WO2021219000A1 - 一种确定服务质量流的方法及设备 - Google Patents

一种确定服务质量流的方法及设备 Download PDF

Info

Publication number
WO2021219000A1
WO2021219000A1 PCT/CN2021/090525 CN2021090525W WO2021219000A1 WO 2021219000 A1 WO2021219000 A1 WO 2021219000A1 CN 2021090525 W CN2021090525 W CN 2021090525W WO 2021219000 A1 WO2021219000 A1 WO 2021219000A1
Authority
WO
WIPO (PCT)
Prior art keywords
security policy
qos flow
service information
information
service
Prior art date
Application number
PCT/CN2021/090525
Other languages
English (en)
French (fr)
Inventor
张博
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2021219000A1 publication Critical patent/WO2021219000A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/16Central resource management; Negotiation of resources or communication parameters, e.g. negotiating bandwidth or QoS [Quality of Service]
    • H04W28/24Negotiating SLA [Service Level Agreement]; Negotiating QoS [Quality of Service]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/16Central resource management; Negotiation of resources or communication parameters, e.g. negotiating bandwidth or QoS [Quality of Service]

Definitions

  • the embodiments of the present application relate to the field of communication technologies, and in particular, to a method and device for determining a service quality flow.
  • two user equipment UEs can directly communicate based on the PC5 protocol.
  • a certain characteristic transmission guarantee is provided for the transmission of service data through a quality of service flow (QoS flow).
  • QoS flow quality of service flow
  • the UE needs to determine the QoS flow before transmitting service data.
  • the embodiment of the present application provides a method for determining a quality of service flow, which can avoid defects in the determined QoS flow that does not consider a security policy.
  • the first aspect of the embodiments of the present application provides a method for determining a quality of service flow, including:
  • the first user equipment UE obtains a first security policy corresponding to the first service information, where the first security policy is a security policy adopted when the first UE and the second UE transmit service data corresponding to the first service information.
  • the first security strategy can be either a confidentiality protection strategy or an integrity protection strategy; when the first security strategy is a confidentiality protection strategy, the first security strategy can specifically be confidentiality protection and preference for confidentiality protection. And confidentiality protection is not required; when the first security policy is integrity protection, the first security policy can be that integrity protection is required, integrity protection is inclined, and integrity protection is not required.
  • the first UE determines the first QoS flow corresponding to the first service information according to the first security policy, and the first QoS flow is used by the first UE and the second UE to transmit service data corresponding to the first service information.
  • the first QoS flow may be a pre-established QoS flow used to transmit other service information, or a new QoS flow.
  • the first QoS flow may be represented by QoS information, where the QoS information may include a flow identifier.
  • the first UE determines the first security policy according to the first service information, and then determines the first QoS flow according to the first security policy.
  • the embodiments of the present application provide the first implementation manner of the first aspect.
  • the first UE determining the first QoS flow corresponding to the first service information according to the first security policy includes:
  • the first UE determines the first QoS flow corresponding to the first service information according to the first security policy and N pre-established QoS flows, where N is a positive integer.
  • the first QoS flow may be one of the N QoS flows, and the first QoS flow may not be included in the N QoS flows.
  • the first QoS flow is determined according to the first security policy and the pre-established N QoS flows.
  • the QoS flow is realized Reuse, thereby saving resources.
  • the embodiments of this application provide the second implementation manner of the first aspect.
  • the first UE determines according to the first security policy and N pre-established QoS flows.
  • the first QoS flow corresponding to the first service information includes:
  • the first UE determines the second QoS flow as the first QoS flow corresponding to the first service information, and the second QoS flow is among the N QoS flows One of them.
  • the second QoS flow is used as the first QoS flow to transmit the service data corresponding to the first service information, which realizes QoS flow multiplexing while avoiding This is a safety contradiction.
  • the embodiments of this application provide the second implementation manner of the first aspect.
  • the first UE determines according to the first security policy and N pre-established QoS flows.
  • the first QoS flow corresponding to the first service information includes:
  • the first UE determines the second QoS flow as The first QoS flow and the second QoS flow corresponding to the first service information are one of the N QoS flows.
  • the non-secure requirements may be transmission rate requirements and delay requirements, etc.
  • the non-secure information may be bandwidth, delay, etc.
  • a UE determining the first QoS flow corresponding to the first service information according to the first security policy and N pre-established QoS flows includes:
  • the first UE determines the third QoS flow as the first QoS flow corresponding to the first service information, and the third QoS flow is not Included in N QoS flows.
  • the third QoS flow that is not included in the N QoS flows is regarded as the first QoS flow, that is, a newly established QoS flow One QoS flow.
  • the first UE determining the first QoS flow corresponding to the first service information according to the first security policy includes:
  • the first UE determines the first protection mode corresponding to the first service information according to the first security policy, and the first protection mode is the protection mode adopted when the first UE and the second UE transmit the service data corresponding to the first service information.
  • the first protection method can be integrity protection for business data; when the first security policy is inclined to integrity protection , The first protection method can be to protect the integrity of the business data or not to protect the integrity of the business data; when the first security policy is that integrity protection is not required, the first protection method can be to not complete the business data Sexual protection.
  • the first UE determines the first QoS flow corresponding to the first service information according to the first protection mode.
  • This embodiment provides another feasible solution for determining the first QoS flow, that is, first determine the first protection mode according to the first security policy, and then determine the first QoS flow according to the first protection mode.
  • the first UE determining the first QoS flow corresponding to the first service information according to the first protection mode includes:
  • the first UE determines the first QoS flow corresponding to the first service information according to the first protection mode and the pre-established N QoS flows.
  • the first QoS flow is determined according to the first protection mode.
  • the determined first QoS flow is one of the N QoS flows, the multiplexing of the QoS flows is realized, thereby saving resources.
  • the first UE determines the corresponding first service information according to the first protection mode and the pre-established N QoS flows.
  • the first QoS flow includes:
  • the first UE determines the second QoS flow as the first QoS flow corresponding to the first service information, and the second QoS flow is among the N QoS flows One of them.
  • the second QoS flow is used as the first QoS flow to transmit the service data corresponding to the first service information, which realizes QoS flow multiplexing while avoiding This is a safety contradiction.
  • the first UE determines the corresponding to the first service information according to the first protection mode and the pre-established N QoS flows.
  • the first QoS flow includes:
  • the first UE determines the second QoS flow as The first QoS flow and the second QoS flow corresponding to the first service information are one of the N QoS flows.
  • the non-secure requirements may be transmission rate requirements and delay requirements, etc.
  • the non-secure information may be bandwidth, delay, etc.
  • the first protection mode is the same as the second protection mode, thereby avoiding security contradictions; at the same time, it is ensured that the second QoS flow can satisfy the first service information. Corresponding non-safety requirements.
  • a UE determining the first QoS flow corresponding to the first service information according to the first protection mode and N pre-established QoS flows includes:
  • the first UE determines the third QoS flow as the first QoS flow corresponding to the first service information, and the third QoS flow is not Included in N QoS flows.
  • the third QoS flow that is not included in the N QoS flows is regarded as the first QoS flow, that is, a newly established QoS flow One QoS flow.
  • the fifth implementation manner based on the first aspect, or the sixth implementation manner of the first aspect, or the seventh implementation manner of the first aspect, or the eighth implementation manner of the first aspect, or the first aspect Nine implementation manners.
  • the embodiments of the present application provide the tenth implementation manner of the first aspect. Before the first UE determines the first protection method corresponding to the first service information according to the first security policy, the method further includes:
  • the first UE obtains the first information of the second UE.
  • the first information is associated with the first security policy and may be used to characterize the ability of the second UE to transmit service data corresponding to the first service information.
  • the first information may include a variety of information, for example, it may include an integrity protection transmission rate.
  • the first UE determining the first protection mode corresponding to the first service information according to the first security policy includes:
  • the first UE determines the first protection mode corresponding to the first service information according to the first security policy, the first information, the preset second information, and the non-security requirements corresponding to the first service information, and the second information is related to the first security policy
  • the connection can be used to characterize the ability of the first UE to transmit service data corresponding to the first service information.
  • the second information may also be multiple types of information, for example, it may include an integrity protection transmission rate.
  • This embodiment provides a feasible solution for determining the first protection mode.
  • the solution considers the first information of the second UE, the second information of the first UE, the non-security requirements corresponding to the first service information, and the first security policy. , So that the determined first protection mode is more suitable for the service data corresponding to the first service information, so that the first QoS flow determined according to the first protection mode can better transmit the service data corresponding to the first service information.
  • the embodiments of the present application provide the eleventh implementation manner of the first aspect.
  • the non-safety requirement is the target transmission rate
  • the first information includes the first integrity protection transmission rate
  • the second The information includes the second integrity protection transmission rate.
  • the first UE determining the first protection mode corresponding to the first service information according to the first security policy, the first information, the preset second information, and the non-security requirements corresponding to the first service information includes:
  • the first security policy indicates that it is inclined to perform integrity protection on the service data corresponding to the first service information
  • the first integrity protection rate is less than the target transmission rate and/or the second integrity protection rate is less than the target transmission rate. Then the first UE determines that the first protection mode corresponding to the first service information is not to perform integrity protection on the service data corresponding to the first service information.
  • the first integrity protection rate is less than the target transmission rate, it means that the second UE cannot perform integrity protection on the service data corresponding to the first service information; if the second integrity protection rate is less than the target transmission rate, it means that the first UE cannot Integrity protection is performed on the service data corresponding to the first service information; therefore, if the first security policy indicates that it is inclined to perform integrity protection on the service data corresponding to the first service information, the first UE determines that the first protection mode is not correct. Integrity protection is performed on the business data corresponding to one business information, thereby avoiding that the first protection method is to perform integrity protection on the business data corresponding to the first business information, but it is actually impossible to perform integrity protection on the business data corresponding to the first business information. The situation of protection.
  • the application example provides the twelfth embodiment of the first aspect.
  • the method Also includes:
  • the first UE obtains first information of the second UE, where the first information is associated with the first security policy;
  • the method further includes:
  • the first UE determines according to the first security policy that the first information and the second information of the first UE can meet the non-security requirements corresponding to the first service information, and the second information is associated with the first security policy.
  • the embodiments of the present application provide the thirteenth implementation manner of the first aspect.
  • the non-safety requirement is the target transmission rate
  • the first information includes the first integrity protection transmission rate
  • the second information includes the second integrity protection transmission rate
  • the determination by the first UE according to the first security policy that the first information and the second information of the first UE can meet the non-security requirements corresponding to the first service information includes:
  • the first UE Based on the first security policy indicating that the integrity protection of the service data corresponding to the first service information is required, the first UE compares its own second integrity protection transmission rate and the relative size of the target transmission rate, and compares the first integrity protection The relative size of the transmission rate and the target transmission rate.
  • the first UE determines that its second integrity protection transmission rate is greater than or equal to the target transmission rate corresponding to the first service information, and the first integrity protection transmission rate is greater than or equal to the target transmission rate corresponding to the first service information.
  • the first UE determines that the second integrity protection transmission rate is greater than or equal to the target transmission rate corresponding to the first service information, and the first integrity protection transmission rate is greater than or equal to the target transmission rate corresponding to the first service information This ensures that the first UE and the second UE can protect the integrity of the service data corresponding to the first service information.
  • the first user equipment UE acquiring the first security policy corresponding to the first service information includes:
  • the first UE receives the preset security policy of the second UE, and the preset security policy of the second UE corresponds to the first service information;
  • the first UE determines the first security policy according to the preset security policy of the second UE and the preset security policy of the first UE, and the preset security policy of the first UE corresponds to the first service information.
  • This implementation manner provides a feasible solution for the first UE to obtain the first security policy, that is, combining the preset security policies of the first UE and the second UE to finally determine the first security policy.
  • the first user equipment UE acquiring the first security policy corresponding to the first service information includes:
  • the first UE sends the preset security policy of the first UE to the second UE, so that the second UE determines the first security policy according to the preset security policy of the second UE and the preset security policy of the first UE;
  • the first UE receives the first security policy from the second UE.
  • the first UE sends its own preset security policy to the second UE, and then the second UE combines the preset security of the second UE The policy and the preset security policy of the first UE finally determine the first security policy, and finally the first security policy is sent back to the first UE.
  • the embodiments of this application provide the sixteenth implementation manner of the first aspect.
  • the Methods also include:
  • the first UE Based on the preset security policy of the first UE indicating that the service data corresponding to the first service information needs to be integrity protected, the first UE compares its own second integrity protection transmission rate and the relative magnitude of the target transmission rate; finally, the first UE The UE determines that its second integrity protection transmission rate is greater than or equal to the target transmission rate corresponding to the first service information.
  • the first UE determines that its second integrity protection transmission rate is greater than or equal to the target transmission rate corresponding to the first service information This ensures that the first UE can perform integrity protection on the service data corresponding to the first service information.
  • the second aspect of the embodiments of the present application provides a method for determining a quality of service flow, including:
  • the first UE obtains a first security policy corresponding to the first service information, where the first security policy is a security policy adopted when the first UE and the second UE transmit service data corresponding to the first service information.
  • the first security strategy can be either a confidentiality protection strategy or an integrity protection strategy; when the first security strategy is a confidentiality protection strategy, the first security strategy can specifically be confidentiality protection and preference for confidentiality protection. And confidentiality protection is not required; when the first security policy is integrity protection, the first security policy can be that integrity protection is required, integrity protection is inclined, and integrity protection is not required.
  • the first UE determines the first protection mode corresponding to the first service information according to the first security policy.
  • the first protection mode is the protection mode adopted when the first UE and the second UE transmit the service data corresponding to the first service information, where it is determined There are many ways to protect the first way.
  • the first UE sends the first protection mode to the second UE, so that the second UE determines the first QoS flow corresponding to the first service information according to the first protection mode.
  • the first QoS flow is used for the first UE and the second UE to transmit the first QoS flow.
  • the first UE receives the QoS information from the second UE.
  • the QoS information is used to characterize the first QoS flow, where the QoS information may include a flow identifier.
  • the first QoS flow may be a pre-established QoS flow used to transmit other service information, or a new QoS flow.
  • the first UE sends the first protection mode to the second UE, and the second UE determines the first QoS flow according to the first protection mode.
  • the determined first QoS flow is one of the N QoS flows At this time, the multiplexing of QoS flow is realized, thereby saving resources.
  • the embodiments of the present application provide the first implementation manner of the second aspect. Before the first UE determines the first protection mode corresponding to the first service information according to the first security policy, the method further includes:
  • the first UE obtains the first information of the second UE.
  • the first information is associated with the first security policy and may be used to characterize the ability of the second UE to transmit service data corresponding to the first service information.
  • the first information may include a variety of information, for example, it may include an integrity protection transmission rate.
  • the first UE determining the first protection mode corresponding to the first service information according to the first security policy includes:
  • the first UE determines the first protection mode corresponding to the first service information according to the first security policy, the first information, the preset second information, and the non-security requirements corresponding to the first service information, and the second information is related to the first security policy
  • the connection can be used to characterize the ability of the first UE to transmit service data corresponding to the first service information.
  • the second information may also be multiple types of information, for example, it may include an integrity protection transmission rate.
  • This embodiment provides a feasible solution for determining the first protection mode.
  • the solution considers the first information of the second UE, the second information of the first UE, the non-security requirements corresponding to the first service information, and the first security policy. , So that the determined first protection mode is more suitable for the business data corresponding to the first business information.
  • the embodiments of the present application provide the second implementation manner of the second aspect.
  • the non-safety requirement is the target transmission rate
  • the first information includes the first integrity protection transmission rate
  • the second information Including the second integrity protection transmission rate.
  • the first UE determining the first protection mode corresponding to the first service information according to the first security policy, the first information, the preset second information, and the non-security requirements corresponding to the first service information includes:
  • the first security policy indicates that it is inclined to perform integrity protection on the service data corresponding to the first service information
  • the first integrity protection rate is less than the target transmission rate and/or the second integrity protection rate is less than the target transmission rate. Then the first UE determines that the first protection mode corresponding to the first service information is not to perform integrity protection on the service data corresponding to the first service information.
  • the first integrity protection rate is less than the target transmission rate, it means that the second UE cannot perform integrity protection on the service data corresponding to the first service information; if the second integrity protection rate is less than the target transmission rate, it means that the first UE cannot Integrity protection is performed on the service data corresponding to the first service information; therefore, if the first security policy indicates that it is inclined to perform integrity protection on the service data corresponding to the first service information, the first UE determines that the first protection mode is not correct. Integrity protection is performed on the business data corresponding to one business information, thereby avoiding that the first protection method is to perform integrity protection on the business data corresponding to the first business information, but it is actually impossible to perform integrity protection on the business data corresponding to the first business information. The situation of protection.
  • the third aspect of the embodiments of the present application provides a method for determining a quality of service flow, including:
  • the first UE receives the first protection mode from the second UE, where the first protection mode is the protection mode used when the first UE and the second UE transmit service data corresponding to the first service information;
  • the first UE determines the first QoS flow corresponding to the first service information according to the first protection mode, the first QoS flow is used by the first UE and the second UE to transmit service data corresponding to the first service information, and N is a positive integer;
  • the first UE sends QoS information to the second UE.
  • the QoS information is used to characterize the first QoS flow, where the QoS information may include a flow identifier.
  • the first UE determines the first QoS flow according to the first protection mode, and then sends the QoS information corresponding to the first QoS flow to the second UE.
  • the first UE determining the first QoS flow corresponding to the first service information according to the first protection mode includes:
  • the first UE determines the first QoS flow corresponding to the first service information according to the first protection mode and the pre-established N QoS flows.
  • the first UE determines the first QoS flow according to the first protection mode, and then sends the QoS information corresponding to the first QoS flow to the second UE; when the determined first QoS flow is N QoS flows One of the time, realizes the multiplexing of QoS flow, thus saving resources.
  • the first UE determines the corresponding to the first service information according to the first protection mode and the pre-established N QoS flows.
  • the first QoS flow includes:
  • the first UE determines the second QoS flow as the first QoS flow corresponding to the first service information, and the second QoS flow is among the N QoS flows One of them.
  • the second QoS flow is used as the first QoS flow to transmit the service data corresponding to the first service information, which realizes QoS flow multiplexing while avoiding This is a safety contradiction.
  • the first UE determines the corresponding first service information according to the first protection mode and the pre-established N QoS flows.
  • the first QoS flow includes:
  • the first UE determines the second QoS flow as The first QoS flow and the second QoS flow corresponding to the first service information are one of the N QoS flows.
  • the non-secure requirements may be transmission rate requirements and delay requirements, etc.
  • the non-secure information may be bandwidth, delay, etc.
  • the first protection mode is the same as the second protection mode, thereby avoiding security contradictions; at the same time, it is ensured that the second QoS flow can satisfy the first service information. Corresponding non-safety requirements.
  • a UE determining the first QoS flow corresponding to the first service information according to the first protection mode and N pre-established QoS flows includes:
  • the first UE determines the third QoS flow as the first QoS flow corresponding to the first service information, and the third QoS flow is not Included in N QoS flows.
  • the third QoS flow that is not included in the N QoS flows is regarded as the first QoS flow, that is, a newly established QoS flow One QoS flow.
  • a fourth aspect of the embodiments of the present application provides an apparatus for determining a quality of service flow, including:
  • An obtaining unit configured to obtain a first security policy corresponding to the first service information, where the first security policy is a security policy adopted when the first UE and the second UE transmit service data corresponding to the first service information;
  • the determining unit is configured to determine the first QoS flow corresponding to the first service information according to the first security policy, and the first QoS flow is used for the first UE and the second UE to transmit service data corresponding to the first service information.
  • the embodiments of the present application provide the first implementation manner of the fourth aspect.
  • the determining unit is configured to determine the first service information according to the first security policy and the N pieces of pre-established QoS flows.
  • N is a positive integer.
  • the first QoS flow may be one of the N QoS flows, and the first QoS flow may not be included in the N QoS flows.
  • the first QoS flow is determined according to the first security policy and the pre-established N QoS flows.
  • the QoS flow is realized Reuse, thereby saving resources.
  • the embodiments of the present application provide the second implementation manner of the fourth aspect.
  • the determining unit is used when the first security policy corresponds to the second QoS flow.
  • the second QoS flow is determined as the first QoS flow corresponding to the first service information, and the second QoS flow is one of the N QoS flows.
  • the second QoS flow is used as the first QoS flow to transmit the service data corresponding to the first service information, which realizes QoS flow multiplexing while avoiding This is a safety contradiction.
  • the embodiments of the present application provide the second implementation manner of the fourth aspect.
  • the determining unit is used when the first security policy corresponds to the second QoS flow.
  • the second security policy is the same and the non-secure information corresponding to the second QoS flow meets the non-secure requirements corresponding to the first service information
  • the second QoS flow is determined to be the first QoS flow corresponding to the first service information
  • the non-secure requirements may be transmission rate requirements and delay requirements, etc.
  • the non-secure information may be bandwidth, delay, etc.
  • the examples of this application provide the fourth implementation manner of the fourth aspect, and it is determined
  • the unit is used to determine the third QoS flow as the first QoS flow corresponding to the first service information and the third QoS flow when the first security policy and the security policy corresponding to any one of the N QoS flows are not the same Not included in N QoS flows.
  • the third QoS flow that is not included in the N QoS flows is regarded as the first QoS flow, that is, a newly established QoS flow One QoS flow.
  • the embodiments of the present application provide a fifth implementation manner of the fourth aspect.
  • the determining unit is configured to determine the first protection mode corresponding to the first service information according to the first security policy, and the first protection mode is the first protection mode.
  • the determining unit is configured to determine the first service information according to the first protection mode and the N pieces of pre-established QoS flows. The corresponding first QoS flow.
  • the embodiments of the present application provide the seventh implementation manner of the fourth aspect.
  • the determining unit is used when the first protection mode is the same as the second protection mode corresponding to the second QoS flow.
  • the second QoS flow is determined as the first QoS flow corresponding to the first service information, and the second QoS flow is one of the N QoS flows.
  • the second QoS flow is used as the first QoS flow to transmit the service data corresponding to the first service information, which realizes QoS flow multiplexing while avoiding This is a safety contradiction.
  • the embodiments of the present application provide the eighth implementation manner of the fourth aspect.
  • the determining unit is used when the first protection mode is the same as the second protection mode corresponding to the second QoS flow. And when the non-secure information corresponding to the second QoS flow meets the non-secure requirements corresponding to the first service information, the second QoS flow is determined as the first QoS flow corresponding to the first service information, and the second QoS flow is among the N QoS flows One of them.
  • the non-secure requirements may be transmission rate requirements and delay requirements, etc.
  • the non-secure information may be bandwidth, delay, etc.
  • the first protection mode is the same as the second protection mode, thereby avoiding security contradictions; at the same time, it is ensured that the second QoS flow can satisfy the first service information. Corresponding non-safety requirements.
  • the examples of this application provide the ninth implementation manner of the fourth aspect, and it is determined
  • the unit is used to determine the third QoS flow as the first QoS flow corresponding to the first service information and the third QoS flow when the first protection mode and the protection mode corresponding to any one of the N QoS flows are not the same Not included in N QoS flows.
  • the third QoS flow that is not included in the N QoS flows is regarded as the first QoS flow, that is, a newly established QoS flow One QoS flow.
  • the acquiring unit is also used to acquire first information of the second UE.
  • the first information is associated with the first security policy and can be used to characterize The ability of the second UE to transmit service data corresponding to the first service information.
  • the first information may include a variety of information, for example, it may include an integrity protection transmission rate.
  • the determining unit is configured to determine the first protection mode corresponding to the first business information according to the first security policy, the first information, the preset second information, and the non-security requirements corresponding to the first business information, and the second information and the first security
  • the policy correlation can be used to characterize the ability of the first UE to transmit service data corresponding to the first service information.
  • the second information may also be multiple types of information, for example, it may include an integrity protection transmission rate.
  • This embodiment provides a feasible solution for determining the first protection mode.
  • the first information of the second UE, the second information of the first UE, the non-security requirements corresponding to the first service information, and the first information are considered.
  • a security strategy is considered.
  • the embodiments of the present application provide the eleventh implementation manner of the fourth aspect.
  • the non-safety requirement is the target transmission rate
  • the first information includes the first integrity protection transmission rate
  • the second The information includes the second integrity protection transmission rate.
  • the determining unit is used for when the first security policy indicates that the service data corresponding to the first service information tends to be integrity protected, when the first integrity protection rate is less than the target transmission rate and/or the second integrity protection rate When it is less than the target transmission rate, it is determined that the first protection mode corresponding to the first service information is not to perform integrity protection on the service data corresponding to the first service information.
  • the application example provides the twelfth embodiment of the fourth aspect.
  • obtain The unit is also used to: obtain first information of the second UE, where the first information is associated with the first security policy;
  • the determining unit is further configured to determine, according to the first security policy, that the first information and the second information of the first UE can meet the non-security requirements corresponding to the first service information, and the second information is associated with the first security policy.
  • the embodiments of the present application provide the thirteenth implementation manner of the fourth aspect.
  • the non-safety requirement is the target transmission rate
  • the first information includes the first integrity protection transmission rate
  • the first information includes the first integrity protection transmission rate.
  • the second information includes the second integrity protection transmission rate;
  • the determining unit is configured to indicate the need to perform integrity protection on the service data corresponding to the first service information based on the first security policy, and determine that its own second integrity protection transmission rate is greater than or equal to the target transmission rate corresponding to the first service information, and The first integrity protection transmission rate is greater than or equal to the target transmission rate corresponding to the first service information.
  • the fourth aspect or the first implementation of the fourth aspect, or the second implementation of the fourth aspect, or the third implementation of the fourth aspect, or the fourth implementation of the fourth aspect, or The fifth embodiment of the fourth aspect, or the sixth embodiment of the fourth aspect, or the seventh embodiment of the fourth aspect, or the eighth embodiment of the fourth aspect, or the ninth aspect of the fourth aspect Embodiments, or the tenth embodiment of the fourth aspect, or the eleventh embodiment of the fourth aspect, or the twelfth embodiment of the first aspect, or the thirteenth embodiment of the first aspect
  • the embodiments of the present application provide a fourteenth implementation manner of the fourth aspect.
  • the acquiring unit is configured to receive the preset security policy of the second UE, and the preset security policy of the second UE is related to the first service.
  • the first security policy is determined according to the preset security policy of the second UE and the preset security policy of the first UE, and the preset security policy of the first UE corresponds to the first service information.
  • the fourth aspect or the first implementation of the fourth aspect, or the second implementation of the fourth aspect, or the third implementation of the fourth aspect, or the fourth implementation of the fourth aspect, or The fifth embodiment of the fourth aspect, or the sixth embodiment of the fourth aspect, or the seventh embodiment of the fourth aspect, or the eighth embodiment of the fourth aspect, or the ninth aspect of the fourth aspect Embodiments, or the tenth embodiment of the fourth aspect, or the eleventh embodiment of the fourth aspect, or the twelfth embodiment of the first aspect, or the thirteenth embodiment of the first aspect
  • the embodiments of the present application provide the fifteenth implementation manner of the fourth aspect.
  • the acquiring unit is configured to send the preset security policy of the first UE to the second UE, so that the second UE is based on the second UE.
  • the preset security policy of the first UE and the preset security policy of the first UE determine the first security policy;
  • the embodiments of the present application provide the sixteenth implementation manner of the fourth aspect, and the determining unit is further configured to determine that its own second integrity protection transmission rate is greater than or equal to the first service The target transmission rate corresponding to the message.
  • a fifth aspect of the embodiments of the present application provides an apparatus for determining a quality of service flow, including:
  • An obtaining unit configured to obtain a first security policy corresponding to the first service information, where the first security policy is a security policy adopted when the first UE and the second UE transmit service data corresponding to the first service information;
  • the determining unit is configured to determine the first protection mode corresponding to the first service information according to the first security policy, where the first protection mode is the protection mode adopted when the first UE and the second UE transmit the service data corresponding to the first service information, There are many ways to determine the first protection mode.
  • the sending unit is used to send the first protection mode to the second UE, so that the second UE determines the first QoS flow corresponding to the first service information according to the first protection mode, and the first QoS flow is used for transmission between the first UE and the second UE First business data;
  • the receiving unit is configured to receive QoS information from the second UE, where the QoS information is used to characterize the first QoS flow, where the QoS information may include a flow identifier.
  • the embodiments of the present application provide the first implementation manner of the fifth aspect.
  • the obtaining unit is further configured to obtain first information of the second UE.
  • the first information is associated with the first security policy and can be used for It characterizes the ability of the second UE to transmit the service data corresponding to the first service information.
  • the first information may include a variety of information, for example, it may include an integrity protection transmission rate.
  • the determining unit is configured to determine the first protection mode corresponding to the first business information according to the first security policy, the first information, the preset second information, and the non-security requirements corresponding to the first business information, and the second information and the first security
  • the policy correlation can be used to characterize the ability of the first UE to transmit service data corresponding to the first service information.
  • the second information may also be multiple types of information, for example, it may include an integrity protection transmission rate.
  • This embodiment provides a feasible solution for determining the first protection mode.
  • the solution considers the first information of the second UE, the second information of the first UE, the non-security requirements corresponding to the first service information, and the first security policy. , So that the determined first protection mode is more suitable for the business data corresponding to the first business information.
  • the embodiments of the present application provide the second implementation manner of the fifth aspect.
  • the non-safety requirement is the target transmission rate
  • the first information includes the first integrity protection transmission rate
  • the second information Including the second integrity protection transmission rate.
  • the determining unit is configured to, when the first security policy indicates that the service data corresponding to the first service information is inclined to be integrity protected, if the first integrity protection rate is less than the target transmission rate and/or the second integrity protection rate If it is less than the target transmission rate, it is determined that the first protection mode corresponding to the first service information is not to perform integrity protection on the service data corresponding to the first service information.
  • a sixth aspect of the embodiments of the present application provides an apparatus for determining a quality of service flow, including:
  • a receiving unit configured to receive a first protection mode from a second UE, where the first protection mode is a protection mode used when the first UE and the second UE transmit service data corresponding to the first service information;
  • the determining unit is configured to determine the first QoS flow corresponding to the first service information according to the first protection mode, the first QoS flow is used for the first UE and the second UE to transmit service data corresponding to the first service information, and N is a positive integer;
  • the sending unit is configured to send QoS information to the second UE, where the QoS information is used to characterize the first QoS flow, where the QoS information may include a flow identifier.
  • the embodiments of the present application provide the first implementation manner of the sixth aspect.
  • the determining unit is configured to determine the first QoS flow corresponding to the first service information according to the first protection mode and N pre-established QoS flows. .
  • the embodiments of the present application provide the second implementation manner of the seventh aspect, and the determining unit is used when the first protection mode and the second protection mode corresponding to the second QoS flow are the same ,
  • the second QoS flow is determined as the first QoS flow corresponding to the first service information, and the second QoS flow is one of the N QoS flows.
  • the second QoS flow is used as the first QoS flow to transmit the service data corresponding to the first service information, which realizes QoS flow multiplexing while avoiding This is a safety contradiction.
  • the embodiments of the present application provide the third implementation manner of the sixth aspect.
  • the determining unit is used when the first protection mode is the same as the second protection mode corresponding to the second QoS flow, And when the non-secure information corresponding to the second QoS flow meets the non-secure requirements corresponding to the first service information, the second QoS flow is determined as the first QoS flow corresponding to the first service information, and the second QoS flow is among the N QoS flows One of them.
  • the non-secure requirements may be transmission rate requirements and delay requirements, etc.
  • the non-secure information may be bandwidth, delay, etc.
  • the first protection mode is the same as the second protection mode, thereby avoiding security contradictions; at the same time, it is ensured that the second QoS flow can satisfy the first service information. Corresponding non-safety requirements.
  • the embodiments of the present application provide the fourth implementation manner of the sixth aspect, and it is determined
  • the unit is used to determine the third QoS flow as the first QoS flow corresponding to the first service information and the third QoS flow when the first protection mode and the protection mode corresponding to any one of the N QoS flows are not the same Not included in N QoS flows.
  • the third QoS flow that is not included in the N QoS flows is regarded as the first QoS flow, that is, a newly established QoS flow One QoS flow.
  • a seventh aspect of the present application provides a terminal device, including: at least one processor and a memory, the memory stores computer-executable instructions that can run on the processor, and when the computer-executable instructions are executed by the processor, the The terminal device executes the method described in any one of the foregoing first aspect to the third aspect.
  • the eighth aspect of the embodiments of the present application provides a chip or chip system.
  • the chip or chip system includes at least one processor and a communication interface.
  • the communication interface and the at least one processor are interconnected by wires, and the at least one processor is used to run computer programs or instructions. , To execute the method for determining the quality of service flow described in any one of the implementation manners of the first aspect to the third aspect.
  • the communication interface in the chip can be an input/output interface, a pin, or a circuit.
  • the embodiments of the present application further provide the first implementation manner of the eighth aspect.
  • the chip or chip system described above in the present application further includes at least one memory, and the at least one memory stores instructions.
  • the memory may be a storage unit inside the chip, such as a register, a cache, etc., or a storage unit of the chip (for example, a read-only memory, a random access memory, etc.).
  • the ninth aspect of the embodiments of the present application provides a computer storage medium, which is used to store computer software instructions used for the above-mentioned terminal device, and includes a program used to execute a program designed for the terminal device.
  • the terminal device may be the device for determining the quality of service flow as described in the foregoing fourth aspect, fifth aspect, or sixth aspect.
  • the fourteenth aspect of the embodiments of the present application provides a computer program product.
  • the computer program product includes computer software instructions that can be loaded by a processor to implement any one of the first to third aspects.
  • the first user equipment UE first obtains the first security policy corresponding to the first service information.
  • the first security policy is the security policy adopted when the first UE and the second UE transmit the service data corresponding to the first service information;
  • a security policy determines the first quality of service flow QoS flow corresponding to the first service information.
  • the first QoS flow is used by the first UE and the second UE to transmit service data corresponding to the first service information; since the first QoS flow is determined in the process Considering the first security policy, it can avoid the defect of QoS flow that does not consider the security policy.
  • Fig. 1 is an architecture diagram of a communication system in an embodiment of the application
  • FIG. 2 is a schematic diagram of a first embodiment of a method for determining a quality of service flow in an embodiment of this application;
  • FIG. 3 is a schematic diagram of an embodiment in which the first UE determines the first QoS flow in an embodiment of this application;
  • FIG. 4 is a schematic diagram of a first embodiment in which a first UE obtains a first security policy in an embodiment of this application;
  • FIG. 5 is a schematic diagram of a second embodiment in which a first UE obtains a first security policy in an embodiment of this application;
  • Fig. 6 is a schematic diagram of a second embodiment of a method for determining a quality of service flow in an embodiment of the present application
  • FIG. 7 is a schematic diagram of a third embodiment of a method for determining a quality of service flow in an embodiment of this application.
  • FIG. 8 is a schematic diagram of an application example of the method for determining the quality of service flow
  • FIG. 9 is a schematic diagram of a first embodiment of an apparatus for determining a quality of service flow in an embodiment of this application.
  • FIG. 10 is a schematic diagram of a second embodiment of an apparatus for determining a quality of service flow in an embodiment of this application;
  • FIG. 11 is a schematic diagram of a third embodiment of an apparatus for determining a quality of service flow in an embodiment of this application.
  • FIG. 12 is a schematic structural diagram of a terminal device in an embodiment of the application.
  • the embodiment of the present application provides a method for determining a quality of service flow, which can avoid defects in the determined QoS flow that does not consider a security policy.
  • the embodiments of the present application can be applied to the communication system shown in FIG. 1.
  • the communication system may include multiple user equipment UEs, and any two UEs may communicate directly based on the PC5 protocol.
  • FIG. 1 only shows two UEs, specifically UEA and UEB.
  • the UE is a device with wireless transceiver function, which can be deployed on land, including indoor or outdoor, handheld or vehicle-mounted; it can also be deployed on the water (such as ships, etc.); it can also be deployed in the air (For example, airplanes, balloons, satellites, etc.).
  • the terminal device may be a mobile phone (mobile phone), a tablet computer (pad), a computer with wireless transceiver function, a virtual reality (VR) terminal, an augmented reality (AR) terminal, an industrial control (industrial control) Wireless terminals in ), wireless terminals in self-driving, wireless terminals in remote medical, wireless terminals in smart grid, and wireless terminals in transportation safety , Wireless terminals in smart cities, wireless terminals in smart homes, etc.
  • Figure 1 uses a mobile phone to represent the UE.
  • QoS flow is a logical channel used to provide certain transmission guarantees for the transmission of service data.
  • the process of determining the QoS flow can be understood as determining the QoS information of the QoS flow.
  • the corresponding bearer will be established. Multiple bearers can be established between two UEs, one bearer can correspond to multiple QoS flows, and the QoS guarantees corresponding to all QoS flows on the same bearer are the same.
  • a bearer is established between UEA and UEB, and the bearer corresponds to three QoS flows, namely QoS flow A, QoS flow B, and QoS flow C.
  • the two UEs will negotiate to obtain a security policy with service granularity, and then determine the specific protection method according to the security policy, and finally according to the protection Ways to protect the transmitted business data.
  • the business data corresponding to a business can consist of one or more QoS flows, so security policies and protection methods will eventually be bound to QoS flows.
  • the three QoS flows shown in Figure 1 respectively correspond to different security policies and protection methods.
  • the embodiment of the present application provides a method for determining QoS flow based on a security policy, which takes the security policy into consideration, so as to avoid deficiencies in the QoS flow due to the failure to consider security.
  • the method for determining the quality of service flow in the embodiment of the present application will be described in detail below.
  • FIG. 2 is a schematic diagram of a first embodiment of a method for determining a quality of service flow in an embodiment of the present application.
  • the embodiment of the present application provides a method for determining the quality of service flow, including:
  • Step 101 The first user equipment UE obtains a first security policy corresponding to the first service information.
  • the first UE can also acquire the first service information and the corresponding relationship between the first service information and the first security policy at the same time, and the first UE can determine the first security policy through the corresponding relationship.
  • a security policy corresponds to the first service information.
  • the first service information is used to identify the service, and may specifically include the service ID or the application ID corresponding to the service; or the type of the service; or the type of the service.
  • the type is not specifically limited.
  • the first security policy is the security policy adopted when the first UE and the second UE transmit the service data corresponding to the first service information; the first security policy includes one or more security policies, which are not limited in the embodiment of this application .
  • the first security policy may include a confidentiality protection policy.
  • the first security policy may include confidentiality protection required, confidentiality protection inclined, or confidentiality protection not required; the first security policy may also include integrity protection policy Specifically, the first security policy may include integrity protection required, integrity protection inclined, or no integrity protection required.
  • the first UE determines the first quality of service flow QoS flow corresponding to the first service information according to the first security policy.
  • the first QoS flow is used for the first UE and the second UE to transmit service data corresponding to the first service information.
  • the process of determining the first QoS flow can be understood as determining the QoS information corresponding to the first QoS flow; the QoS information may include flow identification, and may also include transmission rate, delay, bit error rate, and so on.
  • the first UE may send the first QoS flow to the second UE, so that the first UE and the second UE transmit service data corresponding to the first service information according to the first QoS flow.
  • the first security policy since the first security policy is considered in the process of determining the first QoS flow, it is possible to avoid defects in the determined QoS flow due to the failure to consider the security policy.
  • N QoS flows between the first UE and the second UE there may or may not be N QoS flows between the first UE and the second UE, where N is a positive integer.
  • the first UE determines the first QoS flow, if there is no QoS flow between the first UE and the second UE, the first QoS flow determined by the first UE is a new QoS flow.
  • the first UE determines the first service corresponding to the first service information according to the first security policy QoS flow includes:
  • the first UE determines the first QoS flow corresponding to the first service information according to the first security policy and N pre-established QoS flows.
  • the first QoS flow can be one of the N QoS flows, or a new QoS flow, that is, it does not belong to the N QoS flows.
  • the first UE determines the first QoS flow according to the first security policy and N pre-established QoS flows, which are not specifically limited in the embodiment of the present application.
  • any one of the N QoS flows can correspond to one security policy and one protection mode. Therefore, in the embodiment of this application, the first A UE determines the first QoS flow according to the first security policy to prevent the first security policy from having security conflicts with the security policies corresponding to the N QoS flows; and, when the determined first QoS flow is one of the N QoS flows When one line is used, the multiplexing of QoS flow is realized, thereby saving resources.
  • the method for the first UE to determine the first QoS flow according to the first security policy and N pre-established QoS flows will be specifically introduced below.
  • the first UE determines the first service information corresponding to the first service information according to the first security policy and the pre-established N QoS flows.
  • QoS flow includes:
  • the first UE determines the second QoS flow as the first QoS flow corresponding to the first service information, and the second QoS flow is among the N QoS flows One of them.
  • the first security policy can be compared with the security policies corresponding to each of the N QoS flows, and then the first security policy can be determined to be the same as the second security policy corresponding to the second QoS flow; it can also be determined that the security policy is the first security policy.
  • a security policy bearer and then determine the second QoS flow from one or more QoS flows corresponding to the bearer.
  • the second security policy does not require integrity protection
  • the second QoS flow is determined as the first QoS flow corresponding to the first service information, it may not be The business data corresponding to the first business information is integrity protected.
  • the protection mode corresponding to the first security policy is integrity protection of the business data corresponding to the first business information; assuming that the second security policy is inclined to integrity protection, Then, the protection mode corresponding to the second security policy may be to perform integrity protection on the business data corresponding to the first business information, or it may be not to perform integrity protection on the business data corresponding to the first business information. Therefore, if the protection mode corresponding to the second security policy is not to perform integrity protection on the business data corresponding to the first business information, it may also not be possible to perform integrity protection on the business data corresponding to the first business information.
  • the second QoS flow is used as the first QoS flow to transmit the service data corresponding to the first service information, which realizes QoS flow multiplexing at the same time.
  • the second QoS flow is determined as the first QoS flow.
  • the first QoS flow can meet the requirements of the service data corresponding to the first service information.
  • Safety requirements It is understandable that the business data requirements corresponding to the first business information may include non-security requirements in addition to security requirements.
  • the first UE determines that the first service information corresponds to the first service information according to the first security policy and the N pieces of pre-established QoS flows.
  • the first QoS flow includes:
  • the first UE determines the second QoS flow as The first QoS flow and the second QoS flow corresponding to the first service information are one of the N QoS flows.
  • the non-secure requirements may include transmission rate requirements, delay requirements, and bit error rate requirements; correspondingly, the non-secure information corresponding to the second QoS flow may include transmission rate, time delay, and bit error rate.
  • the first QoS flow may be a new QoS flow, that is, it is not included in the N QoS flows. Therefore, based on the foregoing embodiments, the method for determining the quality of service flow provided in the embodiments of this application is different.
  • the first UE determining the first QoS flow corresponding to the first service information according to the first security policy and N pre-established QoS flows includes:
  • the first UE determines the third QoS flow as the first QoS flow corresponding to the first service information, and the third QoS flow is not Included in N QoS flows.
  • the third QoS flow that is not included in the N QoS flows is regarded as the first QoS flow, that is, the establishment A new QoS flow avoids security contradictions.
  • the first UE determining the first QoS flow corresponding to the first service information according to the first security policy and the pre-established N QoS flows may also include:
  • the first UE determines the third QoS flow as the first QoS flow corresponding to the first service information , The third QoS flow is not included in the N QoS flows.
  • the first QoS flow can be determined by comparing the first security policy with the security policies corresponding to each of the N QoS flows.
  • the first UE is based on the first security policy and the pre-established N QoS flows. Determining the first QoS flow corresponding to the first service information includes:
  • Step 201 The first UE determines the first protection mode corresponding to the first service information according to the first security policy, and the first protection mode is the protection mode adopted when the first UE and the second UE transmit the service data corresponding to the first service information .
  • the first security policy is an integrity protection policy.
  • the first protection method may be to perform integrity protection on the service data corresponding to the first service information;
  • a security policy is inclined to integrity protection, then the first protection method may be to perform integrity protection on the business data corresponding to the first business information, or not to perform integrity protection on the business data corresponding to the first business information;
  • the first protection method may be that the integrity protection of the service data corresponding to the first service information is not performed.
  • the process of determining the first protection mode when the first security policy is a confidentiality protection policy is similar to the process of determining the first protection mode when the first security policy is an integrity protection policy, and can be understood with reference to the above process for details.
  • Step 202 The first UE determines the first QoS flow corresponding to the first service information according to the first protection mode.
  • the first protection method can be integrity protection of the business data corresponding to the first business information, or business data that does not correspond to the first business information. Carry out integrity protection.
  • the first protection method is first determined according to the first security policy, and then the first QoS flow is determined according to the first protection method, so as to avoid the method of determining the first QoS flow according to the first security policy. Defects.
  • the first QoS flow corresponding to the information includes:
  • the first UE determines the first QoS flow corresponding to the first service information according to the first protection mode and the pre-established N QoS flows; or the first UE determines to establish a new first QoS flow according to the first protection mode, which is not required here Whether N QoS flows have been established between two UEs.
  • the first QoS flow can be one of the N QoS flows, or a new QoS flow, that is, it does not belong to the N QoS flows.
  • the first UE determines the first QoS flow according to the first protection mode and N pre-established QoS flows, which are not specifically limited in the embodiment of the present application.
  • any one of the N QoS flows can correspond to one security policy and one protection mode. Therefore, in the embodiment of this application, the first A UE determines the first QoS flow according to the first protection mode to prevent the first protection mode from having security conflicts with the protection modes corresponding to the N QoS flows; and, when the determined first QoS flow is one of the N QoS flows When one line is used, the multiplexing of QoS flow is realized, thereby saving resources.
  • the method for the first UE to determine the first QoS flow according to the first protection mode and N pre-established QoS flows will be specifically introduced below.
  • the first UE determines the first service information corresponding to the first service information according to the first protection mode and the pre-established N QoS flows.
  • QoS flow includes:
  • the first UE determines the second QoS flow as the first QoS flow corresponding to the first service information, and the second QoS flow is among the N QoS flows One of them.
  • the first protection mode is the same as the second protection mode corresponding to the second QoS flow, which is not specifically limited in the embodiment of the present application. For example, you can compare the first protection mode with the protection modes corresponding to each of the N QoS flows, and then determine that the first protection mode is the same as the second protection mode corresponding to the second QoS flow; or first determine that the protection mode is the first protection mode. For a bearer in a protection mode, the second QoS flow is then determined from one or more QoS flows corresponding to the bearer.
  • the first protection method is to protect the integrity of the service data corresponding to the first service information
  • the second security policy is to not protect the integrity of the service data corresponding to the first service information.
  • the second QoS flow is If it is determined as the first QoS flow corresponding to the first service information, the integrity protection of the service data corresponding to the first service information may not be performed.
  • the second QoS flow is used as the first QoS flow to transmit the service data corresponding to the first service information, realizing QoS flow multiplexing at the same time.
  • the second QoS flow is determined as the first QoS flow. At this time, it can be considered that the second QoS flow can meet the requirements of the service data corresponding to the first service information. Safety requirements. It is understandable that the business data corresponding to the first business information may have non-security requirements in addition to security requirements.
  • the first UE determines that the first service information corresponds to the first service information according to the first protection mode and the N pieces of pre-established QoS flows.
  • the first QoS flow includes:
  • the first UE determines the second QoS flow as The first QoS flow and the second QoS flow corresponding to the first service information are one of the N QoS flows.
  • the non-secure requirements may include transmission rate requirements, delay requirements, and bit error rate requirements; correspondingly, the non-secure information corresponding to the second QoS flow may include transmission rate, time delay, and bit error rate.
  • the first QoS flow may be a new QoS flow, that is, it is not included in the N QoS flows. Therefore, based on the foregoing embodiments, the method for determining the quality of service flow provided in the embodiments of this application is different. determining the first QoS flow corresponding to the first service information by the first UE according to the first protection mode and N pre-established QoS flows includes:
  • the first UE determines the third QoS flow as the first QoS flow corresponding to the first service information, and the third QoS flow is not Included in N QoS flows.
  • the third QoS flow that is not included in the N QoS flows is regarded as the first QoS flow, that is, the establishment A new QoS flow avoids security contradictions.
  • the first UE determining the first QoS flow corresponding to the first service information according to the first protection mode and the pre-established N QoS flows may also include:
  • the first UE determines the third QoS flow as the first QoS flow corresponding to the first service information , The third QoS flow is not included in the N QoS flows.
  • the method before the first UE determines the first protection mode corresponding to the first service information according to the first security policy, the method further include:
  • the first UE obtains the first information of the second UE.
  • the first information is associated with the first security policy and may be used to characterize the ability of the second UE to transmit service data corresponding to the first service information.
  • the first information may have multiple types, for example, it may be integrity protection transmission rate, integrity protection transmission delay, confidentiality protection transmission rate, and confidentiality protection transmission delay.
  • determining the first protection mode corresponding to the first service information by the first UE according to the first security policy includes:
  • the first UE determines the first protection mode corresponding to the first service information according to the first security policy, the first information, the preset second information, and the non-security requirements corresponding to the first service information, and the second information is related to the first security policy
  • the connection can be used to characterize the ability of the first UE to transmit service data corresponding to the first service information.
  • the first UE determines the first protection mode according to the first security policy, the first information, the preset second information, and the non-security requirements corresponding to the first service information. This is not specifically limited.
  • not only the first security policy is considered, but also the ability of the second UE to transmit the service data corresponding to the first service information, and the first UE to transmit the first service information corresponding to the
  • the capabilities of service data and the non-security requirements corresponding to the first service information make the determined first protection method more suitable for the service data corresponding to the first service information, and further enable the first QoS flow determined according to the first protection method to be more suitable. Good transmission of the business data corresponding to the first business information.
  • the method for the first UE to determine the first protection mode according to the first security policy, the first information, the preset second information, and the non-security requirements corresponding to the first service information will be specifically introduced below.
  • the non-safety requirement is the target transmission rate
  • the first information includes the first integrity protection transmission rate
  • the second The information includes the second integrity protection transmission rate
  • the first UE determining the first protection mode corresponding to the first service information according to the first security policy, the first information, the preset second information, and the non-security requirements corresponding to the first service information includes:
  • the first security policy indicates that it is inclined to perform integrity protection on the service data corresponding to the first service information
  • the first integrity protection rate is less than the target transmission rate and/or the second integrity protection rate is less than the target transmission rate. Then the first UE determines that the first protection mode corresponding to the first service information is not to perform integrity protection on the service data corresponding to the first service information.
  • the first security policy indicates that the business data corresponding to the first business information is inclined to integrity protection, that is, the first security policy is inclined to integrity protection.
  • the protection mode may be wrong to the first business information.
  • the integrity protection of the corresponding service data may also be that the integrity protection of the service data corresponding to the first service information is not performed.
  • the integrity protection rate of at least one of the first UE and the second UE cannot reach the first service
  • the target transmission rate corresponding to the information so at least one of the first UE and the second UE cannot perform integrity protection on the service data corresponding to the first service information.
  • the first UE determines that the first protection mode corresponding to the first service information is not to perform integrity protection on the service data corresponding to the first service information, thereby avoiding that the first protection mode is to protect the first service information.
  • the corresponding service data is integrity protected, but the integrity protection of the service data corresponding to the first service information cannot actually be performed.
  • the first UE is based on the first security policy, first information, preset second information, and
  • the non-security requirements corresponding to the first service information determining the first protection mode corresponding to the first service information may further include:
  • the first security policy indicates that the service data corresponding to the first service information is not to be integrity protected (that is, the first security policy is that integrity protection is not required)
  • the first integrity protection rate is less than the target transmission rate and/or If the second integrity protection rate is less than the target transmission rate, the first UE determines that the first protection mode corresponding to the first service information is not to perform integrity protection on the service data corresponding to the first service information;
  • the first UE determines the first corresponding to the first service information.
  • the protection method is to protect the integrity of the business data corresponding to the first business information;
  • a protection method is to perform integrity protection on the business data corresponding to the first business information or not to perform integrity protection on the business data corresponding to the first business information;
  • the first UE determines the first UE corresponding to the first service information.
  • One protection method is not to perform integrity protection on the business data corresponding to the first business information.
  • the final determined first protection mode has nothing to do with the first integrity protection rate and the second integrity protection rate. Therefore, if the first security policy is Integrity protection is not required, and the relationship between the first integrity protection rate and the target transmission rate and the relationship between the second integrity protection rate and the target transmission rate may not be considered, that is, it is directly determined that the first protection mode is incorrect.
  • the business data corresponding to a business information is integrity protected.
  • the first UE may stop the determination of the first protection mode and send a rejection message to the second UE.
  • the rejection message may include a rejection indication and/or rejection The reason, where the rejection indication is used to indicate that the service data corresponding to the first service information is refused to be transmitted.
  • the reason for the rejection may be that the first integrity protection rate is less than the target transmission rate and the second UE cannot complete the service data corresponding to the first service information. Protection, and/or the second integrity protection rate is less than the target transmission rate, so that the second UE cannot perform integrity protection on the service data corresponding to the first service information.
  • the first UE determines the first QoS flow according to the first security policy; it is understandable that if the first service information corresponds to non-security requirements, it will determine the After a security policy, it is possible to determine whether the first UE and the second UE can meet the non-security requirement according to the first security policy, and after determining that the non-security requirement can be satisfied, the first QoS flow is determined according to the first security policy.
  • the method further includes:
  • the first UE obtains first information of the second UE, and the first information is associated with the first security policy.
  • the method further includes:
  • the first UE determines according to the first security policy that the first information and the second information of the first UE can meet the non-security requirements corresponding to the first service information, and the second information is associated with the first security policy.
  • first information, second information, and non-security requirements in the embodiments of this application are the same as those mentioned in the previous embodiments.
  • the first information, second information, and non-security requirements are the same.
  • the first UE determines according to the first security policy that the first information and the second information of the first UE can meet the non-security requirements corresponding to the first service information, which are not specifically limited in the embodiment of the present application.
  • the first UE determines the first information according to the first security policy and The second information of the first UE that can meet the non-security requirements corresponding to the first service information includes:
  • the first UE determines that the second integrity protection transmission rate of the first UE is greater than or equal to the target transmission rate corresponding to the first service information, and The first integrity protection transmission rate is greater than or equal to the target transmission rate corresponding to the first service information.
  • the first integrity protection transmission rate can be sent by the second UE. Accordingly, the first UE will receive the first integrity protection transmission rate from the second UE; the second integrity protection transmission rate is preset, and It may be specifically determined by the first UE according to the actual usage of the resource.
  • the first UE since the integrity protection of the service data will occupy more resources and have a greater impact on the transmission rate, after the first UE determines the first security policy, if the first security policy requires integrity protection , The first UE first compares the relative size of the second integrity protection transmission rate and the target transmission rate, and the relative size of the first integrity protection transmission rate and the target transmission rate, to determine the second integrity protection transmission rate and the first Whether the integrity protection transmission rate reaches the target transmission rate, and then choose whether to determine the first QoS flow according to the judgment result.
  • the first UE and the second UE can correspond to the first service information.
  • the service data is fully protected, so the first UE can continue to determine the first QoS flow according to the first security policy; otherwise, it means that at least one of the first UE and the second UE cannot fully protect the service data corresponding to the first service information Therefore, the first UE does not need to determine the first QoS flow according to the first security policy, and the first UE may send a rejection message to the second UE, where the rejection message is used to indicate that the transmission of the service data corresponding to the first service information is rejected.
  • the first user equipment UE there are multiple methods for the first user equipment UE to obtain the first security policy corresponding to the first service information.
  • the method for determining the first security policy by the first UE will be described in detail below with reference to FIG. 4 and FIG. 5. .
  • the first user equipment UE acquiring the first security policy corresponding to the first service information includes:
  • Step 301 The first UE receives a preset security policy of the second UE, and the preset security policy of the second UE corresponds to the first service information.
  • the second UE stores a preset security policy, and the preset security policy only indicates the security policy adopted by the second UE to protect the service data corresponding to the first service information.
  • the second UE sends its own preset security policy to the first UE.
  • the first UE can receive the preset security policy of the second UE; wherein, the second UE sends the preset security policy to the first UE.
  • it can also send the first service information and the corresponding relationship between the first service information and the preset security policy of the second UE to the first UE.
  • the first UE will receive The first service information and the corresponding relationship between the first service information and the preset security policy of the second UE, the first UE can determine that the preset security policy of the second UE corresponds to the first service information through the corresponding relationship, And can obtain its own preset security policy according to the first service information.
  • the first service information has been described based on the foregoing embodiment, so it can be understood with reference to the relevant description of the foregoing embodiment.
  • Step 302 The first UE determines a first security policy according to a preset security policy of the second UE and a preset security policy of the first UE, and the preset security policy of the first UE corresponds to the first service information.
  • the first UE also stores a preset security policy corresponding to the first service information, and the preset security policy only indicates the security policy adopted by the first UE to protect the service data corresponding to the first service information.
  • the first UE Since the preset security policy of the first UE may be the same as the preset security policy of the second UE or different from the preset security policy of the second UE, the first UE combines the preset security policy of the second UE with the preset security policy of the first UE. The preset security policy of the UE can finally determine the first security policy.
  • the first security policy there are multiple ways to determine the first security policy, which are not limited in the embodiment of the present application. For example, in method 1, at least one of the preset security policy of the first UE and the preset security policy of the second UE is that confidentiality protection is not required, then the first security policy is that confidentiality protection is not required; the preset of the first UE Both the security policy and the preset security policy of the second UE require confidentiality protection, then the first security policy requires confidentiality protection; the preset security policy of the first UE and the preset security policy of the second UE are both inclined Confidentiality protection, the first security strategy is inclined to confidentiality protection.
  • the first security policy is that confidentiality protection is required; the preset security policy of the first UE is the same as that of the second UE.
  • the preset security policy of the second UE is that encryption protection is not required, and the first security policy is that encryption protection is not required; the preset security policy of the first UE and the preset security policy of the second UE are both inclined to confidentiality protection , Then the first security strategy is inclined to confidentiality protection.
  • the determination process of the integrity protection corresponding to the first security policy is similar to the determination process of the confidentiality protection corresponding to the first security policy, and details are not described in the embodiment of the present application.
  • the first UE determines the first security policy by itself.
  • the second UE may also determine the first security policy. A detailed description will be given below in conjunction with FIG. 5.
  • the first user equipment UE acquiring the first security policy corresponding to the first service information includes:
  • Step 401 The first UE sends the preset security policy of the first UE to the second UE, so that the second UE determines the first security policy according to the preset security policy of the second UE and the preset security policy of the first UE.
  • the first UE when it sends its own preset security policy to the second UE, it may also send the first service information and the corresponding relationship between the first service information and the preset security policy of the second UE to the second UE.
  • the second UE will receive the first service information and the corresponding relationship between the first service information and the preset security policy of the second UE, and the second UE can determine the preset security policy of the first UE through the corresponding relationship It corresponds to the first service information, and can obtain its own preset security policy according to the first service information.
  • the foregoing example has described the preset security policy of the second UE, the preset security policy of the first UE, and the first service information. For details, please refer to the foregoing examples for understanding.
  • Step 402 The first UE receives the first security policy from the second UE.
  • the first UE sends its own preset security policy to the second UE, so that the second UE finally determines the first security policy.
  • the first security policy is determined by the preset security policy of the first UE and the preset security policy of the second UE. Therefore, if the preset security policy of the first UE indicates that the service data corresponding to the first service information is required Integrity protection is performed, that is, the preset security policy of the first UE is that integrity protection is required, and the first security policy that is finally determined must be integrity protection.
  • the first UE may first compare its own second integrity protection transmission rate with the relative size of the target transmission rate corresponding to the first service information to determine whether its own second integrity protection transmission rate has reached Target transmission rate, and then choose whether to perform step 301 according to the judgment result.
  • obtaining the first security policy corresponding to the first service information by the first user equipment UE may further include:
  • the first UE determines that its second integrity protection transmission rate is greater than or equal to the target transmission rate corresponding to the first service information .
  • the target transmission rate corresponding to the first service information may be understood as the rate required to transmit the service data corresponding to the first service information.
  • the second integrity protection transmission rate is greater than or equal to the target transmission rate corresponding to the first service information, indicating that the first UE can completely protect the service data corresponding to the first service information. Therefore, the first UE can send the first UE to the second UE.
  • a preset security policy of the UE is greater than or equal to the target transmission rate corresponding to the first service information, indicating that the first UE can completely protect the service data corresponding to the first service information. Therefore, the first UE can send the first UE to the second UE.
  • the second integrity protection transmission rate is less than the target transmission rate corresponding to the first service information, it means that the first UE cannot completely protect the service data corresponding to the first service information. Therefore, the first UE does not need to send the second UE to the second UE.
  • a preset security policy of the UE If the second integrity protection transmission rate is less than the target transmission rate corresponding to the first service information, it means that the first UE cannot completely protect the service data corresponding to the first service information. Therefore, the first UE does not need to send the second UE to the second UE.
  • a preset security policy of the UE is a preset security policy of the UE.
  • the first security policy is based on the preset security policy of the second UE and the preset security policy of the first UE.
  • the preset security policy may not be stored in the second UE, and the preset security policy may not be stored in the first UE. If the preset security policy is not stored in the second UE, the first UE or the second UE may use the preset security policy of the first UE as the first security policy; if the preset security policy is not stored in the first UE, the first UE Or the second UE may use the preset security policy of the second UE as the first security policy.
  • the first UE may only send the first service information, may not send the preset security policy to the second UE, or send an indication that the preset security policy does not exist to the second UE .
  • the second UE may change its own preset security policy (Corresponding to the first service information) as the first security policy; if the second UE does not receive the preset security policy of the first UE, the second UE can also use the locally stored default security policy as the preset of the first UE Security policy (corresponding to the first service information), and then according to the default security policy and the preset security policy of the second UE, it is determined that the first service information corresponds to the first security policy.
  • the preset security policy refers to the security policy corresponding to specific business information
  • the default security policy can be understood as the security policy corresponding to all business information.
  • the default security policy can be used to replace the security policy corresponding to the specific business information.
  • the default security policy is used to replace the preset security policy of the first UE (corresponding to the first service information).
  • the second UE may combine the preset security policy of the first UE (with the first service information) Corresponding) as the first security policy corresponding to the first service information; the second UE can also use the locally stored default security policy as its own preset security policy (corresponding to the first service information), and then according to the default security policy and The preset security policy (corresponding to the first service information) of the first UE determines the first security policy corresponding to the first service information.
  • the first UE may determine the first security policy according to the preset security policy determination rule.
  • the preset security policy determination rule may be the default security policy stored locally as corresponding to the first business information The first security strategy.
  • the preset security policy determination rules can directly determine the need for integrity protection, the need for integrity protection, or the preference for integrity protection as the first security policy, or the need for integrity protection, and the need for integrity protection. Or tend to determine integrity protection as the first security strategy.
  • the first UE determines the first protection mode according to the first security policy, and then determines the first QoS flow according to the first protection mode. It should be noted that after the first UE determines the first protection mode according to the first security policy, it may also send the first protection mode to the second UE, so that the second UE determines the first QoS flow according to the first protection mode, and finally the first protection mode A UE receives the QoS information from the second UE to determine the first QoS flow.
  • an embodiment of the present application provides another embodiment of a method for determining a quality of service flow, including:
  • Step 501 The first UE obtains a first security policy corresponding to the first service information, where the first security policy is a security policy adopted when the first UE and the second UE transmit service data corresponding to the first service information.
  • Step 502 The first UE determines a first protection mode corresponding to the first service information according to the first security policy.
  • the first protection mode is the protection mode adopted when the first UE and the second UE transmit the service data corresponding to the first service information. , There are many ways to determine the first protection mode.
  • Step 503 The first UE sends the first protection mode to the second UE, so that the second UE determines the first QoS flow corresponding to the first service information according to the first protection mode, and the first QoS flow is used for the first UE and the second UE. Transmit the first service data.
  • the first UE when the first UE sends the first protection mode, it can also send the first service information and the corresponding relationship between the first service information and the first protection mode, and the second UE can determine the first protection mode according to the corresponding relationship. It corresponds to the first business information.
  • Step 504 The first UE receives QoS information from the second UE, where the QoS information is used to characterize the first QoS flow, where the QoS information may include a flow identifier.
  • the method for the first UE to obtain the first security policy and the method for determining the first protection mode are the same as those in the foregoing embodiment, and therefore can be understood with reference to the relevant description of the foregoing embodiment.
  • the first UE sends the first protection mode to the second UE, so that the second UE determines the first QoS flow according to the first protection mode.
  • the method before the first UE determines the first protection mode corresponding to the first service information according to the first security policy, the method also includes:
  • the first UE obtains first information of the second UE, and the first information is used to characterize the ability of the second UE to transmit service data corresponding to the first service information.
  • the first UE determining the first protection mode corresponding to the first service information according to the first security policy includes:
  • the first UE determines the first protection mode corresponding to the first service information according to the first security policy, the first information, the preset second information, and the non-security requirements corresponding to the first service information, and the second information is used to characterize the first UE The ability to transmit service data corresponding to the first service information.
  • the method for the first UE to determine the first protection mode is the same as that of the foregoing embodiment, so it can be understood with reference to the relevant description of the foregoing embodiment.
  • the non-safety requirement is the target transmission rate
  • the first information includes the first integrity protection transmission rate
  • the second information Including the second integrity protection transmission rate
  • the first UE determining the first protection mode corresponding to the first service information according to the first security policy, the first information, the preset second information, and the non-security requirements corresponding to the first service information includes:
  • the first security policy indicates that it is inclined to perform integrity protection on the service data corresponding to the first service information
  • the first integrity protection rate is less than the target transmission rate and/or the second integrity protection rate is less than the target transmission rate. Then the first UE determines that the first protection mode corresponding to the first service information is not to perform integrity protection on the service data corresponding to the first service information.
  • the method for the first UE to determine the first protection mode is the same as that of the foregoing embodiment, so it can be understood with reference to the relevant description of the foregoing embodiment.
  • the first UE when the first UE determines the first QoS flow according to the first protection mode, the first UE needs to obtain the first security policy first, and then determine the first protection mode according to the first security policy; it should be noted that, The first UE may also directly obtain the first protection mode.
  • an embodiment of the present application provides another embodiment of a method for determining a quality of service flow, including:
  • Step 601 The first UE receives a first protection mode from a second UE, where the first protection mode is a protection mode adopted when the first UE and the second UE transmit service data corresponding to the first service information.
  • the first UE may also receive the first service information and the corresponding relationship between the first service information and the first protection mode, and the first UE may determine the first protection mode according to the corresponding relationship. It corresponds to the first business information.
  • Step 602 The first UE determines the first QoS flow corresponding to the first service information according to the first protection mode.
  • the first QoS flow is used for the first UE and the second UE to transmit service data corresponding to the first service information, and N is a positive integer ;
  • Step 603 The first UE sends QoS information to the second UE.
  • the QoS information is used to characterize the first QoS flow, where the QoS information may include a flow identifier.
  • the method for the first UE to determine the first QoS flow according to the first protection mode is the same as the method in the foregoing embodiment.
  • the first UE determining the first QoS flow corresponding to the first service information according to the first protection mode includes:
  • the first UE determines the first QoS flow corresponding to the first service information according to the first protection mode and the pre-established N QoS flows.
  • the first UE determines the first QoS flow according to the first protection mode, and then sends the QoS information corresponding to the first QoS flow to the second UE; when the determined first QoS flow is N QoS flows One of the time, realizes the multiplexing of QoS flow, thus saving resources.
  • the first UE determines the first service information corresponding to the first service information according to the first protection mode and the pre-established N pieces of QoS flow.
  • the first QoS flow includes:
  • the first UE determines the second QoS flow as the first QoS flow corresponding to the first service information, and the second QoS flow is among the N QoS flows One of them.
  • the second QoS flow is used as the first QoS flow to transmit the service data corresponding to the first service information, which realizes QoS flow multiplexing while avoiding This is a safety contradiction.
  • the first UE determines the corresponding service information according to the first protection mode and the N pieces of pre-established QoS flows.
  • the first QoS flow includes:
  • the first UE determines the second QoS flow as The first QoS flow and the second QoS flow corresponding to the first service information are one of the N QoS flows.
  • the non-secure requirements may be transmission rate requirements and delay requirements, etc.
  • the non-secure information may be bandwidth, delay, etc.
  • the first protection mode is the same as the second protection mode, thereby avoiding security contradictions; at the same time, it is ensured that the second QoS flow can satisfy the first service information. Corresponding non-safety requirements.
  • the first UE determines the corresponding service information according to the first protection mode and the N pieces of pre-established QoS flows.
  • the first QoS flow includes:
  • the first UE determines the third QoS flow as the first QoS flow corresponding to the first service information, and the third QoS flow is not Included in N QoS flows.
  • the third QoS flow that is not included in the N QoS flows is regarded as the first QoS flow, that is, a newly established QoS flow One QoS flow.
  • the following uses an application example to further illustrate the method for determining the quality of service flow provided in the embodiment of the present application.
  • N QoS flows have been established between UEA and UEB.
  • UEA initiates a request to establish a service connection to transmit service data corresponding to the first service information.
  • a preset security policy corresponding to the first service information is stored in the UEA.
  • this application example includes:
  • Step 701 Based on the preset security policy corresponding to UEA that integrity protection is required or inclined, UEA determines that the integrity protection rate corresponding to UEA is greater than the target transmission rate corresponding to the first service information.
  • Step 702 UEA sends a request message to UEB.
  • the request message includes the first service information, the target transmission rate corresponding to the first service information, the preset security policy corresponding to UEA, and the integrity protection rate corresponding to UEA.
  • Step 703 UEB determines that the first security policy requires integrity protection according to the preset security policy corresponding to UEB and the preset security policy corresponding to UEA.
  • Step 704 Based on the first security policy that integrity protection is required, UEB determines that the integrity protection rate corresponding to UEA is greater than the target transmission rate corresponding to the first service information, and that the integrity protection rate corresponding to UEB is greater than the target corresponding to the first service information. Transmission rate.
  • Step 705 UEB determines the first protection mode corresponding to the first service information according to the first security policy.
  • step 706 the UEB determines the second QoS flow as the first QoS flow corresponding to the first service information according to the first protection mode and the pre-established N QoS flows, where the second QoS flow belongs to the N QoS flows.
  • Step 707 UEB sends QoS information to UEA, where the QoS information is used to characterize the first QoS flow.
  • the scenario of the foregoing application example is an integrity protection scenario. It should be noted that the foregoing application example is also applicable to a confidentiality protection scenario, as well as a scenario that includes both confidentiality protection and integrity protection.
  • the first security policy is that confidentiality protection is required
  • UEB needs to determine that the confidentiality protection rate corresponding to UEA is greater than the target transmission rate corresponding to the first service information
  • UEB The corresponding confidentiality protection rate is greater than the target transmission rate corresponding to the first service information.
  • the non-safety requirements (including transmission rate and delay, etc.) in the UE can be received by the UE, that is, by the communication
  • the opposite end of the device sends the non-safety requirement; it may also be determined by the UE according to the corresponding relationship between the preset first service information and the non-safety requirement.
  • the second UE sends the first service information and the preset security policy of the second UE to the first UE, and the first UE determines the first UE according to the preset security policy of the first UE and the preset security policy of the second UE.
  • a security policy in addition, the first UE also obtains the first information of the second UE.
  • the first information is associated with the first security policy.
  • the first UE determines the first information and the second UE’s second information according to the first security policy.
  • the information can meet the non-security requirements corresponding to the first business information, and the second information is associated with the first security policy.
  • the second UE may directly send the non-security requirement corresponding to the first service information to the first UE.
  • the second UE may also not send the non-security requirements corresponding to the first service information to the first UE. Instead, the second UE determines the non-security requirements corresponding to the first service information according to the preset correspondence between the first service information and the non-security requirements. Safety requirements.
  • the first UE determines the non-security requirements corresponding to the first service information according to the preset correspondence between the first service information and the non-security requirements
  • the second UE determines the non-security requirements corresponding to the first service information according to the preset first service information and the non-security requirements.
  • the correspondence relationship determines the non-security requirements corresponding to the first service information, and the two may be different.
  • the second UE sends the non-safety requirement corresponding to the first service information determined by itself to the first UE, and the first UE combines the non-safety requirement corresponding to the first service information determined by the second UE And the non-safety requirement corresponding to the first service information determined by the first UE itself, and finally the non-safety requirement corresponding to the first service information is determined.
  • FIG. 9 is a schematic diagram of a first embodiment of an apparatus for determining a quality of service flow in an embodiment of the present application.
  • the embodiment of the present application provides the first embodiment of the device for determining the quality of service flow, including:
  • the obtaining unit 100 is configured to obtain a first security policy corresponding to the first service information, where the first security policy is a security policy adopted when the first UE and the second UE transmit service data corresponding to the first service information;
  • the determining unit 200 is configured to determine the first QoS flow corresponding to the first service information according to the first security policy, and the first QoS flow is used for the first UE and the second UE to transmit service data corresponding to the first service information.
  • the determining unit 200 is configured to determine the first QoS flow corresponding to the first service information according to the first security policy and the pre-established N QoS flows.
  • N is a positive integer.
  • the determining unit 200 is configured to set the second QoS flow when the first security policy is the same as the second security policy corresponding to the second QoS flow. It is determined as the first QoS flow corresponding to the first service information, and the second QoS flow is one of the N QoS flows.
  • the determining unit 200 is configured to: when the first security policy and the second QoS flow correspond to the same second security policy, and the second QoS flow corresponds to When the non-secure information meets the non-secure requirements corresponding to the first service information, the second QoS flow is determined as the first QoS flow corresponding to the first service information, and the second QoS flow is one of the N QoS flows.
  • the determining unit 200 is configured to: when the first security policy and the security policy corresponding to any one of the N QoS flows are not the same, The third QoS flow is determined as the first QoS flow corresponding to the first service information, and the third QoS flow is not included in the N QoS flows.
  • the determining unit 200 is configured to determine the first protection mode corresponding to the first service information according to the first security policy, and the first protection mode is the first protection mode.
  • the determining unit 200 is configured to determine the first QoS flow corresponding to the first service information according to the first protection mode and the pre-established N QoS flows. .
  • the determining unit 200 is configured to set the second QoS flow when the first protection mode is the same as the second protection mode corresponding to the second QoS flow It is determined as the first QoS flow corresponding to the first service information, and the second QoS flow is one of the N QoS flows.
  • the determining unit 200 is configured to: when the first protection mode and the second QoS flow correspond to the same second protection mode, and the second QoS flow corresponds to When the non-secure information meets the non-secure requirements corresponding to the first service information, the second QoS flow is determined as the first QoS flow corresponding to the first service information, and the second QoS flow is one of the N QoS flows.
  • the determining unit 200 is configured to: when the first protection mode and the protection mode corresponding to any one of the N QoS flows are not the same, The third QoS flow is determined as the first QoS flow corresponding to the first service information, and the third QoS flow is not included in the N QoS flows.
  • the obtaining unit 100 is further configured to obtain first information of the second UE.
  • the first information is associated with the first security policy and can be used to characterize The ability of the second UE to transmit service data corresponding to the first service information.
  • the first information may include a variety of information, for example, it may include an integrity protection transmission rate.
  • the determining unit 200 is configured to determine the first protection mode corresponding to the first service information according to the first security policy, the first information, the preset second information, and the non-security requirements corresponding to the first service information.
  • the security policy is associated and can be used to characterize the ability of the first UE to transmit service data corresponding to the first service information.
  • the non-safety requirement is the target transmission rate
  • the first information includes the first integrity protection transmission rate
  • the second information includes the second integrity protection transmission rate
  • the determining unit 200 is configured to, when the first security policy indicates that it is inclined to perform integrity protection on the service data corresponding to the first service information, when the first integrity protection rate is less than the target transmission rate and/or the second integrity protection When the rate is less than the target transmission rate, it is determined that the first protection mode corresponding to the first service information is not to perform integrity protection on the service data corresponding to the first service information.
  • the obtaining unit 100 is configured to receive a preset security policy of the second UE, and the preset security policy of the second UE corresponds to the first service information;
  • the first security policy is determined according to the preset security policy of the second UE and the preset security policy of the first UE, and the preset security policy of the first UE corresponds to the first service information.
  • the obtaining unit 100 is further configured to: obtain first information of the second UE, where the first information is associated with the first security policy;
  • the determining unit 200 is further configured to determine, according to the first security policy, that the first information and the second information of the first UE can meet the non-security requirements corresponding to the first service information, and the second information is associated with the first security policy.
  • the non-safety requirement is the target transmission rate
  • the first information includes the first integrity protection transmission rate
  • the second information includes the second integrity protection transmission rate
  • the determining unit 200 is configured to indicate the need to perform integrity protection on the service data corresponding to the first service information based on the first security policy, and determine that the second integrity protection transmission rate of the first UE is greater than or equal to the target transmission corresponding to the first service information Rate, and the first integrity protection transmission rate is greater than or equal to the target transmission rate corresponding to the first service information.
  • the obtaining unit 100 is configured to send the preset security policy of the first UE to the second UE, so that the second UE is configured according to the preset security policy of the second UE.
  • the security policy and the preset security policy of the first UE determine the first security policy;
  • the determining unit 200 is further configured to determine that its second integrity protection transmission rate is greater than or equal to the target transmission rate corresponding to the first service information.
  • FIG. 10 is a schematic diagram of a second embodiment of an apparatus for determining a quality of service flow in an embodiment of the present application.
  • the embodiment of the present application provides a second embodiment of the device for determining the quality of service flow, including:
  • the obtaining unit 300 is configured to obtain a first security policy corresponding to the first service information, where the first security policy is a security policy adopted when the first UE and the second UE transmit service data corresponding to the first service information;
  • the determining unit 400 is configured to determine the first protection mode corresponding to the first service information according to the first security policy, where the first protection mode is the protection mode adopted when the first UE and the second UE transmit the service data corresponding to the first service information , There are many ways to determine the first protection mode.
  • the sending unit 500 is configured to send the first protection mode to the second UE, so that the second UE determines the first QoS flow corresponding to the first service information according to the first protection mode, and the first QoS flow is used for the first UE and the second UE Transmit the first service data;
  • the receiving unit 600 is configured to receive QoS information from the second UE, where the QoS information is used to characterize the first QoS flow, where the QoS information may include a flow identifier.
  • the obtaining unit 300 is further configured to obtain first information of the second UE.
  • the first information is associated with the first security policy and can be used for It characterizes the ability of the second UE to transmit the service data corresponding to the first service information.
  • the determining unit 400 is configured to determine the first protection mode corresponding to the first service information according to the first security policy, the first information, the preset second information, and the non-security requirements corresponding to the first service information.
  • the security policy is associated and can be used to characterize the ability of the first UE to transmit service data corresponding to the first service information.
  • the non-safety requirement is the target transmission rate
  • the first information includes the first integrity protection transmission rate
  • the second information includes the second integrity protection transmission rate
  • the determining unit 400 is configured to, when the first security policy indicates that it is inclined to perform integrity protection on the service data corresponding to the first service information, if the first integrity protection rate is less than the target transmission rate and/or the second integrity protection If the rate is less than the target transmission rate, it is determined that the first protection mode corresponding to the first service information is not to perform integrity protection on the service data corresponding to the first service information.
  • FIG. 11 is a schematic diagram of a third embodiment of an apparatus for determining a quality of service flow in an embodiment of the present application.
  • the embodiment of the present application provides a third embodiment of the device for determining the quality of service flow, including:
  • the receiving unit 700 is configured to receive a first protection mode from a second UE, where the first protection mode is a protection mode used when the first UE and the second UE transmit service data corresponding to the first service information;
  • the determining unit 800 is configured to determine the first QoS flow corresponding to the first service information according to the first protection mode, the first QoS flow is used for the first UE and the second UE to transmit service data corresponding to the first service information, and N is a positive integer ;
  • the sending unit 900 is configured to send QoS information to the second UE, where the QoS information is used to characterize the first QoS flow, where the QoS information may include a flow identifier.
  • the determining unit 800 is configured to determine the first QoS flow corresponding to the first service information according to the first protection mode and the N pieces of pre-established QoS flows. .
  • the determining unit 800 is configured to set the second QoS flow when the first protection mode is the same as the second protection mode corresponding to the second QoS flow. It is determined as the first QoS flow corresponding to the first service information, and the second QoS flow is one of the N QoS flows.
  • the determining unit 800 is configured to: when the first protection mode and the second QoS flow correspond to the same second protection mode, and the second QoS flow corresponds to When the non-secure information meets the non-secure requirements corresponding to the first service information, the second QoS flow is determined as the first QoS flow corresponding to the first service information, and the second QoS flow is one of the N QoS flows.
  • the determining unit 800 is configured to: when the first protection mode and the protection mode corresponding to any one of the N QoS flows are not the same, The third QoS flow is determined as the first QoS flow corresponding to the first service information, and the third QoS flow is not included in the N QoS flows.
  • an embodiment of the terminal device in the embodiment of the present application may include one or more processors 801, a memory 802, and a communication interface 803.
  • the memory 802 may be short-term storage or persistent storage. Furthermore, the processor 801 may be configured to communicate with the memory 802 and execute a series of instruction operations in the memory 802 on the control device.
  • the processor 801 may perform the operations performed by the first UE in the foregoing embodiments shown in FIG. 2 to FIG. 9, and details are not described herein again.
  • the specific functional module division in the processor 801 may be similar to the functional module division described in FIG. 9, FIG. 10 or FIG. 11, and will not be repeated here.
  • the embodiments of the present application also provide a chip or chip system.
  • the chip or chip system includes at least one processor and a communication interface.
  • the communication interface and the at least one processor are interconnected by wires, and the at least one processor is used to run computer programs or instructions to The operations performed by the first UE in the embodiments shown in FIG. 2 to FIG. 9 are performed, and details are not described herein again.
  • the communication interface in the chip can be an input/output interface, a pin, or a circuit.
  • the embodiment of the present application also provides a first implementation manner of the chip or the chip system.
  • the chip or the chip system described above in the present application further includes at least one memory, and the at least one memory stores instructions.
  • the memory may be a storage unit inside the chip, for example, a register, a cache, etc., or a storage unit of the chip (for example, a read-only memory, a random access memory, etc.).
  • An embodiment of the present application also provides a computer storage medium, which is used to store computer software instructions used for the above-mentioned terminal device, and includes a program used to execute a program designed for the terminal device.
  • the terminal device may be the device for determining the quality of service flow described in the foregoing FIG. 9, FIG. 10 or FIG. 11.
  • the embodiments of the present application also provide a computer program product, the computer program product includes computer software instructions, the computer software instructions can be loaded by a processor to achieve the fixed quality of service flow in any one of Figures 2 to 9 The flow in the method.
  • the disclosed system, device, and method can be implemented in other ways.
  • the device embodiments described above are merely illustrative.
  • the division of the units is only a logical function division, and there may be other divisions in actual implementation, for example, multiple units or components may be combined or It can be integrated into another system, or some features can be ignored or not implemented.
  • the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or they may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the objectives of the solutions of the embodiments.
  • the functional units in the various embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
  • the above-mentioned integrated unit can be implemented in the form of hardware or software functional unit.
  • the integrated unit is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a computer readable storage medium.
  • the technical solution of the present application essentially or the part that contributes to the existing technology or all or part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium , Including several instructions to make a computer device (which may be a personal computer, a server, or a network device, etc.) execute all or part of the steps of the methods described in the various embodiments of the present application.
  • the aforementioned storage media include: U disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disks or optical disks and other media that can store program codes. .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Quality & Reliability (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请实施例公开了一种确定服务质量流的方法,用于确定业务信息对应的服务质量流。本申请实施例方法包括: 第一用户设备UE获取与第一业务信息对应的第一安全策略,该第一安全策略为第一UE和第二UE传输第一业务信息对应的业务数据时所采用的安全策略; 然后第一UE根据第一安全策略确定第一业务信息对应的第一QoS flow,第一QoS flow用于第一UE与第二UE传输第一业务信息对应的业务数据。

Description

一种确定服务质量流的方法及设备
本申请要求于2020年4月30日提交中国专利局、申请号为202010371338.3、发明名称为“一种确定服务质量流的方法及设备”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请实施例涉及通信技术领域,尤其涉及一种确定服务质量流的方法及设备。
背景技术
在车联网场景下,两个用户设备UE可以基于PC5协议直接进行通信。两个UE在通信过程中,会通过服务质量流(quality of service flow,QoS flow)为业务数据的传输提供某种特性的传输保证。
为此,在传输业务数据前,UE需要先确定QoS flow。
发明内容
本申请实施例提供了一种确定服务质量流的方法,能够避免未考虑安全策略而导致确定出的QoS flow存在缺陷。
本申请实施例第一方面提供了一种确定服务质量流的方法,包括:
第一用户设备UE获取与第一业务信息对应的第一安全策略,第一安全策略为第一UE和第二UE传输第一业务信息对应的业务数据时所采用的安全策略。
其中,第一安全策略可以为机密性保护策略,也可以为完整性保护策略;当第一安全策略为机密性保护策略时,第一安全策略具体可以为需要机密性保护、倾向于机密性保护和不需要机密性保护;当第一安全策略为完整性保护时,第一安全策略可以为需要完整性保护、倾向于完整性保护和不需要完整性保护。
第一UE根据第一安全策略确定第一业务信息对应的第一QoS flow,第一QoS flow用于第一UE与第二UE传输第一业务信息对应的业务数据。
第一QoS flow可以是预先建立的用于传输其他业务信息的QoS flow,也可以新的QoS flow。
第一QoS flow可以通过QoS信息表示,其中QoS信息可以包括流标识。
在本申请实施例中,第一UE根据第一业务信息确定第一安全策略,然后根据第一安全策略确定第一QoS flow。
基于第一方面,本申请实施例提供了第一方面的第一种实施方式,在该实施方式中,第一UE根据第一安全策略确定第一业务信息对应的第一QoS flow包括:
第一UE根据第一安全策略以及预先建立的N条QoS flow确定第一业务信息对应的第一QoS flow,N为正整数。
第一QoS flow可以为N条QoS flow中的一条,第一QoS flow也可以不包含于N条QoS flow中。
在本申请实施例中,根据第一安全策略以及预先建立的N条QoS flow确定第一QoS flow,当确定出的第一QoS flow为N条QoS flow中的一条时,即实现了QoS flow的复用,从而节省资源。
基于第一方面的第一种实施方式,本申请实施例提供了第一方面的第二种实施方式,在该实施方式中,第一UE根据第一安全策略以及预先建立的N条QoS flow确定第一业务信息对应的第一QoS flow包括:
若第一安全策略与第二QoS flow对应的第二安全策略相同,则第一UE将第二QoS flow确定为第一业务信息对应的第一QoS flow,第二QoS flow为N条QoS flow中的一条。
在该实施方式中,若第一安全策略与第二安全策略相同,则将第二QoS flow作为第一QoS flow来传输第一业务信息对应的业务数据,实现了QoS flow复用的同时,避免了安全性矛盾。
基于第一方面的第一种实施方式,本申请实施例提供了第一方面的第二种实施方式,在该实施方式中,第一UE根据第一安全策略以及预先建立的N条QoS flow确定第一业务信息对应的第一QoS flow包括:
若第一安全策略与第二QoS flow对应的第二安全策略相同,且第二QoS flow对应的非安全信息满足第一业务信息对应的非安全需求,则第一UE将第二QoS flow确定为第一业务信息对应的第一QoS flow,第二QoS flow为N条QoS flow中的一条。
其中,非安全需求可以为传输速率需求和时延需求等,相应地,非安全信息可以为带宽和时延等。
在该实施方式中,在实现QoS flow复用的同时,保证了第一安全策略与第二安全策略相同,从而避免了安全性矛盾;同时还保证了第二QoS flow能够满足第一业务信息对应的非安全需求。
基于第一方面的第一种实施方式,或第一方面的第二种实施方式,或第一方面的第三种实施方式,本申请实施例提供了第一方面的第四种实施方式,第一UE根据第一安全策略以及预先建立的N条QoS flow确定第一业务信息对应的第一QoS flow包括:
若第一安全策略与N条QoS flow中的任意一条QoS flow对应的安全策略都不同,则第一UE将第三QoS flow确定为第一业务信息对应的第一QoS flow,第三QoS flow不包含于N条QoS flow中。
在该实施方式中,由于N条QoS flow中不存在安全策略与第一安全策略相同的QoS flow,因此将不包含于N条QoS flow中的第三QoS flow作为第一QoS flow,即新建立一条QoS flow。
基于第一方面本申请实施例提供了第一方面的第五种实施方式,第一UE根据第一安全策略确定第一业务信息对应的第一QoS flow包括:
第一UE根据第一安全策略确定第一业务信息对应的第一保护方式,第一保护方式为第一UE和第二UE传输第一业务信息对应的业务数据时所采用的保护方式。
根据第一安全策略确定第一保护方式的方式有多种。以第一安全策略为完整性保护为例,当第一安全策略为需要完整性保护时,第一保护方式可以为对业务数据进行完整性保护;当第一安全策略为倾向于完整性保护时,第一保护方式可以为对业务数据进行完整性 保护,也可以为不对业务数据进行完整性保护;当第一安全策略为不需要完整性保护时,第一保护方式可以为不对业务数据进行完整性保护。
第一UE根据第一保护方式确定第一业务信息对应的第一QoS flow。
该实施方式提供了确定第一QoS flow的另一种可行方案,即先根据第一安全策略确定第一保护方式,然后根据第一保护方式确定第一QoS flow。
基于第一方面的第五种实施方式,本申请实施例提供了第一方面的第六种实施方式,第一UE根据第一保护方式确定第一业务信息对应的第一QoS flow包括:
第一UE根据第一保护方式及预先建立的N条QoS flow确定第一业务信息对应的第一QoS flow。
在该实施方式中,根据第一保护方式确定第一QoS flow,当确定出的第一QoS flow为N条QoS flow中的一条时,即实现了QoS flow的复用,从而节省资源。
基于第一方面的第六种实施方式,本申请实施例提供了第一方面的第七种实施方式,第一UE根据第一保护方式及预先建立的N条QoS flow确定第一业务信息对应的第一QoS flow包括:
若第一保护方式与第二QoS flow对应的第二保护方式相同,则第一UE将第二QoS flow确定为第一业务信息对应的第一QoS flow,第二QoS flow为N条QoS flow中的一条。
在该实施方式中,若第一保护方式与第二保护方式相同,则将第二QoS flow作为第一QoS flow来传输第一业务信息对应的业务数据,实现了QoS flow复用的同时,避免了安全性矛盾。
基于第一方面的第六种实施方式,本申请实施例提供了第一方面的第八种实施方式,第一UE根据第一保护方式及预先建立的N条QoS flow确定第一业务信息对应的第一QoS flow包括:
若第一保护方式与第二QoS flow对应的第二保护方式相同,且第二QoS flow对应的非安全信息满足第一业务信息对应的非安全需求,则第一UE将第二QoS flow确定为第一业务信息对应的第一QoS flow,第二QoS flow为N条QoS flow中的一条。
其中,非安全需求可以为传输速率需求和时延需求等,相应地,非安全信息可以为带宽和时延等。
在该实施方式中,在实现QoS flow复用的同时,保证了第一保护方式与的第二保护方式相同,从而避免了安全性矛盾;同时还保证了第二QoS flow能够满足第一业务信息对应的非安全需求。
基于第一方面的第六种实施方式,或第一方面的第七种实施方式,或第一方面的第八种实施方式,本申请实施例提供了第一方面的第九种实施方式,第一UE根据第一保护方式及预先建立的N条QoS flow确定第一业务信息对应的第一QoS flow包括:
若第一保护方式与N条QoS flow中的任意一条QoS flow对应的保护方式都不同,则第一UE将第三QoS flow确定为第一业务信息对应的第一QoS flow,第三QoS flow不包含于N条QoS flow中。
在该实施方式中,由于N条QoS flow中不存在保护方式与第一保护方式相同的QoS flow, 因此将不包含于N条QoS flow中的第三QoS flow作为第一QoS flow,即新建立一条QoS flow。
基于第一方面的第五种实施方式,或第一方面的第六种实施方式,或第一方面的第七种实施方式,或第一方面的第八种实施方式,或第一方面的第九种实施方式,本申请实施例提供了第一方面的第十种实施方式,在第一UE根据第一安全策略确定第一业务信息对应的第一保护方式之前,方法还包括:
第一UE获取第二UE的第一信息,第一信息与第一安全策略相关联,可以用于表征第二UE传输第一业务信息对应的业务数据的能力。例如,第一信息可以包括多种信息,例如可以包括完整性保护传输速率。
第一UE根据第一安全策略确定第一业务信息对应的第一保护方式包括:
第一UE根据第一安全策略、第一信息、预置的第二信息和第一业务信息对应的非安全需求确定第一业务信息对应的第一保护方式,第二信息与第一安全策略相关联,可以用于表征第一UE传输第一业务信息对应的业务数据的能力。
其中,第二信息也可以多种信息,例如可以包括完整性保护传输速率。
该实施方式提供了确定第一保护方式的一种可行方案,该方案考虑了第二UE的第一信息、第一UE的第二信息、第一业务信息对应的非安全需求以及第一安全策略,使得确定出的第一保护方式更适合第一业务信息对应的业务数据,进而使得根据第一保护方式确定出的第一QoS flow能够更好地传输第一业务信息对应的业务数据。
基于第一方面的第十种实施方式,本申请实施例提供了第一方面的第十一种实施方式,非安全需求为目标传输速率,第一信息包括第一完整性保护传输速率,第二信息包括第二完整性保护传输速率。
第一UE根据第一安全策略、第一信息、预置的第二信息和第一业务信息对应的非安全需求确定第一业务信息对应的第一保护方式包括:
在第一安全策略指示倾向于对第一业务信息对应的业务数据进行完整性保护的情况下,若第一完整性保护速率小于目标传输速率和/或第二完整性保护速率小于目标传输速率,则第一UE确定第一业务信息对应的第一保护方式为不对第一业务信息对应的业务数据进行完整性保护。
若第一完整性保护速率小于目标传输速率,则说明第二UE无法对第一业务信息对应的业务数据进行完整性保护;若第二完整性保护速率小于目标传输速率,则说明第一UE无法对第一业务信息对应的业务数据进行完整性保护;所以若第一安全策略指示倾向于对第一业务信息对应的业务数据进行完整性保护,第一UE则将第一保护方式确定为不对第一业务信息对应的业务数据进行完整性保护,从而避免第一保护方式为对第一业务信息对应的业务数据进行完整性保护,但实际上又无法对第一业务信息对应的业务数据进行完整性保护的情况。
基于第一方面,或第一方面的第一种实施方式,或第一方面的第二种实施方式,或第一方面的第三种实施方式,或第一方面的第四种实施方式,或第一方面的第五种实施方式,或第一方面的第六种实施方式,或第一方面的第七种实施方式,或第一方面的第八种实施方式,或第一方面的第九种实施方式,或第一方面的第十种实施方式,或第一方面的第十 一种实施方式,申请实施例提供了第一方面的第十二种实施方式,在该实施方式中,方法还包括:
第一UE获取第二UE的第一信息,第一信息与第一安全策略相关联;
在第一用户设备UE获取与第一业务信息对应的第一安全策略之后,在第一UE根据第一安全策略确定第一业务信息对应的第一服务质量流QoS flow之前,还包括:
第一UE根据第一安全策略确定第一信息以及第一UE的第二信息能够满足第一业务信息对应的非安全需求,第二信息与第一安全策略相关联。
若第一信息以及第一UE的第二信息不能满足第一业务信息对应的非安全需求,则不需要确定第一QoS flow,该实施方式能够避免这种情况的发生。
基于第一方面的第十二种实施方式,本申请实施例提供了第一方面的第十三种实施方式,
非安全需求为目标传输速率,第一信息包括第一完整性保护传输速率,第二信息包括第二完整性保护传输速率;
第一UE根据第一安全策略确定第一信息以及第一UE的第二信息能够满足第一业务信息对应的非安全需求包括:
基于第一安全策略指示需要对第一业务信息对应的业务数据进行完整性保护,第一UE比较自身的第二完整性保护传输速率和目标传输速率的相对大小,并比较了第一完整性保护传输速率和目标传输速率的相对大小。
最终,第一UE确定自身的第二完整性保护传输速率大于或等于第一业务信息对应的目标传输速率,且第一完整性保护传输速率大于或等于第一业务信息对应的目标传输速率。
在该实施方式中,第一UE确定第二完整性保护传输速率大于或等于第一业务信息对应的目标传输速率,且第一完整性保护传输速率大于或等于第一业务信息对应的目标传输速率,保证了第一UE和第二UE能够对第一业务信息对应的业务数据进行完整性保护。
基于第一方面,或第一方面的第一种实施方式,或第一方面的第二种实施方式,或第一方面的第三种实施方式,或第一方面的第四种实施方式,或第一方面的第五种实施方式,或第一方面的第六种实施方式,或第一方面的第七种实施方式,或第一方面的第八种实施方式,或第一方面的第九种实施方式,或第一方面的第十种实施方式,或第一方面的第十一种实施方式,或第一方面的第十二种实施方式,或第一方面的第十三种实施方式,本申请实施例提供了第一方面的第十四种实施方式,在该实施方式中,第一用户设备UE获取与第一业务信息对应的第一安全策略包括:
第一UE接收第二UE的预设安全策略,第二UE的预设安全策略与第一业务信息对应;
第一UE根据第二UE的预设安全策略和第一UE的预设安全策略确定第一安全策略,第一UE的预设安全策略与第一业务信息对应。
该实施方式提供了第一UE获取第一安全策略的一种可行方案,即结合第一UE和第二UE的预设安全策略最终确定第一安全策略。
基于第一方面,或第一方面的第一种实施方式,或第一方面的第二种实施方式,或第一方面的第三种实施方式,或第一方面的第四种实施方式,或第一方面的第五种实施方式, 或第一方面的第六种实施方式,或第一方面的第七种实施方式,或第一方面的第八种实施方式,或第一方面的第九种实施方式,或第一方面的第十种实施方式,或第一方面的第十一种实施方式,或第一方面的第十二种实施方式,或第一方面的第十三种实施方式,本申请实施例提供了第一方面的第十五种实施方式,在该实施方式中,第一用户设备UE获取与第一业务信息对应的第一安全策略包括:
第一UE向第二UE发送第一UE的预设安全策略,使得第二UE根据第二UE的预设安全策略和第一UE的预设安全策略确定第一安全策略;
第一UE接收来自第二UE的第一安全策略。
在该实施方式提供了第一UE获取第一安全策略的另一种可行方案,即第一UE将自身的预设安全策略发送至第二UE,然后第二UE结合第二UE的预设安全策略和第一UE的预设安全策略最终确定第一安全策略,最终再将第一安全策略发回至第一UE。
基于第一方面的第十五种实施方式,本申请实施例提供了第一方面的第十六种实施方式,在第一UE向第二UE发送第一UE的预设安全策略之前,所述方法还包括:
基于第一UE的预设安全策略指示需要对第一业务信息对应的业务数据进行完整性保护,第一UE比较自身的第二完整性保护传输速率和目标传输速率的相对大小;最终,第一UE确定自身的第二完整性保护传输速率大于或等于第一业务信息对应的目标传输速率。
在该实施方式中,在第一UE向第二UE发送第一UE的预设安全策略之前,第一UE确定自身的第二完整性保护传输速率大于或等于第一业务信息对应的目标传输速率,保证了第一UE能够对第一业务信息对应的业务数据进行完整性保护。
本申请实施例第二方面提供了一种确定服务质量流的方法,包括:
第一UE获取与第一业务信息对应的第一安全策略,第一安全策略为第一UE和第二UE传输第一业务信息对应的业务数据时所采用的安全策略。
其中,第一安全策略可以为机密性保护策略,也可以为完整性保护策略;当第一安全策略为机密性保护策略时,第一安全策略具体可以为需要机密性保护、倾向于机密性保护和不需要机密性保护;当第一安全策略为完整性保护时,第一安全策略可以为需要完整性保护、倾向于完整性保护和不需要完整性保护。
第一UE根据第一安全策略确定第一业务信息对应的第一保护方式,第一保护方式为第一UE和第二UE传输第一业务信息对应的业务数据时所采用的保护方式,其中确定第一保护方式的方法有多种。
第一UE向第二UE发送第一保护方式,使得第二UE根据第一保护方式确定第一业务信息对应的第一QoS flow,第一QoS flow用于第一UE与第二UE传输第一业务数据;
第一UE接收来自第二UE的QoS信息,QoS信息用于表征第一QoS flow,其中QoS信息可以包括流标识。
第一QoS flow可以是预先建立的用于传输其他业务信息的QoS flow,也可以新的QoS flow。
在本申请实施例中,第一UE向第二UE发送第一保护方式,第二UE根据第一保护方式确定第一QoS flow,当确定出的第一QoS flow为N条QoS flow中的一条时,即实现了QoS  flow的复用,从而节省资源。
基于第二方面,本申请实施例提供了第二方面的第一种实施方式,在第一UE根据第一安全策略确定第一业务信息对应的第一保护方式之前,方法还包括:
第一UE获取第二UE的第一信息,第一信息与第一安全策略相关联,可以用于表征第二UE传输第一业务信息对应的业务数据的能力。例如,第一信息可以包括多种信息,例如可以包括完整性保护传输速率。
第一UE根据第一安全策略确定第一业务信息对应的第一保护方式包括:
第一UE根据第一安全策略、第一信息、预置的第二信息和第一业务信息对应的非安全需求确定第一业务信息对应的第一保护方式,第二信息与第一安全策略相关联,可以用于表征第一UE传输第一业务信息对应的业务数据的能力。
其中,第二信息也可以多种信息,例如可以包括完整性保护传输速率。
该实施方式提供了确定第一保护方式的一种可行方案,该方案考虑了第二UE的第一信息、第一UE的第二信息、第一业务信息对应的非安全需求以及第一安全策略,使得确定出的第一保护方式更适合第一业务信息对应的业务数据。
基于第二方面的第一种实施方式,本申请实施例提供了第二方面的第二种实施方式,非安全需求为目标传输速率,第一信息包括第一完整性保护传输速率,第二信息包括第二完整性保护传输速率。
第一UE根据第一安全策略、第一信息、预置的第二信息和第一业务信息对应的非安全需求确定第一业务信息对应的第一保护方式包括:
在第一安全策略指示倾向于对第一业务信息对应的业务数据进行完整性保护的情况下,若第一完整性保护速率小于目标传输速率和/或第二完整性保护速率小于目标传输速率,则第一UE确定第一业务信息对应的第一保护方式为不对第一业务信息对应的业务数据进行完整性保护。
若第一完整性保护速率小于目标传输速率,则说明第二UE无法对第一业务信息对应的业务数据进行完整性保护;若第二完整性保护速率小于目标传输速率,则说明第一UE无法对第一业务信息对应的业务数据进行完整性保护;所以若第一安全策略指示倾向于对第一业务信息对应的业务数据进行完整性保护,第一UE则将第一保护方式确定为不对第一业务信息对应的业务数据进行完整性保护,从而避免第一保护方式为对第一业务信息对应的业务数据进行完整性保护,但实际上又无法对第一业务信息对应的业务数据进行完整性保护的情况。
本申请实施例第三方面提供了一种确定服务质量流的方法,包括:
第一UE接收来自第二UE的第一保护方式,第一保护方式为第一UE和第二UE传输第一业务信息对应的业务数据时所采用的保护方式;
第一UE根据第一保护方式确定第一业务信息对应的第一QoS flow,第一QoS flow用于第一UE与第二UE传输第一业务信息对应的业务数据,N为正整数;
第一UE向第二UE发送QoS信息,QoS信息用于表征第一QoS flow,其中QoS信息可以包括流标识。
在本申请实施例中,第一UE根据第一保护方式确定第一QoS flow,然后向第二UE发送第一QoS flow对应的QoS信息。
基于第三方面,本申请实施例提供了第三方面的第一种实施方式,第一UE根据第一保护方式确定第一业务信息对应的第一QoS flow包括:
第一UE根据第一保护方式以及预先建立的N条QoS flow确定第一业务信息对应的第一QoS flow。
在本申请实施例中,第一UE根据第一保护方式确定第一QoS flow,然后向第二UE发送第一QoS flow对应的QoS信息;当确定出的第一QoS flow为N条QoS flow中的一条时,即实现了QoS flow的复用,从而节省资源。
基于第三方面的第一种实施方式,本申请实施例提供了第三方面的第二种实施方式,第一UE根据第一保护方式及预先建立的N条QoS flow确定第一业务信息对应的第一QoS flow包括:
若第一保护方式与第二QoS flow对应的第二保护方式相同,则第一UE将第二QoS flow确定为第一业务信息对应的第一QoS flow,第二QoS flow为N条QoS flow中的一条。
在该实施方式中,若第一保护方式与第二保护方式相同,则将第二QoS flow作为第一QoS flow来传输第一业务信息对应的业务数据,实现了QoS flow复用的同时,避免了安全性矛盾。
基于第三方面的第一种实施方式,本申请实施例提供了第三方面的第三种实施方式,第一UE根据第一保护方式及预先建立的N条QoS flow确定第一业务信息对应的第一QoS flow包括:
若第一保护方式与第二QoS flow对应的第二保护方式相同,且第二QoS flow对应的非安全信息满足第一业务信息对应的非安全需求,则第一UE将第二QoS flow确定为第一业务信息对应的第一QoS flow,第二QoS flow为N条QoS flow中的一条。
其中,非安全需求可以为传输速率需求和时延需求等,相应地,非安全信息可以为带宽和时延等。
在该实施方式中,在实现QoS flow复用的同时,保证了第一保护方式与的第二保护方式相同,从而避免了安全性矛盾;同时还保证了第二QoS flow能够满足第一业务信息对应的非安全需求。
基于第三方面的第一种实施方式,或第三方面的第二种实施方式,或第三方面的第三种实施方式,本申请实施例提供了第三方面的第四种实施方式,第一UE根据第一保护方式及预先建立的N条QoS flow确定第一业务信息对应的第一QoS flow包括:
若第一保护方式与N条QoS flow中的任意一条QoS flow对应的保护方式都不同,则第一UE将第三QoS flow确定为第一业务信息对应的第一QoS flow,第三QoS flow不包含于N条QoS flow中。
在该实施方式中,由于N条QoS flow中不存在保护方式与第一保护方式相同的QoS flow,因此将不包含于N条QoS flow中的第三QoS flow作为第一QoS flow,即新建立一条QoS flow。
本申请实施例第四方面提供了一种确定服务质量流的装置,包括:
获取单元,用于获取与第一业务信息对应的第一安全策略,第一安全策略为第一UE和第二UE传输第一业务信息对应的业务数据时所采用的安全策略;
确定单元,用于根据第一安全策略确定第一业务信息对应的第一QoS flow,第一QoS flow用于第一UE与第二UE传输第一业务信息对应的业务数据。
基于第四方面,本申请实施例提供了第四方面的第一种实施方式,在该实施方式中,确定单元,用于根据第一安全策略以及预先建立的N条QoS flow确定第一业务信息对应的第一QoS flow,N为正整数。
第一QoS flow可以为N条QoS flow中的一条,第一QoS flow也可以不包含于N条QoS flow中。
在本申请实施例中,根据第一安全策略以及预先建立的N条QoS flow确定第一QoS flow,当确定出的第一QoS flow为N条QoS flow中的一条时,即实现了QoS flow的复用,从而节省资源。
基于第四方面的第一种实施方式,本申请实施例提供了第四方面的第二种实施方式,在该实施方式中,确定单元,用于当第一安全策略与第二QoS flow对应的第二安全策略相同时,将第二QoS flow确定为第一业务信息对应的第一QoS flow,第二QoS flow为N条QoS flow中的一条。
在该实施方式中,若第一安全策略与第二安全策略相同,则将第二QoS flow作为第一QoS flow来传输第一业务信息对应的业务数据,实现了QoS flow复用的同时,避免了安全性矛盾。
基于第四方面的第一种实施方式,本申请实施例提供了第四方面的第二种实施方式,在该实施方式中,确定单元,用于当第一安全策略与第二QoS flow对应的第二安全策略相同,且第二QoS flow对应的非安全信息满足第一业务信息对应的非安全需求时,将第二QoS flow确定为第一业务信息对应的第一QoS flow,第二QoS flow为N条QoS flow中的一条。
其中,非安全需求可以为传输速率需求和时延需求等,相应地,非安全信息可以为带宽和时延等。
在该实施方式中,在实现QoS flow复用的同时,保证了第一安全策略与第二安全策略相同,从而避免了安全性矛盾;同时还保证了第二QoS flow能够满足第一业务信息对应的非安全需求。
基于第四方面的第一种实施方式,或第四方面的第二种实施方式,或第四方面的第三种实施方式,本申请实施例提供了第四方面的第四种实施方式,确定单元,用于当第一安全策略与N条QoS flow中的任意一条QoS flow对应的安全策略都不同时,将第三QoS flow确定为第一业务信息对应的第一QoS flow,第三QoS flow不包含于N条QoS flow中。
在该实施方式中,由于N条QoS flow中不存在安全策略与第一安全策略相同的QoS flow,因此将不包含于N条QoS flow中的第三QoS flow作为第一QoS flow,即新建立一条QoS flow。
基于第四方面,本申请实施例提供了第四方面的第五种实施方式,确定单元,用于根据第一安全策略确定第一业务信息对应的第一保护方式,第一保护方式为第一UE和第二 UE传输第一业务信息对应的业务数据时所采用的保护方式;
根据第一保护方式确定第一业务信息对应的第一QoS flow。
基于第四方面的第五种实施方式,本申请实施例提供了第四方面的第六种实施方式,确定单元,用于根据第一保护方式及预先建立的N条QoS flow确定第一业务信息对应的第一QoS flow。
基于第四方面的第六种实施方式,本申请实施例提供了第四方面的第七种实施方式,确定单元,用于当第一保护方式与第二QoS flow对应的第二保护方式相同时,将第二QoS flow确定为第一业务信息对应的第一QoS flow,第二QoS flow为N条QoS flow中的一条。
在该实施方式中,若第一保护方式与第二保护方式相同,则将第二QoS flow作为第一QoS flow来传输第一业务信息对应的业务数据,实现了QoS flow复用的同时,避免了安全性矛盾。
基于第四方面的第六种实施方式,本申请实施例提供了第四方面的第八种实施方式,确定单元,用于当第一保护方式与第二QoS flow对应的第二保护方式相同,且第二QoS flow对应的非安全信息满足第一业务信息对应的非安全需求时,将第二QoS flow确定为第一业务信息对应的第一QoS flow,第二QoS flow为N条QoS flow中的一条。
其中,非安全需求可以为传输速率需求和时延需求等,相应地,非安全信息可以为带宽和时延等。
在该实施方式中,在实现QoS flow复用的同时,保证了第一保护方式与的第二保护方式相同,从而避免了安全性矛盾;同时还保证了第二QoS flow能够满足第一业务信息对应的非安全需求。
基于第四方面的第六种实施方式,或第四方面的第七种实施方式,或第四方面的第八种实施方式,本申请实施例提供了第四方面的第九种实施方式,确定单元,用于当第一保护方式与N条QoS flow中的任意一条QoS flow对应的保护方式都不同时,将第三QoS flow确定为第一业务信息对应的第一QoS flow,第三QoS flow不包含于N条QoS flow中。
在该实施方式中,由于N条QoS flow中不存在保护方式与第一保护方式相同的QoS flow,因此将不包含于N条QoS flow中的第三QoS flow作为第一QoS flow,即新建立一条QoS flow。
基于第四方面的第五种实施方式,或第四方面的第六种实施方式,或第四方面的第七种实施方式,或第四方面的第八种实施方式,或第四方面的第九种实施方式,本申请实施例提供了第四方面的第十种实施方式,获取单元还用于获取第二UE的第一信息,第一信息与第一安全策略相关联,可以用于表征第二UE传输第一业务信息对应的业务数据的能力。例如,第一信息可以包括多种信息,例如可以包括完整性保护传输速率。
确定单元,用于根据第一安全策略、第一信息、预置的第二信息和第一业务信息对应的非安全需求确定第一业务信息对应的第一保护方式,第二信息与第一安全策略相关联,可以用于表征第一UE传输第一业务信息对应的业务数据的能力。
其中,第二信息也可以多种信息,例如可以包括完整性保护传输速率。
该实施方式提供了确定第一保护方式的一种可行方案,在该方案中,考虑了第二UE的第一信息、第一UE的第二信息、第一业务信息对应的非安全需求以及第一安全策略。
基于第四方面的第十种实施方式,本申请实施例提供了第四方面的第十一种实施方式,非安全需求为目标传输速率,第一信息包括第一完整性保护传输速率,第二信息包括第二完整性保护传输速率。
确定单元,用于在第一安全策略指示倾向于对第一业务信息对应的业务数据进行完整性保护的情况下,当第一完整性保护速率小于目标传输速率和/或第二完整性保护速率小于目标传输速率时,确定第一业务信息对应的第一保护方式为不对第一业务信息对应的业务数据进行完整性保护。
基于第四方面,或第四方面的第一种实施方式,或第四方面的第二种实施方式,或第四方面的第三种实施方式,或第四方面的第四种实施方式,或第四方面的第五种实施方式,或第四方面的第六种实施方式,或第四方面的第七种实施方式,或第四方面的第八种实施方式,或第四方面的第九种实施方式,或第四方面的第十种实施方式,或第四方面的第十一种实施方式,申请实施例提供了第四方面的第十二种实施方式,在该实施方式中,获取单元还用于:获取第二UE的第一信息,第一信息与第一安全策略相关联;
确定单元,还用于根据第一安全策略确定第一信息以及第一UE的第二信息能够满足第一业务信息对应的非安全需求,第二信息与第一安全策略相关联。
基于第四方面的第十二种实施方式,本申请实施例提供了第四方面的第十三种实施方式,非安全需求为目标传输速率,第一信息包括第一完整性保护传输速率,第二信息包括第二完整性保护传输速率;
确定单元,用于基于第一安全策略指示需要对第一业务信息对应的业务数据进行完整性保护,确定自身的第二完整性保护传输速率大于或等于第一业务信息对应的目标传输速率,且第一完整性保护传输速率大于或等于第一业务信息对应的目标传输速率。基于第四方面,或第四方面的第一种实施方式,或第四方面的第二种实施方式,或第四方面的第三种实施方式,或第四方面的第四种实施方式,或第四方面的第五种实施方式,或第四方面的第六种实施方式,或第四方面的第七种实施方式,或第四方面的第八种实施方式,或第四方面的第九种实施方式,或第四方面的第十种实施方式,或第四方面的第十一种实施方式,或第一方面的第十二种实施方式,或第一方面的第十三种实施方式,本申请实施例提供了第四方面的第十四种实施方式,在该实施方式中,获取单元用于接收第二UE的预设安全策略,第二UE的预设安全策略与第一业务信息对应;
根据第二UE的预设安全策略和第一UE的预设安全策略确定第一安全策略,第一UE的预设安全策略与第一业务信息对应。
基于第四方面,或第四方面的第一种实施方式,或第四方面的第二种实施方式,或第四方面的第三种实施方式,或第四方面的第四种实施方式,或第四方面的第五种实施方式,或第四方面的第六种实施方式,或第四方面的第七种实施方式,或第四方面的第八种实施方式,或第四方面的第九种实施方式,或第四方面的第十种实施方式,或第四方面的第十一种实施方式,或第一方面的第十二种实施方式,或第一方面的第十三种实施方式,本申请实施例提供了第四方面的第十五种实施方式,在该实施方式中,获取单元用于向第二UE发送第一UE的预设安全策略,使得第二UE根据第二UE的预设安全策略和第一UE的预设 安全策略确定第一安全策略;
接收来自第二UE的第一安全策略。
基于第四方面的第十五种实施方式,本申请实施例提供了第四方面的第十六种实施方式,确定单元还用于确定自身的第二完整性保护传输速率大于或等于第一业务信息对应的目标传输速率。
本申请实施例第五方面提供了一种确定服务质量流的装置,包括:
获取单元,用于获取与第一业务信息对应的第一安全策略,第一安全策略为第一UE和第二UE传输第一业务信息对应的业务数据时所采用的安全策略;
确定单元,用于根据第一安全策略确定第一业务信息对应的第一保护方式,第一保护方式为第一UE和第二UE传输第一业务信息对应的业务数据时所采用的保护方式,其中确定第一保护方式的方法有多种。
发送单元,用于向第二UE发送第一保护方式,使得第二UE根据第一保护方式确定第一业务信息对应的第一QoS flow,第一QoS flow用于第一UE与第二UE传输第一业务数据;
接收单元,用于接收来自第二UE的QoS信息,QoS信息用于表征第一QoS flow,其中QoS信息可以包括流标识。
基于第五方面,本申请实施例提供了第五方面的第一种实施方式,获取单元,还用于获取第二UE的第一信息,第一信息与第一安全策略相关联,可以用于表征第二UE传输第一业务信息对应的业务数据的能力。例如,第一信息可以包括多种信息,例如可以包括完整性保护传输速率。
确定单元,用于根据第一安全策略、第一信息、预置的第二信息和第一业务信息对应的非安全需求确定第一业务信息对应的第一保护方式,第二信息与第一安全策略相关联,可以用于表征第一UE传输第一业务信息对应的业务数据的能力。
其中,第二信息也可以多种信息,例如可以包括完整性保护传输速率。
该实施方式提供了确定第一保护方式的一种可行方案,该方案考虑了第二UE的第一信息、第一UE的第二信息、第一业务信息对应的非安全需求以及第一安全策略,使得确定出的第一保护方式更适合第一业务信息对应的业务数据。
基于第五方面的第一种实施方式,本申请实施例提供了第五方面的第二种实施方式,非安全需求为目标传输速率,第一信息包括第一完整性保护传输速率,第二信息包括第二完整性保护传输速率。
确定单元,用于在第一安全策略指示倾向于对第一业务信息对应的业务数据进行完整性保护的情况下,若第一完整性保护速率小于目标传输速率和/或第二完整性保护速率小于目标传输速率,则确定第一业务信息对应的第一保护方式为不对第一业务信息对应的业务数据进行完整性保护。
本申请实施例第六方面提供了一种确定服务质量流的装置,包括:
接收单元,用于接收来自第二UE的第一保护方式,第一保护方式为第一UE和第二UE传输第一业务信息对应的业务数据时所采用的保护方式;
确定单元,用于根据第一保护方式确定第一业务信息对应的第一QoS flow,第一QoS flow用于第一UE与第二UE传输第一业务信息对应的业务数据,N为正整数;
发送单元,用于向第二UE发送QoS信息,QoS信息用于表征第一QoS flow,其中QoS信息可以包括流标识。
基于第六方面,本申请实施例提供了第六方面的第一种实施方式,确定单元,用于根据第一保护方式以及预先建立的N条QoS flow确定第一业务信息对应的第一QoS flow。
基于第六方面的第一种实施方式,本申请实施例提供了第七方面的第二种实施方式,确定单元,用于当第一保护方式与第二QoS flow对应的第二保护方式相同时,将第二QoS flow确定为第一业务信息对应的第一QoS flow,第二QoS flow为N条QoS flow中的一条。
在该实施方式中,若第一保护方式与第二保护方式相同,则将第二QoS flow作为第一QoS flow来传输第一业务信息对应的业务数据,实现了QoS flow复用的同时,避免了安全性矛盾。
基于第六方面的第一种实施方式,本申请实施例提供了第六方面的第三种实施方式,确定单元,用于当第一保护方式与第二QoS flow对应的第二保护方式相同,且第二QoS flow对应的非安全信息满足第一业务信息对应的非安全需求时,将第二QoS flow确定为第一业务信息对应的第一QoS flow,第二QoS flow为N条QoS flow中的一条。
其中,非安全需求可以为传输速率需求和时延需求等,相应地,非安全信息可以为带宽和时延等。
在该实施方式中,在实现QoS flow复用的同时,保证了第一保护方式与的第二保护方式相同,从而避免了安全性矛盾;同时还保证了第二QoS flow能够满足第一业务信息对应的非安全需求。
基于第六方面的第一种实施方式,或第六方面的第二种实施方式,或第六方面的第三种实施方式,本申请实施例提供了第六方面的第四种实施方式,确定单元,用于当第一保护方式与N条QoS flow中的任意一条QoS flow对应的保护方式都不同时,将第三QoS flow确定为第一业务信息对应的第一QoS flow,第三QoS flow不包含于N条QoS flow中。
在该实施方式中,由于N条QoS flow中不存在保护方式与第一保护方式相同的QoS flow,因此将不包含于N条QoS flow中的第三QoS flow作为第一QoS flow,即新建立一条QoS flow。
本申请第七方面提供一种终端设备,包括:至少一个处理器和存储器,存储器存储有可在处理器上运行的计算机执行指令,当所述计算机执行指令被所述处理器执行时,所述终端设备执行如上述第一方面至第三方面中任意一种实施方式所述的方法。
本申请实施例第八方面提供一种芯片或者芯片系统,该芯片或者芯片系统包括至少一个处理器和通信接口,通信接口和至少一个处理器通过线路互联,至少一个处理器用于运行计算机程序或指令,以执行第一方面至第三方面中任意一种实施方式所描述的确定服务质量流的方法。
其中,芯片中的通信接口可以为输入/输出接口、管脚或电路等。
基于第八方面,本申请实施例还提供了第八方面的第一种实施方式,本申请中上述描述的芯片或者芯片系统还包括至少一个存储器,该至少一个存储器中存储有指令。该存储 器可以为芯片内部的存储单元,例如,寄存器、缓存等,也可以是该芯片的存储单元(例如,只读存储器、随机存取存储器等)。
本申请实施例第九方面提供了一种计算机存储介质,该计算机存储介质用于储存为上述终端设备所用的计算机软件指令,其包括用于执行为终端设备所设计的程序。
该终端设备可以如前述第四方面、第五方面或第六方面所描述的定服务质量流的装置。
本申请实施例第十四方面提供了一种计算机程序产品,该计算机程序产品包括计算机软件指令,该计算机软件指令可通过处理器进行加载来实现上述第一方面至第三方面中任意一种实施方式所描述的确定服务质量流的方法中的流程。
从以上技术方案可以看出,本申请实施例具有以下优点:
第一用户设备UE先获取与第一业务信息对应的第一安全策略,第一安全策略为第一UE和第二UE传输第一业务信息对应的业务数据时所采用的安全策略;然后根据第一安全策略确定第一业务信息对应的第一服务质量流QoS flow,第一QoS flow用于第一UE与第二UE传输第一业务信息对应的业务数据;由于在确定第一QoS flow的过程中考虑了第一安全策略,所以可以避免未考虑安全策略而导致QoS flow存在缺陷。
附图说明
图1为本申请实施例中通信系统的架构图;
图2为本申请实施例中确定服务质量流的方法的第一实施例示意图;
图3为本申请实施例中第一UE确定第一QoS flow的实施例示意图;
图4为本申请实施例中第一UE获取第一安全策略的第一实施例示意图;
图5为本申请实施例中第一UE获取第一安全策略的第二实施例示意图;
图6本申请实施例中确定服务质量流的方法的第二实施例示意图;
图7为本申请实施例中确定服务质量流的方法的第三实施例示意图;
图8为确定服务质量流的方法的应用例示意图;
图9为本申请实施例中确定服务质量流的装置的第一实施例示意图;
图10为本申请实施例中确定服务质量流的装置的第二实施例示意图;
图11为本申请实施例中确定服务质量流的装置的第三实施例示意图;
图12为本申请实施例中终端设备的结构示意图。
具体实施方式
本申请实施例提供了一种确定服务质量流的方法,能够避免未考虑安全策略而导致确定出的QoS flow存在缺陷。
本申请实施例可以应用于图1所示的通信系统中。该通信系统可以包括多个用户设备UE,任意两个UE之间可以通过可以基于PC5协议直接进行通信。其中,图1仅示出了两个UE,具体为UEA和UEB。
在本申请实施例中,UE是一种具有无线收发功能的设备,可以部署在陆地上,包括室 内或室外、手持或车载;也可以部署在水面上(如轮船等);还可以部署在空中(例如飞机、气球和卫星上等)。所述终端设备可以是手机(mobile phone)、平板电脑(pad)、带无线收发功能的电脑、虚拟现实(virtual reality,VR)终端、增强现实(augmented reality,AR)终端、工业控制(industrial control)中的无线终端、无人驾驶(self driving)中的无线终端、远程医疗(remote medical)中的无线终端、智能电网(smart grid)中的无线终端、运输安全(transportation safety)中的无线终端、智慧城市(smart city)中的无线终端、智慧家庭(smart home)中的无线终端等。为便于说明,图1以手机表示UE。
当两个UE需要传输业务数据时,需要先确定一条服务质量流QoS flow。QoS flow是一种逻辑信道,用于为业务数据的传输提供某种传输保证。确定QoS flow的过程可以理解为确定QoS flow的QoS信息。在确定QoS flow后,会建立相应的承载。两个UE之间可以建立多条承载,一条承载可对应多条QoS flow,同一承载上所有QoS flow对应的QoS保障是相同的。
如图1所示,UEA和UEB之间建立有一条承载,该承载对应三条QoS flow,分别为服务质量流A、服务质量流B和服务质量流C。
目前,为了对两个UE之间的通信过程进行保护,在传输业务数据前,两个UE会协商得到以业务为粒度的安全策略,然后根据该安全策略确定具体的保护方式,最终根据该保护方式对传输的业务数据进行保护。而一种业务对应的业务数据可以由一条或多条QoS flow,所以安全策略和保护方式最终会与QoS flow绑定。例如,图1所示的三条QoS flow各自分别对应不同的安全策略和保护方式。
然而,现有的确定QoS flow的方法并没有考虑安全策略,所以会导致最终确定的QoS flow存在某些缺陷。为此,本申请实施例提供了一种基于安全策略确定QoS flow的方法,该方法考虑了安全策略,从而可以避免未考虑安全而导致QoS flow存在缺陷。下面对本申请实施例中确定服务质量流的方法进行具体说明。
具体地,请参阅图2,本申请实施例中确定服务质量流的方法的第一实施例示意图。本申请实施例提供了一种确定服务质量流的方法,包括:
步骤101,第一用户设备UE获取与第一业务信息对应的第一安全策略。
可以理解的是,第一UE在获取第一安全策略的同时,也可以同时获取到第一业务信息以及第一业务信息与第一安全策略的对应关系,第一UE可以通过该对应关系确定第一安全策略与第一业务信息对应。
其中,第一业务信息用于对业务进行标识,具体可以包括业务的标识或者业务对应的应用标识;或者业务的类型;或者业务的类型,本申请实施例对业务的标识或类型以及应用标识或类型不做具体限定。
第一安全策略为第一UE和第二UE传输第一业务信息对应的业务数据时所采用的安全策略;第一安全策略包括有一种或多种安全策略,本申请实施例对此不做限定。
例如,第一安全策略可以包括机密性保护策略,具体地,第一安全策略可以包括需要机密性保护、倾向于机密性保护或不需要机密性保护;第一安全策略也可以包括完整性保 护策略,具体地,第一安全策略可以包括需要完整性保护、倾向于完整性保护或不需要完整性保护。
需要说明的是,第一UE获取第一安全策略的方法有多种,本申请实施例对此不做具体限定。此后将结合图4和图5进行具体介绍。
102,第一UE根据第一安全策略确定第一业务信息对应的第一服务质量流QoS flow。
其中,第一QoS flow用于第一UE与第二UE传输第一业务信息对应的业务数据。
确定第一QoS flow的过程可以理解为确定第一QoS flow对应的QoS信息;QoS信息可以包括流标识,还可以包括传输速率、时延和误码率等。
在第一UE确定第一QoS flow后,第一UE可以向第二UE发送第一QoS flow,使得第一UE和第二UE根据第一QoS flow传输第一业务信息对应的业务数据。
需要说明的是,根据第一安全策略确定第一业务信息对应的第一QoS flow的方法有多种,本申请实施例对此不做限定。其中,第一安全策略的种类不同,确定第一QoS flow的方法可以不同。
在本申请实施例中,由于在确定第一QoS flow的过程中考虑了第一安全策略,所以能够避免未考虑安全策略而导致确定出的QoS flow存在缺陷。
可以理解的是,在第一UE确定第一QoS flow之前,第一UE和第二UE之间可以存在N条QoS flow,也可以不存在QoS flow,其中N为正整数。
示例性地,在第一UE确定第一QoS flow之前,若第一UE和第二UE之间不存在QoS flow,则第一UE确定的第一QoS flow则是一条新的QoS flow。
示例性地,在第一UE确定第一QoS flow之前,若第一UE和第二UE之间存在N条QoS flow,则第一UE根据第一安全策略确定第一业务信息对应的第一服务质量流QoS flow包括:
第一UE根据第一安全策略以及预先建立的N条QoS flow确定第一业务信息对应的第一QoS flow。
其中,第一QoS flow可以是N条QoS flow中的一条,也可以新的一条QoS flow,即不属于N条QoS flow。
需要说明的是,第一UE根据第一安全策略以及预先建立的N条QoS flow确定第一QoS flow的方法有多种,本申请实施例对此不做具体限定。
基于前述说明可知,为了对第一UE和第二UE的通信过程进行保护,N条QoS flow中的任意一条QoS flow可以对应一条安全策略和一种保护方式,所以在本申请实施例中,第一UE根据第一安全策略确定第一QoS flow,以防止第一安全策略与N条QoS flow对应的安全策略存在安全性矛盾;并且,当确定出的第一QoS flow为N条QoS flow中的一条时,即实现了QoS flow的复用,从而节省资源。
下面对第一UE根据第一安全策略以及预先建立的N条QoS flow确定第一QoS flow的方法进行具体介绍。
基于上述实施例,在本申请实施例提供的确定服务质量流的方法的另一个实施例中,第一UE根据第一安全策略以及预先建立的N条QoS flow确定第一业务信息对应的第一QoS  flow包括:
若第一安全策略与第二QoS flow对应的第二安全策略相同,则第一UE将第二QoS flow确定为第一业务信息对应的第一QoS flow,第二QoS flow为N条QoS flow中的一条。
需要说明的是,确定第一安全策略与第二QoS flow对应的第二安全策略相同的方法有多种,本申请实施例对此不做具体限定。例如,可以将第一安全策略与N条QoS flow各自对应的安全策略一一比对,然后确定第一安全策略与第二QoS flow对应的第二安全策略相同;也可以先确定安全策略为第一安全策略的承载,然后从该承载对应的一条或多条QoS flow中确定第二QoS flow。
可以理解的是,假设第一安全策略与第二安全策略不同,若将第二QoS flow确定为第一业务信息对应的第一QoS flow,则会出现安全性矛盾。
例如,假设第一安全策略为需要完整性保护,而第二安全策略为不需要完整性保护,此时若将第二QoS flow确定为第一业务信息对应的第一QoS flow,则可能无法为第一业务信息对应的业务数据进行完整性保护。
再例如,假设第一安全策略为需要完整性保护,则第一安全策略对应的保护方式为对第一业务信息对应的业务数据进行完整性保护;假设第二安全策略为倾向于完整性保护,则第二安全策略对应的保护方式可能为对第一业务信息对应的业务数据进行完整性保护,也可能为不对第一业务信息对应的业务数据进行完整性保护。所以若第二安全策略对应的保护方式为不对第一业务信息对应的业务数据进行完整性保护,同样可能无法为第一业务信息对应的业务数据进行完整性保护。
因此,在本申请实施例中,基于第一安全策略与第二安全策略相同,将第二QoS flow作为第一QoS flow来传输第一业务信息对应的业务数据,实现了QoS flow复用的同时,避免第一安全策略与第二安全策略不同而导致安全性矛盾。
在上述实施例中,基于第一安全策略与第二安全策略相同,将第二QoS flow确定为第一QoS flow,此时,可以认为第一QoS flow能够满足第一业务信息对应的业务数据的安全需求。可以理解的是,第一业务信息对应的业务数据的需求除了包括安全需求外,还可以包括非安全需求。
具体地,基于前述实施例,在本申请实施例提供的确定服务质量流的方法的另一个实施例中,第一UE根据第一安全策略以及预先建立的N条QoS flow确定第一业务信息对应的第一QoS flow包括:
若第一安全策略与第二QoS flow对应的第二安全策略相同,且第二QoS flow对应的非安全信息满足第一业务信息对应的非安全需求,则第一UE将第二QoS flow确定为第一业务信息对应的第一QoS flow,第二QoS flow为N条QoS flow中的一条。
其中,非安全需求可以包括传输速率需求、时延需求以及误码率需求等;对应地,第二QoS flow对应的非安全信息可以包括传输速率、时延以及误码率。
需要说明的是,确定第一安全策略与第二QoS flow对应的第二安全策略相同的方法可参照前述实施例的相关说明进行理解。
在本申请实施例中,在实现QoS flow复用的同时,保证了第一安全策略与第二安全策 略相同,从而避免了安全性矛盾;同时还保证了第二QoS flow能够满足第一业务信息对应的非安全需求。
基于前述说明可知,第一QoS flow可以为一条新的QoS flow,即不包含于N条QoS flow中,因此,基于上述各个实施例,在本申请实施例提供的确定服务质量流的方法的另一个实施例中,第一UE根据第一安全策略以及预先建立的N条QoS flow确定第一业务信息对应的第一QoS flow包括:
若第一安全策略与N条QoS flow中的任意一条QoS flow对应的安全策略都不同,则第一UE将第三QoS flow确定为第一业务信息对应的第一QoS flow,第三QoS flow不包含于N条QoS flow中。
在本申请实施例中,由于N条QoS flow中不存在安全策略与第一安全策略相同的QoS flow,因此将不包含于N条QoS flow中的第三QoS flow作为第一QoS flow,即建立一条新的QoS flow,从而避免了安全性矛盾。
可以理解的是,若第一业务信息存在非安全需求,则第一UE根据第一安全策略以及预先建立的N条QoS flow确定第一业务信息对应的第一QoS flow也可以包括:
若N条QoS flow中的任意一条QoS flow对应的非安全信息都不能满足第一业务信息对应的非安全需求,则第一UE将第三QoS flow确定为第一业务信息对应的第一QoS flow,第三QoS flow不包含于N条QoS flow中。
在上述各个实施例中,通过对比第一安全策略与N条QoS flow各自对应的安全策略,可以确定出第一QoS flow,除此之外,也可以通过对比第一安全策略对应的保护方式与N条QoS flow各自对应的保护方式,来确定第一QoS flow。
具体地,基于前述实施例,如图3所示,在本申请实施例提供的确定服务质量流的方法的另一个实施例中,第一UE根据第一安全策略以及预先建立的N条QoS flow确定第一业务信息对应的第一QoS flow包括:
步骤201,第一UE根据第一安全策略确定第一业务信息对应的第一保护方式,第一保护方式为第一UE和第二UE传输第一业务信息对应的业务数据时所采用的保护方式。
需要说明的是,根据第一安全策略确定第一保护方式的方法有多种,本申请实施例对此不做限定。
例如,假设第一安全策略为完整性保护策略,具体地,若第一安全策略为需要完整性保护,则第一保护方式可以为对第一业务信息对应的业务数据进行完整性保护;若第一安全策略为倾向于完整性保护,则第一保护方式可以为对第一业务信息对应的业务数据进行完整性保护,也可以为不对第一业务信息对应的业务数据进行完整性保护;若第一安全策略为不需要完整性保护,则第一保护方式可以为不对第一业务信息对应的业务数据进行完整性保护。
第一安全策略属为机密性保护策略时确定第一保护方式的过程与第一安全策略为完整性保护策略时确定第一保护方式的过程类似,具体可参照上述过程进行理解。
步骤202,第一UE根据第一保护方式确定第一业务信息对应的第一QoS flow。
基于前述说明可知,若第一安全策略为倾向于完整性保护,则第一保护方式可以为对 第一业务信息对应的业务数据进行完整性保护,也可以为不对第一业务信息对应的业务数据进行完整性保护。
所以在本申请实施例中,第一先根据第一安全策略确定第一保护方式,然后根据第一保护方式确定第一QoS flow,从而避免根据第一安全策略确定第一QoS flow的方法带来的缺陷。
基于前述说明可知,在第一UE确定第一QoS flow之前,第一UE和第二UE之间可能存在N条QoS flow,所以,示例性地,第一UE根据第一保护方式确定第一业务信息对应的第一QoS flow包括:
第一UE根据第一保护方式及预先建立的N条QoS flow确定第一业务信息对应的第一QoS flow;或者第一UE根据第一保护方式确定建立一条新的第一QoS flow,这里不要求是否两个UE之间已经建立了N条QoS flow。
其中,第一QoS flow可以是N条QoS flow中的一条,也可以新的一条QoS flow,即不属于N条QoS flow。
需要说明的是,第一UE根据第一保护方式以及预先建立的N条QoS flow确定第一QoS flow的方法有多种,本申请实施例对此不做具体限定。
基于前述说明可知,为了对第一UE和第二UE的通信过程进行保护,N条QoS flow中的任意一条QoS flow可以对应一条安全策略和一种保护方式,所以在本申请实施例中,第一UE根据第一保护方式确定第一QoS flow,以防止第一保护方式与N条QoS flow对应的保护方式存在安全性矛盾;并且,当确定出的第一QoS flow为N条QoS flow中的一条时,即实现了QoS flow的复用,从而节省资源。
下面对第一UE根据第一保护方式以及预先建立的N条QoS flow确定第一QoS flow的方法进行具体介绍。
基于上述实施例,在本申请实施例提供的确定服务质量流的方法的另一个实施例中,第一UE根据第一保护方式及预先建立的N条QoS flow确定第一业务信息对应的第一QoS flow包括:
若第一保护方式与第二QoS flow对应的第二保护方式相同,则第一UE将第二QoS flow确定为第一业务信息对应的第一QoS flow,第二QoS flow为N条QoS flow中的一条。
需要说明的是,确定第一保护方式与第二QoS flow对应的第二保护方式相同的方法有多种,本申请实施例对此不做具体限定。例如,可以将第一保护方式与N条QoS flow各自对应的保护方式一一比对,然后确定第一保护方式与第二QoS flow对应的第二保护方式相同;也可以先确定保护方式为第一保护方式的承载,然后从该承载对应的一条或多条QoS flow中确定第二QoS flow。
可以理解的是,假设第一保护方式与第二保护方式不同,若将第二QoS flow确定为第一业务信息对应的第一QoS flow,则会出现安全性矛盾。
例如,假设第一保护方式为对第一业务信息对应的业务数据进行完整性保护,而第二安全策略为不对第一业务信息对应的业务数据进行完整性保护,此时若将第二QoS flow确定为第一业务信息对应的第一QoS flow,则可能不会为第一业务信息对应的业务数据进行 完整性保护。
因此,在本申请实施例中,基于第一保护方式与第二保护方式相同,将第二QoS flow作为第一QoS flow来传输第一业务信息对应的业务数据,实现了QoS flow复用的同时,避免第一保护方式与第二保护方式不同而导致安全性矛盾。
在上述实施例中,基于第一保护方式与第二保护方式相同,将第二QoS flow确定为第一QoS flow,此时,可以认为第二QoS flow能够满足第一业务信息对应的业务数据的安全需求。可以理解的是,第一业务信息对应的业务数据除了安全需求外,还可以存在非安全需求。
具体地,基于前述实施例,在本申请实施例提供的确定服务质量流的方法的另一个实施例中,第一UE根据第一保护方式及预先建立的N条QoS flow确定第一业务信息对应的第一QoS flow包括:
若第一保护方式与第二QoS flow对应的第二保护方式相同,且第二QoS flow对应的非安全信息满足第一业务信息对应的非安全需求,则第一UE将第二QoS flow确定为第一业务信息对应的第一QoS flow,第二QoS flow为N条QoS flow中的一条。
其中,非安全需求可以包括传输速率需求、时延需求以及误码率需求等;对应地,第二QoS flow对应的非安全信息可以包括传输速率、时延以及误码率。
需要说明的是,确定第一保护方式与第二QoS flow对应的第二保护方式相同的方法可参照前述实施例的相关说明进行理解。
在本申请实施例中,在实现QoS flow复用的同时,保证了第一保护方式与第二保护方式相同,从而避免了安全性矛盾;同时还保证了第二QoS flow能够满足第一业务信息对应的非安全需求。
基于前述说明可知,第一QoS flow可以为一条新的QoS flow,即不包含于N条QoS flow中,因此,基于上述各个实施例,在本申请实施例提供的确定服务质量流的方法的另一个实施例中,第一UE根据第一保护方式及预先建立的N条QoS flow确定第一业务信息对应的第一QoS flow包括:
若第一保护方式与N条QoS flow中的任意一条QoS flow对应的保护方式都不同,则第一UE将第三QoS flow确定为第一业务信息对应的第一QoS flow,第三QoS flow不包含于N条QoS flow中。
在本申请实施例中,由于N条QoS flow中不存在保护方式与第一保护方式相同的QoS flow,因此将不包含于N条QoS flow中的第三QoS flow作为第一QoS flow,即建立一条新的QoS flow,从而避免了安全性矛盾。
可以理解的是,若第一业务信息存在非安全需求,则第一UE根据第一保护方式以及预先建立的N条QoS flow确定第一业务信息对应的第一QoS flow也可以包括:
若N条QoS flow中的任意一条QoS flow对应的非安全信息都不能满足第一业务信息对应的非安全需求,则第一UE将第三QoS flow确定为第一业务信息对应的第一QoS flow,第三QoS flow不包含于N条QoS flow中。
基于前述说明可知,确定第一保护方式的方法有多种,下面对此进行具体说明。
基于上述各个实施例,在本申请实施例提供的确定服务质量流的方法的另一个实施例中,在第一UE根据第一安全策略确定第一业务信息对应的第一保护方式之前,方法还包括:
第一UE获取第二UE的第一信息,第一信息与第一安全策略相关联,可以用于表征第二UE传输第一业务信息对应的业务数据的能力。
第一信息可以有多种,例如可以为完整性保护传输速率、完整性保护传输时延、机密性保护传输速率和机密性保护传输时延等。
基于获取到第一信息,第一UE根据第一安全策略确定第一业务信息对应的第一保护方式包括:
第一UE根据第一安全策略、第一信息、预置的第二信息和第一业务信息对应的非安全需求确定第一业务信息对应的第一保护方式,第二信息与第一安全策略相关联,可以用于表征第一UE传输第一业务信息对应的业务数据的能力。
需要说明的是,第一UE根据第一安全策略、第一信息、预置的第二信息和第一业务信息对应的非安全需求确定第一保护方式的方法有多种,本申请实施例对此不做具体限定。
本申请实施例再确定第一保护方式的过程中,不仅考虑了第一安全策略,而且考虑了第二UE传输第一业务信息对应的业务数据的能力、第一UE传输第一业务信息对应的业务数据的能力以及第一业务信息对应的非安全需求,使得确定出的第一保护方式更适合第一业务信息对应的业务数据,进而使得根据第一保护方式确定出的第一QoS flow能够更好地传输第一业务信息对应的业务数据。
下面对第一UE根据第一安全策略、第一信息、预置的第二信息和第一业务信息对应的非安全需求确定第一保护方式的方法进行具体介绍。
具体地,基于上述实施例,在本申请实施例提供的确定服务质量流的方法的另一个实施例中,非安全需求为目标传输速率,第一信息包括第一完整性保护传输速率,第二信息包括第二完整性保护传输速率。
第一UE根据第一安全策略、第一信息、预置的第二信息和第一业务信息对应的非安全需求确定第一业务信息对应的第一保护方式包括:
在第一安全策略指示倾向于对第一业务信息对应的业务数据进行完整性保护的情况下,若第一完整性保护速率小于目标传输速率和/或第二完整性保护速率小于目标传输速率,则第一UE确定第一业务信息对应的第一保护方式为不对第一业务信息对应的业务数据进行完整性保护。
可以理解的是,第一安全策略指示倾向于对第一业务信息对应的业务数据进行完整性保护,即第一安全策略为倾向于完整性保护,对应地,保护方式可以为不对第一业务信息对应的业务数据进行完整性保护,也可以为不对第一业务信息对应的业务数据进行完整性保护。
然而,由于第一完整性保护速率小于目标传输速率和/或第二完整性保护速率小于目标传输速率,即第一UE和第二UE中的至少一者的完整性保护速率无法达到第一业务信息对应的目标传输速率,所以第一UE和第二UE中的至少一者无法对第一业务信息对应的业务数据进行完整性保护。
因此,在本申请实施例中,第一UE确定第一业务信息对应的第一保护方式为不对第一业务信息对应的业务数据进行完整性保护,从而避免第一保护方式为对第一业务信息对应的业务数据进行完整性保护,但实际上又无法对第一业务信息对应的业务数据进行完整性保护的情况。
除此之外,基于上述实施例,在本申请实施例提供的确定服务质量流的方法的另一个实施例中,第一UE根据第一安全策略、第一信息、预置的第二信息和第一业务信息对应的非安全需求确定第一业务信息对应的第一保护方式还可以包括:
在第一安全策略指示不对第一业务信息对应的业务数据进行完整性保护的情况下(即第一安全策略为不需要完整性保护),若第一完整性保护速率小于目标传输速率和/或第二完整性保护速率小于目标传输速率,则第一UE确定第一业务信息对应的第一保护方式为不对第一业务信息对应的业务数据进行完整性保护;
在第一安全策略为需要完整性保护的情况下,若第一完整性保护速率大于目标传输速率且第二完整性保护速率大于目标传输速率,则第一UE确定第一业务信息对应的第一保护方式为对第一业务信息对应的业务数据进行完整性保护;
在第一安全策略为倾向于完整性保护的情况下,若第一完整性保护速率大于目标传输速率且第二完整性保护速率大于目标传输速率,则第一UE确定第一业务信息对应的第一保护方式为对第一业务信息对应的业务数据进行完整性保护或不对第一业务信息对应的业务数据进行完整性保护;
在第一安全策略为不需要完整性保护的情况下,若第一完整性保护速率大于目标传输速率且第二完整性保护速率大于目标传输速率,则第一UE确定第一业务信息对应的第一保护方式为不对第一业务信息对应的业务数据进行完整性保护。
基于上述说明可以看出,当第一安全策略为不需要完整性保护时,最终确定的第一保护方式与第一完整性保护速率和第二完整性保护速率无关,因此若第一安全策略为不需要完整性保护,可以不考虑第一完整性保护速率与目标传输速率之间的关系,以及第二完整性保护速率与目标传输速率之间的关系,即直接确定第一保护方式为不对第一业务信息对应的业务数据进行完整性保护。
另外,需要说明的是,在第一安全策略指示需要对第一业务信息对应的业务数据进行完整性保护的情况下(即第一安全策略为需要完整性保护),若第一完整性保护速率小于目标传输速率和/或第二完整性保护速率小于目标传输速率,第一UE可以停止第一保护方式确定,并向第二UE发送拒绝消息,该拒绝消息中可以包括拒绝指示和/或拒绝原因,其中,拒绝指示用于表示拒绝传输第一业务信息对应的业务数据,拒绝原因可以为第一完整性保护速率小于目标传输速率导致第二UE无法对第一业务信息对应的业务数据进行完整性保护,和/或第二完整性保护速率小于目标传输速率导致第二UE无法对第一业务信息对应的业务数据进行完整性保护。
在前述各个实施例中,第一UE在确定第一安全策略后,会根据第一安全策略确定第一QoS flow;可以理解的是,若第一业务信息对应有非安全需求,则在确定第一安全策略后,可以先根据第一安全策略判断第一UE和第二UE能否满足该非安全需求,在确定能够满足 该非安全需求后,再根据第一安全策略确定第一QoS flow。
具体地,基于上述各个实施例,在本申请实施例提供的确定服务质量流的方法的另一个实施例中,方法还包括:
第一UE获取第二UE的第一信息,第一信息与第一安全策略相关联。
在第一用户设备UE获取与第一业务信息对应的第一安全策略之后,在第一UE根据第一安全策略确定第一业务信息对应的第一服务质量流QoS flow之前,还包括:
第一UE根据第一安全策略确定第一信息以及第一UE的第二信息能够满足第一业务信息对应的非安全需求,第二信息与第一安全策略相关联。
需要说明的是,本申请实施例中的第一信息、第二信息以及非安全需求与前述实施例中提及的,第一信息、第二信息以及非安全需求相同,具体可参照前述实施例的相关说明进行理解。
若第一信息以及第一UE的第二信息不能满足第一业务信息对应的非安全需求,则不需要确定第一QoS flow,该实施方式能够避免这种情况的发生。
其中,第一UE根据第一安全策略确定第一信息以及第一UE的第二信息能够满足第一业务信息对应的非安全需求的方法包括多种,本申请实施例对此不做具体限定。
示例性地,若非安全需求为目标传输速率,第一信息包括第一完整性保护传输速率,第二信息包括第二完整性保护传输速率,则第一UE根据第一安全策略确定第一信息以及第一UE的第二信息能够满足第一业务信息对应的非安全需求包括:
基于第一安全策略指示需要对第一业务信息对应的业务数据进行完整性保护,第一UE确定第一UE的第二完整性保护传输速率大于或等于第一业务信息对应的目标传输速率,且第一完整性保护传输速率大于或等于第一业务信息对应的目标传输速率。
其中,第一完整性保护传输速率可以由第二UE发送,相应地,第一UE会接收来自第二UE的第一完整性保护传输速率;第二完整性保护传输速率是预设的,也可以是第一UE根据资源的实际使用情况具体确定。
在本申请实施例中,由于对业务数据进行完整性保护会占用较多资源,对传输速率影响较大,所以在第一UE确定第一安全策略后,若第一安全策略为需要完整性保护,则第一UE先比较第二完整性保护传输速率和目标传输速率的相对大小,以及第一完整性保护传输速率和目标传输速率的相对大小,以判断第二完整性保护传输速率和第一完整性保护传输速率是否达到目标传输速率,然后根据判断结果选择是否确定第一QoS flow。
具体地,若第二完整性保护传输速率大于或等于目标传输速率,且第一完整性保护传输速率大于或等于目标传输速率,则说明第一UE和第二UE能够对第一业务信息对应的业务数据进行完整保护,因此第一UE可以继续根据第一安全策略确定第一QoS flow;否则说明第一UE和第二UE种的至少一者不能对第一业务信息对应的业务数据进行完整保护,因此第一UE不需要根据第一安全策略确定第一QoS flow,并且,第一UE可以向第二UE发送拒绝消息,该拒绝消息用于表示拒绝传输第一业务信息对应的业务数据。
基于前述实施例可知,第一用户设备UE获取与第一业务信息对应的第一安全策略的方法有多种,下面结合图4和图5对第一UE确定第一安全策略的方法进行具体介绍。
示例性地,如图4所示,第一用户设备UE获取与第一业务信息对应的第一安全策略包括:
步骤301,第一UE接收第二UE的预设安全策略,第二UE的预设安全策略与第一业务信息对应。
可以理解的是,第二UE存储有预设安全策略,该预设安全策略仅表示第二UE对第一业务信息对应的业务数据进行保护所采用的安全策略。
在本申请实施例中,第二UE向第一UE发送自身的预设安全策略,相应地,第一UE则可以接收到第二UE的预设安全策略;其中,第二UE向第一UE发送自身的预设安全策略的同时,还可以向第一UE发送第一业务信息以及第一业务信息与第二UE的预设安全策略之间的对应关系,相应地,第一UE会接收到第一业务信息以及第一业务信息与第二UE的预设安全策略之间的对应关系,第一UE通过该对应关系可以确定第二UE的预设安全策略是与第一业务信息对应的,并且可以根据第一业务信息获取自身的预设安全策略。其中,基于前述实施例已对第一业务信息进行了说明,因此可参照前述实施例的相关说明进行理解。
步骤302,第一UE根据第二UE的预设安全策略和第一UE的预设安全策略确定第一安全策略,第一UE的预设安全策略与第一业务信息对应。
可以理解的是,第一UE也存储有与第一业务信息对应的预设安全策略,该预设安全策略仅表示第一UE对第一业务信息对应的业务数据进行保护所采用的安全策略。
由于第一UE的预设安全策略可以与第二UE的预设安全策略相同,也可以与第二UE的预设安全策略不同,所以第一UE结合第二UE的预设安全策略和第一UE的预设安全策略,最终可以确定第一安全策略。
确定第一安全策略包括多种方式,本申请实施例对此不做限定。例如,方式1,第一UE的预设安全策略与第二UE的预设安全策略中至少一个为不需要机密性保护,则第一安全策略为不需要机密性保护;第一UE的预设安全策略与第二UE的预设安全策略都为需要机密性保护,则第一安全策略为需要机密性保护;第一UE的预设安全策略与第二UE的预设安全策略都为倾向于机密性保护,则第一安全策略为倾向于机密性保护。例如方式2,第一UE的预设安全策略与第二UE的预设安全策略中至少一个为需要机密性保护,则第一安全策略为需要机密性保护;第一UE的预设安全策略与第二UE的预设安全策略都为不需要加密保护,则第一安全策略为不需要加密保护;第一UE的预设安全策略与第二UE的预设安全策略都为倾向于机密性保护,则第一安全策略为倾向于机密性保护。完整性保护对应第一安全策略的确定过程,与机密性保护对应第一安全策略的确定过程类似,本申请实施例在此不做赘述。
在上述示例中,由第一UE自行确定第一安全策略,此外,也可以由第二UE确定第一安全策略。下面结合图5进行具体说明。
示例性地,如图5所示,第一用户设备UE获取与第一业务信息对应的第一安全策略包括:
步骤401,第一UE向第二UE发送第一UE的预设安全策略,使得第二UE根据第二UE的预设安全策略和第一UE的预设安全策略确定第一安全策略。
其中,第一UE向第二UE发送自身的预设安全策略的同时,还可以向第二UE发送第一业务信息以及第一业务信息与第二UE的预设安全策略之间的对应关系,相应地,第二UE会接收到第一业务信息以及第一业务信息与第二UE的预设安全策略之间的对应关系,第二UE通过该对应关系可以确定第一UE的预设安全策略是与第一业务信息对应的,并且可以根据第一业务信息获取自身的预设安全策略。需要说明的是,上述示例已对第二UE的预设安全策略、第一UE的预设安全策略以及第一业务信息进行了说明,具体可参阅上述示例进行理解。
步骤402,第一UE接收来自第二UE的第一安全策略。
在本申请实施例中,第一UE将自身的预设安全策略发送至第二UE,使得第二UE最终确定第一安全策略。
基于上述说明可知,第一安全策略由第一UE的预设安全策略和第二UE的预设安全策略确定,所以若第一UE的预设安全策略指示需要对第一业务信息对应的业务数据进行完整性保护,即第一UE的预设安全策略为需要完整性保护,那么最终确定得到的第一安全策略必然是需要完整性保护。
而对业务数据进行完整性保护会占用较多资源,所以完整性保护对传输速率影响较大。为此,在步骤301前,第一UE可以先比较自身的第二完整性保护传输速率和第一业务信息对应的目标传输速率的相对大小,以判断自身的第二完整性保护传输速率是否达到目标传输速率,然后根据判断结果选择是否执行步骤301。
具体地,若第一UE的预设安全策略为需要完整性保护,则在步骤301之前,第一用户设备UE获取与第一业务信息对应的第一安全策略还可以包括:
基于第一UE的预设安全策略指示需要对第一业务信息对应的业务数据进行完整性保护,第一UE确定自身的第二完整性保护传输速率大于或等于第一业务信息对应的目标传输速率。
其中,第一业务信息对应的目标传输速率可以理解为传输第一业务信息对应的业务数据所需达到的速率。
第二完整性保护传输速率大于或等于第一业务信息对应的目标传输速率,则说明第一UE能够对第一业务信息对应的业务数据进行完整保护,因此第一UE可以向第二UE发送第一UE的预设安全策略。
若第二完整性保护传输速率小于第一业务信息对应的目标传输速率,则说明第一UE不能对第一业务信息对应的业务数据进行完整保护,因此第一UE不需要向第二UE发送第一UE的预设安全策略。
在上述两个实施例中,第一安全策略是根据第二UE的预设安全策略和第一UE的预设安全策略的。
可以理解的是,第二UE中可能未存储预设安全策略,第一UE也可能未存储预设安全策略。若第二UE中未存储预设安全策略,第一UE或第二UE可以将第一UE的预设安全策略作为第一安全策略;若第一UE中未存储预设安全策略,第一UE或第二UE可以将第二UE的预设安全策略作为第一安全策略。
假设第一UE中未存储预设安全策略,则第一UE可以仅发送第一业务信息,可以不向第二UE发送预设安全策略,或向第二UE发送不存在预设安全策略的指示。
相应地,若第二UE仅接收到第一业务信息,而未接收到第一UE的对应的预设安全策略(与第一业务信息对应),第二UE可以将自身的的预设安全策略(与第一业务信息对应)作为第一安全策略;若第二UE未接收到第一UE的预设安全策略,第二UE也可以将存储在本地的默认安全策略作为第一UE的预设安全策略(与第一业务信息对应),然后根据默认安全策略和第二UE的预设安全策略确定第一业务信息对应第一安全策略。
需要说明的是,预设安全策略是指与特定业务信息对应的安全策略,而默认安全策略可以理解为与所有业务信息对应的安全策略。当缺少特定业务信息对应的安全策略时,可以采用默认安全策略代替特定业务信息对应的安全策略。例如,在本申请实施例中,采用默认安全策略代替第一UE的预设安全策略(与第一业务信息对应)。
假设第二UE中未存储第一业务信息对应的预设安全策略,第二UE在接收到第一UE的预设安全策略后,可以将第一UE的预设安全策略(与第一业务信息对应)作为与第一业务信息对应的第一安全策略;第二UE也可以将存储在本地的默认安全策略作为自身的预设安全策略(与第一业务信息对应),然后根据默认安全策略和第一UE的预设安全策略(与第一业务信息对应)确定与第一业务信息对应的第一安全策略。
另外,若第二UE中未存储预设安全策略,且第一UE也未存储预设安全策略,则第一UE可以根据预置的安全策略确定规则确定第一安全策略。其中,预置的安全策略确定规则可以有多种,本申请实施例对此不做限定;例如,预置的安全策略确定规则可以是将存储在本地的默认安全策略作为与第一业务信息对应的第一安全策略。具体地,预置的安全策略确定规则可以直接将需要完整性保护、不需要完整性保护或倾向于完整性保护确定为第一安全策略,也可以直接将需要完整性保护、不需要完整性保护或倾向于完整性保护确定为第一安全策略。
在前述实施例中,第一UE根据第一安全策略确定第一保护方式,然后根据第一保护方式确定第一QoS flow。需要说明的是,第一UE根据第一安全策略确定第一保护方式后,也可以将第一保护方式发送至第二UE,使得第二UE根据第一保护方式确定第一QoS flow,最终第一UE接收来自第二UE的QoS信息,以确定第一QoS flow。
具体地,如图6所示,本申请实施例提供了一种确定服务质量流的方法的另一个实施例,包括:
步骤501,第一UE获取与第一业务信息对应的第一安全策略,第一安全策略为第一UE和第二UE传输第一业务信息对应的业务数据时所采用的安全策略。
步骤502,第一UE根据第一安全策略确定第一业务信息对应的第一保护方式,第一保护方式为第一UE和第二UE传输第一业务信息对应的业务数据时所采用的保护方式,其中确定第一保护方式的方法有多种。
步骤503,第一UE向第二UE发送第一保护方式,使得第二UE根据第一保护方式确定第一业务信息对应的第一QoS flow,第一QoS flow用于第一UE与第二UE传输第一业务数据。
可以理解的是,第一UE发送第一保护方式的同时,还可以发送第一业务信息以及第一业务信息与第一保护方式的对应关系,第二UE根据该对应关系可以确定第一保护方式是与第一业务信息对应的。
步骤504,第一UE接收来自第二UE的QoS信息,QoS信息用于表征第一QoS flow,其中QoS信息可以包括流标识。
需要说明的是,本申请实施例中,第一UE获取第一安全策略的方法以及确定第一保护方式的方法与前述实施例均相同,因此可以参照前述实施例的相关说明进行理解。
在本申请实施例中,第一UE向第二UE发送第一保护方式,使得第二UE根据第一保护方式确定第一QoS flow。
基于上述实施例,在本申请实施例提供了一种确定服务质量流的方法的另一个实施例中,在第一UE根据第一安全策略确定第一业务信息对应的第一保护方式之前,方法还包括:
第一UE获取第二UE的第一信息,第一信息用于表征第二UE传输第一业务信息对应的业务数据的能力。
第一UE根据第一安全策略确定第一业务信息对应的第一保护方式包括:
第一UE根据第一安全策略、第一信息、预置的第二信息和第一业务信息对应的非安全需求确定第一业务信息对应的第一保护方式,第二信息用于表征第一UE传输第一业务信息对应的业务数据的能力。
需要说明的是,本申请实施例中,第一UE确定第一保护方式的方法与前述实施例相同,因此可以参照前述实施例的相关说明进行理解。
基于上述实施例,在本申请实施例提供了一种确定服务质量流的方法的另一个实施例中,非安全需求为目标传输速率,第一信息包括第一完整性保护传输速率,第二信息包括第二完整性保护传输速率。
第一UE根据第一安全策略、第一信息、预置的第二信息和第一业务信息对应的非安全需求确定第一业务信息对应的第一保护方式包括:
在第一安全策略指示倾向于对第一业务信息对应的业务数据进行完整性保护的情况下,若第一完整性保护速率小于目标传输速率和/或第二完整性保护速率小于目标传输速率,则第一UE确定第一业务信息对应的第一保护方式为不对第一业务信息对应的业务数据进行完整性保护。
需要说明的是,本申请实施例中,第一UE确定第一保护方式的方法与前述实施例相同,因此可以参照前述实施例的相关说明进行理解。
在前述实施例中,当第一UE根据第一保护方式确定第一QoS flow时,第一UE需要先获取第一安全策略,然后根据第一安全策略确定第一保护方式;需要说明的是,第一UE也可以直接获取第一保护方式。
具体地,如图7所示,本申请实施例提供了一种确定服务质量流的方法的另一个实施例,包括:
步骤601,第一UE接收来自第二UE的第一保护方式,第一保护方式为第一UE和第二UE传输第一业务信息对应的业务数据时所采用的保护方式。
可以理解的是,第一UE接收第一保护方式的同时,还可以接收第一业务信息以及第一业务信息与第一保护方式的对应关系,第一UE根据该对应关系可以确定第一保护方式是与第一业务信息对应的。
步骤602,第一UE根据第一保护方式确定第一业务信息对应的第一QoS flow,第一QoS flow用于第一UE与第二UE传输第一业务信息对应的业务数据,N为正整数;
步骤603,第一UE向第二UE发送QoS信息,QoS信息用于表征第一QoS flow,其中QoS信息可以包括流标识。
需要说明的是,在本申请实施例中,第一UE根据第一保护方式确定第一QoS flow的方法与前述实施例中的方法相同,具体可参照前述实施例的相关说明进行理解,本申请实施例在此不做赘述。
基于上述实施例,在本申请实施例提供了一种确定服务质量流的方法的另一个实施例中,第一UE根据第一保护方式确定第一业务信息对应的第一QoS flow包括:
第一UE根据第一保护方式以及预先建立的N条QoS flow确定第一业务信息对应的第一QoS flow。
在本申请实施例中,第一UE根据第一保护方式确定第一QoS flow,然后向第二UE发送第一QoS flow对应的QoS信息;当确定出的第一QoS flow为N条QoS flow中的一条时,即实现了QoS flow的复用,从而节省资源。
基于上述实施例,在本申请实施例提供了一种确定服务质量流的方法的另一个实施例中,第一UE根据第一保护方式及预先建立的N条QoS flow确定第一业务信息对应的第一QoS flow包括:
若第一保护方式与第二QoS flow对应的第二保护方式相同,则第一UE将第二QoS flow确定为第一业务信息对应的第一QoS flow,第二QoS flow为N条QoS flow中的一条。
在该实施方式中,若第一保护方式与第二保护方式相同,则将第二QoS flow作为第一QoS flow来传输第一业务信息对应的业务数据,实现了QoS flow复用的同时,避免了安全性矛盾。
基于上述实施例,在本申请实施例提供了一种确定服务质量流的方法的另一个实施例中,第一UE根据第一保护方式及预先建立的N条QoS flow确定第一业务信息对应的第一QoS flow包括:
若第一保护方式与第二QoS flow对应的第二保护方式相同,且第二QoS flow对应的非安全信息满足第一业务信息对应的非安全需求,则第一UE将第二QoS flow确定为第一业务信息对应的第一QoS flow,第二QoS flow为N条QoS flow中的一条。
其中,非安全需求可以为传输速率需求和时延需求等,相应地,非安全信息可以为带宽和时延等。
在该实施方式中,在实现QoS flow复用的同时,保证了第一保护方式与的第二保护方式相同,从而避免了安全性矛盾;同时还保证了第二QoS flow能够满足第一业务信息对应的非安全需求。
基于上述实施例,在本申请实施例提供了一种确定服务质量流的方法的另一个实施例 中,第一UE根据第一保护方式及预先建立的N条QoS flow确定第一业务信息对应的第一QoS flow包括:
若第一保护方式与N条QoS flow中的任意一条QoS flow对应的保护方式都不同,则第一UE将第三QoS flow确定为第一业务信息对应的第一QoS flow,第三QoS flow不包含于N条QoS flow中。
在该实施方式中,由于N条QoS flow中不存在保护方式与第一保护方式相同的QoS flow,因此将不包含于N条QoS flow中的第三QoS flow作为第一QoS flow,即新建立一条QoS flow。为了便于理解,下面以一应用例对本申请实施例提供的确定服务质量流的方法进行进一步说明。在该应用中,假设UEA和UEB之间已建立有N条QoS flow,此时,由UEA发起请求,请求建立业务连接,以传输第一业务信息对应的业务数据。其中,UEA中存储有与第一业务信息对应的预设安全策略。
如图8所示,该应用例包括:
步骤701,基于UEA对应的预设安全策略为需要或者倾向于完整性保护,UEA确定UEA对应的完整性保护速率大于第一业务信息对应的目标传输速率。
步骤702,UEA向UEB发送请求消息。
该请求消息中包括第一业务信息、第一业务信息对应的目标传输速率、UEA对应的预设安全策略以及UEA对应的完整性保护速率。
步骤703,UEB根据UEB对应的预设安全策略和UEA对应的预设安全策略确定第一安全策略为需要完整性保护。
步骤704,基于第一安全策略为需要完整性保护,UEB确定UEA对应的完整性保护速率大于第一业务信息对应的目标传输速率,且UEB对应的完整性保护速率大于第一业务信息对应的目标传输速率。
步骤705,UEB根据第一安全策略确定第一业务信息对应的第一保护方式。
步骤706,UEB根据第一保护方式以及预先建立的N条QoS flow将第二QoS flow确定为第一业务信息对应的第一QoS flow,其中第二QoS flow属于N条QoS flow。
步骤707,UEB向UEA发送QoS信息,该QoS信息用于表征第一QoS flow。
上述应用例的场景为完整性保护的场景,需要说明的是,上述应用例同样适用于机密性保护的场景,以及同时包括机密性保护和完整性保护的场景。例如,当上述应用例同样适用于机密性保护的场景时,第一安全策略为需要机密性保护,UEB则需确定UEA对应的机密性保护速率大于第一业务信息对应的目标传输速率,且UEB对应的机密性保护速率大于第一业务信息对应的目标传输速率。
需要说明的是,在上述各个实施例中,UE(包括第一UE、第二UE、UEA和UEB)中的非安全需求(包括传输速率和时延等)可以UE接收到的,即由通信的对端发送该非安全需求;也可以是UE根据预置的第一业务信息和非安全需求的对应关系确定的。
示例性地,假设第二UE向第一UE发送第一业务信息和第二UE的预设安全策略,第一UE根据第一UE的预设安全策略和第二UE的预设安全策略确定第一安全策略;此外,第一UE还获取第二UE的第一信息,第一信息与第一安全策略相关联,最后第一UE根据第一安 全策略确定第一信息以及第一UE的第二信息能够满足第一业务信息对应的非安全需求,第二信息与第一安全策略相关联。
在该示例中,第二UE可以直接向第一UE发送第一业务信息对应的非安全需求。
第二UE也可以不向第一UE发送第一业务信息对应的非安全需求,而是由第二UE根据预置的第一业务信息和非安全需求的对应关系确定第一业务信息对应的非安全需求。
需要说明的是,第一UE根据预置的第一业务信息和非安全需求的对应关系确定第一业务信息对应的非安全需求,第二UE根据预置的第一业务信息和非安全需求的对应关系确定第一业务信息对应的非安全需求,这两者可能存在不同。作为一种可实现的方式,第二UE将自身确定出的第一业务信息对应的非安全需求发送至第一UE,第一UE结合第二UE确定出的第一业务信息对应的非安全需求和第一UE自身确定出的第一业务信息对应的非安全需求,最终确定第一业务信息对应的非安全需求。
下面对本申请实施例中的装置进行说明。
请参阅图9,本申请实施例中确定服务质量流的装置的第一实施例示意图。
本申请实施例提供了确定服务质量流的装置的第一实施例,包括:
获取单元100,用于获取与第一业务信息对应的第一安全策略,第一安全策略为第一UE和第二UE传输第一业务信息对应的业务数据时所采用的安全策略;
确定单元200,用于根据第一安全策略确定第一业务信息对应的第一QoS flow,第一QoS flow用于第一UE与第二UE传输第一业务信息对应的业务数据。
在本申请实施例提供的确定服务质量流的装置的另一个实施例中,确定单元200,用于根据第一安全策略以及预先建立的N条QoS flow确定第一业务信息对应的第一QoS flow,N为正整数。
在本申请实施例提供的确定服务质量流的装置的另一个实施例中,确定单元200,用于当第一安全策略与第二QoS flow对应的第二安全策略相同时,将第二QoS flow确定为第一业务信息对应的第一QoS flow,第二QoS flow为N条QoS flow中的一条。
在本申请实施例提供的确定服务质量流的装置的另一个实施例中,确定单元200,用于当第一安全策略与第二QoS flow对应的第二安全策略相同,且第二QoS flow对应的非安全信息满足第一业务信息对应的非安全需求时,将第二QoS flow确定为第一业务信息对应的第一QoS flow,第二QoS flow为N条QoS flow中的一条。
在本申请实施例提供的确定服务质量流的装置的另一个实施例中,确定单元200,用于当第一安全策略与N条QoS flow中的任意一条QoS flow对应的安全策略都不同时,将第三QoS flow确定为第一业务信息对应的第一QoS flow,第三QoS flow不包含于N条QoS flow中。
在本申请实施例提供的确定服务质量流的装置的另一个实施例中,确定单元200,用于根据第一安全策略确定第一业务信息对应的第一保护方式,第一保护方式为第一UE和第二UE传输第一业务信息对应的业务数据时所采用的保护方式;
根据第一保护方式确定第一业务信息对应的第一QoS flow。
在本申请实施例提供的确定服务质量流的装置的另一个实施例中,确定单元200,用 于根据第一保护方式及预先建立的N条QoS flow确定第一业务信息对应的第一QoS flow。
在本申请实施例提供的确定服务质量流的装置的另一个实施例中,确定单元200,用于当第一保护方式与第二QoS flow对应的第二保护方式相同时,将第二QoS flow确定为第一业务信息对应的第一QoS flow,第二QoS flow为N条QoS flow中的一条。
在本申请实施例提供的确定服务质量流的装置的另一个实施例中,确定单元200,用于当第一保护方式与第二QoS flow对应的第二保护方式相同,且第二QoS flow对应的非安全信息满足第一业务信息对应的非安全需求时,将第二QoS flow确定为第一业务信息对应的第一QoS flow,第二QoS flow为N条QoS flow中的一条。
在本申请实施例提供的确定服务质量流的装置的另一个实施例中,确定单元200,用于当第一保护方式与N条QoS flow中的任意一条QoS flow对应的保护方式都不同时,将第三QoS flow确定为第一业务信息对应的第一QoS flow,第三QoS flow不包含于N条QoS flow中。
在本申请实施例提供的确定服务质量流的装置的另一个实施例中,获取单元100还用于获取第二UE的第一信息,第一信息与第一安全策略相关联,可以用于表征第二UE传输第一业务信息对应的业务数据的能力。例如,第一信息可以包括多种信息,例如可以包括完整性保护传输速率。
确定单元200,用于根据第一安全策略、第一信息、预置的第二信息和第一业务信息对应的非安全需求确定第一业务信息对应的第一保护方式,第二信息与第一安全策略相关联,可以用于表征第一UE传输第一业务信息对应的业务数据的能力。
在本申请实施例提供的确定服务质量流的装置的另一个实施例中,非安全需求为目标传输速率,第一信息包括第一完整性保护传输速率,第二信息包括第二完整性保护传输速率。
确定单元200,用于在第一安全策略指示倾向于对第一业务信息对应的业务数据进行完整性保护的情况下,当第一完整性保护速率小于目标传输速率和/或第二完整性保护速率小于目标传输速率时,确定第一业务信息对应的第一保护方式为不对第一业务信息对应的业务数据进行完整性保护。
在本申请实施例提供的确定服务质量流的装置的另一个实施例中,获取单元100用于接收第二UE的预设安全策略,第二UE的预设安全策略与第一业务信息对应;
根据第二UE的预设安全策略和第一UE的预设安全策略确定第一安全策略,第一UE的预设安全策略与第一业务信息对应。
在本申请实施例提供的确定服务质量流的装置的另一个实施例中,获取单元100还用于:获取第二UE的第一信息,第一信息与第一安全策略相关联;
确定单元200,还用于根据第一安全策略确定第一信息以及第一UE的第二信息能够满足第一业务信息对应的非安全需求,第二信息与第一安全策略相关联。
在本申请实施例提供的确定服务质量流的装置的另一个实施例中,非安全需求为目标传输速率,第一信息包括第一完整性保护传输速率,第二信息包括第二完整性保护传输速率。
确定单元200,用于基于第一安全策略指示需要对第一业务信息对应的业务数据进行完整性保护,确定第一UE的第二完整性保护传输速率大于或等于第一业务信息对应的目标传输速率,且第一完整性保护传输速率大于或等于第一业务信息对应的目标传输速率。
在本申请实施例提供的确定服务质量流的装置的另一个实施例中,获取单元100用于向第二UE发送第一UE的预设安全策略,使得第二UE根据第二UE的预设安全策略和第一UE的预设安全策略确定第一安全策略;
接收来自第二UE的第一安全策略。
在本申请实施例提供的确定服务质量流的装置的另一个实施例中,确定单元200还用于确定自身的第二完整性保护传输速率大于或等于第一业务信息对应的目标传输速率。
请参阅图10,本申请实施例中确定服务质量流的装置的第二实施例示意图。
本申请实施例提供了确定服务质量流的装置的第二实施例,包括:
获取单元300,用于获取与第一业务信息对应的第一安全策略,第一安全策略为第一UE和第二UE传输第一业务信息对应的业务数据时所采用的安全策略;
确定单元400,用于根据第一安全策略确定第一业务信息对应的第一保护方式,第一保护方式为第一UE和第二UE传输第一业务信息对应的业务数据时所采用的保护方式,其中确定第一保护方式的方法有多种。
发送单元500,用于向第二UE发送第一保护方式,使得第二UE根据第一保护方式确定第一业务信息对应的第一QoS flow,第一QoS flow用于第一UE与第二UE传输第一业务数据;
接收单元600,用于接收来自第二UE的QoS信息,QoS信息用于表征第一QoS flow,其中QoS信息可以包括流标识。
在本申请实施例提供的确定服务质量流的装置的另一个实施例中,获取单元300,还用于获取第二UE的第一信息,第一信息与第一安全策略相关联,可以用于表征第二UE传输第一业务信息对应的业务数据的能力。
确定单元400,用于根据第一安全策略、第一信息、预置的第二信息和第一业务信息对应的非安全需求确定第一业务信息对应的第一保护方式,第二信息与第一安全策略相关联,可以用于表征第一UE传输第一业务信息对应的业务数据的能力。
在本申请实施例提供的确定服务质量流的装置的另一个实施例中,非安全需求为目标传输速率,第一信息包括第一完整性保护传输速率,第二信息包括第二完整性保护传输速率。
确定单元400,用于在第一安全策略指示倾向于对第一业务信息对应的业务数据进行完整性保护的情况下,若第一完整性保护速率小于目标传输速率和/或第二完整性保护速率小于目标传输速率,则确定第一业务信息对应的第一保护方式为不对第一业务信息对应的业务数据进行完整性保护。
请参阅图11,本申请实施例中确定服务质量流的装置的第三实施例示意图。
本申请实施例提供了确定服务质量流的装置的第三实施例,包括:
接收单元700,用于接收来自第二UE的第一保护方式,第一保护方式为第一UE和第 二UE传输第一业务信息对应的业务数据时所采用的保护方式;
确定单元800,用于根据第一保护方式确定第一业务信息对应的第一QoS flow,第一QoS flow用于第一UE与第二UE传输第一业务信息对应的业务数据,N为正整数;
发送单元900,用于向第二UE发送QoS信息,QoS信息用于表征第一QoS flow,其中QoS信息可以包括流标识。
在本申请实施例提供的确定服务质量流的装置的另一个实施例中,确定单元800,用于根据第一保护方式以及预先建立的N条QoS flow确定第一业务信息对应的第一QoS flow。
在本申请实施例提供的确定服务质量流的装置的另一个实施例中,确定单元800,用于当第一保护方式与第二QoS flow对应的第二保护方式相同时,将第二QoS flow确定为第一业务信息对应的第一QoS flow,第二QoS flow为N条QoS flow中的一条。
在本申请实施例提供的确定服务质量流的装置的另一个实施例中,确定单元800,用于当第一保护方式与第二QoS flow对应的第二保护方式相同,且第二QoS flow对应的非安全信息满足第一业务信息对应的非安全需求时,将第二QoS flow确定为第一业务信息对应的第一QoS flow,第二QoS flow为N条QoS flow中的一条。
在本申请实施例提供的确定服务质量流的装置的另一个实施例中,确定单元800,用于当第一保护方式与N条QoS flow中的任意一条QoS flow对应的保护方式都不同时,将第三QoS flow确定为第一业务信息对应的第一QoS flow,第三QoS flow不包含于N条QoS flow中。
请参阅图12,本申请实施例中终端设备一个实施例可以包括一个或一个以上处理器801,存储器802,通信接口803。
存储器802可以是短暂存储或持久存储。更进一步地,处理器801可以配置为与存储器802通信,在控制设备上执行存储器802中的一系列指令操作。
本实施例中,处理器801可以执行前述图2至图9所示实施例中第一UE所执行的操作,具体此处不再赘述。
本实施例中,处理器801中的具体功能模块划分可以与前述图9、图10或图11中所描述的功能模块划分方式类似,此处不再赘述。
本申请实施例还提供一种芯片或者芯片系统,该芯片或者芯片系统包括至少一个处理器和通信接口,通信接口和至少一个处理器通过线路互联,至少一个处理器用于运行计算机程序或指令,以执行前述图2至图9所示实施例中第一UE所执行的操作,具体此处不再赘述。
其中,芯片中的通信接口可以为输入/输出接口、管脚或电路等。
本申请实施例还提供了芯片或者芯片系统的第一种实施方式,本申请中上述描述的芯片或者芯片系统还包括至少一个存储器,该至少一个存储器中存储有指令。该存储器可以为芯片内部的存储单元,例如,寄存器、缓存等,也可以是该芯片的存储单元(例如,只读存储器、随机存取存储器等)。
本申请实施例还提供了一种计算机存储介质,该计算机存储介质用于储存为上述终端设备所用的计算机软件指令,其包括用于执行为终端设备所设计的程序。
该终端设备可以如前述图9、图10或图11所描述的确定服务质量流的装置。
本申请实施例还提供了一种计算机程序产品,该计算机程序产品包括计算机软件指令,该计算机软件指令可通过处理器进行加载来实现上述图2至图9中任意一项的定服务质量流的方法中的流程。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统,装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请所提供的几个实施例中,应该理解到,所揭露的系统,装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。
所述集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、磁碟或者光盘等各种可以存储程序代码的介质。

Claims (21)

  1. 一种确定服务质量流的方法,其特征在于,包括:
    第一用户设备UE获取与第一业务信息对应的第一安全策略,所述第一安全策略为所述第一UE和第二UE传输所述第一业务信息对应的业务数据时所采用的安全策略;
    所述第一UE根据所述第一安全策略确定所述第一业务信息对应的第一服务质量流QoS flow,所述第一QoS flow用于所述第一UE与所述第二UE传输所述第一业务信息对应的业务数据。
  2. 根据权利要求1所述的方法,其特征在于,所述第一UE根据所述第一安全策略确定所述第一业务信息对应的第一服务质量流QoS flow包括:
    所述第一UE根据所述第一安全策略以及预先建立的N条QoS flow确定所述第一业务信息对应的第一QoS flow,N为正整数。
  3. 根据权利要求2所述的方法,其特征在于,所述第一UE根据所述第一安全策略以及预先建立的N条QoS flow确定所述第一业务信息对应的第一QoS flow包括:
    若所述第一安全策略与第二QoS flow对应的第二安全策略相同,则所述第一UE将所述第二QoS flow确定为所述第一业务信息对应的第一QoS flow,所述第二QoS flow为所述N条QoS flow中的一条。
  4. 根据权利要求2所述的方法,其特征在于,所述第一UE根据所述第一安全策略以及预先建立的N条QoS flow确定所述第一业务信息对应的第一QoS flow包括:
    若所述第一安全策略与第二QoS flow对应的第二安全策略相同,且所述第二QoS flow对应的非安全信息满足所述第一业务信息对应的非安全需求,则所述第一UE将所述第二QoS flow确定为所述第一业务信息对应的第一QoS flow,所述第二QoS flow为所述N条QoS flow中的一条。
  5. 根据权利要求2至4中任意一项所述的方法,其特征在于,所述第一UE根据所述第一安全策略以及预先建立的N条QoS flow确定所述第一业务信息对应的第一QoS flow包括:
    若所述第一安全策略与所述N条QoS flow中的任意一条QoS flow对应的安全策略都不同,则所述第一UE将第三QoS flow确定为所述第一业务信息对应的第一QoS flow,所述第三QoS flow不包含于所述N条QoS flow中。
  6. 根据权利要求1所述的方法,其特征在于,所述第一UE根据所述第一安全策略确定所述第一业务信息对应的第一服务质量流QoS flow包括:
    所述第一UE根据所述第一安全策略确定第一业务信息对应的第一保护方式,所述第一保护方式为所述第一UE和第二UE传输所述第一业务信息对应的业务数据时所采用的保护方式;
    所述第一UE根据所述第一保护方式确定所述第一业务信息对应的第一QoS flow。
  7. 根据权利要求6所述的方法,其特征在于,所述第一UE根据所述第一保护方式确定所述第一业务信息对应的第一QoS flow包括:
    所述第一UE根据所述第一保护方式及预先建立的N条QoS flow确定所述第一业务信 息对应的第一QoS flow。
  8. 根据权利要求7所述的方法,其特征在于,所述第一UE根据所述第一保护方式及预先建立的N条QoS flow确定所述第一业务信息对应的第一QoS flow包括:
    若所述第一保护方式与第二QoS flow对应的第二保护方式相同,则所述第一UE将所述第二QoS flow确定为所述第一业务信息对应的第一QoS flow,所述第二QoS flow为所述N条QoS flow中的一条。
  9. 根据权利要求7所述的方法,其特征在于,所述第一UE根据所述第一保护方式及预先建立的N条QoS flow确定所述第一业务信息对应的第一QoS flow包括:
    若所述第一保护方式与第二QoS flow对应的第二保护方式相同,且所述第二QoS flow对应的非安全信息满足所述第一业务信息对应的非安全需求,则所述第一UE将所述第二QoS flow确定为所述第一业务信息对应的第一QoS flow,所述第二QoS flow为所述N条QoS flow中的一条。
  10. 根据权利要求7至9中任意一项所述的方法,其特征在于,所述第一UE根据所述第一保护方式及预先建立的N条QoS flow确定所述第一业务信息对应的第一QoS flow包括:
    若所述第一保护方式与所述N条QoS flow中的任意一条QoS flow对应的保护方式都不同,则所述第一UE将第三QoS flow确定为所述第一业务信息对应的第一QoS flow,所述第三QoS flow不包含于所述N条QoS flow中。
  11. 根据权利要求6至10中任意一项所述的方法,其特征在于,在所述第一UE根据所述第一安全策略确定第一业务信息对应的第一保护方式之前,所述方法还包括:
    所述第一UE获取所述第二UE的第一信息,所述第一信息与所述第一安全策略相关联;
    所述第一UE根据所述第一安全策略确定第一业务信息对应的第一保护方式包括:
    所述第一UE根据所述第一安全策略、所述第一信息、预置的第二信息和所述第一业务信息对应的非安全需求确定第一业务信息对应的第一保护方式,所述第二信息与所述第一安全策略相关联。
  12. 根据权利要求11所述的方法,其特征在于,所述非安全需求为目标传输速率,所述第一信息包括第一完整性保护传输速率,所述第二信息包括第二完整性保护传输速率;
    所述第一UE根据所述第一安全策略、所述第一信息、预置的第二信息和所述第一业务信息对应的非安全需求确定第一业务信息对应的第一保护方式包括:
    在所述第一安全策略指示倾向于对所述第一业务信息对应的业务数据进行完整性保护的情况下,若所述第一完整性保护速率小于所述目标传输速率和/或所述第二完整性保护速率小于所述目标传输速率,则所述第一UE确定第一业务信息对应的第一保护方式为不对所述第一业务信息对应的业务数据进行完整性保护。
  13. 根据权利要求1至12中任意一项所述的方法,其特征在于,所述方法还包括:
    所述第一UE获取所述第二UE的第一信息,所述第一信息与所述第一安全策略相关联;
    在所述第一用户设备UE获取与第一业务信息对应的第一安全策略之后,在所述第一UE根据所述第一安全策略确定所述第一业务信息对应的第一服务质量流QoS flow之前, 还包括:
    所述第一UE根据所述第一安全策略确定所述第一信息以及所述第一UE的第二信息能够满足所述第一业务信息对应的非安全需求,所述第二信息与所述第一安全策略相关联。
  14. 根据权利要求13所述的方法,其特征在于,所述非安全需求为目标传输速率,所述第一信息包括第一完整性保护传输速率,所述第二信息包括第二完整性保护传输速率;
    所述第一UE根据所述第一安全策略确定所述第一信息以及所述第一UE的第二信息能够满足所述第一业务信息对应的非安全需求包括:
    基于所述第一安全策略指示需要对所述第一业务信息对应的业务数据进行完整性保护,所述第一UE确定所述第一UE的第二完整性保护传输速率大于或等于所述第一业务信息对应的目标传输速率,且所述第一完整性保护传输速率大于或等于所述第一业务信息对应的目标传输速率。
  15. 一种确定服务质量流的方法,其特征在于,包括:
    第一UE接收来自第二UE的第一保护方式,所述第一保护方式为所述第一UE和第二UE传输所述第一业务信息对应的业务数据时所采用的保护方式;
    所述第一UE根据所述第一保护方式确定所述第一业务信息对应的第一QoS flow,所述第一QoS flow用于所述第一UE与第二UE传输所述第一业务信息对应的业务数据,N为正整数;
    发第一UE向第二UE发送QoS信息,QoS信息用于表征第一QoS flow。
  16. 一种确定服务质量流的装置,其特征在于,包括:
    获取单元,用于获取与第一业务信息对应的第一安全策略,所述第一安全策略为所述第一UE和第二UE传输所述第一业务信息对应的业务数据时所采用的安全策略;
    确定单元,用于根据所述第一安全策略确定所述第一业务信息对应的第一QoS flow,所述第一QoS flow用于所述第一UE与所述第二UE传输所述第一业务信息对应的业务数据。
  17. 一种确定服务质量流的装置,其特征在于,包括:
    接收单元,用于接收来自第二UE的第一保护方式,所述第一保护方式为所述第一UE和第二UE传输所述第一业务信息对应的业务数据时所采用的保护方式;
    处理单元,用于根据所述第一保护方式以及预先建立的N条QoS flow确定所述第一业务信息对应的第一QoS flow,所述第一QoS flow用于所述第一UE与第二UE传输所述第一业务信息对应的业务数据,N为正整数;
    发送单元,用于向第二UE发送QoS信息,QoS信息用于表征第一QoS flow。
  18. 一种终端设备,其特征在于,包括:至少一个处理器和存储器,存储器存储有可在处理器上运行的计算机执行指令,当所述计算机执行指令被所述处理器执行时,所述终端设备执行如上述权利要求1-15中任意一项所述的方法。
  19. 一种计算机可读存储介质,包括指令,当所述指令在计算机上运行时,使得计算机执行如权利要求1至15中任意一项所述的方法。
  20. 一种芯片或者芯片系统,其特征在于,该芯片或者芯片系统包括至少一个处理器和通信接口,通信接口和至少一个处理器通过线路互联,至少一个处理器用于运行计算机程 序或指令,以执行如权利要求1至15中任一项所述方法。
  21. 一种计算机程序产品,其特征在于,该计算机程序产品包括计算机软件指令,该计算机软件指令可通过处理器进行加载来实现如权利要求1至15中任一项所述的方法中的流程。
PCT/CN2021/090525 2020-04-30 2021-04-28 一种确定服务质量流的方法及设备 WO2021219000A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202010371338.3A CN113676907B (zh) 2020-04-30 2020-04-30 一种确定服务质量流的方法,装置,设备及计算机可读存储介质
CN202010371338.3 2020-04-30

Publications (1)

Publication Number Publication Date
WO2021219000A1 true WO2021219000A1 (zh) 2021-11-04

Family

ID=78331794

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/090525 WO2021219000A1 (zh) 2020-04-30 2021-04-28 一种确定服务质量流的方法及设备

Country Status (2)

Country Link
CN (1) CN113676907B (zh)
WO (1) WO2021219000A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117221894A (zh) * 2023-11-09 2023-12-12 湖南雷诺科技发展有限公司 一种基于大数据的5g通信传输方法

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114363052B (zh) * 2021-12-31 2022-11-18 北京海泰方圆科技股份有限公司 一种网络切片中安全策略的配置方法、装置、设备及介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109787791A (zh) * 2017-11-10 2019-05-21 华为技术有限公司 通信方法及通信设备
US20200053592A1 (en) * 2017-03-31 2020-02-13 Nokia Technologies Oy Conditional rrc based qos flow indication and use
CN110809295A (zh) * 2019-11-13 2020-02-18 腾讯科技(深圳)有限公司 一种数据传输的方法以及相关装置
CN110972197A (zh) * 2018-09-28 2020-04-07 华为技术有限公司 数据传输方法、终端及存储介质

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7774498B1 (en) * 2006-11-06 2010-08-10 Cisco Technology, Inc. Methods and apparatus for trusted application centric QoS provisioning
WO2017210811A1 (zh) * 2016-06-06 2017-12-14 华为技术有限公司 安全策略的执行方法和设备
CN108810884B (zh) * 2017-05-06 2020-05-08 华为技术有限公司 密钥配置方法、装置以及系统
CN109600339B (zh) * 2017-09-30 2022-01-11 华为技术有限公司 通信方法、装置和系统
CN109600804B (zh) * 2017-09-30 2021-04-02 华为技术有限公司 一种安全保护的方法、装置和系统
CN110831243B (zh) * 2018-08-13 2021-10-01 华为技术有限公司 一种用户面安全策略实现方法、装置及系统

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20200053592A1 (en) * 2017-03-31 2020-02-13 Nokia Technologies Oy Conditional rrc based qos flow indication and use
CN109787791A (zh) * 2017-11-10 2019-05-21 华为技术有限公司 通信方法及通信设备
CN110972197A (zh) * 2018-09-28 2020-04-07 华为技术有限公司 数据传输方法、终端及存储介质
CN110809295A (zh) * 2019-11-13 2020-02-18 腾讯科技(深圳)有限公司 一种数据传输的方法以及相关装置

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117221894A (zh) * 2023-11-09 2023-12-12 湖南雷诺科技发展有限公司 一种基于大数据的5g通信传输方法
CN117221894B (zh) * 2023-11-09 2024-01-12 湖南雷诺科技发展有限公司 一种基于大数据的5g通信传输方法

Also Published As

Publication number Publication date
CN113676907A (zh) 2021-11-19
CN113676907B (zh) 2023-08-04

Similar Documents

Publication Publication Date Title
WO2021219000A1 (zh) 一种确定服务质量流的方法及设备
US20140196125A1 (en) Deploying wireless docking as a service
US20150135240A1 (en) Video display terminal, video transmission terminal, video communication system, video display method, video transmission method, and computer-readable recording medium recording program
EP3755091B1 (en) Indication method for secondary link data, and terminal device
CN109672708B (zh) 通信方法及装置、系统
JP6826207B2 (ja) ルーティング方法および装置
WO2019062616A1 (zh) 一种终端能力控制方法、终端及基站
CN110167192B (zh) 蓝牙连接管理方法及装置、电子设备和非暂态存储介质
WO2021031768A1 (zh) 一种安全加密的方法及装置
EP3355654A1 (en) Method of recovering ue context information, device and system
IL271243B2 (en) Data transmission method, terminal device and network device
JP3967758B2 (ja) シーケンス番号によるデータ通信の調整
WO2017167027A1 (zh) 一种网络接入方法、相关设备和系统
WO2019029341A1 (zh) 随机接入方法、网络侧设备和移动通信终端
CN108605371A (zh) 发现蓝牙设备的方法和蓝牙设备
KR20040045169A (ko) 이동통신 시스템에서 제어계층 레이어 상의 데이터 전송방법
CN111669835A (zh) 通信的方法、装置及系统
US20190089738A1 (en) Establishing a proprietary link layer connection with a proprietary device
WO2022083642A1 (zh) 资源确定方法、资源配置方法及装置
CN116243853A (zh) 数据传输方法、装置、电子设备及非易失性存储介质
CN115623057A (zh) 基于rdma的建连方法、装置、设备及存储介质
CN105530631A (zh) 一种通信方法、装置及系统
WO2020249083A1 (zh) 安全激活状态确定方法及相关产品
WO2019140558A1 (zh) 数据复制的数据量的上报方法、用户设备及网络设备
WO2020057316A1 (zh) 数据校验方法、装置及存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21797321

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21797321

Country of ref document: EP

Kind code of ref document: A1