access type. For example, the paging reason may indicate the reason why the paging is currently initiated, or the level of the MT service that triggers the paging, etc. The paging assistance information may indicate other related information for initiating the current paging, such as the type of service that triggers the paging. User ID (UE ID) is used to uniquely identify a user. For example, it can be a subscription permanent identifier (SUPI), a subscription concealed identifier (SUCI), or an international mobile subscriber identity (international mobile subscriber identity). , IMSI), or PEI, etc. The paging identifier may indicate the user identifier of one or more users who need to be paged in the current network. The access type may indicate the type of UE access technology, such as 3GPP access, or Non-3GPP access, and so on. For the meaning of the above parameters, please refer to the prior art or related standards.
第一寻呼信息也可以包括需要发送给RAN的寻呼信息,本申请对此不作限定。The first paging information may also include paging information that needs to be sent to the RAN, which is not limited in this application.
可选地,AMF可以根据安全保护指示信息,确定是否对第一寻呼信息进行安全保护。另外,AMF也可以对包括所述UE的任一UE的第一寻呼信息进行安全保护。或者,AMF可以根据本地配置,确定是否对所述UE的第一寻呼信息进行安全保护。比如,若本地配置为对任一UE的第一寻呼信息都进行安全保护,则AMF确定对所述UE的第一寻呼信息进行安全保护。Optionally, the AMF may determine whether to perform security protection on the first paging information according to the security protection instruction information. In addition, the AMF may also perform security protection on the first paging information of any UE including the UE. Alternatively, the AMF may determine whether to perform security protection on the first paging information of the UE according to the local configuration. For example, if the local configuration is to perform security protection on the first paging information of any UE, the AMF determines to perform security protection on the first paging information of the UE.
示例性的,安全保护指示信息可以指示UE是否包括多张USIM卡,或者,UE是否请求对第一寻呼信息进行安全保护。也就是说,安全保护指示信息要么指示UE包括多张USIM卡或UE请求对第一寻呼信息进行安全保护,要么指示UE仅包括一张USIM卡或者UE不请求对第一寻呼信息进行安全保护。若安全保护指示信息指示UE包括多张USIM卡或者UE请求对第一寻呼信息进行安全保护,该安全保护指示信息也可以称为第一信息。若AMF接收到第一信息,则AMF确定对第一寻呼信息进行安全保护。Exemplarily, the security protection indication information may indicate whether the UE includes multiple USIM cards, or whether the UE requests security protection for the first paging information. That is to say, the security protection indication information either indicates that the UE includes multiple USIM cards or that the UE requests security protection for the first paging information, or indicates that the UE includes only one USIM card or the UE does not request security for the first paging information. protect. If the security protection indication information indicates that the UE includes multiple USIM cards or the UE requests security protection for the first paging information, the security protection indication information may also be referred to as first information. If the AMF receives the first information, the AMF determines to perform security protection on the first paging information.
或者,安全保护指示信息的发送表示UE包括多张USIM卡,或者,UE请求对第一寻呼信息进行安全保护。即,若AMF接收到该安全保护指示信息,则AMF确定对第一寻呼信息进行安全保护;若AMF没有接收到安全保护指示信息,则AMF确定不对第一寻呼信息进行安全保护。在这里,安全保护指示信息也可以称为第一信息。Alternatively, the sending of the security protection indication information indicates that the UE includes multiple USIM cards, or the UE requests security protection for the first paging information. That is, if the AMF receives the security protection instruction information, the AMF determines to perform security protection on the first paging information; if the AMF does not receive the security protection instruction information, the AMF determines not to perform security protection on the first paging information. Here, the safety protection instruction information may also be referred to as first information.
综上,若AMF接收到第一信息,则AMF确定对第一寻呼信息进行安全保护。In summary, if the AMF receives the first information, the AMF determines to perform security protection on the first paging information.
可选地,安全保护指示信息可以是UE发送的,也可以是核心网侧的设备,例如SMF、PCF、UPF或者UDM发送的。Optionally, the security protection indication information may be sent by the UE, or may be sent by a device on the core network side, such as SMF, PCF, UPF, or UDM.
比如,UE可以在之前处于连接态时,先将安全保护指示信息发送给RAN,再由RAN发送给AMF。For example, the UE may first send the security protection indication information to the RAN when it is in the connected state before, and then the RAN sends it to the AMF.
又如,UE可以通过NAS消息向AMF发送安全保护指示信息。For another example, the UE may send security protection indication information to the AMF through a NAS message.
进一步地,安全保护指示信息可以通过NAS安全上下文进行安全保护,或者,安全保护指示信息可以通过使用NAS安全上下文进行安全保护的NAS消息携带。Further, the security protection instruction information may be secured by a NAS security context, or the security protection instruction information may be carried by a NAS message that uses the NAS security context for security protection.
NAS安全上下文是UE和网络之间完成认证流程之后,UE和AMF之间通过非接入层安全模式命令(NAS Security Mode Command,NAS SMC)流程产生的。其中,NAS安全上下文包括NAS加密密钥、NAS完整性密钥、NAS加密算法、NAS完整性保护算法以及上行(uplink,UL)/下行(downlink,DL)NAS计数器(Count)等信息。其中,NAS加密密钥和NAS加密算法用于加密(或称加密保护),NAS完整性密钥和NAS完整性保护算法用于完整性保护,DL NAS Count和UL NAS Count用于防重放保护。防重放是指防止消息或者信息被重复发送给接收端。UE和AMF上会维护NAS安全上下文,并激活NAS安全保护,后续UE和AMF之间交互的NAS消息或NAS消息中携带的信息(也可以称为信元)可以使用NAS安全上下文进行加密(也可以称为加密保护)、完整性保护、和/或防重放保护。The NAS security context is generated between the UE and the AMF through the non-access layer security mode command (NAS Security Mode Command, NAS SMC) process after the authentication process is completed between the UE and the network. The NAS security context includes information such as NAS encryption key, NAS integrity key, NAS encryption algorithm, NAS integrity protection algorithm, and uplink (UL)/downlink (DL) NAS counter (Count). Among them, NAS encryption key and NAS encryption algorithm are used for encryption (or encryption protection), NAS integrity key and NAS integrity protection algorithm are used for integrity protection, and DL NAS Count and UL NAS Count are used for anti-replay protection . Anti-replay refers to preventing messages or information from being repeatedly sent to the receiving end. The NAS security context is maintained on the UE and AMF, and NAS security protection is activated. Subsequent NAS messages or information contained in the NAS messages exchanged between the UE and AMF (also called information elements) can be encrypted using the NAS security context (also called information elements). It can be called encryption protection), integrity protection, and/or anti-replay protection.
下面,以使用NAS安全上下文对IE进行安全保护为例,进行举例说明。应理解,IE可以是任一NAS消息或NAS消息中的信元,例如可以是安全保护指示信息、第一寻呼信息等。In the following, using the NAS security context to protect the IE security as an example is used for illustration. It should be understood that the IE may be any NAS message or information element in the NAS message, for example, may be security protection indication information, first paging information, and so on.
比如,可以使用NAS安全上下文中的NAS加密密钥和NAS加密算法对IE进行加密。例如,计算IE’=Enc NAS(K NAS-Enc,IE),其中IE’为进行加密后的IE,Enc NAS为NAS加密算法,K NAS-Enc为NAS加密密钥。或者,可以使用NAS安全上下文中的NAS完整性密钥和NAS完整性保护算法对IE进行完整性保护。例如,计算MAC=Int NAS(K NAS-Int,IE),MAC为进行完整性保护后得到的消息认证码(message authentication code),Int NAS为NAS完整性保护算法,K NAS-Int为NAS完整性密钥。 For example, the NAS encryption key and NAS encryption algorithm in the NAS security context can be used to encrypt the IE. For example, calculate IE'=Enc NAS (K NAS-Enc , IE), where IE' is the encrypted IE, Enc NAS is the NAS encryption algorithm, and K NAS-Enc is the NAS encryption key. Alternatively, the NAS integrity key and the NAS integrity protection algorithm in the NAS security context can be used to perform integrity protection on the IE. For example, calculate MAC=Int NAS (K NAS-Int , IE), MAC is the message authentication code obtained after integrity protection, Int NAS is the NAS integrity protection algorithm, and K NAS-Int is the NAS integrity Sex key.
又如,可以使用NAS安全上下文中的NAS加密密钥、NAS加密算法以及DL NAS Count(或UL NAS Count)对IE同时进行加密和防重放保护。以下行为例,例如,计算IE’=Enc NAS(K NAS-Enc,IE,DL NAS Count),这里IE’为进行加密和防重放保护后的IE。或者,可以使用NAS安全上下文中的NAS完整性密钥、NAS完整性保护算法以及DL NAS Count(或UL NAS Count)对IE同时进行完整性保护和防重放保护。以下行为例,例如,计算MAC=Int NAS(K NAS-Int,IE,DL NAS Count),这里MAC为进行完整性保护和防重放保护后得到的消息认证码。 For another example, the NAS encryption key, NAS encryption algorithm, and DL NAS Count (or UL NAS Count) in the NAS security context can be used to simultaneously encrypt and anti-replay the IE. The following behavior examples, for example, calculate IE'=Enc NAS (K NAS-Enc , IE, DL NAS Count), where IE' is the IE after encryption and anti-replay protection. Alternatively, the NAS integrity key, the NAS integrity protection algorithm, and the DL NAS Count (or UL NAS Count) in the NAS security context can be used to simultaneously perform integrity protection and anti-replay protection on the IE. The following behavior example, for example, calculates MAC=Int NAS (K NAS-Int , IE, DL NAS Count), where MAC is the message authentication code obtained after integrity protection and anti-replay protection are performed.
再如,可以使用NAS安全上下文中的NAS完整性密钥、NAS完整性保护算法,对上述IE’进行完整性保护。例如,计算MAC=Int NAS(K NAS-Int,IE’,DL NAS Count),或者计算MAC=Int NAS(K NAS-Int,IE’)。 For another example, the NAS integrity key and the NAS integrity protection algorithm in the NAS security context can be used to perform integrity protection on the aforementioned IE'. For example, calculating MAC=Int NAS (K NAS-Int , IE', DL NAS Count), or calculating MAC=Int NAS (K NAS-Int , IE').
需要说明的是,本申请对NAS加密算法和NAS完整性保护算法具体为何种算法不作限定,比如可以是Hash,也可以是其他算法。It should be noted that this application does not limit the specific algorithm of the NAS encryption algorithm and the NAS integrity protection algorithm. For example, it can be a Hash or other algorithms.
可选地,上述UL/DL NAS Count可以替换为UE与AMF之间协商的其他计数器,比如长度更短的计数器。Optionally, the foregoing UL/DL NAS Count can be replaced with other counters negotiated between the UE and the AMF, such as a counter with a shorter length.
可选地,上述NAS安全密钥也可以替换为其他共享密钥。Optionally, the aforementioned NAS security key can also be replaced with another shared key.
共享密钥是UE和AMF协商共有的密钥,例如,可以使用UE和AMF都有的根密钥K,经过层层推演产生的一个专门用于保护安全保护指示信息的密钥;也可以使用UE和AMF已经协商共有的密钥,推演出一个专门用于保护安全保护指示信息的密钥K 1,比如根据K AMF推演出K 1。其中K AMF为认证流程之后UE和网络侧使用根密钥K推演得到的秘钥,此密钥保存在UE和AMF中,可用于推演NAS加密密钥和完整性密钥。 The shared key is a shared key negotiated by the UE and AMF. For example, you can use the root key K that both the UE and AMF have, and a key that is specifically used to protect the security protection indication information generated through layered deduction; it can also be used UE and the AMF has been negotiated shared key, a dedicated to deduce the key K to protect security instructions 1, for example, according to AMF deduce K K 1. K AMF is a secret key derived from the root key K by the UE and the network after the authentication process. This key is stored in the UE and AMF and can be used to derive the NAS encryption key and integrity key.
另外,安全保护指示信息也可以通过公钥或私钥进行安全保护。In addition, the security protection instruction information can also be securely protected by a public key or a private key.
公私和私钥是成对出现的,发送方用公钥对被保护内容计算一个签名,然后接收方用自己的私钥验证签名就是完整性保护;发送方用公钥对被保护内容进行加密,然后接收方用自己的私钥解密就是加密保护。The public and private keys appear in pairs. The sender uses the public key to calculate a signature for the protected content, and then the receiver uses its own private key to verify the signature is integrity protection; the sender uses the public key to encrypt the protected content. Then the receiver uses its own private key to decrypt it is encryption protection.
S305,AMF对第一寻呼信息进行安全保护。S305: The AMF performs security protection on the first paging information.
在S304中,若AMF确定对第一寻呼信息进行安全保护,则在S305中,AMF对第一寻呼信息进行安全保护。安全保护可以包括下述中的一项或多项:加密、完整性保护或防重放保护。也就是说,AMF可以对第一寻呼信息进行加密、完整性保护和/或防重放保护。In S304, if the AMF determines to perform security protection on the first paging information, then in S305, the AMF performs security protection on the first paging information. Security protection may include one or more of the following: encryption, integrity protection, or anti-replay protection. In other words, the AMF can perform encryption, integrity protection, and/or anti-replay protection on the first paging message.
示例性的,AMF可以通过NAS安全上下文对第一寻呼信息进行安全保护。Exemplarily, the AMF may perform security protection on the first paging information through the NAS security context.
比如,AMF可以使用NAS安全上下文中的NAS加密密钥和NAS加密算法对第一寻呼信息中需要加密的寻呼信息进行加密。又如,AMF可以使用NAS安全上下文中的NAS完整性密钥和NAS完整性保护算法对第一寻呼信息中需要完整性保护的寻呼信息进行完整性保护;或者,AMF可以使用NAS安全上下文中的NAS完整性密钥和NAS完整性保护算法对加密后的寻呼信息进行完整性保护。再如,AMF可以使用DL NAS Count对第一寻呼信息中需要防重放保护的寻呼信息进行防重放保护。具体如何使用NAS安全上下文中的信息进行相应地安全保护可以参照上文在步骤S304中的说明,这里不再赘述。For example, the AMF can use the NAS encryption key and the NAS encryption algorithm in the NAS security context to encrypt the paging message that needs to be encrypted in the first paging message. For another example, AMF can use the NAS integrity key in the NAS security context and the NAS integrity protection algorithm to perform integrity protection on the paging information that needs integrity protection in the first paging message; or, the AMF can use the NAS security context The NAS integrity key and NAS integrity protection algorithm in the NAS protect the integrity of the encrypted paging message. For another example, the AMF can use the DL NAS Count to perform anti-replay protection on the paging information that needs anti-replay protection in the first paging message. For details on how to use the information in the NAS security context for corresponding security protection, reference may be made to the description in step S304 above, which will not be repeated here.
示例性的,第一寻呼信息中可以仅包括需要加密的寻呼信息,也可以仅包括需要完整性保护的寻呼信息,也可以仅包括需要防重放保护的寻呼信息。或者,第一寻呼信息可以包括需要加密的寻呼信息、需要完整性保护的寻呼信息以及需要防重放保护的寻呼信息这三项中的任意两项或三项。应理解,第一寻呼信息中同一信息可能需要进行加密、完整性保护和防重放保护这三种操作中的其中两项或三项。Exemplarily, the first paging information may include only paging information that needs to be encrypted, or may only include paging information that needs integrity protection, or may only include paging information that needs anti-replay protection. Alternatively, the first paging information may include any two or three of the three items: paging information that needs to be encrypted, paging information that needs integrity protection, and paging information that needs anti-replay protection. It should be understood that the same information in the first paging message may require two or three of the three operations of encryption, integrity protection, and anti-replay protection.
本申请并不限定需要加密的寻呼信息、需要完整性保护的寻呼信息以及需要防重放保护的寻呼信息具体为哪个信息。This application does not limit the specific information of the paging information that needs to be encrypted, the paging information that needs integrity protection, and the paging information that needs anti-replay protection.
比如,需要加密的寻呼信息可以包括寻呼原因和/或寻呼辅助信息。以寻呼原因为例,寻呼原因可以包含在新定义的容器(Container)中,例如MUSIM_Container,或者在现有的NAS容器(NAS Container)中,具体不做限定。此处的容器可以用于通知UE该容器中的信息是被加密的。可选的,寻呼原因的数据结构中可以包含指示信息,用于指示该信元是被加密的,指示信息的具体形式不做限定。For example, the paging information that needs to be encrypted may include paging reason and/or paging auxiliary information. Taking the paging reason as an example, the paging reason may be included in a newly defined container (Container), such as MUSIM_Container, or in an existing NAS container (NAS Container), which is not specifically limited. The container here can be used to notify the UE that the information in the container is encrypted. Optionally, the data structure of the paging reason may include indication information, which is used to indicate that the cell is encrypted, and the specific form of the indication information is not limited.
应理解,寻呼原因和/或寻呼辅助信息等也可以不加密,仅做完整性保护。It should be understood that the paging reason and/or paging auxiliary information may also not be encrypted, and only integrity protection is done.
又如,需要完整性保护的寻呼信息可以包括寻呼标识和/或接入类型。For another example, the paging information that requires integrity protection may include a paging identifier and/or an access type.
可选地,AMF可以对加密后的寻呼信息和不需要加密的寻呼信息一起进行完整性保护。例如,以加密后的寻呼信息为加密后的寻呼原因Paging Cause’,不需要加密的寻呼信息为接入类型(Access Type)为例,AMF可以计算MAC-Paging=Int NAS(K NAS-Int,Paging Cause’,Access Type,DL NAS Count),其中,MAC-Paging为对加密后的寻呼信息和不 需要加密的寻呼信息一起进行完整性保护后得到的消息认证码,Int NAS为NAS完整性保护算法,K NAS-Int为NAS完整性密钥。 Optionally, the AMF may perform integrity protection on the encrypted paging information and the paging information that does not need to be encrypted. For example, taking the encrypted paging information as the encrypted paging cause Paging Cause' and the paging information that does not need to be encrypted as the access type (Access Type) as an example, AMF can calculate MAC-Paging=Int NAS (K NAS -Int , Paging Cause', Access Type, DL NAS Count), where MAC-Paging is the message authentication code obtained after integrity protection of the encrypted paging message and the paging message that does not need to be encrypted, Int NAS It is a NAS integrity protection algorithm, and K NAS-Int is a NAS integrity key.
可选地,上述DL NAS Count可以替换为UE与AMF之间协商的其他计数器,比如长度更短的计数器。Optionally, the aforementioned DL NAS Count can be replaced with other counters negotiated between the UE and the AMF, such as a counter with a shorter length.
可选地,上述NAS安全密钥也可以替换为其他共享密钥。Optionally, the aforementioned NAS security key can also be replaced with another shared key.
共享密钥是UE和AMF协商共有的密钥,例如,可以使用UE和AMF都有的根密钥K,经过层层推演产生的一个专门用于保护安全保护指示信息的密钥;也可以使用UE和AMF已经协商共有的密钥,推演出一个专门用于保护安全保护指示信息的密钥K paging,比如根据K AMF推演出K paging。其中K AMF为认证流程之后UE和网络侧使用根密钥K推演得到的秘钥,此密钥保存在UE和AMF中,可用于推演NAS加密密钥和完整性密钥。举例来说,UE可以根据根密钥K推演第一中间密钥(IK,CK),根据第一中间密钥以及服务网络标识推演第二中间密钥,根据第二中间密钥推演锚密钥Kseaf,根据Kseaf推演K AMF,根据K AMF推演K paging。举例来说,第二中间密钥可以使Kausf,还可以是IK’和CK’。举例来说,AMF和UE可以根据一个新鲜参数和K AMF推演K paging。举例来说,该新鲜参数可以是非接入层上行计数值或下行计数值,还可以是一个随机数。可选的,UE和AMF可以维护一个计数器,可以根据K AMF和计数器的值来推演K paging。每次使用该计数器的值之后,计数器加1。可选的,也可以是每次使用该计数器的值之前,计数器加1。 The shared key is a shared key negotiated by the UE and AMF. For example, you can use the root key K that both the UE and AMF have, and a key that is specifically used to protect the security protection indication information generated through layered deduction; it can also be used UE and the AMF has been negotiated shared key, to deduce a dedicated secure key K paging indication information protection, such as K AMF according to deduce K paging. K AMF is a secret key derived from the root key K by the UE and the network after the authentication process. This key is stored in the UE and AMF and can be used to derive the NAS encryption key and integrity key. For example, the UE may derive the first intermediate key (IK, CK) according to the root key K, derive the second intermediate key according to the first intermediate key and the service network identity, and derive the anchor key according to the second intermediate key. Kseaf derives K AMF according to Kseaf and K paging according to K AMF . For example, the second intermediate key can be Kausf, or IK' and CK'. For example, AMF and UE can derive K paging based on a fresh parameter and K AMF . For example, the freshness parameter may be a non-access stratum uplink count value or a downlink count value, or a random number. Optionally, the UE and the AMF can maintain a counter, and K paging can be deduced based on the value of the K AMF and the counter. Each time the value of the counter is used, the counter is incremented by 1. Optionally, the counter may be incremented by 1 each time the value of the counter is used.
另外,第一寻呼信息或第一寻呼信息中的部分信息也可以通过公钥或私钥进行安全保护。In addition, the first paging message or part of the information in the first paging message can also be protected by a public key or a private key.
应理解,这里的其他共享密钥、公钥或私钥和对安全指示信息进行安全保护的其他共享密钥、公钥或私钥可以相同,也可以不同,本申请对此不作限定。It should be understood that the other shared keys, public keys, or private keys and other shared keys, public keys, or private keys used to securely protect the security indication information may be the same or different, which is not limited in this application.
可选地,对仅发送给RAN的寻呼信息,例如,寻呼间隔(Paging DRX),跟踪区域标识列表(TAI List for Paging),寻呼优先级(Paging Priority),用于寻呼的UE无线能力(UE Radio Capability for Paging),寻呼起源(Paging Origin)等,AMF可以不进行安全保护,例如不进行加密。Optionally, for paging information that is only sent to the RAN, for example, paging interval (Paging DRX), tracking area identification list (TAI List for Paging), paging priority (Paging Priority), UE used for paging For radio capability (UE Radio Capability for Paging), paging origin (Paging Origin), etc., AMF may not perform security protection, such as encryption.
可选地,AMF确定对第一寻呼信息进行安全保护后,可以生成指示信息,该指示信息用于指示RAN调整寻呼频率,比如控制单次寻呼UE的数量,或者分批寻呼UE,以达到节省空口寻呼信道资源的目的。Optionally, after the AMF determines to protect the security of the first paging information, it may generate indication information, which is used to instruct the RAN to adjust the paging frequency, such as controlling the number of UEs that are paged at a time, or paging UEs in batches , In order to achieve the purpose of saving air interface paging channel resources.
S306,AMF向RAN发送寻呼消息。相应地,RAN接收寻呼消息。S306. The AMF sends a paging message to the RAN. Correspondingly, the RAN receives the paging message.
可选地,若AMF指示RAN调整寻呼频率,则在RAN接收到寻呼消息后,可以根据AMF的指示调整寻呼频率,比如控制单次寻呼UE的数量,或者分批寻呼UE等。Optionally, if the AMF instructs the RAN to adjust the paging frequency, after the RAN receives the paging message, the paging frequency can be adjusted according to the instructions of the AMF, such as controlling the number of UEs that are paged at a time, or paging UEs in batches, etc. .
S307,RAN向UE发送寻呼消息。相应地,UE接收寻呼消息。S307: The RAN sends a paging message to the UE. Accordingly, the UE receives the paging message.
为区分AMF和RAN发送的寻呼消息,可以将AMF发送给RAN的寻呼消息记作:第一寻呼消息;将RAN发送给UE的寻呼消息记作:第二寻呼消息。In order to distinguish the paging message sent by the AMF and the RAN, the paging message sent by the AMF to the RAN can be recorded as: the first paging message; the paging message sent by the RAN to the UE is recorded as the second paging message.
第一寻呼消息包括需要发送给RAN的寻呼信息和需要发送给UE的寻呼信息,第二寻呼消息可以包括需要发送给UE的寻呼信息。例如,若第一寻呼信息为需要发送给UE的寻呼信息,则第一寻呼消息和第二寻呼消息都包括进行安全保护后的第一寻呼信息。The first paging message includes paging information that needs to be sent to the RAN and paging information that needs to be sent to the UE, and the second paging message may include the paging information that needs to be sent to the UE. For example, if the first paging information is paging information that needs to be sent to the UE, both the first paging message and the second paging message include the first paging information after security protection.
S308,UE对接收到的第二寻呼消息进行解安全保护。S308: The UE performs security protection on the received second paging message.
例如,UE对需要加密的寻呼信息进行解密,对需要完整性保护的寻呼信息进行完整 性校验,对需要防重放保护的寻呼信息校验收到的计数器是否大于本地的计数器。UE进行解安全保护后,可以得到第一寻呼信息。For example, the UE decrypts the paging information that needs to be encrypted, performs integrity verification on the paging information that needs integrity protection, and verifies whether the received counter is greater than the local counter for the paging information that needs anti-replay protection. After the UE performs security protection, the first paging information can be obtained.
举例来说,若第二寻呼消息通过NAS安全上下文进行安全保护,则UE也通过NAS安全上下文进行解安全保护。For example, if the second paging message is secured by the NAS security context, the UE will also be desecured by the NAS security context.
例如,若AMF使用NAS安全上下文中的NAS加密密钥和NAS加密算法对需要加密的寻呼信息进行加密,则UE使用NAS安全上下文中的NAS加密密钥和NAS加密算法进行解密,得到加密之前的寻呼信息,例如寻呼原因。可选的,UE可以根据第二寻呼消息中的容器确定寻呼原因等信息是被加密的。可选的,UE可以根据寻呼原因数据结构中包含的指示信息,确定寻呼原因是被加密的。For example, if the AMF uses the NAS encryption key and NAS encryption algorithm in the NAS security context to encrypt the paging message that needs to be encrypted, the UE uses the NAS encryption key and NAS encryption algorithm in the NAS security context to decrypt the encryption. Paging information, such as paging reason. Optionally, the UE may determine that the information such as the paging reason is encrypted according to the container in the second paging message. Optionally, the UE may determine that the paging reason is encrypted according to the indication information contained in the paging reason data structure.
例如,若AMF使用NAS安全上下文中的NAS完整性密钥和NAS完整性保护算法对需要完整性保护的寻呼信息,则针对需要完整性保护的寻呼信息,UE使用NAS安全上下文中的NAS完整性密钥和NAS完整性保护算法校验完整性。For example, if the AMF uses the NAS integrity key in the NAS security context and the NAS integrity protection algorithm for paging messages that need integrity protection, for the paging messages that need integrity protection, the UE uses the NAS in the NAS security context. The integrity key and NAS integrity protection algorithm verify integrity.
可选的,若AMF对加密后的寻呼信息和不需加密的寻呼信息一起进行完整性保护,以加密后的寻呼信息为加密后的寻呼原因Paging Cause’,不需要加密的寻呼信息为接入类型(Access Type)为例,则AMF先计算MAC-Paging’=Int NAS(K NAS-Int,Paging Cause’,Access type,DL NAS Count),然后对比MAC-Paging’和前文描述的MAC-Paging,若一致则完整性校验通过,然后对加密的寻呼信息进行解密,得到加密之前的寻呼信息。 Optionally, if the AMF performs integrity protection on the encrypted paging message and the paging message that does not need to be encrypted, the encrypted paging message is used as the encrypted paging cause Paging Cause', and the encrypted paging message is not required. For example, if the call information is Access Type, the AMF first calculates MAC-Paging'=Int NAS (K NAS-Int , Paging Cause', Access type, DL NAS Count), and then compares MAC-Paging' with the previous text The described MAC-Paging, if they are consistent, the integrity check is passed, and then the encrypted paging message is decrypted to obtain the paging message before encryption.
应理解,S308是S305的逆向操作,本领域技术人员能够根据对S305的描述获知如何进行解安全保护,本申请不再详述。It should be understood that S308 is a reverse operation of S305, and those skilled in the art can learn how to perform security protection based on the description of S305, and this application will not elaborate on it.
S309,UE向AMF发送服务请求(Service Request)消息。S309. The UE sends a Service Request (Service Request) message to the AMF.
UE根据第二寻呼消息中的部分或全部寻呼信息,确定是否响应寻呼。比如,UE可以根据第一寻呼信息,确定是否响应寻呼。若确定响应寻呼,则UE向AMF发送服务请求(Service Request)消息。UE发送服务请求消息后的后续操作可以参考现有技术,本申请不再详述。另外,关于UE具体如何根据寻呼信息确定是否响应寻呼也可以参考现有技术,本申请不再详述。The UE determines whether to respond to paging according to part or all of the paging information in the second paging message. For example, the UE may determine whether to respond to paging according to the first paging information. If it is determined to respond to the paging, the UE sends a Service Request (Service Request) message to the AMF. The subsequent operations after the UE sends the service request message can refer to the prior art, which will not be described in detail in this application. In addition, regarding how the UE specifically determines whether to respond to paging according to the paging information, reference may also be made to the prior art, which will not be described in detail in this application.
综上,根据本申请提供的传输寻呼信息的方法,AMF通过对寻呼消息中的寻呼信息进行安全保护,能够避免寻呼消息的泄露或者篡改,从而使得网络可以为UE提供正常的服务。In summary, according to the method for transmitting paging information provided in this application, AMF can prevent the leakage or tampering of the paging message by protecting the paging information in the paging message, so that the network can provide normal services for the UE. .
上文在S304步骤描述了AMF可以根据安全保护指示信息确定是否对第一寻呼信息进行安全保护,并且描述了安全保护指示信息可以由UE发送。为使AMF准确确定是否对第一寻呼信息进行安全保护,需要保证AMF接收的安全保护指示信息与UE发送的安全保护指示信息一致。下面结合图4和图5,对如何保证AMF确定是否对第一寻呼信息进行安全保护时所依据的安全保护指示信息与UE发送的安全保护指示信息一致,进行说明。The above step S304 described that the AMF can determine whether to perform security protection on the first paging information according to the security protection indication information, and described that the security protection indication information may be sent by the UE. In order for the AMF to accurately determine whether to perform security protection on the first paging information, it is necessary to ensure that the security protection instruction information received by the AMF is consistent with the security protection instruction information sent by the UE. The following describes how to ensure that the security protection instruction information on which the AMF determines whether to perform security protection on the first paging message is consistent with the security protection instruction information sent by the UE in conjunction with FIG. 4 and FIG. 5.
图4是本申请提供的一种传输寻呼信息的方法的示意性流程图。该方法400是方法300的一个具体示例。Fig. 4 is a schematic flowchart of a method for transmitting paging information provided by the present application. The method 400 is a specific example of the method 300.
S401,UE向AMF发送初始NAS消息,初始NAS消息包括安全保护指示信息。相应地,AMF接收初始NAS消息。S401: The UE sends an initial NAS message to the AMF, where the initial NAS message includes safety protection indication information. Accordingly, the AMF receives the initial NAS message.
初始NAS消息可以是注册请求消息或者其他NAS消息,需要说明的是这里的初始NAS消息并未进行安全保护。安全保护指示信息可以包含于初始NAS消息中的UE能力 信元中,或者,单独作为新增信元包含于初始NAS消息中。The initial NAS message may be a registration request message or other NAS messages. It should be noted that the initial NAS message here is not secured. The security protection indication information may be included in the UE capability cell in the initial NAS message, or may be included in the initial NAS message as a new cell alone.
S402,AMF保存安全保护指示信息。S402: The AMF saves the safety protection instruction information.
S403,UE与网络之间执行认证流程。S403: Perform an authentication process between the UE and the network.
认证流程可以参见现有技术。The certification process can refer to the prior art.
S404,AMF向UE发送第二NAS消息,第二NAS消息包括AMF接收到的安全保护指示信息。相应地,UE接收第二NAS消息。S404: The AMF sends a second NAS message to the UE, where the second NAS message includes the security protection indication information received by the AMF. Correspondingly, the UE receives the second NAS message.
该安全保护指示信息可以包含于第二NAS消息中的UE能力信元中,或者单独作为新增信元包含于第二NAS消息中。The security protection indication information may be included in the UE capability information element in the second NAS message, or may be included in the second NAS message as a new information element alone.
可选地,第二NAS消息可以通过NAS安全上下文进行安全保护,如加密、完整性保护和/或防重放保护,具体如何通过NAS安全上下文对第二NAS消息进行安全保护,可以参考上文对使用NAS安全上下文对IE或第一寻呼信息进行安全保护的描述,这里不再赘述Optionally, the second NAS message can be protected by the NAS security context, such as encryption, integrity protection and/or anti-replay protection. For details on how to protect the second NAS message by the NAS security context, please refer to the above The description of using the NAS security context to protect the IE or the first paging message will not be repeated here.
类似地,NAS安全上下文中的UL/DL NAS Count也可以替换为UE与AMF之间协商的其他计数器,比如长度更短的计数器。或者,NAS安全上下文中的NAS安全密钥也可以替换为其他共享密钥。Similarly, the UL/DL NAS Count in the NAS security context can also be replaced with other counters negotiated between the UE and the AMF, such as a counter with a shorter length. Alternatively, the NAS security key in the NAS security context can also be replaced with other shared keys.
可选地,第二NAS消息也可以通过公钥或者私钥进行安全保护。Optionally, the second NAS message may also be securely protected by a public key or a private key.
可选地,第二NAS消息可以是NAS安全模式命令(NAS Security Mode Command)。Optionally, the second NAS message may be a NAS Security Mode Command (NAS Security Mode Command).
S405,UE对第二NAS消息进行解安全保护,如解密和/或完整性校验,获得第二NAS消息中的安全保护指示信息。S405: The UE performs de-security protection on the second NAS message, such as decryption and/or integrity check, to obtain the security protection indication information in the second NAS message.
S406,UE向AMF发送第一NAS消息。相应地,AMF接收第一NAS消息。S406: The UE sends a first NAS message to the AMF. Correspondingly, the AMF receives the first NAS message.
该安全保护指示信息可以包含于第一NAS消息中的UE能力信元中,或者单独作为新增信元包含于第一NAS消息中。The security protection indication information may be included in the UE capability information element in the first NAS message, or may be included in the first NAS message as a new information element alone.
可选地,第一NAS消息可以通过NAS安全上下文进行安全保护,如加密、完整性保护和/或防重放保护,具体如何通过NAS安全上下文对第一NAS消息进行安全保护,可以参考上文对使用NAS安全上下文对IE或第一寻呼信息进行安全保护的描述,这里不再赘述Optionally, the first NAS message may be protected by the NAS security context, such as encryption, integrity protection and/or anti-replay protection. For details on how to protect the first NAS message by the NAS security context, please refer to the above The description of using the NAS security context to protect the IE or the first paging message will not be repeated here.
类似地,NAS安全上下文中的UL/DL NAS Count也可以替换为UE与AMF之间协商的其他计数器,比如长度更短的计数器。或者,NAS安全上下文中的NAS安全密钥也可以替换为其他共享密钥。Similarly, the UL/DL NAS Count in the NAS security context can also be replaced with other counters negotiated between the UE and the AMF, such as a counter with a shorter length. Alternatively, the NAS security key in the NAS security context can also be replaced with other shared keys.
可选地,第一NAS消息也可以通过公钥或者私钥进行安全保护。Optionally, the first NAS message may also be securely protected by a public key or a private key.
可选地,第一NAS消息可以是NAS安全模式完成(NAS Security Mode Complete)消息。Optionally, the first NAS message may be a NAS Security Mode Complete (NAS Security Mode Complete) message.
S407,AMF对第一NAS消息进行解安全保护,获得并保存(或更新)安全保护指示信息。S407: The AMF performs security protection on the first NAS message, and obtains and saves (or updates) security protection instruction information.
一种实现方式,在S405步骤中,UE还可以确定从第二NAS消息中得到的安全保护指示信息是否与UE在S401步骤中发送的安全保护指示信息相同。In an implementation manner, in step S405, the UE may also determine whether the security protection instruction information obtained from the second NAS message is the same as the security protection instruction information sent by the UE in step S401.
若第二NAS消息中的安全保护指示信息与UE在S401步骤中发送的安全保护指示信息相同,则可以不执行S406和S407步骤。在S411步骤中,AMF可以根据在S402步骤中保存的安全保护指示信息,确定是否对第一寻呼信息进行安全保护。If the security protection indication information in the second NAS message is the same as the security protection indication information sent by the UE in step S401, steps S406 and S407 may not be performed. In step S411, the AMF may determine whether to perform security protection on the first paging message according to the security protection instruction information stored in step S402.
若UE确定接收到的安全保护指示信息与其发送的安全保护指示信息不同,则在S406步骤中,UE在第一NAS消息携带S401步骤中的安全保护指示信息。在S411步骤中,AMF可以根据第一NAS消息中的安全保护指示信息,确定是否对第一寻呼信息进行安全保护。If the UE determines that the received security protection instruction information is different from the security protection instruction information sent, in step S406, the UE carries the security protection instruction information in step S401 in the first NAS message. In step S411, the AMF may determine whether to perform security protection on the first paging information according to the security protection indication information in the first NAS message.
另一种实现方式,在S405步骤中,UE不判断从第二NAS消息中得到的安全保护指示信息是否与UE在S401步骤中发送的安全保护指示信息相同,即,无论UE接收到的安全保护指示信息是否与其发送的安全保护指示信息相同,在S406步骤中,UE都在第一NAS消息携带S401步骤中的安全保护指示信息。在S411步骤中,AMF可以根据第一NAS消息中的安全保护指示信息,确定是否对第一寻呼信息进行安全保护。In another implementation manner, in step S405, the UE does not determine whether the security protection indication information obtained from the second NAS message is the same as the security protection indication information sent by the UE in step S401, that is, regardless of the security protection received by the UE Whether the indication information is the same as the security protection indication information sent by it, in step S406, the UE carries the security protection indication information in step S401 in the first NAS message. In step S411, the AMF may determine whether to perform security protection on the first paging information according to the security protection indication information in the first NAS message.
S408~S410,与S301~S303相同,即网络有下行数据发送到UPF,UPF通知SMF有下行数据需要传输,SMF通知AMF发起寻呼。S408 to S410 are the same as S301 to S303, that is, the network has downlink data to send to the UPF, the UPF informs the SMF that there is downlink data to be transmitted, and the SMF informs the AMF to initiate paging.
S411,AMF确定是否对第一寻呼信息进行安全保护。S411: The AMF determines whether to perform security protection on the first paging message.
具体如何确定是否对第一寻呼信息进行安全保护已在描述步骤S405至S407时进行了说明,此处不再赘述。How to determine whether to perform security protection on the first paging information has been explained when describing steps S405 to S407, and will not be repeated here.
S412~S416,与S305~S309相同,可以参考S305~S309。S412~S416 are the same as S305~S309, you can refer to S305~S309.
综上,根据本申请提供的传输寻呼信息的方法,有利于保证AMF接收的安全保护指示信息与UE发送的安全保护指示信息一致,从而有利于AMF可以根据UE的实际需求,准确确定是否对第一寻呼信息进行安全保护。In summary, the method for transmitting paging information provided in this application helps ensure that the security protection indication information received by the AMF is consistent with the security protection indication information sent by the UE, so that the AMF can accurately determine whether it is correct according to the actual needs of the UE. The first paging message is secured.
图5是本申请提供的一种传输寻呼信息的方法的示意性流程图。该方法500是方法300的另一个具体示例。Fig. 5 is a schematic flowchart of a method for transmitting paging information provided by the present application. The method 500 is another specific example of the method 300.
S501,UE向AMF发送第一NAS消息,第一NAS消息包括安全保护指示信息。相应地,AMF接收第一NAS消息。S501: The UE sends a first NAS message to the AMF, where the first NAS message includes security protection indication information. Correspondingly, the AMF receives the first NAS message.
第一NAS消息可以是进行安全保护后的第一NAS消息,比如可以是进行加密和完整性保护后的第一NAS消息。The first NAS message may be the first NAS message after security protection, for example, it may be the first NAS message after encryption and integrity protection are performed.
具体如何对第一NAS消息进行安全保护,可以参见S406。For details on how to protect the security of the first NAS message, refer to S406.
可选地,第一NAS消息可以是NAS安全模式完成(NAS Security Mode Complete)消息。Optionally, the first NAS message may be a NAS Security Mode Complete (NAS Security Mode Complete) message.
S502,AMF对第一NAS消息进行解安全保护,如解密和完整性校验,获得并保存安全保护指示信息。S502: The AMF performs de-security protection on the first NAS message, such as decryption and integrity verification, and obtains and saves security protection instruction information.
S503~S505,与S301~S303相同,即网络有下行数据发送到UPF,UPF通知SMF有下行数据需要传输,SMF通知AMF发起寻呼。S503 to S505 are the same as S301 to S303, that is, the network has downlink data to send to the UPF, the UPF informs the SMF that there is downlink data to be transmitted, and the SMF informs the AMF to initiate paging.
S506,AMF确定是否对第一寻呼信息进行安全保护。该步骤可以参考S304。S506: The AMF determines whether to perform security protection on the first paging message. Refer to S304 for this step.
S507~S511,与S305~S309相同,可以参考S305~S309。S507~S511 are the same as S305~S309, you can refer to S305~S309.
综上,根据本申请提供的传输寻呼信息的方法,通过对携带安全保护指示信息的第一NAS消息进行安全保护,有利于保证AMF接收的安全保护指示信息与UE发送的安全保护指示信息一致,从而有利于AMF可以根据UE的实际需求,准确确定是否对第一寻呼信息进行安全保护。In summary, according to the method for transmitting paging information provided in this application, by performing security protection on the first NAS message carrying security protection instruction information, it is beneficial to ensure that the security protection instruction information received by the AMF is consistent with the security protection instruction information sent by the UE. Therefore, it is beneficial for the AMF to accurately determine whether to perform security protection for the first paging information according to the actual needs of the UE.
图6是本申请提供的一种传输寻呼信息的方法的示意性流程图。该方法600可以应用于UE或其中一张USIM卡处于非激活态的场景。下面对该方法600中的各步骤进行说明。Fig. 6 is a schematic flowchart of a method for transmitting paging information provided by the present application. The method 600 can be applied to a scenario where the UE or one of the USIM cards is in an inactive state. The steps in the method 600 are described below.
S601~S603,与S301~S303相同,即网络有下行数据发送到UPF,UPF通知SMF有下行数据需要传输,SMF通知AMF发起寻呼。S601 to S603 are the same as S301 to S303, that is, the network has downlink data to send to the UPF, the UPF informs the SMF that there is downlink data to be transmitted, and the SMF informs the AMF to initiate paging.
S604,AMF向RAN发送寻呼消息。相应地,RAN接收寻呼消息。S604: The AMF sends a paging message to the RAN. Correspondingly, the RAN receives the paging message.
为区分AMF和RAN发送的寻呼消息,可以将AMF发送给RAN的寻呼消息记作:第一寻呼消息;将RAN发送给UE的寻呼消息记作:第二寻呼消息。In order to distinguish the paging message sent by the AMF and the RAN, the paging message sent by the AMF to the RAN can be recorded as: the first paging message; the paging message sent by the RAN to the UE is recorded as the second paging message.
第一寻呼消息与现有技术中的寻呼消息相同,这里不再详述。第一寻呼消息可以包括第一寻呼信息。The first paging message is the same as the paging message in the prior art, and will not be described in detail here. The first paging message may include first paging information.
S605,RAN确定是否对第一寻呼信息进行安全保护。S605: The RAN determines whether to perform security protection on the first paging information.
其中,第一寻呼信息可以是需要发送给UE的部分或全部寻呼信息。比如,第一寻呼信息可以包括下述中的一项或多项:寻呼原因、寻呼辅助信息、用户标识、寻呼标识或接入类型。Wherein, the first paging information may be part or all of the paging information that needs to be sent to the UE. For example, the first paging information may include one or more of the following: paging reason, paging auxiliary information, user identification, paging identification, or access type.
可选地,RAN可以根据安全保护指示信息,确定是否对第一寻呼信息进行安全保护。另外,RAN也可以对包括所述UE的任一UE的第一寻呼信息进行安全保护。或者,RAN可以根据本地配置,确定是否对所述UE的第一寻呼信息进行安全保护。比如,若本地配置为对任一UE的第一寻呼信息都进行安全保护,则RAN确定对所述UE的第一寻呼信息进行安全保护。Optionally, the RAN may determine whether to perform security protection on the first paging information according to the security protection indication information. In addition, the RAN may also perform security protection on the first paging information of any UE including the UE. Alternatively, the RAN may determine whether to perform security protection on the first paging information of the UE according to the local configuration. For example, if the local configuration is to perform security protection on the first paging information of any UE, the RAN determines to perform security protection on the first paging information of the UE.
示例性的,安全保护指示信息可以指示UE是否包括多张USIM卡,或者,UE是否请求对第一寻呼信息进行安全保护。也就是说,安全保护指示信息要么指示UE包括多张USIM卡或UE请求对第一寻呼信息进行安全保护,要么指示UE仅包括一张USIM卡或者UE不请求对第一寻呼信息进行安全保护。若安全保护指示信息指示UE包括多张USIM卡或者UE请求对第一寻呼信息进行安全保护,该安全保护指示信息也可以称为第一信息。若RAN接收到第一信息,则RAN确定对第一寻呼信息进行安全保护。Exemplarily, the security protection indication information may indicate whether the UE includes multiple USIM cards, or whether the UE requests security protection for the first paging information. That is to say, the security protection indication information either indicates that the UE includes multiple USIM cards or that the UE requests security protection for the first paging information, or indicates that the UE includes only one USIM card or the UE does not request security for the first paging information. protect. If the security protection indication information indicates that the UE includes multiple USIM cards or the UE requests security protection for the first paging information, the security protection indication information may also be referred to as first information. If the RAN receives the first information, the RAN determines to perform security protection on the first paging information.
又如,安全保护指示信息的发送表示UE包括多张USIM卡,或者,UE请求对第一寻呼信息进行安全保护。即,若RAN接收到该安全保护指示信息,则RAN确定对第一寻呼信息进行安全保护;若RAN没有接收到该安全保护指示信息,则RAN确定不对第一寻呼信息进行安全保护。在这里,安全保护指示信息也可以称为第一信息。For another example, the sending of the security protection indication information indicates that the UE includes multiple USIM cards, or the UE requests security protection for the first paging information. That is, if the RAN receives the security protection instruction information, the RAN determines to perform security protection on the first paging information; if the RAN does not receive the security protection instruction information, the RAN determines not to perform security protection on the first paging information. Here, the safety protection instruction information may also be referred to as first information.
综上,若RAN接收到第一信息,则RAN确定对第一寻呼信息进行安全保护。In summary, if the RAN receives the first information, the RAN determines to perform security protection on the first paging information.
可选地,安全保护指示信息可以是UE发送的。比如,UE可以通过空口消息或者RRC消息,向RAN发送安全保护指示信息。Optionally, the security protection indication information may be sent by the UE. For example, the UE may send security protection indication information to the RAN through an air interface message or an RRC message.
可选地,该空口消息或者RRC消息可以通过AS安全上下文进行安全保护。例如,该空口消息或者RRC消息可以是AS安全模式完成(AS Security Mode Complete)消息,其中AS安全模式完成消息通过AS安全上下文进行安全保护。Optionally, the air interface message or the RRC message may be secured by the AS security context. For example, the air interface message or the RRC message may be an AS Security Mode Complete (AS Security Mode Complete) message, where the AS Security Mode Complete message is secured by the AS security context.
AS安全上下文是UE和网络之间完成认证流程,以及UE和AMF之间完成非接入层安全模式命令(NAS Security Mode Command,NAS SMC)流程之后,UE和RAN之间通过接入层安全模式命令(AS Security Mode Command,AS SMC)流程产生的。其中,AS安全上下文包括AS加密密钥和AS完整性密钥、AS加密算法、AS完整性保护算法以及上行(uplink,UL)/下行(downlink,DL)AS计数器(Count)等信息。其中,AS加密密钥和AS加密算法用于加密(或称加密保护),AS完整性密钥和AS完整性保护算法用于完整性保护,DL AS Count和UL AS Count用于防重放保护。防重放是指防止消息或者 信息被的重复发送给接收端。UE和RAN上会维护AS安全上下文,并激活AS安全保护,后续UE和RAN之间交互的AS消息或AS消息中携带的信息(也可以称为信元)可以使用AS安全上下文进行加密(也可以称为加密保护)、完整性保护和/或防重放保护。AS security context is the completion of the authentication process between the UE and the network, and the completion of the non-access layer security mode command (NAS Security Mode Command, NAS SMC) process between the UE and AMF, and the access layer security mode between the UE and the RAN The command (AS Security Mode Command, AS SMC) process is generated. Among them, the AS security context includes information such as the AS encryption key and the AS integrity key, the AS encryption algorithm, the AS integrity protection algorithm, and the uplink (UL)/downlink (DL) AS counter (Count). Among them, AS encryption key and AS encryption algorithm are used for encryption (or encryption protection), AS integrity key and AS integrity protection algorithm are used for integrity protection, and DL AS Count and UL AS Count are used for anti-replay protection . Anti-replay refers to preventing messages or information from being repeatedly sent to the receiving end. The AS security context is maintained on the UE and the RAN, and AS security protection is activated. The AS messages or information contained in the AS messages (also called information elements) exchanged between the UE and the RAN can be encrypted using the AS security context (also called information elements). It can be called encryption protection), integrity protection and/or anti-replay protection.
下面,以使用AS安全上下文对IE进行安全保护为例,进行举例说明。应理解,IE可以是任一AS消息或AS消息中的信元,例如可以是安全保护指示信息、第一寻呼信息等。Below, take the use of AS security context to protect IE as an example to illustrate. It should be understood that the IE may be any AS message or information element in the AS message, for example, it may be security protection indication information, first paging information, and so on.
比如,可以使用AS安全上下文中的AS加密密钥和AS加密算法对IE进行加密。例如,计算IE’=Enc AS(K AS-Enc,IE),其中IE’为进行加密后的IE,Enc AS为AS加密算法,K AS-Enc为AS加密密钥。或者,可以使用AS安全上下文中的AS完整性密钥和AS完整性保护算法对IE进行完整性保护。例如,计算MAC=Int AS(K AS-Int,IE),MAC为进行完整性保护后得到的消息认证码(message authentication code),Int AS为AS完整性保护算法,K AS-Int为AS完整性密钥。 For example, the AS encryption key and AS encryption algorithm in the AS security context can be used to encrypt the IE. For example, calculate IE'=Enc AS (K AS-Enc , IE), where IE' is the encrypted IE, Enc AS is the AS encryption algorithm, and K AS-Enc is the AS encryption key. Alternatively, the AS integrity key and the AS integrity protection algorithm in the AS security context can be used to protect the integrity of the IE. For example, calculate MAC=Int AS (K AS-Int , IE), MAC is the message authentication code obtained after integrity protection, Int AS is the AS integrity protection algorithm, and K AS-Int is the AS integrity Sex key.
又如,可以使用AS安全上下文中的AS加密密钥、AS加密算法以及DL AS Count(或UL AS Count)对IE同时进行加密和防重放保护。以下行为例,例如,计算IE’=Enc AS(K AS-Enc,IE,DL AS Count),这里IE’为进行加密和防重放保护后的IE。或者,可以使用AS安全上下文中的AS完整性密钥、AS完整性保护算法以及DL AS Count(或UL AS Count)对IE同时进行完整性保护和防重放保护。以下行为例,例如,计算MAC=Int AS(K AS-Int,IE,DL AS Count),这里MAC为进行完整性保护和防重放保护后得到的消息认证码。 For another example, the AS encryption key, AS encryption algorithm, and DL AS Count (or UL AS Count) in the AS security context can be used to simultaneously encrypt and anti-replay the IE. The following behavior examples, for example, calculate IE'=Enc AS (K AS-Enc , IE, DL AS Count), where IE' is the IE after encryption and anti-replay protection. Alternatively, the AS integrity key, AS integrity protection algorithm, and DL AS Count (or UL AS Count) in the AS security context can be used to simultaneously perform integrity protection and anti-replay protection on the IE. The following behavior example, for example, calculates MAC=Int AS (K AS-Int , IE, DL AS Count), where MAC is the message authentication code obtained after integrity protection and anti-replay protection are performed.
再如,可以使用AS安全上下文中的AS完整性密钥、AS完整性保护算法,对上述IE’进行完整性保护。例如,计算MAC=Int AS(K AS-Int,IE’,DL AS Count),或者计算MAC=Int AS(K AS-Int,IE’)。 For another example, the AS integrity key and AS integrity protection algorithm in the AS security context can be used to protect the integrity of the above-mentioned IE'. For example, calculating MAC=Int AS (K AS-Int , IE', DL AS Count), or calculating MAC=Int AS (K AS-Int , IE').
需要说明的是,本申请对AS加密算法和AS完整性保护算法具体为何种算法不作限定,比如可以是Hash,也可以是其他算法。It should be noted that this application does not limit the specific algorithm of the AS encryption algorithm and the AS integrity protection algorithm. For example, it can be a Hash or other algorithms.
可选地,上述UL/DL AS Count可以替换为UE与RAN之间协商的其他计数器,比如长度更短的计数器。Optionally, the foregoing UL/DL AS Count can be replaced with other counters negotiated between the UE and the RAN, such as a counter with a shorter length.
可选地,上述AS安全密钥也可以替换为其他共享密钥。Optionally, the aforementioned AS security key can also be replaced with another shared key.
共享密钥是UE和RAN协商共有的密钥,例如,可以使用UE和RAN都有的根密钥K,经过层层推演产生的一个专门用于保护安全保护指示信息的密钥;也可以使用UE和RAN已经协商共有的密钥,推演出一个专门用于保护安全保护指示信息的密钥K 1,比如根据K RAN推演出K 1。其中K RAN为认证流程之后UE和RAN由K AMF推演得到的秘钥,此密钥保存在UE和RAN中,可用于推演AS加密密钥和完整性密钥。 The shared key is a shared key negotiated between the UE and the RAN. For example, you can use the root key K that both the UE and RAN have, and a key that is specifically used to protect the security protection indication information generated through layered deduction; it can also be used UE and the RAN has been negotiated shared key, a dedicated to deduce the key K to protect security instructions 1, for example, according to RAN deduce K K 1. K RAN is the secret key deduced by K AMF by the UE and RAN after the authentication process. This key is stored in the UE and RAN and can be used to derive the AS encryption key and integrity key.
另外,安全保护指示信息也可以通过公钥或私钥进行安全保护。In addition, the security protection instruction information can also be securely protected by a public key or a private key.
公私和私钥是成对出现的,发送方用公钥对被保护内容计算一个签名,然后接收方用自己的私钥验证签名就是完整性保护;发送方用公钥对被保护内容进行加密,然后接收方用自己的私钥解密就是加密保护。The public and private keys appear in pairs. The sender uses the public key to calculate a signature for the protected content, and then the receiver uses its own private key to verify the signature is integrity protection; the sender uses the public key to encrypt the protected content. Then the receiver uses its own private key to decrypt it is encryption protection.
可选地,安全保护指示信息也可以是AMF发送的。比如,AMF可以通过N1接口消息或第一寻呼消息,向RAN发送安全保护指示信息。示例性的,N1接口消息可以是初始上下文建立(initial context setup)消息。示例性的,在安全保护指示信息为第一信息的情 况下,AMF才向RAN发送安全保护指示信息。Optionally, the security protection instruction information may also be sent by the AMF. For example, the AMF can send security protection indication information to the RAN through the N1 interface message or the first paging message. Exemplarily, the N1 interface message may be an initial context setup (initial context setup) message. Exemplarily, only when the security protection instruction information is the first information, the AMF sends the security protection instruction information to the RAN.
可选地,AMF发送的安全保护指示信息可以来自UE,也可以来自核心网侧,例如SMF、PCF、UPF或者UDM。关于UE发送安全保护指示信息的方式可以参见上文在步骤S304中的说明,以及方法400和500中相关步骤的说明,这里不再赘述。Optionally, the security protection indication information sent by the AMF may come from the UE or the core network side, such as SMF, PCF, UPF, or UDM. Regarding the manner in which the UE sends the security protection indication information, please refer to the description in step S304 above and the description of related steps in the methods 400 and 500, which will not be repeated here.
S606,RAN对第一寻呼信息进行安全保护。S606: The RAN performs security protection on the first paging information.
在S605中,若RAN确定对第一寻呼信息进行安全保护,则在S606中,RAN对第一寻呼信息进行安全保护。安全保护可以包括下述中的一项或多项:加密、完整性保护或防重放保护。也就是说,RAN可以对第一寻呼信息进行加密、完整性保护和/或防重放保护。In S605, if the RAN determines to perform security protection on the first paging information, then in S606, the RAN performs security protection on the first paging information. Security protection may include one or more of the following: encryption, integrity protection, or anti-replay protection. In other words, the RAN may perform encryption, integrity protection, and/or anti-replay protection on the first paging message.
一种方式中,RAN可以通过AS安全上下文对第一寻呼信息进行安全保护。In one manner, the RAN may perform security protection on the first paging information through the AS security context.
比如,RAN可以使用AS安全上下文中的AS加密密钥和AS加密算法对第一寻呼信息中需要加密的寻呼信息进行加密。又如,RAN可以使用AS安全上下文中的AS完整性密钥和AS完整性保护算法对第一寻呼信息中需要完整性保护的寻呼信息进行完整性保护;或者,RAN可以使用AS安全上下文中的AS完整性密钥和AS完整性保护算法对加密后的寻呼信息进行完整性保护。再如,RAN可以使用DL AS Count对第一寻呼信息中需要防重放保护的寻呼信息进行防重放保护。具体如何使用AS安全上下文中的信息进行安全保护可以参见步骤S605中的说明。或者,使用AS安全上下文中的信息进行安全保护与使用NAS安全上下文中的信息进行安全保护类似,可以参照上文在步骤S304中的说明,这里不再详述。For example, the RAN may use the AS encryption key and the AS encryption algorithm in the AS security context to encrypt the paging message that needs to be encrypted in the first paging message. For another example, the RAN may use the AS integrity key and the AS integrity protection algorithm in the AS security context to perform integrity protection on the paging information that needs integrity protection in the first paging message; or, the RAN may use the AS security context The AS integrity key and AS integrity protection algorithm in the Integrity protection algorithm protect the integrity of the encrypted paging message. For another example, the RAN can use the DL AS Count to perform anti-replay protection on the paging information that needs anti-replay protection in the first paging information. For details on how to use the information in the AS security context for security protection, please refer to the description in step S605. Alternatively, using the information in the AS security context for security protection is similar to using the information in the NAS security context for security protection, and reference may be made to the above description in step S304, which will not be described in detail here.
示例性的,第一寻呼信息中可以仅包括需要加密的寻呼信息,也可以仅包括需要完整性保护的寻呼信息,也可以仅包括需要防重放保护的寻呼信息。或者,第一寻呼信息可以包括需要加密的寻呼信息、需要完整性保护的寻呼信息以及需要防重放保护的寻呼信息这三项中的任意两项或三项。应理解,第一寻呼信息中同一信息可能需要进行加密、完整性保护和防重放保护这三种操作中的其中两项或三项。Exemplarily, the first paging information may include only paging information that needs to be encrypted, or may only include paging information that needs integrity protection, or may only include paging information that needs anti-replay protection. Alternatively, the first paging information may include any two or three of the three items: paging information that needs to be encrypted, paging information that needs integrity protection, and paging information that needs anti-replay protection. It should be understood that the same information in the first paging message may require two or three of the three operations of encryption, integrity protection, and anti-replay protection.
本申请并不限定需要加密的寻呼信息、需要完整性保护的寻呼信息以及需要防重放保护的寻呼信息具体为哪个信息。This application does not limit the specific information of the paging information that needs to be encrypted, the paging information that needs integrity protection, and the paging information that needs anti-replay protection.
比如,需要加密的寻呼信息可以包括寻呼原因和/或寻呼辅助信息。以寻呼原因为例,寻呼原因可以包含在新定义的容器(Container)中,例如MUSIM_Container,或者在现有的AS容器(AS Container)中,具体不做限定。此处的容器可以用于通知UE该容器中的信息是被加密的。可选的,寻呼原因的数据结构中可以包含指示信息,用于指示该信元是被加密的,指示信息的具体形式不做限定。For example, the paging information that needs to be encrypted may include paging reason and/or paging auxiliary information. Taking the paging reason as an example, the paging reason may be included in a newly defined container (Container), such as MUSIM_Container, or in an existing AS container (AS Container), which is not specifically limited. The container here can be used to notify the UE that the information in the container is encrypted. Optionally, the data structure of the paging reason may include indication information, which is used to indicate that the cell is encrypted, and the specific form of the indication information is not limited.
应理解,寻呼原因和/或寻呼辅助信息等也可以不加密,仅做完整性保护。It should be understood that the paging reason and/or paging auxiliary information may also not be encrypted, and only integrity protection is done.
又如,需要完整性保护的寻呼信息可以包括对寻呼标识和/或接入类型。For another example, the paging information requiring integrity protection may include a paging identification and/or access type.
可选地,RAN可以对加密后的寻呼信息和不需要加密的寻呼信息一起进行完整性保护。例如,以加密后的寻呼信息为加密后的寻呼原因Paging Cause’,不需要加密的寻呼信息为接入类型(Access Type)为例,RAN可以计算MAC-Paging=Int AS(K AS-Int,Paging Cause’,Access Type,DL AS Count),其中,MAC-Paging为对加密后的寻呼信息和不需要加密的寻呼信息一起进行完整性保护后得到的消息认证码,Int AS为AS完整性保护算法,K AS-Int为AS完整性密钥。 Optionally, the RAN may perform integrity protection on the encrypted paging information and the paging information that does not need to be encrypted. For example, taking the encrypted paging information as the encrypted paging cause Paging Cause' and the paging information that does not need to be encrypted as the access type (Access Type) as an example, the RAN can calculate MAC-Paging=Int AS (K AS -Int , Paging Cause', Access Type, DL AS Count), where MAC-Paging is the message authentication code obtained after integrity protection of the encrypted paging message and the paging message that does not need to be encrypted, Int AS It is the AS integrity protection algorithm, and K AS-Int is the AS integrity key.
可选地,上述DL AS Count可以替换为UE与RAN之间协商的其他计数器,比如长 度更短的计数器。Optionally, the aforementioned DL AS Count can be replaced with other counters negotiated between the UE and the RAN, such as a counter with a shorter length.
可选地,上述AS安全密钥也可以替换为其他共享密钥。Optionally, the aforementioned AS security key can also be replaced with another shared key.
共享密钥是UE和RAN协商共有的密钥,例如,可以使用UE和RAN都有的根密钥K,经过层层推演产生的一个专门用于保护安全保护指示信息的密钥;也可以使用UE和RAN已经协商共有的密钥,推演出一个专门用于保护安全保护指示信息的密钥K paging,比如根据K RAN推演出K paging。其中K RAN为认证流程之后UE和RAN由K AMF推演得到的秘钥,此密钥保存在UE和RAN中,可用于推演AS加密密钥和完整性密钥。 The shared key is a shared key negotiated between the UE and the RAN. For example, you can use the root key K that both the UE and RAN have, and a key that is specifically used to protect the security protection indication information generated through layered deduction; it can also be used UE and the RAN has been negotiated shared key, to deduce a dedicated secure key K paging indication information protection, such as K RAN according to deduce K paging. K RAN is the secret key deduced by K AMF by the UE and RAN after the authentication process. This key is stored in the UE and RAN and can be used to derive the AS encryption key and integrity key.
另外,第一寻呼信息或第一寻呼信息中的部分信息也可以通过公钥或私钥进行安全保护。In addition, the first paging message or part of the information in the first paging message can also be protected by a public key or a private key.
应理解,这里的其他共享密钥、公钥或私钥和对安全指示信息进行安全保护的其他共享密钥、公钥或私钥可以相同,也可以不同,本申请对此不作限定。It should be understood that the other shared keys, public keys, or private keys and other shared keys, public keys, or private keys used to securely protect the security indication information may be the same or different, which is not limited in this application.
可选地,RAN可以根据安全保护指示信息调整寻呼频率,比如控制单次寻呼UE的数量,或者分批寻呼UE,以达到节省空口寻呼信道资源的目的。Optionally, the RAN may adjust the paging frequency according to the safety protection indication information, such as controlling the number of UEs that are paged at a time, or paging the UEs in batches, so as to save air interface paging channel resources.
应理解,AS安全上下文中的AS加密密钥有时也称为RRC密钥,AS加密算法有时也称为RRC加密算法。类似地,AS安全上下文中的AS完整性密钥有时也称为RRC完整性密钥,AS完整性保护算法有时也称为RRC完整性保护算法。It should be understood that the AS encryption key in the AS security context is sometimes also called the RRC key, and the AS encryption algorithm is sometimes also called the RRC encryption algorithm. Similarly, the AS integrity key in the AS security context is sometimes called the RRC integrity key, and the AS integrity protection algorithm is sometimes called the RRC integrity protection algorithm.
S607,RAN向UE发送第二寻呼消息,第二寻呼消息包括进行安全保护后的第一寻呼信息。相应地,UE接收第二寻呼消息。S607: The RAN sends a second paging message to the UE, where the second paging message includes the first paging information after security protection. Correspondingly, the UE receives the second paging message.
S608,UE对接收到的第二寻呼消息进行解安全保护。S608: The UE performs security protection on the received second paging message.
例如,UE对需要加密的寻呼信息进行解密,对需要完整性保护的寻呼信息进行完整性校验,对需要防重放保护的寻呼信息校验收到的计数器是否大于本地的计数器。UE进行解安全保护后,可以得到第一寻呼信息。For example, the UE decrypts the paging information that needs to be encrypted, performs integrity verification on the paging information that needs integrity protection, and verifies whether the received counter is greater than the local counter for the paging information that needs anti-replay protection. After the UE performs security protection, the first paging information can be obtained.
举例来说,若第二寻呼消息通过AS安全上下文进行安全保护,则UE也通过AS安全上下文进行解安全保护。For example, if the second paging message is secured by the AS security context, the UE will also be desecured by the AS security context.
例如,若RAN使用AS安全上下文中的AS加密密钥和AS加密算法对需要加密的寻呼信息进行加密,则UE使用AS安全上下文中的AS加密密钥和AS加密算法进行解密,得到加密之前的寻呼信息,例如寻呼原因。可选的,UE可以根据第二寻呼消息中的容器确定寻呼原因等信息是被加密的。可选的,UE可以根据寻呼原因数据结构中包含的指示信息,确定寻呼原因是被加密的。For example, if the RAN uses the AS encryption key and AS encryption algorithm in the AS security context to encrypt the paging information that needs to be encrypted, the UE uses the AS encryption key and AS encryption algorithm in the AS security context to decrypt it, and get the encryption Paging information, such as paging reason. Optionally, the UE may determine that the information such as the paging reason is encrypted according to the container in the second paging message. Optionally, the UE may determine that the paging reason is encrypted according to the indication information contained in the paging reason data structure.
例如,若RAN使用AS安全上下文中的AS完整性密钥和AS完整性保护算法对需要完整性保护的寻呼信息,则针对需要完整性保护的寻呼信息,UE使用AS安全上下文中的AS完整性密钥和AS完整性保护算法校验完整性。For example, if the RAN uses the AS integrity key in the AS security context and the AS integrity protection algorithm to protect the paging information that needs integrity protection, for the paging information that needs integrity protection, the UE uses the AS in the AS security context. The integrity key and AS integrity protection algorithm verify integrity.
可选的,若RAN对加密后的寻呼信息和不需加密的寻呼信息一起进行完整性保护,以加密后的寻呼信息为加密后的寻呼原因Paging Cause’,不需要加密的寻呼信息为接入类型(Access Type)为例,则RAN先计算MAC-Paging’=Int AS(K AS-Int,Paging Cause’,Access type,DL AS Count),然后对比MAC-Paging’和前文描述的MAC-Paging,若一致则完整性校验通过,然后对加密的寻呼信息进行解密,得到加密之前的寻呼信息。 Optionally, if the RAN performs integrity protection on the encrypted paging message and the paging message that does not need to be encrypted, the encrypted paging message is used as the encrypted paging cause, and the encrypted paging message is not required. For example, if the call information is Access Type, the RAN first calculates MAC-Paging'=Int AS (K AS-Int , Paging Cause', Access type, DL AS Count), and then compares MAC-Paging' with the previous text The described MAC-Paging, if they are consistent, the integrity check is passed, and then the encrypted paging message is decrypted to obtain the paging message before encryption.
应理解,S608是S606的逆向操作,本领域技术人员能够根据对S606的描述获知如何进行解安全保护,本申请不再详述。It should be understood that S608 is a reverse operation of S606, and those skilled in the art can learn how to perform security protection based on the description of S606, and this application will not elaborate on it.
S609,UE向AMF发送服务请求(Service Request)消息。S609: The UE sends a Service Request (Service Request) message to the AMF.
UE根据第一寻呼消息中的部分或全部寻呼信息,确定是否响应寻呼。比如,UE根据第一寻呼信息,确定是否响应寻呼。若确定响应寻呼,则UE向AMF发送服务请求(Service Request)消息。UE发送服务请求消息后的后续操作可以参考现有技术,本申请不再详述。The UE determines whether to respond to paging according to part or all of the paging information in the first paging message. For example, the UE determines whether to respond to paging according to the first paging information. If it is determined to respond to the paging, the UE sends a Service Request (Service Request) message to the AMF. The subsequent operations after the UE sends the service request message can refer to the prior art, which will not be described in detail in this application.
综上,根据本申请提供的传输寻呼信息的方法,RAN通过对寻呼消息中的寻呼信息进行安全保护,能够避免寻呼消息的泄露或者篡改,从而使得网络可以为UE提供正常的服务。In summary, according to the method for transmitting paging information provided by this application, the RAN can prevent the leakage or tampering of the paging message by safely protecting the paging information in the paging message, so that the network can provide normal services for the UE. .
图7是本申请提供的一种传输寻呼信息的方法的示意性流程图。下面对该方法700中的各步骤进行说明。Fig. 7 is a schematic flowchart of a method for transmitting paging information provided by the present application. The steps in the method 700 are described below.
S701~S703,与S301~S303相同,即网络有下行数据发送到UPF,UPF通知SMF有下行数据需要传输,SMF通知AMF发起寻呼。S701 to S703 are the same as S301 to S303, that is, the network has downlink data to send to the UPF, the UPF informs the SMF that there is downlink data to be transmitted, and the SMF informs the AMF to initiate paging.
S704,AMF向RAN发送寻呼消息。相应地,RAN接收寻呼消息。S704: The AMF sends a paging message to the RAN. Correspondingly, the RAN receives the paging message.
S705,RAN向UE发送寻呼消息。相应地,UE接收寻呼消息。S705: The RAN sends a paging message to the UE. Accordingly, the UE receives the paging message.
为区分AMF和RAN发送的寻呼消息,可以将AMF发送给RAN的寻呼消息记作:第一寻呼消息;将RAN发送给UE的寻呼消息记作:第二寻呼消息。In order to distinguish the paging message sent by the AMF and the RAN, the paging message sent by the AMF to the RAN can be recorded as: the first paging message; the paging message sent by the RAN to the UE is recorded as the second paging message.
第一寻呼消息包括需要发送给RAN的寻呼信息和需要发送给UE的寻呼信息,第二寻呼消息可以包括需要发送给UE的寻呼信息。The first paging message includes paging information that needs to be sent to the RAN and paging information that needs to be sent to the UE, and the second paging message may include the paging information that needs to be sent to the UE.
第一寻呼消息和第二寻呼消息可以包括第一寻呼信息。第一寻呼信息可以是需要发送给UE的部分或全部寻呼信息。比如,第一寻呼信息可以包括下述中的一项或多项:寻呼原因、寻呼辅助信息、用户标识、寻呼标识或接入类型。The first paging message and the second paging message may include the first paging information. The first paging information may be part or all of the paging information that needs to be sent to the UE. For example, the first paging information may include one or more of the following: paging reason, paging auxiliary information, user identification, paging identification, or access type.
S706,UE向AMF发送服务请求(Service Request)消息。相应地,AMF接收服务请求消息。S706: The UE sends a Service Request (Service Request) message to the AMF. Correspondingly, the AMF receives the service request message.
UE根据第二寻呼消息中的部分或全部寻呼信息,确定是否响应寻呼。比如,UE可以根据第一寻呼信息,确定是否响应寻呼。若确定响应寻呼,则UE向AMF发送服务请求消息。The UE determines whether to respond to paging according to part or all of the paging information in the second paging message. For example, the UE may determine whether to respond to paging according to the first paging information. If it is determined to respond to the paging, the UE sends a service request message to the AMF.
其中,该服务请求消息包括UE接收到的部分或全部寻呼信息,下文记作第二寻呼信息。比如,UE在确定需要进行寻呼检验,如UE包括多张USIM卡的情况下,可以在服务请求消息中携带第二寻呼信息。Wherein, the service request message includes part or all of the paging information received by the UE, which is hereinafter referred to as the second paging information. For example, the UE may carry the second paging information in the service request message when it determines that it needs to perform paging inspection, for example, if the UE includes multiple USIM cards.
可选地,第二寻呼信息中的寻呼信息与第一寻呼信息中的寻呼信息类型相同。比如,若第一寻呼信息包括寻呼原因,则第二寻呼信息包括寻呼原因。若第一寻呼信息包括接入类型,则第二寻呼信息包括接入类型。Optionally, the paging information in the second paging information is of the same type as the paging information in the first paging information. For example, if the first paging information includes the paging cause, the second paging information includes the paging cause. If the first paging information includes the access type, the second paging information includes the access type.
可选地,该服务请求消息中还可以包括第一信息。第一信息用于指示UE包括多张USIM卡或UE请求AMF对第二寻呼信息或UE在服务请求消息中发送的寻呼信息进行校验。Optionally, the service request message may also include first information. The first information is used to indicate that the UE includes multiple USIM cards or the UE requests the AMF to verify the second paging information or the paging information sent by the UE in the service request message.
可选地,在S706之前,UE可以向AMF发送安全保护指示信息。关于UE向AMF发送安全保护指示信息的方式可以参见上文在在步骤S304中的说明,以及方法400和500中相关步骤的说明,这里不再赘述。Optionally, before S706, the UE may send security protection indication information to the AMF. For the manner in which the UE sends the security protection indication information to the AMF, please refer to the description in step S304 above and the description of related steps in the methods 400 and 500, which will not be repeated here.
S707,AMF确定是否对服务请求消息中的寻呼信息(即,第二寻呼信息)进行校验。S707. The AMF determines whether to check the paging information (ie, the second paging information) in the service request message.
比如,若AMF接收到的安全保护指示信息为第一信息,或者AMF接收到第一信息, 则AMF确定对服务请求消息中的寻呼信息进行校验。For example, if the security protection indication information received by the AMF is the first information, or the AMF receives the first information, the AMF determines to verify the paging information in the service request message.
又如,若服务请求消息中保护寻呼信息,则AMF确定对服务请求消息中的寻呼信息进行校验。S708,AMF对服务请求消息中的寻呼信息进行校验。For another example, if the paging information in the service request message is protected, the AMF determines to verify the paging information in the service request message. S708. The AMF verifies the paging information in the service request message.
若在S707中,AMF确定对服务请求消息中的寻呼信息进行校验,则在S708中,AMF对服务请求消息中的寻呼信息进行校验。即,AMF比较第一寻呼信息是否与服务请求消息中的寻呼信息相同,若相同,则继续后续流程,后续流程可参照现有技术;若不同,则AMF向网络或者UE发送异常信息。If in S707, the AMF determines to verify the paging information in the service request message, then in S708, the AMF verifies the paging information in the service request message. That is, the AMF compares whether the first paging information is the same as the paging information in the service request message, and if they are the same, the subsequent procedures are continued, and the subsequent procedures can refer to the prior art; if they are different, the AMF sends abnormal information to the network or the UE.
根据本申请提供的传输寻呼信息的方法,AMF通过对UE响应寻呼后发送的寻呼信息进行校验,可以确定寻呼信息在空口传播时是否有被篡改,从而可以在一定程度上让网络或用户发现攻击行为。According to the method for transmitting paging information provided in this application, the AMF checks the paging information sent by the UE after responding to the paging, and can determine whether the paging information has been tampered with when it is transmitted over the air interface. The network or user discovers an attack.
应理解,上述方法实施例中,上述各过程的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本申请实施例的实施过程构成任何限定。It should be understood that, in the foregoing method embodiments, the size of the sequence numbers of the foregoing processes does not mean the order of execution, and the execution order of the processes should be determined by their functions and internal logic, and should not constitute the implementation process of the embodiments of this application. Any restrictions.
上面结合图3至图7详细介绍了本申请实施例提供的传输寻呼信息的方法,下面结合图8至图11详细介绍本申请实施例提供的通信装置。The method for transmitting paging information provided by the embodiment of the present application is described in detail above with reference to FIG. 3 to FIG. 7, and the communication device provided by the embodiment of the present application is described in detail below with reference to FIG. 8 to FIG. 11.
图8是本申请提供的通信装置的示意性框图。如图8所示,该通信装置1000可以包括收发单元1100和处理单元1200。Fig. 8 is a schematic block diagram of a communication device provided by the present application. As shown in FIG. 8, the communication device 1000 may include a transceiving unit 1100 and a processing unit 1200.
其中,收发单元1100可以用于向其他装置发送信息或从其他装置接收信息。比如,发送或接收第一寻呼信息。处理单元1200可以用于进行装置的内部处理,比如,对第一寻呼信息进行安全保护。Wherein, the transceiver unit 1100 may be used to send information to or receive information from other devices. For example, sending or receiving the first paging message. The processing unit 1200 may be used to perform internal processing of the device, for example, to perform security protection on the first paging message.
在一种实现方式中,该通信装置1000对应于移动管理网元。该通信装置1000可以为移动管理网元或配置于移动管理网元中的芯片,其可以包括用于执行移动管理网元所执行的操作的单元,并且,该通信装置1000中的各单元分别为了实现上述方法中由移动管理网元所执行的操作。In an implementation manner, the communication device 1000 corresponds to a mobility management network element. The communication device 1000 may be a mobility management network element or a chip configured in a mobility management network element, which may include units for performing operations performed by the mobility management network element, and each unit in the communication device 1000 is for The operations performed by the mobility management network element in the above method are implemented.
在一个示例中,该通信装置1000可对应于方法300、400或500中任一方法中的移动管理网元(即,AMF)。具体地,收发单元1100用于接收来自终端设备的第一信息;处理单元1200用于在需要寻呼所述终端设备的情况下,根据所述第一信息,对第一寻呼信息进行安全保护;所述收发单元1100还用于,向终端设备发送进行安全保护后的第一寻呼信息。In an example, the communication device 1000 may correspond to a mobility management network element (ie, AMF) in any of the methods 300, 400, or 500. Specifically, the transceiving unit 1100 is configured to receive first information from a terminal device; the processing unit 1200 is configured to perform security protection on the first paging information according to the first information when the terminal device needs to be paged. The transceiving unit 1100 is also used to send the first paging information after security protection to the terminal device.
可选地,所述第一信息用于指示所述终端设备包括多张全球用户标识模块USIM卡或者请求对寻呼信息进行安全保护。Optionally, the first information is used to indicate that the terminal device includes multiple global user identity module USIM cards or to request security protection for paging information.
可选地,所述第一寻呼信息通过非接入层NAS安全上下文进行安全保护。Optionally, the first paging information is secured by a non-access stratum NAS security context.
可选地,所述收发单元1100具体用于:接收来自所述终端设备的非接入层NAS消息,所述NAS消息包括所述第一信息。Optionally, the transceiving unit 1100 is specifically configured to receive a non-access stratum NAS message from the terminal device, where the NAS message includes the first information.
可选地,所述NAS消息通过NAS安全上下文进行安全保护。Optionally, the NAS message is protected by a NAS security context.
可选地,所述处理单元1200具体用于:对所述第一寻呼信息进行下述中的一项或多项操作:加密、完整性保护或防重放保护。Optionally, the processing unit 1200 is specifically configured to: perform one or more of the following operations on the first paging information: encryption, integrity protection, or anti-replay protection.
可选地,所述第一寻呼信息包括下述中的一项或多项:寻呼原因、寻呼辅助信息、用户标识、寻呼标识或接入类型。Optionally, the first paging information includes one or more of the following: paging reason, paging assistance information, user identification, paging identification, or access type.
另一示例中,该通信装置1000可对应于方法600中的移动管理网元(即,AMF)。具体地,收发单元1100用于接收来自终端设备的第一信息,并向接入网设备发送第一信息。In another example, the communication device 1000 may correspond to the mobility management network element (ie, AMF) in the method 600. Specifically, the transceiver unit 1100 is configured to receive the first information from the terminal device, and send the first information to the access network device.
可选地,第一信息用于指示终端设备包括多张USIM卡或者请求对寻呼信息进行安全保护。Optionally, the first information is used to indicate that the terminal device includes multiple USIM cards or to request security protection for paging information.
可选地,收发单元1100具体用于:接收来自所述终端设备的AS消息,所述AS消息包括所述第一信息。Optionally, the transceiver unit 1100 is specifically configured to: receive an AS message from the terminal device, where the AS message includes the first information.
可选地,所述AS消息通过AS安全上下文进行安全保护。Optionally, the AS message is protected by AS security context.
可选地,收发单元1100具体用于:向接入网设备发送N1接口消息,所述N1接口消息包括所述第一信息;或者,向接入网设备发送寻呼消息,所述寻呼消息包括所述第一信息。Optionally, the transceiver unit 1100 is specifically configured to: send an N1 interface message to the access network device, where the N1 interface message includes the first information; or, send a paging message to the access network device, the paging message Including the first information.
再一示例中,该通信装置1000可对应于方法700中的移动管理网元(即,AMF)。具体地,收发单元1100用于向终端设备发送第一寻呼信息,并接收来自终端设备的服务请求消息,该服务请求消息包括第二寻呼信息;处理单元1200用于根据第一寻呼信息,对第二寻呼信息进行校验。In another example, the communication device 1000 may correspond to the mobility management network element (ie, AMF) in the method 700. Specifically, the transceiving unit 1100 is configured to send first paging information to the terminal device, and receive a service request message from the terminal device, the service request message includes the second paging information; the processing unit 1200 is configured to send the first paging information according to the first paging information , To verify the second paging information.
可选地,第一寻呼信息包括下述中的一项或多项:寻呼原因、寻呼辅助信息、用户标识、寻呼标识或接入类型。第二寻呼信息包括下述中的一项或多项:寻呼原因、寻呼辅助信息、用户标识、寻呼标识或接入类型。Optionally, the first paging information includes one or more of the following: paging reason, paging assistance information, user identification, paging identification, or access type. The second paging information includes one or more of the following: paging reason, paging auxiliary information, user identification, paging identification, or access type.
可选地,处理单元1200具体用于:根据第一信息和第一寻呼信息,对第二寻呼信息进行校验。Optionally, the processing unit 1200 is specifically configured to: verify the second paging information according to the first information and the first paging information.
可选地,第一信息可以指示终端设备包括多张USIM卡或者请求对寻呼信息进行校验。Optionally, the first information may indicate that the terminal device includes multiple USIM cards or request verification of paging information.
可选地,收发单元1100还用于:接收来自终端设备的第一信息。Optionally, the transceiver unit 1100 is further configured to: receive the first information from the terminal device.
可选地,第一信息通过NAS消息携带。进一步地,第一信息通过NAS安全上下文进行保护。Optionally, the first information is carried in a NAS message. Further, the first information is protected by the NAS security context.
可选地,服务请求消息包括第一信息。Optionally, the service request message includes the first information.
在另一种实现方式中,该通信装置1000对应于终端设备。该通信装置1000可以为终端设备或配置于终端设备中的芯片,其可以包括用于执行终端设备所执行的操作的单元,并且,该通信装置1000中的各单元分别为了实现上述方法中由终端设备所执行的操作。In another implementation manner, the communication device 1000 corresponds to a terminal device. The communication device 1000 may be a terminal device or a chip configured in the terminal device, which may include a unit for performing operations performed by the terminal device, and each unit in the communication device 1000 is used to implement the above-mentioned method by the terminal device. The operation performed by the device.
在一个示例中,该通信装置1000可对应于方法300、400或500中任一方法中的终终端设备(即,UE)。具体地,收发单元1100用于向移动管理网元发送第一信息;接收来自所述移动管理网元的进行安全保护后的第一寻呼信息。In an example, the communication apparatus 1000 may correspond to the terminal equipment (ie, UE) in any of the methods 300, 400, or 500. Specifically, the transceiver unit 1100 is configured to send the first information to the mobility management network element; and receive the first paging information after security protection from the mobility management network element.
可选地,所述第一信息用于指示所述装置包括多张全球用户标识模块USIM卡或者请求对寻呼信息进行安全保护。Optionally, the first information is used to indicate that the device includes multiple global user identity module USIM cards or to request security protection for paging information.
可选地,所述第一寻呼信息通过非接入层NAS安全上下文进行安全保护。Optionally, the first paging information is secured by a non-access stratum NAS security context.
可选地,所述收发单元1100具体用于:向所述移动管理网元发送非接入层NAS消息,所述NAS消息包括所述第一信息Optionally, the transceiver unit 1100 is specifically configured to: send a non-access stratum NAS message to the mobility management network element, where the NAS message includes the first information
可选地,所述NAS消息通过NAS安全上下文进行安全保护。Optionally, the NAS message is protected by a NAS security context.
可选地,所述安全保护包括下述中的一项或多项:加密、完整性保护或防重放保护。Optionally, the security protection includes one or more of the following: encryption, integrity protection, or anti-replay protection.
可选地,所述第一寻呼信息包括下述中的一项或多项:寻呼原因、寻呼辅助信息、用户标识、寻呼标识或接入类型。Optionally, the first paging information includes one or more of the following: paging reason, paging assistance information, user identification, paging identification, or access type.
在一个示例中,该通信装置1000可对应于方法600中的终端设备(即,UE)。具体地,收发单元1100用于向移动管理网元或接入网设备发送第一信息;接收来自接入网设备的进行安全保护后的第一寻呼信息。In an example, the communication apparatus 1000 may correspond to the terminal equipment (ie, UE) in the method 600. Specifically, the transceiving unit 1100 is configured to send the first information to the mobility management network element or the access network device; and receive the first paging information after the security protection is performed from the access network device.
可选地,第一信息用于指示通信装置1000包括多张USIM卡或者请求对寻呼信息进行安全保护。Optionally, the first information is used to indicate that the communication device 1000 includes multiple USIM cards or to request security protection for paging information.
可选地,第一寻呼信息可以包括需要发送给通信装置1000的部分或全部寻呼信息,寻呼信息用于寻呼通信装置1000。Optionally, the first paging information may include part or all of the paging information that needs to be sent to the communication device 1000, and the paging information is used to page the communication device 1000.
比如,第一寻呼信息包括下述中的一项或多项:寻呼原因、寻呼辅助信息、用户标识、寻呼标识或接入类型。For example, the first paging information includes one or more of the following: paging reason, paging auxiliary information, user identification, paging identification, or access type.
可选地,处理单元1200还用于,对进行安全保护后的第一寻呼信息进行解安全保护。Optionally, the processing unit 1200 is further configured to perform security protection on the first paging information after security protection.
可选地,安全保护包括下述中的一项或多项:加密、完整性保护或防重放保护。Optionally, the security protection includes one or more of the following: encryption, integrity protection, or anti-replay protection.
可选地,收发单元1100具体用于:向移动管理网元发送AS消息,所述AS消息包括第一信息,所述AS消息通过AS安全上下文进行安全保护。Optionally, the transceiver unit 1100 is specifically configured to send an AS message to a mobility management network element, where the AS message includes the first information, and the AS message performs security protection through the AS security context.
在一个示例中,该通信装置1000可对应于方法700中的终端设备(即,UE)。具体地,收发单元1100接收第一寻呼信息;向移动管理网元发送服务请求消息,服务请求消息包括第二寻呼信息,第一寻呼信息用于移动管理网元对第二寻呼信息进行校验。In an example, the communication apparatus 1000 may correspond to the terminal equipment (ie, UE) in the method 700. Specifically, the transceiver unit 1100 receives the first paging information; sends a service request message to the mobility management network element, the service request message includes the second paging information, and the first paging information is used for the mobility management network element to respond to the second paging information Perform verification.
可选地,收发单元1100还用于,向移动管理网元发送第一信息。Optionally, the transceiver unit 1100 is further configured to send the first information to the mobility management network element.
可选地,第一信息可以指示通信装置1000包括多张USIM卡或者请求对寻呼信息进行校验。Optionally, the first information may indicate that the communication device 1000 includes multiple USIM cards or request verification of the paging information.
可选地,第一信息通过NAS消息携带。进一步地,第一信息通过NAS安全上下文进行保护。Optionally, the first information is carried in a NAS message. Further, the first information is protected by the NAS security context.
可选地,服务请求消息包括第一信息。Optionally, the service request message includes the first information.
在又一种实现方式中,该通信装置1000对应于接入网设备。该通信装置1000可以为接入网设备或配置于接入网设备中的芯片,其可以包括用于执行接入网设备所执行的操作的单元,并且,该通信装置1000中的各单元分别为了实现上述方法中由接入网设备所执行的操作。In yet another implementation manner, the communication apparatus 1000 corresponds to an access network device. The communication device 1000 may be an access network device or a chip configured in the access network device, and it may include a unit for performing operations performed by the access network device, and each unit in the communication device 1000 is for The operation performed by the access network device in the above method is realized.
在一个示例中,该通信装置1000可对应于方法600中的接入网设备(即,RAN)。具体地,收发单元1100用于接收第一信息;处理单元用于在需要寻呼终端设备的情况下,根据第一信息,对第一寻呼信息进行安全保护;收发单元1100还用于,向终端设备发送进行安全保护后的第一寻呼信息。In an example, the communication apparatus 1000 may correspond to the access network equipment (ie, RAN) in the method 600. Specifically, the transceiving unit 1100 is used to receive the first information; the processing unit is used to perform security protection on the first paging information according to the first information when the terminal device needs to be paged; the transceiving unit 1100 is also used to: The terminal device sends the first paging message after security protection.
可选地,第一信息用于指示终端设备包括多张USIM卡或者请求对寻呼信息进行安全保护。Optionally, the first information is used to indicate that the terminal device includes multiple USIM cards or to request security protection for paging information.
可选地,第一寻呼信息包括下述中的一项或多项:寻呼原因、寻呼辅助信息、用户标识、寻呼标识或接入类型。用户标识可以是UE ID,UE ID为该终端设备的标识。Optionally, the first paging information includes one or more of the following: paging reason, paging assistance information, user identification, paging identification, or access type. The user identification may be the UE ID, and the UE ID is the identification of the terminal device.
可选地,处理单元具体用于,对第一寻呼信息进行下述中的一项或多项操作:加密、完整性保护或防重放保护。Optionally, the processing unit is specifically configured to perform one or more of the following operations on the first paging message: encryption, integrity protection, or anti-replay protection.
可选地,第一寻呼信息可以通过AS安全上下文进行安全保护。Optionally, the first paging information may be secured by the AS security context.
可选地,接收单元1100具体用于,接收来自终端设备或者移动管理网元的第一信息。Optionally, the receiving unit 1100 is specifically configured to receive the first information from the terminal device or the mobility management network element.
可选地,接收单元1100具体用于,接收来自终端设备的空口消息或者无线资源控制RRC消息,所述空口消息或者RRC消息包括所述第一信息。Optionally, the receiving unit 1100 is specifically configured to receive an air interface message or a radio resource control RRC message from a terminal device, where the air interface message or the RRC message includes the first information.
进一步地,所述空口消息或者RRC消息通过AS安全上下文进行安全保护。Further, the air interface message or RRC message is protected by AS security context.
可选地,接收单元1100具体用于,接收来自移动管理网元的N1接口消息,所述N1接口消息包括所述第一信息;或者,接收来自所述移动管理网元的寻呼消息,所述寻呼消息包括所述第一信息。Optionally, the receiving unit 1100 is specifically configured to receive an N1 interface message from a mobility management network element, where the N1 interface message includes the first information; or, receive a paging message from the mobility management network element, so The paging message includes the first information.
应理解,各单元执行相应网元的上述相应步骤的具体过程在上述方法实施例中已经详细说明,为了简洁,在此不再赘述。It should be understood that the specific process for each unit to execute the foregoing corresponding steps of the corresponding network element has been described in detail in the foregoing method embodiment, and is not repeated here for brevity.
示例性的,该通信装置1000对应接入网设备时,该通信装置1000中的收发单元1100可对应于图9中示出的网络设备2000中的收发器2300,该通信装置1000中的处理单元1200可对应于图9中示出的网络设备2000中的处理器2100。通信装置1000为配置于网络设备中的芯片时,该通信装置1000中的收发单元1100可以为输入/输出接口。Exemplarily, when the communication device 1000 corresponds to an access network device, the transceiver unit 1100 in the communication device 1000 may correspond to the transceiver 2300 in the network device 2000 shown in FIG. 9, and the processing unit in the communication device 1000 1200 may correspond to the processor 2100 in the network device 2000 shown in FIG. 9. When the communication device 1000 is a chip configured in a network device, the transceiver unit 1100 in the communication device 1000 may be an input/output interface.
示例性的,该通信装置1000对应终端设备时,该通信装置1000中的收发单元1100可对应于图10中示出的终端设备3000中的收发器3002,该通信装置1000中的处理单元1200可对应于图10中示出的终端设备3000中的处理器3001。Exemplarily, when the communication device 1000 corresponds to a terminal device, the transceiving unit 1100 in the communication device 1000 may correspond to the transceiver 3002 in the terminal device 3000 shown in FIG. 10, and the processing unit 1200 in the communication device 1000 may It corresponds to the processor 3001 in the terminal device 3000 shown in FIG. 10.
示例性的,该通信装置1000为接入网设备时,该通信装置1000中的收发单元1100可对应于图11中示出的接入网设备4000中的RRU 4100,该通信装置1000中的处理单元1200可对应于图11中示出的接入网设备4000中的BBU 4200。通信装置1000为配置于接入网设备中的芯片时,该通信装置1000中的收发单元1100可以为输入/输出接口。Exemplarily, when the communication device 1000 is an access network device, the transceiver unit 1100 in the communication device 1000 may correspond to the RRU 4100 in the access network device 4000 shown in FIG. 11, and the processing in the communication device 1000 The unit 1200 may correspond to the BBU 4200 in the access network device 4000 shown in FIG. 11. When the communication device 1000 is a chip configured in an access network device, the transceiver unit 1100 in the communication device 1000 may be an input/output interface.
图9是本申请实施例提供的网络设备的结构示意图。上述的移动管理网元或AMF可以由图9所示的网络设备2000来实现。应理解,网络设备2000可以是实体设备,也可以是实体设备的部件(例如,集成电路,芯片等等)。Fig. 9 is a schematic structural diagram of a network device provided by an embodiment of the present application. The aforementioned mobility management network element or AMF may be implemented by the network device 2000 shown in FIG. 9. It should be understood that the network device 2000 may be a physical device, or a component of a physical device (for example, an integrated circuit, a chip, etc.).
如图9所示,该网络设备2000包括:一个或多个处理器2100。处理器2100可以存储用于执行本申请实施例的方法的执行指令。可选地,处理器2100可以调用接口实现接收和发送功能。所述接口可以是逻辑接口或物理接口,对此不作限定。例如,接口可以是收发电路,或是接口电路。用于实现接收和发送功能的收发电路、或接口电路可以是分开的,也可以集成在一起。上述收发电路或接口电路可以用于代码/数据的读写,或者,上述收发电路或接口电路可以用于信号的传输或传递。As shown in FIG. 9, the network device 2000 includes: one or more processors 2100. The processor 2100 may store execution instructions for executing the methods in the embodiments of the present application. Optionally, the processor 2100 may call an interface to implement receiving and sending functions. The interface may be a logical interface or a physical interface, which is not limited. For example, the interface can be a transceiver circuit or an interface circuit. The transceiver circuits or interface circuits used to implement the receiving and transmitting functions may be separate or integrated. The foregoing transceiver circuit or interface circuit may be used for code/data reading and writing, or the foregoing transceiver circuit or interface circuit may be used for signal transmission or transmission.
可选地,接口可以通过收发器实现。可选地,该网络设备2000还可以包括收发器2300。所述收发器2300可以称为收发单元、收发机、收发电路或者收发器等,用于实现收发功能。Optionally, the interface can be implemented by a transceiver. Optionally, the network device 2000 may further include a transceiver 2300. The transceiver 2300 may be referred to as a transceiver unit, a transceiver, a transceiver circuit, or a transceiver, etc., for implementing the transceiver function.
可选地,该网络设备2000还可以包括存储器2200。本申请实施例对存储器2200的具体部署位置不作具体限定,该存储器可以集成于处理器中,也可以是独立于处理器之外。对于该计算机设备不包括存储器的情形,该计算机设备具备处理功能即可,存储器可以部署在其他位置(如,云系统)。Optionally, the network device 2000 may further include a memory 2200. The embodiment of the present application does not specifically limit the specific deployment location of the memory 2200. The memory may be integrated in the processor or independent of the processor. In the case where the computer device does not include a memory, the computer device only needs to have processing functions, and the memory can be deployed in other locations (for example, a cloud system).
处理器2100、存储器2200和收发器2300之间通过内部连接通路互相通信,传递控制和/或数据信号。The processor 2100, the memory 2200, and the transceiver 2300 communicate with each other through internal connection paths to transfer control and/or data signals.
可以理解的是,尽管并未示出,网络设备2000还可以包括其他模块,例如电池等。It can be understood that, although not shown, the network device 2000 may also include other modules, such as a battery.
可选的,在一些实施例中,存储器2200可以存储用于执行本申请实施例的方法的执行指令。处理器2100可以执行存储器2200中存储的指令,并结合其他硬件(例如收发器2300)完成上文所示方法执行的步骤,具体工作过程和有益效果可以参见上文方法实施例中的描述。Optionally, in some embodiments, the memory 2200 may store execution instructions for executing the methods in the embodiments of the present application. The processor 2100 may execute the instructions stored in the memory 2200, and combine with other hardware (for example, the transceiver 2300) to complete the steps executed by the method shown above. For the specific working process and beneficial effects, please refer to the description in the method embodiment above.
处理器2300可能是一种集成电路芯片,具有信号的处理能力。在实现过程中,方法的各步骤可以通过处理器中的硬件的集成逻辑电路或者软件形式的指令完成。上述的处理器可以是通用处理器、数字信号处理器(digital signal processor,DSP)、专用集成电路(application specific integrated circuit,ASIC)、现成可编程门阵列(field programmable gate array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。可以实现或者执行本申请实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。结合本申请实施例所公开的方法的步骤可以直接体现为硬件译码处理器执行完成,或者用译码处理器中的硬件及软件模块组合执行完成。软件模块可以位于随机存取存储器(random access memory,RAM)、闪存、只读存储器(read-only memory,ROM)、可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质位于存储器,处理器读取存储器中的指令,结合其硬件完成上述方法的步骤。The processor 2300 may be an integrated circuit chip with signal processing capabilities. In the implementation process, each step of the method can be completed by an integrated logic circuit of hardware in the processor or instructions in the form of software. The above-mentioned processor may be a general-purpose processor, a digital signal processor (digital signal processor, DSP), an application specific integrated circuit (ASIC), a ready-made programmable gate array (field programmable gate array, FPGA) or other Programming logic devices, discrete gates or transistor logic devices, discrete hardware components. The methods, steps, and logical block diagrams disclosed in the embodiments of the present application can be implemented or executed. The general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like. The steps of the method disclosed in the embodiments of the present application may be directly embodied as being executed and completed by a hardware decoding processor, or executed and completed by a combination of hardware and software modules in the decoding processor. The software module can be located in random access memory (RAM), flash memory, read-only memory (read-only memory, ROM), programmable read-only memory, or electrically erasable programmable memory, registers, etc. mature in the field Storage medium. The storage medium is located in the memory, and the processor reads the instructions in the memory and completes the steps of the above method in combination with its hardware.
可以理解,存储器2200可以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器ROM、可编程只读存储器(programmable ROM,PROM)、可擦除可编程只读存储器(erasable PROM,EPROM)、电可擦除可编程只读存储器(electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器RAM,其用作外部高速缓存。通过示例性但不是限制性说明,许多形式的RAM可用,例如静态随机存取存储器(static RAM,SRAM)、动态随机存取存储器(dynamic RAM,DRAM)、同步动态随机存取存储器(synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(double data rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(synchlink DRAM,SLDRAM)和直接内存总线随机存取存储器(direct rambus RAM,DR RAM)。应注意,本文描述的系统和方法的存储器旨在包括但不限于这些和任意其它适合类型的存储器。It is understood that the memory 2200 may be a volatile memory or a non-volatile memory, or may include both volatile and non-volatile memory. Among them, the non-volatile memory can be read-only memory ROM, programmable read-only memory (programmable ROM, PROM), erasable programmable read-only memory (erasable PROM, EPROM), electrically erasable programmable read-only memory (electrically EPROM, EEPROM) or flash memory. The volatile memory may be random access memory RAM, which acts as an external cache. By way of exemplary but not restrictive description, many forms of RAM are available, such as static random access memory (static RAM, SRAM), dynamic random access memory (dynamic RAM, DRAM), and synchronous dynamic random access memory (synchronous DRAM, SDRAM), double data rate synchronous dynamic random access memory (double data rate SDRAM, DDR SDRAM), enhanced synchronous dynamic random access memory (enhanced SDRAM, ESDRAM), synchronous connection dynamic random access memory (synchlink DRAM, SLDRAM) ) And direct memory bus random access memory (direct rambus RAM, DR RAM). It should be noted that the memories of the systems and methods described herein are intended to include, but are not limited to, these and any other suitable types of memories.
上述的网络设备2000可以是一个通用计算机设备或者是一个专用计算机设备。在具体实现中,网络设备2000可以是台式机、便携式电脑、网络服务器、掌上电脑(personal digital assistant,PDA)、移动手机、平板电脑、无线终端设备、通信设备、嵌入式设备或有图9中类似结构的设备。本申请实施例不限定网络设备2000的类型。The aforementioned network device 2000 may be a general-purpose computer device or a special-purpose computer device. In a specific implementation, the network device 2000 can be a desktop computer, a portable computer, a network server, a personal digital assistant (PDA), a mobile phone, a tablet computer, a wireless terminal device, a communication device, an embedded device, or the device shown in Figure 9. Similar structure equipment. The embodiment of the present application does not limit the type of the network device 2000.
图10是本申请实施例提供的终端设备3000的结构示意图。如图所示,该终端设备3000包括处理器3001和收发器3002。可选地,该终端设备3000还可以包括存储器3003。其中,处理器3001、收发器3002和存储器3003之间可以通过内部连接通路互相通信,传递控制和/或数据信号,该存储器3003用于存储计算机程序,该处理器3001用于从该存储器3003中调用并运行该计算机程序,以控制该收发器3002收发信号。FIG. 10 is a schematic structural diagram of a terminal device 3000 provided by an embodiment of the present application. As shown in the figure, the terminal device 3000 includes a processor 3001 and a transceiver 3002. Optionally, the terminal device 3000 may further include a memory 3003. Among them, the processor 3001, the transceiver 3002, and the memory 3003 can communicate with each other through an internal connection path to transfer control and/or data signals. The memory 3003 is used to store computer programs, and the processor 3001 is used to download from the memory 3003 Call and run the computer program to control the transceiver 3002 to send and receive signals.
上述处理器3001和存储器3003可以合成一个处理装置3004,处理器3001用于执行存储器3003中存储的程序代码来实现上述功能。应理解,图中所示的处理装置3004仅为 示例。在具体实现时,该存储器3003也可以集成在处理器3001中,或者独立于处理器3001。本申请对此不做限定。The foregoing processor 3001 and memory 3003 may be combined into a processing device 3004, and the processor 3001 is configured to execute program codes stored in the memory 3003 to implement the foregoing functions. It should be understood that the processing device 3004 shown in the figure is only an example. In specific implementation, the memory 3003 may also be integrated in the processor 3001 or independent of the processor 3001. This application does not limit this.
上述终端设备3000还可以包括天线3010,用于将收发器3002输出的上行数据或上行控制信令通过无线信号发送出去。The above-mentioned terminal device 3000 may also include an antenna 3010 for transmitting uplink data or uplink control signaling output by the transceiver 3002 through a wireless signal.
可选地,上述终端设备3000还可以包括电源3005,用于向终端设备中的各种器件或电路提供电源。Optionally, the aforementioned terminal device 3000 may further include a power supply 3005 for providing power to various devices or circuits in the terminal device.
除此之外,为了使得终端设备的功能更加完善,该终端设备3000还可以包括输入单元3006、显示单元3007、音频电路3008、摄像头3009和传感器3011等中的一个或多个,所述音频电路还可以包括扬声器30081、麦克风30082等。In addition, in order to make the function of the terminal device more perfect, the terminal device 3000 may also include one or more of the input unit 3006, the display unit 3007, the audio circuit 3008, the camera 3009 and the sensor 3011, etc., the audio circuit It may also include a speaker 30081, a microphone 30082, and so on.
应理解,所述处理装置3004可以是一个芯片。例如,该处理装置3004可以是现场可编程门阵列(field programmable gate array,FPGA),可以是通用处理器、数字信号处理器(digital signal processor,DSP)、专用集成电路(application specific integrated circuit,ASIC)、现成可编程门阵列(field programmable gate array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件,还可以是系统芯片(system on chip,SoC),还可以是中央处理器(central processor unit,CPU),还可以是网络处理器(network processor,NP),还可以是数字信号处理电路(digital signal processor,DSP),还可以是微控制器(micro controller unit,MCU),还可以是可编程控制器(programmable logic device,PLD)或其他集成芯片。可以实现或者执行本申请实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。结合本申请实施例所公开的方法的步骤可以直接体现为硬件译码处理器执行完成,或者用译码处理器中的硬件及软件模块组合执行完成。软件模块可以位于随机存储器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质位于存储器,处理器读取存储器中的信息,结合其硬件完成上述方法的步骤。It should be understood that the processing device 3004 may be a chip. For example, the processing device 3004 may be a field programmable gate array (FPGA), a general-purpose processor, a digital signal processor (digital signal processor, DSP), or an application specific integrated circuit (ASIC). ), off-the-shelf programmable gate array (FPGA) or other programmable logic devices, discrete gates or transistor logic devices, discrete hardware components, or system on chip (SoC), or central The processor (central processor unit, CPU) can also be a network processor (NP), a digital signal processing circuit (digital signal processor, DSP), or a microcontroller (microcontroller unit, MCU) ), it can also be a programmable logic device (PLD) or other integrated chips. The methods, steps, and logical block diagrams disclosed in the embodiments of the present application can be implemented or executed. The general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like. The steps of the method disclosed in the embodiments of the present application may be directly embodied as being executed and completed by a hardware decoding processor, or executed and completed by a combination of hardware and software modules in the decoding processor. The software module can be located in a mature storage medium in the field, such as random access memory, flash memory, read-only memory, programmable read-only memory, or electrically erasable programmable memory, registers. The storage medium is located in the memory, and the processor reads the information in the memory and completes the steps of the above method in combination with its hardware.
所述存储器3003可以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(read-only memory,ROM)、可编程只读存储器(programmable ROM,PROM)、可擦除可编程只读存储器(erasable PROM,EPROM)、电可擦除可编程只读存储器(electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(random access memory,RAM),其用作外部高速缓存。通过示例性但不是限制性说明,许多形式的RAM可用,例如静态随机存取存储器(static RAM,SRAM)、动态随机存取存储器(dynamic RAM,DRAM)、同步动态随机存取存储器(synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(double data rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(synchlink DRAM,SLDRAM)和直接内存总线随机存取存储器(direct rambus RAM,DR RAM)。The memory 3003 may be a volatile memory or a non-volatile memory, or may include both volatile and non-volatile memory. Among them, the non-volatile memory can be read-only memory (ROM), programmable read-only memory (programmable ROM, PROM), erasable programmable read-only memory (erasable PROM, EPROM), and electrically available Erase programmable read-only memory (electrically EPROM, EEPROM) or flash memory. The volatile memory may be random access memory (RAM), which is used as an external cache. By way of exemplary but not restrictive description, many forms of RAM are available, such as static random access memory (static RAM, SRAM), dynamic random access memory (dynamic RAM, DRAM), and synchronous dynamic random access memory (synchronous DRAM, SDRAM), double data rate synchronous dynamic random access memory (double data rate SDRAM, DDR SDRAM), enhanced synchronous dynamic random access memory (enhanced SDRAM, ESDRAM), synchronous connection dynamic random access memory (synchlink DRAM, SLDRAM) ) And direct memory bus random access memory (direct rambus RAM, DR RAM).
应注意,本文描述的系统和方法的存储器旨在包括但不限于这些和任意其它适合类型的存储器。It should be noted that the memories of the systems and methods described herein are intended to include, but are not limited to, these and any other suitable types of memories.
图11是本申请实施例提供的接入网设备的结构示意图,例如可以为基站的结构示意图。该基站4000执行上述方法实施例中接入网设备(RAN)的功能。如图11所示,该基站4000可以包括一个或多个射频单元,如远端射频单元(remote radio unit,RRU)4100 和一个或多个基带单元(BBU)(也可称为分布式单元(DU))4200。所述RRU 4100可以称为收发单元或通信单元。可选地,该收发单元4100还可以称为收发机、收发电路、或者收发器等等,其可以包括至少一个天线4101和射频单元4102。可选地,收发单元4100可以包括接收单元和发送单元,接收单元可以对应于接收器(或称接收机、接收电路),发送单元可以对应于发射器(或称发射机、发射电路)。所述RRU 4100部分主要用于射频信号的收发以及射频信号与基带信号的转换。所述BBU 4200部分主要用于进行基带处理,对基站进行控制等。所述RRU 4100与BBU 4200可以是物理上设置在一起,也可以物理上分离设置的,即分布式基站。FIG. 11 is a schematic structural diagram of an access network device provided by an embodiment of the present application, and may be, for example, a schematic structural diagram of a base station. The base station 4000 performs the functions of the access network equipment (RAN) in the above method embodiment. As shown in FIG. 11, the base station 4000 may include one or more radio frequency units, such as a remote radio unit (RRU) 4100 and one or more baseband units (BBU) (also known as distributed units ( DU)) 4200. The RRU 4100 may be called a transceiver unit or a communication unit. Optionally, the transceiver unit 4100 may also be called a transceiver, a transceiver circuit, or a transceiver, etc., and it may include at least one antenna 4101 and a radio frequency unit 4102. Optionally, the transceiver unit 4100 may include a receiving unit and a transmitting unit, the receiving unit may correspond to a receiver (or receiver, receiving circuit), and the transmitting unit may correspond to a transmitter (or transmitter or transmitting circuit). The RRU 4100 part is mainly used for receiving and sending radio frequency signals and converting radio frequency signals and baseband signals. The 4200 part of the BBU is mainly used for baseband processing, base station control, and so on. The RRU 4100 and the BBU 4200 may be physically set together, or may be physically separated, that is, a distributed base station.
所述BBU 4200为基站的控制中心,也可以称为处理单元,主要用于完成基带处理功能,如信道编码,复用,调制,扩频等等。例如所述BBU(处理单元)可以用于控制基站执行上述方法实施例中关于接入网设备的操作流程。The BBU 4200 is the control center of the base station, and may also be called a processing unit, which is mainly used to complete baseband processing functions, such as channel coding, multiplexing, modulation, and spreading. For example, the BBU (processing unit) may be used to control the base station to execute the operation procedure of the access network device in the foregoing method embodiment.
在一个示例中,所述BBU 4200可以由一个或多个单板构成,多个单板可以共同支持单一接入制式的无线接入网(如LTE网),也可以分别支持不同接入制式的无线接入网(如LTE网,5G网或其他网)。所述BBU 4200还包括存储器4201和处理器4202。所述存储器4201用以存储必要的指令和数据。所述处理器4202用于控制基站进行必要的动作,例如用于控制基站执行上述方法实施例中关于接入网设备的操作流程。所述存储器4201和处理器4202可以服务于一个或多个单板。也就是说,可以每个单板上单独设置存储器和处理器。也可以是多个单板共用相同的存储器和处理器。此外每个单板上还可以设置有必要的电路。In an example, the BBU 4200 may be composed of one or more single boards, and multiple single boards may jointly support a radio access network with a single access standard (such as an LTE network), or support different access standards. Wireless access network (such as LTE network, 5G network or other networks). The BBU 4200 further includes a memory 4201 and a processor 4202. The memory 4201 is used to store necessary instructions and data. The processor 4202 is configured to control the base station to perform necessary actions, for example, to control the base station to execute the operation procedure of the access network device in the foregoing method embodiment. The memory 4201 and the processor 4202 may serve one or more boards. In other words, the memory and the processor can be set separately on each board. It can also be that multiple boards share the same memory and processor. In addition, necessary circuits can be provided on each board.
应理解,图11所示的基站4000能够实现前述方法实施例中涉及接入网设备的各个过程。基站4000中的各个模块的操作或功能,分别为了实现上述方法实施例中的相应流程。具体可参见上述方法实施例中的描述,为避免重复,此处适当省略详细描述。It should be understood that the base station 4000 shown in FIG. 11 can implement various processes involving access network equipment in the foregoing method embodiments. The operation or function of each module in the base station 4000 is to implement the corresponding process in the foregoing method embodiment. For details, please refer to the description in the foregoing method embodiment, and to avoid repetition, detailed description is omitted here as appropriate.
上述BBU 4200可以用于执行前面方法实施例中描述的由接入网设备内部实现的动作,而RRU 4100可以用于执行前面方法实施例中描述的接入网设备的发送或接收的动作。具体请见前面方法实施例中的描述,此处不再赘述。The above-mentioned BBU 4200 can be used to perform the actions implemented by the access network device described in the previous method embodiments, and the RRU 4100 can be used to perform the sending or receiving actions of the access network device described in the previous method embodiments. For details, please refer to the description in the previous method embodiment, which will not be repeated here.
本申请还提供一种计算机程序产品,该计算机程序产品包括:计算机程序代码,当该计算机程序代码在计算机上运行时,使得该计算机执行前述任一方法实施例中由第一网元所执行的方法。The present application also provides a computer program product, the computer program product comprising: computer program code, when the computer program code runs on a computer, causes the computer to execute any of the foregoing method embodiments executed by the first network element method.
本申请还提供一种计算机可读存储介质,该计算机可读存储介质存储有程序代码,当该程序代码在计算机上运行时,使得该计算机执行前述方法实施例中由终端设备所执行的方法。The present application also provides a computer-readable storage medium that stores a program code that, when the program code runs on a computer, causes the computer to execute the method executed by the terminal device in the foregoing method embodiment.
本申请还提供一种计算机可读存储介质,该计算机可读存储介质存储有程序代码,当该程序代码在计算机上运行时,使得该计算机执行前述方法实施例中由接入网设备所执行的方法。The present application also provides a computer-readable storage medium that stores program code, and when the program code is run on a computer, the computer executes what is executed by the access network device in the foregoing method embodiment method.
本申请还提供一种计算机可读存储介质,该计算机可读存储介质存储有程序代码,当该程序代码在计算机上运行时,使得该计算机执行前述方法实施例中由移动管理网元所执行的方法。The present application also provides a computer-readable storage medium that stores program code, and when the program code is run on a computer, the computer executes the operations executed by the mobility management network element in the foregoing method embodiments. method.
本申请还提供一种系统,其包括终端设备、接入网设备和移动管理网元中的任两个网元。This application also provides a system, which includes any two network elements among a terminal device, an access network device, and a mobility management network element.
本申请还提供一种系统,其包括前述任一方法实施例所涉及的任意两个网元。The present application also provides a system, which includes any two network elements involved in any of the foregoing method embodiments.
本申请实施例还提供了一种处理装置,包括处理器和接口;所述处理器用于执行上述任一方法实施例所涉及的任一网元所执行的方法。An embodiment of the present application also provides a processing device, including a processor and an interface; the processor is configured to execute a method executed by any network element involved in any of the foregoing method embodiments.
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机指令时,全部或部分地产生按照本申请实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(digital subscriber line,DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质(例如,软盘、硬盘、磁带)、光介质(例如,高密度数字视频光盘(digital video disc,DVD))、或者半导体介质(例如,固态硬盘(solid state disc,SSD))等。In the above-mentioned embodiments, it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented by software, it can be implemented in the form of a computer program product in whole or in part. The computer program product includes one or more computer instructions. When the computer instructions are loaded and executed on the computer, the processes or functions described in the embodiments of the present application are generated in whole or in part. The computer may be a general-purpose computer, a special-purpose computer, a computer network, or other programmable devices. The computer instructions may be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another computer-readable storage medium. For example, the computer instructions may be transmitted from a website, computer, server, or data center. Transmission to another website, computer, server, or data center via wired (such as coaxial cable, optical fiber, digital subscriber line (DSL)) or wireless (such as infrared, wireless, microwave, etc.). The computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server or a data center integrated with one or more available media. The usable medium may be a magnetic medium (for example, a floppy disk, a hard disk, and a magnetic tape), an optical medium (for example, a high-density digital video disc (digital video disc, DVD)), or a semiconductor medium (for example, a solid state disk (solid state disc), SSD)) etc.
在本说明书中使用的术语“部件”、“模块”、“系统”等用于表示计算机相关的实体、硬件、固件、硬件和软件的组合、软件、或执行中的软件。例如,部件可以是但不限于,在处理器上运行的进程、处理器、对象、可执行文件、执行线程、程序或计算机。通过图示,在计算设备上运行的应用和计算设备都可以是部件。一个或多个部件可驻留在进程或执行线程中,部件可位于一个计算机上或分布在2个或更多个计算机之间。此外,这些部件可从在上面存储有各种数据结构的各种计算机可读介质执行。部件可例如根据具有一个或多个数据分组(例如来自与本地系统、分布式系统或网络间的另一部件交互的二个部件的数据,例如通过信号与其它系统交互的互联网)的信号通过本地或远程进程来通信。The terms "component", "module", "system", etc. used in this specification are used to denote computer-related entities, hardware, firmware, a combination of hardware and software, software, or software in execution. For example, a component may be, but is not limited to, a process, a processor, an object, an executable file, an execution thread, a program, or a computer running on the processor. Through the illustration, both the application running on the computing device and the computing device can be components. One or more components can reside in a process or thread of execution, and the components can be located on one computer or distributed between two or more computers. In addition, these components can be executed from various computer readable media having various data structures stored thereon. For example, a component can pass a local signal based on a signal having one or more data packets (for example, data from two components that interact with another component in a local system, a distributed system, or a network, such as the Internet that interacts with other systems through a signal). Or remote process to communicate.
应理解,说明书通篇中提到的“实施例”意味着与实施例有关的特定特征、结构或特性包括在本申请的至少一个实施例中。因此,在整个说明书各个实施例未必一定指相同的实施例。此外,这些特定的特征、结构或特性可以任意适合的方式结合在一个或多个实施例中。It should be understood that the “embodiment” mentioned throughout the specification means that a specific feature, structure, or characteristic related to the embodiment is included in at least one embodiment of the present application. Therefore, the various embodiments throughout the specification do not necessarily refer to the same embodiment. In addition, these specific features, structures or characteristics can be combined in one or more embodiments in any suitable manner.
应理解,在本申请实施例中,编号“第一”、“第二”…仅仅为了区分不同的对象,比如为了区分不同的网络设备,并不对本申请实施例的范围构成限制,本申请实施例并不限于此。It should be understood that in the embodiments of this application, the numbers "first", "second"... are only used to distinguish different objects, such as to distinguish different network devices, and do not limit the scope of the embodiments of this application. Examples are not limited to this.
还应理解,在本申请中,“当…时”、“若”以及“如果”均指在某种客观情况下网元会做出相应的处理,并非是限定时间,且也不要求网元实现时一定要有判断的动作,也不意味着存在其它限定。It should also be understood that in this application, "when", "if" and "if" all mean that the network element will make corresponding processing under certain objective circumstances. It is not a time limit, and the network element is not required. There must be a judgmental action when realizing, and it does not mean that there are other restrictions.
还应理解,在本申请中,“至少一个”是指一个或者多个,“多个”是指两个或两个以上。It should also be understood that in this application, "at least one" refers to one or more, and "multiple" refers to two or more.
还应理解,在本申请各实施例中,“A对应的B”表示B与A相关联,根据A可以确定B。但还应理解,根据A确定B并不意味着仅仅根据A确定B,还可以根据A和/或其它信息确定B。It should also be understood that in the embodiments of the present application, "A corresponding to B" means that B is associated with A, and B can be determined according to A. However, it should also be understood that determining B based on A does not mean that B is determined only based on A, and B can also be determined based on A and/or other information.
还应理解,本文中术语“和/或”,仅仅是一种描述关联对象的关联关系,表示可以 存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。另外,本文中字符“/”,一般表示前后关联对象是一种“或”的关系。It should also be understood that the term “and/or” in this text is only an association relationship describing associated objects, which means that there can be three relationships, for example, A and/or B can mean that there is A alone, and both A and A B, there are three cases of B alone. In addition, the character "/" in this text generally indicates that the associated objects before and after are in an "or" relationship.
本申请中出现的类似于“项目包括如下中的一项或多项:A,B,以及C”表述的含义,如无特别说明,通常是指该项目可以为如下中任一个:A;B;C;A和B;A和C;B和C;A,B和C;A和A;A,A和A;A,A和B;A,A和C,A,B和B;A,C和C;B和B,B,B和B,B,B和C,C和C;C,C和C,以及其他A,B和C的组合。以上是以A,B和C共3个元素进行举例来说明该项目的可选用条目,当表达为“项目包括如下中至少一种:A,B,……,以及X”时,即表达中具有更多元素时,那么该项目可以适用的条目也可以按照前述规则获得。The meaning of the expression similar to "item includes one or more of the following: A, B, and C" in this application, unless otherwise specified, usually means that the item can be any of the following: A; B ; C; A and B; A and C; B and C; A, B and C; A and A; A, A and A; A, A and B; A, A and C, A, B and B; A , C and C; B and B, B, B and B, B, B and C, C and C; C, C and C, and other combinations of A, B and C. The above is an example of the three elements A, B and C to illustrate the optional items of the item. When expressed as "the item includes at least one of the following: A, B, ..., and X", it is in the expression When there are more elements, then the applicable items for the item can also be obtained in accordance with the aforementioned rules.
可以理解的,本申请实施例中,终端设备和/或网络设备可以执行本申请实施例中的部分或全部步骤,这些步骤或操作仅是示例,本申请实施例还可以执行其它操作或者各种操作的变形。此外,各个步骤可以按照本申请实施例呈现的不同的顺序来执行,并且有可能并非要执行本申请实施例中的全部操作。It is understandable that in the embodiments of the present application, the terminal device and/or the network device can perform some or all of the steps in the embodiments of the present application. These steps or operations are only examples, and the embodiments of the present application may also perform other operations or various operations. Deformation of the operation. In addition, each step may be executed in a different order presented in the embodiments of the present application, and it may not be necessary to perform all the operations in the embodiments of the present application.
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。A person of ordinary skill in the art may realize that the units and algorithm steps of the examples described in combination with the embodiments disclosed herein can be implemented by electronic hardware or a combination of computer software and electronic hardware. Whether these functions are executed by hardware or software depends on the specific application and design constraint conditions of the technical solution. Professionals and technicians can use different methods for each specific application to implement the described functions, but such implementation should not be considered beyond the scope of this application.
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。Those skilled in the art can clearly understand that, for the convenience and conciseness of description, the specific working process of the system, device and unit described above can refer to the corresponding process in the foregoing method embodiment, which will not be repeated here.
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。In the several embodiments provided in this application, it should be understood that the disclosed system, device, and method can be implemented in other ways. For example, the device embodiments described above are only illustrative. For example, the division of the units is only a logical function division, and there may be other divisions in actual implementation, for example, multiple units or components may be combined or It can be integrated into another system, or some features can be ignored or not implemented. In addition, the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical, mechanical or other forms.
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。The units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or they may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the objectives of the solutions of the embodiments.
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。In addition, the functional units in the various embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器ROM、随机存取存储器RAM、磁碟或者光盘等各种可以存储程序代码的介质。If the function is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a computer readable storage medium. Based on this understanding, the technical solution of the present application essentially or the part that contributes to the existing technology or the part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium, including Several instructions are used to make a computer device (which may be a personal computer, a server, or a network device, etc.) execute all or part of the steps of the methods described in the various embodiments of the present application. The aforementioned storage media include: U disk, mobile hard disk, read only memory ROM, random access memory RAM, magnetic disk or optical disk and other media that can store program codes.
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟 悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以所述权利要求的保护范围为准。The above are only specific implementations of this application, but the protection scope of this application is not limited to this. Any person skilled in the art can easily think of changes or substitutions within the technical scope disclosed in this application. Should be covered within the scope of protection of this application. Therefore, the protection scope of this application should be subject to the protection scope of the claims.

Claims (31)

  1. 一种传输寻呼信息的方法,其特征在于,包括:A method for transmitting paging information, characterized in that it comprises:
    移动管理网元接收来自终端设备的第一信息;The mobile management network element receives the first information from the terminal device;
    在需要寻呼所述终端设备的情况下,所述移动管理网元根据所述第一信息,对第一寻呼信息进行安全保护;In the case that the terminal device needs to be paged, the mobility management network element performs security protection on the first paging information according to the first information;
    所述移动管理网元向终端设备发送进行安全保护后的第一寻呼信息。The mobility management network element sends the first paging information after security protection to the terminal device.
  2. 如权利要求1所述的方法,其特征在于,所述第一信息用于指示所述终端设备包括多张全球用户标识模块USIM卡或者请求对寻呼信息进行安全保护。The method according to claim 1, wherein the first information is used to indicate that the terminal device includes multiple global user identity module USIM cards or to request security protection of paging information.
  3. 如权利要求1或2所述的方法,其特征在于,所述第一寻呼信息通过非接入层NAS安全上下文进行安全保护。The method according to claim 1 or 2, wherein the first paging information is secured by a non-access stratum NAS security context.
  4. 如权利要求1至3中任一项所述的方法,其特征在于,所述移动管理网元接收来自终端设备的第一信息,包括:The method according to any one of claims 1 to 3, wherein the mobile management network element receiving first information from a terminal device comprises:
    所述移动管理网元接收来自所述终端设备的非接入层NAS消息,所述NAS消息包括所述第一信息。The mobility management network element receives a non-access stratum NAS message from the terminal device, where the NAS message includes the first information.
  5. 如权利要求4所述的方法,其特征在于,所述NAS消息通过NAS安全上下文进行安全保护。The method of claim 4, wherein the NAS message is secured by a NAS security context.
  6. 如权利要求1至5中任一项所述的方法,其特征在于,所述对第一寻呼信息进行安全保护,包括:The method according to any one of claims 1 to 5, wherein the security protection of the first paging information comprises:
    对所述第一寻呼信息进行下述中的一项或多项操作:加密、完整性保护或防重放保护。Perform one or more of the following operations on the first paging message: encryption, integrity protection, or anti-replay protection.
  7. 如权利要求1至6中任一项所述的方法,其特征在于,所述第一寻呼信息包括下述中的一项或多项:寻呼原因、寻呼辅助信息、用户标识、寻呼标识或接入类型。The method according to any one of claims 1 to 6, wherein the first paging information includes one or more of the following: paging reason, paging assistance information, user identification, and paging information. Call ID or access type.
  8. 一种传输寻呼信息的方法,其特征在于,包括:A method for transmitting paging information, characterized in that it comprises:
    终端设备向移动管理网元发送第一信息;The terminal device sends the first information to the mobility management network element;
    所述终端设备接收来自所述移动管理网元的进行安全保护后的第一寻呼信息。The terminal device receives the first paging information after security protection from the mobility management network element.
  9. 如权利要求8所述的方法,其特征在于,所述第一信息用于指示所述终端设备包括多张全球用户标识模块USIM卡或者请求对寻呼信息进行安全保护。The method according to claim 8, wherein the first information is used to indicate that the terminal device includes multiple global user identity module (USIM) cards or to request security protection of paging information.
  10. 如权利要求8或9所述的方法,其特征在于,所述第一寻呼信息通过非接入层NAS安全上下文进行安全保护。The method according to claim 8 or 9, wherein the first paging information is secured by a non-access stratum NAS security context.
  11. 如权利要求8至10中任一项所述的方法,其特征在于,所述终端设备向移动管理网元发送第一信息,包括:The method according to any one of claims 8 to 10, wherein the sending of the first information by the terminal device to a mobility management network element comprises:
    所述终端设备向所述移动管理网元发送非接入层NAS消息,所述NAS消息包括所述第一信息。The terminal device sends a non-access stratum NAS message to the mobility management network element, where the NAS message includes the first information.
  12. 如权利要求11所述的方法,其特征在于,所述NAS消息通过NAS安全上下文进行安全保护。The method according to claim 11, wherein the NAS message is secured by a NAS security context.
  13. 如权利要求8至12中任一项所述的方法,其特征在于,所述安全保护包括下述中的一项或多项:加密、完整性保护或防重放保护。The method according to any one of claims 8 to 12, wherein the security protection includes one or more of the following: encryption, integrity protection, or anti-replay protection.
  14. 如权利要求8至13中任一项所述的方法,其特征在于,所述第一寻呼信息包括 下述中的一项或多项:寻呼原因、寻呼辅助信息、用户标识、寻呼标识或接入类型。The method according to any one of claims 8 to 13, wherein the first paging information includes one or more of the following: paging reason, paging assistance information, user identification, and paging information. Call ID or access type.
  15. 一种通信装置,其特征在于,包括:A communication device, characterized in that it comprises:
    收发单元,用于接收来自终端设备的第一信息;The transceiver unit is used to receive the first information from the terminal device;
    处理单元,用于在需要寻呼所述终端设备的情况下,根据所述第一信息,对第一寻呼信息进行安全保护;A processing unit, configured to perform security protection on the first paging information according to the first information when the terminal device needs to be paged;
    所述收发单元还用于,向终端设备发送进行安全保护后的第一寻呼信息。The transceiving unit is further configured to send the first paging information after security protection to the terminal device.
  16. 如权利要求15所述的装置,其特征在于,所述第一信息用于指示所述终端设备包括多张全球用户标识模块USIM卡或者请求对寻呼信息进行安全保护。The apparatus according to claim 15, wherein the first information is used to indicate that the terminal device includes multiple global user identity module (USIM) cards or to request security protection of paging information.
  17. 如权利要求15或16所述的装置,其特征在于,所述第一寻呼信息通过非接入层NAS安全上下文进行安全保护。The apparatus according to claim 15 or 16, wherein the first paging message is secured by a non-access stratum NAS security context.
  18. 如权利要求15至17中任一项所述的装置,其特征在于,所述收发单元具体用于:The device according to any one of claims 15 to 17, wherein the transceiver unit is specifically configured to:
    接收来自所述终端设备的非接入层NAS消息,所述NAS消息包括所述第一信息。Receiving a non-access stratum NAS message from the terminal device, where the NAS message includes the first information.
  19. 如权利要求18所述的装置,其特征在于,所述NAS消息通过NAS安全上下文进行安全保护。The device of claim 18, wherein the NAS message is secured by a NAS security context.
  20. 如权利要求15至19中任一项所述的装置,其特征在于,所述处理单元具体用于:The device according to any one of claims 15 to 19, wherein the processing unit is specifically configured to:
    对所述第一寻呼信息进行下述中的一项或多项操作:加密、完整性保护或防重放保护。Perform one or more of the following operations on the first paging message: encryption, integrity protection, or anti-replay protection.
  21. 如权利要求15至20中任一项所述的装置,其特征在于,所述第一寻呼信息包括下述中的一项或多项:寻呼原因、寻呼辅助信息、用户标识、寻呼标识或接入类型。The apparatus according to any one of claims 15 to 20, wherein the first paging information includes one or more of the following: paging reason, paging assistance information, user identification, and paging information. Call ID or access type.
  22. 一种通信装置,其特征在于,包括:A communication device, characterized in that it comprises:
    收发单元,用于向移动管理网元发送第一信息;The transceiver unit is configured to send the first information to the mobility management network element;
    所述收发单元还用于,接收来自所述移动管理网元的进行安全保护后的第一寻呼信息。The transceiving unit is further configured to receive first paging information after security protection from the mobility management network element.
  23. 如权利要求22所述的装置,其特征在于,所述第一信息用于指示所述装置包括多张全球用户标识模块USIM卡或者请求对寻呼信息进行安全保护。The device according to claim 22, wherein the first information is used to indicate that the device includes multiple global user identity module (USIM) cards or to request security protection of paging information.
  24. 如权利要求22或23所述的装置,其特征在于,所述第一寻呼信息通过非接入层NAS安全上下文进行安全保护。The apparatus according to claim 22 or 23, wherein the first paging information is secured by a non-access stratum NAS security context.
  25. 如权利要求22至24中任一项所述的装置,其特征在于,所述收发单元具体用于:The device according to any one of claims 22 to 24, wherein the transceiver unit is specifically configured to:
    向所述移动管理网元发送非接入层NAS消息,所述NAS消息包括所述第一信息。Send a non-access stratum NAS message to the mobility management network element, where the NAS message includes the first information.
  26. 如权利要求25所述的装置,其特征在于,所述NAS消息通过NAS安全上下文进行安全保护。The device of claim 25, wherein the NAS message is secured by a NAS security context.
  27. 如权利要求22至26中任一项所述的装置,其特征在于,所述安全保护包括下述中的一项或多项:加密、完整性保护或防重放保护。The device according to any one of claims 22 to 26, wherein the security protection includes one or more of the following: encryption, integrity protection, or anti-replay protection.
  28. 如权利要求22至27中任一项所述的装置,其特征在于,所述第一寻呼信息包括下述中的一项或多项:寻呼原因、寻呼辅助信息、用户标识、寻呼标识或接入类型。The apparatus according to any one of claims 22 to 27, wherein the first paging information includes one or more of the following: paging reason, paging assistance information, user identification, and paging information. Call ID or access type.
  29. 一种通信装置,其特征在于,包括处理器和接口电路,所述接口电路用于接收来自所述通信装置之外的其它通信装置的信号并传输至所述处理器或将来自所述处理器的信号发送给所述通信装置之外的其它通信装置,所述处理器通过逻辑电路或执行代码指令用于实现如权利要求1至7中任一项所述的方法,或者用于实现如权利要求8至14中任一项所述的方法。A communication device, characterized by comprising a processor and an interface circuit, the interface circuit is used to receive signals from other communication devices other than the communication device and transmit them to the processor or transfer signals from the processor The signal is sent to other communication devices other than the communication device, and the processor is used to implement the method according to any one of claims 1 to 7 through logic circuits or execute code instructions, or to implement The method of any one of claims 8-14.
  30. 一种计算机可读存储介质,其特征在于,包括:所述计算机可读存储介质存储有计算机程序,当所述计算机程序被运行时,实现如权利要求1至14中任一项所述的方法。A computer-readable storage medium, comprising: the computer-readable storage medium stores a computer program, and when the computer program is executed, the method according to any one of claims 1 to 14 is implemented .
  31. 一种芯片,其特征在于,包括处理器,所述处理器与存储器相连,所述存储器用于存储计算机程序,所述处理器用于执行所述存储器中存储的计算机程序,以使得所述芯片执行如权利要求1至14中任一项所述的方法。A chip, characterized by comprising a processor, the processor is connected to a memory, the memory is used to store a computer program, the processor is used to execute the computer program stored in the memory, so that the chip executes The method of any one of claims 1-14.
PCT/CN2021/080482 2020-03-12 2021-03-12 Method for transmitting paging information and communication apparatus WO2021180209A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202010171168.4A CN113395697B (en) 2020-03-12 2020-03-12 Method and communication device for transmitting paging information
CN202010171168.4 2020-03-12

Publications (1)

Publication Number Publication Date
WO2021180209A1 true WO2021180209A1 (en) 2021-09-16

Family

ID=77615634

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/080482 WO2021180209A1 (en) 2020-03-12 2021-03-12 Method for transmitting paging information and communication apparatus

Country Status (2)

Country Link
CN (1) CN113395697B (en)
WO (1) WO2021180209A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
RU2818276C1 (en) * 2023-10-09 2024-04-27 Общество С Ограниченной Ответственностью "Софтайм" Method of counteracting malicious attacks aimed at listening to paging messages transmitted to subscriber devices of wireless communication network

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117675214A (en) * 2022-08-26 2024-03-08 维沃移动通信有限公司 Paging message processing method, device, communication equipment and readable storage medium
CN117221884B (en) * 2023-11-08 2024-02-23 深圳简谱技术有限公司 Base station system information management method and system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101080036A (en) * 2006-05-25 2007-11-28 华为技术有限公司 Method for processing call in wireless communication network
CN102026174A (en) * 2009-09-17 2011-04-20 中兴通讯股份有限公司 Method and device for maintaining secrecy of user identification in paging procedure
CN110536290A (en) * 2018-05-24 2019-12-03 华为技术有限公司 A kind of paging processing method and device

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11039307B2 (en) * 2017-01-04 2021-06-15 Telefonaktiebolaget Lm Ericsson (Publ) Method and network node for paging in a wireless communication system
CN110769500A (en) * 2018-07-28 2020-02-07 华为技术有限公司 Communication method and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101080036A (en) * 2006-05-25 2007-11-28 华为技术有限公司 Method for processing call in wireless communication network
CN102026174A (en) * 2009-09-17 2011-04-20 中兴通讯股份有限公司 Method and device for maintaining secrecy of user identification in paging procedure
CN110536290A (en) * 2018-05-24 2019-12-03 华为技术有限公司 A kind of paging processing method and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
ANONYMOUS: "3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Study on system enablers for devices having multiple Universal Subscriber Identity Modules (USIM) (Release 17)", 3GPP STANDARD; TECHNICAL REPORT; 3GPP TR 23.761, vol. SA WG2, no. V0.2.0, 6 December 2019 (2019-12-06), pages 1 - 19, XP051840712 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
RU2818276C1 (en) * 2023-10-09 2024-04-27 Общество С Ограниченной Ответственностью "Софтайм" Method of counteracting malicious attacks aimed at listening to paging messages transmitted to subscriber devices of wireless communication network

Also Published As

Publication number Publication date
CN113395697A (en) 2021-09-14
CN113395697B (en) 2023-09-22

Similar Documents

Publication Publication Date Title
US11582602B2 (en) Key obtaining method and device, and communications system
US20220095210A1 (en) Handling a ue that is in the idle state
US10798082B2 (en) Network authentication triggering method and related device
WO2017133021A1 (en) Security processing method and relevant device
WO2021136211A1 (en) Method and device for determining authorization result
US20210092608A1 (en) Security Context Obtaining Method and Apparatus, and Communications System
WO2020119815A1 (en) Security context isolation method, apparatus and system
WO2021180209A1 (en) Method for transmitting paging information and communication apparatus
US20220174761A1 (en) Communications method and apparatus
WO2019158117A1 (en) System and method for providing security in a wireless communications system with user plane separation
WO2019096279A1 (en) Secure communication method and device
JP2018530261A (en) Wireless communication
WO2021051974A1 (en) Security protection method and apparatus for air interface information
WO2020151710A1 (en) Method for determining security protection mode, device, and system
WO2021031054A1 (en) Communication method and apparatus
US20230079012A1 (en) Communication method and communication apparatus
WO2022148469A1 (en) Security protection method, apparatus and system
WO2021073382A1 (en) Registration method and apparatus
KR102642804B1 (en) Multi-band communication method and device
WO2021212497A1 (en) Security authentication method and apparatus, and device and storage medium
WO2023072271A1 (en) Method and apparatus for managing security context
WO2023246457A1 (en) Security decision negotiation method and network element
WO2023213191A1 (en) Security protection method and communication apparatus
US20230354028A1 (en) Method, system, and apparatus for generating key for inter-device communication
WO2021254172A1 (en) Communication method and related apparatus

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21767533

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21767533

Country of ref document: EP

Kind code of ref document: A1