WO2022141025A1 - Procédé et appareil de transmission de données - Google Patents

Procédé et appareil de transmission de données Download PDF

Info

Publication number
WO2022141025A1
WO2022141025A1 PCT/CN2020/140659 CN2020140659W WO2022141025A1 WO 2022141025 A1 WO2022141025 A1 WO 2022141025A1 CN 2020140659 W CN2020140659 W CN 2020140659W WO 2022141025 A1 WO2022141025 A1 WO 2022141025A1
Authority
WO
WIPO (PCT)
Prior art keywords
ncc
cell
network device
access network
key
Prior art date
Application number
PCT/CN2020/140659
Other languages
English (en)
Chinese (zh)
Inventor
酉春华
徐小英
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to PCT/CN2020/140659 priority Critical patent/WO2022141025A1/fr
Publication of WO2022141025A1 publication Critical patent/WO2022141025A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security

Definitions

  • the present application relates to the field of communications, and more particularly, to a method and apparatus for transmitting data.
  • 5G In the fifth generation (5th generation, 5G) network, in order to reduce air interface signaling, quickly restore wireless connections and quickly restore data services, 5G defines a radio resource control inactive (radio resource control inactive, RRC INACTIVE) state.
  • RRC INACTIVE radio resource control inactive
  • the network device and the terminal device save the context of the terminal device.
  • the terminal device can request the network device to resume the radio resource control (RRC) connection by initiating the radio resource control resume (RRC resume) process, and use the saved context for user data transmission .
  • RRC resume radio resource control resume
  • the terminal device enters the radio resource control idle (RRC IDLE) state, the terminal device deletes the context, and then the terminal device needs to re-establish the RRC connection and security activation before it can proceed Data transmission, resulting in a large delay in data transmission.
  • the terminal equipment can continue to maintain the RRC INACTIVE state after cell reselection, and perform data transmission in the reselected cell, which can reduce the delay.
  • the data Transmission security has become an urgent problem to be solved.
  • the present application provides a method and apparatus for transmitting data, which is applied in a scenario where a terminal device remains in the RRC INACTIVE state after cell reselection. After cell reselection, data transmission can be performed based on the key determined by the NCC corresponding to the current cell, thereby improving the security of data transmission.
  • a method for transmitting data is provided, and the method for transmitting data can be executed by a terminal device, or can also be executed by a chip or circuit provided in the terminal device, which is not limited in this application .
  • the method for transmitting data includes:
  • a first message from a first access network device is received through the first cell, where the first message includes a first next-hop chain counter NCC and at least one second NCC, where the first NCC corresponds to the first cell set, and the at least one second NCC corresponds to the first cell set.
  • a second NCC corresponds to the second cell set, there is no intersection between the first cell set and the second cell set, wherein the NCC is used to determine the key;
  • An access network device sends uplink data, the uplink data is encrypted by a first key, and the first key is determined based on the third NCC.
  • the third NCC is the third NCC.
  • an NCC when the second cell belongs to the second cell set, the third NCC is a second NCC corresponding to the second cell in the at least one second NCC.
  • the terminal device can use multiple NCCs corresponding to the cell configured in advance, and after cell reselection occurs, can determine the key based on the NCC corresponding to the current cell to perform data transmission, thereby improving the data transmission rate. Transmission security.
  • the method further includes: the first message further includes a correspondence relationship, where the correspondence relationship is used to indicate that the first NCC corresponds to the first cell set, and for indicating that the at least one second NCC corresponds to the second cell set; the method further includes: determining the third NCC according to the corresponding relationship.
  • the method further includes: determining the third NCC; sending first indication information to the second access network device or the first access network device, the first An indication message is used to indicate the third NCC.
  • the terminal device can determine the third NCC corresponding to the second cell by using the correspondence carried in the first message, or can also determine the third NCC corresponding to the second cell by itself, providing Different schemes determine the third NCC, increasing scheme flexibility.
  • the first message is a radio resource control RRC release message
  • the uplink is sent to the second access network device or the first access network device through the second cell
  • the data includes: sending an RRC recovery request message and the uplink data to the second access network device or the first access network device through the second cell, where the RRC recovery request message includes a first identifier, and the first identifier is used to obtain The context of the end device.
  • the above-mentioned first message may multiplex the RRC release message in the RRC reselection procedure, so as to improve the compatibility with the existing RRC reselection procedure.
  • the method further includes: receiving a first response message from the first access network device, the The first response message is integrity-protected by a second key, and the second key is determined based on the first NCC;
  • the method further includes: receiving a first response message from the second access network device, the first response message passing through the second The key is integrity protected;
  • the method further includes: receiving a second response message from the second access network device, the second response message is completed by a third key The third key is determined based on a second NCC corresponding to the second cell in the at least one second NCC.
  • the method for transmitting data provided by the embodiments of the present application provides an interaction process between a terminal device and an access network device in different scenarios, and increases the coverage of the solution.
  • the method further includes: receiving, through the second cell, second indication information from the second access network device, where the second indication information is used to indicate that the The second key performs the integrity check on the first response message, or the integrity check is performed on the second response message based on the third key.
  • the second access network device can notify the terminal device which key to use to decrypt the response message through the second indication information, thereby improving the accuracy of the solution.
  • a method for transmitting data is provided, and the method for transmitting data may be performed by a first access network device, or may also be performed by a chip or circuit provided in the first access network device implementation, which is not limited in this application.
  • the method for transmitting data includes:
  • the first NCC corresponds to the first cell set
  • the at least one second NCC corresponds to the second cell set
  • the first cell set and the second cell set are There is no intersection between them, wherein the NCC is used to determine a key; a first message is sent to the terminal device in the first cell, and the first message includes the first NCC and at least one second NCC
  • the first access network device may send multiple NCCs to the terminal device through the first message, so that the terminal device can use the multiple pre-configured NCCs corresponding to the cells to After cell reselection, data transmission can be performed based on the key determined by the NCC corresponding to the current cell, thereby improving the security of data transmission.
  • the first message further includes a correspondence, where the correspondence is used to indicate that the first NCC corresponds to the first set of cells, and is used to indicate that the first NCC corresponds to the first cell set. At least one second NCC corresponds to the second set of cells; the method further includes: determining the corresponding relationship.
  • the first access network device may determine the correspondence between the NCC and the cell, and send the correspondence to the terminal device through the first message.
  • the method when the anchor relocation occurs, further includes: determining that the anchor relocation occurs; the acquiring the first NCC and the at least one second NCC includes: asking the core The network device sends a first request message, where the first request message is used to request the core network device to provide the first NCC and at least one second NCC, and the next hop NH corresponding to the first NCC and the at least one second NCC respectively ; Receive a third response message from the core network device, where the third response message includes the first NCC and at least one second NCC, and NHs corresponding to the first NCC and at least one second NCC respectively.
  • the acquiring the first NCC and the at least one second NCC includes: receiving the first NCC from the third access network device message, the first message includes the first NCC and at least one second NCC.
  • the first access network device can obtain the above-mentioned NCC in different ways, thereby improving the flexibility of the solution.
  • the method further includes: receiving, through the second cell, uplink data from the terminal device, where the uplink data is encrypted by a first key based on the first key
  • the third NCC determines that when the second cell belongs to the first cell set, the third NCC is the first NCC; when the second cell belongs to the second cell set, the third NCC is one of at least one second NCC. a second NCC corresponding to the second cell.
  • the first access network device can receive data from the terminal device, and the data is encrypted by the key determined by the NCC corresponding to the cell after reselection, so as to improve the security of data transmission sex.
  • the method further includes: sending a first response message to the terminal device through the second cell, where the integrity of the first response message is protected by the second key, the The second key is determined based on the first NCC; or, the first response message is sent to the second access network device.
  • the first access network device may send a response message to the terminal device directly or through the second access network device.
  • a method for transmitting data is provided, and the method for transmitting data may be performed by a second access network device, or may also be performed by a chip or circuit provided in the second access network device implementation, which is not limited in this application.
  • the method for transmitting data includes:
  • the uplink data from the terminal equipment is received through the second cell, and the uplink data is encrypted by the first key, and the first key is determined based on the third NCC.
  • the third NCC is the first NCC
  • the second cell belongs to the second cell set the third NCC is a second NCC corresponding to the second cell in at least one second NCC; wherein the first NCC corresponds to the first cell set , the at least one second NCC corresponds to the second cell set; send a first response message or a second response message to the terminal device through the second cell, wherein the first response message is integrity protected by a second key , the second key is determined based on the first NCC, the second response message is integrity-protected by a third key, and the third key is based on a second key corresponding to the second cell in the at least one second NCC NCC OK.
  • the second access network device when the second access network device receives the uplink data from the terminal device, it can decrypt the uplink data based on the determined third NCC, and send a response message to the terminal device. After cell reselection occurs, data transmission may be performed based on the key determined by the NCC corresponding to the current cell, thereby improving the security of data transmission.
  • the method before sending the first response message to the terminal device, the method further includes: receiving the first response message from the first access network device.
  • the second access network device may send a response message of the first access network device to the terminal device, and the method for transmitting data of the present application may be used in the scenario where anchor relocation does not occur. data method to increase the coverage of the program.
  • the method further includes: sending second indication information to the terminal device through the second cell, where the second indication information is used to indicate that the second key is based on the second key. Whether to perform integrity check on the first response message, or perform integrity check on the second response message based on the third key.
  • the second access network device can notify the terminal device which key to use to decrypt the response message through the second indication information, thereby improving the accuracy of the solution.
  • a method for transmitting data is provided, and the method for transmitting data may be performed by a third access network device, or may also be performed by a chip or circuit provided in the third access network device implementation, which is not limited in this application.
  • the method for transmitting data includes:
  • the method further includes: determining a first NCC and at least one second NCC according to the at least one NCC and a known NCC, wherein the first NCC corresponds to the first NCC A cell set, the at least one second NCC corresponds to a second cell set, and there is no intersection between the first cell set and the second cell set; sending a first message to the first access network device, the first message includes The first NCC and at least one second NCC.
  • the third access network device may obtain the first NCC and at least one second NCC from the core network device side, and use the first connection to obtain the first NCC and at least one second NCC.
  • the network access device is configured to the terminal device, so that the terminal device can determine the key based on the NCC corresponding to the current cell for data transmission after cell reselection through a plurality of NCCs corresponding to the cell configured in advance, thereby improving the security of data transmission. .
  • the method further includes: determining a correspondence, where the correspondence is used to indicate that the first NCC corresponds to the first set of cells, and to indicate that the at least one The second NCC corresponds to a cell other than the at least one cell.
  • the third access network device may determine the correspondence between the NCC and the cell, and send the correspondence to the terminal device through the first access network device.
  • a method for transmitting data is provided, and the method for transmitting data can be executed by a core network device, or can also be executed by a chip or circuit provided in the core network device, to which the present application Not limited.
  • the method for transmitting data includes:
  • Receive a first request message from a first access network device where the first request message is used to request the core network device to provide the first NCC and at least one second NCC, and the first NCC and the at least one second NCC respectively corresponding next hop NH; send a third response message to the first access network device, the third response message includes the first NCC and at least one second NCC, and the first NCC and at least one second NCC respectively the corresponding NH.
  • Receive a second request message from a third access network device where the second request message is used to request the core network device to provide at least one next hop chain counter NCC and the next hop NH corresponding to the at least one NCC respectively;
  • the access network device sends a fourth response message, where the fourth response message includes the at least one NCC and the next hop NH corresponding to the at least one NCC respectively.
  • the core network device may provide the first NCC and at least one second NCC to the first access network device, or provide at least one NCC to the third access network device, and the third The access network device can send the first NCC and at least one second NCC to the first access network device, so that the first access network device can send multiple NCCs to the terminal device, so that the terminal device can pass multiple pre-configured and multiple NCCs.
  • the NCC corresponding to the cell can perform data transmission based on the key determined by the NCC corresponding to the current cell after the cell reselection occurs, thereby improving the security of data transmission.
  • the first request message includes a path switching request message; the third response message includes a path switching response message.
  • the above-mentioned first request message may multiplex the path switching request message, which is compatible with the current RRC reselection process and increases the compatibility of the solution.
  • a sixth aspect provides an apparatus for transmitting data, where the apparatus for transmitting data includes a processor for implementing the function of the terminal device in the method described in the first aspect above.
  • the apparatus for transmitting data may further include a memory coupled to the processor, where the processor is configured to implement the function of the terminal device in the method described in the first aspect above.
  • the memory is used to store program instructions and data.
  • the memory is coupled to the processor, and the processor can call and execute program instructions stored in the memory, so as to implement the functions of the terminal device in the method described in the first aspect above.
  • the apparatus for transmitting data may further include a communication interface, and the communication interface is used for the apparatus for transmitting data to communicate with other devices.
  • the communication interface may be a transceiver, an input/output interface, a circuit, or the like.
  • the means for transmitting data includes: a processor and a communication interface
  • the processor is configured to run a computer program, so that the apparatus for transmitting data implements any one of the methods described in the first aspect;
  • the processor communicates with the outside using the communication interface.
  • the external may be an object other than the processor, or an object other than the apparatus.
  • the means for transmitting data is a chip or a system of chips.
  • the communication interface may be an input/output interface, an interface circuit, an output circuit, an input circuit, a pin or a related circuit, etc. on the chip or the chip system.
  • the processor may also be embodied as processing circuitry or logic circuitry.
  • a seventh aspect provides an apparatus for transmitting data, where the apparatus for transmitting data includes a processor for implementing the function of the first access network device in the method described in the second aspect above.
  • the apparatus for transmitting data may further include a memory coupled to the processor, where the processor is configured to implement the function of the first access network device in the method described in the second aspect above.
  • the memory is used to store program instructions and data.
  • the memory is coupled to the processor, and the processor can call and execute program instructions stored in the memory, so as to implement the function of the first access network device in the method described in the second aspect above.
  • the apparatus for transmitting data may further include a communication interface, and the communication interface is used for the apparatus for transmitting data to communicate with other devices.
  • the communication interface may be a transceiver, an input/output interface, a circuit, or the like.
  • the means for transmitting data includes: a processor and a communication interface
  • the processor communicates with the outside using the communication interface
  • the processor is configured to run a computer program, so that the apparatus for transmitting data implements any one of the methods described in the second aspect above.
  • the external may be an object other than the processor, or an object other than the apparatus.
  • the means for transmitting data is a chip or a system of chips.
  • the communication interface may be an input/output interface, an interface circuit, an output circuit, an input circuit, a pin or a related circuit, etc. on the chip or the chip system.
  • the processor may also be embodied as processing circuitry or logic circuitry.
  • An eighth aspect provides an apparatus for transmitting data, where the apparatus for transmitting data includes a processor for implementing the function of the second access network device in the method described in the third aspect.
  • the apparatus for transmitting data may further include a memory coupled to the processor, where the processor is configured to implement the function of the second access network device in the method described in the third aspect above.
  • the memory is used to store program instructions and data.
  • the memory is coupled to the processor, and the processor can call and execute program instructions stored in the memory, so as to implement the function of the second access network device in the method described in the third aspect above.
  • the apparatus for transmitting data may further include a communication interface, and the communication interface is used for the apparatus for transmitting data to communicate with other devices.
  • the communication interface may be a transceiver, an input/output interface, a circuit, or the like.
  • the means for transmitting data includes: a processor and a communication interface
  • the processor communicates with the outside using the communication interface
  • the processor is configured to run a computer program, so that the apparatus for transmitting data implements any one of the methods described in the third aspect above.
  • the external may be an object other than the processor, or an object other than the apparatus.
  • the means for transmitting data is a chip or a system of chips.
  • the communication interface may be an input/output interface, an interface circuit, an output circuit, an input circuit, a pin or a related circuit, etc. on the chip or the chip system.
  • the processor may also be embodied as processing circuitry or logic circuitry.
  • a ninth aspect provides an apparatus for transmitting data, where the apparatus for transmitting data includes a processor for implementing the function of the third access network device in the method described in the fourth aspect above.
  • the apparatus for transmitting data may further include a memory coupled to the processor, where the processor is configured to implement the function of the third access network device in the method described in the fourth aspect above.
  • the memory is used to store program instructions and data.
  • the memory is coupled to the processor, and the processor can call and execute program instructions stored in the memory, so as to implement the function of the third access network device in the method described in the fourth aspect above.
  • the apparatus for transmitting data may further include a communication interface, and the communication interface is used for the apparatus for transmitting data to communicate with other devices.
  • the communication interface may be a transceiver, an input/output interface, a circuit, or the like.
  • the means for transmitting data includes: a processor and a communication interface
  • the processor communicates with the outside using the communication interface
  • the processor is used for running a computer program, so that the apparatus for transmitting data implements any one of the methods described in the fourth aspect above.
  • the external may be an object other than the processor, or an object other than the apparatus.
  • the means for transmitting data is a chip or a system of chips.
  • the communication interface may be an input/output interface, an interface circuit, an output circuit, an input circuit, a pin or a related circuit, etc. on the chip or the chip system.
  • the processor may also be embodied as processing circuitry or logic circuitry.
  • a tenth aspect provides an apparatus for transmitting data, where the apparatus for transmitting data includes a processor for implementing the functions of the core network device in the method described in the fifth aspect.
  • the apparatus for transmitting data may further include a memory coupled to the processor, where the processor is configured to implement the function of the core network device in the method described in the fifth aspect.
  • the memory is used to store program instructions and data.
  • the memory is coupled to the processor, and the processor can call and execute program instructions stored in the memory, so as to implement the functions of the core network device in the method described in the fifth aspect.
  • the apparatus for transmitting data may further include a communication interface, and the communication interface is used for the apparatus for transmitting data to communicate with other devices.
  • the communication interface may be a transceiver, an input/output interface, a circuit, or the like.
  • the means for transmitting data includes: a processor and a communication interface
  • the processor communicates with the outside using the communication interface
  • the processor is used for running a computer program, so that the apparatus for transmitting data implements any one of the methods described in the fourth aspect above.
  • the external may be an object other than the processor, or an object other than the apparatus.
  • the means for transmitting data is a chip or a system of chips.
  • the communication interface may be an input/output interface, an interface circuit, an output circuit, an input circuit, a pin or a related circuit, etc. on the chip or the chip system.
  • the processor may also be embodied as processing circuitry or logic circuitry.
  • the present application provides a computer-readable storage medium, where instructions are stored in the computer-readable storage medium, when the computer-readable storage medium runs on a computer, the computer executes the methods of the above aspects.
  • the present application provides a computer program product comprising instructions which, when run on a computer, cause the computer to perform the methods of the above aspects.
  • a thirteenth aspect provides a communication system, comprising the apparatus for transmitting data shown in the sixth aspect, the apparatus for transmitting data shown in the seventh aspect, and the apparatus for transmitting data shown in the eighth aspect The apparatus and the apparatus for transmitting data shown in the ninth aspect.
  • a chip device including a processing circuit for calling and running a program from a memory, so that a communication device on which the chip device is installed executes any one of the first to fifth aspects above methods in possible implementations.
  • FIG. 1 is a schematic diagram of a network architecture provided by an embodiment of the present application.
  • FIG. 2 is a schematic diagram of another network architecture provided by an embodiment of the present application.
  • FIG. 3 is a schematic diagram of an application scenario of a technical solution provided by an embodiment of the present application.
  • FIG. 4 is a schematic diagram of a key derivation process.
  • FIG. 5 is a schematic diagram of an RRC recovery process.
  • FIG. 6 is a schematic flowchart of a method for transmitting data provided by the present application.
  • FIG. 7 is a schematic flowchart of a method for determining an NCC provided by an embodiment of the present application.
  • FIG. 8 is a schematic flowchart of another method for determining an NCC provided by an embodiment of the present application.
  • FIG. 9 is a schematic flowchart of another method for transmitting data provided by an embodiment of the present application.
  • FIG. 10 is a schematic flowchart of another method for transmitting data provided by an embodiment of the present application.
  • FIG. 11 is a schematic diagram of an apparatus 1100 for transmitting data provided by the present application.
  • FIG. 12 is a schematic structural diagram of a terminal device 1200 suitable for this embodiment of the present application.
  • FIG. 13 is a schematic diagram of an apparatus 1300 for transmitting data provided by the present application.
  • FIG. 14 is a schematic diagram of another apparatus 1400 for transmitting data provided by the present application.
  • FIG. 16 is a schematic structural diagram of an access network device 1600 suitable for this embodiment of the present application.
  • FIG. 17 is a schematic diagram of another apparatus 1700 for transmitting data provided by the present application.
  • FIG. 18 is a schematic structural diagram of a core network device 1800 suitable for this embodiment of the present application.
  • the technical solutions of the embodiments of the present application can be applied to various communication systems, for example: long term evolution (LTE) system, LTE frequency division duplex (FDD) system, LTE time division duplex (time division duplex) , TDD), universal mobile telecommunication system (UMTS), worldwide interoperability for microwave access (WiMAX) communication system, 5G system, new radio (NR), etc.
  • LTE long term evolution
  • FDD frequency division duplex
  • TDD time division duplex
  • UMTS universal mobile telecommunication system
  • WiMAX worldwide interoperability for microwave access
  • 5G system new radio
  • NR new radio
  • the technical solutions provided in this application can also be applied to future communication systems, such as the sixth generation mobile communication system.
  • the communication system may also be a public land mobile network (PLMN) network, a device-to-device (D2D) communication system, a machine-to-machine (M2M) communication system, an object Internet of Things (IoT) communication system or other communication system
  • the terminal equipment (terminal equipment) in the embodiments of the present application may refer to an unmanned aerial vehicle (UAV), an access terminal, a subscriber unit, a subscriber station, a mobile station, a mobile station, a relay station, a remote station, a remote terminal, a mobile station Device, user terminal (user terminal), user equipment (UE), terminal (terminal), wireless communication device, user agent or user equipment.
  • UAV unmanned aerial vehicle
  • UE user equipment
  • terminal terminal equipment
  • wireless communication device user agent or user equipment.
  • the terminal device may also be a cellular phone, a cordless phone, a session initiation protocol (SIP) phone, a wireless local loop (WLL) station, a personal digital assistant (PDA), a wireless communication Functional handheld devices, computing devices or other processing devices connected to wireless modems, in-vehicle devices, wearable devices, terminal devices in 5G networks or terminals in the future evolution of the public land mobile network (PLMN)
  • PLMN public land mobile network
  • a wearable device may also be referred to as a wearable smart device, which is a general term for intelligently designing daily wearable devices and developing wearable devices using wearable technology, such as glasses, Gloves, watches, clothing and shoes, etc.
  • a wearable device is a portable device that is worn directly on the body or integrated into the user's clothing or accessories. Wearable device is not only a hardware device, but also realizes powerful functions through software support, data interaction, and cloud interaction.
  • wearable smart devices include full-featured, large-scale, complete or partial functions without relying on smart phones, such as smart watches or smart glasses, and only focus on a certain type of application function, which needs to cooperate with other devices such as smart phones.
  • the terminal device may also be a terminal device in the IoT system.
  • IoT is an important part of the future development of information technology. Interconnection, the intelligent network of the interconnection of things and things.
  • the IOT technology can achieve massive connections, deep coverage, and terminal power saving through, for example, a narrow band (narrow band, NB) technology.
  • NB narrow band
  • the terminal device may also include sensors such as smart printers, train detectors, and gas stations, and the main functions include collecting data (part of terminal devices), receiving control information and downlink data of access network devices, and Send electromagnetic waves to transmit uplink data to access network equipment.
  • sensors such as smart printers, train detectors, and gas stations
  • the main functions include collecting data (part of terminal devices), receiving control information and downlink data of access network devices, and Send electromagnetic waves to transmit uplink data to access network equipment.
  • the device for realizing the function of the terminal device may be the terminal device, or it may be a device capable of supporting the terminal device to realize the function, such as a chip system or a combined device or component capable of realizing the function of the terminal device.
  • a chip system may be composed of chips, or may include chips and other discrete devices.
  • the technical solutions provided by the embodiments of the present application are described by taking the device for realizing the functions of the terminal device as the terminal device as an example.
  • the access network device in this embodiment of the present application may be any communication device with a wireless transceiver function that is used to communicate with a terminal device.
  • the device includes but is not limited to: evolved Node B (evolved Node B, eNB), radio network controller (radio network controller, RNC), Node B (Node B, NB), base station controller (base station controller, BSC) , base transceiver station (base transceiver station, BTS), home base station (home evolved NodeB, HeNB, or home Node B, HNB), baseband unit (baseBand unit, BBU), wireless fidelity (wireless fidelity, WIFI) system Access point (AP), wireless relay node, wireless backhaul node, transmission point (TP) or transmission and reception point (TRP), etc.
  • eNB evolved Node B
  • RNC radio network controller
  • Node B Node B
  • BSC base station controller
  • base transceiver station base transceiver station
  • BTS home base station
  • It can also be a 5G system, such as, A gNB in the NR system, or a transmission point (TRP or TP), one or a group of (including multiple antenna panels) antenna panels of a base station in a 5G system, or, it can also be a network node that constitutes a gNB or a transmission point, Such as baseband unit (BBU), or distributed unit (distributed unit, DU) and so on.
  • a gNB in the NR system or a transmission point (TRP or TP)
  • TRP or TP transmission point
  • TRP or TP transmission point
  • a network node that constitutes a gNB or a transmission point
  • BBU baseband unit
  • DU distributed unit
  • the device for implementing the function of the access network device may be the access network device, or may be a device capable of supporting the access network device to realize the function, such as a chip system or a device capable of realizing the function of the access network device
  • the combination device and component of the device can be installed in the access network equipment.
  • the technical solutions provided by the embodiments of the present application are described by taking the device for implementing the functions of the access network equipment as an example of the access network equipment.
  • the interface between the access network device and the terminal device may be a Uu interface (or called an air interface).
  • the names of these interfaces may remain unchanged, or may be replaced with other names, which are not limited in this application.
  • the communication between the access network device and the terminal device follows a certain protocol layer structure.
  • the control plane protocol layer structure may include a radio resource control (radio resource control, RRC) layer, a packet data convergence layer protocol (packet data). convergence protocol, PDCP) layer, radio link control (radio link control, RLC) layer, media access control (media access control, MAC) layer and physical layer;
  • RRC radio resource control
  • PDCP radio link control
  • RLC radio link control
  • media access control media access control
  • user plane protocol layer structure can include PDCP layer, RLC layer, MAC layer and physical layer.
  • the PDCP layer may further include a service data adaptation protocol (SDAP) layer.
  • SDAP service data adaptation protocol
  • the access network device may implement the functions of protocol layers such as RRC, PDCP, RLC, and MAC by one node, or may implement the functions of these protocol layers by multiple nodes.
  • an access network device may include one or more centralized units (centralized units, CUs) and one or more distributed units (distributed units, DUs), and multiple DUs may be centrally controlled by one CU .
  • an interface between a CU and a DU may be referred to as an F1 interface, wherein a control plane (control panel, CP) interface may be an F1-C, and a user plane (user panel, UP) interface may be an F1-U.
  • the CU and the DU may be divided according to the protocol layer of the wireless network: for example, as shown in FIG. 1 , FIG. 1 is a schematic diagram of a network architecture provided by an embodiment of the present application.
  • the functions of the PDCP layer and the above protocol layers are set in the CU, and the functions of the protocol layers below the PDCP layer (for example, the RLC layer and the MAC layer, etc.) are set in the DU.
  • the above division of the processing functions of the CU and DU according to the protocol layer is only an example, and can also be divided in other ways, for example, the functions of the protocol layer above the RLC layer are set in the CU, and the RLC layer and the following protocol layers.
  • the function of the CU is set in the DU.
  • the CU or DU can be divided into functions with more protocol layers.
  • the CU or DU can also be divided into partial processing functions with protocol layers. In one design, some functions of the RLC layer and functions of the protocol layers above the RLC layer are placed in the CU, and the remaining functions of the RLC layer and the functions of the protocol layers below the RLC layer are placed in the DU.
  • the functions of the CU or DU can also be divided according to the service type or other system requirements, for example, by the delay, the functions whose processing time needs to meet the delay requirements are set in the DU, and do not need to meet the delay.
  • the required functionality is set in the CU.
  • the CU may also have one or more functions of the core network.
  • the CU can be set on the network side to facilitate centralized management; the DU can have multiple radio functions, or the radio functions can be set remotely. This embodiment of the present application does not limit this.
  • FIG. 2 is a schematic diagram of another network architecture provided by an embodiment of the present application.
  • the functions of the CU can be further divided, that is, the control plane and the user plane are separated and implemented by different entities, namely the control plane CU entity (ie the CU-CP entity) and the user plane CU entity ( That is, the CU-UP entity), the CU-CP entity and the CU-UP entity can be coupled with the DU to jointly complete the functions of the access network device.
  • the control plane CU entity ie the CU-CP entity
  • the user plane CU entity That is, the CU-UP entity
  • the CU-CP entity and the CU-UP entity can be coupled with the DU to jointly complete the functions of the access network device.
  • the interface between the CU-CP entity and the CU-UP entity can be the E1 interface
  • the interface between the CU-CP entity and the DU can be the F1-C interface
  • the interface between the CU-UP entity and the DU can be the F1-U interface interface.
  • one DU and one CU-UP can be connected to one CU-CP.
  • one DU can be connected to multiple CU-UPs
  • one CU-UP can be connected to multiple DUs.
  • the signaling generated by the CU may be sent to the terminal device through the DU, or the signaling generated by the terminal device may be sent to the CU through the DU.
  • the DU may not parse the signaling, but directly encapsulate it through the protocol layer and transparently transmit it to the terminal device or CU.
  • the sending or receiving of the signaling by the DU includes this scenario.
  • the signaling of the RRC or PDCP layer will eventually be processed as the data of the physical layer and sent to the terminal device, or converted from the received data of the physical layer.
  • the signaling of the RRC or PDCP layer can also be considered to be sent by the DU, or sent by the DU and the radio frequency device.
  • the access network device mentioned in the embodiments of this application may be a device including a CU, or a DU, or a device including a CU and a DU, or a control plane CU node (CU-CP node) and a user plane CU node (CU-UP node) And the equipment of the DU node.
  • CU-CP node control plane CU node
  • CU-UP node user plane CU node
  • the core network device refers to a device in a core network (core network, CN) that provides service support for terminal devices.
  • core network CN
  • core network equipment Currently, some examples of core network equipment are: access and mobility management function (AMF) entity, session management function (SMF) entity, user plane function (UPF) Entities, etc., are not listed here.
  • the AMF entity may be responsible for access management and mobility management of the terminal device; the SMF entity may be responsible for session management, such as session establishment of the terminal device; the UPF entity may be a user plane functional entity, mainly responsible for Connect to an external network.
  • AMF access and mobility management function
  • SMF session management function
  • UPF user plane function
  • entities in this application may also be referred to as network elements or functional entities, for example, AMF entities may also be referred to as AMF network elements or AMF functional entities; for example, SMF entities may also be referred to as SMF network elements or SMF functions entity etc.
  • Access network equipment, terminal equipment and core network equipment can be deployed on land, including indoor or outdoor, handheld or vehicle-mounted; it can also be deployed on water; it can also be deployed on aircraft, balloons or satellites in the air.
  • the scenarios in which the network device and the terminal device are located are not limited.
  • the access network device, the terminal device, and the core network device include a hardware layer, an operating system layer running on the hardware layer, and an application layer running on the operating system layer.
  • This hardware layer includes hardware such as central processing unit (CPU), memory management unit (MMU), and memory (also called main memory).
  • the operating system may be any one or more computer operating systems that implement business processing through processes, such as a Linux operating system, a Unix operating system, an Android operating system, an iOS operating system, or a Windows operating system.
  • the application layer includes applications such as browsers, address books, word processing software, and instant messaging software.
  • various aspects or features of the present application may be implemented as a method, apparatus, or article of manufacture using standard programming and/or engineering techniques.
  • article of manufacture encompasses a computer program accessible from any computer readable device, carrier or medium.
  • computer readable media may include, but are not limited to, magnetic storage devices (eg, hard disks, floppy disks, or magnetic tapes, etc.), optical disks (eg, compact discs (CDs), digital versatile discs (DVDs) etc.), smart cards and flash memory devices (eg, erasable programmable read-only memory (EPROM), card, stick or key drives, etc.).
  • various storage media described herein can represent one or more devices and/or other machine-readable media for storing information.
  • the term "machine-readable storage medium” may include, but is not limited to, wireless channels and various other media capable of storing, containing, and/or carrying instructions and/or data.
  • FIG. 3 is a schematic diagram of an application scenario of the technical solution provided by an embodiment of the present application.
  • the terminal 330 is connected to a wireless network to obtain services of an external network (such as the Internet) through the wireless network, or to communicate with other wireless networks through the wireless network.
  • the wireless network includes a RAN 310 and a core network (CN) 320, wherein the RAN 310 is used to access the terminal 330 to the wireless network, and the CN 320 is used to manage the terminal and provide a gateway for communication with the external network.
  • CN core network
  • the method for transmitting data provided in this application may be applicable to a wireless communication system, for example, the wireless communication system 100 shown in FIG. 3 .
  • a wireless communication connection between two communication devices in the wireless communication system one of the two communication devices may correspond to the terminal 330 shown in FIG. 3 , for example, it may be the terminal 330 in FIG. 3 , or It may be a chip configured in the terminal 330; the other communication device in the two communication devices may correspond to the RAN 310 shown in FIG. 3, for example, it may be the RAN 310 in FIG. chip.
  • the key derivation involved in the embodiments of this application includes vertical derivation and horizontal derivation. Two forms of key derivation are briefly introduced below with reference to FIG. 4 , which is a schematic diagram of a key derivation process.
  • the AMF key deduces a series of available keys (eg, K gNB , NH(Key#11), NH(Key#2), NH(Key#3)... ), and obtain a key chain (vertical derivation) according to the chain order, and each key (Key) in the key chain is identified by a next hop chaining counter (NCC).
  • NCC next hop chaining counter
  • the key used for the security mechanism is to select a key from the key chain for security encryption or integrity protection of the air interface.
  • Both AMF and terminal device save K AMF , so both AMF and terminal device maintain a Key chain.
  • the access network device Since the access network device does not have KAMF , the access network device does not maintain the Key chain, and the secure Key is determined by the AMF, and then notified to the access network device and the terminal device.
  • AMF notifies the access network device of a ⁇ NH, NCC ⁇ pair, that is, NH is a Key, and the corresponding identifier of this Key is NCC.
  • the terminal device receives the NCC from the access network device, and then determines the NCC according to the NCC and Key chain. the corresponding NH.
  • the RRC connection is switched (for example, the terminal equipment is switched from cell #1 to cell #2)
  • the access network device is changed, the key must be changed, then a new key is obtained through the above vertical deduction or horizontal deduction, if If the access network device is not changed, then the Key does not need to be changed. If there is an unused NCC and NH pair in the access network equipment, it is deduced vertically; otherwise, it is deduced horizontally.
  • the horizontal deduction needs to use the PCI of cell #2 and the center frequency of the downlink to deduce the key, instead of using the cell #1.
  • a terminal device in the radio resource control connected (RRC CONNECTED) state means that an RRC connection is established between the terminal device and the access network device, and the access network device saves the information of the terminal device (for example, the terminal device's one or more of access stratum context information, wireless configuration information, etc.).
  • the RRC connection is a dedicated connection such as a connection of a data radio bearer (DRB) or a signaling radio bearer 1 (signal radio bearer, SRB1), excluding the public connection of SRB0;
  • the terminal equipment in the RRC IDLE state means that there is no RRC connection between the terminal equipment and the access network equipment, and the access network equipment does not save the information of the terminal equipment;
  • the terminal device in the RRC INACTIVE state refers to the terminal device moving under the Radio Access Network based Notification Area (RNA) based on the wireless access network, and may not notify the access network device.
  • the terminal device saves its own context, and the former serving access network device (Last serving gNB) saves the context of the terminal device and the NG connection with AMF and UPF.
  • the dedicated RRC connection between the terminal device and the access network device is suspended and can be resumed later. For example, the terminal device can resume the RRC connection by initiating an RRC recovery process.
  • the terminal device performs cell reselection in RRC INACTIVE.
  • Figure 5 is a schematic diagram of an RRC recovery process.
  • the premise of cell reselection shown in Figure 5 is that the Last serving gNB saves the context of the terminal device, but the terminal device moves out of the coverage of the Last serving gNB, enters the coverage of the gNB, and initiates the RRC resume (RRC Resume) process. Include the following steps:
  • the terminal device sends an RRC resume request (RRC resume request) message to the access network device (gNB), where the RRC resume request message carries an inactive radio network temporary identity (inactive radio network temporary identity, I-RNTI).
  • RRC resume request RRC resume request
  • I-RNTI active radio network temporary identity
  • the gNB sends a UE context acquisition request (Retrieve UE context request) message to the Last serving gNB, where the Retrieve UE context request message includes the I-RNTI obtained from the RRC resume request message in the above S510.
  • the Last serving gNB can determine the context of the terminal device according to the I-RNTI.
  • the Last serving gNB sends a UE context acquisition response (Retrieve UE context response) message to the gNB, where the Retrieve UE context response message includes the context of the terminal device.
  • UE context acquisition response Retrieve UE context response
  • the gNB sends an RRC resume (RRC resume) message to the terminal device;
  • the terminal device enters the RRC CONNECTED state, and after receiving the above-mentioned RRC resume message, the terminal device enters the RRC CONNECTED state, and the RRC connection is restored.
  • the terminal device sends an RRC resume complete (RRC resume complete) message to the gNB.
  • RRC resume complete RRC resume complete
  • the gNB sends an Xn-U address indication (Xn-U address indication) to the Last serving gNB, where the Xn-U address indication is used to notify the Last serving gNB of the tunnel address of downlink data forwarding. If the Last serving gNB has downlink data of the terminal device, it can send the downlink data to the gNB, and the gNB sends the downlink data to the terminal device.
  • Xn-U address indication Xn-U address indication
  • the gNB sends a path switch request message to the AMF, the path switch request message is used to switch the path (path), and the connection between the UPF and the Last serving gNB is switched to the UPF and the gNB, and the subsequent downlink data is sent by UPF is sent to gNB.
  • the AMF sends a path switch response (path switch response) message to the gNB.
  • the gNB sends a context release (context release) message to the Last serving gNB, and the context release message notifies the Last serving gNB to release the context of the terminal device.
  • a context release context release
  • FIG. 5 is only a simple description of cell reselection for the convenience of understanding the technical solution of the present application, and does not constitute any limitation to the protection scope of the present application. Provisions are not repeated in this application.
  • the terminal equipment will enter the RRC IDLE state after the cell reselection. If the terminal equipment still has data to transmit, the terminal equipment needs to transition from the RRC IDLE state to the RRC CONNECTED state before the The uplink data transmission is performed, resulting in a large delay of the uplink data. If the terminal equipment remains in the RRC IDLE state after cell reselection, the delay of uplink data can be reduced when the terminal equipment still has data to transmit. In this scenario, there may be security problems during uplink data transmission. Terminal equipment #1 uses key #1 for data transmission, and after cell reselection (handover from cell #1 to cell #2), how can subsequent terminal equipment avoid using key #1 for data transmission in cell #2.
  • the present application provides a method for transmitting data. Then select the appropriate key determined by NCC for data transmission.
  • the embodiments shown below do not specifically limit the specific structure of the execution body of the method provided by the embodiment of the present application, as long as the program that records the code of the method provided by the embodiment of the present application can be executed to provide the method according to the embodiment of the present application.
  • the execution subject of the method provided in this embodiment of the present application may be a terminal device, an access network device, or a core network device, or a terminal device, an access network device, or a core network device that can call program and execute the program's functional modules.
  • to indicate may be understood as “enable”, and “enable” may include direct enabling and indirect enabling.
  • Enable When describing a certain information for enabling A, it may include that the information directly enables A or indirectly enables A, but it does not mean that the information must carry A.
  • the information enabled by the information is called the information to be enabled.
  • the information to be enabled can be directly enabled.
  • the information to be enabled may also be indirectly enabled by enabling other information, where there is an associated relationship between the other information and the information to be enabled.
  • It is also possible to enable only a part of the information to be enabled, while other parts of the information to be enabled may be known or agreed in advance.
  • the enabling of specific information may also be implemented by means of a pre-agreed (for example, a protocol stipulated) arrangement order of various information, thereby reducing enabling overhead to a certain extent.
  • the common part of each information can also be identified and enabled in a unified manner, so as to reduce the enabling overhead caused by enabling the same information separately.
  • preset may include predefined definitions, eg, protocol definitions.
  • pre-definition can be achieved by pre-saving corresponding codes, forms or other means that can be used to indicate relevant information in the equipment (for example, including terminal equipment or network equipment), and this application does not make specific implementation methods. limited.
  • the "storage” involved in the embodiments of this application may refer to being stored in one or more memories.
  • the one or more memories may be set separately, or may be integrated in an encoder or a decoder, a processor, or a communication device.
  • the one or more memories may also be partially provided separately and partially integrated in a decoder, a processor, or a communication device.
  • the type of memory may be any form of storage medium, which is not limited in this application.
  • the "protocols” involved in the embodiments of this application may refer to standard protocols in the communication field, such as 5G protocols, new radio (NR) protocols, and related protocols applied in future communication systems.
  • the application is not limited.
  • FIG. 6 is a schematic flowchart of a method for transmitting data provided by the present application.
  • the execution body includes a first access network device, a second access network device and a terminal device.
  • the method for transmitting data includes at least some of the following steps.
  • the terminal device receives the first message from the first access network device (or the first access network device sends the first message to the terminal device).
  • the terminal device receives a first message from the first access network device from the first cell, where the first message includes a first NCC and at least one second NCC, wherein the first NCC corresponds to the first cell set, and at least A second NCC corresponds to a second cell set, the first cell set includes first cells, and there is no intersection between the first cell set and the second cell set.
  • one cell corresponds to one NCC, but one NCC may correspond to at least one cell.
  • the first message includes a first NCC and a second NCC, wherein the second cell corresponds to the first NCC, the third cell corresponds to the second NCC, and the second cell It may be the above-mentioned first cell or other cells, and the third cell may be a cell different from the second cell.
  • the first message may be an RRC release (RRC release) message sent by the first access network device to the terminal device.
  • RRC release RRC release
  • the terminal device in RRC CONNECTED before receiving the RRC release message enters RRC INACTIVE, and for the terminal device in RRC INACTIVE before receiving the RRC release message The device remains in the RRC INACTIVE state.
  • the first message may be a message including the above-mentioned first NCC and at least one second NCC sent to the terminal device by the first access network device before sending the RRC release message to the terminal device.
  • the specific implementation manner of the first message is not limited in the embodiments of the present application, and is described below by taking the first message as an RRC release message as an example.
  • the NCC is used to determine the encryption key (key) of the encrypted data and the integrity protection of the message.
  • the RRC release message includes a correspondence, and the correspondence is used to indicate that the first NCC corresponds to the first set of cells, the second NCC corresponds to the second set of cells, and the first set of cells corresponds to There is no intersection with the second set of cells.
  • the corresponding relationship includes flag information, that is, information indicating the cell corresponding to the NCC through the flag information.
  • the identification information included in the RRC release message is the list information of at least one cell in the first cell set corresponding to the first NCC and the list information of the cells in the second cell set corresponding to at least one second NCC (for example, a list of cell identities (list).
  • the RRC release message includes NCC#1 and NCC#2, wherein NCC#1 corresponds to cell#1, cell#2 and cell#3 in the RNA, and NCC#2 corresponds to other cells in the RNA (eg, Cell #4, Cell #5, and Cell #6 correspond) or NCC #2 corresponds to cells other than RNA.
  • the RRC release message includes list information of cell #1, cell #2, and cell #3, and list information of cell #4, cell #5, and cell #6, or list information of cells other than RNA, in which case the terminal After receiving the RRC release message, the device can learn that cell #1, cell #2, and cell #3 correspond to NCC #1; cell #4, cell #5, and cell #6 correspond to NCC #2 or other than RNA.
  • the cell corresponds to NCC#2.
  • the identification information included in the RRC release message indicates information of at least one cell in the first cell set corresponding to the first NCC.
  • the terminal device learns the at least one cell corresponding to the first NCC, the second cell set corresponding to the at least one second NCC does not include the at least one cell.
  • the RRC release message includes NCC#1 and NCC#2, where NCC#1 corresponds to the first cell in RNA, NCC#2 corresponds to other cells in RNA, or NCC#2 corresponds to cells other than RNA correspond.
  • the identification information in the RRC release message directly indicates that NCC#1 corresponds to the first cell in the RNA.
  • the terminal device can know that the first cell corresponds to NCC#1; other cells in the RNA Cells correspond to NCC#2 or cells other than RNA correspond to NCC#2.
  • the correspondence includes sequence information of the first NCC and the at least one second NCC.
  • the RRC release message includes NCC#1 and NCC#2. It should be understood that NCC#1 and NCC#2 have a sequence in the RRC release message.
  • the first NCC corresponds to the first cell
  • the second NCC corresponds to other cells in the RNA area
  • the first NCC corresponds to the first cell where the terminal device initiates uplink data transmission
  • the second NCC corresponds to the terminal The device is in the second cell where uplink data is initiated.
  • the terminal device determines that the first NCC corresponds to at least one cell in the first cell set, and determines that at least one second NCC corresponds to a cell in the second cell set.
  • the terminal device determines the NCC used when initiating uplink data transmission, and in the uplink data transmission, sends first indication information to the access network device, where the first indication information is used to indicate the currently used NCC, (for example, carrying an index , which identifies the NCC currently in use).
  • the terminal device may indicate the currently used NCC to the access network device through the first indication information in each uplink data transmission.
  • the embodiments of the present application may be applied to small data transmission (SDT), that is, the uplink data transmission involved in the embodiments of the present application may be understood as an SDT process.
  • SDT small data transmission
  • the terminal device in the RRC CONNECTED state After receiving the above RRC release message, the terminal device in the RRC CONNECTED state enters the RRC INACTIVE state and saves the context of the terminal device.
  • the first access network device also saves the context of the terminal device.
  • the context of the terminal device is identified by an I-RNTI, and the RRC release message will carry an I-RNTI.
  • the above-mentioned first cell belongs to the first access network device, and the first access network device may also be called Last serving gNB.
  • the terminal equipment needs to initiate an RRC recovery request and uplink data when there is data transmission after receiving the RRC release message, and the method flow shown in Figure 6 also includes:
  • the terminal device sends an RRC resume request message and uplink data to the second access network device or the first access network device (or the first access network device receives the RRC resume request message and uplink data from the terminal device, or, The second access network device receives the RRC resume request message and uplink data from the terminal device).
  • the terminal device camps on the second cell, and sends an RRC resume request message and uplink data to the access network device through the second cell.
  • the terminal device knows the first NCC and at least one second NCC, as well as the correspondence between the first NCC and at least one second NCC and the cell.
  • the device determines that the uplink data is encrypted by using the first key, and the first key is determined based on the third NCC corresponding to the second cell; or,
  • the terminal device knows the first NCC and at least one second NCC, and determines the first key used in the current uplink data transmission by itself.
  • the first key is determined based on the third NCC corresponding to the second cell, and the terminal device uses the first indication information.
  • the access network device is notified that the first key is determined based on the third NCC.
  • the third NCC includes the following two possibilities:
  • the second cell is the aforementioned one cell including the first cell set
  • the third NCC is the aforementioned first NCC.
  • the terminal device may send the above-mentioned RRC resume request message and uplink data to the above-mentioned first access network device.
  • first cell and the second cell are the same cell, indicating that the terminal device has not moved out of the coverage of the first cell, then the second cell still belongs to the first access network device, and the uplink data is passed through the first NCC.
  • the determined first key is encrypted.
  • the first cell and the second cell are different (for example, the second cell may be any cell except the first cell in the above-mentioned at least one cell), indicating that the terminal device moves out of the coverage of the first cell, Move to the coverage of the second cell, so cell reselection is required, and the second cell is selected as the camping cell.
  • the terminal device may send the above-mentioned RRC resume request message and uplink to the above-mentioned first access network device data;
  • the terminal device is in the second access network device.
  • the coverage of the network access device the terminal device sends an RRC resume request message and uplink data to the second access network device.
  • the second cell is a cell in the second set of cells (for example, the second cell may be any cell except the first cell under the RNA, or a cell other than the RNA), and the third NCC is the above-mentioned at least one second NCC the second NCC corresponding to the second cell in the .
  • the terminal device may send the above-mentioned RRC resume request message and uplink to the above-mentioned first access network device data;
  • the terminal device is in the second access network device.
  • the coverage of the network access device the terminal device sends an RRC resume request message and uplink data to the second access network device.
  • the RRC resume request message will carry the I-RNTI, so that after receiving the RRC resume request message, the second access network device obtains the context corresponding to the terminal device from the first access device according to the I-RNTI.
  • the terminal device when the third NCC corresponding to the first key for encrypting the uplink data is determined by the terminal device itself, the terminal device also needs to send the first indication information to the access network device when sending the uplink data. Indicates the currently used third NCC.
  • “When sending uplink data” involved in the embodiments of this application includes any possibility of sending uplink data at the same time, before sending uplink data, and after sending uplink data. There is no restriction on the specific time of sending information. Access network equipment.
  • the method flow shown in Figure 6 also includes:
  • the terminal device receives the second response message from the second access network device or the first response message from the first access network device (or the second access network device sends the second response message to the terminal device, or, the first An access network device sends a first response message to the terminal device).
  • the first response message or the second response message involved in the embodiment of the present application is used to respond to the above-mentioned RRC resume request message, and may be referred to as a response message of the RRC resume request message, may also be referred to as an RRC resume response message, or may also be referred to as For the RRC release message, there can also be other message names, which are not illustrated here.
  • the specific name of the message is not specifically limited, and the following is an example of a response message that responds to an RRC resume request message called an RRC resume request message.
  • the terminal device receives the first response message or the second response message, including the following three possibilities:
  • the second cell is the first cell
  • the access network device is the above-mentioned first access network device, and the first access network device sends a response message (first response message) of the RRC resume request message to the terminal device, and the RRC The response message of the resume request message is integrity-protected by the second key derived from the first NCC corresponding to the first cell;
  • Possibility 2 The second cell is a different cell from the first cell, and anchor relocation occurs.
  • the response message (second response message) of the RRC resume request message is generated by the second access network device and directly sent to the terminal device,
  • the response message is integrity-protected by the third key determined by the second NCC corresponding to the second cell.
  • Possibility 3 The second cell is a different cell from the first cell, and no anchor relocation has occurred.
  • the response message (first response message) of the RRC resume request message is generated by the first access network device, and then sent to the second access network.
  • the network access device and the second access network device are then sent to the terminal device, and the response message is integrity-protected by the second key derived from the first NCC corresponding to the first cell.
  • the terminal device After receiving the above-mentioned first response message or second response message, the terminal device needs to perform an integrity check on the first response message or the second response message. Whether the terminal device uses the second key or the third key pair to perform integrity verification, the method flow shown in FIG. 6 further includes:
  • the terminal device receives the second indication information from the second access network device.
  • the terminal device may receive the first response message or the second response message from the second access network device, wherein the first response message is integrity protected by the second key.
  • the second response message is integrity protected by the third key.
  • the first response message or the second response message may be an RRC message, for example, an RRC release message or an RRC reject message.
  • the second access network device may send second indication information to the terminal device to indicate that the current response message has passed the second password. It can be understood that the second indication information is used to indicate whether the terminal device performs an integrity check on the above-mentioned first response message based on the second key, or whether the above-mentioned first response message is encrypted based on the third key. Second, the response message is checked for integrity.
  • the second indication information may be an indication of anchor relocation. If the anchor relocation is indicated, the terminal device uses the third key generated by the second cell corresponding to the second NCC to perform an integrity check on the response message of the RRC resume request message; if no anchor relocation is indicated, the terminal device uses the first cell corresponding to The second key generated by the first NCC performs an integrity check on the response message of the RRC resume request message.
  • the second indication information includes any one of the following information:
  • MAC CE Design a MAC CE, the MAC CE includes a bit information, the bit information indicates whether the access network device has performed the anchor relocation information; or,
  • DCI A new flag is introduced into DCI, which is used to indicate whether the access network device has performed anchor relocation; or,
  • 1 bit information 1 means anchor relocation, 0 means no anchor relocation; or,
  • anchor relocation use the search space or CORESET corresponding to the anchor relocation to send the DCI of the response message to the RRC resume request message. If no anchor relocation is performed, then the DCI of the response message to the RRC resume request message is sent using the search space or CORESET without the corresponding anchor relocation.
  • FIG. 8 respectively illustrates how the first access network device determines the above-mentioned first NCC and at least one second NCC in two cases when the anchor relocation occurs and the anchor relocation does not occur before executing the above-mentioned S610.
  • FIG. 7 is a schematic flowchart of a method for determining an NCC provided by an embodiment of the present application.
  • the execution body includes a first access network device, a third access network device, a terminal device and a core network device.
  • the method for determining NCC includes at least some of the following steps.
  • the first access network device receives an RRC recovery request message and uplink data from the terminal device from the first cell.
  • the uplink data is encrypted by a first key, and the first key is determined based on the first NCC corresponding to the first cell.
  • the RRC connection of the terminal device is suspended.
  • the terminal device may acquire the first NCC through the received RRC release message.
  • the RRC release message may be sent by the first access network device, or may be sent by other access network devices.
  • the first access network device sends a Retrieve UE context request message to the third access network device.
  • the third access network device decides to perform anchor relocation, and sends the context of the terminal device to the first access network device.
  • the first access network device is the currently serving network device
  • the third access network device is the former serving network device, which saves the context of the terminal device.
  • the method flow shown in Figure 7 also includes:
  • the second access network device sends a Retrieve UE context response message to the first access network device.
  • the Retrieve UE context response message includes the context of the terminal device and carries the first key corresponding to the first NCC.
  • the third access network device deduces the first key according to the first NCC, and then sends the first key to the first access network device.
  • the connection between the access network device and the core network device needs to be switched, and the method flow shown in FIG. 7 also includes:
  • the first access network device sends a first request message to the core network device.
  • the first request message is used to request the core network device to provide the first NCC and the at least one second NCC, and the NHs corresponding to the first NCC and the at least one second NCC respectively.
  • the core network device in this embodiment may be an AMF.
  • the first request message may be used to request path switching, that is, the first request message may multiplex the path switch request message, and the path switch request message carries indication information, which is used to request the core
  • the network device provides to the first NCC and the at least one second NCC, and the NHs corresponding to the first NCC and the at least one second NCC, respectively.
  • the core network device After receiving the first request message, the core network device generates a first NCC and at least one second NCC, and assigns the corresponding first NCC and at least one second NCC and the first NCC and at least one second NCC respectively.
  • NH is sent to the first access network device through the second response message, and the method flow shown in FIG. 7 further includes:
  • the core network device sends a third response message to the first access network device.
  • the third response message may be a path switch response message, and the path switch response message includes the first NCC, at least one second NCC, and NHs corresponding to the first NCC and at least one second NCC respectively .
  • the first access network device After receiving the first NCC and the at least one second NCC, the first access network device determines the correspondence between the first NCC and the at least one second NCC and the cell. That is, the method flow shown in FIG. 7 also includes:
  • the first access network device determines the corresponding relationship.
  • the correspondence is used to indicate that the first NCC corresponds to the at least one cell, and is used to indicate that the at least one second NCC corresponds to a cell other than the at least one cell.
  • the first access network device sends a first message to the terminal device.
  • FIG. 8 is a schematic flowchart of another method for determining an NCC provided by an embodiment of the present application.
  • the execution body includes a first access network device, a third access network device, a terminal device and a core network device.
  • the method for determining NCC includes at least some of the following steps.
  • the first access network device receives an RRC recovery request message and uplink data from the terminal device from the first cell.
  • the first access network device sends a Retrieve UE context Request message to the third access network device.
  • the third access network device decides not to perform anchor relocation, and the third access network device requests the core network device to provide the first NCC and at least one second NCC.
  • the first access network device is the currently serving network device, and the third access network device is the former serving network device, which saves the context of the terminal device.
  • the method flow shown in Figure 8 also includes:
  • the third access network device sends a second request message to the core network device.
  • the second request message is used to request the core network device to provide at least one NCC.
  • the second request message may include information on the quantity of NCCs requested to be provided.
  • the second request message includes third indication information, where the third indication information is used to indicate the number of NCCs requested to be provided.
  • the third indication information may not be carried in the second request message, for example, before, after or at the same time as sending the second request message, the third access network device sends the third indication information to the core network device.
  • the third access network device needs one NCC, and the second request message only needs to request the core network device (eg, AMF) to provide one NCC.
  • the core network device eg, AMF
  • the third access network device needs multiple NCCs, and the second request message only needs to request the core network device (eg, AMF) to provide multiple NCCs.
  • the core network device eg, AMF
  • the second request message may be referred to as an NCC update request message.
  • the core network device needs to provide the NCC to the third access network device.
  • the method flow shown in FIG. 8 further includes:
  • the core network device sends a fourth response message to the third access network device.
  • the core network device determines how many NCCs need to be provided according to the content of the second request message or the above-mentioned third indication information, and sends the NCCs to be provided to the third access network device through a fourth response message.
  • the fourth response message includes an NCC and a corresponding NH. If the request in S830 is an NCC, the fourth response message includes an NCC and a corresponding NH. If the request in S830 is multiple NCCs, the fourth response The message includes multiple NCCs and NHs corresponding to the multiple NCCs respectively.
  • the third access network device determines the correspondence between the NCC and the cell, for example, determines the correspondence between the first NCC and at least one second NCC and the cell. That is, the method flow shown in FIG. 8 also includes:
  • the third access network device determines the corresponding relationship.
  • the correspondence is used to indicate that the first NCC corresponds to at least one cell in the first set of cells, and is used to indicate that the at least one second NCC corresponds to a cell in the second set of cells.
  • the third access network device sends the first message to the first access network device.
  • the first access network device sends a first message to the terminal device.
  • FIG. 9 is a schematic flowchart of another method for transmitting data provided by an embodiment of the present application.
  • the execution body includes a first access network device, a second access network device and a terminal device.
  • the method for transmitting data includes at least some of the following steps.
  • the terminal device receives the RRC release message.
  • the terminal device receives the RRC release message from the first cell.
  • the RRC Release message carries NCC#1 and I-RNTI
  • the access network device that sends the RRC release message to the terminal device may be the first access network device described below, or may be other access network devices under RNA .
  • the receiving of the RRC release message from the first access network device is taken as an example for description.
  • the terminal device sends uplink data to the first access network device.
  • the method flow shown in Figure 9 also includes:
  • the terminal device sends the first RRC resume request message and the first uplink data to the first access network device.
  • the terminal device triggers the uplink data transmission process, and sends the first RRC resume request message and the first uplink data to the first access network device in the first cell.
  • the terminal device still has remaining user data (for example, DRB data) to be sent, and these data may have reached the buffer area (buffer) or are about to arrive in the buffer.
  • the terminal device After the terminal device sends the first RRC resume request message and the first uplink data to the first access network device, it will receive a response from the first access network device, and the method flow shown in FIG. 9 further includes:
  • the terminal device receives the fifth response message from the first access network device.
  • the fifth response message is used to respond to the above-mentioned first RRC resume request message, which may be HARQ feedback, and is transmitted through the PDCCH.
  • the terminal equipment performs cell reselection, the terminal equipment determines that the second cell is the resident cell, initiates an uplink data transmission process in the second cell, and sends a second RRC resume request message to the second access network equipment, but does not send the second RRC resume request message to the second access network equipment.
  • the network access device sends uplink data (such as DRB data).
  • the method flow shown in Figure 9 also includes:
  • the terminal device sends a second RRC resume request message to the second access network device.
  • the first cell and the second cell are different cells and belong to the same access network device (for example, the first cell belongs to the first access network device, the second cell belongs to the second access network device, and the second cell belongs to the second access network device.
  • the second access network device is the above-mentioned first access network device), or different access network devices (for example, the first cell belongs to the first access network device, the second cell belongs to the second access network device, and the second cell belongs to the second access network device.
  • the access network device and the above-mentioned first access network device are different access network devices).
  • the terminal device receives the response message from the second access network device, and the method flow shown in FIG. 9 further includes:
  • the terminal device receives the sixth response message from the second access network device.
  • the terminal device receives a sixth response message for the second RRC resume request message from the second cell, where the sixth response message carries NCC#2.
  • the sixth response message is integrity-protected based on the above-mentioned key determined by NCC#1.
  • the second access network device can obtain the context of the terminal device from the first access network device according to the I-RNTI carried in the second RRC resume request message, which is not shown in the flowchart 9 for obtaining the context. out.
  • the terminal device can continue to transmit uplink data.
  • the method flow shown in Figure 9 also includes:
  • the terminal device sends the second uplink data.
  • the terminal device sends the third RRC resume request message and the second uplink data from the third cell, and the encryption key of the second uplink data is determined by NCC#2.
  • the third cell may be the second cell, or may be a cell other than the second cell.
  • FIG. 10 is a schematic flowchart of another method for transmitting data provided by an embodiment of the present application.
  • the execution body includes a first access network device, a second access network device and a terminal device.
  • the terminal device receives the RRC release message.
  • the terminal device receives the RRC release message from the first cell.
  • the RRC release message carries NCC#1 and I-RNTI
  • the access network device that sends the RRC release message to the terminal device may be the first access network device described below, or may be other access network devices under the RNA .
  • the receiving of the RRC release message from the first access network device is taken as an example for description.
  • the terminal device sends uplink data to the first access network device.
  • the method flow shown in Figure 10 also includes:
  • the terminal device sends the first RRC resume request message and the first uplink data to the first access network device.
  • the terminal device triggers the uplink data transmission process, and sends the first RRC resume request message and the first uplink data to the first access network device in the first cell.
  • the terminal device still has remaining user data (second uplink data) to be sent, and these data may have reached the buffer or are about to arrive in the buffer.
  • the method flow shown in FIG. 10 further includes:
  • the terminal device receives the fifth response message from the first access network device.
  • the fifth response message is used to respond to the above-mentioned first RRC resume request message, which may be a HARQ feedback, and is transmitted through the PDCCH.
  • the terminal equipment performs cell reselection, from the first cell to the second cell, and the terminal equipment determines that the second cell is the camping cell. Since the horizontal key deduction needs to be performed in this embodiment, the terminal equipment needs to know the identity of the second cell. information, initiate an uplink data transmission process in the second cell, and send a second RRC resume request message and uplink data to the second access network device.
  • the method flow shown in Figure 10 also includes:
  • the terminal device sends the second RRC resume request and the second uplink data in the second cell.
  • the encryption key (referred to as key#2) of the second uplink data is derived from NCC#1, the identifier of the second cell, and the downlink center frequency point level of the second cell.
  • the access network device to which the second cell belongs is called a second access network device. Both the terminal device and the access network device need to deduce key#2 horizontally.
  • the terminal device uses key#2 to encrypt the second uplink data.
  • the access network device (the first access network device or the second access network device)
  • the second uplink data needs to be decrypted using key#2.
  • the access network devices that decrypt the second uplink data based on key#2 may be different.
  • the method flow shown in Figure 10 includes the following two possibilities:
  • the first access network device determines the anchor relocation, and obtains key#2 by horizontal deduction.
  • the first access network device sends key#2 to the second access network device.
  • the second access network device decrypts the second uplink data using key#2.
  • the second access network device may also send data to the terminal device, and possibly the method flow shown in FIG. 10 may further include:
  • the second access network device sends downlink data to the terminal device.
  • the downlink data is user name data
  • the downlink data is encrypted by the key#2.
  • the first access network device determines no anchor relocation, and obtains key#2 by horizontal deduction.
  • the first access network device receives the second uplink data sent by the second access network device.
  • the first access network device decrypts the second uplink data by using key#2.
  • the first access network device may also send data to the terminal device through the second access network device, and the method flow shown in FIG. 10 may further include:
  • the first access network device sends downlink data to the second access network device.
  • the second access network device sends downlink data to the terminal device.
  • the terminal device may receive downlink data from the second access network device, and after receiving the above-mentioned downlink data, the terminal device can decrypt the downlink data based on key#2.
  • the method flow shown in FIG. 10 may also include:
  • the terminal device decrypts the downlink data using key#2.
  • the terminal device obtains key#2 by horizontal deduction, and uses the key#2 to decrypt the downlink data.
  • the second data is a downlink RRC message (for example, an RRCRelease message)
  • the key for integrity protection of the downlink RRC message is also obtained through horizontal deduction, for example, key#3.
  • the terminal device receives the RRC release message, enters the RRC INACTIVE state, and remains in the RRC INACTIVE state.
  • the terminal device may count the number of consecutive cell reselections in the RRC INACTIVE state. For example, if the camped cell is reselected from cell #1 to cell #2, then the count is incremented by 1. When the terminal equipment completes the data transmission process in the RRC INACTIVE state, the count of continuous cell reselection is reset (for example, the count starts from 0 again).
  • the terminal device When the number of consecutive cell reselections is less than the preset number M, the terminal device remains in the RRC INACTIVE state, and the terminal device in the RRC INACTIVE state can perform data transmission, which can save signaling overhead;
  • the terminal device switches from the RRC INACTIVE state to the RRC IDLE state, discards the context of the terminal device, and releases the dedicated RRC connection of the terminal device, where M is a positive integer.
  • the terminal device needs to initiate the connection establishment process. After establishing the RRC connection and entering the RRC CONNECTED, it starts data transmission.
  • the terminal device may not be suitable to remain in the RRC INACTIVE state for data transmission, and needs to enter the RRC IDLE state.
  • the value of M may be pre-specified by the protocol, or the value of M may be indicated by the access network device, for example, the access network device adds indication information in the RRC release message to indicate the value of M, or the value of M is The value may be indicated in system information.
  • the size of the sequence numbers of the above processes does not mean the order of execution, and the execution order of each process should be determined by its function and internal logic, and should not constitute any limitation to the implementation process of the embodiments of the present application. . And it may not be necessary to perform all the operations in the above method embodiments.
  • terminal device and/or the network device in the above method embodiments may perform some or all of the steps in the embodiments, these steps or operations are only examples, and the embodiments of the present application may also include performing other operations or variations of various operations .
  • the method implemented by the terminal device may also be implemented by a component (such as a chip or circuit, etc.) that can be used in the terminal device, and the method implemented by the network device may also be implemented by the network device. component implementation.
  • FIG. 11 is a schematic diagram of an apparatus 1100 for receiving data provided by the present application.
  • the apparatus 1100 includes a processing unit 1110 , a receiving unit 1120 and a sending unit 1130 .
  • a receiving unit 1120 configured to receive a first message from a first access network device through a first cell, where the first message includes a first next-hop chain counter NCC and at least one second NCC, the first NCC corresponds to the A first set of cells, the at least one second NCC corresponds to the second set of cells, and there is no intersection between the first set of cells and the second set of cells, where the NCC is used to determine a key.
  • the sending unit 1130 is configured to send uplink data to the second access network device or the first access network device through the second cell, where the uplink data is encrypted by a first key, and the first key is determined based on the third NCC,
  • the third NCC is the first NCC;
  • the third NCC is the at least one second NCC with the second NCC corresponding to the second cell.
  • the apparatus 1100 corresponds to the terminal device in the method embodiment, and the apparatus 1100 may be the terminal device in the method embodiment, or a chip or functional module inside the terminal device in the method embodiment. Corresponding units of the apparatus 1100 are configured to perform the corresponding steps performed by the terminal device in the method embodiments shown in FIG. 6 to FIG. 10 .
  • the processing unit 1110 in the apparatus 1100 is configured to execute the steps related to processing corresponding to the terminal device in the method embodiment.
  • the receiving unit 1120 in the apparatus 1100 performs the steps of receiving by the terminal device in the method embodiment.
  • the sending unit 1130 in the apparatus 1100 is configured to perform the step of sending the terminal device.
  • the receiving unit 1120 and the transmitting unit can form a transceiver unit, and have the functions of receiving and transmitting at the same time.
  • the processing unit 1110 may be at least one processor.
  • the sending unit may be a transmitter or an interface circuit
  • the receiving unit 1120 may be a receiver or an interface circuit.
  • the receiver and transmitter can be integrated together to form a transceiver or interface circuit.
  • the apparatus 1100 may further include a storage unit for storing data and/or signaling, and the processing unit 1110, the sending unit and the receiving unit 1120 may interact or couple with the storage unit, such as reading or calling the storage unit.
  • the data and/or signaling in the unit so that the methods of the above-mentioned embodiments are performed.
  • the above units may exist independently, or may be integrated in whole or in part.
  • FIG. 12 is a schematic structural diagram of a terminal device 1200 applicable to this embodiment of the present application.
  • the terminal device 1200 can be applied to the system shown in FIG. 1 .
  • FIG. 12 only shows the main components of the terminal device.
  • the terminal device 1200 includes a processor, a memory, a control circuit, an antenna, and an input and output device.
  • the processor is used to control the antenna and the input and output devices to send and receive signals
  • the memory is used to store a computer program
  • the processor is used to call and run the computer program from the memory to execute the corresponding method performed by the terminal device in the method for registration proposed in this application. Processes and/or Actions. It will not be repeated here.
  • FIG. 12 only shows one memory and a processor. In an actual terminal device, there may be multiple processors and memories.
  • the memory may also be referred to as a storage medium or a storage device, etc., which is not limited in this embodiment of the present application.
  • FIG. 13 is a schematic diagram of an apparatus 1300 for sending data provided by the present application.
  • the apparatus 1300 includes an obtaining unit 1310 , a sending unit 1320 and a processing unit 1330 .
  • the obtaining unit 1310 is configured to obtain a first next-hop chain counter NCC and at least one second NCC, where the first NCC corresponds to a first cell set, the at least one second NCC corresponds to a second cell set, and the first cell set has no intersection with the second set of cells,
  • the NCC is used to determine the key
  • the sending unit 1320 is configured to send a first message to the terminal device in the first cell, where the first message includes the first NCC and at least one second NCC.
  • the apparatus 1300 corresponds to the first access network device in the method embodiment, and the apparatus 1300 may be the first access network device in the method embodiment, or a chip or functional module inside the first access network device in the method embodiment .
  • Corresponding units of the apparatus 1300 are configured to perform the corresponding steps performed by the first access network device in the method embodiments shown in FIGS. 6-10 .
  • the sending unit 1320 in the apparatus 1300 executes the step of sending the first access network device in the method embodiment
  • the obtaining unit 1310 in the apparatus 1300 is configured to execute the step of obtaining the first access network device
  • the apparatus 1300 may further include a processing unit 1330, configured to perform corresponding processing-related steps inside the first access network device.
  • the apparatus 1300 may further include a storage unit for storing data and/or signaling.
  • the processing unit 1330, the obtaining unit 1320, and the receiving unit 1310 may interact or couple with the storage unit, for example, read or call the data in the storage unit. data and/or signaling so that the methods of the above-described embodiments are performed.
  • the above units may exist independently, or may be integrated in whole or in part.
  • FIG. 14 is a schematic diagram of another apparatus 1400 for sending data provided by the present application.
  • the apparatus 1400 includes a receiving unit 1410 , a sending unit 1420 and a processing unit 1430 .
  • the receiving unit 1410 is configured to receive uplink data from the terminal device through the second cell, the uplink data is encrypted by a first key, and the first key is determined based on the third NCC,
  • the third NCC is the first NCC
  • the third NCC is a second NCC corresponding to the second cell in at least one second NCC
  • the first NCC corresponds to the first cell set
  • the at least one second NCC corresponds to the second cell set
  • a sending unit 1420 configured to send a first response message or a second response message to the terminal device through the second cell
  • the first response message is integrity protected by a second key
  • the second key is determined based on the first NCC
  • the second response message is integrity protected by a third key
  • the third key is based on A second NCC corresponding to the second cell in the at least one second NCC is determined.
  • the apparatus 1400 corresponds to the second access network device in the method embodiment, and the apparatus 1400 may be the second access network device in the method embodiment, or a chip or functional module inside the second access network device in the method embodiment .
  • Corresponding units of the apparatus 1400 are configured to perform the corresponding steps performed by the second access network device in the method embodiments shown in FIGS. 6-10 .
  • the sending unit 1420 in the apparatus 1400 performs the step of sending by the second access network device in the method embodiment
  • the receiving unit 1410 in the apparatus 1400 is configured to perform the step of receiving by the second access network device
  • the apparatus 1400 may further include a processing unit 1430, which is configured to perform corresponding processing-related steps inside the second access network device.
  • the receiving unit 1410 and the sending unit 1420 can form a transceiver unit, and have the functions of receiving and sending at the same time.
  • the processing unit 1430 may be at least one processor.
  • the sending unit 1420 may be a transmitter or an interface circuit
  • the receiving unit 1410 may be a receiver or an interface circuit.
  • the receiver and transmitter can be integrated together to form a transceiver or interface circuit.
  • the apparatus 1400 may further include a storage unit for storing data and/or signaling.
  • the processing unit 1430, the receiving unit 1420, and the receiving unit 1410 may interact or couple with the storage unit, such as reading or calling the storage unit. data and/or signaling so that the methods of the above-described embodiments are performed.
  • the above units may exist independently, or may be integrated in whole or in part.
  • FIG. 15 is a schematic diagram of another apparatus 1500 for sending data provided by the present application.
  • the apparatus 1500 includes a receiving unit 1510 , a sending unit 1520 and a processing unit 1530 .
  • the processing unit 1530 is configured to determine not to perform anchor relocation.
  • the sending unit 1520 is configured to send a second request message to the core network device, where the second request message is used to request the core network device to provide at least one next hop chain counter NCC and the next hop NH corresponding to the at least one NCC respectively.
  • the receiving unit 1510 is configured to receive a fourth response message from the core network device, where the fourth response message includes the at least one NCC and the next hop NH corresponding to the at least one NCC respectively.
  • the apparatus 1500 corresponds to the third access network device in the method embodiment, and the apparatus 1500 may be the third access network device in the method embodiment, or a chip or functional module inside the third access network device in the method embodiment .
  • Corresponding units of the apparatus 1500 are configured to perform the corresponding steps performed by the third access network device in the method embodiments shown in FIGS. 6-10 .
  • the sending unit 1520 in the apparatus 1500 performs the step of sending by the third access network device in the method embodiment
  • the receiving unit 1510 in the apparatus 1500 is configured to perform the step of receiving by the third access network device
  • the apparatus 1500 may further include a processing unit 1530, which is configured to perform corresponding processing-related steps inside the third access network device.
  • the receiving unit 1510 and the sending unit 1520 can form a transceiver unit, and have the functions of receiving and sending at the same time.
  • the processing unit 1530 may be at least one processor.
  • the sending unit 1520 may be a transmitter or an interface circuit
  • the receiving unit 1510 may be a receiver or an interface circuit.
  • the receiver and transmitter can be integrated together to form a transceiver or interface circuit.
  • the apparatus 1500 may further include a storage unit for storing data and/or signaling.
  • the processing unit 1530, the receiving unit 1520, and the receiving unit 1510 may interact or couple with the storage unit, such as reading or calling the storage unit. data and/or signaling so that the methods of the above-described embodiments are performed.
  • the above units may exist independently, or may be integrated in whole or in part.
  • FIG. 16 is a schematic structural diagram of an access network device 1600 applicable to this embodiment of the present application, which can be used to implement the first access network device, the second network access device, or the first access network device in the above-mentioned method for transmitting data.
  • Three access network equipment functions It may be a schematic structural diagram of the first access network device, the second network access device, or the third access network device.
  • the access network device 1600 may include a CU, DU, and AAU, compared to the access network device in the LTE communication system, which consists of one or more For radio frequency units, such as a remote radio unit (RRU) and one or more base band units (BBU):
  • RRU remote radio unit
  • BBU base band units
  • the non-real-time part of the original BBU will be divided and redefined as CU, which is responsible for processing non-real-time protocols and services.
  • Part of the physical layer processing function of the BBU is merged with the original RRU and passive antenna into AAU, and the remaining functions of the BBU are redefined as DU.
  • CU and DU are distinguished by the real-time nature of processing content, and AAU is a combination of RRU and antenna.
  • CU, DU, and AAU can be separated or co-located. Therefore, there will be a variety of network deployment forms.
  • One possible deployment form is consistent with traditional 4G network equipment.
  • CU and DU share hardware deployment.
  • FIG. 16 is only an example, and the protection scope of the present application is not limited.
  • the deployment form can also be that DUs are deployed in a 6G BBU computer room, CUs are deployed in a centralized manner, or DUs are centrally deployed, and CUs are centralized at higher levels.
  • the AAU 1601 can implement a transceiver function and is called a transceiver unit 1601, which corresponds to the sending unit and the receiving unit in FIG. 13 to FIG. 15 .
  • the transceiver unit 1601 may also be referred to as a transceiver, a transceiver circuit, or a transceiver, etc., which may include at least one antenna 16011 and a radio frequency unit 16012 .
  • the transceiver unit 1601 may include a receiving unit and a sending unit, the receiving unit may correspond to a receiver (or called a receiver, a receiving circuit), and the sending unit may correspond to a transmitter (or called a transmitter, a sending circuit).
  • the CU and DU 1602 may implement internal processing functions called processing unit 1602.
  • the processing unit 1602 may control network devices, etc., and may be referred to as a controller.
  • the AAU 1601, the CU and the DU 1602 may be physically set together or physically separated.
  • the access network device is not limited to the form shown in FIG. 16 , and can also be in other forms: for example: including BBU and ARU, or including BBU and AAU; also CPE, or other forms, which are not limited in this application.
  • the access network device 1600 shown in FIG. 16 can implement the functions of the first access network device, the second access network device or the third access network device involved in the method embodiments of FIGS. 6-10 .
  • the operations and/or functions of each unit in the access network device 1600 are respectively to implement the corresponding processes performed by the access network device in the method embodiments of the present application. To avoid repetition, the detailed description is appropriately omitted here.
  • the structure of the access network device illustrated in FIG. 16 is only a possible form, and should not constitute any limitation to the embodiments of the present application. This application does not exclude the possibility of other forms of access network device structures that may appear in the future.
  • FIG. 17 is a schematic diagram of another apparatus 1700 for sending data provided by the present application.
  • the apparatus 1700 includes a receiving unit 1710 , a sending unit 1720 and a processing unit 1730 .
  • a receiving unit 1710 configured to receive a first request message from a first access network device, where the first request message is used to request the core network device to provide the first NCC and at least one second NCC, and the first NCC and The next hop NH corresponding to the at least one second NCC respectively.
  • the sending unit 1720 is configured to send a third response message to the first access network device, where the third response message includes the first NCC and the at least one second NCC, and the first NCC and the at least one second NCC respectively correspond to NH.
  • the receiving unit 1710 is configured to receive a second request message from the third access network device, where the second request message is used to request the core network device to provide at least one next hop chain counter NCC and the next corresponding to the at least one NCC respectively. Jump NH.
  • the sending unit 1720 is configured to send a fourth response message to the third access network device, where the fourth response message includes the at least one NCC and the next hop NH corresponding to the at least one NCC respectively.
  • the apparatus 1700 corresponds to the core network device in the method embodiment, and the apparatus 1700 may be the core network device in the method embodiment, or a chip or functional module inside the core network device in the method embodiment. Corresponding units of the apparatus 1700 are configured to perform the corresponding steps performed by the core network device in the method embodiments shown in FIGS. 6-10 .
  • the sending unit 1720 in the apparatus 1700 performs the step of sending by the third access network device in the method embodiment
  • the receiving unit 1710 in the apparatus 1700 is configured to perform the step of receiving by the core network device
  • the apparatus 1700 may further include a processing unit 1730 for using It is used to execute the steps related to the processing inside the core network device.
  • the receiving unit 1710 and the sending unit 1720 can form a transceiver unit, and have the functions of receiving and sending at the same time.
  • the processing unit 1730 may be at least one processor.
  • the sending unit 1720 may be a transmitter or an interface circuit
  • the receiving unit 1710 may be a receiver or an interface circuit.
  • the receiver and transmitter can be integrated together to form a transceiver or interface circuit.
  • the apparatus 1700 may further include a storage unit for storing data and/or signaling.
  • the processing unit 1730, the sending unit 1720, and the receiving unit 1710 may interact or couple with the storage unit, for example, read or call the data in the storage unit. data and/or signaling so that the methods of the above-described embodiments are performed.
  • the above units may exist independently, or may be integrated in whole or in part.
  • FIG. 18 is a schematic structural diagram of a core network device 1800 suitable for an embodiment of the present application, which can be used to implement the functions of the core network device in the above method for transmitting data.
  • the core network device 1800 includes a processor 1801, a memory 1802 and a transceiver 1803, wherein the memory 1802 stores instructions or programs, and the processor 1802 and the transceiver 1803 are used to execute or call the instructions or programs stored in the memory 1802, so that the The core network device 1800 implements the functions of the core network device in the above method for transmitting data.
  • the transceiver 1803 is used to perform the operations performed by the sending unit 1720 and the receiving unit 1710 in the embodiment shown in FIG. 17
  • the processor 1802 is used to perform the implementation shown in FIG. 17 .
  • Embodiments of the present application further provide a communication system, which includes the aforementioned terminal device and network device.
  • the present application also provides a computer-readable storage medium, where instructions are stored in the computer-readable storage medium, and when the instructions are executed on the computer, the computer is made to execute the terminal device in the above-mentioned method as shown in FIG. 6 to FIG. 10 . the various steps performed.
  • the present application also provides a computer-readable storage medium, where instructions are stored in the computer-readable storage medium, and when the instructions are executed on the computer, the computer executes the above-mentioned methods shown in FIG. 6-FIG. 10 to access the The various steps performed by the network device.
  • the present application also provides a computer-readable storage medium, where instructions are stored in the computer-readable storage medium, and when the instructions are executed on the computer, the computer is made to execute the core network in the above-mentioned method as shown in FIG. 6-FIG. 10 .
  • the various steps performed by the device are stored in the computer-readable storage medium, and when the instructions are executed on the computer, the computer is made to execute the core network in the above-mentioned method as shown in FIG. 6-FIG. 10 . The various steps performed by the device.
  • the present application also provides a computer program product containing instructions, when the computer program product runs on a computer, the computer program product causes the computer to perform each step performed by the terminal device in the methods shown in FIGS. 6-10 .
  • the present application also provides a computer program product containing instructions, when the computer program product runs on a computer, the computer program product causes the computer to execute each step performed by the access network device in the methods shown in FIGS. 6-10 .
  • the present application also provides a computer program product containing instructions, when the computer program product runs on a computer, the computer program product causes the computer to perform each step performed by the core network device in the methods shown in FIGS. 6-10 .
  • the present application also provides a chip including a processor.
  • the processor is configured to read and run the computer program stored in the memory to execute the corresponding operations and/or processes performed by the terminal device in the method for transmitting data provided in this application.
  • the chip further includes a memory, the memory and the processor are connected to the memory through a circuit or a wire, and the processor is used for reading and executing the computer program in the memory.
  • the chip further includes a communication interface, and the processor is connected to the communication interface.
  • the communication interface is used to receive processed data and/or information, and the processor acquires the data and/or information from the communication interface and processes the data and/or information.
  • the communication interface may be an input/output interface, an interface circuit, an output circuit, an input circuit, a pin or a related circuit on the chip, and the like.
  • the processor may also be embodied as a processing circuit or a logic circuit.
  • the present application also provides a chip including a processor.
  • the processor is configured to read and run the computer program stored in the memory to execute the corresponding operations and/or processes performed by the access network device in the method for transmitting data provided in this application.
  • the chip further includes a memory, the memory and the processor are connected to the memory through a circuit or a wire, and the processor is used for reading and executing the computer program in the memory.
  • the chip further includes a communication interface, and the processor is connected to the communication interface.
  • the communication interface is used to receive processed data and/or information, and the processor acquires the data and/or information from the communication interface and processes the data and/or information.
  • the communication interface may be an input/output interface, an interface circuit, an output circuit, an input circuit, a pin or a related circuit on the chip, and the like.
  • the processor may also be embodied as a processing circuit or a logic circuit.
  • the present application also provides a chip including a processor.
  • the processor is configured to read and run the computer program stored in the memory to execute the corresponding operations and/or processes performed by the core network device in the method for transmitting data provided in this application.
  • the chip further includes a memory, the memory and the processor are connected to the memory through a circuit or a wire, and the processor is used for reading and executing the computer program in the memory.
  • the chip further includes a communication interface, and the processor is connected to the communication interface.
  • the communication interface is used to receive processed data and/or information, and the processor acquires the data and/or information from the communication interface and processes the data and/or information.
  • the communication interface may be an input/output interface, an interface circuit, an output circuit, an input circuit, a pin or a related circuit on the chip, and the like.
  • the processor may also be embodied as a processing circuit or a logic circuit.
  • the above-mentioned chip can also be replaced by a chip system, which will not be repeated here.
  • the disclosed system, apparatus and method may be implemented in other manners.
  • the apparatus embodiments described above are only illustrative.
  • the division of the units is only a logical function division. In actual implementation, there may be other division methods.
  • multiple units or components may be combined or Can be integrated into another system, or some features can be ignored, or not implemented.
  • the shown or discussed mutual coupling or direct coupling or communication connection may be through some interfaces, indirect coupling or communication connection of devices or units, and may be in electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual conditions to achieve the purpose of the solution in this embodiment.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically alone, or two or more units may be integrated into one unit.
  • the functions, if implemented in the form of software functional units and sold or used as independent products, may be stored in a computer-readable storage medium.
  • the technical solution of the present application can be embodied in the form of a software product in essence, or the part that contributes to the prior art or the part of the technical solution.
  • the computer software product is stored in a storage medium, including Several instructions are used to cause a computer device (which may be a personal computer, a server, or a network device, etc.) to execute all or part of the steps of the methods described in the various embodiments of the present application.
  • the aforementioned storage medium includes: U disk, mobile hard disk, read-only memory (ROM), random access memory (RAM), magnetic disk or optical disk and other media that can store program codes .
  • the term "and/or” in this application is only an association relationship to describe associated objects, which means that there can be three kinds of relationships, for example, A and/or B, which can mean that A exists alone, and A and B exist at the same time. , there are three cases of B alone.
  • the character "/" in this document generally indicates that the contextual object is an "or” relationship; the term “at least one” in this application can mean “one” and "two or more", for example, A At least one of , B, and C can mean: A alone exists, B exists alone, C exists alone, A and B exist simultaneously, A and C exist simultaneously, C and B exist simultaneously, and A and B and C exist simultaneously. seven situations.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

La présente invention concerne un procédé et un appareil de transmission de données. Ledit procédé comprend les étapes suivantes : un dispositif de terminal reçoit, au moyen d'une première cellule, un premier compteur de chaîne de prochain saut (NCC) et au moins un second compteur NCC, le premier compteur NCC correspondant à un premier ensemble de cellules, et le ou les seconds compteurs NCC correspondant à un second ensemble de cellules, et après qu'une resélection de cellule est survenue, le dispositif de terminal reste dans un état inactif de commande de ressources radioélectriques (RRC_INACTIF), et envoie des données de liaison montante, chiffrées via une première clé, au dispositif de réseau d'accès au moyen d'une seconde cellule, la première clé étant déterminée via le compteur NCC correspondant à la seconde cellule, ce qui permet au dispositif de terminal de déterminer la clé sur la base du compteur NCC correspondant à la cellule actuelle et de réaliser une transmission de données, ce qui permet d'améliorer la sécurité des transmissions de données.
PCT/CN2020/140659 2020-12-29 2020-12-29 Procédé et appareil de transmission de données WO2022141025A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2020/140659 WO2022141025A1 (fr) 2020-12-29 2020-12-29 Procédé et appareil de transmission de données

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2020/140659 WO2022141025A1 (fr) 2020-12-29 2020-12-29 Procédé et appareil de transmission de données

Publications (1)

Publication Number Publication Date
WO2022141025A1 true WO2022141025A1 (fr) 2022-07-07

Family

ID=82259913

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/140659 WO2022141025A1 (fr) 2020-12-29 2020-12-29 Procédé et appareil de transmission de données

Country Status (1)

Country Link
WO (1) WO2022141025A1 (fr)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108632022A (zh) * 2017-03-17 2018-10-09 华为技术有限公司 一种秘钥更新方法及装置
US20190373456A1 (en) * 2018-03-16 2019-12-05 Intel Corporation Security framework for msg3 and msg4 in early data transmission
CN110574334A (zh) * 2017-05-05 2019-12-13 诺基亚技术有限公司 提供安全信息
CN110679128A (zh) * 2017-05-24 2020-01-10 高通股份有限公司 非活动状态中的上行链路小数据传输

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108632022A (zh) * 2017-03-17 2018-10-09 华为技术有限公司 一种秘钥更新方法及装置
CN110574334A (zh) * 2017-05-05 2019-12-13 诺基亚技术有限公司 提供安全信息
CN110679128A (zh) * 2017-05-24 2020-01-10 高通股份有限公司 非活动状态中的上行链路小数据传输
US20190373456A1 (en) * 2018-03-16 2019-12-05 Intel Corporation Security framework for msg3 and msg4 in early data transmission

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
INTEL CORPORATION: "Security aspects for SDT", 3GPP DRAFT; R2-2008992, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. RAN WG2, no. Electronic meeting; 20201102 - 20201113, 23 October 2020 (2020-10-23), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France , XP051942040 *

Similar Documents

Publication Publication Date Title
EP4017155A1 (fr) Procédé et appareil de radiorecherche
WO2018027988A1 (fr) Procédé de sélection de tranches de réseau, dispositif d'accès sans fil, et terminal
CN113543274B (zh) 一种网络接入的方法和装置
WO2013075602A1 (fr) Procédé, station de base et équipement d'utilisateur pour obtenir une agrégation de porteuses
US20230040220A1 (en) Method and apparatus for processing time synchronization packet
WO2020119546A1 (fr) Procédé de communication et appareil de communication
WO2021062730A1 (fr) Procédé et dispositif de communication sans fil
CN114424612A (zh) 中继传输的方法、中继终端和远端终端
WO2020211778A1 (fr) Procédé et appareil de transfert intercellulaire de cellules
KR20220155383A (ko) 통신 방법, 액세스 네트워크 디바이스, 단말 디바이스, 및 코어 네트워크 디바이스
US20240098830A1 (en) Communication method and apparatus
WO2021233340A1 (fr) Procédé et appareil d'enregistrement de réseau
US20230141231A1 (en) Mobile Edge Computing Processing Method and Related Device
US20230047783A1 (en) Data transmission method and apparatus
WO2022141025A1 (fr) Procédé et appareil de transmission de données
CN112789896B (zh) 切换传输路径的方法及装置
CN115484582A (zh) 通信方法和通信装置
WO2024001897A1 (fr) Procédé et appareil de communication
WO2023213191A1 (fr) Procédé de protection de sécurité et appareil de communication
WO2023078321A1 (fr) Procédé et appareil de communication
WO2022151057A1 (fr) Procédé et appareil de transmission de données
WO2021057456A1 (fr) Procédé et dispositif destinés à être utilisés dans l'enregistrement
WO2022001964A1 (fr) Procédé de communication, dispositif de terminal et dispositif de réseau d'accès radio
WO2023150944A1 (fr) Procédé de commutation, dispositif terminal et dispositif de réseau
WO2022205453A1 (fr) Procédé et appareil de sélection de réseau

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20967375

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20967375

Country of ref document: EP

Kind code of ref document: A1