WO2022237236A1 - Communication method and apparatus, and storage medium - Google Patents

Communication method and apparatus, and storage medium Download PDF

Info

Publication number
WO2022237236A1
WO2022237236A1 PCT/CN2022/073692 CN2022073692W WO2022237236A1 WO 2022237236 A1 WO2022237236 A1 WO 2022237236A1 CN 2022073692 W CN2022073692 W CN 2022073692W WO 2022237236 A1 WO2022237236 A1 WO 2022237236A1
Authority
WO
WIPO (PCT)
Prior art keywords
message
cell
terminal device
correspondence
information
Prior art date
Application number
PCT/CN2022/073692
Other languages
French (fr)
Chinese (zh)
Inventor
郭龙华
习燕
吴�荣
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2022237236A1 publication Critical patent/WO2022237236A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption

Definitions

  • the present application relates to the technical field of communication, and in particular to a communication method, device and storage medium.
  • the terminal device When the terminal device is in an idle state, the terminal device and the network device are in an out-of-synchronization state, and the terminal device lacks available uplink resources. Once the terminal device needs to send uplink data or download downlink data, it needs to switch from the idle state to the connected state through a random access process.
  • the terminal device sends a random access request to the network device.
  • the network device returns a random access response to the terminal device, and performs uplink authorization on the terminal device in the random access response.
  • the terminal device may send a radio resource control (radio resource control, RRC) establishment request.
  • RRC radio resource control
  • the network device returns an RRC setup response to the terminal device.
  • the RRC establishment response includes user-specific configuration information.
  • the present application provides a communication method, device and storage medium to reduce the risk of information leakage.
  • the present application provides a communication method, including: a network device sends a first message to a terminal device, the first message is not protected by security, and the first message includes first user configuration information of the terminal device.
  • the network device sends a second message to the terminal device, the second message is protected by security, the second message includes second user configuration information of the terminal device, and the second user configuration information is different from the first user configuration information.
  • the network device performs data transmission with the terminal device according to the second user configuration information.
  • the first message is not protected by security
  • the first user configuration information is easily obtained by an attacker
  • the second user configuration information transmitted through the second message protected by security is different from the first user configuration information
  • the attacker cannot It is easy to obtain the configuration information of the second user from the second message protected by security, so that the security of data transmission can be improved.
  • the first user configuration information includes first downlink control information; the second user configuration information includes second downlink control information.
  • the risk of downlink control information leakage can be reduced, thereby further improving data security.
  • At least one of the first user configuration information or the second user configuration information includes at least one of the following:
  • the first message is a radio resource control establishment response message; the second message is a radio resource control configuration message or a radio resource control reconfiguration message. In this way, it can be further compatible with the existing technology.
  • the second user configuration information is used to assist message transmission of at least one of a medium access control layer, a radio link control layer, or a physical layer.
  • the information received by the radio resource control layer can be used to protect the information of at least one of the medium access control layer, the radio link control layer, or the physical layer, thereby improving the security of the underlying information.
  • the radio link control layer, or the physical layer may not be protected by security, because the media access control layer, radio link control layer, or A message of at least one of the radio link control layer or the physical layer can improve the security of information in such underlying messages.
  • the network device after the network device sends the first message to the terminal device and before the network device sends the second message to the terminal device, it further includes that the network device receives a security mode command completion message, and the security mode command completion message is used to Indicates that access stratum or non-access stratum security is active. Since the first message is sent before receiving the security mode command completion message, the first message has not received security protection, so the first user configuration information is easily obtained by an attacker. Since the second user configuration information is sent after the security protection is activated, the second user configuration information can be protected, thereby improving the security of data transmission.
  • the network device is an access network element or a mobility management network element.
  • the security mode command completion message is used to indicate activation of security protection at the access layer.
  • the security mode command completion message is used to indicate that the security protection of the non-access stratum is activated.
  • the network device sending the second message to the terminal device includes: the network device sending the second message to the terminal device according to indication information used to indicate that configuration information of the terminal device needs to be protected by security.
  • the solution provided by the embodiment of the present application can be enabled. If the indication information used to indicate that the configuration information of the terminal device needs to be protected by security is not obtained , then it may not be required to carry the user configuration information in the second message or the user configuration information carried in the second message is not required to be different from the first user configuration information, thereby improving data transmission efficiency.
  • the indication information used to indicate that the configuration information of the terminal device needs to be protected by security includes at least one of the following contents:
  • the third instruction information received by the network device is used to indicate that the configuration information of the terminal device needs to be protected; the access layer security mode command completion message received by the network device, the access layer security mode command completion message is used It is used to indicate the activation of security protection at the access layer; the configuration information of the preset network equipment; the information used to indicate that the information type of the information to be sent matches the preset information type that needs to be protected by security; or, the capability information of the terminal equipment , the capability information of the network device. In this way, the flexibility of the scheme can be improved.
  • the third indication information includes at least one of the following contents: a security level of the terminal device, a session security requirement, a security capability of the terminal device, or a core network security policy corresponding to the terminal device.
  • a security level of the terminal device a session security requirement
  • a security capability of the terminal device a security capability of the terminal device
  • a core network security policy corresponding to the terminal device it can be determined whether to improve the security of the user configuration information of the terminal device according to information such as the security level of the terminal device, so that personalized customization can be provided, for example, different information protection policies can be provided for terminal devices with different security levels.
  • the preset information types that need to be protected by security include at least one of the following: media access control layer information that needs to be protected by security; information that needs to be protected by radio link control layer ; or, Physical layer information to be protected by security.
  • media access control layer information that needs to be protected by security
  • information that needs to be protected by radio link control layer or, Physical layer information to be protected by security.
  • the present application provides a communication method, the method further includes: the network device sends a third message to the terminal device, the third message includes first indication information, and the first indication information is used to indicate the first corresponding relationship of the terminal device , the first correspondence is the correspondence between the information type identifier and the index value.
  • the network device sends a fourth message to the terminal device, where the fourth message includes: an index value corresponding to the information type identifier corresponding to the fourth message in the first correspondence relationship.
  • the fourth message no longer carries the information type identifier, but the index value corresponding to the information type identifier, after the attacker obtains the fourth message, it can increase the difficulty of cracking, and may not be able to obtain the correct information type identifier, so that further Improve the security of data transmission.
  • the information type identifier includes a logical channel identifier. This can increase the difficulty for an attacker to obtain the logical channel identifier, thereby improving the security of information transmission.
  • the first indication information includes at least one of the following contents: the first corresponding relationship; in this way, the terminal device does not need to recalculate the first corresponding relationship, so that the calculation amount of the terminal device can be reduced.
  • the preset rule is used to generate the first correspondence; in this way, the amount of data to be transmitted by the network device can be reduced.
  • a preset calculation formula used to generate the first correspondence relationship In this way, the amount of data to be transmitted by the network device can be reduced. And it can also improve the flexibility of the scheme.
  • the index value in the first correspondence can be obtained through one of the following: calculated by a randomization algorithm; obtained according to a preset rule; according to the information type identifier and the preset first calculated by a calculation formula; or calculated according to a preset value and a preset second calculation formula. In this way, the flexibility of the scheme can be improved.
  • the first correspondence includes a correspondence between a first information type identifier and a first index value
  • the second correspondence includes a correspondence between the first information type identifier and a second index value.
  • the first index value and the first index value are different.
  • the second correspondence is the correspondence between an information type identifier and an index value corresponding to a terminal equipment other than the terminal equipment; or, the first correspondence is the correspondence corresponding to the first bearer of the terminal equipment, and the second correspondence The relationship is the correspondence between the information type identifier corresponding to the second bearer of the first terminal device and the index value.
  • the correspondence between the information type identifier and the index value can be at the granularity of the terminal device or at the granularity of the bearer, and can be set flexibly. Compared with using a set of correspondence for all terminal devices, this embodiment can Further improve security.
  • the third message is protected by security.
  • the first corresponding relationship can be protected, and it is difficult for an attacker to obtain the first corresponding relationship, so the security of data transmission can be improved.
  • the third message is a radio resource control layer message, so it can be better compatible with the existing technology.
  • the fourth message is a medium access control layer message, a radio link control layer message; or a physical layer message.
  • the fourth message is not secured.
  • the information received by the radio resource control layer can be used to protect the information of at least one of the medium access control layer, the radio link control layer, or the physical layer, thereby improving the security of the underlying information.
  • at least one message transmission in the media access control layer, the radio link control layer, or the physical layer may not be protected by security, because the media access control layer, radio link control layer, or A message of at least one of the radio link control layer or the physical layer can improve the security of information in such underlying messages.
  • the fourth message is: a message of a media access control control element.
  • the media access control control element message can be better protected, and the security of the media access control control element message can be improved.
  • the fourth message is a secondary cell activation message, and the fourth message is used to request activation of the secondary cell. In this way, the security of the secondary cell activation message can be improved.
  • the network device sending the fourth message to the terminal device includes: the network device sending the fourth message to the terminal device according to indication information used to indicate that configuration information of the terminal device needs to be protected by security. In this way, it is possible to flexibly choose whether to further protect the information according to whether to obtain the indication information used to indicate that the configuration information of the terminal device needs to be protected, thereby improving the flexibility of the solution.
  • the present application provides a communication method, and the method further includes: a network device sending a third message to a terminal device.
  • the third message includes the second indication information.
  • the second indication information is used to indicate a third correspondence
  • the third correspondence includes correspondences between cell identities and cell index numbers of the N1 secondary cells of the terminal device.
  • N1 is a positive integer; wherein, the third correspondence is obtained based on N0 cells, N0 cells include N1 secondary cells and preset N2 interfering cells, N2 is a positive integer, and N0 is the sum of N1 and N2.
  • the network device sends a fourth message to the terminal device, the fourth message includes a first field, and the first field carries: activation indication information corresponding to cell index numbers of N0 cells, activation indication information corresponding to cell index numbers of cells among the N0 cells It is used to indicate whether the cell is activated or deactivated. Since the index number is generated for the cell according to the interfering cell and the secondary cell, and the activation indication information of the interfering cell is added to the first field, it is difficult for the attacker to obtain the correct activation cell information from the information in the first field. This increases the difficulty for attackers to obtain private information.
  • the third correspondence further includes: a correspondence between a cell identifier of at least one interfering cell among the N2 interfering cells and a cell index number.
  • the terminal device can determine which cells corresponding to the activation indication information in the fourth message are interfering cells, so that part of the information can be discarded, and then the correct cell index number of the activated cell can be obtained.
  • the third message further includes indication information for indicating that the cell corresponding to the cell identifier of the interfering cell is the interfering cell.
  • the terminal device can determine which cells corresponding to the cell index numbers are interfering cells, thereby laying a foundation for subsequently removing information corresponding to the interfering cells from the first field.
  • the activation indication information corresponding to the cell index number of the interfering cell indicates that the interfering cell is activated. In this way, it can increase the difficulty for an attacker to obtain the correct number of activated cells.
  • the cell index number of the cell in the N0 cells is: the serial number of the cell obtained by sorting the N1 secondary cells and the N2 interfering cells;
  • the first field sequentially carries the activation instruction information corresponding to the N0 cells according to the serial numbers of the cells in the N0 cells. In this way, it can be further compatible with the existing technology.
  • N1 is an integer greater than 1
  • there are at least two secondary cells and the cell sequence numbers of at least one interfering cell are included between the cell sequence numbers of the two secondary cells. In this way, it can further increase the difficulty for an attacker to obtain the correct number of secondary cells.
  • the third correspondence is the correspondence between the cell IDs of the N0 cells and the cell index numbers
  • the third correspondence includes the correspondence between the cell IDs of the first interfering cell and the first cell index numbers relation.
  • the fourth correspondence includes the correspondence between the cell identifier of the first interfering cell and the index number of the second cell.
  • the first cell index number and the second cell index number are different.
  • the fourth correspondence is the correspondence between the secondary cell of the terminal equipment other than the terminal equipment and the preset cell identifier and cell index number of at least one interfering cell.
  • the third correspondence is the correspondence corresponding to the first bearer of the terminal device
  • the fourth correspondence is the cell identity and cell identity of at least one secondary cell corresponding to the second bearer of the first terminal device and at least one preset interfering cell Correspondence between index numbers. That is to say, the correspondence between the cell ID and the cell index number can be at the granularity of the terminal device or at the granularity of the bearer, and can be flexibly set. Compared with using a set of correspondence for all terminal devices, this embodiment can Further improve security.
  • the third message is protected by security.
  • the first corresponding relationship can be protected, and it is difficult for an attacker to obtain the first corresponding relationship, so the security of data transmission can be improved.
  • the third message is a radio resource control layer message, so it can be better compatible with the existing technology.
  • the fourth message is a medium access control layer message, a radio link control layer message, or a physical layer message.
  • the fourth message is not secured.
  • the information received by the radio resource control layer can be used to protect the information of at least one of the medium access control layer, the radio link control layer, or the physical layer, thereby improving the security of the underlying information.
  • at least one message transmission in the media access control layer, the radio link control layer, or the physical layer may not be protected by security, because the media access control layer, radio link control layer, or A message of at least one of the radio link control layer or the physical layer can improve the security of information in such underlying messages.
  • the fourth message is: a message of a media access control control element.
  • the media access control control element message can be better protected, and the security of the media access control control element message can be improved.
  • the fourth message is a secondary cell activation message, and the fourth message is used to request activation of the secondary cell. In this way, the security of the secondary cell activation message can be improved.
  • the network device sending the fourth message to the terminal device includes: the network device sending the fourth message to the terminal device according to indication information used to indicate that configuration information of the terminal device needs to be protected by security. In this way, it is possible to flexibly choose whether to further protect the information according to whether to obtain the indication information used to indicate that the configuration information of the terminal device needs to be protected, thereby improving the flexibility of the solution.
  • the present application provides a communication method, the method includes a terminal device receiving a first message from a network device, the first message is not protected by security, and the first message includes first user configuration information of the terminal device.
  • the terminal device receives the second message from the network device, the second message is protected by security, the second message includes second user configuration information of the terminal device, and the second user configuration information is different from the first user configuration information.
  • the terminal device performs data transmission according to the configuration information of the second user.
  • the first message is not protected by security
  • the first user configuration information is easily obtained by an attacker
  • the second user configuration information transmitted through the second message protected by security is different from the first user configuration information
  • the attacker cannot It is easy to obtain the configuration information of the second user from the second message protected by security, so that the security of data transmission can be improved.
  • the first user configuration information includes first downlink control information; the second user configuration information includes second downlink control information.
  • the risk of downlink control information leakage can be reduced, thereby further improving data security.
  • At least one item of the first user configuration information or the second user configuration information includes at least one of the following contents: a scrambling code identifier; a partial bandwidth; The position; the number of start symbols of the physical downlink control channel; the length of the downlink control information; the candidate set; or, the time domain table of the physical downlink shared channel.
  • the first message is a radio resource control establishment response message; the second message is a radio resource control configuration message or a radio resource control reconfiguration message. In this way, it can be further compatible with the existing technology.
  • the second user configuration information is used to assist message transmission of at least one of a medium access control layer, a radio link control layer, or a physical layer.
  • the information received by the radio resource control layer can be used to protect the information of at least one of the medium access control layer, the radio link control layer, or the physical layer, thereby improving the security of the underlying information.
  • the radio link control layer, or the physical layer may not be protected by security, because the media access control layer, radio link control layer, or A message of at least one of the radio link control layer or the physical layer can improve the security of information in such underlying messages.
  • the terminal device performs data transmission according to the second user configuration information, including: the terminal device transmits the physical layer, media access control layer or radio link control layer according to the second user configuration information in the second message at least one of the messages.
  • the information received by the radio resource control layer can be used to protect the information of at least one of the medium access control layer, the radio link control layer, or the physical layer, thereby improving the security of the underlying information.
  • the present application provides a communication method, the method further includes: the terminal device receives a third message from the network device, the third message includes first indication information, and the first indication information is used to indicate the first correspondence corresponding to the terminal device. relationship, the first corresponding relationship is the corresponding relationship between the information type identifier and the index value.
  • the terminal device receives a fourth message sent from the network device to the terminal device, where the fourth message includes: an index value corresponding to the information type identifier corresponding to the fourth message in the first correspondence.
  • the terminal device determines the information type identifier corresponding to the index value in the fourth message according to the first indication information.
  • the fourth message no longer carries the information type identifier, but the index value corresponding to the information type identifier, after the attacker obtains the fourth message, it can increase the difficulty of cracking, and may not be able to obtain the correct information type identifier, so that further Improve the security of data transmission.
  • the information type identifier includes: a logical channel identifier. This can increase the difficulty for an attacker to obtain the logical channel identifier, thereby improving the security of information transmission.
  • the first indication information includes: the first corresponding relationship; in this way, the terminal device does not need to recalculate the first corresponding relationship, so that the calculation amount of the terminal device can be reduced.
  • the first indication information includes: a first corresponding relationship; a preset rule for generating the first corresponding relationship; in this way, the amount of data to be transmitted by the network device can be reduced.
  • the first indication information includes: a first corresponding relationship; and a preset calculation formula used to generate the first corresponding relationship. In this way, the amount of data to be transmitted by the network device can be reduced. And it can also improve the flexibility of the scheme.
  • the index value in the first correspondence can be obtained through one of the following: calculated by a randomization algorithm; obtained according to a preset rule; according to the information type identifier and the preset first calculated by a calculation formula; or calculated according to a preset value and a preset second calculation formula. In this way, the flexibility of the scheme can be improved.
  • the first correspondence includes the correspondence between the first information type identifier and the first index value
  • the second correspondence includes the correspondence between the first information type identifier and the second index value.
  • the first index value is different from the first index value
  • the second correspondence is a correspondence between an information type identifier and an index value corresponding to a terminal device other than the terminal device.
  • the first correspondence is the correspondence corresponding to the first bearer of the terminal device
  • the second correspondence is the correspondence between the information type identifier and the index value corresponding to the second bearer of the first terminal device.
  • the correspondence between the information type identifier and the index value can be at the granularity of the terminal device or at the granularity of the bearer, and can be set flexibly. Compared with using a set of correspondence for all terminal devices, this embodiment can Further improve security.
  • the third message is protected by security.
  • the first corresponding relationship can be protected, and it is difficult for an attacker to obtain the first corresponding relationship, so the security of data transmission can be improved.
  • the third message is a radio resource control layer message, so that it can be better compatible with the existing technology.
  • the fourth message is a medium access control layer message, a radio link control layer message, or a physical layer message.
  • the fourth message is not secured.
  • the information received by the radio resource control layer can be used to protect the information of at least one of the medium access control layer, the radio link control layer, or the physical layer, thereby improving the security of the underlying information.
  • at least one message transmission in the media access control layer, the radio link control layer, or the physical layer may not be protected by security, because the media access control layer, radio link control layer, or A message of at least one of the radio link control layer or the physical layer can improve the security of information in such underlying messages.
  • the fourth message is: a message of a media access control control element.
  • the media access control control element message can be better protected, and the security of the media access control control element message can be improved.
  • the fourth message is a secondary cell activation message, and the fourth message is used to request activation of the secondary cell. In this way, the security of the secondary cell activation message can be improved.
  • the present application provides a communication method, the method further includes: the terminal device receives a third message from the network device, the third message includes second indication information, the second indication information is used to indicate the third correspondence, and the third The corresponding relationship includes the corresponding relationship between the cell identifiers of the N1 secondary cells of the terminal device and the cell index number; N1 is a positive integer; wherein, the third corresponding relationship is obtained based on N0 cells, and the N0 cells include N1 secondary cells and preset N2 interfering cells, N2 is a positive integer, and N0 is the sum of N1 and N2.
  • the terminal device receives from the network device, the fourth message includes a first field, and the first field carries: activation indication information corresponding to the cell index numbers of N0 cells, and the activation indication information corresponding to the cell index numbers of the cells in the N0 cells is used for Indicates whether the cell is active or not.
  • the terminal device determines the activated secondary cell among the N2 secondary cells according to the second indication information. Since the index number is generated for the cell according to the interfering cell and the secondary cell, and the activation indication information of the interfering cell is added to the first field, it is difficult for the attacker to obtain the correct activation cell information from the information in the first field. This increases the difficulty for attackers to obtain private information.
  • the third correspondence further includes: a correspondence between a cell identifier of at least one interfering cell among the N2 interfering cells and a cell index number.
  • the terminal device can determine which cells corresponding to the activation indication information in the fourth message are interfering cells, so that this part of information can be discarded, and then the correct cell index number of the activated cell can be obtained.
  • the third message further includes indication information for indicating that the cell corresponding to the cell identifier of the interfering cell is the interfering cell.
  • the terminal device can determine which cells corresponding to the cell index numbers are interfering cells, thereby laying a foundation for subsequently removing information corresponding to the interfering cells from the first field.
  • the activation indication information corresponding to the cell index number of the interfering cell indicates that the interfering cell is activated. In this way, it can increase the difficulty for an attacker to obtain the correct number of activated cells.
  • the cell index number of the cell in the N0 cells is: the serial number of the cell obtained by sorting the N1 secondary cells and the N2 interfering cells.
  • the first field sequentially carries the activation instruction information corresponding to the N0 cells according to the serial numbers of the cells in the N0 cells. In this way, it can be further compatible with the existing technology.
  • N1 is an integer greater than 1
  • there are at least two secondary cells and the cell sequence numbers of at least one interfering cell are included between the cell sequence numbers of the two secondary cells. In this way, it can further increase the difficulty for an attacker to obtain the correct number of secondary cells.
  • the third correspondence is the correspondence between the cell IDs of the N0 cells and the cell index numbers
  • the third correspondence includes the correspondence between the cell IDs of the first interfering cell and the first cell index numbers relation.
  • the fourth correspondence includes the correspondence between the cell identifier of the first interfering cell and the index number of the second cell.
  • the first cell index number and the second cell index number are different.
  • the fourth correspondence relationship is a correspondence relationship between a secondary cell of a terminal equipment other than the terminal equipment corresponding to a cell identifier and a cell index number of at least one preset interfering cell.
  • the third correspondence is the correspondence corresponding to the first bearer of the terminal device
  • the fourth correspondence is the cell identity and cell identity of at least one secondary cell corresponding to the second bearer of the first terminal device and at least one preset interfering cell Correspondence between index numbers. That is to say, the correspondence between the cell ID and the cell index number can be at the granularity of the terminal device or at the granularity of the bearer, and can be flexibly set. Compared with using a set of correspondence for all terminal devices, this embodiment can Further improve security.
  • the third message is protected by security.
  • the first corresponding relationship can be protected, and it is difficult for an attacker to obtain the first corresponding relationship, so the security of data transmission can be improved.
  • the third message is a radio resource control layer message, so that it can be better compatible with the existing technology.
  • the fourth message is a medium access control layer message, a radio link control layer message, or a physical layer message.
  • the fourth message is not secured.
  • the information received by the radio resource control layer can be used to protect the information of at least one of the medium access control layer, the radio link control layer, or the physical layer, thereby improving the security of the underlying information.
  • at least one message transmission in the media access control layer, the radio link control layer, or the physical layer may not be protected by security, because the media access control layer, radio link control layer, or A message of at least one of the radio link control layer or the physical layer can improve the security of information in such underlying messages.
  • the fourth message is: a message of a media access control control element.
  • the media access control control element message can be better protected, and the security of the media access control control element message can be improved.
  • the fourth message is a secondary cell activation message, and the fourth message is used to request activation of the secondary cell. In this way, the security of the secondary cell activation message can be improved.
  • the present application further provides a communication device.
  • the communication device may be any device at the sending end or device at the receiving end that performs data transmission in a wireless manner.
  • a communication chip, a terminal device, or a network device such as a base station, etc.
  • the device at the sending end and the device at the receiving end are relative.
  • the communication device can be used as the above-mentioned network equipment or a communication chip that can be used in network equipment; in some communication processes, the communication device can be used as the above-mentioned terminal equipment or a communication chip that can be used in terminal equipment.
  • a communication device including a communication unit and a processing unit, so as to implement any implementation manner of any communication method in the first aspect to the sixth aspect.
  • the communication unit is used to perform functions related to transmission and reception.
  • the communication unit includes a receiving unit and a sending unit.
  • the communication device is a communication chip, and the communication unit may be an input-output circuit or port of the communication chip.
  • the communication unit may be a transmitter and a receiver, or the communication unit may be a transmitter and a receiver.
  • the communication device further includes various modules that can be used to implement any implementation manner of any communication method from the first aspect to the sixth aspect.
  • a communication device is provided, and the communication device is the above-mentioned terminal device or network device. Includes processor and memory.
  • a transceiver is also included, the memory is used to store computer programs or instructions, the processor is used to call and run the computer programs or instructions from the memory, and when the processor executes the computer programs or instructions in the memory, the The communication device executes any implementation manner of any communication method in the foregoing first aspect to the sixth aspect.
  • processors there are one or more processors, and one or more memories.
  • the memory may be integrated with the processor, or the memory may be separated from the processor.
  • the transceiver may include a transmitter (transmitter) and a receiver (receiver).
  • a communication device including a processor.
  • the processor is coupled with the memory, and may be used to execute any one of the first aspect to the sixth aspect, and the method in any possible implementation manner of the first aspect to the sixth aspect.
  • the communication device further includes a memory.
  • the communication device further includes a communication interface, and the processor is coupled to the communication interface.
  • the communication device is a terminal device.
  • the communication interface may be a transceiver, or an input/output interface.
  • the transceiver may be a transceiver circuit.
  • the input/output interface may be an input/output circuit.
  • the communication device is a network device.
  • the communication interface may be a transceiver, or an input/output interface.
  • the transceiver may be a transceiver circuit.
  • the input/output interface may be an input/output circuit.
  • the communication device is a chip or a chip system.
  • the communication interface may be an input/output interface, an interface circuit, an output circuit, an input circuit, pins or related circuits on the chip or the chip system.
  • a processor may also be embodied as processing circuitry or logic circuitry.
  • a system in a tenth aspect, includes the above-mentioned terminal device and network device.
  • a computer program product includes: a computer program (also referred to as code, or an instruction), when the computer program is executed, the computer executes any possible The method in the implementation manner, or causing the computer to execute the method in any one of the implementation manners from the first aspect to the sixth aspect above.
  • a computer program also referred to as code, or an instruction
  • a computer-readable storage medium stores a computer program (also referred to as code, or an instruction) which, when running on a computer, enables the computer to perform any of the above-mentioned first aspects.
  • a computer program also referred to as code, or an instruction
  • a chip system may include a processor.
  • the processor is coupled with the memory, and may be used to execute any one of the first aspect to the sixth aspect, and the method in any possible implementation manner of any one of the first aspect to the sixth aspect.
  • the chip system further includes a memory.
  • Memory used to store computer programs (also called code, or instructions).
  • a processor configured to call and run a computer program from a memory, so that the device installed with the system-on-a-chip executes any one of the first to sixth aspects, and any possible one of any one of the first to sixth aspects method in the implementation.
  • a processing device including: an input circuit, an output circuit, and a processing circuit.
  • the processing circuit is used to receive signals through the input circuit and transmit signals through the output circuit, so that any one of the first aspect to the sixth aspect, and the method in any possible implementation manner of the first aspect to the sixth aspect are realized.
  • the above-mentioned processing device may be a chip, the input circuit may be an input pin, the output circuit may be an output pin, and the processing circuit may be a transistor, a gate circuit, a flip-flop, and various logic circuits.
  • the input signal received by the input circuit may be received and input by, for example but not limited to, the receiver, the output signal of the output circuit may be, for example but not limited to, output to the transmitter and transmitted by the transmitter, and the input circuit and the output
  • the circuit may be the same circuit, which is used as an input circuit and an output circuit respectively at different times.
  • the embodiment of the present application does not limit the specific implementation manners of the processor and various circuits.
  • Figure 1 is a schematic diagram of a 5G network architecture based on a service architecture
  • Figure 2 is a schematic diagram of a 5G network architecture based on a point-to-point interface
  • Figure 3a is a schematic structural diagram of a control plane protocol stack under a 5G communication system
  • Figure 3b is a schematic structural diagram of a user plane protocol stack in a 5G communication system
  • FIG. 4 is a schematic structural diagram of a communication device provided in an embodiment of the present application.
  • FIG. 5 is a schematic flowchart of a communication method provided by an embodiment of the present application.
  • FIG. 6 is a schematic flowchart of another communication method provided by the embodiment of the present application.
  • FIG. 7 is a schematic flowchart of another communication method provided by the embodiment of the present application.
  • FIG. 8 is a schematic structural diagram of a possible MAC PDU provided by the embodiment of the present application.
  • FIG. 9 is a schematic flowchart of another communication method provided by the embodiment of the present application.
  • FIG. 10 is a schematic flowchart of another communication method provided by the embodiment of the present application.
  • FIG. 11 is a schematic structural diagram of another communication device provided by an embodiment of the present application.
  • the communication system applicable to this application may include terminal equipment and network equipment, and the network equipment may be an access network equipment (such as the following (wireless) access network (radio access network, (R) AN) network element), or a core network equipment, or a module, component or chip inside an access network device, or a module, component or chip inside a core network device, and the like.
  • an access network equipment such as the following (wireless) access network (radio access network, (R) AN) network element
  • R radio access network
  • AN radio access network
  • core network equipment or a module, component or chip inside an access network device, or a module, component or chip inside a core network device, and the like.
  • the communication system applicable to this application can be the fifth generation (5th generation, 5G) network architecture, of course, it can also be used in other network architectures, such as the Global System of Mobile communication (GSM) system, code division multiple access (Code Division Multiple Access, CDMA) system, Wideband Code Division Multiple Access (WCDMA) system, General Packet Radio Service (GPRS), Long Term Evolution (LTE) system, Advanced long term evolution (LTE-A) system, Universal Mobile Telecommunications System (UMTS), evolved Long Term Evolution (eLTE) system and future 6G and other mobile communications system.
  • GSM Global System of Mobile communication
  • CDMA code division multiple access
  • WCDMA Wideband Code Division Multiple Access
  • GPRS General Packet Radio Service
  • LTE Long Term Evolution
  • LTE-A Advanced long term evolution
  • UMTS Universal Mobile Telecommunications System
  • eLTE evolved Long Term Evolution
  • the embodiment of the application is introduced by taking the application of the embodiment of the application to the 5G network architecture as an example.
  • Figure 1 is a possible 5G network architecture provided by the embodiment of the application.
  • the communication system architecture applicable to the embodiment of the present application is introduced below in conjunction with FIG. 1.
  • the network architecture generally includes the following devices, network elements, and networks:
  • the terminal equipment is shown as an example of user equipment (user equipment, UE).
  • the terminal device in the embodiment of the present application may be a device for implementing a wireless communication function.
  • the terminal equipment may be a user equipment (user equipment, UE), an access terminal, a terminal unit, a terminal station, a mobile station, or a mobile station in a 5G network or a future evolved public land mobile network (PLMN).
  • PLMN public land mobile network
  • remote station remote terminal, mobile device, wireless communication device, terminal agent or terminal device, etc.
  • An access terminal may be a cellular phone, a cordless phone, a session initiation protocol (SIP) phone, a wireless local loop (WLL) station, a personal digital assistant (PDA), a Functional handheld devices, computing devices or other processing devices connected to wireless modems, vehicle-mounted devices or wearable devices, virtual reality (virtual reality, VR) terminal devices, augmented reality (augmented reality, AR) terminal devices, industrial control (industrial Wireless terminals in control, wireless terminals in self driving, wireless terminals in remote medical, wireless terminals in smart grid, wireless terminals in transportation safety Terminals, wireless terminals in smart cities, wireless terminals in smart homes, etc. Terminals can be mobile or fixed.
  • the above-mentioned terminal device can establish a connection with the operator network through an interface provided by the operator network (such as N1, etc.), and use services such as data and/or voice provided by the operator network.
  • the terminal device can also access the DN through the operator's network, and use the operator's service deployed on the DN, and/or the service provided by a third party.
  • the above-mentioned third party may be a service party other than the operator's network and the terminal device, and may provide other services such as data and/or voice for the terminal device.
  • the specific form of expression of the above-mentioned third party can be determined according to the actual application scenario, and is not limited here.
  • (wireless) access network radio access network, (R) AN) network element: used to provide network access functions for authorized terminal equipment in a specific area, and can use different quality network elements according to the level of terminal equipment and business requirements. transport tunnel.
  • RAN is a sub-network of the operator's network, and is an implementation system between service nodes and terminal equipment in the operator's network.
  • the terminal equipment To access the operator's network, the terminal equipment first passes through the RAN, and then can be connected to the service node of the operator's network through the RAN.
  • the RAN device in this application is a device that provides a wireless communication function for a terminal device, and the RAN device is also called an access network device.
  • the RAN equipment in this application includes but is not limited to: next-generation base station (g nodeB, gNB) in 5G, evolved node B (evolved node B, eNB), radio network controller (radio network controller, RNC), node B (node B, NB), base station controller (base station controller, BSC), base transceiver station (base transceiver station, BTS), home base station (for example, home evolved nodeB, or home node B, HNB), baseband unit (baseBand unit, BBU), transmission point (transmitting and receiving point, TRP), transmission point (transmitting point, TP), mobile switching center, etc.
  • next-generation base station g nodeB, gNB
  • 5G evolved node B (evolved node B, eNB), radio network controller (radio network controller, RNC), node B (node B, NB), base station controller (base station controller, BSC), base transceiver station (base transceiver station, BTS
  • User plane network element used for packet routing and forwarding and quality of service (QoS) processing of user plane data.
  • QoS quality of service
  • the user plane network element may be a user plane function (user plane function, UPF) network element, for example, may include an intermediate user plane function (intermediate user plane function, I-UPF) network element, or at least one of the anchor user plane function (PDU Session anchor user plane function, PSA-UPF) network element.
  • UPF user plane function
  • I-UPF intermediate user plane function
  • PSA-UPF anchor user plane function
  • the user plane network element may still be a UPF network element, or may have other names, which are not limited in this application.
  • Data network data network, DN
  • DN data network
  • the data network may be DN1 and DN2.
  • the data network may still be a DN, or may have other names, which are not limited in this application.
  • Mobility management network element mainly used for mobility management and access management, etc., and can be used to implement functions other than session management in mobility management network element (mobility management entity, MME) functions, for example, legal functions such as monitoring and access authorization/authentication.
  • MME mobility management entity
  • the access and mobility management may be an access and mobility management function (access and mobility management function, AMF) network element.
  • AMF access and mobility management function
  • the access and mobility management may still be an AMF network element, or may have other names, which are not limited in this application.
  • Session management network element mainly used for session management, Internet protocol (internet protocol, IP) address allocation and management of terminal equipment, selection of manageable user plane functions, policy control and charging interface endpoints and downlink data notification etc.
  • Internet protocol Internet protocol, IP
  • the session management network element may be a session management function (session management function, SMF) network element, for example, may include an intermediate session management function (intermediate session management function, I-SMF) network element, or at least one item in an anchor session management function (anchor session management function, A-SMF) network element.
  • SMF session management function
  • I-SMF intermediate session management function
  • A-SMF anchor session management function
  • the session management network element may still be an SMF network element, or may have other names, which are not limited in this application.
  • Policy control network element a unified policy framework for guiding network behavior, providing policy rule information, etc. for control plane functional network elements (such as AMF, SMF network elements, etc.).
  • the policy control network element may be a policy control function (policy control function, PCF) network element.
  • policy control network element may still be a PCF network element, or may have other names, which are not limited in this application.
  • Authentication service network element used for authentication services, generating keys to realize two-way authentication of terminal equipment, and supporting a unified authentication framework.
  • the authentication service network element may be an authentication server function (authentication server function, AUSF) network element.
  • the authentication service function network element may still be an AUSF network element, or may have other names, which are not limited in this application.
  • the data management network element can be a unified data management (unified data management, UDM) network element, which can be used to process terminal device identification, access authentication, registration and mobility management Wait.
  • UDM unified data management
  • the unified data management may still be a UDM network element, or may have other names, which are not limited in this application.
  • the data management network element can also be a unified database (Unified Data Repository, UDR). It is responsible for the access function of contract data, policy data, application data and other types of data.
  • UDR Unified Data Repository
  • the PCF may obtain policy decision-related or corresponding subscription information from the UDR.
  • the unified database may still be UDR, or may have other names, which are not limited in this application.
  • Application network element used for data routing for application impact, access to network elements with open network functions, and interaction with the policy framework for policy control, etc.
  • the application network element may be an application function (application function, AF) network element.
  • the application network element may still be an AF network element, or may have other names, which are not limited in this application.
  • Network storage network element used to maintain real-time information of all network function services in the network.
  • the network storage network element may be a network registry function (network repository function, NRF) network element.
  • NRF network repository function
  • the network storage network element may still be an NRF network element, or may have other names, which are not limited in this application.
  • Network slice selection network element used to provide network slice selection function.
  • the network slice selection network element can be a network slice selection function (Network Slice Selection Function, NSSF) network element.
  • NSSF Network Slice Selection Function
  • the network slice selection network element can still be NSSF A network element, or, may also have other names, which are not limited in this application.
  • Network capability opening network element used to provide network customization functions.
  • the network capability exposure network element can be a network exposure function (network exposure function, NEF) network element.
  • NEF network exposure function
  • the network capability exposure network element can still be a NEF network element. element, or may have other names, which are not limited in this application.
  • the applicable communication system architecture in this embodiment of the present application may also include other network elements, such as a network analysis function network element and a service communication function network element.
  • the network element with the network analysis function is used to provide the network slice instance-level data analysis function. For example, it is possible to obtain data, then use the data for training and analysis, and make corresponding inferences based on the analysis results.
  • the network analysis function network element may be a network analysis function (network analytics function, NWDAF) network element.
  • Nnssf, Nausf, Nnef, Npcf, Nudm, Naf, Namf, Nsmf, N1, N2, N3, N4, and N6 are interface serial numbers.
  • interface serial numbers refer to the meanings defined in the 3GPP standard protocol, and there is no limitation here.
  • the above-mentioned network element or function may be a network element in a hardware device, a software function running on dedicated hardware, or a virtualization function instantiated on a platform (for example, a cloud platform).
  • the above-mentioned network elements or functions can be divided into one or more services, and further, there may also be services that exist independently of network functions.
  • an instance of the above-mentioned function, or an instance of a service included in the above-mentioned function, or a service instance existing independently of the network function may be referred to as a service instance.
  • the embodiments of the present application are not limited to the above-mentioned system architecture, and can also be applied to other communication systems in the future, such as the 6th generation communication (the 6th generation, 6G) system architecture and the like.
  • the names of the various network elements used above in the embodiments of the present application may keep the same function in the future communication system, but the names will be changed.
  • FIG. 2 exemplarily shows a schematic diagram of a service-based architecture-based 5G network architecture provided by an embodiment of the present application.
  • N7 The interface between PCF and SMF, which is used to deliver protocol data unit (protocol data unit, PDU) session granularity and business data flow granularity control policy.
  • protocol data unit protocol data unit
  • PDU protocol data unit
  • N15 the interface between the PCF and the AMF, used to issue UE policies and access control-related policies.
  • N5 the interface between the AF and the PCF, used for sending application service requests and reporting network events.
  • N4 The interface between SMF and UPF, which is used to transfer information between the control plane and the user plane, including controlling the distribution of forwarding rules for the user plane, QoS control rules, traffic statistics rules, etc., and reporting of user plane information .
  • N11 The interface between SMF and AMF, used to transfer PDU session tunnel information between RAN and UPF, transfer control messages sent to UE, transfer radio resource control information sent to RAN, etc.
  • N2 the interface between the AMF and the RAN, used to transmit radio bearer control information from the core network side to the RAN.
  • N1 The interface between the AMF and the UE, which has nothing to do with access, and is used to transfer QoS control rules to the UE.
  • N8 The interface between AMF and UDM, which is used for AMF to obtain subscription data and authentication data related to access and mobility management from UDM, and for AMF to register UE current mobility management related information with UDM.
  • N10 the interface between the SMF and the UDM, used for the SMF to obtain session management-related subscription data from the UDM, and for the SMF to register UE current session-related information with the UDM.
  • N35 interface between UDM and UDR, used for UDM to obtain user subscription data information from UDR.
  • N36 the interface between the PCF and the UDR, used for the PCF to obtain policy-related subscription data and application data-related information from the UDR.
  • N12 The interface between AMF and AUSF, used for AMF to initiate an authentication process to AUSF, which can carry SUCI as a subscription identifier;
  • N13 interface between UDM and AUSF, used for AUSF to obtain user authentication vector from UDM to execute the authentication process.
  • N22 an interface between the NSSF and the AMF, used for the AMF to receive slice selection information from the NSSF.
  • Fig. 3a exemplarily shows a schematic structural diagram of a control plane protocol stack in a 5G communication system
  • Fig. 3b exemplarily shows a structural schematic diagram of a user plane protocol stack in a 5G communication system
  • the control plane protocol stack of the terminal device may include: non-access (non-access stratum, NAS) layer, radio resource control (Radio Resource Control, RRC) layer, packet data convergence protocol (Packet Data Convergence Protocol) , PDCP) layer, radio link control (radio link control, RLC) layer, media access control (media access control, MAC) layer, physical (physical, PHY) layer.
  • the control plane protocol stack of gNB may include: RRC layer, PDCP layer, RLC layer, MAC layer and PHY layer.
  • AMF's control plane protocol stack may include a NAS layer.
  • the user plane protocol stack of the terminal device may include: a service data adaptation protocol (service data adaptation protocol, SDAP) layer, a PDCP layer, an RLC layer, a MAC layer, and a PHY layer.
  • SDAP service data adaptation protocol
  • the user plane protocol stack of gNB may include: SDAP layer, PDCP layer, RLC layer, MAC layer and PHY layer.
  • the NAS layer is the non-access layer, which can be mainly used for the connection and mobility control between the terminal equipment and the AMF.
  • the AMF receives messages from the base station, it is not initiated by the base station.
  • the base station only transparently transmits the message sent by the terminal device to the AMF and cannot identify or change this part of the message, so it is called NAS message.
  • the NAS message is the interaction between the terminal device and the AMF, such as mobility and connection process messages such as attachment, bearer establishment, and service request.
  • the RRC layer can be mainly used to handle all signaling between the terminal equipment and the network elements of the 5G communication system (messages between the user and the base station), including system information, admission control, security management, cell reselection, measurement reporting, Handover and mobility, NAS messaging, radio resource management, etc.
  • the SDAP layer is located above the packet data convergence protocol (PDCP) layer, and directly carries Internet protocol (internet protocol, IP) data packets, which can be used for the user plane.
  • IP Internet protocol
  • the main functions of the 5G PDCP layer may include at least one of the following:
  • Control plane integrity verification (4G only has control plane, 5G user plane can be selectively verified);
  • the PDCP of the gNodeB performs offloading and has a routing function.
  • the RLC layer is located below the PDCP layer, and entities can be divided into transparent mode (Transparent mode, TM)_entity, unacknowledged mode (unacknowledged mode, UM) entity, unacknowledged mode (acknowledged mode, AM) entity, AM data transmission and reception share one entity , the UM and TM transceiver entities are separated, and the main functions are as follows:
  • TM transparent mode broadcast message
  • UM non-confirmation mode voice service, delay requirement
  • AM confirmation mode common service, high accuracy
  • the function of the 5GMAC layer is similar to that of 4G.
  • the main function is scheduling.
  • the functions include: resource scheduling, mapping between logical channels and transport channels, multiplexing/demultiplexing, and HARQ (asynchronous uplink and downlink).
  • the main functions of the 5G physical layer may include: error detection, forward error correction (forward error correction, FEC) encryption and decryption, rate matching, physical channel mapping, adjustment and demodulation, frequency synchronization and time synchronization, wireless measurement, multi-input Multi-output technology (multi input multi output, MIMO) processing.
  • FEC forward error correction
  • FEC forward error correction
  • the RLC layer, the MAC layer, and the PHY layer are below the PDCP layer, and the messages transmitted on these layers are not protected by security, for example, they may not be protected by the security protection of the PDCP layer, or they may also be called not protected by confidentiality and Integrity protection.
  • the terminal device or network device in the embodiment of the present application may also be called a communication device, which may be a general-purpose device or a dedicated device, which is not specifically limited in the embodiment of the present application.
  • the relevant functions of the terminal device or network device in the embodiment of this application can be implemented by one device, or by multiple devices, or by one or more Function modules are implemented, which is not specifically limited in this embodiment of the present application. It can be understood that the above functions can be network elements in hardware devices, software functions running on dedicated hardware, or a combination of hardware and software, or instantiated on a platform (for example, a cloud platform) virtualization capabilities.
  • FIG. 4 is a schematic structural diagram of a communication device 300 provided by an embodiment of the present application.
  • the communication device 300 includes one or more processors 301, communication lines 302, and at least one communication interface (in FIG. 4, it is only exemplary to include a communication interface 304 and a processor 301 for illustration), optional can also include memory 303 .
  • Processor 301 may be a chip.
  • the processor 301 may be a field programmable gate array (field programmable gate array, FPGA), may be an application specific integrated circuit (ASIC), may also be a system chip (system on chip, SoC), or It can be a central processing unit (central processor unit, CPU), or a network processor (network processor, NP), or a digital signal processing circuit (digital signal processor, DSP), or a microcontroller (micro controller) unit, MCU), it can also be a programmable controller (programmable logic device, PLD) or other integrated chips.
  • FPGA field programmable gate array
  • ASIC application specific integrated circuit
  • SoC system on chip
  • CPU central processing unit
  • NP network processor
  • DSP digital signal processing circuit
  • microcontroller micro controller
  • MCU microcontroller
  • PLD programmable logic device
  • each step of the method in the embodiment of the present application may be completed by an integrated logic circuit of hardware in a processor or an instruction in the form of software.
  • the steps of the methods disclosed in connection with the embodiments of the present application may be directly implemented by a hardware processor, or implemented by a combination of hardware and software modules in the processor.
  • the software module can be located in a mature storage medium in the field such as random access memory, flash memory, read-only memory, programmable read-only memory or electrically erasable programmable memory, register.
  • the storage medium is located in the memory 303, and the processor 301 reads the information in the memory 303, and completes the steps of the above method in combination with its hardware.
  • the processor 301 in the embodiment of the present application may be an integrated circuit chip, which has a signal processing capability.
  • each step of the above-mentioned method embodiments may be completed by an integrated logic circuit of hardware in a processor or instructions in the form of software.
  • the above-mentioned processor may be a general-purpose processor, a digital signal processor (DSP), an application-specific integrated circuit (ASIC), a field-programmable gate array (FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components .
  • DSP digital signal processor
  • ASIC application-specific integrated circuit
  • FPGA field-programmable gate array
  • Various methods, steps, and logic block diagrams disclosed in the embodiments of the present application may be implemented or executed.
  • a general-purpose processor may be a microprocessor, or the processor may be any conventional processor, or the like.
  • the steps of the method disclosed in connection with the embodiments of the present application may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor.
  • the software module can be located in a mature storage medium in the field such as random access memory, flash memory, read-only memory, programmable read-only memory or electrically erasable programmable memory, register.
  • the storage medium is located in the memory, and the processor reads the information in the memory, and completes the steps of the above method in combination with its hardware.
  • Communication line 302 may include a path for connecting between different components.
  • the communication interface 304 may be a transceiver module for communicating with other devices or communication networks, such as Ethernet, RAN, wireless local area networks (wireless local area networks, WLAN) and the like.
  • the transceiver module may be a device such as a transceiver or a transceiver.
  • the communication interface 304 may also be a transceiver circuit located in the processor 301 to realize signal input and signal output of the processor.
  • the memory 303 may be a device having a storage function. It can be understood that the memory 303 in the embodiment of the present application may be a volatile memory or a nonvolatile memory, or may include both volatile and nonvolatile memories.
  • the non-volatile memory can be read-only memory (read-only memory, ROM), programmable read-only memory (programmable ROM, PROM), erasable programmable read-only memory (erasable PROM, EPROM), electrically programmable Erases programmable read-only memory (electrically EPROM, EEPROM) or flash memory.
  • Volatile memory can be random access memory (RAM), which acts as external cache memory.
  • RAM random access memory
  • static RAM static random access memory
  • dynamic RAM dynamic random access memory
  • DRAM dynamic random access memory
  • SDRAM synchronous dynamic random access memory
  • double data rate synchronous dynamic random access memory double data rate SDRAM, DDR SDRAM
  • enhanced synchronous dynamic random access memory enhanced SDRAM, ESDRAM
  • serial link DRAM SLDRAM
  • direct memory bus random access memory direct rambus RAM, DR RAM
  • the memory 303 is used to store computer-executed instructions for implementing the solution of the present application, and the execution is controlled by the processor 301 .
  • the processor 301 is configured to execute computer-executed instructions stored in the memory 303, so as to implement the methods provided in the embodiments of the present application.
  • the processor 301 may also perform processing-related functions in the methods provided in the following embodiments of the present application, and the communication interface 304 is responsible for communicating with other devices or communication networks.
  • the example does not specifically limit this.
  • the computer-executed instructions in the embodiments of the present application may also be referred to as application program codes, which is not specifically limited in the embodiments of the present application.
  • the processor 301 may include one or more CPUs, for example, CPU0 and CPU1 in FIG. 4 .
  • the communications device 300 may include multiple processors, for example, the processor 301 and the processor 308 in FIG. 4 .
  • processors may be a single-core processor or a multi-core processor.
  • the processor here may include but not limited to at least one of the following: central processing unit (central processing unit, CPU), microprocessor, digital signal processor (DSP), microcontroller (microcontroller unit, MCU), or artificial intelligence
  • central processing unit central processing unit, CPU
  • microprocessor digital signal processor
  • microcontroller microcontroller unit, MCU
  • artificial intelligence Various types of computing devices that run software such as processors, each computing device may include one or more cores for executing software instructions to perform calculations or processing.
  • the communication device 300 may further include an output device 305 and an input device 306 .
  • Output device 305 is in communication with processor 301 and can display information in a variety of ways.
  • the output device 305 may be a liquid crystal display (liquid crystal display, LCD), a light emitting diode (light emitting diode, LED) display device, a cathode ray tube (cathode ray tube, CRT) display device, or a projector (projector) Wait.
  • the input device 306 communicates with the processor 301 and can receive user input in various ways.
  • the input device 306 may be a mouse, a keyboard, a touch screen device, or a sensing device, among others.
  • the above-mentioned communication device 300 may sometimes also be referred to as a communication device, which may be a general-purpose device or a special-purpose device.
  • the communication device 300 can be a desktop computer, a portable computer, a network server, a personal digital assistant (PDA), a mobile phone, a tablet computer, a wireless terminal device, an embedded device, the above-mentioned terminal device, the above-mentioned network device, or a 4 devices with similar structures.
  • PDA personal digital assistant
  • the embodiment of the present application does not limit the type of the communication device 300 .
  • At least one of the following or similar expressions refer to any combination of these items, including any combination of single or plural items.
  • at least one item (piece) of a, b, or c can represent: a, b, c, a-b, a-c, b-c, or a-b-c, where a, b, c can be single or multiple .
  • words such as “first” and “second” are used to distinguish the same or similar items with basically the same function and effect.
  • words such as “first” and “second” do not limit the number and execution order, and words such as “first” and “second” do not necessarily limit the difference.
  • words such as “exemplary” or “for example” are used as examples, illustrations or illustrations. Any embodiment or design scheme described as “exemplary” or “for example” in the embodiments of the present application shall not be interpreted as being more preferred or more advantageous than other embodiments or design schemes.
  • the use of words such as “exemplary” or “such as” is intended to present related concepts in a concrete manner for easy understanding.
  • the network architecture and business scenarios described in the embodiments of the present application are for more clearly illustrating the technical solutions of the embodiments of the present application, and do not constitute limitations on the technical solutions provided by the embodiments of the present application. With the evolution of the network architecture and the emergence of new business scenarios, the technical solutions provided in the embodiments of the present application are also applicable to similar technical problems.
  • FIG. 5 exemplarily shows a schematic flow chart of a communication method provided by an embodiment of the present application.
  • the communication method can be executed by a network device and a terminal device, where the terminal device can be, for example, the aforementioned FIG. 1 and FIG. 2 , the terminal device in FIG. 3a, FIG. 3b or FIG. 4, the network device may be, for example, the access network element (such as gNB) or the mobility management network in the aforementioned FIG. 1, FIG. 2, FIG. 3a, FIG. 3b or FIG.
  • the element (such as AMF) may also be other network elements, and only these two network elements are used as examples here. It can also be executed by chips or components inside the network equipment and chips or components inside the terminal equipment.
  • the method includes:
  • the network device sends a first message to the terminal device.
  • the terminal device receives the first message from the network device.
  • the first message is not protected by security, and the first message includes first user configuration information of the terminal device.
  • the first user configuration information may be an RRC message. This first message is sent before security activation and is not secured.
  • the network device performs data transmission with the terminal device according to the first user configuration information.
  • the RLC layer, the MAC layer, and the PHY layer are below the PDCP layer, and the messages transmitted on these layers are not protected by security, for example, they may not be protected by the security protection of the PDCP layer, or they may also be called not protected by confidentiality and Integrity protection.
  • the network device acquires indication information used to indicate that the configuration information of the terminal device needs to be protected by security.
  • S502 is an optional step and is not required.
  • S502 is marked as a dotted line, which means that S502 can be executed or not. That is, S502 may not be executed before S503, but S502 may also be executed.
  • S502 may also occur after the security protection of the terminal device's access layer or non-access layer is activated. Do explain.
  • the network device to obtain the indication information used to indicate that the configuration information of the terminal device needs to be protected by security, and the following will introduce them respectively:
  • the indication information used to indicate that the configuration information of the terminal device needs to be protected by security is: the third indication information received by the network device.
  • the third indication information is used to indicate that the configuration information of the terminal device needs to be protected by security.
  • other network elements may send the third indication information to the network device (such as gNB or AMF), and correspondingly, the network device receives the third indication information.
  • the network device such as gNB or AMF
  • the third indication information includes at least one of the following:
  • the security level of the terminal device the session security requirement, the security capability of the terminal device, or the core network security policy corresponding to the terminal device.
  • the network element of the core network issues the security level of the terminal equipment to the network equipment.
  • the network element side of the core network issues the security level of the terminal equipment for the terminal equipment with a higher security level.
  • the network element of the core network may deliver the security level of the terminal device to the terminal device having security level information, that is, the network element of the core network may or may not screen according to the security level of the terminal device.
  • the network device may infer that the configuration information of the terminal device needs to be protected by security.
  • the network device may also judge according to the received security level of the terminal device whether the security level satisfies the preset security level requirements, and if so, infer that the configuration information of the terminal device needs to be protected by security.
  • the indication information used to indicate that the configuration information of the terminal device needs to be protected by security is: the security mode command completion message received by the network device.
  • the security mode command complete message is used to indicate the activation of access stratum or non-access stratum security protection.
  • the indication information used to indicate that the configuration information of the terminal device needs to be protected by security is: a security mode command completion message received by the network device and verified successfully, and the successful verification may indicate that the security The mode command complete message was successfully received.
  • the security mode command completion message may be an access layer security mode command completion message, and the message may be used to indicate activation of access layer security protection.
  • the security mode command completion message may be a non-access stratum security mode command completion message, and the message may be used to indicate activation of non-access stratum security protection.
  • the indication information used to indicate that the configuration information of the terminal device needs to be protected by security is: preset configuration information of the network device, or a preset policy of the network device.
  • a network device is set to preset one or more durations. Within the preset duration, the configuration information of terminal devices that need to transmit signaling needs to be received safety protection.
  • the network device may determine that the configuration information of the terminal device needs to be protected by security if it is determined that the current time is within the preset time period according to the preset time period.
  • the network device can set that terminal devices in a characteristic area need to be protected by security.
  • the network device can determine whether the terminal device needs to be protected by security according to the area to which the terminal device belongs.
  • the area may be the signal coverage area of the network device.
  • the indication information used to indicate that the configuration information of the terminal device needs to be protected by security is: the information used to indicate that the information type of the information to be sent matches the preset information type that needs to be protected by security.
  • some types of information that need to be protected by security may also be preset, such as some sensitive information that requires confidentiality protection, such as proprietary configuration information (UE specific config) of the terminal equipment, For example, cell configuration information (such as cell group config) and/or radio bearer configuration (such as radio bearer config) of the terminal device may be included.
  • UE specific config proprietary configuration information
  • cell configuration information such as cell group config
  • radio bearer configuration such as radio bearer config
  • the preset information types to be protected include at least one of the following:
  • MAC layer information that needs to be protected by security; information on the RLC layer that needs to be protected by radio link control; or information on the physical PHY layer that needs to be protected by security. Because the level of protection of the underlying information of the MAC layer, RLC layer and PHY layer is slightly insufficient in the prior art, therefore, in the embodiment of the present application, it is possible to target the sensitive MAC layer, RLC layer or PHY layer that needs confidentiality protection Additional protection of information, which can further improve the security of user information and reduce the possibility of information leakage.
  • the indication information used to indicate that the configuration information of the terminal device needs to be protected by security includes: capability information of the terminal device and capability information of the network device.
  • the network device may determine to acquire the indication information used to indicate that the configuration information of the terminal device needs to be protected by security.
  • the network device can determine to obtain An indication that the configuration information of the terminal device needs to be protected by security.
  • the network device sends the second message to the terminal device.
  • the terminal device receives the second message from the network device.
  • the second message is protected by security, the second message includes second user configuration information of the terminal device, and the second user configuration information is different from the first user configuration information.
  • the user configuration information may include specific configuration information (UE specific config) of the terminal equipment.
  • the user configuration information may include at least one item of cell configuration information (such as cell group config) or radio bearer configuration (such as radio bearer config) of the terminal device.
  • the user configuration information may include downlink control information.
  • the first user configuration information includes first downlink control information; the second user configuration information includes second downlink control information.
  • At least one item of the first user configuration information or the second user configuration information includes at least one of the following:
  • BWP bandwidth part
  • DCI downlink control information
  • PDSCH physical downlink shared channel
  • Table 1 below exemplarily shows examples of the first user configuration information and the second user configuration information.
  • Table 1 Example of first user configuration information and second user configuration information
  • the value of the parameter item in the second user configuration information can be different from the parameter value in the first parameter item.
  • the parameter is at most 16 In the first user configuration information, the contents of each row from row 0 to row 15 can be indicated, and the contents of rows 0 to 15 in the first user configuration information can be randomly changed in order to obtain the second user configuration information, such as Change the content of line 0 in the first user configuration information to line 5, so that the difficulty for an attacker to crack can be increased.
  • the PDCCH may indicate to the terminal device which row to use.
  • the difference between the first user configuration information and the second user configuration information may mean that there is at least one parameter item in the second user configuration information, and the parameter value of the parameter item in the second user configuration information is the same as that in the second user configuration information
  • the parameter values in the user configuration information are different. It may also mean that the parameter value of each parameter item in the second user configuration information is different from the parameter value of the parameter item in the first user configuration information.
  • the parameter items in the second user configuration information may be the same as the parameter items in the first user configuration information.
  • the parameter items in the second user configuration information may be different from the parameter items in the first user configuration information, for example, the parameter items in the second user configuration information may be less than or more than the first user configuration information.
  • a parameter item in user configuration information may mean that there is at least one parameter item in the second user configuration information, and the parameter value of the parameter item in the second user configuration information is the same as that in the second user configuration information
  • the parameter values in the user configuration information are different. It may also mean that the parameter value of each
  • At least one or all parameter items in the first user configuration information and the second user configuration information may be different. Or all the parameter items in the first user configuration information and the second user configuration information are the same, but the value of at least one parameter item or all parameter items may be different.
  • the configuration objects or content of the first user configuration information and the second user configuration information may be the same, but the object values are different.
  • S503 may be replaced by: the network device sends to the terminal device the information carrying the second user's Second message of configuration information.
  • the network device does not obtain the indication information used to indicate that the configuration information of the terminal device needs to be protected by security, it may not be required to carry the information different from the first user configuration information in the second message.
  • the second user configuration information may not carry or not carry the user configuration information, for example, it may carry the first user configuration information, but it is no longer required that the user configuration information carried in the second message User configuration information is different. If the second message does not carry user configuration information, the terminal device can transmit data with the network device according to the first user configuration information in the first message; if the second message carries user configuration information, the terminal device can transmit data according to Data is transmitted between the user configuration information carried in the second message and the network device.
  • the attacker may further steal other information according to the configuration information of the first user in the obtained first message, resulting in a relatively serious degree of information leakage.
  • the network device performs data transmission with the terminal device according to the second user configuration information.
  • the first message is not protected by security
  • the first user configuration information in the first message is more likely to be leaked
  • the second message is protected by security
  • the second message is required to carry
  • the configuration information of the second user is different from the configuration information of the first user. Therefore, the possibility of the attacker obtaining the configuration information of the second user is relatively small, and the possibility of further stealing other information based on the configuration information of the second user is also small. Thereby, the degree of information leakage can be reduced.
  • FIG. 6 exemplarily shows a schematic flowchart of another communication method provided by the embodiment of the present application.
  • the network device is the gNB
  • the first message is the RRC establishment response
  • the second message is the RRC reconfiguration message as an example to introduce in conjunction with FIG. 6 .
  • the method includes:
  • the terminal device sends a random access request to the network device.
  • a network device receives a random access request from a terminal device.
  • the terminal device when the terminal device is in an idle state, the terminal device and the network device are in an out-of-synchronization state, and the terminal device lacks available uplink resources. Once the terminal device needs to send uplink data or download downlink data, it needs to switch from the idle state to the connected state through a random access process. When the terminal device initiates a random access procedure, S601 may be executed.
  • the random access request can be a random access preamble.
  • the network device sends a random access response to the terminal device, and performs uplink authorization on the terminal device in the random access response.
  • the terminal device receives the random access response from the network device.
  • the random access response may be a random access response.
  • the terminal device may send an RRC establishment request (also called an RRC establishment request message).
  • the network device can receive the RRC establishment request from the terminal device.
  • the RRC establishment request may be an RRC setup request.
  • the network device sends an RRC establishment response (also referred to as RRC establishment, or an RRC establishment response message) to the terminal device.
  • the RRC setup response includes first user configuration information.
  • the terminal device may receive the RRC setup response from the network device.
  • S604 may be an example of the foregoing S501, and the first message may be an RRC establishment response in S604.
  • the RRC establishment response can be written as RRC setup, or RRC setup response.
  • User configuration information may include user-specific configuration information (eg, UE-specific config).
  • the user configuration information may include at least one item of cell configuration information (such as cell group config) or radio bearer configuration (such as radio bearer config) of the terminal device.
  • the cell configuration information (such as cell group config) may include the configuration of the signaling radio bearer (signaling radio bearer, SRB) 1 message in the MAC layer, the phy layer, and the RLC layer.
  • the terminal device performs a registration process or a service request process in the core network, and activates access layer or non-access security.
  • the network device when the network device receives the security mode command completion message and the verification is successful, it means that the security of the access layer or the non-access layer is activated.
  • the network device acquires indication information used to indicate that the configuration information of the terminal device needs to be protected by security. For this S606, reference may be made to the related content of the aforementioned S502, which will not be repeated here.
  • S606 is an optional step, which may or may not be executed.
  • S606 is a dotted line, indicating that S606 is an optional step to be executed.
  • the network device sends an RRC reconfiguration message to the terminal device, where the RRC reconfiguration message includes second user configuration information, and the second user configuration information is different from the first user configuration information.
  • the RRC reconfiguration message may be RRC reconfig.
  • the second message may be an RRC reconfiguration message.
  • the terminal device sends an RRC reconfiguration complete message to the network device.
  • the terminal device after successfully parsing the content in the RRC reconfiguration message, the terminal device returns an RRC reconfiguration complete message after verifying that the integrity protection is successful.
  • S601 to S604 can be transmitted on a public channel, and the security protection has not been activated yet. All messages are available to the attacker.
  • the terminal device and the network device can be configured according to the user configuration information, and subsequent messages can be transmitted on a channel specific to the terminal device.
  • multiple RRC reconfiguration messages may be initiated after S605.
  • the user configuration information carried in subsequent RRC reconfiguration messages may be required to be consistent with the first user configuration information. The information is different.
  • the RRC reconfiguration message may not carry the user configuration information (in this case, the terminal device according to the transmission of data between a user configuration information and a network device), or it is more likely that the user configuration information carried in the RRC reconfiguration message is the same as the first user configuration information, so the attacker may use the acquired first user configuration information To obtain data packets between terminal equipment and network equipment, and monitor and tamper with PHY layer, MAC layer, and RLC layer messages. Further, it may lead to misconfiguration of resources between terminal devices and network devices, degradation of transmission performance, and even interruption of connections. Attackers eavesdropping on messages may also lead to privacy leaks of terminal devices.
  • the second user configuration information different from the first user configuration information is required to be carried in the RRC reconfiguration message. Therefore, when an attacker wants to obtain the data packet of the terminal device, he cannot obtain it based on the first user configuration information. , but need to guess the physical layer parameter configuration of the terminal device, such as parameters in DCI such as scrambling code ID, BWP, position/number of PDCCH start symbols, DCI length, different candidate sets, etc. Since the DCI information in the second user configuration information is invisible to the attacker, the data can be hidden to a certain extent, which can increase the difficulty of the attack, thereby reducing the possibility of information leakage.
  • FIG. 7 exemplarily shows a schematic flow chart of a communication method, which can be executed by a network device and a terminal device, where the terminal device can be, for example, the aforementioned FIG. 1, FIG. 2, FIG. 3a, and FIG. 3b Or the terminal device in FIG. 4, the network device may be, for example, the access network element (such as gNB) or the mobility management network element (such as AMF) in the aforementioned FIG. 1, FIG. 2, FIG. 3a, FIG. 3b or FIG. 4, It may also be other network elements, and only these two network elements are used as examples here. It can also be executed by chips or components inside the network equipment and chips or components inside the terminal equipment. As shown in Figure 7, the method includes:
  • the network device sends a third message to the terminal device.
  • the terminal device receives the third message from the network device.
  • the third message includes first indication information, where the first indication information is used to indicate a first correspondence relationship corresponding to the terminal device, and the first correspondence relationship is a correspondence relationship between an information type identifier and an index value.
  • the third message is protected by security. In this way, the transmission process of the first indication information can be more secure.
  • the third message may occur after the aforementioned S605, that is, after the terminal device performs a registration process or a service request process in the core network, and activates the access layer or non-access security, thus, the first Three messages can be protected, thereby improving the security of information transmission.
  • the third message is a radio resource control RRC layer message, such as the aforementioned RRC reconfiguration message, the aforementioned RRC reconfiguration message in S607, or other RRC reconfiguration messages. information. In this way, the third message can be protected by security, so that the security of information transmission can be improved.
  • the index value in the first correspondence can be obtained by one of the following:
  • the first indication information may be the first correspondence, or indication information used to indicate the first correspondence, and the terminal device may calculate or determine the information type identifier and the index value according to the indication information used to indicate the first correspondence.
  • the first indication information may be the preset rule, and the terminal device may determine the correspondence between the information type identifier and the index value according to the preset rule.
  • the first indication information can also be the preset first calculation formula, and the terminal device can determine the The corresponding relationship between the information type identifier and the index value is displayed.
  • the first indication information can also be the preset second calculation formula and the preset value
  • the terminal device can The preset second calculation formula determines the corresponding relationship between the information type identifier and the index value.
  • the granularity of the "correspondence between information type identifiers and index values" in the embodiment of the present application may be the granularity of the terminal device, that is, the "correspondence between information type identifiers and index values" corresponding to the terminal device can be established for each terminal device,
  • the "correspondence relationship between information type identifiers and index values" corresponding to two terminal devices may be different.
  • the terminal device corresponding to the foregoing first correspondence is referred to as a first terminal device, and the first correspondence corresponding to the first terminal device includes a correspondence between a first information type identifier and a first index value.
  • the second terminal device corresponds to the second correspondence
  • the second correspondence includes The correspondence between the first information type identifier and the second index value.
  • the first index value and the first index value are different. That is, for at least one information type identifier, two different values may be obtained in the "correspondence relationship between information type identifiers and index values" corresponding to two different terminal devices. That is to say, the embodiment of the present application does not use the same set of correspondence between information type identifiers and index values for all terminal devices, but can be set separately for different terminal devices, thereby further improving security.
  • the granularity of "correspondence between information type identifier and index value" may be the granularity of bearer, that is, for each bearer of a terminal device, the "information type identifier and index value" corresponding to the bearer of the terminal device can be established.
  • the corresponding relationship between the two bearers of the terminal device may be different from the corresponding relationship between the information type identifier and the index value.
  • the aforementioned first correspondence corresponds to the first bearer of the first terminal device, and the first correspondence corresponding to the first bearer includes a correspondence between the first information type identifier and the first index value.
  • the second bearer of the first terminal device also corresponds to a second correspondence, and the second correspondence includes a correspondence between the first information type identifier and the second index value.
  • the first index value and the first index value are different. That is, for at least one information type identifier, two different values can be obtained in the "correspondence relationship between information type identifiers and index values" corresponding to at least two bearers of the same terminal device. That is to say, the embodiment of the present application does not use the same set of correspondence between information type identifiers and index values for all bearers of the terminal device, but can be set separately for different bearers of the terminal device, thereby further improving security.
  • the network device sends a fourth message to the terminal device.
  • the terminal device receives the fourth message from the network device.
  • the fourth message includes: an index value corresponding to the information type identifier corresponding to the fourth message in the first correspondence.
  • the terminal device determines the information type identifier corresponding to the index value in the fourth message according to the first indication information.
  • the method may further include: the network device acquires indication information for indicating that the configuration information of the terminal device needs to be protected by security.
  • the foregoing S702 may be replaced with: the network device sends the fourth message to the terminal device according to the indication information used to indicate that the configuration information of the terminal device needs to be protected by security.
  • the relevant content of this step please refer to the above-mentioned introduction about the implementation manner a1 to the implementation manner a5 in S502, which will not be repeated here.
  • the capability information of the terminal device indicates that the terminal device is capable of supporting the determination of the first correspondence according to the first indication information, and determines the index value corresponding to the index value in the fourth message according to the first correspondence.
  • information type identification and the network device has the ability to generate the first correspondence, and according to the first correspondence, the field carrying the information type identification in the fourth message carries the index value corresponding to the field carrying the information type identification, then the network device determines to obtain The instruction information used to indicate that the configuration information of the terminal device needs to be protected by security.
  • the fourth message is a MAC layer message, an RLC layer message, or a PHY layer message.
  • the fourth message is not secured. In this way, on the one hand, the transmission efficiency of the message can be taken into account, and on the other hand, because the information type identifier in the fourth message is protected, that is, the fourth message does not carry the information type identifier, but carries its corresponding index value, so The possibility of leakage of the information type identifier in the fourth message can be reduced, thereby further improving security.
  • the fourth message is: a message including a MAC Control Element (MAC Control Element, MAC CE).
  • the fourth message may be sent after the aforementioned network device receives the RRC reconfiguration complete message sent by the terminal device (the RRC reconfiguration message is the aforementioned third message).
  • Fig. 8 exemplarily shows a schematic structural diagram of a possible MAC PDU.
  • a MAC PDU may consist of 1 MAC header (MAC header)+0 or more MAC service data units (service data unit, SDU)+0 or more MAC CE+possible padding.
  • the MAC header (MAC header) is composed of one or more MAC sub-headers (MAC sub-header).
  • the field corresponding to each MAC sub-header can be a MAC PDU, or a MAC CE, or padding.
  • the MAC sub-header (MAC sub-header) in the MAC PDU can contain the following types:
  • MAC sub-header In addition to the last MAC sub-header (MAC sub-header) in the MAC PDU and the MAC sub-header (MAC sub-header) for the fixed-length MAC CE, there can be 6 other MAC sub-headers (MAC sub-header) Domain composition: R/R/E/LCID/F/L.
  • the last MAC sub-header (MAC sub-header) in the MAC PDU and the MAC sub-header (MAC sub-header) for the fixed-length MAC CE consist of 4 fields: R/R/E/LCID.
  • the MAC sub-header (MAC sub-header) corresponding to padding also consists of 4 fields: R/R/E/LCID.
  • R It can represent a reserved bit, which is set to 0.
  • E It can be used to indicate whether the following is the data field or the MAC header field. 1 means that the next Mac sub-header is next, and 0 means that the next is the data field.
  • L field F It can indicate whether the length of the L field is 7 bits or 15 bits. When the length indicated by L exceeds 127, it is set to 1, otherwise it is 0.
  • L It can indicate the data length of MAC CE or MAC SDU.
  • LCID short for logical channel ID (LCID).
  • the LCID field can be used to carry the code point or initial index value of the LCID.
  • the information carried by the LCID field is used to indicate the MAC SDU corresponding to the MAC sub-header, or the type of the corresponding MAC CE, or the corresponding padding.
  • Table 2 The corresponding relationship between the value of the LCID and the code point or initial index value of the LCID is shown in Table 2 below.
  • the MAC sub-header may include an information type identifier, which is used to indicate the information type of the information carried by the field corresponding to the MAC sub-header (MAC sub-header).
  • Information type identification may also be called information purpose identification, information role identification, and so on.
  • the information type identifier may be a code point or an initial index value of a logical channel identifier (logical channel ID, LCID).
  • logical channel ID logical channel ID
  • LCID initial index value of a logical channel identifier
  • the index value corresponding to the LCID defined in the standard is called the initial index value.
  • the index value in the first correspondence in the embodiment of the present application is referred to as an index value.
  • the corresponding relationship between the index value and the information type identifier can be established.
  • the code point whose information type identifier is LCID as an example, a possible index value, LCID code point and Correspondence between LCID values.
  • the fourth message is a secondary cell activation message, and the fourth message is used to request activation of the secondary cell.
  • the information type identifier (LCID code point) in the fourth message should be 58. It is determined according to Table 3 that the corresponding index value is 50, then the field used to carry the information type identifier in the fourth message carries 50 instead of 58. After the assailant obtains the fourth message, if he does not know the correspondence between the index value and the information type identifier, he will determine that the message is SP SRS activation signaling according to the 50 carried in the fourth message, and he does not know the The fourth message is a secondary cell activation message.
  • the scheme provided by the embodiment of the present application can realize the hiding and protection of the information type identification in the message header of the fourth message, so that the security can be further improved, so that the attacker cannot correctly understand the message type and increase the attack speed.
  • the attack difficulty of the attacker can realize the hiding and protection of the information type identification in the message header of the fourth message, so that the security can be further improved, so that the attacker cannot correctly understand the message type and increase the attack speed.
  • FIG. 9 exemplarily shows a schematic flowchart of another communication method provided by the embodiment of the present application.
  • the communication method can be executed by a network device and a terminal device, where the terminal device can be, for example, the aforementioned FIG. 1 and FIG. 2.
  • the terminal device in Figure 3a, Figure 3b or Figure 4 the network device can be, for example, the access network element (such as gNB) or mobility management network element (such as gNB) in Figure 1, Figure 2, Figure 3a, Figure 3b or Figure 4 mentioned above
  • the network element (such as AMF) may also be other network elements, and only these two network elements are used as examples here. It can also be executed by chips or components inside the network equipment and chips or components inside the terminal equipment.
  • the method includes:
  • the network device sends a third message to the terminal device.
  • the terminal device receives the third message from the network device.
  • the third message includes second indication information, where the second indication information is used to indicate the third correspondence.
  • the third correspondence includes the correspondence between cell identities and cell index numbers of the N1 secondary cells of the terminal device.
  • N1 is a positive integer.
  • the third corresponding relationship is obtained based on N0 cells, and N0 cells include N1 secondary cells and preset N2 interfering cells, N2 is a positive integer, and N0 is the sum of N1 and N2.
  • the third correspondence may further include cell index numbers of the N2 interfering cells.
  • the cell index number of each cell may be randomly generated, and there may not be a sorting relationship among the cells.
  • the cells may be sorted according to their identifiers, and the cell index numbers of the cells are sequentially generated.
  • N1 is an integer greater than 1
  • at least one interfering cell is arranged between two secondary cells.
  • the second indication information may be the third correspondence, or indication information for indicating the third correspondence, and the terminal device may determine the correspondence between the cell identifier and the cell index number according to the indication information for indicating the third correspondence. For example, if the cell index number is obtained through a preset rule, the second indication information may be the preset rule, and the terminal device may determine the correspondence between the cell ID and the cell index number according to the preset rule.
  • the preset rule may be based on The cell identifiers are sorted, and three interfering cells are continuously added after the first cell, and the index numbers of the cells are obtained according to the sequence numbers of the sorted cells.
  • the granularity of the "correspondence between cell identifiers and cell index numbers” may be the granularity of terminal devices, that is, the “correspondence between cell identifiers and cell index numbers" corresponding to the terminal device can be established for each terminal device,
  • the "correspondence relationship between cell identifiers and cell index numbers" corresponding to the two terminal devices may be different.
  • the terminal device corresponding to the aforementioned third correspondence is called the first terminal equipment, and the third correspondence corresponding to the first terminal equipment includes the correspondence between the first cell identifier and the first cell index number.
  • the second terminal device corresponds to the third correspondence
  • the third correspondence includes The corresponding relationship between the first cell identifier and the second cell index number.
  • the first cell index number is different from the first cell index number. That is, for at least one cell ID, two different cell index numbers can be obtained in the "correspondence relationship between cell IDs and cell index numbers" corresponding to two different terminal devices. That is to say, in the embodiment of the present application, the same set of correspondence between cell identifiers and cell index numbers is not used for all terminal devices, but can be set separately for different terminal devices, thereby further improving security.
  • the granularity of "correspondence between cell ID and cell index number" in the embodiment of the present application may be the granularity of bearer, that is, for each bearer of a terminal device, the "cell ID and cell index" corresponding to the bearer of the terminal device can be established.
  • the corresponding relationship between the two bearers of the terminal device may be different from the corresponding relationship between the cell ID and the cell index number.
  • the foregoing third correspondence corresponds to the first bearer of the first terminal device, and the third correspondence corresponding to the first bearer includes a correspondence between the first cell identifier and the first cell index number.
  • the second bearer of the first terminal device also corresponds to a third correspondence, and the third correspondence includes a correspondence between the first cell identifier and the second cell index number.
  • the first cell index number is different from the first cell index number. That is, for at least one cell ID, two different values may be obtained in the "correspondence between cell IDs and cell index numbers" corresponding to at least two bearers of the same terminal device. That is to say, in the embodiment of the present application, the same set of correspondence between cell identifiers and cell index numbers is not used for all bearers of the terminal equipment, but can be set separately for different bearers of the terminal equipment, thereby further improving security.
  • the network device sends a fourth message to the terminal device.
  • the fourth message includes a first field, and the first field carries: activation indication information corresponding to the cell index numbers of N0 cells, activation information corresponding to the cell index numbers of the N0 cells
  • the indication information is used to indicate whether the cell is activated or not activated.
  • the cell index numbers of the cells among the N0 cells may be index numbers allocated for the cells, and there may not be a sorting relationship among them.
  • the cell index number of the cell in the N0 cells is: the serial number of the cell obtained by sorting the N1 secondary cells and the N2 interfering cells. That is, the index number can show the sorting relationship between the cells, for example, the sorting can be performed according to the cell ID.
  • the first field sequentially carries the activation indication information corresponding to the N0 cells according to the serial numbers of the cells in the N0 cells. Therefore, the terminal device can determine the cell index number corresponding to the activation indication information according to the sorting of the activation indication information.
  • the fourth message may also carry indication information for indicating a correspondence between the activation indication information and the cell index number. In this case, it is not required that the arrangement of the activation indication information satisfy a certain ordering relationship. The terminal device may determine the cell index number corresponding to each activation indication information according to the indication information used to indicate the correspondence between the activation indication information and the cell index number.
  • S902 or S91 may further include: the network device acquires indication information for indicating that the configuration information of the terminal device needs to be protected by security.
  • the foregoing S902 may be replaced with: the network device sends the fourth message to the terminal device according to the indication information used to indicate that the configuration information of the terminal device needs to be protected by security.
  • the network device sends the fourth message to the terminal device according to the indication information used to indicate that the configuration information of the terminal device needs to be protected by security.
  • the capability information indication of the terminal device the terminal device has the ability to identify the activation indication information of the interfering cell, and the network device has the ability to generate the third corresponding relationship according to the secondary cell and the interfering cell, and according to the first Three correspondences, the fourth message is capable of carrying the activation indication information corresponding to the interfering cell and the secondary cell; then the network device determines to obtain the indication information used to indicate that the configuration information of the terminal device needs to be protected by security.
  • the terminal device determines an activated secondary cell among the N2 secondary cells according to the first field of the fourth message and the foregoing third correspondence.
  • the two schemes of FIG. 9 and FIG. 7 in the embodiment of the present application may be implemented separately, for example, only the scheme of FIG. 9 is used, or only the scheme of FIG. 7 is applied.
  • the schemes of FIG. 9 and FIG. 7 may also be used in combination, for example, the second indication information and the aforementioned first indication information may be carried in the third message.
  • the information type identifier is encrypted, and the index value is used to replace the information type identifier, and the information of the interfering cell may also be added in the secondary cell in S902, so as to encrypt the message content.
  • the aforementioned scheme in FIG. 5 can be implemented alone, or can be used in combination with at least one of FIG. 9 or FIG. 7 , such as combining FIG. 5 with FIG. 7 and FIG. 9 , such
  • the aforementioned second message and the third message may be the same message, or may be two messages, such as two RRC reconfiguration messages.
  • Enhanced Mobile Broadband is an important scenario for 5G applications.
  • Typical applications of this scenario include 2k/4k video and VR/AR, etc.
  • These applications require ultra-high transmission data rates: the upstream peak rate must reach 10Gbits per second (Gbit/s); the downstream peak rate must reach 20Gbit/s.
  • the peak rate is closely related to the bandwidth available to the user. If the data is regarded as vehicles on the highway, the bandwidth of the cell is the number of lanes of the highway. Under the same conditions, the more lanes there are, the faster the maximum speed the vehicle can reach.
  • the cell bandwidth of 5G can reach up to 100MHz in the low frequency band and 400MHz in the high frequency band.
  • the peak user downlink rate can only reach 1.6+Gbit/s (the subcarrier spacing is 30kHz, 4 streams are transmitted in parallel, the modulation method is 256QAM, and the subframe ratio is 4:1). Such a peak rate is still far from meeting the requirements of the eMBB scenario.
  • CA carrier aggregation
  • PCC Primary Carrier
  • PCell primary cell
  • SCC secondary Carrier
  • SCell secondary cell
  • the terminal equipment performs an initial connection establishment process or a connection reestablishment process in the cell.
  • the PCell can be responsible for handling all signaling with the terminal equipment.
  • Each terminal device can connect to multiple SCells. SCell is added during RRC reconfiguration to provide additional radio resources. There may be no RRC connection between the terminal equipment and the SCell.
  • FIG. 10 exemplarily shows a schematic flowchart of another communication method provided by the embodiment of the present application, as shown in FIG. 10:
  • the terminal device reports a measurement report of the secondary cell to the primary cell of the base station.
  • the primary cell receives the measurement report of the secondary cell from the terminal device.
  • the measurement report message of the secondary cell may be secondary cell channel measurement.
  • the measurement report of the secondary cell may be an RRC message, which may be protected by security, or the message is protected by integrity and confidentiality.
  • the terminal device can be triggered periodically or by a specific event to start measuring the signal quality of the secondary cell, and record the characteristics of the network environment at a certain time and point during the call process by taking a certain measurement content as a unit .
  • the terminal device can measure the secondary cell, and send the measurement report of the secondary cell to the primary cell in the network device.
  • the cell IDs may be #102, #398, #209, and #452 respectively.
  • the primary cell may send to the terminal device indication information for indicating the correspondence between the secondary cell and the cell index number of the terminal device.
  • This information may be carried in the third message of S901 above.
  • S1002 refer to the introduction about the third message in FIG. 7 or FIG. 9 , and details are not repeated here.
  • the third message may be secondary cell configuration information, which may be secondary cell configuration.
  • the primary cell may number the secondary cell, and send a message including the numbering information of the secondary cell to the terminal device.
  • the message may be sent in an RRC message, and the message may be protected by integrity and encryption.
  • the primary cell sends a secondary cell activation message to the terminal device.
  • the fourth message in FIG. 7 and FIG. 9 may be the secondary cell activation message in S1003, which may be secondary cell activation.
  • the fourth message is used to activate the secondary cell.
  • the secondary cell activation message is a MAC layer message, and the message is not protected by security, or not protected by integrity and confidentiality.
  • the primary cell when the primary cell receives a large amount of downlink data and can increase the peak rate by activating the secondary cell, the primary cell sends a secondary cell activation message to the UE to activate at least one secondary cell.
  • the terminal device selects a corresponding secondary cell for activation according to the secondary cell activation message, and establishes a data transmission channel from the terminal device to the secondary cell, and then performs data transmission with the secondary cell.
  • the cell IDs of the four secondary cells of the terminal device are respectively #102, #398, #209, and #452
  • the fourth message is a secondary cell activation message as an example for illustration.
  • Table 4 exemplarily shows a schematic table in which the primary cell only numbers N1 secondary cells (N1 is 4).
  • Table 5 exemplarily shows a corresponding relationship between the cell index numbers generated according to Table 4 and the corresponding activation indication information.
  • Table 5 Schematic table of the corresponding relationship between the cell index number and the corresponding activation indication information generated according to Table 4
  • the main cell needs to activate the cell with the number 1/2/4, it can carry "1101000" in the first field of the fourth message, because the first field is based on the cell index number.
  • the ordering relationship places the activation indication information corresponding to each cell index number in sequence. A bit of 1 indicates that the cell corresponding to the cell index number corresponding to the bit is activated, and a bit of 0 indicates inactivation. Therefore, it can be determined that the cell numbered 1/2/4 is activated according to "1101000" in the first field. Further, the terminal device can determine the numbered cell as 1/2 according to the correspondence between the secondary cell and the cell index number, such as Table 4.
  • the cell identifiers of the cells of /4 are respectively: #452, #209, and #102.
  • the secondary cell activation message is a MAC CE message
  • the code point or initial index value of the LCID in the MAC header is 58
  • the message header of the secondary cell activation message can carry the index value in the scheme shown in Figure 7 above , for example, according to the aforementioned Table 3, 50 can be carried.
  • the content in the fourth message is plain text, and an attacker can obtain the content in the fourth message.
  • the attacker can count the number of 1 bits in the first field, and then obtain the number of activated cells.
  • the attacker can walk in a certain area and record the corresponding relationship between the location path and the number of activated cells. According to the obtained sample data, the corresponding relationship between the location information and the number of cells can be generated.
  • the location information of the terminal device can be further inferred. It can be seen that the schemes in Table 4 and Table 5 may easily lead to leakage of private information of the terminal device, such as location information.
  • the embodiment of this application proposes the solution shown in FIG. 9 above.
  • the first field does not only carry the cell activation indication of N1 secondary cells. Instead, it may carry cell activation indication information of N0 cells, and the N0 cells include N1 secondary cells and N2 interfering cells.
  • Table 6 and Table 7 are used for illustration below.
  • Table 6 exemplarily shows a schematic diagram of numbering N1 secondary cells (N1 is 4) and N2 interfering cells by the primary cell.
  • Table 7 exemplarily shows the corresponding relationship between the cell index numbers generated according to Table 6 and the corresponding activation indication information.
  • Table 7 Schematic table of the corresponding relationship between the cell index number and the corresponding activation indication information generated according to Table 6
  • the primary cell has added an interfering cell to the secondary cell, and uniformly numbered the secondary cell and the interfering cell.
  • the interfering cell is the cell whose cell ID is #000 in Table 6. The cell numbers are shown in Table 6. If the primary cell needs to activate "#452, #209, #102", the cell numbers of which are 1/5/7, then "1110101" can be carried in the first field of the fourth message.
  • the terminal device can sequentially determine the cell index number of the activated secondary cell according to the information carried in the first field, and further determine the cell identity of the activated secondary cell according to the "third correspondence between the cell ID of the secondary cell and the cell index number" .
  • the third correspondence may also include the correspondence between the cell ID of the interfering cell and the cell index number, and indicate that the preset cell ID (such as #000) of the terminal device is the interfering cell, then The terminal device may ignore the activation indication information corresponding to the cell identifier #000.
  • the activation indication information corresponding to #000 may also be called noise information, which is used to interfere and confuse attackers. However, the terminal equipment can remove the noise information, and then obtain the correct identification of the cell to be activated.
  • the cell activation indication information of the interfering cell may be set to any value, 0 or 1, for example, all may be set to 0, for example, "1000101" may be carried in the first field of the fourth message.
  • the attacker does not know that the secondary cell and the interfering cell are numbered together, but thinks that the numbering is only for the secondary cell, so it can be inferred that the terminal device has 7 The number of secondary cells. It can be seen that since the attacker cannot understand the noise information in the fourth message, the attack difficulty can be increased, and the information can be kept secret and hidden. For example, the quantity information of the secondary cell can be kept secret and hidden.
  • the activation indication information corresponding to at least one interfering cell may be set to 1. That is, for at least one interfering cell, the activation indication information of the interfering cell is used to indicate that the interfering cell is activated. For example, "1100101" may be carried in the first field of the fourth message. In this case, after obtaining the information in the first field, the attacker does not know that the secondary cell and the interfering cell are numbered together, but thinks that the numbering is only for the secondary cell, so it can be inferred that the terminal device has 7 The number of secondary cells, and the activated number is 4. It can be seen that the quantity information of the secondary cell can be kept secret and hidden.
  • the methods and/or steps implemented by the terminal device may also be implemented by components (such as chips or circuits) that can be used for the terminal device.
  • the methods and/or steps implemented by network equipment may also be implemented by components (such as chips or circuits) that can be used in network equipment.
  • FIG. 11 is a schematic diagram of a communication device provided by an embodiment of the present application.
  • the communication device may be the terminal device in the above method embodiment, or a device including the above terminal device, or a component that can be used in the terminal device, or a chip or a circuit (for example, a chip or a circuit in the first policy control network element ).
  • the communication device may be the network device in the above-mentioned method embodiment, or a device including the above-mentioned network device, or a component that can be used in the network device, or a chip or a circuit (for example, a chip or a circuit in the second policy control network element ).
  • the communication device 1100 includes a processing module 1102 and a communication module 1101 . Further, the communication device 1100 may include a storage module 1103 or may not include a storage module 1103 . The dotted line in the storage module 1103 in the figure further indicates that the storage module is optional.
  • the processing module 1102 can be a processor or a controller, such as a general-purpose central processing unit (central processing unit, CPU), a general-purpose processor, a digital signal processing (digital signal processing, DSP), an application specific integrated circuit (application specific integrated circuit) circuits, ASIC), field programmable gate array (field programmable gate array, FPGA) or other programmable logic devices, transistor logic devices, hardware components or any combination thereof. It can implement or execute the various illustrative logical blocks, modules and circuits described in connection with the present disclosure.
  • the processor can also be a combination of computing functions, for example, a combination of one or more microprocessors, a combination of DSP and a microprocessor, and so on.
  • the processing module 1102 can execute computer-executable instructions stored in the storage module.
  • the storage module 1103 may be a memory.
  • the storage module can be a storage module in the chip, such as a register, a cache, etc.
  • the storage module can also be a storage module outside the chip in the communication device, such as a read-only memory (read-only memory, ROM). ) or other types of static storage devices that can store static information and instructions, random access memory (random access memory, RAM), etc.
  • ROM read-only memory
  • RAM random access memory
  • the communication module 1101 is an interface circuit of the communication device for receiving signals from other devices.
  • the communication module 1101 is an interface circuit for the chip to receive signals from other chips or devices, or an interface circuit for the chip to send signals to other chips or devices.
  • the communication module 1101 may be, for example, a transceiver.
  • the transceiver may include a radio frequency circuit.
  • the communication module 1101 may be, for example, an input/output interface, a pin, or a circuit.
  • the functions/implementation process of the communication module 1101 and the processing module 1102 in FIG. 11 can be realized by calling the computer-executed instructions stored in the memory 303 by the processor 301 in the communication device 300 shown in FIG. 4 .
  • the function/implementation process of the processing module 1102 in FIG. 11 can be implemented by calling the computer execution instructions stored in the memory 303 by the processor 301 in the communication device 300 shown in FIG. /The implementation process can be implemented through the communication interface 304 in the communication device 300 shown in FIG. 4 .
  • the processing module 1102 is configured to send the first message to the terminal device through the communication module 1101 and send the second message to the terminal device.
  • the first message is not protected by security, and the first message includes first user configuration information of the terminal device.
  • the second message is protected by security, the second message includes second user configuration information of the terminal device, and the second user configuration information is different from the first user configuration information.
  • Data transmission is performed between the terminal device and the second user configuration information.
  • the processing module 1102 is configured to send the third message to the terminal device through the communication module 1101 .
  • the third message includes first indication information, where the first indication information is used to indicate a first correspondence relationship corresponding to the terminal device, and the first correspondence relationship is a correspondence relationship between an information type identifier and an index value.
  • the fourth message includes: an index value corresponding to the information type identifier corresponding to the fourth message in the first correspondence.
  • the processing module 1102 is configured to send the third message to the terminal device through the communication module 1101 .
  • the third message includes second indication information, and the second indication information is used to indicate a third correspondence, and the third correspondence includes the correspondence between cell identities and cell index numbers of N1 secondary cells of the terminal device; N1 is a positive integer ; Wherein, the third corresponding relationship is obtained based on N0 cells, N0 cells include N1 secondary cells and preset N2 interfering cells, N2 is a positive integer, and N0 is the sum of N1 and N2.
  • the fourth message includes a first field, and the first field carries: activation indication information corresponding to the cell index numbers of N0 cells, and the activation indication information corresponding to the cell index numbers of the cells in the N0 cells is used to indicate whether the cell is activated or not activated.
  • the processing module 1102 is configured to receive the first message from the network device through the communication module 1101 and receive the second message from the network device.
  • the first message is not protected by security, and the first message includes first user configuration information of the terminal device.
  • the second message is protected by security, the second message includes second user configuration information of the terminal device, and the second user configuration information is different from the first user configuration information.
  • Data transmission is performed between the terminal device and the second user configuration information.
  • the processing module 1102 is configured to receive the third message from the network device through the communication module 1101 .
  • a fourth message is received from the network device.
  • the third message includes first indication information, where the first indication information is used to indicate a first correspondence relationship corresponding to the terminal device, and the first correspondence relationship is a correspondence relationship between an information type identifier and an index value.
  • the fourth message includes: an index value corresponding to the information type identifier corresponding to the fourth message in the first correspondence.
  • the processing module 1102 is configured to receive the third message from the network device through the communication module 1101 .
  • a fourth message is received from the network device.
  • the third message includes second indication information, and the second indication information is used to indicate a third correspondence, and the third correspondence includes the correspondence between cell identities and cell index numbers of N1 secondary cells of the terminal device; N1 is a positive integer ;
  • the third corresponding relationship is obtained based on N0 cells, N0 cells include N1 secondary cells and preset N2 interfering cells, N2 is a positive integer, and N0 is the sum of N1 and N2.
  • the fourth message includes a first field, and the first field carries: activation indication information corresponding to the cell index numbers of N0 cells, and the activation indication information corresponding to the cell index numbers of the cells in the N0 cells is used to indicate whether the cell is activated or not activated.
  • the communication device includes hardware structures and/or software modules corresponding to each function.
  • the present application can be implemented in the form of hardware or a combination of hardware and computer software in combination with the units and algorithm steps of each example described in the embodiments disclosed herein. Whether a certain function is executed by hardware or computer software drives hardware depends on the specific application and design constraints of the technical solution. Those skilled in the art may use different methods to implement the described functions for each specific application, but such implementation should not be regarded as exceeding the scope of the present application.
  • the present application also provides a computer program product, the computer program product including: computer program code or instruction, when the computer program code or instruction is run on the computer, the computer is made to execute the , the method of any one of the embodiments shown in FIG. 6 , FIG. 7 , FIG. 9 or FIG. 10 .
  • the present application also provides a computer-readable storage medium, the computer-readable medium stores program codes, and when the program codes are run on a computer, the computer executes the steps shown in Figures 5 and 6. , the method of any one of the embodiments shown in FIG. 7 , FIG. 9 or FIG. 10 .
  • the present application further provides a chip system, where the chip system may include a processor.
  • the processor is coupled with the memory, and may be used to execute the method in any one of the embodiments shown in FIG. 5 , FIG. 6 , FIG. 7 , FIG. 9 or FIG. 10 .
  • the chip system further includes a memory. Memory, used to store computer programs (also called code, or instructions).
  • the processor is configured to call and run the computer program from the memory, so that the device installed with the system-on-a-chip executes the method of any one of the embodiments shown in FIG. 5 , FIG. 6 , FIG. 7 , FIG. 9 or FIG. 10 .
  • the present application further provides a system, which includes the aforementioned terminal device and network device.
  • all or part of them may be implemented by software, hardware, firmware or any combination thereof.
  • software When implemented using software, it may be implemented in whole or in part in the form of a computer program product.
  • a computer program product includes one or more computer instructions. When the computer instructions are loaded and executed on the computer, the processes or functions according to the embodiments of the present application are generated in whole or in part.
  • a computer can be a general purpose computer, special purpose computer, computer network, or other programmable device.
  • Computer instructions may be stored in or transmitted from one computer-readable storage medium to another computer-readable storage medium, e.g.
  • the computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device including a server, a data center, and the like integrated with one or more available media. Available media can be magnetic media (e.g., floppy disk, hard disk, magnetic tape), optical media (e.g., high-density digital video disc (digital video disc, DVD)), or semiconductor media (e.g., solid state disk (solid state disc, SSD) )Wait.
  • magnetic media e.g., floppy disk, hard disk, magnetic tape
  • optical media e.g., high-density digital video disc (digital video disc, DVD)
  • semiconductor media e.g., solid state disk (solid state disc, SSD)
  • the network equipment in each of the above device embodiments corresponds to the terminal equipment and the network equipment or terminal equipment in the method embodiments, and the corresponding modules or units perform corresponding steps, for example, the communication module (transceiver) performs receiving or sending in the method embodiments Steps, other steps except sending and receiving can be executed by a processing module (processor).
  • a processing module for the functions of the specific units, reference may be made to the corresponding method embodiments. Wherein, there may be one or more processors.
  • a component may be, but is not limited to being, a process running on a processor, a processor, an object, an executable, a thread of execution, a program, and/or a computer.
  • an application running on a computing device and the computing device can be components.
  • One or more components can reside within a process and/or thread of execution and a component can be localized on one computer and/or distributed between two or more computers.
  • these components can execute from various computer readable media having various data structures stored thereon.
  • a component may, for example, be based on a signal having one or more packets of data (e.g., data from two components interacting with another component between a local system, a distributed system, and/or a network, such as the Internet via a signal interacting with other systems). Communicate through local and/or remote processes.
  • packets of data e.g., data from two components interacting with another component between a local system, a distributed system, and/or a network, such as the Internet via a signal interacting with other systems.
  • the disclosed systems, devices and methods may be implemented in other ways.
  • the device embodiments described above are only illustrative.
  • the division of units is only a logical function division. In actual implementation, there may be other division methods.
  • multiple units or components can be combined or integrated. to another system, or some features may be ignored, or not implemented.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be through some interfaces, and the indirect coupling or communication connection of devices or units may be in electrical, mechanical or other forms.
  • a unit described as a separate component may or may not be physically separated, and a component displayed as a unit may or may not be a physical unit, that is, it may be located in one place, or may be distributed to multiple network units. Part or all of the units can be selected according to actual needs to achieve the purpose of the solution of this embodiment.
  • each functional unit in each embodiment of the present application may be integrated into one processing module, each unit may exist separately physically, or two or more units may be integrated into one unit. If the functions are realized in the form of software functional units and sold or used as independent products, they can be stored in a computer-readable storage medium.

Abstract

A communication method and apparatus, and a storage medium, for use in reducing the risk of information leakage. In the present application, a network device sends a first message to a terminal device, the first message being not subjected to security protection and comprising first user configuration information of the terminal device; the network device sends a second message to the terminal device, the second message being subjected to security protection and comprising second user configuration information of the terminal device, and the second user configuration information being different from the first user configuration information; and the network device performs data transmission with the terminal device according to the second user configuration information. Since the first message is not subjected to security protection, the first user configuration information is easily obtained by an attacker; and since the second user configuration information transmitted by means of the second message that is subjected to security protection is different from the first user configuration information, it is not easy for the attacker to obtain the second user configuration information from the second message that is subjected to security protection, such that the security of data transmission can be improved.

Description

一种通信方法、装置和存储介质A communication method, device and storage medium
相关申请的交叉引用Cross References to Related Applications
本申请要求在2021年05月08日提交中国专利局、申请号为202110501160.4、申请名称为“一种通信方法、装置和存储介质”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。This application claims the priority of the Chinese patent application with the application number 202110501160.4 and the application title "A communication method, device and storage medium" submitted to the China Patent Office on May 8, 2021, the entire contents of which are incorporated herein by reference. Applying.
技术领域technical field
本申请涉及通信技术领域,尤其涉及一种通信方法、装置和存储介质。The present application relates to the technical field of communication, and in particular to a communication method, device and storage medium.
背景技术Background technique
当终端设备处于空闲态时,终端设备和网络设备处于失步状态,终端设备缺少可使用的上行资源。一旦终端设备需要发送上行数据或下载下行数据时,需要通过随机接入过程,从空闲态切换至连接态。When the terminal device is in an idle state, the terminal device and the network device are in an out-of-synchronization state, and the terminal device lacks available uplink resources. Once the terminal device needs to send uplink data or download downlink data, it needs to switch from the idle state to the connected state through a random access process.
在随机接入过程中,终端设备向网络设备发送随机接入请求。网络设备向终端设备返回随机接入响应,并在随机接入响应中对终端设备进行上行授权。之后终端设备可以发送无线资源控制(radio resource control,RRC)建立请求。网络设备向终端设备返回RRC建立响应。RRC建立响应中包括用户专用配置信息。During the random access process, the terminal device sends a random access request to the network device. The network device returns a random access response to the terminal device, and performs uplink authorization on the terminal device in the random access response. Afterwards, the terminal device may send a radio resource control (radio resource control, RRC) establishment request. The network device returns an RRC setup response to the terminal device. The RRC establishment response includes user-specific configuration information.
需要注意的是,该四个步骤均传输在公共信道上,接入层安全还未激活,攻击者可以获得所有信息,比如可以获得RRC建立响应中包括用户配置信息。若终端设备依据该用户配置信息进行数据传输,则会很大程度上造成信息泄露。It should be noted that these four steps are all transmitted on the public channel, and the security of the access layer has not been activated, and the attacker can obtain all information, for example, the user configuration information included in the RRC establishment response. If the terminal device transmits data according to the user configuration information, it will cause information leakage to a large extent.
发明内容Contents of the invention
本申请提供一种通信方法、装置和存储介质,用以降低信息泄露的风险。The present application provides a communication method, device and storage medium to reduce the risk of information leakage.
第一方面,本申请提供一种通信方法,包括:网络设备向终端设备发送第一消息,第一消息未受到安全保护,第一消息包括终端设备的第一用户配置信息。网络设备向终端设备发送第二消息,第二消息受到安全保护,第二消息包括终端设备的第二用户配置信息,第二用户配置信息与第一用户配置信息不同。网络设备根据第二用户配置信息与终端设备之间进行数据传输。由于第一消息未受安全保护,因此第一用户配置信息容易被攻击者拿到,由于通过受安全保护的第二消息传输的第二用户配置信息与第一用户配置信息不同,因此攻击者不容易从受安全保护的第二消息中获取第二用户配置信息,从而可以提高数据传输的安全性。In a first aspect, the present application provides a communication method, including: a network device sends a first message to a terminal device, the first message is not protected by security, and the first message includes first user configuration information of the terminal device. The network device sends a second message to the terminal device, the second message is protected by security, the second message includes second user configuration information of the terminal device, and the second user configuration information is different from the first user configuration information. The network device performs data transmission with the terminal device according to the second user configuration information. Since the first message is not protected by security, the first user configuration information is easily obtained by an attacker, and since the second user configuration information transmitted through the second message protected by security is different from the first user configuration information, the attacker cannot It is easy to obtain the configuration information of the second user from the second message protected by security, so that the security of data transmission can be improved.
在一种可能地实施方式中,第一用户配置信息包括第一下行控制信息;第二用户配置信息包括第二下行控制信息。如此,可以降低下行控制信息泄露的风险,从而进一步调高数据安全性。In a possible implementation manner, the first user configuration information includes first downlink control information; the second user configuration information includes second downlink control information. In this way, the risk of downlink control information leakage can be reduced, thereby further improving data security.
在一种可能地实施方式中,第一用户配置信息或第二用户配置信息中的至少一项包括以下内容中的至少一项:In a possible implementation manner, at least one of the first user configuration information or the second user configuration information includes at least one of the following:
扰码标识;部分带宽;物理下行控制信道的起始符号的位置;物理下行控制信道的起始符号的个数;下行控制信息长度;候选集;或,物理下行共享信道的时域表。如此,可以提高对下行控制信息中的物理层参数的保密程度,从而可以降低其泄露可能性。Scrambling code identification; partial bandwidth; the position of the start symbol of the physical downlink control channel; the number of start symbols of the physical downlink control channel; the length of the downlink control information; the candidate set; or, the time domain table of the physical downlink shared channel. In this way, the confidentiality of the physical layer parameters in the downlink control information can be improved, thereby reducing the possibility of leakage.
在一种可能地实施方式中,第一消息为无线资源控制建立响应消息;第二消息为无线资源控制配置消息或无线资源控制重配置消息。如此,可以进一步与现有技术兼容。In a possible implementation manner, the first message is a radio resource control establishment response message; the second message is a radio resource control configuration message or a radio resource control reconfiguration message. In this way, it can be further compatible with the existing technology.
在一种可能地实施方式中,第二用户配置信息用于辅助媒体访问控制层、无线链路控制层,或,物理层中的至少一项的消息传输。如此,通过无线资源控制层接收的信息可以用于实现对媒体访问控制层、无线链路控制层,或,物理层中的至少一项的信息的保护,从而可以提高底层信息的安全性。且由于媒体访问控制层、无线链路控制层,或,物理层中的至少一项消息传输可能并未受到安全保护,因此由于通过受到安全保护的第二用户配置信息来传输媒体访问控制层、无线链路控制层或物理层中的至少一项的消息,可以提高此类底层消息中的信息的安全性。In a possible implementation manner, the second user configuration information is used to assist message transmission of at least one of a medium access control layer, a radio link control layer, or a physical layer. In this way, the information received by the radio resource control layer can be used to protect the information of at least one of the medium access control layer, the radio link control layer, or the physical layer, thereby improving the security of the underlying information. And because at least one message transmission in the media access control layer, the radio link control layer, or the physical layer may not be protected by security, because the media access control layer, radio link control layer, or A message of at least one of the radio link control layer or the physical layer can improve the security of information in such underlying messages.
在一种可能地实施方式中,网络设备向终端设备发送第一消息之后,网络设备向终端设备发送第二消息之前,还包括,网络设备接收安全模式命令完成消息,安全模式命令完成消息用于指示接入层或非接入层安全保护激活。由于第一消息为接收安全模式命令完成消息之前发送的,因此第一消息并未收到安全保护,因此第一用户配置信息容易被攻击者获取。由于在安全保护激活后发送第二用户配置信息,因此第二用户配置信息可以受到安全保护,因此可以提高数据传输的安全性。In a possible implementation manner, after the network device sends the first message to the terminal device and before the network device sends the second message to the terminal device, it further includes that the network device receives a security mode command completion message, and the security mode command completion message is used to Indicates that access stratum or non-access stratum security is active. Since the first message is sent before receiving the security mode command completion message, the first message has not received security protection, so the first user configuration information is easily obtained by an attacker. Since the second user configuration information is sent after the security protection is activated, the second user configuration information can be protected, thereby improving the security of data transmission.
在一种可能地实施方式中,网络设备为接入网网元或移动性管理网元。当网络设备为基站时,安全模式命令完成消息用于指示接入层安全保护激活。当网络设备为移动性管理网元时,安全模式命令完成消息用于指示非接入层安全保护激活。In a possible implementation manner, the network device is an access network element or a mobility management network element. When the network device is a base station, the security mode command completion message is used to indicate activation of security protection at the access layer. When the network device is a mobility management network element, the security mode command completion message is used to indicate that the security protection of the non-access stratum is activated.
在一种可能地实施方式中,网络设备向终端设备发送第二消息,包括:网络设备根据用于指示终端设备的配置信息需受到安全保护的指示信息,向终端设备发送第二消息。如此,可以在获取到用于指示终端设备的配置信息需受到安全保护的指示信息后,启用本申请实施例提供的方案,若未获取用于指示终端设备的配置信息需受到安全保护的指示信息,则可以不必要求第二消息中承载用户配置信息或不必要求第二消息中承载的用户配置信息与第一用户配置信息不同,从而可以提高数据传输效率。In a possible implementation manner, the network device sending the second message to the terminal device includes: the network device sending the second message to the terminal device according to indication information used to indicate that configuration information of the terminal device needs to be protected by security. In this way, after obtaining the indication information indicating that the configuration information of the terminal device needs to be protected by security, the solution provided by the embodiment of the present application can be enabled. If the indication information used to indicate that the configuration information of the terminal device needs to be protected by security is not obtained , then it may not be required to carry the user configuration information in the second message or the user configuration information carried in the second message is not required to be different from the first user configuration information, thereby improving data transmission efficiency.
在一种可能地实施方式中,用于指示终端设备的配置信息需受到安全保护的指示信息包括以下内容中的至少一项:In a possible implementation manner, the indication information used to indicate that the configuration information of the terminal device needs to be protected by security includes at least one of the following contents:
网络设备接收到的第三指示信息,第三指示信息用于指示终端设备的配置信息需受到安全保护;网络设备接收到的接入层安全模式命令完成消息,接入层安全模式命令完成消息用于指示接入层安全保护激活;预设的网络设备的配置信息;用于指示待发送的信息的信息类型与预设的需受到安全保护的信息类型匹配的信息;或,终端设备的能力信息,网络设备的能力信息。如此,可以提高方案的灵活性。The third instruction information received by the network device, the third instruction information is used to indicate that the configuration information of the terminal device needs to be protected; the access layer security mode command completion message received by the network device, the access layer security mode command completion message is used It is used to indicate the activation of security protection at the access layer; the configuration information of the preset network equipment; the information used to indicate that the information type of the information to be sent matches the preset information type that needs to be protected by security; or, the capability information of the terminal equipment , the capability information of the network device. In this way, the flexibility of the scheme can be improved.
在一种可能地实施方式中,第三指示信息包括以下内容中的至少一项:终端设备的安全等级、会话安全需求、终端设备的安全能力,或终端设备对应的核心网安全策略。如此可以根据终端设备的安全等级等信息确定是否提高终端设备的用户配置信息的安全性,从而可以提供个性化定制,比如可以为不同安全等级的终端设备提供不同的信息保护策略。In a possible implementation manner, the third indication information includes at least one of the following contents: a security level of the terminal device, a session security requirement, a security capability of the terminal device, or a core network security policy corresponding to the terminal device. In this way, it can be determined whether to improve the security of the user configuration information of the terminal device according to information such as the security level of the terminal device, so that personalized customization can be provided, for example, different information protection policies can be provided for terminal devices with different security levels.
在一种可能地实施方式中,预设的需受到安全保护的信息类型包括以下内容中的至少一项:需受安全保护的媒体访问控制层信息;需受安全保护的无线链路控制层信息;或,需受安全保护的物理层信息。如此,由于底层信息不受完整性和机密性安全保护,因此可以通过本申请提供的方案对底层信息进行保护,从而可以提高信息安全性,降低信息泄露的可能性。In a possible implementation manner, the preset information types that need to be protected by security include at least one of the following: media access control layer information that needs to be protected by security; information that needs to be protected by radio link control layer ; or, Physical layer information to be protected by security. In this way, since the underlying information is not protected by integrity and confidentiality security, the underlying information can be protected through the solution provided by this application, thereby improving information security and reducing the possibility of information leakage.
第二方面,本申请提供一种通信方法,方法还包括:网络设备向终端设备发送第三消息,第三消息包括第一指示信息,第一指示信息用于指示终端设备对应的第一对应关系,第一对应关系为信息类型标识与索引值的对应关系。网络设备向终端设备发送第四消息,第四消息包括:第四消息对应的信息类型标识在第一对应关系中对应的索引值。由于第四消息中不再承载信息类型标识,而是承载信息类型标识对应的索引值,因此攻击者获取到第四消息之后,可以提高破解难度,可能无法得到正确的信息类型标识,从而可以进一步提高数据传输的安全性。In a second aspect, the present application provides a communication method, the method further includes: the network device sends a third message to the terminal device, the third message includes first indication information, and the first indication information is used to indicate the first corresponding relationship of the terminal device , the first correspondence is the correspondence between the information type identifier and the index value. The network device sends a fourth message to the terminal device, where the fourth message includes: an index value corresponding to the information type identifier corresponding to the fourth message in the first correspondence relationship. Since the fourth message no longer carries the information type identifier, but the index value corresponding to the information type identifier, after the attacker obtains the fourth message, it can increase the difficulty of cracking, and may not be able to obtain the correct information type identifier, so that further Improve the security of data transmission.
在一种可能地实施方式中,信息类型标识包括逻辑信道标识。如此可以提高攻击者获取逻辑信道标识的难度,从而可以提高信息传输的安全性。In a possible implementation manner, the information type identifier includes a logical channel identifier. This can increase the difficulty for an attacker to obtain the logical channel identifier, thereby improving the security of information transmission.
在一种可能地实施方式中,第一指示信息包括以下内容中的至少一项:第一对应关系;如此,终端设可以不必再重新计算第一对应关系,从而可以降低终端设备的计算量。In a possible implementation manner, the first indication information includes at least one of the following contents: the first corresponding relationship; in this way, the terminal device does not need to recalculate the first corresponding relationship, so that the calculation amount of the terminal device can be reduced.
在一种可能地实施方式中,用于生成第一对应关系的预设规则;如此,可以降低网络设备需传输的数据量。In a possible implementation manner, the preset rule is used to generate the first correspondence; in this way, the amount of data to be transmitted by the network device can be reduced.
在一种可能地实施方式中,用于生成第一对应关系的预设计算公式。如此,可以降低网络设备需传输的数据量。且也可以提高方案的灵活性。In a possible implementation manner, a preset calculation formula used to generate the first correspondence relationship. In this way, the amount of data to be transmitted by the network device can be reduced. And it can also improve the flexibility of the scheme.
在一种可能地实施方式中,第一对应关系中的索引值可以通过以下内容中的一项得到:通过随机化算法计算得到;根据预设规则得到;根据信息类型标识和预设的第一计算公式计算得到;或者,根据预设值和预设的第二计算公式计算得到的。如此,可以提高方案的灵活性。In a possible implementation manner, the index value in the first correspondence can be obtained through one of the following: calculated by a randomization algorithm; obtained according to a preset rule; according to the information type identifier and the preset first calculated by a calculation formula; or calculated according to a preset value and a preset second calculation formula. In this way, the flexibility of the scheme can be improved.
在一种可能地实施方式中,第一对应关系包括第一信息类型标识与第一索引值的对应关系,第二对应关系包括第一信息类型标识与第二索引值的对应关系。第一索引值和第一索引值不同。其中,第二对应关系为除终端设备之外的一个其他终端设备对应的信息类型标识与索引值的对应关系;或者,第一对应关系为终端设备的第一承载对应的对应关系,第二对应关系为第一终端设备的第二承载对应的信息类型标识与索引值的对应关系。也就是说,信息类型标识和索引值之间的对应关系可以是终端设备粒度的,也可以是承载粒度的,可以灵活设置,且相比所有终端设备均使用一套对应关系,该实施方式可以进一步提高安全性。In a possible implementation manner, the first correspondence includes a correspondence between a first information type identifier and a first index value, and the second correspondence includes a correspondence between the first information type identifier and a second index value. The first index value and the first index value are different. Wherein, the second correspondence is the correspondence between an information type identifier and an index value corresponding to a terminal equipment other than the terminal equipment; or, the first correspondence is the correspondence corresponding to the first bearer of the terminal equipment, and the second correspondence The relationship is the correspondence between the information type identifier corresponding to the second bearer of the first terminal device and the index value. That is to say, the correspondence between the information type identifier and the index value can be at the granularity of the terminal device or at the granularity of the bearer, and can be set flexibly. Compared with using a set of correspondence for all terminal devices, this embodiment can Further improve security.
在一种可能地实施方式中,第三消息受到安全保护。如此,第一对应关系可以得到保护,攻击者不易得到第一对应关系,因此可以提高数据传输的安全性。第三消息为无线资源控制层消息,如此,可以更好的与现有技术兼容。In a possible implementation manner, the third message is protected by security. In this way, the first corresponding relationship can be protected, and it is difficult for an attacker to obtain the first corresponding relationship, so the security of data transmission can be improved. The third message is a radio resource control layer message, so it can be better compatible with the existing technology.
在一种可能地实施方式中,第四消息为媒体访问控制层消息、无线链路控制层消息;或,物理层消息。第四消息未受到安全保护。如此,通过无线资源控制层接收的信息可以用于实现对媒体访问控制层、无线链路控制层,或,物理层中的至少一项的信息的保护,从而可以提高底层信息的安全性。且由于媒体访问控制层、无线链路控制层,或,物理层中的至少一项消息传输可能并未受到安全保护,因此由于通过受到安全保护的第二用户配置信息来传输媒体访问控制层、无线链路控制层或物理层中的至少一项的消息,可以提高此类底层消息中的信息的安全性。In a possible implementation manner, the fourth message is a medium access control layer message, a radio link control layer message; or a physical layer message. The fourth message is not secured. In this way, the information received by the radio resource control layer can be used to protect the information of at least one of the medium access control layer, the radio link control layer, or the physical layer, thereby improving the security of the underlying information. And because at least one message transmission in the media access control layer, the radio link control layer, or the physical layer may not be protected by security, because the media access control layer, radio link control layer, or A message of at least one of the radio link control layer or the physical layer can improve the security of information in such underlying messages.
在一种可能地实施方式中,第四消息为:媒体访问控制控制元素的消息。如此,可以更好的保护媒体访问控制控制元素消息,提高媒体访问控制控制元素消息的安全性。In a possible implementation manner, the fourth message is: a message of a media access control control element. In this way, the media access control control element message can be better protected, and the security of the media access control control element message can be improved.
在一种可能地实施方式中,第四消息为辅小区激活消息,第四消息用于请求激活辅小 区。如此,可以提高辅小区激活消息的安全性。In a possible implementation manner, the fourth message is a secondary cell activation message, and the fourth message is used to request activation of the secondary cell. In this way, the security of the secondary cell activation message can be improved.
在一种可能地实施方式中,网络设备向终端设备发送第四消息,包括:网络设备根据用于指示终端设备的配置信息需受到安全保护的指示信息,向终端设备发送第四消息。如此,可以根据是否获取用于指示终端设备的配置信息需受到安全保护的指示信息,灵活的选择是否对信息进行进一步的保护,从而可以提高方案的灵活性。In a possible implementation manner, the network device sending the fourth message to the terminal device includes: the network device sending the fourth message to the terminal device according to indication information used to indicate that configuration information of the terminal device needs to be protected by security. In this way, it is possible to flexibly choose whether to further protect the information according to whether to obtain the indication information used to indicate that the configuration information of the terminal device needs to be protected, thereby improving the flexibility of the solution.
关于网络设备获取用于指示终端设备的配置信息需受到安全保护的指示信息的内容可以参见前述第一方面的相关介绍,在此不再赘述。Regarding the content of the indication information obtained by the network device and used to indicate that the configuration information of the terminal device needs to be protected by security, refer to the related introduction of the foregoing first aspect, and details will not be repeated here.
第三方面,本申请提供一种通信方法,方法还包括:网络设备向终端设备发送第三消息。第三消息包括第二指示信息。第二指示信息用于指示第三对应关系,第三对应关系包括终端设备的N1个辅小区的小区标识与小区索引号之间的对应关系。N1为正整数;其中,第三对应关系是根据N0个小区得到的,N0个小区包括N1个辅小区和预设的N2个干扰小区,N2为正整数,N0为N1和N2的和。网络设备向终端设备发送第四消息,第四消息包括第一字段,第一字段承载:N0个小区的小区索引号对应的激活指示信息,N0个小区中小区的小区索引号对应的激活指示信息用于指示小区激活或未激活。由于根据干扰小区和辅小区一起给小区生成索引号,且在第一字段加入了干扰小区的激活指示信息,从而可以使攻击者很难从第一字段的信息中获取正确的激活小区的信息,从而提高攻击者获取隐私信息的难度。In a third aspect, the present application provides a communication method, and the method further includes: a network device sending a third message to a terminal device. The third message includes the second indication information. The second indication information is used to indicate a third correspondence, and the third correspondence includes correspondences between cell identities and cell index numbers of the N1 secondary cells of the terminal device. N1 is a positive integer; wherein, the third correspondence is obtained based on N0 cells, N0 cells include N1 secondary cells and preset N2 interfering cells, N2 is a positive integer, and N0 is the sum of N1 and N2. The network device sends a fourth message to the terminal device, the fourth message includes a first field, and the first field carries: activation indication information corresponding to cell index numbers of N0 cells, activation indication information corresponding to cell index numbers of cells among the N0 cells It is used to indicate whether the cell is activated or deactivated. Since the index number is generated for the cell according to the interfering cell and the secondary cell, and the activation indication information of the interfering cell is added to the first field, it is difficult for the attacker to obtain the correct activation cell information from the information in the first field. This increases the difficulty for attackers to obtain private information.
在一种可能地实施方式中,第三对应关系中还包括:N2个干扰小区中至少一个干扰小区的小区标识与小区索引号之间的对应关系。如此,可以使终端设备确定出第四消息中哪些激活指示信息对应的小区为干扰小区,从而可以丢弃该部分信息,继而得到正确的激活小区的小区索引号。In a possible implementation manner, the third correspondence further includes: a correspondence between a cell identifier of at least one interfering cell among the N2 interfering cells and a cell index number. In this way, the terminal device can determine which cells corresponding to the activation indication information in the fourth message are interfering cells, so that part of the information can be discarded, and then the correct cell index number of the activated cell can be obtained.
在一种可能地实施方式中,第三消息中还包括用于指示干扰小区的小区标识对应的小区为干扰小区的指示信息。如此,可以使终端设备明确哪些小区索引号对应的小区为干扰小区,从而为后续从第一字段中去除干扰小区对应的信息奠定基础。In a possible implementation manner, the third message further includes indication information for indicating that the cell corresponding to the cell identifier of the interfering cell is the interfering cell. In this way, the terminal device can determine which cells corresponding to the cell index numbers are interfering cells, thereby laying a foundation for subsequently removing information corresponding to the interfering cells from the first field.
在一种可能地实施方式中,针对N2个干扰小区中的至少一个干扰小区,干扰小区的小区索引号对应的激活指示信息指示干扰小区激活。如此,可以增加攻击者获取正确的激活小区的数量的难度。In a possible implementation manner, for at least one interfering cell among the N2 interfering cells, the activation indication information corresponding to the cell index number of the interfering cell indicates that the interfering cell is activated. In this way, it can increase the difficulty for an attacker to obtain the correct number of activated cells.
在一种可能地实施方式中,N0个小区中小区的小区索引号为:对N1个辅小区和N2个干扰小区进行排序得到的小区的序号;In a possible implementation manner, the cell index number of the cell in the N0 cells is: the serial number of the cell obtained by sorting the N1 secondary cells and the N2 interfering cells;
第一字段依据N0个小区中小区的序号,依序承载N0个小区对应的激活指示信息。如此,可以进一步与现有技术兼容。The first field sequentially carries the activation instruction information corresponding to the N0 cells according to the serial numbers of the cells in the N0 cells. In this way, it can be further compatible with the existing technology.
在一种可能地实施方式中,N1为大于1的整数,至少存在两个辅小区,两个辅小区的小区序号之间包括至少一个干扰小区的小区序号。如此,可以进一步增加攻击者获取正确的辅小区数量的难度。In a possible implementation manner, N1 is an integer greater than 1, there are at least two secondary cells, and the cell sequence numbers of at least one interfering cell are included between the cell sequence numbers of the two secondary cells. In this way, it can further increase the difficulty for an attacker to obtain the correct number of secondary cells.
在一种可能地实施方式中,第三对应关系为N0个小区的小区标识与小区索引号之间的对应关系,第三对应关系包括第一干扰小区的小区标识和第一小区索引号的对应关系。第四对应关系包括第一干扰小区的小区标识和第二小区索引号的对应关系。第一小区索引号和第二小区索引号不同。其中,第四对应关系为除终端设备之外的一个其他终端设备对应的其他终端设备的辅小区和预设的至少一个干扰小区的小区标识与小区索引号的对应 关系。或者,第三对应关系为终端设备的第一承载对应的对应关系,第四对应关系为第一终端设备的第二承载对应的至少一个辅小区和预设的至少一个干扰小区的小区标识与小区索引号的对应关系。也就是说,小区标识和小区索引号之间的对应关系可以是终端设备粒度的,也可以是承载粒度的,可以灵活设置,且相比所有终端设备均使用一套对应关系,该实施方式可以进一步提高安全性。In a possible implementation manner, the third correspondence is the correspondence between the cell IDs of the N0 cells and the cell index numbers, and the third correspondence includes the correspondence between the cell IDs of the first interfering cell and the first cell index numbers relation. The fourth correspondence includes the correspondence between the cell identifier of the first interfering cell and the index number of the second cell. The first cell index number and the second cell index number are different. Wherein, the fourth correspondence is the correspondence between the secondary cell of the terminal equipment other than the terminal equipment and the preset cell identifier and cell index number of at least one interfering cell. Alternatively, the third correspondence is the correspondence corresponding to the first bearer of the terminal device, and the fourth correspondence is the cell identity and cell identity of at least one secondary cell corresponding to the second bearer of the first terminal device and at least one preset interfering cell Correspondence between index numbers. That is to say, the correspondence between the cell ID and the cell index number can be at the granularity of the terminal device or at the granularity of the bearer, and can be flexibly set. Compared with using a set of correspondence for all terminal devices, this embodiment can Further improve security.
在一种可能地实施方式中,第三消息受到安全保护。如此,第一对应关系可以得到保护,攻击者不易得到第一对应关系,因此可以提高数据传输的安全性。第三消息为无线资源控制层消息,如此,可以更好的与现有技术兼容。In a possible implementation manner, the third message is protected by security. In this way, the first corresponding relationship can be protected, and it is difficult for an attacker to obtain the first corresponding relationship, so the security of data transmission can be improved. The third message is a radio resource control layer message, so it can be better compatible with the existing technology.
在一种可能地实施方式中,第四消息为媒体访问控制层消息、无线链路控制层消息,或物理层消息。第四消息未受到安全保护。如此,通过无线资源控制层接收的信息可以用于实现对媒体访问控制层、无线链路控制层,或,物理层中的至少一项的信息的保护,从而可以提高底层信息的安全性。且由于媒体访问控制层、无线链路控制层,或,物理层中的至少一项消息传输可能并未受到安全保护,因此由于通过受到安全保护的第二用户配置信息来传输媒体访问控制层、无线链路控制层或物理层中的至少一项的消息,可以提高此类底层消息中的信息的安全性。In a possible implementation manner, the fourth message is a medium access control layer message, a radio link control layer message, or a physical layer message. The fourth message is not secured. In this way, the information received by the radio resource control layer can be used to protect the information of at least one of the medium access control layer, the radio link control layer, or the physical layer, thereby improving the security of the underlying information. And because at least one message transmission in the media access control layer, the radio link control layer, or the physical layer may not be protected by security, because the media access control layer, radio link control layer, or A message of at least one of the radio link control layer or the physical layer can improve the security of information in such underlying messages.
在一种可能地实施方式中,第四消息为:媒体访问控制控制元素的消息。如此,可以更好的保护媒体访问控制控制元素消息,提高媒体访问控制控制元素消息的安全性。In a possible implementation manner, the fourth message is: a message of a media access control control element. In this way, the media access control control element message can be better protected, and the security of the media access control control element message can be improved.
在一种可能地实施方式中,第四消息为辅小区激活消息,第四消息用于请求激活辅小区。如此,可以提高辅小区激活消息的安全性。In a possible implementation manner, the fourth message is a secondary cell activation message, and the fourth message is used to request activation of the secondary cell. In this way, the security of the secondary cell activation message can be improved.
在一种可能地实施方式中,网络设备向终端设备发送第四消息,包括:网络设备根据用于指示终端设备的配置信息需受到安全保护的指示信息,向终端设备发送第四消息。如此,可以根据是否获取用于指示终端设备的配置信息需受到安全保护的指示信息,灵活的选择是否对信息进行进一步的保护,从而可以提高方案的灵活性。In a possible implementation manner, the network device sending the fourth message to the terminal device includes: the network device sending the fourth message to the terminal device according to indication information used to indicate that configuration information of the terminal device needs to be protected by security. In this way, it is possible to flexibly choose whether to further protect the information according to whether to obtain the indication information used to indicate that the configuration information of the terminal device needs to be protected, thereby improving the flexibility of the solution.
关于网络设备获取用于指示终端设备的配置信息需受到安全保护的指示信息的内容可以参见前述第一方面的相关介绍,在此不再赘述。Regarding the content of the indication information obtained by the network device and used to indicate that the configuration information of the terminal device needs to be protected by security, refer to the related introduction of the foregoing first aspect, and details will not be repeated here.
关于网络设备获取用于指示终端设备的配置信息需受到安全保护的指示信息的内容可以参见前述第一方面的相关介绍,在此不再赘述。Regarding the content of the indication information obtained by the network device and used to indicate that the configuration information of the terminal device needs to be protected by security, refer to the related introduction of the foregoing first aspect, and details will not be repeated here.
第四方面,本申请提供一种通信方法,该方法包括终端设备接收来自网络设备的第一消息,第一消息未受到安全保护,第一消息包括终端设备的第一用户配置信息。终端设备接收来自网络设备的第二消息,第二消息受到安全保护,第二消息包括终端设备的第二用户配置信息,第二用户配置信息与第一用户配置信息不同。终端设备根据第二用户配置信息进行数据传输。由于第一消息未受安全保护,因此第一用户配置信息容易被攻击者拿到,由于通过受安全保护的第二消息传输的第二用户配置信息与第一用户配置信息不同,因此攻击者不容易从受安全保护的第二消息中获取第二用户配置信息,从而可以提高数据传输的安全性。In a fourth aspect, the present application provides a communication method, the method includes a terminal device receiving a first message from a network device, the first message is not protected by security, and the first message includes first user configuration information of the terminal device. The terminal device receives the second message from the network device, the second message is protected by security, the second message includes second user configuration information of the terminal device, and the second user configuration information is different from the first user configuration information. The terminal device performs data transmission according to the configuration information of the second user. Since the first message is not protected by security, the first user configuration information is easily obtained by an attacker, and since the second user configuration information transmitted through the second message protected by security is different from the first user configuration information, the attacker cannot It is easy to obtain the configuration information of the second user from the second message protected by security, so that the security of data transmission can be improved.
在一种可能地实施方式中,第一用户配置信息包括第一下行控制信息;第二用户配置信息包括第二下行控制信息。如此,可以降低下行控制信息泄露的风险,从而进一步调高数据安全性。In a possible implementation manner, the first user configuration information includes first downlink control information; the second user configuration information includes second downlink control information. In this way, the risk of downlink control information leakage can be reduced, thereby further improving data security.
在一种可能地实施方式中,第一用户配置信息或第二用户配置信息中的至少一项包括 以下内容中的至少一项:扰码标识;部分带宽;物理下行控制信道的起始符号的位置;物理下行控制信道的起始符号的个数;下行控制信息长度;候选集;或,物理下行共享信道的时域表。如此,可以提高对下行控制信息中的物理层参数的保密程度,从而可以降低其泄露可能性。In a possible implementation manner, at least one item of the first user configuration information or the second user configuration information includes at least one of the following contents: a scrambling code identifier; a partial bandwidth; The position; the number of start symbols of the physical downlink control channel; the length of the downlink control information; the candidate set; or, the time domain table of the physical downlink shared channel. In this way, the confidentiality of the physical layer parameters in the downlink control information can be improved, thereby reducing the possibility of leakage.
在一种可能地实施方式中,第一消息为无线资源控制建立响应消息;第二消息为无线资源控制配置消息或无线资源控制重配置消息。如此,可以进一步与现有技术兼容。In a possible implementation manner, the first message is a radio resource control establishment response message; the second message is a radio resource control configuration message or a radio resource control reconfiguration message. In this way, it can be further compatible with the existing technology.
在一种可能地实施方式中,第二用户配置信息用于辅助媒体访问控制层、无线链路控制层,或,物理层中的至少一项的消息传输。如此,通过无线资源控制层接收的信息可以用于实现对媒体访问控制层、无线链路控制层,或,物理层中的至少一项的信息的保护,从而可以提高底层信息的安全性。且由于媒体访问控制层、无线链路控制层,或,物理层中的至少一项消息传输可能并未受到安全保护,因此由于通过受到安全保护的第二用户配置信息来传输媒体访问控制层、无线链路控制层或物理层中的至少一项的消息,可以提高此类底层消息中的信息的安全性。In a possible implementation manner, the second user configuration information is used to assist message transmission of at least one of a medium access control layer, a radio link control layer, or a physical layer. In this way, the information received by the radio resource control layer can be used to protect the information of at least one of the medium access control layer, the radio link control layer, or the physical layer, thereby improving the security of the underlying information. And because at least one message transmission in the media access control layer, the radio link control layer, or the physical layer may not be protected by security, because the media access control layer, radio link control layer, or A message of at least one of the radio link control layer or the physical layer can improve the security of information in such underlying messages.
在一种可能地实施方式中,终端设备根据第二用户配置信息进行数据传输,包括:终端设备根据第二消息中的第二用户配置信息传输物理层、媒体访问控制层或无线链路控制层中的至少一项的消息。如此,通过无线资源控制层接收的信息可以用于实现对媒体访问控制层、无线链路控制层,或,物理层中的至少一项的信息的保护,从而可以提高底层信息的安全性。In a possible implementation manner, the terminal device performs data transmission according to the second user configuration information, including: the terminal device transmits the physical layer, media access control layer or radio link control layer according to the second user configuration information in the second message at least one of the messages. In this way, the information received by the radio resource control layer can be used to protect the information of at least one of the medium access control layer, the radio link control layer, or the physical layer, thereby improving the security of the underlying information.
关于第一消息和第二消息等内容以及有益效果可以参见前述第一方面的相关介绍,在此不再赘述。For the content and beneficial effects of the first message and the second message, please refer to the relevant introduction of the first aspect above, and details are not repeated here.
第五方面,本申请提供一种通信方法,方法还包括:终端设备接收来自网络设备的第三消息,第三消息包括第一指示信息,第一指示信息用于指示终端设备对应的第一对应关系,第一对应关系为信息类型标识与索引值的对应关系。终端设备接收来自网络设备的向终端设备发送第四消息,第四消息包括:第四消息对应的信息类型标识在第一对应关系中对应的索引值。终端设备根据第一指示信息,确定出第四消息中的索引值对应的信息类型标识。由于第四消息中不再承载信息类型标识,而是承载信息类型标识对应的索引值,因此攻击者获取到第四消息之后,可以提高破解难度,可能无法得到正确的信息类型标识,从而可以进一步提高数据传输的安全性。In a fifth aspect, the present application provides a communication method, the method further includes: the terminal device receives a third message from the network device, the third message includes first indication information, and the first indication information is used to indicate the first correspondence corresponding to the terminal device. relationship, the first corresponding relationship is the corresponding relationship between the information type identifier and the index value. The terminal device receives a fourth message sent from the network device to the terminal device, where the fourth message includes: an index value corresponding to the information type identifier corresponding to the fourth message in the first correspondence. The terminal device determines the information type identifier corresponding to the index value in the fourth message according to the first indication information. Since the fourth message no longer carries the information type identifier, but the index value corresponding to the information type identifier, after the attacker obtains the fourth message, it can increase the difficulty of cracking, and may not be able to obtain the correct information type identifier, so that further Improve the security of data transmission.
在一种可能地实施方式中,信息类型标识包括:逻辑信道标识。如此可以提高攻击者获取逻辑信道标识的难度,从而可以提高信息传输的安全性。In a possible implementation manner, the information type identifier includes: a logical channel identifier. This can increase the difficulty for an attacker to obtain the logical channel identifier, thereby improving the security of information transmission.
在一种可能地实施方式中,第一指示信息包括:第一对应关系;如此,终端设可以不必再重新计算第一对应关系,从而可以降低终端设备的计算量。In a possible implementation manner, the first indication information includes: the first corresponding relationship; in this way, the terminal device does not need to recalculate the first corresponding relationship, so that the calculation amount of the terminal device can be reduced.
在一种可能地实施方式中,第一指示信息包括:第一对应关系;用于生成第一对应关系的预设规则;如此,可以降低网络设备需传输的数据量。In a possible implementation manner, the first indication information includes: a first corresponding relationship; a preset rule for generating the first corresponding relationship; in this way, the amount of data to be transmitted by the network device can be reduced.
在一种可能地实施方式中,第一指示信息包括:第一对应关系;用于生成第一对应关系的预设计算公式。如此,可以降低网络设备需传输的数据量。且也可以提高方案的灵活性。In a possible implementation manner, the first indication information includes: a first corresponding relationship; and a preset calculation formula used to generate the first corresponding relationship. In this way, the amount of data to be transmitted by the network device can be reduced. And it can also improve the flexibility of the scheme.
在一种可能地实施方式中,第一对应关系中的索引值可以通过以下内容中的一项得到:通过随机化算法计算得到;根据预设规则得到;根据信息类型标识和预设的第一计算公式 计算得到;或者,根据预设值和预设的第二计算公式计算得到的。如此,可以提高方案的灵活性。In a possible implementation manner, the index value in the first correspondence can be obtained through one of the following: calculated by a randomization algorithm; obtained according to a preset rule; according to the information type identifier and the preset first calculated by a calculation formula; or calculated according to a preset value and a preset second calculation formula. In this way, the flexibility of the scheme can be improved.
在一种可能地实施方式中,第一对应关系包括第一信息类型标识与第一索引值的对应关系,第二对应关系包括第一信息类型标识与第二索引值的对应关系.第一索引值和第一索引值不同。其中,第二对应关系为除终端设备之外的一个其他终端设备对应的信息类型标识与索引值的对应关系。或者,第一对应关系为终端设备的第一承载对应的对应关系,第二对应关系为第一终端设备的第二承载对应的信息类型标识与索引值的对应关系。也就是说,信息类型标识和索引值之间的对应关系可以是终端设备粒度的,也可以是承载粒度的,可以灵活设置,且相比所有终端设备均使用一套对应关系,该实施方式可以进一步提高安全性。In a possible implementation manner, the first correspondence includes the correspondence between the first information type identifier and the first index value, and the second correspondence includes the correspondence between the first information type identifier and the second index value. The first index value is different from the first index value. Wherein, the second correspondence is a correspondence between an information type identifier and an index value corresponding to a terminal device other than the terminal device. Alternatively, the first correspondence is the correspondence corresponding to the first bearer of the terminal device, and the second correspondence is the correspondence between the information type identifier and the index value corresponding to the second bearer of the first terminal device. That is to say, the correspondence between the information type identifier and the index value can be at the granularity of the terminal device or at the granularity of the bearer, and can be set flexibly. Compared with using a set of correspondence for all terminal devices, this embodiment can Further improve security.
在一种可能地实施方式中,第三消息受到安全保护。如此,第一对应关系可以得到保护,攻击者不易得到第一对应关系,因此可以提高数据传输的安全性。In a possible implementation manner, the third message is protected by security. In this way, the first corresponding relationship can be protected, and it is difficult for an attacker to obtain the first corresponding relationship, so the security of data transmission can be improved.
在一种可能地实施方式中,第三消息为无线资源控制层消息,如此,可以更好的与现有技术兼容。In a possible implementation manner, the third message is a radio resource control layer message, so that it can be better compatible with the existing technology.
在一种可能地实施方式中,第四消息为媒体访问控制层消息、无线链路控制层消息,或物理层消息。第四消息未受到安全保护。如此,通过无线资源控制层接收的信息可以用于实现对媒体访问控制层、无线链路控制层,或,物理层中的至少一项的信息的保护,从而可以提高底层信息的安全性。且由于媒体访问控制层、无线链路控制层,或,物理层中的至少一项消息传输可能并未受到安全保护,因此由于通过受到安全保护的第二用户配置信息来传输媒体访问控制层、无线链路控制层或物理层中的至少一项的消息,可以提高此类底层消息中的信息的安全性。In a possible implementation manner, the fourth message is a medium access control layer message, a radio link control layer message, or a physical layer message. The fourth message is not secured. In this way, the information received by the radio resource control layer can be used to protect the information of at least one of the medium access control layer, the radio link control layer, or the physical layer, thereby improving the security of the underlying information. And because at least one message transmission in the media access control layer, the radio link control layer, or the physical layer may not be protected by security, because the media access control layer, radio link control layer, or A message of at least one of the radio link control layer or the physical layer can improve the security of information in such underlying messages.
在一种可能地实施方式中,第四消息为:媒体访问控制控制元素的消息。如此,可以更好的保护媒体访问控制控制元素消息,提高媒体访问控制控制元素消息的安全性。In a possible implementation manner, the fourth message is: a message of a media access control control element. In this way, the media access control control element message can be better protected, and the security of the media access control control element message can be improved.
在一种可能地实施方式中,第四消息为辅小区激活消息,第四消息用于请求激活辅小区。如此,可以提高辅小区激活消息的安全性。In a possible implementation manner, the fourth message is a secondary cell activation message, and the fourth message is used to request activation of the secondary cell. In this way, the security of the secondary cell activation message can be improved.
关于第三消息和第四消息等内容以及有益效果可以参见前述第二方面的相关介绍,在此不再赘述。For the contents and beneficial effects of the third message and the fourth message, please refer to the relevant introduction of the second aspect above, and details will not be repeated here.
第六方面,本申请提供一种通信方法,方法还包括:终端设备接收来自网络设备的第三消息,第三消息包括第二指示信息,第二指示信息用于指示第三对应关系,第三对应关系包括终端设备的N1个辅小区的小区标识与小区索引号之间的对应关系;N1为正整数;其中,第三对应关系是根据N0个小区得到的,N0个小区包括N1个辅小区和预设的N2个干扰小区,N2为正整数,N0为N1和N2的和。终端设备接收来自网络设备的,第四消息包括第一字段,第一字段承载:N0个小区的小区索引号对应的激活指示信息,N0个小区中小区的小区索引号对应的激活指示信息用于指示小区激活或未激活。终端设备根据第二指示信息,确定N2个辅小区中激活的辅小区。由于根据干扰小区和辅小区一起给小区生成索引号,且在第一字段加入了干扰小区的激活指示信息,从而可以使攻击者很难从第一字段的信息中获取正确的激活小区的信息,从而提高攻击者获取隐私信息的难度。In a sixth aspect, the present application provides a communication method, the method further includes: the terminal device receives a third message from the network device, the third message includes second indication information, the second indication information is used to indicate the third correspondence, and the third The corresponding relationship includes the corresponding relationship between the cell identifiers of the N1 secondary cells of the terminal device and the cell index number; N1 is a positive integer; wherein, the third corresponding relationship is obtained based on N0 cells, and the N0 cells include N1 secondary cells and preset N2 interfering cells, N2 is a positive integer, and N0 is the sum of N1 and N2. The terminal device receives from the network device, the fourth message includes a first field, and the first field carries: activation indication information corresponding to the cell index numbers of N0 cells, and the activation indication information corresponding to the cell index numbers of the cells in the N0 cells is used for Indicates whether the cell is active or not. The terminal device determines the activated secondary cell among the N2 secondary cells according to the second indication information. Since the index number is generated for the cell according to the interfering cell and the secondary cell, and the activation indication information of the interfering cell is added to the first field, it is difficult for the attacker to obtain the correct activation cell information from the information in the first field. This increases the difficulty for attackers to obtain private information.
在一种可能地实施方式中,第三对应关系中还包括:N2个干扰小区中至少一个干扰小区的小区标识与小区索引号之间的对应关系。如此,可以使终端设备确定出第四消息中哪 些激活指示信息对应的小区为干扰小区,从而可以丢弃该部分信息,继而得到正确的激活小区的小区索引号。In a possible implementation manner, the third correspondence further includes: a correspondence between a cell identifier of at least one interfering cell among the N2 interfering cells and a cell index number. In this way, the terminal device can determine which cells corresponding to the activation indication information in the fourth message are interfering cells, so that this part of information can be discarded, and then the correct cell index number of the activated cell can be obtained.
在一种可能地实施方式中,第三消息中还包括用于指示干扰小区的小区标识对应的小区为干扰小区的指示信息。如此,可以使终端设备明确哪些小区索引号对应的小区为干扰小区,从而为后续从第一字段中去除干扰小区对应的信息奠定基础。In a possible implementation manner, the third message further includes indication information for indicating that the cell corresponding to the cell identifier of the interfering cell is the interfering cell. In this way, the terminal device can determine which cells corresponding to the cell index numbers are interfering cells, thereby laying a foundation for subsequently removing information corresponding to the interfering cells from the first field.
在一种可能地实施方式中,针对N2个干扰小区中的至少一个干扰小区,干扰小区的小区索引号对应的激活指示信息指示干扰小区激活。如此,可以增加攻击者获取正确的激活小区的数量的难度。In a possible implementation manner, for at least one interfering cell among the N2 interfering cells, the activation indication information corresponding to the cell index number of the interfering cell indicates that the interfering cell is activated. In this way, it can increase the difficulty for an attacker to obtain the correct number of activated cells.
在一种可能地实施方式中,N0个小区中小区的小区索引号为:对N1个辅小区和N2个干扰小区进行排序得到的小区的序号。第一字段依据N0个小区中小区的序号,依序承载N0个小区对应的激活指示信息。如此,可以进一步与现有技术兼容。In a possible implementation manner, the cell index number of the cell in the N0 cells is: the serial number of the cell obtained by sorting the N1 secondary cells and the N2 interfering cells. The first field sequentially carries the activation instruction information corresponding to the N0 cells according to the serial numbers of the cells in the N0 cells. In this way, it can be further compatible with the existing technology.
在一种可能地实施方式中,N1为大于1的整数,至少存在两个辅小区,两个辅小区的小区序号之间包括至少一个干扰小区的小区序号。如此,可以进一步增加攻击者获取正确的辅小区数量的难度。In a possible implementation manner, N1 is an integer greater than 1, there are at least two secondary cells, and the cell sequence numbers of at least one interfering cell are included between the cell sequence numbers of the two secondary cells. In this way, it can further increase the difficulty for an attacker to obtain the correct number of secondary cells.
在一种可能地实施方式中,第三对应关系为N0个小区的小区标识与小区索引号之间的对应关系,第三对应关系包括第一干扰小区的小区标识和第一小区索引号的对应关系。第四对应关系包括第一干扰小区的小区标识和第二小区索引号的对应关系。第一小区索引号和第二小区索引号不同。其中,第四对应关系为除终端设备之外的一个其他终端设备对应的其他终端设备的辅小区和预设的至少一个干扰小区的小区标识与小区索引号的对应关系。或者,第三对应关系为终端设备的第一承载对应的对应关系,第四对应关系为第一终端设备的第二承载对应的至少一个辅小区和预设的至少一个干扰小区的小区标识与小区索引号的对应关系。也就是说,小区标识和小区索引号之间的对应关系可以是终端设备粒度的,也可以是承载粒度的,可以灵活设置,且相比所有终端设备均使用一套对应关系,该实施方式可以进一步提高安全性。In a possible implementation manner, the third correspondence is the correspondence between the cell IDs of the N0 cells and the cell index numbers, and the third correspondence includes the correspondence between the cell IDs of the first interfering cell and the first cell index numbers relation. The fourth correspondence includes the correspondence between the cell identifier of the first interfering cell and the index number of the second cell. The first cell index number and the second cell index number are different. Wherein, the fourth correspondence relationship is a correspondence relationship between a secondary cell of a terminal equipment other than the terminal equipment corresponding to a cell identifier and a cell index number of at least one preset interfering cell. Alternatively, the third correspondence is the correspondence corresponding to the first bearer of the terminal device, and the fourth correspondence is the cell identity and cell identity of at least one secondary cell corresponding to the second bearer of the first terminal device and at least one preset interfering cell Correspondence between index numbers. That is to say, the correspondence between the cell ID and the cell index number can be at the granularity of the terminal device or at the granularity of the bearer, and can be flexibly set. Compared with using a set of correspondence for all terminal devices, this embodiment can Further improve security.
在一种可能地实施方式中,第三消息受到安全保护。如此,第一对应关系可以得到保护,攻击者不易得到第一对应关系,因此可以提高数据传输的安全性。In a possible implementation manner, the third message is protected by security. In this way, the first corresponding relationship can be protected, and it is difficult for an attacker to obtain the first corresponding relationship, so the security of data transmission can be improved.
在一种可能地实施方式中,第三消息为无线资源控制层消息,如此,可以更好的与现有技术兼容。In a possible implementation manner, the third message is a radio resource control layer message, so that it can be better compatible with the existing technology.
在一种可能地实施方式中,第四消息为媒体访问控制层消息、无线链路控制层消息,或物理层消息。第四消息未受到安全保护。如此,通过无线资源控制层接收的信息可以用于实现对媒体访问控制层、无线链路控制层,或,物理层中的至少一项的信息的保护,从而可以提高底层信息的安全性。且由于媒体访问控制层、无线链路控制层,或,物理层中的至少一项消息传输可能并未受到安全保护,因此由于通过受到安全保护的第二用户配置信息来传输媒体访问控制层、无线链路控制层或物理层中的至少一项的消息,可以提高此类底层消息中的信息的安全性。In a possible implementation manner, the fourth message is a medium access control layer message, a radio link control layer message, or a physical layer message. The fourth message is not secured. In this way, the information received by the radio resource control layer can be used to protect the information of at least one of the medium access control layer, the radio link control layer, or the physical layer, thereby improving the security of the underlying information. And because at least one message transmission in the media access control layer, the radio link control layer, or the physical layer may not be protected by security, because the media access control layer, radio link control layer, or A message of at least one of the radio link control layer or the physical layer can improve the security of information in such underlying messages.
在一种可能地实施方式中,第四消息为:媒体访问控制控制元素的消息。如此,可以更好的保护媒体访问控制控制元素消息,提高媒体访问控制控制元素消息的安全性。In a possible implementation manner, the fourth message is: a message of a media access control control element. In this way, the media access control control element message can be better protected, and the security of the media access control control element message can be improved.
在一种可能地实施方式中,第四消息为辅小区激活消息,第四消息用于请求激活辅小区。如此,可以提高辅小区激活消息的安全性。In a possible implementation manner, the fourth message is a secondary cell activation message, and the fourth message is used to request activation of the secondary cell. In this way, the security of the secondary cell activation message can be improved.
关于第三消息和第四消息等内容以及有益效果可以参见前述第三方面的相关介绍,在 此不再赘述。For the content and beneficial effects of the third message and the fourth message, please refer to the relevant introduction of the aforementioned third aspect, and details will not be repeated here.
相应于第一方面至第六方面任一种通信方法,本申请还提供了一种通信装置。通信装置可以是以无线方式进行数据传输的任意一种发送端的设备或接收端的设备。例如,通信芯片、终端设备、或者网络设备(例如基站等)。在通信过程中,发送端的设备和接收端的设备是相对的。在某些通信过程中,通信装置可以作为上述网络设备或可用于网络设备的通信芯片;在某些通信过程中,通信装置可以作为上述终端设备或可用于终端设备的通信芯片。Corresponding to any communication method from the first aspect to the sixth aspect, the present application further provides a communication device. The communication device may be any device at the sending end or device at the receiving end that performs data transmission in a wireless manner. For example, a communication chip, a terminal device, or a network device (such as a base station, etc.). In the communication process, the device at the sending end and the device at the receiving end are relative. In some communication processes, the communication device can be used as the above-mentioned network equipment or a communication chip that can be used in network equipment; in some communication processes, the communication device can be used as the above-mentioned terminal equipment or a communication chip that can be used in terminal equipment.
第七方面,提供了一种通信装置,包括通信单元和处理单元,以执行上述第一方面至第六方面任一种通信方法中的任一种实施方式。通信单元用于执行与发送和接收相关的功能。可选地,通信单元包括接收单元和发送单元。在一种设计中,通信装置为通信芯片,通信单元可以为通信芯片的输入输出电路或者端口。In a seventh aspect, a communication device is provided, including a communication unit and a processing unit, so as to implement any implementation manner of any communication method in the first aspect to the sixth aspect. The communication unit is used to perform functions related to transmission and reception. Optionally, the communication unit includes a receiving unit and a sending unit. In one design, the communication device is a communication chip, and the communication unit may be an input-output circuit or port of the communication chip.
在另一种设计中,通信单元可以为发射器和接收器,或者通信单元为发射机和接收机。In another design, the communication unit may be a transmitter and a receiver, or the communication unit may be a transmitter and a receiver.
可选的,通信装置还包括可用于执行上述第一方面至第六方面任一种通信方法中的任一种实施方式的各个模块。Optionally, the communication device further includes various modules that can be used to implement any implementation manner of any communication method from the first aspect to the sixth aspect.
第八方面,提供了一种通信装置,该通信装置为上述终端设备或网络设备。包括处理器和存储器。可选的,还包括收发器,该存储器用于存储计算机程序或指令,该处理器用于从存储器中调用并运行该计算机程序或指令,当处理器执行存储器中的计算机程序或指令时,使得该通信装置执行上述第一方面至第六方面任一种通信方法中的任一种实施方式。In an eighth aspect, a communication device is provided, and the communication device is the above-mentioned terminal device or network device. Includes processor and memory. Optionally, a transceiver is also included, the memory is used to store computer programs or instructions, the processor is used to call and run the computer programs or instructions from the memory, and when the processor executes the computer programs or instructions in the memory, the The communication device executes any implementation manner of any communication method in the foregoing first aspect to the sixth aspect.
可选的,处理器为一个或多个,存储器为一个或多个。Optionally, there are one or more processors, and one or more memories.
可选的,存储器可以与处理器集成在一起,或者存储器与处理器分离设置。Optionally, the memory may be integrated with the processor, or the memory may be separated from the processor.
可选的,收发器中可以包括,发射机(发射器)和接收机(接收器)。Optionally, the transceiver may include a transmitter (transmitter) and a receiver (receiver).
第九方面,提供了一种通信装置,包括处理器。该处理器与存储器耦合,可用于执行第一方面至第六方面任一方面,以及第一方面至第六方面中任一种可能实现方式中的方法。可选地,该通信装置还包括存储器。可选地,该通信装置还包括通信接口,处理器与通信接口耦合。In a ninth aspect, a communication device is provided, including a processor. The processor is coupled with the memory, and may be used to execute any one of the first aspect to the sixth aspect, and the method in any possible implementation manner of the first aspect to the sixth aspect. Optionally, the communication device further includes a memory. Optionally, the communication device further includes a communication interface, and the processor is coupled to the communication interface.
在一种实现方式中,该通信装置为终端设备。当该通信装置为终端设备时,通信接口可以是收发器,或,输入/输出接口。可选地,收发器可以为收发电路。可选地,输入/输出接口可以为输入/输出电路。In an implementation manner, the communication device is a terminal device. When the communication device is a terminal device, the communication interface may be a transceiver, or an input/output interface. Optionally, the transceiver may be a transceiver circuit. Optionally, the input/output interface may be an input/output circuit.
在另一种实现方式中,该通信装置为网络设备。当该通信装置为网络设备时,通信接口可以是收发器,或,输入/输出接口。可选地,收发器可以为收发电路。可选地,输入/输出接口可以为输入/输出电路。In another implementation manner, the communication device is a network device. When the communication device is a network device, the communication interface may be a transceiver, or an input/output interface. Optionally, the transceiver may be a transceiver circuit. Optionally, the input/output interface may be an input/output circuit.
在又一种实现方式中,该通信装置为芯片或芯片系统。当该通信装置为芯片或芯片系统时,通信接口可以是该芯片或芯片系统上的输入/输出接口、接口电路、输出电路、输入电路、管脚或相关电路等。处理器也可以体现为处理电路或逻辑电路。In yet another implementation manner, the communication device is a chip or a chip system. When the communication device is a chip or a chip system, the communication interface may be an input/output interface, an interface circuit, an output circuit, an input circuit, pins or related circuits on the chip or the chip system. A processor may also be embodied as processing circuitry or logic circuitry.
第十方面,提供了一种系统,系统包括上述终端设备和网络设备。In a tenth aspect, a system is provided, and the system includes the above-mentioned terminal device and network device.
第十一方面,提供了一种计算机程序产品,计算机程序产品包括:计算机程序(也可以称为代码,或指令),当计算机程序被运行时,使得计算机执行上述第一方面中任一种可能实现方式中的方法,或者使得计算机执行上述第一方面至第六方面任一种实现方式中的方法。In an eleventh aspect, a computer program product is provided, and the computer program product includes: a computer program (also referred to as code, or an instruction), when the computer program is executed, the computer executes any possible The method in the implementation manner, or causing the computer to execute the method in any one of the implementation manners from the first aspect to the sixth aspect above.
第十二方面,提供了一种计算机可读存储介质,计算机可读介质存储有计算机程序(也可以称为代码,或指令)当其在计算机上运行时,使得计算机执行上述第一方面中任一种可能实现方式中的方法,或者使得计算机执行上述第一方面至第六方面任一种实现方式中的方法。In a twelfth aspect, a computer-readable storage medium is provided, and the computer-readable medium stores a computer program (also referred to as code, or an instruction) which, when running on a computer, enables the computer to perform any of the above-mentioned first aspects. A method in a possible implementation manner, or causing a computer to execute the method in any one of the implementation manners from the first aspect to the sixth aspect above.
第十三方面,提供了一种芯片系统,该芯片系统可以包括处理器。该处理器与存储器耦合,可用于执行第一方面至第六方面中任一方面,以及第一方面至第六方面中任一方面中任一种可能实现方式中的方法。可选地,该芯片系统还包括存储器。存储器,用于存储计算机程序(也可以称为代码,或指令)。处理器,用于从存储器调用并运行计算机程序,使得安装有芯片系统的设备执行第一方面至第六方面中任一方面,以及第一方面至第六方面中任一方面中任一种可能实现方式中的方法。In a thirteenth aspect, a chip system is provided, and the chip system may include a processor. The processor is coupled with the memory, and may be used to execute any one of the first aspect to the sixth aspect, and the method in any possible implementation manner of any one of the first aspect to the sixth aspect. Optionally, the chip system further includes a memory. Memory, used to store computer programs (also called code, or instructions). A processor, configured to call and run a computer program from a memory, so that the device installed with the system-on-a-chip executes any one of the first to sixth aspects, and any possible one of any one of the first to sixth aspects method in the implementation.
第十四方面,提供了一种处理装置,包括:输入电路、输出电路和处理电路。处理电路用于通过输入电路接收信号,并通过输出电路发射信号,使得第一方面至第六方面任一方面,以及第一方面至第六方面中任一种可能实现方式中的方法被实现。In a fourteenth aspect, a processing device is provided, including: an input circuit, an output circuit, and a processing circuit. The processing circuit is used to receive signals through the input circuit and transmit signals through the output circuit, so that any one of the first aspect to the sixth aspect, and the method in any possible implementation manner of the first aspect to the sixth aspect are realized.
在具体实现过程中,上述处理装置可以为芯片,输入电路可以为输入管脚,输出电路可以为输出管脚,处理电路可以为晶体管、门电路、触发器和各种逻辑电路等。输入电路所接收的输入的信号可以是由例如但不限于接收器接收并输入的,输出电路所输出的信号可以是例如但不限于输出给发射器并由发射器发射的,且输入电路和输出电路可以是同一电路,该电路在不同的时刻分别用作输入电路和输出电路。本申请实施例对处理器及各种电路的具体实现方式不做限定。In a specific implementation process, the above-mentioned processing device may be a chip, the input circuit may be an input pin, the output circuit may be an output pin, and the processing circuit may be a transistor, a gate circuit, a flip-flop, and various logic circuits. The input signal received by the input circuit may be received and input by, for example but not limited to, the receiver, the output signal of the output circuit may be, for example but not limited to, output to the transmitter and transmitted by the transmitter, and the input circuit and the output The circuit may be the same circuit, which is used as an input circuit and an output circuit respectively at different times. The embodiment of the present application does not limit the specific implementation manners of the processor and various circuits.
附图说明Description of drawings
图1为基于服务化架构的5G网络架构示意图;Figure 1 is a schematic diagram of a 5G network architecture based on a service architecture;
图2为基于点对点接口的5G网络架构示意图;Figure 2 is a schematic diagram of a 5G network architecture based on a point-to-point interface;
图3a为5G通信系统下控制面协议栈的结构示意图;Figure 3a is a schematic structural diagram of a control plane protocol stack under a 5G communication system;
图3b为5G通信系统下用户面协议栈的结构示意图;Figure 3b is a schematic structural diagram of a user plane protocol stack in a 5G communication system;
图4为本申请实施例提供的一种通信设备的结构示意图;FIG. 4 is a schematic structural diagram of a communication device provided in an embodiment of the present application;
图5为本申请实施例提供的一种通信方法的流程示意图;FIG. 5 is a schematic flowchart of a communication method provided by an embodiment of the present application;
图6为本申请实施例提供的另一种通信方法的流程示意图;FIG. 6 is a schematic flowchart of another communication method provided by the embodiment of the present application;
图7为本申请实施例提供的另一种通信方法的流程示意图;FIG. 7 is a schematic flowchart of another communication method provided by the embodiment of the present application;
图8为本申请实施例提供的一种可能的MAC PDU的结构示意图;FIG. 8 is a schematic structural diagram of a possible MAC PDU provided by the embodiment of the present application;
图9为本申请实施例提供的另一种通信方法的流程示意图;FIG. 9 is a schematic flowchart of another communication method provided by the embodiment of the present application;
图10为本申请实施例提供的另一种通信方法的流程示意图;FIG. 10 is a schematic flowchart of another communication method provided by the embodiment of the present application;
图11为本申请实施例提供的另一种通信设备的结构示意图。FIG. 11 is a schematic structural diagram of another communication device provided by an embodiment of the present application.
具体实施方式Detailed ways
本申请适用的通信系统可以包括终端设备和网络设备,网络设备可以为接入网设备(比如下述(无线)接入网(radio access network,(R)AN)网元),或者为核心网设备、或为接入网设备内部的模块、部件或芯片,或者为核心网设备内部的模块、部件或芯片等等。本申请适用的通信系统可以为第五代(5th generation,5G)网络架构中,当然,也可以用在其他网络架构,比如全球移动通讯(Global System of Mobile communication,GSM) 系统、码分多址(Code Division Multiple Access,CDMA)系统、宽带码分多址(Wideband Code Division Multiple Access,WCDMA)系统、通用分组无线业务(General Packet Radio Service,GPRS)、长期演进(Long Term Evolution,LTE)系统、先进的长期演进(Advanced long term evolution,LTE-A)系统、通用移动通信系统(Universal Mobile Telecommunication System,UMTS)、演进的长期演进(evolved Long Term Evolution,eLTE)系统以及未来的6G等其它移动通信系统。The communication system applicable to this application may include terminal equipment and network equipment, and the network equipment may be an access network equipment (such as the following (wireless) access network (radio access network, (R) AN) network element), or a core network equipment, or a module, component or chip inside an access network device, or a module, component or chip inside a core network device, and the like. The communication system applicable to this application can be the fifth generation (5th generation, 5G) network architecture, of course, it can also be used in other network architectures, such as the Global System of Mobile communication (GSM) system, code division multiple access (Code Division Multiple Access, CDMA) system, Wideband Code Division Multiple Access (WCDMA) system, General Packet Radio Service (GPRS), Long Term Evolution (LTE) system, Advanced long term evolution (LTE-A) system, Universal Mobile Telecommunications System (UMTS), evolved Long Term Evolution (eLTE) system and future 6G and other mobile communications system.
本申请实施例中的本申请实施例中以本申请实施例应用于5G网络架构为例进行介绍,5G网络架构有多种可能的架构,图1为本申请实施例提供的一种可能的5G网络架构示意图,下面结合图1对本申请实施例适用的通信系统架构进行介绍,如图1所示,该网络架构中通常可以包括如下设备、网元和网络:In the embodiment of the application, the embodiment of the application is introduced by taking the application of the embodiment of the application to the 5G network architecture as an example. There are many possible architectures for the 5G network architecture. Figure 1 is a possible 5G network architecture provided by the embodiment of the application. A schematic diagram of the network architecture. The communication system architecture applicable to the embodiment of the present application is introduced below in conjunction with FIG. 1. As shown in FIG. 1, the network architecture generally includes the following devices, network elements, and networks:
1、终端设备。1. Terminal equipment.
图1中以终端设备为用户设备(user equipment,UE)为例进行展示。在具体实现中,本申请实施例中的终端设备,可以是用于实现无线通信功能的设备。其中,终端设备可以是5G网络或者未来演进的公共陆地移动网络(public land mobile network,PLMN)中的用户设备(user equipment,UE)、接入终端、终端单元、终端站、移动站、移动台、远方站、远程终端、移动设备、无线通信设备、终端代理或终端装置等。接入终端可以是蜂窝电话、无绳电话、会话启动协议(session initiation protocol,SIP)电话、无线本地环路(wireless local loop,WLL)站、个人数字助理(personal digital assistant,PDA)、具有无线通信功能的手持设备、计算设备或连接到无线调制解调器的其它处理设备、车载设备或可穿戴设备,虚拟现实(virtual reality,VR)终端设备、增强现实(augmented reality,AR)终端设备、工业控制(industrial control)中的无线终端、无人驾驶(self driving)中的无线终端、远程医疗(remote medical)中的无线终端、智能电网(smart grid)中的无线终端、运输安全(transportation safety)中的无线终端、智慧城市(smart city)中的无线终端、智慧家庭(smart home)中的无线终端等。终端可以是移动的,也可以是固定的。In FIG. 1, the terminal equipment is shown as an example of user equipment (user equipment, UE). In a specific implementation, the terminal device in the embodiment of the present application may be a device for implementing a wireless communication function. Wherein, the terminal equipment may be a user equipment (user equipment, UE), an access terminal, a terminal unit, a terminal station, a mobile station, or a mobile station in a 5G network or a future evolved public land mobile network (PLMN). , remote station, remote terminal, mobile device, wireless communication device, terminal agent or terminal device, etc. An access terminal may be a cellular phone, a cordless phone, a session initiation protocol (SIP) phone, a wireless local loop (WLL) station, a personal digital assistant (PDA), a Functional handheld devices, computing devices or other processing devices connected to wireless modems, vehicle-mounted devices or wearable devices, virtual reality (virtual reality, VR) terminal devices, augmented reality (augmented reality, AR) terminal devices, industrial control (industrial Wireless terminals in control, wireless terminals in self driving, wireless terminals in remote medical, wireless terminals in smart grid, wireless terminals in transportation safety Terminals, wireless terminals in smart cities, wireless terminals in smart homes, etc. Terminals can be mobile or fixed.
上述终端设备可通过运营商网络提供的接口(例如N1等)与运营商网络建立连接,使用运营商网络提供的数据和/或语音等服务。终端设备还可通过运营商网络访问DN,使用DN上部署的运营商业务,和/或第三方提供的业务。其中,上述第三方可为运营商网络和终端设备之外的服务方,可为终端设备提供他数据和/或语音等服务。其中,上述第三方的具体表现形式,具体可根据实际应用场景确定,在此不做限制。The above-mentioned terminal device can establish a connection with the operator network through an interface provided by the operator network (such as N1, etc.), and use services such as data and/or voice provided by the operator network. The terminal device can also access the DN through the operator's network, and use the operator's service deployed on the DN, and/or the service provided by a third party. Wherein, the above-mentioned third party may be a service party other than the operator's network and the terminal device, and may provide other services such as data and/or voice for the terminal device. Among them, the specific form of expression of the above-mentioned third party can be determined according to the actual application scenario, and is not limited here.
2、(无线)接入网(radio access network,(R)AN)网元:用于为特定区域的授权终端设备提供入网功能,并能够根据终端设备的级别,业务的需求等使用不同质量的传输隧道。2. (wireless) access network (radio access network, (R) AN) network element: used to provide network access functions for authorized terminal equipment in a specific area, and can use different quality network elements according to the level of terminal equipment and business requirements. transport tunnel.
(R)AN是运营商网络的子网络,是运营商网络中业务节点与终端设备之间的实施系统。终端设备要接入运营商网络,首先是经过RAN,进而可通过RAN与运营商网络的业务节点连接。本申请中的RAN设备,是一种为终端设备提供无线通信功能的设备,RAN设备也称为接入网设备。本申请中的RAN设备包括但不限于:5G中的下一代基站(g nodeB,gNB)、演进型节点B(evolved node B,eNB)、无线网络控制器(radio network controller,RNC)、节点B(node B,NB)、基站控制器(base station controller,BSC)、基站收发台(base transceiver station,BTS)、家庭基站(例如,home evolved nodeB,或home node B,HNB)、基带单元(baseBand unit,BBU)、传输点(transmitting and receiving point,TRP)、发射点(transmitting point,TP)、移动交换中心等。(R)AN is a sub-network of the operator's network, and is an implementation system between service nodes and terminal equipment in the operator's network. To access the operator's network, the terminal equipment first passes through the RAN, and then can be connected to the service node of the operator's network through the RAN. The RAN device in this application is a device that provides a wireless communication function for a terminal device, and the RAN device is also called an access network device. The RAN equipment in this application includes but is not limited to: next-generation base station (g nodeB, gNB) in 5G, evolved node B (evolved node B, eNB), radio network controller (radio network controller, RNC), node B (node B, NB), base station controller (base station controller, BSC), base transceiver station (base transceiver station, BTS), home base station (for example, home evolved nodeB, or home node B, HNB), baseband unit (baseBand unit, BBU), transmission point (transmitting and receiving point, TRP), transmission point (transmitting point, TP), mobile switching center, etc.
3、用户面网元:用于分组路由和转发以及用户面数据的服务质量(quality of service,QoS)处理等。3. User plane network element: used for packet routing and forwarding and quality of service (QoS) processing of user plane data.
如图1所示,在5G通信系统中,该用户面网元可以是用户面功能(user plane function,UPF)网元,比如可以包括中间用户面功能(intermediate user plane function,I-UPF)网元、或锚点用户面功能(PDU Session anchor user plane function,PSA-UPF)网元中的至少一项。在未来通信系统中,用户面网元仍可以是UPF网元,或者,还可以有其它的名称,本申请不做限定。As shown in Figure 1, in a 5G communication system, the user plane network element may be a user plane function (user plane function, UPF) network element, for example, may include an intermediate user plane function (intermediate user plane function, I-UPF) network element, or at least one of the anchor user plane function (PDU Session anchor user plane function, PSA-UPF) network element. In the future communication system, the user plane network element may still be a UPF network element, or may have other names, which are not limited in this application.
4、数据网络(data network,DN)网元:用于提供传输数据的网络。4. Data network (data network, DN) network element: used to provide a network for transmitting data.
如图1所示,在5G通信系统中,该数据网络可以是DN1和DN2。在未来通信系统中,数据网络仍可以是DN,或者,还可以有其它的名称,本申请不做限定。As shown in Figure 1, in a 5G communication system, the data network may be DN1 and DN2. In future communication systems, the data network may still be a DN, or may have other names, which are not limited in this application.
5、移动性管理网元:主要用于移动性管理和接入管理等,可以用于实现移动性管理网元(mobility management entity,MME)功能中除会话管理之外的其它功能,例如,合法监听以及接入授权/鉴权等功能。5. Mobility management network element: mainly used for mobility management and access management, etc., and can be used to implement functions other than session management in mobility management network element (mobility management entity, MME) functions, for example, legal functions such as monitoring and access authorization/authentication.
如图1所示,在5G通信系统中,该接入与移动性管理可以是接入与移动性管理功能(access and mobility management function,AMF)网元。在未来通信系统中,接入与移动性管理仍可以是AMF网元,或者,还可以有其它的名称,本申请不做限定。As shown in FIG. 1, in a 5G communication system, the access and mobility management may be an access and mobility management function (access and mobility management function, AMF) network element. In the future communication system, the access and mobility management may still be an AMF network element, or may have other names, which are not limited in this application.
6、会话管理网元:主要用于会话管理、终端设备的网络互连协议(internet protocol,IP)地址分配和管理、选择可管理用户平面功能、策略控制和收费功能接口的终结点以及下行数据通知等。6. Session management network element: mainly used for session management, Internet protocol (internet protocol, IP) address allocation and management of terminal equipment, selection of manageable user plane functions, policy control and charging interface endpoints and downlink data notification etc.
如图1所示,在5G通信系统中,该会话管理网元可以是会话管理功能(session management function,SMF)网元,比如可以包括中间会话管理功能(intermediate session management function,I-SMF)网元,或锚点会话管理功能(anchor session management function,A-SMF)网元中的至少一项。在未来通信系统中,会话管理网元仍可以是SMF网元,或者,还可以有其它的名称,本申请不做限定。As shown in Figure 1, in a 5G communication system, the session management network element may be a session management function (session management function, SMF) network element, for example, may include an intermediate session management function (intermediate session management function, I-SMF) network element, or at least one item in an anchor session management function (anchor session management function, A-SMF) network element. In the future communication system, the session management network element may still be an SMF network element, or may have other names, which are not limited in this application.
7、策略控制网元:用于指导网络行为的统一策略框架,为控制面功能网元(例如AMF,SMF网元等)提供策略规则信息等。7. Policy control network element: a unified policy framework for guiding network behavior, providing policy rule information, etc. for control plane functional network elements (such as AMF, SMF network elements, etc.).
如图1所示,在5G通信系统中,该策略控制网元可以是策略控制功能(policy control function,PCF)网元。在未来通信系统中,策略控制网元仍可以是PCF网元,或者,还可以有其它的名称,本申请不做限定。As shown in FIG. 1, in a 5G communication system, the policy control network element may be a policy control function (policy control function, PCF) network element. In the future communication system, the policy control network element may still be a PCF network element, or may have other names, which are not limited in this application.
8、认证服务网元:用于鉴权服务、产生密钥实现对终端设备的双向鉴权,支持统一的鉴权框架。8. Authentication service network element: used for authentication services, generating keys to realize two-way authentication of terminal equipment, and supporting a unified authentication framework.
如图1所示,在5G通信系统中,该认证服务网元可以是认证服务功能(authentication server function,AUSF)网元。在未来通信系统中,认证服务功能网元仍可以是AUSF网元,或者,还可以有其它的名称,本申请不做限定。As shown in FIG. 1, in a 5G communication system, the authentication service network element may be an authentication server function (authentication server function, AUSF) network element. In the future communication system, the authentication service function network element may still be an AUSF network element, or may have other names, which are not limited in this application.
9、数据管理网元。9. Data management network element.
如图1所示,在5G通信系统中,该数据管理网元可以是统一数据管理(unified data management,UDM)网元,可以用于处理终端设备标识,接入鉴权,注册以及移动性管理等。在未来通信系统中,统一数据管理仍可以是UDM网元,或者,还可以有其它的名称,本申请不做限定。As shown in Figure 1, in the 5G communication system, the data management network element can be a unified data management (unified data management, UDM) network element, which can be used to process terminal device identification, access authentication, registration and mobility management Wait. In the future communication system, the unified data management may still be a UDM network element, or may have other names, which are not limited in this application.
如图1所示,在5G通信系统中,该数据管理网元还可以是统一数据库(Unified Data  Repository,UDR)。用于负责签约数据、策略数据、应用数据等类型数据的存取功能。比如,PCF可以从UDR中获取策略决策相关的或对应的签约信息。在未来通信系统中,该统一数据库仍可以是UDR,或者,还可以有其它的名称,本申请不做限定。As shown in Figure 1, in the 5G communication system, the data management network element can also be a unified database (Unified Data Repository, UDR). It is responsible for the access function of contract data, policy data, application data and other types of data. For example, the PCF may obtain policy decision-related or corresponding subscription information from the UDR. In future communication systems, the unified database may still be UDR, or may have other names, which are not limited in this application.
10、应用网元:用于进行应用影响的数据路由,接入网络开放功能网元,与策略框架交互进行策略控制等。10. Application network element: used for data routing for application impact, access to network elements with open network functions, and interaction with the policy framework for policy control, etc.
如图1所示,在5G通信系统中,该应用网元可以是应用功能(application function,AF)网元。在未来通信系统中,应用网元仍可以是AF网元,或者,还可以有其它的名称,本申请不做限定。As shown in FIG. 1, in a 5G communication system, the application network element may be an application function (application function, AF) network element. In the future communication system, the application network element may still be an AF network element, or may have other names, which are not limited in this application.
11、网络存储网元:用于维护网络中所有网络功能服务的实时信息。11. Network storage network element: used to maintain real-time information of all network function services in the network.
在5G通信系统中,该网络存储网元可以是网络注册功能(network repository function,NRF)网元。在未来通信系统中,网络存储网元仍可以是NRF网元,或者,还可以有其它的名称,本申请不做限定。In a 5G communication system, the network storage network element may be a network registry function (network repository function, NRF) network element. In the future communication system, the network storage network element may still be an NRF network element, or may have other names, which are not limited in this application.
12、网络切片选择网元:用于提供网络切片选择功能。12. Network slice selection network element: used to provide network slice selection function.
如图1所示,在5G通信系统中,该网络切片选择网元可以是网络切片选择功能(Network Slice Selection Function,NSSF)网元在未来通信系统中,该网络切片选择网元仍可以是NSSF网元,或者,还可以有其它的名称,本申请不做限定。As shown in Figure 1, in the 5G communication system, the network slice selection network element can be a network slice selection function (Network Slice Selection Function, NSSF) network element. In the future communication system, the network slice selection network element can still be NSSF A network element, or, may also have other names, which are not limited in this application.
13、网络能力开放网元:用于提供网络定制功能。13. Network capability opening network element: used to provide network customization functions.
如图1所示,在5G通信系统中,该网络能力开放网元可以是网络能力开放功能(network exposure function,NEF)网元在未来通信系统中,该网络能力开放网元仍可以是NEF网元,或者,还可以有其它的名称,本申请不做限定。As shown in Figure 1, in the 5G communication system, the network capability exposure network element can be a network exposure function (network exposure function, NEF) network element. In the future communication system, the network capability exposure network element can still be a NEF network element. element, or may have other names, which are not limited in this application.
本申请实施例中适用的通信系统架构还可以包括其他网元,比如网络分析功能网元和服务通信功能网元。The applicable communication system architecture in this embodiment of the present application may also include other network elements, such as a network analysis function network element and a service communication function network element.
其中,网络分析功能网元用于提供网络切片实例级数据分析功能。比如可以获取数据,之后使用数据进行训练和分析,并依据分析结果做相应的推理。在5G通信系统中,该网络分析功能网元可以是网络分析功能(network analytics function,NWDAF)网元。Among them, the network element with the network analysis function is used to provide the network slice instance-level data analysis function. For example, it is possible to obtain data, then use the data for training and analysis, and make corresponding inferences based on the analysis results. In a 5G communication system, the network analysis function network element may be a network analysis function (network analytics function, NWDAF) network element.
图1中Nnssf、Nausf、Nnef、Npcf、Nudm、Naf、Namf、Nsmf、N1、N2、N3、N4,以及N6为接口序列号。这些接口序列号的含义可参见3GPP标准协议中定义的含义,在此不做限制。In Figure 1, Nnssf, Nausf, Nnef, Npcf, Nudm, Naf, Namf, Nsmf, N1, N2, N3, N4, and N6 are interface serial numbers. For the meanings of these interface serial numbers, refer to the meanings defined in the 3GPP standard protocol, and there is no limitation here.
可以理解的是,上述网元或者功能既可以是硬件设备中的网络元件,也可以是在专用硬件上运行的软件功能,或者是平台(例如,云平台)上实例化的虚拟化功能。上述网元或者功能可划分出一个或多个服务,进一步,还可能会出现独立于网络功能存在的服务。在本申请中,上述功能的实例、或上述功能中包括的服务的实例、或独立于网络功能存在的服务实例均可称为服务实例。It can be understood that the above-mentioned network element or function may be a network element in a hardware device, a software function running on dedicated hardware, or a virtualization function instantiated on a platform (for example, a cloud platform). The above-mentioned network elements or functions can be divided into one or more services, and further, there may also be services that exist independently of network functions. In this application, an instance of the above-mentioned function, or an instance of a service included in the above-mentioned function, or a service instance existing independently of the network function may be referred to as a service instance.
需要说明的是,本申请实施例并不限定于上述的系统架构,还可以应用于未来其它的通信系统,例如第六代通信(the 6th generation,6G)系统架构等。并且,本申请实施例上述所使用的各个网元的名称,在未来通信系统中,可能保持功能相同,但名称会改变。It should be noted that the embodiments of the present application are not limited to the above-mentioned system architecture, and can also be applied to other communication systems in the future, such as the 6th generation communication (the 6th generation, 6G) system architecture and the like. Moreover, the names of the various network elements used above in the embodiments of the present application may keep the same function in the future communication system, but the names will be changed.
示例性的,图2示例性示出了本申请实施例提供的一种基于服务化架构的5G网络架构示意图。Exemplarily, FIG. 2 exemplarily shows a schematic diagram of a service-based architecture-based 5G network architecture provided by an embodiment of the present application.
图2中的网元的功能的介绍可以参考图1中对应的网元的功能的介绍,不再赘述。图 2与图1的主要区别在于:图2中的各个网元之间的接口是点对点的接口,而不是服务化的接口。For the introduction of the functions of the network elements in FIG. 2 , reference may be made to the introduction of the functions of the corresponding network elements in FIG. 1 , which will not be repeated here. The main difference between Figure 2 and Figure 1 is that the interfaces between network elements in Figure 2 are point-to-point interfaces rather than service-oriented interfaces.
在图2所示的架构中,各个网元之间的接口名称及功能如下:In the architecture shown in Figure 2, the interface names and functions between each network element are as follows:
1、N7:PCF与SMF之间的接口,用于下发协议数据单元(protocol data unit,PDU)会话粒度以及业务数据流粒度控制策略。1. N7: The interface between PCF and SMF, which is used to deliver protocol data unit (protocol data unit, PDU) session granularity and business data flow granularity control policy.
2、N15:PCF与AMF之间的接口,用于下发UE策略及接入控制相关策略。2. N15: the interface between the PCF and the AMF, used to issue UE policies and access control-related policies.
3、N5:AF与PCF之间的接口,用于应用业务请求下发以及网络事件上报。3. N5: the interface between the AF and the PCF, used for sending application service requests and reporting network events.
4、N4:SMF与UPF之间的接口,用于控制面与用户面之间传递信息,包括控制面向用户面的转发规则、QoS控制规则、流量统计规则等的下发以及用户面的信息上报。4. N4: The interface between SMF and UPF, which is used to transfer information between the control plane and the user plane, including controlling the distribution of forwarding rules for the user plane, QoS control rules, traffic statistics rules, etc., and reporting of user plane information .
5、N11:SMF与AMF之间的接口,用于传递RAN和UPF之间的PDU会话隧道信息、传递发送给UE的控制消息、传递发送给RAN的无线资源控制信息等。5. N11: The interface between SMF and AMF, used to transfer PDU session tunnel information between RAN and UPF, transfer control messages sent to UE, transfer radio resource control information sent to RAN, etc.
6、N2:AMF与RAN之间的接口,用于传递核心网侧至RAN的无线承载控制信息等。6. N2: the interface between the AMF and the RAN, used to transmit radio bearer control information from the core network side to the RAN.
7、N1:AMF与UE之间的接口,接入无关,用于向UE传递QoS控制规则等。7. N1: The interface between the AMF and the UE, which has nothing to do with access, and is used to transfer QoS control rules to the UE.
8、N8:AMF与UDM间的接口,用于AMF向UDM获取接入与移动性管理相关签约数据与鉴权数据,以及AMF向UDM注册UE当前移动性管理相关信息等。8. N8: The interface between AMF and UDM, which is used for AMF to obtain subscription data and authentication data related to access and mobility management from UDM, and for AMF to register UE current mobility management related information with UDM.
9、N10:SMF与UDM间的接口,用于SMF向UDM获取会话管理相关签约数据,以及SMF向UDM注册UE当前会话相关信息等。9. N10: the interface between the SMF and the UDM, used for the SMF to obtain session management-related subscription data from the UDM, and for the SMF to register UE current session-related information with the UDM.
10、N35:UDM与UDR间的接口,用于UDM从UDR中获取用户签约数据信息。10. N35: interface between UDM and UDR, used for UDM to obtain user subscription data information from UDR.
11、N36:PCF与UDR间的接口,用于PCF从UDR中获取策略相关签约数据以及应用数据相关信息。11. N36: the interface between the PCF and the UDR, used for the PCF to obtain policy-related subscription data and application data-related information from the UDR.
12、N12:AMF和AUSF间的接口,用于AMF向AUSF发起鉴权流程,其中可携带SUCI作为签约标识;12. N12: The interface between AMF and AUSF, used for AMF to initiate an authentication process to AUSF, which can carry SUCI as a subscription identifier;
13、N13:UDM与AUSF间的接口,用于AUSF向UDM获取用户鉴权向量,以执行鉴权流程。13. N13: interface between UDM and AUSF, used for AUSF to obtain user authentication vector from UDM to execute the authentication process.
14、N22:NSSF与AMF间的接口,用于AMF从NSSF接收切片选择信息。14. N22: an interface between the NSSF and the AMF, used for the AMF to receive slice selection information from the NSSF.
图3a示例性示出了5G通信系统下控制面协议栈的结构示意图,图3b示例性示出了5G通信系统下用户面协议栈的结构示意图。如图3a所示,终端设备的控制面协议栈可以包括:非接入(non-access stratum,NAS)层、无线资源控制(Radio Resource Control,RRC)层、分组数据汇聚协议(Packet Data Convergence Protocol,PDCP)层、无线链路控制(radio link control,RLC)层、媒体接入控制(media access control,MAC)层、物理(physical,PHY)层。gNB的控制面协议栈可以包括:RRC层、PDCP层、RLC层、MAC层和PHY层。AMF的控制面协议栈可以包括NAS层。Fig. 3a exemplarily shows a schematic structural diagram of a control plane protocol stack in a 5G communication system, and Fig. 3b exemplarily shows a structural schematic diagram of a user plane protocol stack in a 5G communication system. As shown in Figure 3a, the control plane protocol stack of the terminal device may include: non-access (non-access stratum, NAS) layer, radio resource control (Radio Resource Control, RRC) layer, packet data convergence protocol (Packet Data Convergence Protocol) , PDCP) layer, radio link control (radio link control, RLC) layer, media access control (media access control, MAC) layer, physical (physical, PHY) layer. The control plane protocol stack of gNB may include: RRC layer, PDCP layer, RLC layer, MAC layer and PHY layer. AMF's control plane protocol stack may include a NAS layer.
如图3b所示,终端设备的用户面协议栈可以包括:服务数据适应协议(service data adaptation protocol,SDAP)层、PDCP层、RLC层、MAC层和PHY层。gNB的用户面协议栈可以包括:SDAP层、PDCP层、RLC层、MAC层和PHY层。As shown in Figure 3b, the user plane protocol stack of the terminal device may include: a service data adaptation protocol (service data adaptation protocol, SDAP) layer, a PDCP layer, an RLC layer, a MAC layer, and a PHY layer. The user plane protocol stack of gNB may include: SDAP layer, PDCP layer, RLC layer, MAC layer and PHY layer.
下面结合图3a和图3b对通信系统中的协议栈进行介绍:The following introduces the protocol stack in the communication system in conjunction with Fig. 3a and Fig. 3b:
1、NAS层。1. NAS layer.
NAS层即非接入层,可以主要用于终端设备与AMF之间的连接和移动控制。虽然AMF从基站接收消息,但不是由基站始发的,基站只是透传终端设备发给AMF的消息并不能 识别或者更改这部分消息,所以被称为NAS消息。NAS消息是终端设备和AMF的交互,比如附着、承载建立、服务请求等移动性和连接流程消息。The NAS layer is the non-access layer, which can be mainly used for the connection and mobility control between the terminal equipment and the AMF. Although the AMF receives messages from the base station, it is not initiated by the base station. The base station only transparently transmits the message sent by the terminal device to the AMF and cannot identify or change this part of the message, so it is called NAS message. The NAS message is the interaction between the terminal device and the AMF, such as mobility and connection process messages such as attachment, bearer establishment, and service request.
2、RRC层。2. RRC layer.
RRC层可以主要用来处理终端设备与5G通信系统的网元之间的所有信令(用户和基站之间的消息),包括系统消息、准入控制、安全管理、小区重选、测量上报、切换和移动性、NAS消息传输、无线资源管理等。The RRC layer can be mainly used to handle all signaling between the terminal equipment and the network elements of the 5G communication system (messages between the user and the base station), including system information, admission control, security management, cell reselection, measurement reporting, Handover and mobility, NAS messaging, radio resource management, etc.
3、SDAP层。3. SDAP layer.
SDAP层位于分组数据汇聚协议(packet data convergence protocol,PDCP)层以上,直接承载网际协议(internet protocol,IP)数据包,可以用于用户面。负责服务质量(quality of service,QoS)流与数据资源承载(data radio bearer,DRB)(数据无线承载)之间的映射,为数据包添加服务质量流标识(QoS flow identification,QFI)标记。The SDAP layer is located above the packet data convergence protocol (PDCP) layer, and directly carries Internet protocol (internet protocol, IP) data packets, which can be used for the user plane. Responsible for the mapping between the quality of service (QoS) flow and the data resource bearer (data radio bearer, DRB) (data radio bearer), and add the quality of service flow identification (QoS flow identification, QFI) mark to the data packet.
4、PDCP层。4. PDCP layer.
5G的PDCP层主要功能可以包括以下几项中的至少一项:The main functions of the 5G PDCP layer may include at least one of the following:
(1)用户面IP头压缩(压缩算法可以由手机和基站共同决定);(1) User plane IP header compression (the compression algorithm can be jointly determined by the mobile phone and the base station);
(2)加密/解密(控制面/用户面);(2) encryption/decryption (control plane/user plane);
(3)控制面完整性校验(4G只有控制面,5G用户面可以选择性校验);(3) Control plane integrity verification (4G only has control plane, 5G user plane can be selectively verified);
(4)排序和复制检测;(4) sorting and duplication detection;
(5)针对于NSA组网下的Option3X架构,gNodeB的PDCP进行分流,具有路由功能。(5) For the Option3X architecture under the NSA network, the PDCP of the gNodeB performs offloading and has a routing function.
5、RLC层。5. RLC layer.
RLC层位于PDCP层以下,实体可以分为透明模式(Transparent mode,TM)_实体,非确认模式(unacknowledged mode,UM)实体,非确认模式(acknowledged mode,AM)实体,AM数据收发共用一个实体,UM和TM收发实体分开,主要功能如下:The RLC layer is located below the PDCP layer, and entities can be divided into transparent mode (Transparent mode, TM)_entity, unacknowledged mode (unacknowledged mode, UM) entity, unacknowledged mode (acknowledged mode, AM) entity, AM data transmission and reception share one entity , the UM and TM transceiver entities are separated, and the main functions are as follows:
(1)TM透明模式(广播消息)、UM非确认模式(语音业务,有时延要求)、AM确认模式(普通业务,准确度高);(1) TM transparent mode (broadcast message), UM non-confirmation mode (voice service, delay requirement), AM confirmation mode (common service, high accuracy);
(2)分段和重组(UM/AM,分段的数据包大小由MAC决定,无线环境好较大,无线环境差较小);(2) Segmentation and reassembly (UM/AM, the packet size of the segment is determined by MAC, the wireless environment is better, and the wireless environment is poorer);
(3)纠错(只针对AM,自动重传请求(automatic repeat request,ARQ),准确度高)。(3) Error correction (only for AM, automatic repeat request (automatic repeat request, ARQ), high accuracy).
6、MAC层。6. MAC layer.
5GMAC层功能与4G类似,主要功能是调度,功能包括:资源调度,逻辑信道和传输信道之间的映射,复用/解复用,HARQ(上下行异步)。The function of the 5GMAC layer is similar to that of 4G. The main function is scheduling. The functions include: resource scheduling, mapping between logical channels and transport channels, multiplexing/demultiplexing, and HARQ (asynchronous uplink and downlink).
7、物理(physical,PHY)层。7. Physical (PHY) layer.
5G物理层的主要功能可以包括:错误检测、前向纠错(forward error correction,FEC)加密解密、速率匹配、物理信道的映射、调整和解调、频率同步和时间同步、无线测量、多入多出技术(multi input multi output,MIMO)处理。The main functions of the 5G physical layer may include: error detection, forward error correction (forward error correction, FEC) encryption and decryption, rate matching, physical channel mapping, adjustment and demodulation, frequency synchronization and time synchronization, wireless measurement, multi-input Multi-output technology (multi input multi output, MIMO) processing.
需要说明的是,RLC层、MAC层、PHY层在PDCP层以下,这些层上传输的消息不受安全保护,比如可以是不受PDCP层的安全保护,或者也可以称为不受机密性和完整性保护。It should be noted that the RLC layer, the MAC layer, and the PHY layer are below the PDCP layer, and the messages transmitted on these layers are not protected by security, for example, they may not be protected by the security protection of the PDCP layer, or they may also be called not protected by confidentiality and Integrity protection.
一种可能地实施方式中,本申请实施例中的终端设备或网络设备也可以称之为通信装 置,其可以是一个通用设备或者是一个专用设备,本申请实施例对此不做具体限定。In a possible implementation manner, the terminal device or network device in the embodiment of the present application may also be called a communication device, which may be a general-purpose device or a dedicated device, which is not specifically limited in the embodiment of the present application.
又一种可能地实施方式中,本申请实施例中的终端设备或网络设备的相关功能可以由一个设备实现,也可以由多个设备共同实现,还可以是由一个设备内的一个或多个功能模块实现,本申请实施例对此不做具体限定。可以理解的是,上述功能既可以是硬件设备中的网络元件,也可以是在专用硬件上运行的软件功能,或者是硬件与软件的结合,或者是平台(例如,云平台)上实例化的虚拟化功能。In yet another possible implementation, the relevant functions of the terminal device or network device in the embodiment of this application can be implemented by one device, or by multiple devices, or by one or more Function modules are implemented, which is not specifically limited in this embodiment of the present application. It can be understood that the above functions can be network elements in hardware devices, software functions running on dedicated hardware, or a combination of hardware and software, or instantiated on a platform (for example, a cloud platform) virtualization capabilities.
例如,本申请实施例中的终端设备或网络设备的相关功能可以通过图4中的通信设备300来实现。图4所示为本申请实施例提供的通信设备300的结构示意图。该通信设备300包括一个或多个处理器301,通信线路302,以及至少一个通信接口(图4中仅是示例性的以包括通信接口304,以及一个处理器301为例进行说明),可选的还可以包括存储器303。For example, related functions of the terminal device or network device in the embodiment of the present application may be implemented by the communication device 300 in FIG. 4 . FIG. 4 is a schematic structural diagram of a communication device 300 provided by an embodiment of the present application. The communication device 300 includes one or more processors 301, communication lines 302, and at least one communication interface (in FIG. 4, it is only exemplary to include a communication interface 304 and a processor 301 for illustration), optional can also include memory 303 .
处理器301可以是一个芯片。例如,该处理器301可以是现场可编程门阵列(field programmable gate array,FPGA),可以是专用集成芯片(application specific integrated circuit,ASIC),还可以是系统芯片(system on chip,SoC),还可以是中央处理器(central processor unit,CPU),还可以是网络处理器(network processor,NP),还可以是数字信号处理电路(digital signal processor,DSP),还可以是微控制器(micro controller unit,MCU),还可以是可编程控制器(programmable logic device,PLD)或其他集成芯片。 Processor 301 may be a chip. For example, the processor 301 may be a field programmable gate array (field programmable gate array, FPGA), may be an application specific integrated circuit (ASIC), may also be a system chip (system on chip, SoC), or It can be a central processing unit (central processor unit, CPU), or a network processor (network processor, NP), or a digital signal processing circuit (digital signal processor, DSP), or a microcontroller (micro controller) unit, MCU), it can also be a programmable controller (programmable logic device, PLD) or other integrated chips.
在实现过程中,本申请实施例中方法的各步骤可以通过处理器中的硬件的集成逻辑电路或者软件形式的指令完成。结合本申请实施例所公开的方法的步骤可以直接体现为硬件处理器执行完成,或者用处理器中的硬件及软件模块组合执行完成。软件模块可以位于随机存储器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质位于存储器303,处理器301读取存储器303中的信息,结合其硬件完成上述方法的步骤。In the implementation process, each step of the method in the embodiment of the present application may be completed by an integrated logic circuit of hardware in a processor or an instruction in the form of software. The steps of the methods disclosed in connection with the embodiments of the present application may be directly implemented by a hardware processor, or implemented by a combination of hardware and software modules in the processor. The software module can be located in a mature storage medium in the field such as random access memory, flash memory, read-only memory, programmable read-only memory or electrically erasable programmable memory, register. The storage medium is located in the memory 303, and the processor 301 reads the information in the memory 303, and completes the steps of the above method in combination with its hardware.
应注意,本申请实施例中的处理器301可以是一种集成电路芯片,具有信号的处理能力。在实现过程中,上述方法实施例的各步骤可以通过处理器中的硬件的集成逻辑电路或者软件形式的指令完成。上述的处理器可以是通用处理器、数字信号处理器(DSP)、专用集成电路(ASIC)、现场可编程门阵列(FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。可以实现或者执行本申请实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。结合本申请实施例所公开的方法的步骤可以直接体现为硬件译码处理器执行完成,或者用译码处理器中的硬件及软件模块组合执行完成。软件模块可以位于随机存储器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质位于存储器,处理器读取存储器中的信息,结合其硬件完成上述方法的步骤。It should be noted that the processor 301 in the embodiment of the present application may be an integrated circuit chip, which has a signal processing capability. In the implementation process, each step of the above-mentioned method embodiments may be completed by an integrated logic circuit of hardware in a processor or instructions in the form of software. The above-mentioned processor may be a general-purpose processor, a digital signal processor (DSP), an application-specific integrated circuit (ASIC), a field-programmable gate array (FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components . Various methods, steps, and logic block diagrams disclosed in the embodiments of the present application may be implemented or executed. A general-purpose processor may be a microprocessor, or the processor may be any conventional processor, or the like. The steps of the method disclosed in connection with the embodiments of the present application may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software module can be located in a mature storage medium in the field such as random access memory, flash memory, read-only memory, programmable read-only memory or electrically erasable programmable memory, register. The storage medium is located in the memory, and the processor reads the information in the memory, and completes the steps of the above method in combination with its hardware.
通信线路302可包括一通路,用于连接不同组件之间。 Communication line 302 may include a path for connecting between different components.
通信接口304,可以是收发模块用于与其他设备或通信网络通信,如以太网,RAN,无线局域网(wireless local area networks,WLAN)等。例如,收发模块可以是收发器、收发机一类的装置。可选的,通信接口304也可以是位于处理器301内的收发电路,用以实现处理器的信号输入和信号输出。The communication interface 304 may be a transceiver module for communicating with other devices or communication networks, such as Ethernet, RAN, wireless local area networks (wireless local area networks, WLAN) and the like. For example, the transceiver module may be a device such as a transceiver or a transceiver. Optionally, the communication interface 304 may also be a transceiver circuit located in the processor 301 to realize signal input and signal output of the processor.
存储器303可以是具有存储功能的装置。可以理解,本申请实施例中的存储器303可 以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(read-only memory,ROM)、可编程只读存储器(programmable ROM,PROM)、可擦除可编程只读存储器(erasable PROM,EPROM)、电可擦除可编程只读存储器(electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(random access memory,RAM),其用作外部高速缓存。通过示例性但不是限制性说明,许多形式的RAM可用,例如静态随机存取存储器(static RAM,SRAM)、动态随机存取存储器(dynamic RAM,DRAM)、同步动态随机存取存储器(synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(double data rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(synchlink DRAM,SLDRAM)和直接内存总线随机存取存储器(direct rambus RAM,DR RAM)。应注意,本文描述的系统和方法的存储器旨在包括但不限于这些和任意其它适合类型的存储器。存储器可以是独立存在,通过通信线路302与处理器相连接。存储器也可以和处理器集成在一起。The memory 303 may be a device having a storage function. It can be understood that the memory 303 in the embodiment of the present application may be a volatile memory or a nonvolatile memory, or may include both volatile and nonvolatile memories. Among them, the non-volatile memory can be read-only memory (read-only memory, ROM), programmable read-only memory (programmable ROM, PROM), erasable programmable read-only memory (erasable PROM, EPROM), electrically programmable Erases programmable read-only memory (electrically EPROM, EEPROM) or flash memory. Volatile memory can be random access memory (RAM), which acts as external cache memory. By way of illustration and not limitation, many forms of RAM are available such as static random access memory (static RAM, SRAM), dynamic random access memory (dynamic RAM, DRAM), synchronous dynamic random access memory (synchronous DRAM, SDRAM), double data rate synchronous dynamic random access memory (double data rate SDRAM, DDR SDRAM), enhanced synchronous dynamic random access memory (enhanced SDRAM, ESDRAM), synchronous connection dynamic random access memory (synchlink DRAM, SLDRAM ) and direct memory bus random access memory (direct rambus RAM, DR RAM). It should be noted that the memory of the systems and methods described herein is intended to include, but not be limited to, these and any other suitable types of memory. The memory may exist independently and be connected to the processor through the communication line 302 . Memory can also be integrated with the processor.
其中,存储器303用于存储执行本申请方案的计算机执行指令,并由处理器301来控制执行。处理器301用于执行存储器303中存储的计算机执行指令,从而实现本申请实施例中提供的方法。Wherein, the memory 303 is used to store computer-executed instructions for implementing the solution of the present application, and the execution is controlled by the processor 301 . The processor 301 is configured to execute computer-executed instructions stored in the memory 303, so as to implement the methods provided in the embodiments of the present application.
或者,可选的,本申请实施例中,也可以是处理器301执行本申请下述实施例提供的方法中的处理相关的功能,通信接口304负责与其他设备或通信网络通信,本申请实施例对此不做具体限定。Or, optionally, in the embodiment of the present application, the processor 301 may also perform processing-related functions in the methods provided in the following embodiments of the present application, and the communication interface 304 is responsible for communicating with other devices or communication networks. The example does not specifically limit this.
可选的,本申请实施例中的计算机执行指令也可以称之为应用程序代码,本申请实施例对此不做具体限定。Optionally, the computer-executed instructions in the embodiments of the present application may also be referred to as application program codes, which is not specifically limited in the embodiments of the present application.
在具体实现中,作为一种实施例,处理器301可以包括一个或多个CPU,例如图4中的CPU0和CPU1。In a specific implementation, as an embodiment, the processor 301 may include one or more CPUs, for example, CPU0 and CPU1 in FIG. 4 .
在具体实现中,作为一种实施例,通信设备300可以包括多个处理器,例如图4中的处理器301和处理器308。这些处理器中的每一个可以是一个单核(single-core)处理器,也可以是一个多核(multi-core)处理器。这里的处理器可以包括但不限于以下至少一种:中央处理单元(central processing unit,CPU)、微处理器、数字信号处理器(DSP)、微控制器(microcontroller unit,MCU)、或人工智能处理器等各类运行软件的计算设备,每种计算设备可包括一个或多个用于执行软件指令以进行运算或处理的核。In a specific implementation, as an embodiment, the communications device 300 may include multiple processors, for example, the processor 301 and the processor 308 in FIG. 4 . Each of these processors may be a single-core processor or a multi-core processor. The processor here may include but not limited to at least one of the following: central processing unit (central processing unit, CPU), microprocessor, digital signal processor (DSP), microcontroller (microcontroller unit, MCU), or artificial intelligence Various types of computing devices that run software such as processors, each computing device may include one or more cores for executing software instructions to perform calculations or processing.
在具体实现中,作为一种实施例,通信设备300还可以包括输出设备305和输入设备306。输出设备305和处理器301通信,可以以多种方式来显示信息。例如,输出设备305可以是液晶显示器(liquid crystal display,LCD),发光二级管(light emitting diode,LED)显示设备,阴极射线管(cathode ray tube,CRT)显示设备,或投影仪(projector)等。输入设备306和处理器301通信,可以以多种方式接收用户的输入。例如,输入设备306可以是鼠标、键盘、触摸屏设备或传感设备等。In a specific implementation, as an embodiment, the communication device 300 may further include an output device 305 and an input device 306 . Output device 305 is in communication with processor 301 and can display information in a variety of ways. For example, the output device 305 may be a liquid crystal display (liquid crystal display, LCD), a light emitting diode (light emitting diode, LED) display device, a cathode ray tube (cathode ray tube, CRT) display device, or a projector (projector) Wait. The input device 306 communicates with the processor 301 and can receive user input in various ways. For example, the input device 306 may be a mouse, a keyboard, a touch screen device, or a sensing device, among others.
上述的通信设备300有时也可以称为通信装置,其可以是一个通用设备或者是一个专用设备。例如通信设备300可以是台式机、便携式电脑、网络服务器、掌上电脑(personal digital assistant,PDA)、移动手机、平板电脑、无线终端设备、嵌入式设备、上述终端设备,上述网络设备、或具有图4中类似结构的设备。本申请实施例不限定通信设备300的类型。The above-mentioned communication device 300 may sometimes also be referred to as a communication device, which may be a general-purpose device or a special-purpose device. For example, the communication device 300 can be a desktop computer, a portable computer, a network server, a personal digital assistant (PDA), a mobile phone, a tablet computer, a wireless terminal device, an embedded device, the above-mentioned terminal device, the above-mentioned network device, or a 4 devices with similar structures. The embodiment of the present application does not limit the type of the communication device 300 .
下面基于上述内容对本申请实施例进行进一步的介绍,在此之前,需要说明的是,在本申请的描述中,除非另有说明,“/”表示前后关联的对象是一种“或”的关系,例如,A/B可以表示A或B;本申请中的“和/或”仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况,其中A,B可以是单数或者复数。并且,在本申请的描述中,除非另有说明,“多个”是指两个或多于两个。“以下至少一项(个)”或其类似表达,是指的这些项中的任意组合,包括单项(个)或复数项(个)的任意组合。例如,a,b,或c中的至少一项(个),可以表示:a,b,c,a-b,a-c,b-c,或a-b-c,其中a,b,c可以是单个,也可以是多个。另外,为了便于清楚描述本申请实施例的技术方案,在本申请的实施例中,采用了“第一”、“第二”等字样对功能和作用基本相同的相同项或相似项进行区分。本领域技术人员可以理解“第一”、“第二”等字样并不对数量和执行次序进行限定,并且“第一”、“第二”等字样也并不限定一定不同。同时,在本申请实施例中,“示例性的”或者“例如”等词用于表示作例子、例证或说明。本申请实施例中被描述为“示例性的”或者“例如”的任何实施例或设计方案不应被解释为比其它实施例或设计方案更优选或更具优势。确切而言,使用“示例性的”或者“例如”等词旨在以具体方式呈现相关概念,便于理解。The following is a further introduction to the embodiment of this application based on the above content. Before that, it should be noted that in the description of this application, unless otherwise specified, "/" means that the objects associated with each other are an "or" relationship , for example, A/B can mean A or B; "and/or" in this application is only an association relationship describing associated objects, which means that there can be three kinds of relationships, for example, A and/or B can mean: A exists alone, A and B exist at the same time, and B exists alone, where A and B can be singular or plural. And, in the description of the present application, unless otherwise specified, "plurality" means two or more than two. "At least one of the following" or similar expressions refer to any combination of these items, including any combination of single or plural items. For example, at least one item (piece) of a, b, or c can represent: a, b, c, a-b, a-c, b-c, or a-b-c, where a, b, c can be single or multiple . In addition, in order to clearly describe the technical solutions of the embodiments of the present application, in the embodiments of the present application, words such as "first" and "second" are used to distinguish the same or similar items with basically the same function and effect. Those skilled in the art can understand that words such as "first" and "second" do not limit the number and execution order, and words such as "first" and "second" do not necessarily limit the difference. Meanwhile, in the embodiments of the present application, words such as "exemplary" or "for example" are used as examples, illustrations or illustrations. Any embodiment or design scheme described as "exemplary" or "for example" in the embodiments of the present application shall not be interpreted as being more preferred or more advantageous than other embodiments or design schemes. To be precise, the use of words such as "exemplary" or "such as" is intended to present related concepts in a concrete manner for easy understanding.
此外,本申请实施例描述的网络架构以及业务场景是为了更加清楚的说明本申请实施例的技术方案,并不构成对于本申请实施例提供的技术方案的限定,本领域普通技术人员可知,随着网络架构的演变和新业务场景的出现,本申请实施例提供的技术方案对于类似的技术问题,同样适用。In addition, the network architecture and business scenarios described in the embodiments of the present application are for more clearly illustrating the technical solutions of the embodiments of the present application, and do not constitute limitations on the technical solutions provided by the embodiments of the present application. With the evolution of the network architecture and the emergence of new business scenarios, the technical solutions provided in the embodiments of the present application are also applicable to similar technical problems.
基于上述内容,图5示例性示出了本申请实施例提供的一种通信方法的流程示意图,该通信方法可以由网络设备和终端设备执行,其中,终端设备比如可以为前述图1、图2、图3a、图3b或图4中的终端设备,网络设备比如可以为前述图1、图2、图3a、图3b或图4中的接入网网元(比如gNB)或移动性管理网元(比如AMF),也可以为其他网元,此处仅以该两个网元进行举例。也可以由网络设备内部的芯片或部件以及终端设备内部的芯片或部件执行。如图5所示,该方法包括:Based on the above content, FIG. 5 exemplarily shows a schematic flow chart of a communication method provided by an embodiment of the present application. The communication method can be executed by a network device and a terminal device, where the terminal device can be, for example, the aforementioned FIG. 1 and FIG. 2 , the terminal device in FIG. 3a, FIG. 3b or FIG. 4, the network device may be, for example, the access network element (such as gNB) or the mobility management network in the aforementioned FIG. 1, FIG. 2, FIG. 3a, FIG. 3b or FIG. The element (such as AMF) may also be other network elements, and only these two network elements are used as examples here. It can also be executed by chips or components inside the network equipment and chips or components inside the terminal equipment. As shown in Figure 5, the method includes:
S501,网络设备向终端设备发送第一消息。相对应地,终端设备接收来自网络设备的第一消息。第一消息未受到安全保护,第一消息包括终端设备的第一用户配置信息。S501. The network device sends a first message to the terminal device. Correspondingly, the terminal device receives the first message from the network device. The first message is not protected by security, and the first message includes first user configuration information of the terminal device.
在一种可能地实施方式中,第一用户配置信息可以为RRC消息。该第一消息在安全激活前发送,未受到安全保护。网络设备根据第一用户配置信息与终端设备之间进行数据传输。In a possible implementation manner, the first user configuration information may be an RRC message. This first message is sent before security activation and is not secured. The network device performs data transmission with the terminal device according to the first user configuration information.
需要说明的是,RLC层、MAC层、PHY层在PDCP层以下,这些层上传输的消息不受安全保护,比如可以是不受PDCP层的安全保护,或者也可以称为不受机密性和完整性保护。It should be noted that the RLC layer, the MAC layer, and the PHY layer are below the PDCP layer, and the messages transmitted on these layers are not protected by security, for example, they may not be protected by the security protection of the PDCP layer, or they may also be called not protected by confidentiality and Integrity protection.
S502,网络设备获取用于指示终端设备的配置信息需受到安全保护的指示信息。S502. The network device acquires indication information used to indicate that the configuration information of the terminal device needs to be protected by security.
需要说明的是,S502为可选的步骤,并不是必须的,图中将S502标识为虚线即标识S502可以执行,也可以不执行。即在S503之前可以不执行S502,也以执行S502。其中,若在S503之前执行S502,则S502与S501直接没有必然的先后关系,可以先执行S501再执行S502,也可以先执行S502,后执行S501。在又一种可能地实施方式中,S502还可以发生在终端设备的接入层或非接入层安全保护激活之后,关于终端设备的安全保护激活 的相关内容后续将详细介绍,在此先不做阐述。It should be noted that S502 is an optional step and is not required. In the figure, S502 is marked as a dotted line, which means that S502 can be executed or not. That is, S502 may not be executed before S503, but S502 may also be executed. Wherein, if S502 is executed before S503, there is no necessary sequence relationship between S502 and S501, and S501 can be executed first and then S502, or S502 can be executed first, and then S501 can be executed. In yet another possible implementation manner, S502 may also occur after the security protection of the terminal device's access layer or non-access layer is activated. Do explain.
本申请实施例中网络设备获取用于指示终端设备的配置信息需受到安全保护的指示信息的方式有多种,下面分别进行介绍:In the embodiment of the present application, there are many ways for the network device to obtain the indication information used to indicate that the configuration information of the terminal device needs to be protected by security, and the following will introduce them respectively:
实施方式a1Embodiment a1
用于指示终端设备的配置信息需受到安全保护的指示信息为:网络设备接收到的第三指示信息。第三指示信息用于指示终端设备的配置信息需受到安全保护。The indication information used to indicate that the configuration information of the terminal device needs to be protected by security is: the third indication information received by the network device. The third indication information is used to indicate that the configuration information of the terminal device needs to be protected by security.
在该实施方式a1中,可以由其他网元,比如核心网网元向网络设备(比如gNB或AMF)发送第三指示信息,相对应地,网络设备接收第三指示信息。In this embodiment a1, other network elements, such as core network elements, may send the third indication information to the network device (such as gNB or AMF), and correspondingly, the network device receives the third indication information.
在一种可能地实施方式中,第三指示信息包括以下内容中的至少一项:In a possible implementation manner, the third indication information includes at least one of the following:
终端设备的安全等级、会话安全需求、终端设备的安全能力,或终端设备对应的核心网安全策略。The security level of the terminal device, the session security requirement, the security capability of the terminal device, or the core network security policy corresponding to the terminal device.
下面以第三指示信息为终端设备的安全等级为例举个例子,其他内容与之类似,不再赘述。核心网网元向网络设备下发终端设备的安全等级,一种可能地实施方式中,核心网网元侧针对有安全等级较高的终端设备进行下发该终端设备的安全等级,又一种可能地实施方式中,核心网网元可以针对具有安全等级的信息的终端设备下发该终端设备的安全等级,即核心网网元可以根据终端设备的安全等级进行筛选,也可以不筛选。又一种可能地实施方式中,针对网络设备侧,网络设备可以在接收到该终端设备的安全等级后,则可以推断该终端设备的配置信息需受到安全保护。或者,网络设备也可以根据接收到的终端设备的安全等级判断该安全等级是否满足预设的安全等级要求,若满足则推断该终端设备的配置信息需受到安全保护。The following takes the third indication information as an example of the security level of the terminal device as an example, and other contents are similar and will not be repeated here. The network element of the core network issues the security level of the terminal equipment to the network equipment. In one possible implementation mode, the network element side of the core network issues the security level of the terminal equipment for the terminal equipment with a higher security level. Another In a possible implementation manner, the network element of the core network may deliver the security level of the terminal device to the terminal device having security level information, that is, the network element of the core network may or may not screen according to the security level of the terminal device. In yet another possible implementation manner, for the network device side, after receiving the security level of the terminal device, the network device may infer that the configuration information of the terminal device needs to be protected by security. Alternatively, the network device may also judge according to the received security level of the terminal device whether the security level satisfies the preset security level requirements, and if so, infer that the configuration information of the terminal device needs to be protected by security.
实施方式a2Embodiment a2
用于指示终端设备的配置信息需受到安全保护的指示信息为:网络设备接收到的安全模式命令完成消息。安全模式命令完成消息用于指示接入层或非接入层安全保护激活。The indication information used to indicate that the configuration information of the terminal device needs to be protected by security is: the security mode command completion message received by the network device. The security mode command complete message is used to indicate the activation of access stratum or non-access stratum security protection.
在又一种可能地实施方式中,用于指示终端设备的配置信息需受到安全保护的指示信息为:网络设备接收到的且校验成功的安全模式命令完成消息,校验成功可以指示该安全模式命令完成消息成功接收。In yet another possible implementation manner, the indication information used to indicate that the configuration information of the terminal device needs to be protected by security is: a security mode command completion message received by the network device and verified successfully, and the successful verification may indicate that the security The mode command complete message was successfully received.
当网络设备为接入网网元,比如gNB,则安全模式命令完成消息可以为接入层安全模式命令完成消息,该消息可以用于指示接入层安全保护激活。当网络设备为移动性管理网元,比如AMF,则安全模式命令完成消息可以为非接入层安全模式命令完成消息,该消息可以用于指示非接入层安全保护激活。When the network device is an access network element, such as a gNB, the security mode command completion message may be an access layer security mode command completion message, and the message may be used to indicate activation of access layer security protection. When the network device is a mobility management network element, such as an AMF, the security mode command completion message may be a non-access stratum security mode command completion message, and the message may be used to indicate activation of non-access stratum security protection.
实施方式a3Embodiment a3
用于指示终端设备的配置信息需受到安全保护的指示信息为:预设的网络设备的配置信息,或者说预设的网络设备的策略。The indication information used to indicate that the configuration information of the terminal device needs to be protected by security is: preset configuration information of the network device, or a preset policy of the network device.
网络设备的配置信息或策略有多种可能地形式,比如网络设备设置预设的一个时长或多个时长,在设置的预设的时长内,有传输信令需求的终端设备的配置信息需受到安全保护。该示例中,网络设备可以根据预设的时长,若确定当前时刻处于该预设的时长,则确定该终端设备的配置信息需受到安全保护。There are many possible forms of configuration information or policies for network devices. For example, a network device is set to preset one or more durations. Within the preset duration, the configuration information of terminal devices that need to transmit signaling needs to be received safety protection. In this example, the network device may determine that the configuration information of the terminal device needs to be protected by security if it is determined that the current time is within the preset time period according to the preset time period.
又一种可能地实施方式中,网络设备可以设置特性区域的终端设备需受到安全保护,这种情况下,网络设备可以根据终端设备所属区域确定终端设备是否需受到安全保护。该区域可以为该网络设备的信号覆盖区域。In yet another possible implementation manner, the network device can set that terminal devices in a characteristic area need to be protected by security. In this case, the network device can determine whether the terminal device needs to be protected by security according to the area to which the terminal device belongs. The area may be the signal coverage area of the network device.
实施方式a4Embodiment a4
用于指示终端设备的配置信息需受到安全保护的指示信息为:用于指示待发送的信息的信息类型与预设的需受到安全保护的信息类型匹配的信息。The indication information used to indicate that the configuration information of the terminal device needs to be protected by security is: the information used to indicate that the information type of the information to be sent matches the preset information type that needs to be protected by security.
在一种可能地实施方式中,还可以预设一些需受到安全保护的信息类型,比如一些敏感的、需要机密性保护的信息,比如可以包括终端设备的专有配置信息(UE specific config),比如可以包括终端设备的小区配置信息(比如cell group config)、和/或无线承载配置(比如radio bearer config)等。In a possible implementation manner, some types of information that need to be protected by security may also be preset, such as some sensitive information that requires confidentiality protection, such as proprietary configuration information (UE specific config) of the terminal equipment, For example, cell configuration information (such as cell group config) and/or radio bearer configuration (such as radio bearer config) of the terminal device may be included.
在又一种可能地实施方式中,预设的需受到安全保护的信息类型包括以下内容中的至少一项:In yet another possible implementation manner, the preset information types to be protected include at least one of the following:
需受安全保护的媒体访问控制MAC层信息;需受安全保护的无线链路控制RLC层信息;或,需受安全保护的物理PHY层信息。由于MAC层、RLC层和PHY层这些底层信息现有技术中对其保护的程度稍显不足,因此,本申请实施例中可以针对敏感的、需要机密性保护的MAC层、RLC层或PHY层的信息进行额外的保护,从而可以进一步提高用户信息的安全性,降低信息泄露的可能性。MAC layer information that needs to be protected by security; information on the RLC layer that needs to be protected by radio link control; or information on the physical PHY layer that needs to be protected by security. Because the level of protection of the underlying information of the MAC layer, RLC layer and PHY layer is slightly insufficient in the prior art, therefore, in the embodiment of the present application, it is possible to target the sensitive MAC layer, RLC layer or PHY layer that needs confidentiality protection Additional protection of information, which can further improve the security of user information and reduce the possibility of information leakage.
实施方式a5Embodiment a5
用于指示终端设备的配置信息需受到安全保护的指示信息为:终端设备的能力信息和网络设备的能力信息。The indication information used to indicate that the configuration information of the terminal device needs to be protected by security includes: capability information of the terminal device and capability information of the network device.
在该实施例方式中,若终端设备的能力信息指示该终端设有能力支持:终端设备的配置信息受到安全保护,且网络设备的能力信息指示该网络设备支持:对终端设备的配置信息进行安全保护,则网络设备可以确定获取用于指示终端设备的配置信息需受到安全保护的指示信息。In this embodiment, if the capability information of the terminal device indicates that the terminal has capability support: the configuration information of the terminal device is protected by security, and the capability information of the network device indicates that the network device supports: security for the configuration information of the terminal device protection, the network device may determine to acquire the indication information used to indicate that the configuration information of the terminal device needs to be protected by security.
举个例子,若终端设备的能力信息指示:终端设备可以支持网络设备为其重配置用户配置信息,且网络设备也支持为该终端设备重配置用户配置信息,则网络设备可以确定获取用于指示终端设备的配置信息需受到安全保护的指示信息。For example, if the capability information of the terminal device indicates that: the terminal device can support the network device to reconfigure user configuration information for it, and the network device also supports reconfiguring user configuration information for the terminal device, then the network device can determine to obtain An indication that the configuration information of the terminal device needs to be protected by security.
S503,网络设备向终端设备发送第二消息。相对应地,终端设备接收来自网络设备的第二消息。第二消息受到安全保护,第二消息包括终端设备的第二用户配置信息,第二用户配置信息与第一用户配置信息不同。S503. The network device sends the second message to the terminal device. Correspondingly, the terminal device receives the second message from the network device. The second message is protected by security, the second message includes second user configuration information of the terminal device, and the second user configuration information is different from the first user configuration information.
在一种可能地实施方式中,用户配置信息可以包括终端设备的专有配置信息(UE specific config)。再比如,用户配置信息可以包括终端设备的小区配置信息(比如cell group config)、或无线承载配置(比如radio bearer config)等中的至少一项。In a possible implementation manner, the user configuration information may include specific configuration information (UE specific config) of the terminal equipment. For another example, the user configuration information may include at least one item of cell configuration information (such as cell group config) or radio bearer configuration (such as radio bearer config) of the terminal device.
又一种可能地实施方式中,用户配置信息可以包括下行控制信息。第一用户配置信息包括第一下行控制信息;第二用户配置信息包括第二下行控制信息。In yet another possible implementation manner, the user configuration information may include downlink control information. The first user configuration information includes first downlink control information; the second user configuration information includes second downlink control information.
又一种可能地实施方式中,第一用户配置信息或第二用户配置信息中的至少一项包括以下内容中的至少一项:In yet another possible implementation manner, at least one item of the first user configuration information or the second user configuration information includes at least one of the following:
扰码ID;scramble ID;
部分带宽(bandwidth part,BWP);Partial bandwidth (bandwidth part, BWP);
物理下行控制信道(physical downlink control channel,PDCCH)的起始符号的位置;The position of the start symbol of the physical downlink control channel (PDCCH);
PDCCH的起始符号的个数;The number of start symbols of PDCCH;
下行控制信息(downlink control information,DCI)长度;downlink control information (DCI) length;
候选集;或,a candidate set; or,
物理下行共享信道(physical downlink shared channel,PDSCH)的时域表。A time-domain table of a physical downlink shared channel (PDSCH).
下面通过表1示例性示出第一用户配置信息和第二用户配置信息的示例。Table 1 below exemplarily shows examples of the first user configuration information and the second user configuration information.
表1第一用户配置信息和第二用户配置信息的示例Table 1 Example of first user configuration information and second user configuration information
Figure PCTCN2022073692-appb-000001
Figure PCTCN2022073692-appb-000001
如表1所示,针对一个参数项,第二用户配置信息中该参数项的值可以取得与在第一参数项中的参数值不同,比如以PDSCH的时域表为例,该参数最多16行,在第一用户配置信息中可以指示第0行到15行中每行的内容,可以将第一用户配置信息中的0到15行的内容随机变化顺序而得到第二用户配置信息,比如将第一用户配置信息中第0行的内容换到第5行,如此,就可以增加攻击者破解的难度。PDCCH可以指示终端设备使用哪一行。As shown in Table 1, for a parameter item, the value of the parameter item in the second user configuration information can be different from the parameter value in the first parameter item. For example, taking the time domain table of PDSCH as an example, the parameter is at most 16 In the first user configuration information, the contents of each row from row 0 to row 15 can be indicated, and the contents of rows 0 to 15 in the first user configuration information can be randomly changed in order to obtain the second user configuration information, such as Change the content of line 0 in the first user configuration information to line 5, so that the difficulty for an attacker to crack can be increased. The PDCCH may indicate to the terminal device which row to use.
本申请实施例中,第一用户配置信息与第二用户配置信息不同,可以是指第二用户配置信息中至少存在一个参数项,该参数项在第二用户配置信息中的参数值与在第一用户配置信息中的参数值不同。还可以是指第二用户配置信息中的每个参数项的参数值均与该参数项在第一用户配置信息中的参数值不同。第二用户配置信息中的参数项可以与第一用户配置信息中的参数项相同。在又一种可能地实施方式中,第二用户配置信息中的参数项可以与第一用户配置信息中的参数项可以不同,比如第二用户配置信息中的参数项可以少于或多于第一用户配置信息中的参数项。In this embodiment of the application, the difference between the first user configuration information and the second user configuration information may mean that there is at least one parameter item in the second user configuration information, and the parameter value of the parameter item in the second user configuration information is the same as that in the second user configuration information The parameter values in the user configuration information are different. It may also mean that the parameter value of each parameter item in the second user configuration information is different from the parameter value of the parameter item in the first user configuration information. The parameter items in the second user configuration information may be the same as the parameter items in the first user configuration information. In yet another possible implementation manner, the parameter items in the second user configuration information may be different from the parameter items in the first user configuration information, for example, the parameter items in the second user configuration information may be less than or more than the first user configuration information. A parameter item in user configuration information.
在一种可能地实施方式中,第一用户配置信息与第二用户配置信息中的至少一个或全部参数项可以不同。或者第一用户配置信息与第二用户配置信息中全部参数项均相同,但至少一个参数项或全部参数项的取值可以不同。又一种可能地实施方式中,第一用户配置信息和第二用户配置信息的配置对象或内容可以相同,但对象取值不同。In a possible implementation manner, at least one or all parameter items in the first user configuration information and the second user configuration information may be different. Or all the parameter items in the first user configuration information and the second user configuration information are the same, but the value of at least one parameter item or all parameter items may be different. In yet another possible implementation manner, the configuration objects or content of the first user configuration information and the second user configuration information may be the same, but the object values are different.
一种可能地实施方式中,在S503之前包括有S502的情况下,S503可以替换为:网络设备根据用于指示终端设备的配置信息需受到安全保护的指示信息,向终端设备发送携带第二用户配置信息的第二消息。In a possible implementation manner, in the case where S502 is included before S503, S503 may be replaced by: the network device sends to the terminal device the information carrying the second user's Second message of configuration information.
在又一种可能地实施方式中,若网络设备未获取到用于指示终端设备的配置信息需受到安全保护的指示信息,则可以不必要求在第二消息中携带与第一用户配置信息不同的第二用户配置信息,这种情况下,第二消息中可以不携带或不携带用户配置信息,比如可以携带第一用户配置信息,但是不再要求第二消息中携带的用户配置信息与第一用户配置信息不同。若第二消息中未携带用户配置信息,则终端设备可以根据第一消息中的第一用户配置信息与网络设备之间传输数据,若第二消息中携带了用户配置信息,则终端设备可以根据第二消息中携带的用户配置信息与网络设备之间传输数据。由于第一消息未受到安全保护,因此第一消息中的第一用户配置信息泄露的可能性较大,而虽然第二消息受到了安全保护,若不要求第二消息中携带的用户配置信息与第一用户配置信息不同,则攻击者可能依据获取的第一消息中的第一用户配置信息进一步盗取其他信息,从而导致信息泄露程度较为严重。In yet another possible implementation manner, if the network device does not obtain the indication information used to indicate that the configuration information of the terminal device needs to be protected by security, it may not be required to carry the information different from the first user configuration information in the second message. The second user configuration information. In this case, the second message may not carry or not carry the user configuration information, for example, it may carry the first user configuration information, but it is no longer required that the user configuration information carried in the second message User configuration information is different. If the second message does not carry user configuration information, the terminal device can transmit data with the network device according to the first user configuration information in the first message; if the second message carries user configuration information, the terminal device can transmit data according to Data is transmitted between the user configuration information carried in the second message and the network device. Since the first message is not protected by security, the first user configuration information in the first message is more likely to be leaked, and although the second message is protected by security, if the user configuration information carried in the second message is not required to be consistent with If the configuration information of the first user is different, the attacker may further steal other information according to the configuration information of the first user in the obtained first message, resulting in a relatively serious degree of information leakage.
S504,网络设备根据第二用户配置信息与终端设备之间进行数据传输。S504, the network device performs data transmission with the terminal device according to the second user configuration information.
通过上述内容可以看出,由于第一消息未受到安全保护,因此第一消息中的第一用户配置信息泄露的可能性较大,而第二消息受到了安全保护,且要求第二消息中携带的第二用户配置信息与第一用户配置信息不同,因此,攻击者获取第二用户配置信息的可能性较小,进而依据第二用户配置信息去进一步盗取其他信息的可能性也较小,从而可以降低信息泄露程度的程度。From the above content, it can be seen that since the first message is not protected by security, the first user configuration information in the first message is more likely to be leaked, while the second message is protected by security, and the second message is required to carry The configuration information of the second user is different from the configuration information of the first user. Therefore, the possibility of the attacker obtaining the configuration information of the second user is relatively small, and the possibility of further stealing other information based on the configuration information of the second user is also small. Thereby, the degree of information leakage can be reduced.
基于图5所示的内容,图6示例性示出了本申请实施例提供的另一种通信方法的流程示意图。下面结合图6以网络设备为gNB,以第一消息为RRC建立响应,第二消息为RRC重配置消息为例进行介绍。如图6所示,该方法包括:Based on the content shown in FIG. 5 , FIG. 6 exemplarily shows a schematic flowchart of another communication method provided by the embodiment of the present application. In the following, the network device is the gNB, the first message is the RRC establishment response, and the second message is the RRC reconfiguration message as an example to introduce in conjunction with FIG. 6 . As shown in Figure 6, the method includes:
S601,终端设备向网络设备发送随机接入请求。网络设备接收来自终端设备的随机接入请求。S601. The terminal device sends a random access request to the network device. A network device receives a random access request from a terminal device.
一种可能地实施方式中,当终端设备处于空闲态时,终端设备和网络设备处于失步状态,终端设备缺少可使用的上行资源。一旦终端设备需要发送上行数据或下载下行数据时,需要通过随机接入过程,从空闲态切换至连接态。当终端设备发起随机接入过程,则可以执行S601。In a possible implementation manner, when the terminal device is in an idle state, the terminal device and the network device are in an out-of-synchronization state, and the terminal device lacks available uplink resources. Once the terminal device needs to send uplink data or download downlink data, it needs to switch from the idle state to the connected state through a random access process. When the terminal device initiates a random access procedure, S601 may be executed.
随机接入请求可以为random access preamble。The random access request can be a random access preamble.
S602,网络设备向终端设备发送随机接入响应,并在随机接入响应中对终端设备进行上行授权。终端设备接收来自网络设备的随机接入响应。S602. The network device sends a random access response to the terminal device, and performs uplink authorization on the terminal device in the random access response. The terminal device receives the random access response from the network device.
随机接入响应可以为random access response。The random access response may be a random access response.
S603,终端设备可以发送RRC建立请求(也可以称为RRC建立请求消息)。网络设备可以接收来自终端设备的RRC建立请求。S603, the terminal device may send an RRC establishment request (also called an RRC establishment request message). The network device can receive the RRC establishment request from the terminal device.
RRC建立请求可以为RRC setup request。The RRC establishment request may be an RRC setup request.
S604,网络设备向终端设备发送RRC建立响应(也可以称为RRC建立、或RRC建立响应消息)。RRC建立响应中包括第一用户配置信息。终端设备可以接收来自网络设备的RRC建立响应。S604, the network device sends an RRC establishment response (also referred to as RRC establishment, or an RRC establishment response message) to the terminal device. The RRC setup response includes first user configuration information. The terminal device may receive the RRC setup response from the network device.
本申请实施例中S604可以前述S501中的一个示例,第一消息可以为S604中的RRC建立响应。In this embodiment of the present application, S604 may be an example of the foregoing S501, and the first message may be an RRC establishment response in S604.
RRC建立响应可以写为RRC setup,或RRC setup response。The RRC establishment response can be written as RRC setup, or RRC setup response.
用户配置信息可以包括用户专用配置信息(比如,UE-specific config)。User configuration information may include user-specific configuration information (eg, UE-specific config).
用户配置信息可以包括终端设备的小区配置信息(比如cell group config)、或无线承载配置(比如radio bearer config)等中的至少一项。其中小区配置信息(比如cell group config)可以包括对MAC层、phy层、RLC层中信令无线承载(signaling radio bearer,SRB)1消息的配置。The user configuration information may include at least one item of cell configuration information (such as cell group config) or radio bearer configuration (such as radio bearer config) of the terminal device. The cell configuration information (such as cell group config) may include the configuration of the signaling radio bearer (signaling radio bearer, SRB) 1 message in the MAC layer, the phy layer, and the RLC layer.
S605,终端设备在核心网中进行注册流程或服务请求流程,并激活接入层或非接入安全。S605. The terminal device performs a registration process or a service request process in the core network, and activates access layer or non-access security.
在一种可能地实施方式中,当网络设备接收安全模式命令完成消息,并校验成功,则意味着接入层或非接入层安全激活。In a possible implementation manner, when the network device receives the security mode command completion message and the verification is successful, it means that the security of the access layer or the non-access layer is activated.
S606,网络设备获取用于指示终端设备的配置信息需受到安全保护的指示信息。该S606可以参见前述S502的相关内容,在此不再赘述。S606. The network device acquires indication information used to indicate that the configuration information of the terminal device needs to be protected by security. For this S606, reference may be made to the related content of the aforementioned S502, which will not be repeated here.
需要说明的是,S606为可选步骤,可执行,也可以不执行。图中S606为虚线,表示S606为可选择执行的步骤。It should be noted that S606 is an optional step, which may or may not be executed. In the figure, S606 is a dotted line, indicating that S606 is an optional step to be executed.
S607,网络设备向终端设备发送RRC重配置消息,RRC重配置消息中包括第二用户配置信息,且第二用户配置信息与第一用户配置信息不同。S607. The network device sends an RRC reconfiguration message to the terminal device, where the RRC reconfiguration message includes second user configuration information, and the second user configuration information is different from the first user configuration information.
S607可以参见前述S503中的相关内容,在此不再赘述。For S607, reference may be made to relevant content in the aforementioned S503, which will not be repeated here.
RRC重配置消息可以为RRC reconfig。The RRC reconfiguration message may be RRC reconfig.
第二消息可以为RRC重配置消息。The second message may be an RRC reconfiguration message.
S608,终端设备向网络设备发送RRC重配置完成消息。S608. The terminal device sends an RRC reconfiguration complete message to the network device.
一种可能地实施方式中,终端设备成功解析RRC重配置消息中的内容后,在验证完整性保护成功后,返回RRC重配置完成消息。In a possible implementation manner, after successfully parsing the content in the RRC reconfiguration message, the terminal device returns an RRC reconfiguration complete message after verifying that the integrity protection is successful.
需要说明的是,S601至S604可以传输在公共信道上,安全保护还未激活。攻击者可以获得所有消息。S605后,终端设备和网络设备可以根据用户配置信息进行配置,后续消息可以传输在终端设备特定的信道上。It should be noted that S601 to S604 can be transmitted on a public channel, and the security protection has not been activated yet. All messages are available to the attacker. After S605, the terminal device and the network device can be configured according to the user configuration information, and subsequent messages can be transmitted on a channel specific to the terminal device.
需要说明的是,本申请实施例中在S605之后可以发起多次RRC重配置消息,在一种可能地实施方式中,可以要求后续的RRC重配置消息中携带的用户配置信息与第一用户配置信息不同。在又一种可能地实施方式中,可以要求RRC重配置消息中与之前的RRC重配置消息中携带的用户配置消息和第一用户配置消息中的任一项均不同。如此,可以进一步提高安全性。It should be noted that in the embodiment of the present application, multiple RRC reconfiguration messages may be initiated after S605. In a possible implementation manner, the user configuration information carried in subsequent RRC reconfiguration messages may be required to be consistent with the first user configuration information. The information is different. In yet another possible implementation manner, it may be required that any one of the user configuration message and the first user configuration message carried in the RRC reconfiguration message is different from that carried in the previous RRC reconfiguration message. In this way, security can be further improved.
通过上述内容更可以看出,在非接入层或接入层安全激活前,消息均是明文传输,因此攻击者可以获取第一用户配置信息,由于RRC重配置消息发生在非接入层或接入层安全激活后,受完整性和机密性安全保护。因此攻击者无法获知RRC重配置消息中的第二用户配置信息。From the above content, it can be seen that before the security activation of the non-access layer or the access layer, the messages are transmitted in plain text, so the attacker can obtain the configuration information of the first user. Since the RRC reconfiguration message occurs in the non-access layer or After the access layer security is activated, it is protected by integrity and confidentiality security. Therefore, the attacker cannot obtain the configuration information of the second user in the RRC reconfiguration message.
但是若不要求第二用户配置信息和第一用户配置信息不同,则基于某些因素,比如配置速度等,可能会导致RRC重配置消息中不携带用户配置信息(这种情况下终端设备依据第一用户配置信息与网络设备之间传输数据),或者较大可能性RRC重配置消息中携带的用户配置信息与第一用户配置信息相同,如此,攻击者可能会依据获取的第一用户配置 信息去获取终端设备和网络设备之间的数据包,并对PHY层、MAC层、RLC层消息进行监听和篡改。进一步可能会导致终端设备和网络设备之间资源配置错误,传输性能下降,甚至连接中断。攻击者窃听消息,也可能导致终端设备的隐私泄露。However, if the second user configuration information is not required to be different from the first user configuration information, based on certain factors, such as configuration speed, etc., the RRC reconfiguration message may not carry the user configuration information (in this case, the terminal device according to the transmission of data between a user configuration information and a network device), or it is more likely that the user configuration information carried in the RRC reconfiguration message is the same as the first user configuration information, so the attacker may use the acquired first user configuration information To obtain data packets between terminal equipment and network equipment, and monitor and tamper with PHY layer, MAC layer, and RLC layer messages. Further, it may lead to misconfiguration of resources between terminal devices and network devices, degradation of transmission performance, and even interruption of connections. Attackers eavesdropping on messages may also lead to privacy leaks of terminal devices.
而本申请实施例中要求RRC重配置消息中携带于第一用户配置信息不同的第二用户配置信息,因此,攻击者想要获取终端设备的数据包时,无法依据第一用户配置信息去获取,而是需要猜测该终端设备的物理层参数配置,比如DCI中的如扰码ID,BWP,PDCCH起始符号的位置/个数,DCI长度,不同的候选集等等参数。由于第二用户配置信息中的DCI信息对攻击者来说不可见,因此可以一定程度上实现数据的隐藏,可以加大攻击难度,进而可以降低信息泄露的可能性。However, in the embodiment of the present application, the second user configuration information different from the first user configuration information is required to be carried in the RRC reconfiguration message. Therefore, when an attacker wants to obtain the data packet of the terminal device, he cannot obtain it based on the first user configuration information. , but need to guess the physical layer parameter configuration of the terminal device, such as parameters in DCI such as scrambling code ID, BWP, position/number of PDCCH start symbols, DCI length, different candidate sets, etc. Since the DCI information in the second user configuration information is invisible to the attacker, the data can be hidden to a certain extent, which can increase the difficulty of the attack, thereby reducing the possibility of information leakage.
基于上述内容,图7示例性示出了一种通信方法的流程示意图,该通信方法可以由网络设备和终端设备执行,其中,终端设备比如可以为前述图1、图2、图3a、图3b或图4中的终端设备,网络设备比如可以为前述图1、图2、图3a、图3b或图4中的接入网网元(比如gNB)或移动性管理网元(比如AMF),也可以为其他网元,此处仅以该两个网元进行举例。也可以由网络设备内部的芯片或部件以及终端设备内部的芯片或部件执行。如图7所示,该方法包括:Based on the above content, FIG. 7 exemplarily shows a schematic flow chart of a communication method, which can be executed by a network device and a terminal device, where the terminal device can be, for example, the aforementioned FIG. 1, FIG. 2, FIG. 3a, and FIG. 3b Or the terminal device in FIG. 4, the network device may be, for example, the access network element (such as gNB) or the mobility management network element (such as AMF) in the aforementioned FIG. 1, FIG. 2, FIG. 3a, FIG. 3b or FIG. 4, It may also be other network elements, and only these two network elements are used as examples here. It can also be executed by chips or components inside the network equipment and chips or components inside the terminal equipment. As shown in Figure 7, the method includes:
S701,网络设备向终端设备发送第三消息。终端设备接收来自网络设备的第三消息。第三消息包括第一指示信息,第一指示信息用于指示终端设备对应的第一对应关系,第一对应关系为信息类型标识与索引值的对应关系。S701. The network device sends a third message to the terminal device. The terminal device receives the third message from the network device. The third message includes first indication information, where the first indication information is used to indicate a first correspondence relationship corresponding to the terminal device, and the first correspondence relationship is a correspondence relationship between an information type identifier and an index value.
在一种可能地实施方式中,第三消息受到安全保护。如此,第一指示信息的传输过程可以更加安全。In a possible implementation manner, the third message is protected by security. In this way, the transmission process of the first indication information can be more secure.
在又一种可能地实施方式中,第三消息可以发生在前述S605之后,即终端设备在核心网中进行注册流程或服务请求流程,并激活接入层或非接入安全之后,如此,第三消息可以受到安全保护,进而可以提高信息传输的安全性。在又一种可能地实施方式中,第三消息为无线资源控制RRC层消息,比如可以在前述的RRC重配置消息,可以为前述S607中的RRC重配置消息,也可以为其他的RRC重配置消息。如此,第三消息可以受到安全性保护,从而可以提高信息传输的安全性。In yet another possible implementation manner, the third message may occur after the aforementioned S605, that is, after the terminal device performs a registration process or a service request process in the core network, and activates the access layer or non-access security, thus, the first Three messages can be protected, thereby improving the security of information transmission. In yet another possible implementation manner, the third message is a radio resource control RRC layer message, such as the aforementioned RRC reconfiguration message, the aforementioned RRC reconfiguration message in S607, or other RRC reconfiguration messages. information. In this way, the third message can be protected by security, so that the security of information transmission can be improved.
第一对应关系中的索引值可以通过以下内容中的一项得到:The index value in the first correspondence can be obtained by one of the following:
通过随机化算法计算得到;Calculated by randomization algorithm;
根据预设规则得到;Obtained according to preset rules;
根据信息类型标识和预设的第一计算公式计算得到;或者,Calculated according to the information type identification and the preset first calculation formula; or,
根据预设值和预设的第二计算公式计算得到的。Calculated according to the preset value and the second preset calculation formula.
第一指示信息可以为第一对应关系,或者为用于指示第一对应关系的指示信息,终端设备可以根据用于指示第一对应关系的指示信息计算出或确定出信息类型标识与索引值的对应关系。比如若索引值通过预设规则得到,则第一指示信息可以为该预设规则,终端设备可以根据该预设规则确定出信息类型标识与索引值的对应关系。再比如,若索引值通过该信息类型标识和预设的第一计算公式计算得到,第一指示信息也可以为预设的第一计算公式,终端设备可以根据该预设的第一计算公式确定出信息类型标识与索引值的对应关系。再比如,若索引值通过该预设值和预设的第二计算公式计算得到,第一指示信息也可以为预设的第二计算公式和预设值,终端设备可以根据该预设值和预设的第二计算公式确 定出信息类型标识与索引值的对应关系。The first indication information may be the first correspondence, or indication information used to indicate the first correspondence, and the terminal device may calculate or determine the information type identifier and the index value according to the indication information used to indicate the first correspondence. Correspondence. For example, if the index value is obtained through a preset rule, the first indication information may be the preset rule, and the terminal device may determine the correspondence between the information type identifier and the index value according to the preset rule. For another example, if the index value is calculated by the information type identifier and the preset first calculation formula, the first indication information can also be the preset first calculation formula, and the terminal device can determine the The corresponding relationship between the information type identifier and the index value is displayed. For another example, if the index value is calculated by the preset value and the preset second calculation formula, the first indication information can also be the preset second calculation formula and the preset value, and the terminal device can The preset second calculation formula determines the corresponding relationship between the information type identifier and the index value.
本申请实施例中“信息类型标识与索引值的对应关系”的粒度可以为终端设备的粒度,即可以为每个终端设备建立该终端设备对应的“信息类型标识与索引值的对应关系”,两个终端设备对应的“信息类型标识与索引值的对应关系”可以不同。比如,将前述第一对应关系对应的终端设备称为第一终端设备,第一终端设备对应的第一对应关系中包括有第一信息类型标识与第一索引值的对应关系。第二终端设备(第二终端设备是指与前述第一对应关系对应的终端设备不同的一个终端设备,为了区分,此处称为第二终端设备)对应第二对应关系,第二对应关系包括第一信息类型标识与第二索引值的对应关系。第一索引值和第一索引值不同。即针对至少一个信息类型标识,在不同的两个终端设备对应的“信息类型标识与索引值的对应关系”中可以得到两个不同的值。也就是说,本申请实施例中并不是针对所有终端设备都采用同一套信息类型标识与索引值的对应关系,而是可以针对不同的终端设备单独设置,从而可以进一步提高安全性。The granularity of the "correspondence between information type identifiers and index values" in the embodiment of the present application may be the granularity of the terminal device, that is, the "correspondence between information type identifiers and index values" corresponding to the terminal device can be established for each terminal device, The "correspondence relationship between information type identifiers and index values" corresponding to two terminal devices may be different. For example, the terminal device corresponding to the foregoing first correspondence is referred to as a first terminal device, and the first correspondence corresponding to the first terminal device includes a correspondence between a first information type identifier and a first index value. The second terminal device (the second terminal device refers to a terminal device different from the terminal device corresponding to the aforementioned first correspondence, for the sake of distinction, it is referred to as the second terminal device herein) corresponds to the second correspondence, and the second correspondence includes The correspondence between the first information type identifier and the second index value. The first index value and the first index value are different. That is, for at least one information type identifier, two different values may be obtained in the "correspondence relationship between information type identifiers and index values" corresponding to two different terminal devices. That is to say, the embodiment of the present application does not use the same set of correspondence between information type identifiers and index values for all terminal devices, but can be set separately for different terminal devices, thereby further improving security.
本申请实施例中“信息类型标识与索引值的对应关系”的粒度可以为承载的粒度,即可以为一个终端设备的每个承载可以建立该终端设备的该承载对应的“信息类型标识与索引值的对应关系”,该终端设备的两个承载对应的“信息类型标识与索引值的对应关系”可以不同。比如,前述第一对应关系为第一终端设备的第一承载对应的,第一承载对应的第一对应关系中包括有第一信息类型标识与第一索引值的对应关系。该第一终端设备的第二承载还对应第二对应关系,第二对应关系包括第一信息类型标识与第二索引值的对应关系。第一索引值和第一索引值不同。即针对至少一个信息类型标识,在同一个终端设备的至少两个承载对应的“信息类型标识与索引值的对应关系”中可以得到两个不同的值。也就是说,本申请实施例中并不是针对终端设备的所有承载都采用同一套信息类型标识与索引值的对应关系,而是可以针对终端设备的不同承载单独设置,从而可以进一步提高安全性。In the embodiment of the present application, the granularity of "correspondence between information type identifier and index value" may be the granularity of bearer, that is, for each bearer of a terminal device, the "information type identifier and index value" corresponding to the bearer of the terminal device can be established. The corresponding relationship between the two bearers of the terminal device may be different from the corresponding relationship between the information type identifier and the index value. For example, the aforementioned first correspondence corresponds to the first bearer of the first terminal device, and the first correspondence corresponding to the first bearer includes a correspondence between the first information type identifier and the first index value. The second bearer of the first terminal device also corresponds to a second correspondence, and the second correspondence includes a correspondence between the first information type identifier and the second index value. The first index value and the first index value are different. That is, for at least one information type identifier, two different values can be obtained in the "correspondence relationship between information type identifiers and index values" corresponding to at least two bearers of the same terminal device. That is to say, the embodiment of the present application does not use the same set of correspondence between information type identifiers and index values for all bearers of the terminal device, but can be set separately for different bearers of the terminal device, thereby further improving security.
S702,网络设备向终端设备发送第四消息。终端设备接收来自网络设备的第四消息。第四消息包括:第四消息对应的信息类型标识在第一对应关系中对应的索引值。S702. The network device sends a fourth message to the terminal device. The terminal device receives the fourth message from the network device. The fourth message includes: an index value corresponding to the information type identifier corresponding to the fourth message in the first correspondence.
S703,终端设备根据第一指示信息,确定出第四消息中的索引值对应的信息类型标识。S703. The terminal device determines the information type identifier corresponding to the index value in the fourth message according to the first indication information.
在一种可能地实施方式中,在S702或S701之前,还可以包括:网络设备获取用于指示终端设备的配置信息需受到安全保护的指示信息。一种可能地实施方式中,上述S702可以替换为:网络设备根据用于指示终端设备的配置信息需受到安全保护的指示信息,向终端设备发送第四消息。该步骤的相关内容更可以参见前述关于S502中实施方式a1至实施方式a5的介绍,在此不再赘述。基于前述实施方式a5举个例子,比如终端设备的能力信息指示:终端设备有能力支持根据第一指示信息确定第一对应关系,并根据第一对应关系确定出第四消息中的索引值对应的信息类型标识,且网络设备具有能力生成第一对应关系,并根据第一对应关系,在第四消息中承载信息类型标识的字段承载该信息类型标识的字段对应的索引值,则网络设备确定获取用于指示终端设备的配置信息需受到安全保护的指示信息。In a possible implementation manner, before S702 or S701, the method may further include: the network device acquires indication information for indicating that the configuration information of the terminal device needs to be protected by security. In a possible implementation manner, the foregoing S702 may be replaced with: the network device sends the fourth message to the terminal device according to the indication information used to indicate that the configuration information of the terminal device needs to be protected by security. For the relevant content of this step, please refer to the above-mentioned introduction about the implementation manner a1 to the implementation manner a5 in S502, which will not be repeated here. For example, based on the aforementioned embodiment a5, for example, the capability information of the terminal device indicates that the terminal device is capable of supporting the determination of the first correspondence according to the first indication information, and determines the index value corresponding to the index value in the fourth message according to the first correspondence. information type identification, and the network device has the ability to generate the first correspondence, and according to the first correspondence, the field carrying the information type identification in the fourth message carries the index value corresponding to the field carrying the information type identification, then the network device determines to obtain The instruction information used to indicate that the configuration information of the terminal device needs to be protected by security.
通过上述方案可以看出,通过建立“信息类型标识与索引值的对应关系”,可以不必在第四消息中承载信息类型标识,而是在第四消息中承载信息类型标识对应的索引值,如此,即使攻击者获取了第四消息,但若没有“信息类型标识与索引值的对应关系”,也很难正确获取第四消息的信息类型标识,从而可以进一步提高安全性。It can be seen from the above scheme that by establishing the "correspondence relationship between the information type identifier and the index value", it is not necessary to carry the information type identifier in the fourth message, but the index value corresponding to the information type identifier is carried in the fourth message, so , even if the attacker obtains the fourth message, if there is no "correspondence between the information type identifier and the index value", it is difficult to correctly obtain the information type identifier of the fourth message, thereby further improving security.
在又一种可能地实施方式中,第四消息为MAC层消息、RLC层消息,或PHY层消息。 第四消息未受到安全保护。如此,一方面可以兼顾消息的传输效率,另一方面由于对第四消息中的信息类型标识进行了保护,即第四消息中并不承载信息类型标识,而是承载其对应的索引值,因此可以降低第四消息中的信息类型标识泄露的可能性,从而可以进一步提高安全性。In yet another possible implementation manner, the fourth message is a MAC layer message, an RLC layer message, or a PHY layer message. The fourth message is not secured. In this way, on the one hand, the transmission efficiency of the message can be taken into account, and on the other hand, because the information type identifier in the fourth message is protected, that is, the fourth message does not carry the information type identifier, but carries its corresponding index value, so The possibility of leakage of the information type identifier in the fourth message can be reduced, thereby further improving security.
在一种可能地实施方式中,第四消息为:包括MAC控制单元(MAC Control Element,MAC CE)的消息。第四消息可以在前述网络设备接收到终端设备发送的RRC重配置完成消息(RRC重配置消息为前述第三消息)之后发送。In a possible implementation manner, the fourth message is: a message including a MAC Control Element (MAC Control Element, MAC CE). The fourth message may be sent after the aforementioned network device receives the RRC reconfiguration complete message sent by the terminal device (the RRC reconfiguration message is the aforementioned third message).
图8示例性示出了一种可能的MAC PDU的结构示意图,如图8所示,MAC PDU可以由1个MAC头(MAC header)+0个或多个MAC业务数据单元(service data unit,SDU)+0个或多个MAC CE+可能存在的填充(padding)组成。Fig. 8 exemplarily shows a schematic structural diagram of a possible MAC PDU. As shown in Fig. 8, a MAC PDU may consist of 1 MAC header (MAC header)+0 or more MAC service data units (service data unit, SDU)+0 or more MAC CE+possible padding.
其中,MAC头(MAC header)由一个或多个MAC子头(MAC sub-header)组成。每个MAC子头(MAC sub-header)对应的字段可以为一个MAC PDU,或一个MAC CE,或padding。Wherein, the MAC header (MAC header) is composed of one or more MAC sub-headers (MAC sub-header). The field corresponding to each MAC sub-header can be a MAC PDU, or a MAC CE, or padding.
MAC PDU中的MAC子头(MAC sub-header)可以包含以下几种类型:The MAC sub-header (MAC sub-header) in the MAC PDU can contain the following types:
除了MAC PDU内的最后一个MAC子头(MAC sub-header)和用于固定长度的MAC CE的MAC子头(MAC sub-header)外,其它MAC子头(MAC sub-header)可以有6个域组成:R/R/E/LCID/F/L。MAC PDU内的最后一个MAC子头(MAC sub-header)和用于固定长度的MAC CE的MAC子头(MAC sub-header)由4个域组成:R/R/E/LCID。对应padding的MAC子头(MAC sub-header)也由4个域组成:R/R/E/LCID。In addition to the last MAC sub-header (MAC sub-header) in the MAC PDU and the MAC sub-header (MAC sub-header) for the fixed-length MAC CE, there can be 6 other MAC sub-headers (MAC sub-header) Domain composition: R/R/E/LCID/F/L. The last MAC sub-header (MAC sub-header) in the MAC PDU and the MAC sub-header (MAC sub-header) for the fixed-length MAC CE consist of 4 fields: R/R/E/LCID. The MAC sub-header (MAC sub-header) corresponding to padding also consists of 4 fields: R/R/E/LCID.
其中:R:可以表示预留比特位,设置为0。Among them: R: It can represent a reserved bit, which is set to 0.
E:可以表示用来指明接下来的是数据域还是MAC头域,1表示接下来是下一个Mac sub-header,0表示接下来是数据域。E: It can be used to indicate whether the following is the data field or the MAC header field. 1 means that the next Mac sub-header is next, and 0 means that the next is the data field.
F:可以表示L域的长度是7个比特还是15个比特,当L指示的长度超过127时置为1,否则为0。F: It can indicate whether the length of the L field is 7 bits or 15 bits. When the length indicated by L exceeds 127, it is set to 1, otherwise it is 0.
L:可以表示MAC CE或MAC SDU的数据长度。L: It can indicate the data length of MAC CE or MAC SDU.
LCID:为逻辑信道标识(logical channel ID,LCID)的简称,LCID域可以用于承载LCID的代码点或初始索引值。LCID域承载的信息用于指示该MAC子头(MAC sub-header)对应的MAC SDU、或对应的MAC CE的类型、或对应的padding。LCID的值与LCID的代码点或初始索引值的对应关系如下述表2所示。LCID: short for logical channel ID (LCID). The LCID field can be used to carry the code point or initial index value of the LCID. The information carried by the LCID field is used to indicate the MAC SDU corresponding to the MAC sub-header, or the type of the corresponding MAC CE, or the corresponding padding. The corresponding relationship between the value of the LCID and the code point or initial index value of the LCID is shown in Table 2 below.
表2 DL-共享信道(Shared CHannel,SCH)中LCID的值与LCID的代码点或初始索Table 2 DL-Shared CHannel (Shared CHannel, SCH) in the value of LCID and the code point or initial index of LCID
引值的对应关系示意表Schematic diagram of the corresponding relationship between the quoted values
Figure PCTCN2022073692-appb-000002
Figure PCTCN2022073692-appb-000002
本申请实施例中,在MAC子头(MAC sub-header)中可以包括信息类型标识,用于指示该MAC子头(MAC sub-header)对应的字段承载的信息的信息类型。信息类型标识也可以称为信息目的标识、信息作用标识等等。在一种可能地实施方式中,信息类型标识可以为逻辑信道标识(logical channel ID,LCID)的代码点或初始索引值。本申请实施例中为了区分将标准中定义的LCID对应的索引值称为初始索引值。将本申请实施例中第一对应关系中的索引值称为索引值。本申请实施例中可以建立索引值与信息类型标识的对应关系,下面以信息类型标识为LCID的代码点为例,通过表3示例性示出了一种可能地索引值、LCID的代码点和LCID值之间的对应关系。In the embodiment of the present application, the MAC sub-header (MAC sub-header) may include an information type identifier, which is used to indicate the information type of the information carried by the field corresponding to the MAC sub-header (MAC sub-header). Information type identification may also be called information purpose identification, information role identification, and so on. In a possible implementation manner, the information type identifier may be a code point or an initial index value of a logical channel identifier (logical channel ID, LCID). In this embodiment of the present application, in order to distinguish, the index value corresponding to the LCID defined in the standard is called the initial index value. The index value in the first correspondence in the embodiment of the present application is referred to as an index value. In the embodiment of the present application, the corresponding relationship between the index value and the information type identifier can be established. Taking the code point whose information type identifier is LCID as an example, a possible index value, LCID code point and Correspondence between LCID values.
表3 DL-SCH中索引值、LCID的代码点和LCID值之间的对应关系示意表Table 3 Correspondence between index value, LCID code point and LCID value in DL-SCH
Figure PCTCN2022073692-appb-000003
Figure PCTCN2022073692-appb-000003
如表3所示,第四消息为辅小区激活消息,第四消息用于请求激活辅小区。这种情况下,第四消息中的信息类型标识(LCID代码点)应为58。根据表3确定其对应的索引值为50,则在第四消息中用于承载信息类型标识的字段承载50,而非58。当攻击者获取第四消息之后,若其不知道索引值和信息类型标识之间的对应关系,则会根据第四消息中承载的50确定该消息为SP SRS激活信令,而并不知道该第四消息为辅小区激活消息。可以看出,通过本申请实施例提供的方案可以实现对第四消息中消息头中的信息类型标识的隐藏和保护,从而可以进一步提高安全性,使得攻击者无法正确理解消息类型,加大攻击者的攻击难度。As shown in Table 3, the fourth message is a secondary cell activation message, and the fourth message is used to request activation of the secondary cell. In this case, the information type identifier (LCID code point) in the fourth message should be 58. It is determined according to Table 3 that the corresponding index value is 50, then the field used to carry the information type identifier in the fourth message carries 50 instead of 58. After the assailant obtains the fourth message, if he does not know the correspondence between the index value and the information type identifier, he will determine that the message is SP SRS activation signaling according to the 50 carried in the fourth message, and he does not know the The fourth message is a secondary cell activation message. It can be seen that the scheme provided by the embodiment of the present application can realize the hiding and protection of the information type identification in the message header of the fourth message, so that the security can be further improved, so that the attacker cannot correctly understand the message type and increase the attack speed. The attack difficulty of the attacker.
基于上述内容,图9示例性示出了本申请实施例提供的又一种通信方法的流程示意图,该通信方法可以由网络设备和终端设备执行,其中,终端设备比如可以为前述图1、图2、图3a、图3b或图4中的终端设备,网络设备比如可以为前述图1、图2、图3a、图3b或图4中的接入网网元(比如gNB)或移动性管理网元(比如AMF),也可以为其他网元,此处仅以该两个网元进行举例。也可以由网络设备内部的芯片或部件以及终端设备内部的芯片或部件执行。如图9所示,该方法包括:Based on the above content, FIG. 9 exemplarily shows a schematic flowchart of another communication method provided by the embodiment of the present application. The communication method can be executed by a network device and a terminal device, where the terminal device can be, for example, the aforementioned FIG. 1 and FIG. 2. The terminal device in Figure 3a, Figure 3b or Figure 4, the network device can be, for example, the access network element (such as gNB) or mobility management network element (such as gNB) in Figure 1, Figure 2, Figure 3a, Figure 3b or Figure 4 mentioned above The network element (such as AMF) may also be other network elements, and only these two network elements are used as examples here. It can also be executed by chips or components inside the network equipment and chips or components inside the terminal equipment. As shown in Figure 9, the method includes:
S901,网络设备向终端设备发送第三消息。终端设备接收来自网络设备的第三消息。第三消息包括第二指示信息,第二指示信息用于指示第三对应关系。第三对应关系包括终端设备的N1个辅小区的小区标识与小区索引号之间的对应关系。N1为正整数。其中,第 三对应关系是根据N0个小区得到的,N0个小区包括N1个辅小区和预设的N2个干扰小区,N2为正整数,N0为N1和N2的和。S901. The network device sends a third message to the terminal device. The terminal device receives the third message from the network device. The third message includes second indication information, where the second indication information is used to indicate the third correspondence. The third correspondence includes the correspondence between cell identities and cell index numbers of the N1 secondary cells of the terminal device. N1 is a positive integer. Wherein, the third corresponding relationship is obtained based on N0 cells, and N0 cells include N1 secondary cells and preset N2 interfering cells, N2 is a positive integer, and N0 is the sum of N1 and N2.
本申请实施例中主小区是对N1个辅小区和预设的N2个干扰小区一起进行小区编号,从而得到N1个辅小区和N2个干扰小区对应的小区索引号。在一种可能地实施方式中,第三对应关系中还可以包括N2个干扰小区的小区索引号。In the embodiment of the present application, the primary cell numbers the N1 secondary cells and the preset N2 interfering cells together, so as to obtain the cell index numbers corresponding to the N1 secondary cells and the N2 interfering cells. In a possible implementation manner, the third correspondence may further include cell index numbers of the N2 interfering cells.
在一种可能地实施方式中,可以随机生成每个小区的小区索引号,各个小区之间可以不必有排序关系。在又一种可能地实施方式中可以依据小区的标识对小区排序,依序生成各个小区的小区索引号。这种情况下,一种可能地实施方式中,当N1为大于1的整数时,在两个辅小区之间至少排列一个干扰小区。In a possible implementation manner, the cell index number of each cell may be randomly generated, and there may not be a sorting relationship among the cells. In yet another possible implementation manner, the cells may be sorted according to their identifiers, and the cell index numbers of the cells are sequentially generated. In this case, in a possible implementation manner, when N1 is an integer greater than 1, at least one interfering cell is arranged between two secondary cells.
第二指示信息可以为第三对应关系,或者为用于指示第三对应关系的指示信息,终端设备可以根据用于指示第三对应关系的指示信息确定出小区标识与小区索引号的对应关系。比如若小区索引号通过预设规则得到,则第二指示信息可以为该预设规则,终端设备可以根据该预设规则确定出小区标识与小区索引号的对应关系,比如预设规则可以为根据小区标识排序,并在第一个小区之后连续增加三个干扰小区,根据排序后的小区依序编号,得到小区的索引号。The second indication information may be the third correspondence, or indication information for indicating the third correspondence, and the terminal device may determine the correspondence between the cell identifier and the cell index number according to the indication information for indicating the third correspondence. For example, if the cell index number is obtained through a preset rule, the second indication information may be the preset rule, and the terminal device may determine the correspondence between the cell ID and the cell index number according to the preset rule. For example, the preset rule may be based on The cell identifiers are sorted, and three interfering cells are continuously added after the first cell, and the index numbers of the cells are obtained according to the sequence numbers of the sorted cells.
本申请实施例中“小区标识与小区索引号的对应关系”的粒度可以为终端设备的粒度,即可以为每个终端设备建立该终端设备对应的“小区标识与小区索引号的对应关系”,两个终端设备对应的“小区标识与小区索引号的对应关系”可以不同。比如,将前述第三对应关系对应的终端设备称为第一终端设备,第一终端设备对应的第三对应关系中包括有第一小区标识与第一小区索引号的对应关系。第二终端设备(第二终端设备是指与前述第三对应关系对应的终端设备不同的一个终端设备,为了区分,此处称为第二终端设备)对应第三对应关系,第三对应关系包括第一小区标识与第二小区索引号的对应关系。第一小区索引号和第一小区索引号不同。即针对至少一个小区标识,在不同的两个终端设备对应的“小区标识与小区索引号的对应关系”中可以得到两个不同的小区索引号。也就是说,本申请实施例中并不是针对所有终端设备都采用同一套小区标识与小区索引号的对应关系,而是可以针对不同的终端设备单独设置,从而可以进一步提高安全性。In the embodiment of the present application, the granularity of the "correspondence between cell identifiers and cell index numbers" may be the granularity of terminal devices, that is, the "correspondence between cell identifiers and cell index numbers" corresponding to the terminal device can be established for each terminal device, The "correspondence relationship between cell identifiers and cell index numbers" corresponding to the two terminal devices may be different. For example, the terminal device corresponding to the aforementioned third correspondence is called the first terminal equipment, and the third correspondence corresponding to the first terminal equipment includes the correspondence between the first cell identifier and the first cell index number. The second terminal device (the second terminal device refers to a terminal device different from the terminal device corresponding to the aforementioned third correspondence, for the sake of distinction, referred to herein as the second terminal device) corresponds to the third correspondence, and the third correspondence includes The corresponding relationship between the first cell identifier and the second cell index number. The first cell index number is different from the first cell index number. That is, for at least one cell ID, two different cell index numbers can be obtained in the "correspondence relationship between cell IDs and cell index numbers" corresponding to two different terminal devices. That is to say, in the embodiment of the present application, the same set of correspondence between cell identifiers and cell index numbers is not used for all terminal devices, but can be set separately for different terminal devices, thereby further improving security.
本申请实施例中“小区标识与小区索引号的对应关系”的粒度可以为承载的粒度,即可以为一个终端设备的每个承载可以建立该终端设备的该承载对应的“小区标识与小区索引号的对应关系”,该终端设备的两个承载对应的“小区标识与小区索引号的对应关系”可以不同。比如,前述第三对应关系为第一终端设备的第一承载对应的,第一承载对应的第三对应关系中包括有第一小区标识与第一小区索引号的对应关系。该第一终端设备的第二承载还对应第三对应关系,第三对应关系包括第一小区标识与第二小区索引号的对应关系。第一小区索引号和第一小区索引号不同。即针对至少一个小区标识,在同一个终端设备的至少两个承载对应的“小区标识与小区索引号的对应关系”中可以得到两个不同的值。也就是说,本申请实施例中并不是针对终端设备的所有承载都采用同一套小区标识与小区索引号的对应关系,而是可以针对终端设备的不同承载单独设置,从而可以进一步提高安全性。The granularity of "correspondence between cell ID and cell index number" in the embodiment of the present application may be the granularity of bearer, that is, for each bearer of a terminal device, the "cell ID and cell index" corresponding to the bearer of the terminal device can be established. The corresponding relationship between the two bearers of the terminal device may be different from the corresponding relationship between the cell ID and the cell index number. For example, the foregoing third correspondence corresponds to the first bearer of the first terminal device, and the third correspondence corresponding to the first bearer includes a correspondence between the first cell identifier and the first cell index number. The second bearer of the first terminal device also corresponds to a third correspondence, and the third correspondence includes a correspondence between the first cell identifier and the second cell index number. The first cell index number is different from the first cell index number. That is, for at least one cell ID, two different values may be obtained in the "correspondence between cell IDs and cell index numbers" corresponding to at least two bearers of the same terminal device. That is to say, in the embodiment of the present application, the same set of correspondence between cell identifiers and cell index numbers is not used for all bearers of the terminal equipment, but can be set separately for different bearers of the terminal equipment, thereby further improving security.
S902,网络设备向终端设备发送第四消息,第四消息包括第一字段,第一字段承载:N0个小区的小区索引号对应的激活指示信息,N0个小区中小区的小区索引号对应的激活指示信息用于指示小区激活或未激活。S902. The network device sends a fourth message to the terminal device. The fourth message includes a first field, and the first field carries: activation indication information corresponding to the cell index numbers of N0 cells, activation information corresponding to the cell index numbers of the N0 cells The indication information is used to indicate whether the cell is activated or not activated.
在一种可能地实施方式中,N0个小区中小区的小区索引号可以是为小区分配的索引号, 之间可以不具备排序关系。在另一种可能地实施方式中,N0个小区中小区的小区索引号为:对N1个辅小区和N2个干扰小区进行排序得到的小区的序号。即索引号可以显示出小区之间的排序关系,比如可以根据小区ID进行排序。In a possible implementation manner, the cell index numbers of the cells among the N0 cells may be index numbers allocated for the cells, and there may not be a sorting relationship among them. In another possible implementation manner, the cell index number of the cell in the N0 cells is: the serial number of the cell obtained by sorting the N1 secondary cells and the N2 interfering cells. That is, the index number can show the sorting relationship between the cells, for example, the sorting can be performed according to the cell ID.
在又一种可能地实施方式中,第一字段依据N0个小区中小区的序号,依序承载N0个小区对应的激活指示信息。从而可以使终端设备依据激活指示信息的排序确定出激活指示信息对应的小区索引号。在又一种可能地实施方式中,也可以在第四消息中携带用于指示激活指示信息和小区索引号之间的对应关系的指示信息。这种情况下,无需要求激活指示信息的排布满足一定的排序关系。终端设备可以根据用于指示激活指示信息和小区索引号之间的对应关系的指示信息,确定出每个激活指示信息对应的小区索引号。In yet another possible implementation manner, the first field sequentially carries the activation indication information corresponding to the N0 cells according to the serial numbers of the cells in the N0 cells. Therefore, the terminal device can determine the cell index number corresponding to the activation indication information according to the sorting of the activation indication information. In yet another possible implementation manner, the fourth message may also carry indication information for indicating a correspondence between the activation indication information and the cell index number. In this case, it is not required that the arrangement of the activation indication information satisfy a certain ordering relationship. The terminal device may determine the cell index number corresponding to each activation indication information according to the indication information used to indicate the correspondence between the activation indication information and the cell index number.
在一种可能地实施方式中,在S902或S91之前,还可以包括:网络设备获取用于指示终端设备的配置信息需受到安全保护的指示信息。一种可能地实施方式中,上述S902可以替换为:网络设备根据用于指示终端设备的配置信息需受到安全保护的指示信息,向终端设备发送第四消息。该步骤的相关内容更可以参见前述关于S502和S702中实施方式a1至实施方式a5的介绍,在此不再赘述。基于前述实施方式a5举个例子,比如终端设备的能力信息指示:终端设备有能力识别出干扰小区的激活指示信息,且网络设备具有能力根据辅小区和干扰小区生成第三对应关系,并根据第三对应关系,在第四消息中有能力承载干扰小区和辅小区对应的激活指示信息;则网络设备确定获取用于指示终端设备的配置信息需受到安全保护的指示信息。In a possible implementation manner, before S902 or S91, it may further include: the network device acquires indication information for indicating that the configuration information of the terminal device needs to be protected by security. In a possible implementation manner, the foregoing S902 may be replaced with: the network device sends the fourth message to the terminal device according to the indication information used to indicate that the configuration information of the terminal device needs to be protected by security. For the relevant content of this step, please refer to the above-mentioned introductions about the implementation manner a1 to the implementation manner a5 in S502 and S702, which will not be repeated here. For example, based on the aforementioned embodiment a5, for example, the capability information indication of the terminal device: the terminal device has the ability to identify the activation indication information of the interfering cell, and the network device has the ability to generate the third corresponding relationship according to the secondary cell and the interfering cell, and according to the first Three correspondences, the fourth message is capable of carrying the activation indication information corresponding to the interfering cell and the secondary cell; then the network device determines to obtain the indication information used to indicate that the configuration information of the terminal device needs to be protected by security.
S903,终端设备根据第四消息的第一字段以及前述第三对应关系,确定N2个辅小区中激活的辅小区。S903. The terminal device determines an activated secondary cell among the N2 secondary cells according to the first field of the fourth message and the foregoing third correspondence.
需要说明的是,在一种可能地实施方式中,本申请实施例中图9和图7这两种方案可以各自单独执行,比如仅使用图9的方案,或仅适用图7的方案。也可以将图9和图7的方案结合使用,比如可以在第三消息中携带第二指示信息和前述第一指示信息。在第四消息中对信息类型标识加密,用索引值代替信息类型标识,也可以通过S902中在辅小区中增加干扰小区的信息,以便对消息内容进行加密。It should be noted that, in a possible implementation manner, the two schemes of FIG. 9 and FIG. 7 in the embodiment of the present application may be implemented separately, for example, only the scheme of FIG. 9 is used, or only the scheme of FIG. 7 is applied. The schemes of FIG. 9 and FIG. 7 may also be used in combination, for example, the second indication information and the aforementioned first indication information may be carried in the third message. In the fourth message, the information type identifier is encrypted, and the index value is used to replace the information type identifier, and the information of the interfering cell may also be added in the secondary cell in S902, so as to encrypt the message content.
在又一种可能地实施方式中,前述图5的方案可以单独执行,也可以与图9或图7中的至少一项结合使用,比如可以将图5和图7和图9结合,这种情况下,前述第二消息与第三消息可以为同一条消息,也可以为两条消息,比如为两条RRC重配置消息。In yet another possible implementation manner, the aforementioned scheme in FIG. 5 can be implemented alone, or can be used in combination with at least one of FIG. 9 or FIG. 7 , such as combining FIG. 5 with FIG. 7 and FIG. 9 , such In this case, the aforementioned second message and the third message may be the same message, or may be two messages, such as two RRC reconfiguration messages.
本申请实施例中关于第三消息和第四消息中的相关内容,图7和图9中的内容可以相互参见,唯一不同的是,关于重复内容,本申请实施例不做重复描述。Regarding the relevant content in the third message and the fourth message in the embodiment of the present application, the contents in FIG. 7 and FIG. 9 can be referred to each other. The only difference is that the embodiment of the present application does not repeat the description about the repeated content.
增强移动带宽(Enhanced Mobile Broadband,eMBB)是5G应用的一个重要场景。该场景的典型应用包括2k/4k视频和VR/AR等。这些应用要求超高的传输数据速率:上行峰值速率要达到10G比特每秒(Gbit/s);下行峰值速率要达到20Gbit/s。峰值速率与用户可获得的带宽息息相关。若把数据看作高速上的车辆,小区带宽就是高速公路的车道数。同等条件下,车道数越多,车辆能达到的最大速率就越快。Enhanced Mobile Broadband (eMBB) is an important scenario for 5G applications. Typical applications of this scenario include 2k/4k video and VR/AR, etc. These applications require ultra-high transmission data rates: the upstream peak rate must reach 10Gbits per second (Gbit/s); the downstream peak rate must reach 20Gbit/s. The peak rate is closely related to the bandwidth available to the user. If the data is regarded as vehicles on the highway, the bandwidth of the cell is the number of lanes of the highway. Under the same conditions, the more lanes there are, the faster the maximum speed the vehicle can reach.
5G在低频频段上的小区带宽最大能达到100MHz,在高频频段上能达到400MHz。以低频频段上的最大带宽100MHz为例,用户下行峰值速率只能达到1.6+Gbit/s(子载波间隔为30kHz,4流并行传输,调制方式为256QAM,4:1子帧配比)。这样的峰值速率,距离达到eMBB场景的要求还有一定的差距。The cell bandwidth of 5G can reach up to 100MHz in the low frequency band and 400MHz in the high frequency band. Taking the maximum bandwidth of 100MHz on the low-frequency band as an example, the peak user downlink rate can only reach 1.6+Gbit/s (the subcarrier spacing is 30kHz, 4 streams are transmitted in parallel, the modulation method is 256QAM, and the subframe ratio is 4:1). Such a peak rate is still far from meeting the requirements of the eMBB scenario.
为了提升峰值速率,满足eMBB场景的要求,只能增加小区带宽。载波聚合(carrier aggregation,CA)的目的是在业务较繁忙时,扩大终端设备使用的带宽,提升峰值速率。比如3载波聚合的场景,终端设备可同时使用3个载波。3个载波中,有一个载波称为主载波(Primary Carrier,PCC),PCC对应的小区称为主小区(PCell)。另外两个载波称为辅载波(Secondary Carrier,SCC),SCC对应的小区可以称为辅小区(SCell)。每个终端设备可以连接到一个PCell。终端设备在该小区进行初始连接建立过程,或连接重建过程。PCell可以负责处理与终端设备之间的所有信令。每个终端设备可连接多个SCell。SCell是RRC重配置时添加的,用以提供额外的无线资源。终端设备与SCell之间可以没有RRC连接。In order to increase the peak rate and meet the requirements of the eMBB scenario, the only way to increase the cell bandwidth is. The purpose of carrier aggregation (CA) is to expand the bandwidth used by terminal equipment and increase the peak rate when the business is busy. For example, in a 3-carrier aggregation scenario, a terminal device can use 3 carriers at the same time. Among the three carriers, one carrier is called a primary carrier (Primary Carrier, PCC), and the cell corresponding to the PCC is called a primary cell (PCell). The other two carriers are called secondary carriers (Secondary Carrier, SCC), and the cell corresponding to the SCC may be called a secondary cell (SCell). Each end device can be connected to one PCell. The terminal equipment performs an initial connection establishment process or a connection reestablishment process in the cell. The PCell can be responsible for handling all signaling with the terminal equipment. Each terminal device can connect to multiple SCells. SCell is added during RRC reconfiguration to provide additional radio resources. There may be no RRC connection between the terminal equipment and the SCell.
基于上述图9的内容,图10示例性示出了本申请实施例提供的又一种通信方法的流程示意图,如图10所示:Based on the content in FIG. 9 above, FIG. 10 exemplarily shows a schematic flowchart of another communication method provided by the embodiment of the present application, as shown in FIG. 10:
S1001,终端设备向基站的主小区上报辅小区的测量报告。主小区接收来自终端设备的辅小区的测量报告。S1001. The terminal device reports a measurement report of the secondary cell to the primary cell of the base station. The primary cell receives the measurement report of the secondary cell from the terminal device.
辅小区的测量报告消息可以为secondary cell channel measurement。辅小区的测量报告可以为RRC消息,可以受安全性保护,或者说该消息受完整性和机密性保护。The measurement report message of the secondary cell may be secondary cell channel measurement. The measurement report of the secondary cell may be an RRC message, which may be protected by security, or the message is protected by integrity and confidentiality.
一种可能地实施方式中,终端设备可以周期性或特定事件触发以对启动对辅小区信号质量进行测量,以某项测量内容为单位,记录呼叫过程中的某时间某点处的网络环境特征。In a possible implementation manner, the terminal device can be triggered periodically or by a specific event to start measuring the signal quality of the secondary cell, and record the characteristics of the network environment at a certain time and point during the call process by taking a certain measurement content as a unit .
终端设备可以对辅小区进行测量,并将辅小区的测量报告发送给网络设备中的主小区。例如,有四个辅小区,小区ID可以分别为#102,#398,#209,#452。The terminal device can measure the secondary cell, and send the measurement report of the secondary cell to the primary cell in the network device. For example, there are four secondary cells, and the cell IDs may be #102, #398, #209, and #452 respectively.
S1002,主小区可以向终端设备发送用于指示终端设备的辅小区与小区索引号的对应关系的指示信息。该信息可以携带在上述S901的第三消息中。S1002的相关内容可以参见前述图7或图9中关于第三消息的介绍,在此不再赘述。S1002, the primary cell may send to the terminal device indication information for indicating the correspondence between the secondary cell and the cell index number of the terminal device. This information may be carried in the third message of S901 above. For related content of S1002, refer to the introduction about the third message in FIG. 7 or FIG. 9 , and details are not repeated here.
一种可能地实施方式中,第三消息可以为辅小区配置信息,可以为secondary cell configuration。In a possible implementation manner, the third message may be secondary cell configuration information, which may be secondary cell configuration.
在S1002中,主小区可以对辅小区进行编号,并向终端设备发送包括辅小区的编号信息的消息。一种可能地实施方式中,该消息可以在RRC消息中发送,该消息可以受完整性和加密保护。In S1002, the primary cell may number the secondary cell, and send a message including the numbering information of the secondary cell to the terminal device. In a possible implementation manner, the message may be sent in an RRC message, and the message may be protected by integrity and encryption.
S1003,主小区向终端设备发送辅小区激活消息。S1003. The primary cell sends a secondary cell activation message to the terminal device.
在一种可能地实施方式中,前述图7和图9中的第四消息可以为S1003中的辅小区激活消息,可以为secondary cell activation。第四消息用于激活辅小区。辅小区激活消息为MAC层消息,该消息未受安全保护,或者说未受完整性和机密性保护。In a possible implementation manner, the fourth message in FIG. 7 and FIG. 9 may be the secondary cell activation message in S1003, which may be secondary cell activation. The fourth message is used to activate the secondary cell. The secondary cell activation message is a MAC layer message, and the message is not protected by security, or not protected by integrity and confidentiality.
在一种可能地实施方式中,当主小区接收大量的下行数据,可以通过激活辅小区以提升峰值速率时,主小区向UE发送辅小区激活消息,以便激活至少一个辅小区。In a possible implementation manner, when the primary cell receives a large amount of downlink data and can increase the peak rate by activating the secondary cell, the primary cell sends a secondary cell activation message to the UE to activate at least one secondary cell.
S1004,终端设备根据辅小区激活消息,选择对应的辅小区进行激活,并建立终端设备到辅小区的数据传输通道,继而与辅小区之间进行数据传输。S1004. The terminal device selects a corresponding secondary cell for activation according to the secondary cell activation message, and establishes a data transmission channel from the terminal device to the secondary cell, and then performs data transmission with the secondary cell.
下面以终端设备的四个辅小区的小区ID分别为#102,#398,#209,#452,第四消息为辅小区激活消息为例进行举例说明。表4示例性示出了一种主小区仅针对N1个辅小区(N1为4)进行编号的示意表。表5示例性示出了根据表4生成的小区索引号与对应的激活指示信息的对应关系示意表。In the following, the cell IDs of the four secondary cells of the terminal device are respectively #102, #398, #209, and #452, and the fourth message is a secondary cell activation message as an example for illustration. Table 4 exemplarily shows a schematic table in which the primary cell only numbers N1 secondary cells (N1 is 4). Table 5 exemplarily shows a corresponding relationship between the cell index numbers generated according to Table 4 and the corresponding activation indication information.
表4主小区仅针对N1个辅小区(N1为4)进行编号的示意表Table 4 Schematic diagram of primary cell numbering only for N1 secondary cells (N1 is 4)
小区索引号 Cell Index Number 11 22 33 44
小区标识Community ID #452#452 #209#209 #398#398 #102#102
表5根据表4生成的小区索引号与对应的激活指示信息的对应关系示意表Table 5 Schematic table of the corresponding relationship between the cell index number and the corresponding activation indication information generated according to Table 4
小区索引号 Cell Index Number 11 22 33 44 55 66 77
小激活指示信息 Small activation instructions 11 11 00 11 00 00 00
通过表4和表5可以看出,比如主小区需要激活编号为1/2/4的小区,则可以在第四消息的第一字段承载“1101000”,由于第一字段为根据小区索引号的排序关系依次放置各个小区索引号对应的激活指示信息。比特位为1则表示该比特位对应的小区索引号对应的小区激活,为0则表示不激活。因此可以根据第一字段的“1101000”确定出编号为1/2/4的小区激活,进一步终端设备可以根据辅小区和小区索引号之间的对应关系,比如表4确定出编号为1/2/4的小区的小区标识,分别为:#452,#209,#102。在该举例中,辅小区激活消息为MAC CE消息,MAC header中LCID的代码点或初始索引值为58,辅小区激活消息的消息头中可以承载如前述图7所示的方案中的索引值,比如根据前述表3所示,可以携带50。It can be seen from Table 4 and Table 5 that, for example, if the main cell needs to activate the cell with the number 1/2/4, it can carry "1101000" in the first field of the fourth message, because the first field is based on the cell index number. The ordering relationship places the activation indication information corresponding to each cell index number in sequence. A bit of 1 indicates that the cell corresponding to the cell index number corresponding to the bit is activated, and a bit of 0 indicates inactivation. Therefore, it can be determined that the cell numbered 1/2/4 is activated according to "1101000" in the first field. Further, the terminal device can determine the numbered cell as 1/2 according to the correspondence between the secondary cell and the cell index number, such as Table 4. The cell identifiers of the cells of /4 are respectively: #452, #209, and #102. In this example, the secondary cell activation message is a MAC CE message, the code point or initial index value of the LCID in the MAC header is 58, and the message header of the secondary cell activation message can carry the index value in the scheme shown in Figure 7 above , for example, according to the aforementioned Table 3, 50 can be carried.
通过表4和表5可以看出,由于第四消息不受安全保护,因此第四消息中的内容为明文,攻击者可以获取第四消息中的内容。一种可能地情况中,攻击者可以统计第一字段中为1的比特位的数量,进而可以获得激活的小区数量。另一方面,攻击者可以在一定区域走动,并记录位置路径和激活小区数量的对应关系,根据获取的样本数据可以生成位置信息和小区数量之间的对应关系。结合第四消息中得到的小区数量,可以进一步推断出终端设备的位置信息,可以看出,表4和表5的方案容易导致终端设备的隐私信息,比如位置信息等泄露。It can be seen from Table 4 and Table 5 that since the fourth message is not protected by security, the content in the fourth message is plain text, and an attacker can obtain the content in the fourth message. In a possible situation, the attacker can count the number of 1 bits in the first field, and then obtain the number of activated cells. On the other hand, the attacker can walk in a certain area and record the corresponding relationship between the location path and the number of activated cells. According to the obtained sample data, the corresponding relationship between the location information and the number of cells can be generated. Combined with the number of cells obtained in the fourth message, the location information of the terminal device can be further inferred. It can be seen that the schemes in Table 4 and Table 5 may easily lead to leakage of private information of the terminal device, such as location information.
针对该问题,本申请实施例中提出上述图9所示的方案,如前述902中的内容,当终端设备具有N1个辅小区时,第一字段并不是仅承载N1个辅小区的小区激活指示信息,而是可以承载N0个小区的小区激活指示信息,且N0个小区包括N1个辅小区和N2个干扰小区。下面通过表6和表7进行举例说明,表6示例性示出了一种主小区针对N1个辅小区(N1为4)和N2个干扰小区进行编号的示意表。表7示例性示出了根据表6生成的小区索引号与对应的激活指示信息的对应关系示意表。To solve this problem, the embodiment of this application proposes the solution shown in FIG. 9 above. As described in 902 above, when the terminal device has N1 secondary cells, the first field does not only carry the cell activation indication of N1 secondary cells. Instead, it may carry cell activation indication information of N0 cells, and the N0 cells include N1 secondary cells and N2 interfering cells. Table 6 and Table 7 are used for illustration below. Table 6 exemplarily shows a schematic diagram of numbering N1 secondary cells (N1 is 4) and N2 interfering cells by the primary cell. Table 7 exemplarily shows the corresponding relationship between the cell index numbers generated according to Table 6 and the corresponding activation indication information.
表6主小区仅针对N1个辅小区(N1为4)进行编号的示意表Table 6 Schematic diagram of primary cell numbering only for N1 secondary cells (N1 is 4)
小区索引号 Cell Index Number 11 22 33 44 55 66 77
小区标识Community ID #452#452 #000#000 #000#000 #000#000 #209#209 #398#398 #102#102
表7根据表6生成的小区索引号与对应的激活指示信息的对应关系示意表Table 7 Schematic table of the corresponding relationship between the cell index number and the corresponding activation indication information generated according to Table 6
小区索引号 Cell Index Number 11 22 33 44 55 66 77
激活指示信息 Activation instructions 11 11 11 00 11 00 11
通过表6和表7可以看出,主小区在辅小区中加入了干扰小区,并针对辅小区和干扰小区统一编号,干扰小区为表6中小区标识为#000的小区。小区编号如表6所示。若主小区需要激活“#452,#209,#102”,其编号为1/5/7的小区,则可以在第四消息的第一字段可以承载“1110101”。It can be seen from Table 6 and Table 7 that the primary cell has added an interfering cell to the secondary cell, and uniformly numbered the secondary cell and the interfering cell. The interfering cell is the cell whose cell ID is #000 in Table 6. The cell numbers are shown in Table 6. If the primary cell needs to activate "#452, #209, #102", the cell numbers of which are 1/5/7, then "1110101" can be carried in the first field of the fourth message.
终端设备可以根据第一字段承载的信息依次确定出激活的辅小区的小区索引号,进一 步可以根据“辅小区的小区标识和小区索引号的第三对应关系”确定出激活的辅小区的小区标识。又一种可能地实施方式中,第三对应关系中还可以包括有干扰小区的小区标识和小区索引号的对应关系,且指示终端设备预设的小区标识(比如#000)为干扰小区,则终端设备可以忽略小区标识#000对应的激活指示信息。#000对应的激活指示信息也可以称为噪声信息,用于起到对攻击者进行干扰和迷惑的作用。而终端设备则可以虑除噪声信息,继而得到正确的需激活的小区的标识。The terminal device can sequentially determine the cell index number of the activated secondary cell according to the information carried in the first field, and further determine the cell identity of the activated secondary cell according to the "third correspondence between the cell ID of the secondary cell and the cell index number" . In yet another possible implementation manner, the third correspondence may also include the correspondence between the cell ID of the interfering cell and the cell index number, and indicate that the preset cell ID (such as #000) of the terminal device is the interfering cell, then The terminal device may ignore the activation indication information corresponding to the cell identifier #000. The activation indication information corresponding to #000 may also be called noise information, which is used to interfere and confuse attackers. However, the terminal equipment can remove the noise information, and then obtain the correct identification of the cell to be activated.
在一种可能地实施方式中,干扰小区的小区激活指示信息可以设置为任意值,0或1,比如可以全设置为0,比如在第四消息的第一字段可以承载“1000101”。这种情况下,攻击者获取第一字段的信息后,因为并不知道是对辅小区和干扰小区一起进行的编号,而是以为仅针对辅小区进行的编号,因此会推断终端设备具有7个辅小区的数量。可以看出,由于攻击者无法了解第四消息中的噪声信息,因此可以提高攻击难度,信息得到保密和隐藏,比如辅小区的数量信息可以得到保密和隐藏。In a possible implementation manner, the cell activation indication information of the interfering cell may be set to any value, 0 or 1, for example, all may be set to 0, for example, "1000101" may be carried in the first field of the fourth message. In this case, after obtaining the information in the first field, the attacker does not know that the secondary cell and the interfering cell are numbered together, but thinks that the numbering is only for the secondary cell, so it can be inferred that the terminal device has 7 The number of secondary cells. It can be seen that since the attacker cannot understand the noise information in the fourth message, the attack difficulty can be increased, and the information can be kept secret and hidden. For example, the quantity information of the secondary cell can be kept secret and hidden.
在又一种可能地实施方式中,可以设置至少一个干扰小区对应的激活指示信息为1。即针对至少一个干扰小区,该干扰小区的激活指示信息用于指示该干扰小区激活。比如,在第四消息的第一字段可以承载“1100101”。这种情况下,攻击者获取第一字段的信息后,因为并不知道是对辅小区和干扰小区一起进行的编号,而是以为仅针对辅小区进行的编号,因此会推断终端设备具有7个辅小区的数量,且激活数量为4个。可以看出,辅小区的数量信息可以得到保密和隐藏。In yet another possible implementation manner, the activation indication information corresponding to at least one interfering cell may be set to 1. That is, for at least one interfering cell, the activation indication information of the interfering cell is used to indicate that the interfering cell is activated. For example, "1100101" may be carried in the first field of the fourth message. In this case, after obtaining the information in the first field, the attacker does not know that the secondary cell and the interfering cell are numbered together, but thinks that the numbering is only for the secondary cell, so it can be inferred that the terminal device has 7 The number of secondary cells, and the activated number is 4. It can be seen that the quantity information of the secondary cell can be kept secret and hidden.
可以理解的是,以上各个实施例中,由终端设备实现的方法和/或步骤,也可以由可用于终端设备的部件(例如芯片或者电路)实现。由网络设备实现的方法和/或步骤,也可以由可用于网络设备的部件(例如芯片或者电路)实现。It can be understood that, in the above embodiments, the methods and/or steps implemented by the terminal device may also be implemented by components (such as chips or circuits) that can be used for the terminal device. The methods and/or steps implemented by network equipment may also be implemented by components (such as chips or circuits) that can be used in network equipment.
上述主要从各个网元之间交互的角度对本申请实施例提供的方案进行了介绍。基于以上实施例以及相同构思,图11为本申请实施例提供的通信装置的示意图。The foregoing mainly introduces the solution provided by the embodiment of the present application from the perspective of interaction between various network elements. Based on the above embodiments and the same idea, FIG. 11 is a schematic diagram of a communication device provided by an embodiment of the present application.
该通信装置可以为上述方法实施例中的终端设备,或者包含上述终端设备的装置,或者为可用于终端设备的部件,或者为芯片或者电路(比如为第一策略控制网元中的芯片或电路)。该通信装置可以为上述方法实施例中的网络设备,或者包含上述网络设备的装置,或者为可用于网络设备的部件,或者为芯片或者电路(比如为第二策略控制网元中的芯片或电路)。The communication device may be the terminal device in the above method embodiment, or a device including the above terminal device, or a component that can be used in the terminal device, or a chip or a circuit (for example, a chip or a circuit in the first policy control network element ). The communication device may be the network device in the above-mentioned method embodiment, or a device including the above-mentioned network device, or a component that can be used in the network device, or a chip or a circuit (for example, a chip or a circuit in the second policy control network element ).
该通信装置1100包括处理模块1102和通信模块1101。进一步的,该通信装置1100可以包括有存储模块1103,也可以不包括存储模块1103。图中存储模块1103为虚线是进一步标识存储模块为可选地意思。The communication device 1100 includes a processing module 1102 and a communication module 1101 . Further, the communication device 1100 may include a storage module 1103 or may not include a storage module 1103 . The dotted line in the storage module 1103 in the figure further indicates that the storage module is optional.
其中,处理模块1102可以是处理器或控制器,例如可以是通用中央处理器(central processing unit,CPU),通用处理器,数字信号处理(digital signal processing,DSP),专用集成电路(application specific integrated circuits,ASIC),现场可编程门阵列(field programmable gate array,FPGA)或者其他可编程逻辑器件、晶体管逻辑器件、硬件部件或者其任意组合。其可以实现或执行结合本申请公开内容所描述的各种示例性的逻辑方框,模块和电路。处理器也可以是实现计算功能的组合,例如包括一个或多个微处理器组合,DSP和微处理器的组合等等。该处理模块1102可执行存储模块存储的计算机执行指令。Wherein, the processing module 1102 can be a processor or a controller, such as a general-purpose central processing unit (central processing unit, CPU), a general-purpose processor, a digital signal processing (digital signal processing, DSP), an application specific integrated circuit (application specific integrated circuit) circuits, ASIC), field programmable gate array (field programmable gate array, FPGA) or other programmable logic devices, transistor logic devices, hardware components or any combination thereof. It can implement or execute the various illustrative logical blocks, modules and circuits described in connection with the present disclosure. The processor can also be a combination of computing functions, for example, a combination of one or more microprocessors, a combination of DSP and a microprocessor, and so on. The processing module 1102 can execute computer-executable instructions stored in the storage module.
存储模块1103可以是存储器。可选地,该存储模块可以为芯片内的存储模块,如寄存 器、缓存等,该存储模块还可以是通信装置内的位于该芯片外部的存储模块,如只读存储器(read-only memory,ROM)或可存储静态信息和指令的其他类型的静态存储设备,随机存取存储器(random access memory,RAM)等。The storage module 1103 may be a memory. Optionally, the storage module can be a storage module in the chip, such as a register, a cache, etc., and the storage module can also be a storage module outside the chip in the communication device, such as a read-only memory (read-only memory, ROM). ) or other types of static storage devices that can store static information and instructions, random access memory (random access memory, RAM), etc.
通信模块1101是一种该通信装置的接口电路,用于从其它装置接收信号。例如,当该装置以芯片的方式实现时,该通信模块1101是该芯片用于从其它芯片或装置接收信号的接口电路,或者,是该芯片用于向其它芯片或装置发送信号的接口电路。该通信模块1101例如可以是收发器。可选的,该收发器可以包括射频电路。该通信模块1101例如可以是输入/输出接口、管脚或电路等。The communication module 1101 is an interface circuit of the communication device for receiving signals from other devices. For example, when the device is implemented as a chip, the communication module 1101 is an interface circuit for the chip to receive signals from other chips or devices, or an interface circuit for the chip to send signals to other chips or devices. The communication module 1101 may be, for example, a transceiver. Optionally, the transceiver may include a radio frequency circuit. The communication module 1101 may be, for example, an input/output interface, a pin, or a circuit.
具体的,图11中的通信模块1101和处理模块1102的功能/实现过程可以通过图4所示的通信设备300中的处理器301调用存储器303中存储的计算机执行指令来实现。或者,图11中的处理模块1102的功能/实现过程可以通过图4所示的通信设备300中的处理器301调用存储器303中存储的计算机执行指令来实现,图11中的通信模块1101的功能/实现过程可以通过图4中所示的通信设备300中的通信接口304来实现。Specifically, the functions/implementation process of the communication module 1101 and the processing module 1102 in FIG. 11 can be realized by calling the computer-executed instructions stored in the memory 303 by the processor 301 in the communication device 300 shown in FIG. 4 . Alternatively, the function/implementation process of the processing module 1102 in FIG. 11 can be implemented by calling the computer execution instructions stored in the memory 303 by the processor 301 in the communication device 300 shown in FIG. /The implementation process can be implemented through the communication interface 304 in the communication device 300 shown in FIG. 4 .
比如,以通信装置1100为上述方法实施例中的网络设备为例,其中,处理模块1102用于通过通信模块1101向终端设备发送第一消息,向终端设备发送第二消息。第一消息未受到安全保护,第一消息包括终端设备的第一用户配置信息。第二消息受到安全保护,第二消息包括终端设备的第二用户配置信息,第二用户配置信息与第一用户配置信息不同。根据第二用户配置信息与终端设备之间进行数据传输。For example, taking the communication device 1100 as an example of the network device in the above method embodiment, the processing module 1102 is configured to send the first message to the terminal device through the communication module 1101 and send the second message to the terminal device. The first message is not protected by security, and the first message includes first user configuration information of the terminal device. The second message is protected by security, the second message includes second user configuration information of the terminal device, and the second user configuration information is different from the first user configuration information. Data transmission is performed between the terminal device and the second user configuration information.
比如,以通信装置1100为上述方法实施例中的网络设备为例,其中,处理模块1102用于通过通信模块1101向终端设备发送第三消息。向终端设备发送第四消息。第三消息包括第一指示信息,第一指示信息用于指示终端设备对应的第一对应关系,第一对应关系为信息类型标识与索引值的对应关系。第四消息包括:第四消息对应的信息类型标识在第一对应关系中对应的索引值。For example, taking the communication apparatus 1100 as an example of the network device in the above method embodiment, the processing module 1102 is configured to send the third message to the terminal device through the communication module 1101 . Send the fourth message to the terminal device. The third message includes first indication information, where the first indication information is used to indicate a first correspondence relationship corresponding to the terminal device, and the first correspondence relationship is a correspondence relationship between an information type identifier and an index value. The fourth message includes: an index value corresponding to the information type identifier corresponding to the fourth message in the first correspondence.
比如,以通信装置1100为上述方法实施例中的网络设备为例,其中,处理模块1102用于通过通信模块1101向终端设备发送第三消息。向终端设备发送第四消息。第三消息包括第二指示信息,第二指示信息用于指示第三对应关系,第三对应关系包括终端设备的N1个辅小区的小区标识与小区索引号之间的对应关系;N1为正整数;其中,第三对应关系是根据N0个小区得到的,N0个小区包括N1个辅小区和预设的N2个干扰小区,N2为正整数,N0为N1和N2的和。第四消息包括第一字段,第一字段承载:N0个小区的小区索引号对应的激活指示信息,N0个小区中小区的小区索引号对应的激活指示信息用于指示小区激活或未激活。For example, taking the communication apparatus 1100 as an example of the network device in the above method embodiment, the processing module 1102 is configured to send the third message to the terminal device through the communication module 1101 . Send the fourth message to the terminal device. The third message includes second indication information, and the second indication information is used to indicate a third correspondence, and the third correspondence includes the correspondence between cell identities and cell index numbers of N1 secondary cells of the terminal device; N1 is a positive integer ; Wherein, the third corresponding relationship is obtained based on N0 cells, N0 cells include N1 secondary cells and preset N2 interfering cells, N2 is a positive integer, and N0 is the sum of N1 and N2. The fourth message includes a first field, and the first field carries: activation indication information corresponding to the cell index numbers of N0 cells, and the activation indication information corresponding to the cell index numbers of the cells in the N0 cells is used to indicate whether the cell is activated or not activated.
比如,以通信装置1100为上述方法实施例中的终端设备为例,其中,处理模块1102用于通过通信模块1101接收来自网络设备的第一消息,接收来自网络设备的第二消息。第一消息未受到安全保护,第一消息包括终端设备的第一用户配置信息。第二消息受到安全保护,第二消息包括终端设备的第二用户配置信息,第二用户配置信息与第一用户配置信息不同。根据第二用户配置信息与终端设备之间进行数据传输。For example, taking the communication device 1100 as the terminal device in the above method embodiment as an example, the processing module 1102 is configured to receive the first message from the network device through the communication module 1101 and receive the second message from the network device. The first message is not protected by security, and the first message includes first user configuration information of the terminal device. The second message is protected by security, the second message includes second user configuration information of the terminal device, and the second user configuration information is different from the first user configuration information. Data transmission is performed between the terminal device and the second user configuration information.
比如,以通信装置1100为上述方法实施例中的网络设备为例,其中,处理模块1102用于通过通信模块1101接收来自网络设备的第三消息。接收来自网络设备的第四消息。第三消息包括第一指示信息,第一指示信息用于指示终端设备对应的第一对应关系,第一对应关系为信息类型标识与索引值的对应关系。第四消息包括:第四消息对应的信息类型标 识在第一对应关系中对应的索引值。For example, taking the communication apparatus 1100 as an example of the network device in the above method embodiment, the processing module 1102 is configured to receive the third message from the network device through the communication module 1101 . A fourth message is received from the network device. The third message includes first indication information, where the first indication information is used to indicate a first correspondence relationship corresponding to the terminal device, and the first correspondence relationship is a correspondence relationship between an information type identifier and an index value. The fourth message includes: an index value corresponding to the information type identifier corresponding to the fourth message in the first correspondence.
比如,以通信装置1100为上述方法实施例中的网络设备为例,其中,处理模块1102用于通过通信模块1101接收来自网络设备的第三消息。接收来自网络设备的第四消息。第三消息包括第二指示信息,第二指示信息用于指示第三对应关系,第三对应关系包括终端设备的N1个辅小区的小区标识与小区索引号之间的对应关系;N1为正整数;其中,第三对应关系是根据N0个小区得到的,N0个小区包括N1个辅小区和预设的N2个干扰小区,N2为正整数,N0为N1和N2的和。第四消息包括第一字段,第一字段承载:N0个小区的小区索引号对应的激活指示信息,N0个小区中小区的小区索引号对应的激活指示信息用于指示小区激活或未激活。For example, taking the communication apparatus 1100 as an example of the network device in the above method embodiment, the processing module 1102 is configured to receive the third message from the network device through the communication module 1101 . A fourth message is received from the network device. The third message includes second indication information, and the second indication information is used to indicate a third correspondence, and the third correspondence includes the correspondence between cell identities and cell index numbers of N1 secondary cells of the terminal device; N1 is a positive integer ; Wherein, the third corresponding relationship is obtained based on N0 cells, N0 cells include N1 secondary cells and preset N2 interfering cells, N2 is a positive integer, and N0 is the sum of N1 and N2. The fourth message includes a first field, and the first field carries: activation indication information corresponding to the cell index numbers of N0 cells, and the activation indication information corresponding to the cell index numbers of the cells in the N0 cells is used to indicate whether the cell is activated or not activated.
其中,上述方法实施例涉及的各步骤的所有相关内容均可以援引到对应功能模块的功能描述,在此不再赘述。Wherein, all relevant content of each step involved in the above-mentioned method embodiment can be referred to the function description of the corresponding function module, and will not be repeated here.
可以理解的是,该通信装置为了实现上述功能,其包含了执行各个功能相应的硬件结构和/或软件模块。本领域技术人员应该很容易意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,本申请能够以硬件或硬件和计算机软件的结合形式来实现。某个功能究竟以硬件还是计算机软件驱动硬件的方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。It can be understood that, in order to realize the above functions, the communication device includes hardware structures and/or software modules corresponding to each function. Those skilled in the art should easily realize that the present application can be implemented in the form of hardware or a combination of hardware and computer software in combination with the units and algorithm steps of each example described in the embodiments disclosed herein. Whether a certain function is executed by hardware or computer software drives hardware depends on the specific application and design constraints of the technical solution. Those skilled in the art may use different methods to implement the described functions for each specific application, but such implementation should not be regarded as exceeding the scope of the present application.
根据本申请实施例提供的方法,本申请还提供一种计算机程序产品,该计算机程序产品包括:计算机程序代码或指令,当该计算机程序代码或指令在计算机上运行时,使得该计算机执行图5、图6、图7、图9或图10所示实施例中任意一个实施例的方法。According to the method provided in the embodiment of the present application, the present application also provides a computer program product, the computer program product including: computer program code or instruction, when the computer program code or instruction is run on the computer, the computer is made to execute the , the method of any one of the embodiments shown in FIG. 6 , FIG. 7 , FIG. 9 or FIG. 10 .
根据本申请实施例提供的方法,本申请还提供一种计算机可读存储介质,该计算机可读介质存储有程序代码,当该程序代码在计算机上运行时,使得该计算机执行图5、图6、图7、图9或图10所示实施例中任意一个实施例的方法。According to the methods provided in the embodiments of the present application, the present application also provides a computer-readable storage medium, the computer-readable medium stores program codes, and when the program codes are run on a computer, the computer executes the steps shown in Figures 5 and 6. , the method of any one of the embodiments shown in FIG. 7 , FIG. 9 or FIG. 10 .
根据本申请实施例提供的方法,本申请还提供一种芯片系统,该芯片系统可以包括处理器。该处理器与存储器耦合,可用于执行图5、图6、图7、图9或图10所示实施例中任意一个实施例的方法。可选地,该芯片系统还包括存储器。存储器,用于存储计算机程序(也可以称为代码,或指令)。处理器,用于从存储器调用并运行计算机程序,使得安装有芯片系统的设备执行图5、图6、图7、图9或图10所示实施例中任意一个实施例的方法。According to the method provided in the embodiment of the present application, the present application further provides a chip system, where the chip system may include a processor. The processor is coupled with the memory, and may be used to execute the method in any one of the embodiments shown in FIG. 5 , FIG. 6 , FIG. 7 , FIG. 9 or FIG. 10 . Optionally, the chip system further includes a memory. Memory, used to store computer programs (also called code, or instructions). The processor is configured to call and run the computer program from the memory, so that the device installed with the system-on-a-chip executes the method of any one of the embodiments shown in FIG. 5 , FIG. 6 , FIG. 7 , FIG. 9 or FIG. 10 .
根据本申请实施例提供的方法,本申请还提供一种系统,其包括前述的终端设备和网络设备。According to the method provided in the embodiment of the present application, the present application further provides a system, which includes the aforementioned terminal device and network device.
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行计算机指令时,全部或部分地产生按照本申请实施例的流程或功能。计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(digital subscriber line,DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含 一个或多个可用介质集成的服务器、数据中心等数据存储设备。可用介质可以是磁性介质(例如,软盘、硬盘、磁带)、光介质(例如,高密度数字视频光盘(digital video disc,DVD))、或者半导体介质(例如,固态硬盘(solid state disc,SSD))等。In the above embodiments, all or part of them may be implemented by software, hardware, firmware or any combination thereof. When implemented using software, it may be implemented in whole or in part in the form of a computer program product. A computer program product includes one or more computer instructions. When the computer instructions are loaded and executed on the computer, the processes or functions according to the embodiments of the present application are generated in whole or in part. A computer can be a general purpose computer, special purpose computer, computer network, or other programmable device. Computer instructions may be stored in or transmitted from one computer-readable storage medium to another computer-readable storage medium, e.g. Coaxial cable, optical fiber, digital subscriber line (digital subscriber line, DSL)) or wireless (such as infrared, wireless, microwave, etc.) transmission to another website site, computer, server or data center. The computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device including a server, a data center, and the like integrated with one or more available media. Available media can be magnetic media (e.g., floppy disk, hard disk, magnetic tape), optical media (e.g., high-density digital video disc (digital video disc, DVD)), or semiconductor media (e.g., solid state disk (solid state disc, SSD) )Wait.
需要指出的是,本专利申请文件的一部分包含受著作权保护的内容。除了对专利局的专利文件或记录的专利文档内容制作副本以外,著作权人保留著作权。It should be pointed out that a part of the patent application documents contains content protected by copyright. Copyright is reserved by the copyright owner other than to make copies of the contents of the patent file or records of the Patent Office.
上述各个装置实施例中网络设备与终端设备和方法实施例中的网络设备或终端设备对应,由相应的模块或单元执行相应的步骤,例如通信模块(收发器)执行方法实施例中接收或发送的步骤,除发送、接收外的其它步骤可以由处理模块(处理器)执行。具体单元的功能可以参考相应的方法实施例。其中,处理器可以为一个或多个。The network equipment in each of the above device embodiments corresponds to the terminal equipment and the network equipment or terminal equipment in the method embodiments, and the corresponding modules or units perform corresponding steps, for example, the communication module (transceiver) performs receiving or sending in the method embodiments Steps, other steps except sending and receiving can be executed by a processing module (processor). For the functions of the specific units, reference may be made to the corresponding method embodiments. Wherein, there may be one or more processors.
在本说明书中使用的术语“部件”、“模块”、“系统”等用于表示计算机相关的实体、硬件、固件、硬件和软件的组合、软件、或执行中的软件。例如,部件可以是但不限于,在处理器上运行的进程、处理器、对象、可执行文件、执行线程、程序和/或计算机。通过图示,在计算设备上运行的应用和计算设备都可以是部件。一个或多个部件可驻留在进程和/或执行线程中,部件可位于一个计算机上和/或分布在两个或更多个计算机之间。此外,这些部件可从在上面存储有各种数据结构的各种计算机可读介质执行。部件可例如根据具有一个或多个数据分组(例如来自与本地系统、分布式系统和/或网络间的另一部件交互的二个部件的数据,例如通过信号与其它系统交互的互联网)的信号通过本地和/或远程进程来通信。The terms "component", "module", "system" and the like are used in this specification to refer to a computer-related entity, hardware, firmware, a combination of hardware and software, software, or software in execution. For example, a component may be, but is not limited to being, a process running on a processor, a processor, an object, an executable, a thread of execution, a program, and/or a computer. By way of illustration, both an application running on a computing device and the computing device can be components. One or more components can reside within a process and/or thread of execution and a component can be localized on one computer and/or distributed between two or more computers. In addition, these components can execute from various computer readable media having various data structures stored thereon. A component may, for example, be based on a signal having one or more packets of data (e.g., data from two components interacting with another component between a local system, a distributed system, and/or a network, such as the Internet via a signal interacting with other systems). Communicate through local and/or remote processes.
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各种说明性逻辑块(illustrative logical block)和步骤(step),能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。Those of ordinary skill in the art can appreciate that various illustrative logical blocks (illustrative logical blocks) and steps (steps) described in conjunction with the embodiments disclosed herein can be implemented with electronic hardware, or a combination of computer software and electronic hardware. accomplish. Whether these functions are executed by hardware or software depends on the specific application and design constraints of the technical solution. Those skilled in the art may use different methods to implement the described functions for each specific application, but such implementation should not be regarded as exceeding the scope of the present application.
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。Those skilled in the art can clearly understand that for the convenience and brevity of the description, the specific working process of the above-described system, device and unit can refer to the corresponding process in the foregoing method embodiment, which will not be repeated here.
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。In the several embodiments provided in this application, it should be understood that the disclosed systems, devices and methods may be implemented in other ways. For example, the device embodiments described above are only illustrative. For example, the division of units is only a logical function division. In actual implementation, there may be other division methods. For example, multiple units or components can be combined or integrated. to another system, or some features may be ignored, or not implemented. In another point, the mutual coupling or direct coupling or communication connection shown or discussed may be through some interfaces, and the indirect coupling or communication connection of devices or units may be in electrical, mechanical or other forms.
作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。另外,在本申请各个实施例中的各功能单元可以集成在一个处理模块中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。A unit described as a separate component may or may not be physically separated, and a component displayed as a unit may or may not be a physical unit, that is, it may be located in one place, or may be distributed to multiple network units. Part or all of the units can be selected according to actual needs to achieve the purpose of the solution of this embodiment. In addition, each functional unit in each embodiment of the present application may be integrated into one processing module, each unit may exist separately physically, or two or more units may be integrated into one unit. If the functions are realized in the form of software functional units and sold or used as independent products, they can be stored in a computer-readable storage medium.
以上,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以权利要求的保护范围为准。The above is only the specific implementation of the application, but the scope of protection of the application is not limited thereto. Anyone familiar with the technical field can easily think of changes or substitutions within the technical scope disclosed in the application, and should cover Within the protection scope of this application. Therefore, the protection scope of the present application should be based on the protection scope of the claims.

Claims (30)

  1. 一种通信方法,其特征在于,包括:A communication method, characterized in that, comprising:
    网络设备向终端设备发送第一消息,所述第一消息未受到安全保护,所述第一消息包括所述终端设备的第一用户配置信息;The network device sends a first message to the terminal device, the first message is not protected by security, and the first message includes first user configuration information of the terminal device;
    所述网络设备向所述终端设备发送第二消息,所述第二消息受到安全保护,所述第二消息包括所述终端设备的第二用户配置信息,所述第二用户配置信息与所述第一用户配置信息不同;The network device sends a second message to the terminal device, the second message is protected by security, the second message includes second user configuration information of the terminal device, and the second user configuration information is related to the The configuration information of the first user is different;
    所述网络设备根据所述第二用户配置信息与所述终端设备之间进行数据传输。The network device performs data transmission with the terminal device according to the second user configuration information.
  2. 如权利要求1所述的方法,其特征在于,所述第二消息为无线资源控制层消息;和/或,The method according to claim 1, wherein the second message is a radio resource control layer message; and/or,
    所述第二用户配置信息用于辅助媒体访问控制层、无线链路控制层,或,物理层中的至少一项的消息传输。The second user configuration information is used to assist message transmission of at least one of a medium access control layer, a radio link control layer, or a physical layer.
  3. 如权利要求1或2所述的方法,其特征在于,所述方法还包括:The method according to claim 1 or 2, further comprising:
    所述网络设备向所述终端设备发送第三消息,所述第三消息包括第一指示信息,所述第一指示信息用于指示所述终端设备对应的第一对应关系,所述第一对应关系为信息类型标识与索引值的对应关系;The network device sends a third message to the terminal device, where the third message includes first indication information, and the first indication information is used to indicate a first correspondence corresponding to the terminal device, and the first correspondence The relationship is the correspondence between the information type identifier and the index value;
    所述网络设备向所述终端设备发送第四消息,所述第四消息包括:所述第四消息对应的信息类型标识在所述第一对应关系中对应的索引值。The network device sends a fourth message to the terminal device, where the fourth message includes: an index value corresponding to the information type identifier corresponding to the fourth message in the first correspondence.
  4. 如权利要求1-3任一项所述的方法,其特征在于,所述第三消息为无线资源控制层消息;和/或,The method according to any one of claims 1-3, wherein the third message is a radio resource control layer message; and/or,
    所述第四消息为媒体访问控制层消息、无线链路控制层消息,或物理层消息。The fourth message is a medium access control layer message, a radio link control layer message, or a physical layer message.
  5. 如权利要求1-4任一项所述的方法,其特征在于,所述方法还包括:The method according to any one of claims 1-4, wherein the method further comprises:
    所述网络设备向所述终端设备发送第三消息,所述第三消息包括第二指示信息,所述第二指示信息用于指示第三对应关系,所述第三对应关系包括所述终端设备的N1个辅小区的小区标识与小区索引号之间的对应关系;所述N1为正整数;其中,所述第三对应关系是根据N0个小区得到的,所述N0个小区包括所述N1个辅小区和预设的N2个干扰小区,所述N2为正整数,所述N0为所述N1和所述N2的和;The network device sends a third message to the terminal device, the third message includes second indication information, the second indication information is used to indicate a third correspondence, and the third correspondence includes the terminal equipment The corresponding relationship between the cell identities of the N1 secondary cells and the cell index number; the N1 is a positive integer; wherein, the third corresponding relationship is obtained based on N0 cells, and the N0 cells include the N1 secondary cells and preset N2 interfering cells, where N2 is a positive integer, and N0 is the sum of N1 and N2;
    所述网络设备向所述终端设备发送第四消息,所述第四消息包括第一字段,第一字段承载:N0个小区的小区索引号对应的激活指示信息,所述N0个小区中小区的小区索引号对应的激活指示信息用于指示所述小区激活或未激活。The network device sends a fourth message to the terminal device, the fourth message includes a first field, and the first field carries: activation indication information corresponding to cell index numbers of N0 cells, and the cell index numbers of the N0 cells The activation indication information corresponding to the cell index number is used to indicate whether the cell is activated or deactivated.
  6. 如权利要求5所述的方法,其特征在于,所述第三对应关系包括所述N0个小区的小区标识与小区索引号之间的对应关系,所述第三对应关系包括第一干扰小区的小区标识和第一小区索引号的对应关系;The method according to claim 5, wherein the third correspondence includes the correspondence between the cell identities of the N0 cells and the cell index numbers, and the third correspondence includes the first interfering cell The corresponding relationship between the cell identifier and the first cell index number;
    第四对应关系包括所述第一干扰小区的小区标识和第二小区索引号的对应关系;The fourth correspondence includes the correspondence between the cell identity of the first interfering cell and the second cell index number;
    所述第一小区索引号和所述第二小区索引号不同;The first cell index number is different from the second cell index number;
    其中,所述第四对应关系为除所述终端设备之外的一个其他终端设备对应的所述其他终端设备的辅小区和预设的至少一个干扰小区的小区标识与小区索引号的对应关系;或者,Wherein, the fourth correspondence is a correspondence between the secondary cell of the other terminal equipment corresponding to the terminal equipment other than the terminal equipment and the preset cell identifier and cell index number of at least one interfering cell; or,
    所述第三对应关系为所述终端设备的第一承载对应的对应关系,所述第四对应关系为所述第一终端设备的第二承载对应的至少一个辅小区和预设的至少一个干扰小区的小区 标识与小区索引号的对应关系。The third correspondence is a correspondence corresponding to the first bearer of the terminal device, and the fourth correspondence is at least one secondary cell corresponding to the second bearer of the first terminal device and at least one preset interference The corresponding relationship between the cell ID of the cell and the cell index number.
  7. 如权利要求1-6任一项所述的方法,其特征在于,所述网络设备向所述终端设备发送第二消息,包括:The method according to any one of claims 1-6, wherein the network device sends the second message to the terminal device, comprising:
    所述网络设备根据所述终端设备的配置信息需受到安全保护的指示信息,向所述终端设备发送所述第二消息。The network device sends the second message to the terminal device according to the indication information that the configuration information of the terminal device needs to be protected by security.
  8. 如权利要求7所述的方法,其特征在于,所述终端设备的配置信息需受到安全保护的指示信息包括以下内容中的至少一项:The method according to claim 7, wherein the indication information indicating that the configuration information of the terminal device needs to be protected includes at least one of the following:
    所述网络设备接收到的第三指示信息;所述第三指示信息用于指示所述终端设备的配置信息需受到安全保护;The third indication information received by the network device; the third indication information is used to indicate that the configuration information of the terminal device needs to be protected by security;
    所述网络设备接收到的接入层安全模式命令完成消息,所述接入层安全模式命令完成消息用于指示接入层安全保护激活;The access layer security mode command completion message received by the network device, the access layer security mode command completion message is used to indicate the activation of the access layer security protection;
    预设的所述网络设备的配置信息;Preset configuration information of the network device;
    用于指示待发送的信息的信息类型与预设的需受到安全保护的信息类型匹配的信息;或,Information indicating that the information type of the information to be sent matches the preset information type to be protected by security; or,
    所述终端设备的能力信息,所述网络设备的能力信息。Capability information of the terminal device, capability information of the network device.
  9. 一种通信方法,其特征在于,包括:A communication method, characterized in that, comprising:
    终端设备接收来自网络设备的第一消息,所述第一消息未受到安全保护,所述第一消息包括所述终端设备的第一用户配置信息;The terminal device receives a first message from the network device, the first message is not protected by security, and the first message includes first user configuration information of the terminal device;
    所述终端设备接收来自所述网络设备的第二消息,所述第二消息受到安全保护,所述第二消息包括所述终端设备的第二用户配置信息,所述第二用户配置信息与所述第一用户配置信息不同;The terminal device receives a second message from the network device, the second message is protected by security, the second message includes second user configuration information of the terminal device, and the second user configuration information is related to the The first user configuration information is different;
    所述终端设备根据所述第二用户配置信息进行数据传输。The terminal device performs data transmission according to the second user configuration information.
  10. 如权利要求9所述的方法,其特征在于,所述第二消息为无线资源控制层消息;和/或,The method according to claim 9, wherein the second message is a radio resource control layer message; and/or,
    所述终端设备根据所述第二用户配置信息进行数据传输,包括:所述终端设备根据所述第二消息中的所述第二用户配置信息传输物理层、媒体访问控制层或无线链路控制层中的至少一项的消息。The terminal device performing data transmission according to the second user configuration information includes: the terminal device transmitting the physical layer, media access control layer or radio link control layer according to the second user configuration information in the second message A message for at least one item in the layer.
  11. 如权利要求9或10所述的方法,其特征在于,所述方法还包括:The method according to claim 9 or 10, further comprising:
    所述终端设备接收来自所述网络设备的第三消息,所述第三消息包括第一指示信息,所述第一指示信息用于指示所述终端设备对应的第一对应关系,所述第一对应关系为信息类型标识与索引值的对应关系;The terminal device receives a third message from the network device, where the third message includes first indication information, where the first indication information is used to indicate a first correspondence corresponding to the terminal device, and the first The corresponding relationship is the corresponding relationship between the information type identifier and the index value;
    所述终端设备接收来自所述网络设备的向所述终端设备发送第四消息,所述第四消息包括:所述第四消息对应的信息类型标识在所述第一对应关系中对应的索引值。The terminal device receives a fourth message sent from the network device to the terminal device, where the fourth message includes: an index value corresponding to the information type identifier corresponding to the fourth message in the first correspondence .
  12. 如权利要求9-11任一项所述的方法,其特征在于,所述第三消息为无线资源控制层消息;和/或,The method according to any one of claims 9-11, wherein the third message is a radio resource control layer message; and/or,
    所述第四消息为媒体访问控制层消息、无线链路控制层消息,或物理层消息。The fourth message is a medium access control layer message, a radio link control layer message, or a physical layer message.
  13. 如权利要求9-12任一项所述的方法,其特征在于,所述方法还包括:The method according to any one of claims 9-12, wherein the method further comprises:
    所述终端设备接收来自所述网络设备的第三消息,所述第三消息包括第二指示信息,所述第二指示信息用于指示第三对应关系,所述第三对应关系包括所述终端设备的N1个 辅小区的小区标识与小区索引号之间的对应关系;所述N1为正整数;其中,所述第三对应关系是根据N0个小区得到的,所述N0个小区包括所述N1个辅小区和预设的N2个干扰小区,所述N2为正整数,所述N0为所述N1和所述N2的和;The terminal device receives a third message from the network device, where the third message includes second indication information, and the second indication information is used to indicate a third correspondence, and the third correspondence includes the terminal Correspondence between cell identities and cell index numbers of the N1 secondary cells of the device; the N1 is a positive integer; wherein, the third correspondence is obtained based on N0 cells, and the N0 cells include the N1 secondary cells and preset N2 interfering cells, where N2 is a positive integer, and N0 is the sum of N1 and N2;
    所述终端设备接收来自所述网络设备的,所述第四消息包括第一字段,第一字段承载:N0个小区的小区索引号对应的激活指示信息,所述N0个小区中小区的小区索引号对应的激活指示信息用于指示所述小区激活或未激活。The terminal device receives from the network device, the fourth message includes a first field, and the first field carries: activation indication information corresponding to cell index numbers of N0 cells, and cell index numbers of cells in the N0 cells The activation indication information corresponding to the number is used to indicate whether the cell is activated or deactivated.
  14. 如权利要求13所述的方法,其特征在于,所述第三对应关系为所述N0个小区的小区标识与小区索引号之间的对应关系,所述第三对应关系包括第一干扰小区的小区标识和第一小区索引号的对应关系;The method according to claim 13, wherein the third correspondence is a correspondence between cell identities and cell index numbers of the N0 cells, and the third correspondence includes the first interfering cell The corresponding relationship between the cell identifier and the first cell index number;
    第四对应关系包括所述第一干扰小区的小区标识和第二小区索引号的对应关系;The fourth correspondence includes the correspondence between the cell identity of the first interfering cell and the second cell index number;
    所述第一小区索引号和所述第二小区索引号不同;The first cell index number is different from the second cell index number;
    其中,所述第四对应关系为除所述终端设备之外的一个其他终端设备对应的所述其他终端设备的辅小区和预设的至少一个干扰小区的小区标识与小区索引号的对应关系;或者,Wherein, the fourth correspondence is a correspondence between the secondary cell of the other terminal equipment corresponding to the terminal equipment other than the terminal equipment and the preset cell identifier and cell index number of at least one interfering cell; or,
    所述第三对应关系为所述终端设备的第一承载对应的对应关系,所述第四对应关系为所述第一终端设备的第二承载对应的至少一个辅小区和预设的至少一个干扰小区的小区标识与小区索引号的对应关系。The third correspondence is a correspondence corresponding to the first bearer of the terminal device, and the fourth correspondence is at least one secondary cell corresponding to the second bearer of the first terminal device and at least one preset interference The corresponding relationship between the cell ID of the cell and the cell index number.
  15. 一种网络设备,其特征在于,包括处理模块和通信模块:A network device, characterized in that it includes a processing module and a communication module:
    所述处理模块用于:The processing module is used for:
    通过所述通信模块向终端设备发送第一消息,向所述终端设备发送第二消息,所述第一消息未受到安全保护,所述第一消息包括所述终端设备的第一用户配置信息;所述第二消息受到安全保护,所述第二消息包括所述终端设备的第二用户配置信息,所述第二用户配置信息与所述第一用户配置信息不同。Send a first message to the terminal device through the communication module, and send a second message to the terminal device, the first message is not protected by security, and the first message includes the first user configuration information of the terminal device; The second message is protected by security, the second message includes second user configuration information of the terminal device, and the second user configuration information is different from the first user configuration information.
  16. 如权利要求15所述的网络设备,其特征在于,所述第二消息为无线资源控制层消息;和/或,The network device according to claim 15, wherein the second message is a radio resource control layer message; and/or,
    所述第二用户配置信息用于辅助媒体访问控制层、无线链路控制层,或,物理层中的至少一项的消息传输。The second user configuration information is used to assist message transmission of at least one of a medium access control layer, a radio link control layer, or a physical layer.
  17. 如权利要求15或16所述的网络设备,其特征在于,所述通信模块还用于:The network device according to claim 15 or 16, wherein the communication module is also used for:
    向所述终端设备发送第三消息,所述第三消息包括第一指示信息,所述第一指示信息用于指示所述终端设备对应的第一对应关系,所述第一对应关系为信息类型标识与索引值的对应关系;sending a third message to the terminal device, where the third message includes first indication information, the first indication information is used to indicate a first correspondence corresponding to the terminal equipment, and the first correspondence is an information type The correspondence between the identifier and the index value;
    向所述终端设备发送第四消息,所述第四消息包括:所述第四消息对应的信息类型标识在所述第一对应关系中对应的索引值。Sending a fourth message to the terminal device, where the fourth message includes: an index value corresponding to the information type identifier corresponding to the fourth message in the first correspondence.
  18. 如权利要求15-17任一项所述的网络设备,其特征在于,所述第三消息为无线资源控制层消息;和/或,The network device according to any one of claims 15-17, wherein the third message is a radio resource control layer message; and/or,
    所述第四消息为媒体访问控制层消息、无线链路控制层消息,或物理层消息。The fourth message is a medium access control layer message, a radio link control layer message, or a physical layer message.
  19. 如权利要求15-18任一项所述的网络设备,其特征在于,所述通信模块还用于:The network device according to any one of claims 15-18, wherein the communication module is further used for:
    向所述终端设备发送第三消息,所述第三消息包括第二指示信息,所述第二指示信息用于指示第三对应关系,所述第三对应关系包括所述终端设备的N1个辅小区的小区标识与小区索引号之间的对应关系;所述N1为正整数;其中,所述第三对应关系是根据N0 个小区得到的,所述N0个小区包括所述N1个辅小区和预设的N2个干扰小区,所述N2为正整数,所述N0为所述N1和所述N2的和;sending a third message to the terminal device, where the third message includes second indication information, where the second indication information is used to indicate a third correspondence, and the third correspondence includes N1 secondary The corresponding relationship between the cell identity of the cell and the cell index number; the N1 is a positive integer; wherein, the third corresponding relationship is obtained according to N0 cells, and the N0 cells include the N1 secondary cells and N2 preset interfering cells, the N2 is a positive integer, and the N0 is the sum of the N1 and the N2;
    向所述终端设备发送第四消息,所述第四消息包括第一字段,第一字段承载:N0个小区的小区索引号对应的激活指示信息,所述N0个小区中小区的小区索引号对应的激活指示信息用于指示所述小区激活或未激活。Send a fourth message to the terminal device, the fourth message includes a first field, and the first field carries: activation indication information corresponding to cell index numbers of N0 cells, where the cell index numbers of the N0 cells correspond to The activation indication information is used to indicate whether the cell is activated or not activated.
  20. 如权利要求19所述的网络设备,其特征在于,所述第三对应关系包括所述N0个小区的小区标识与小区索引号之间的对应关系,所述第三对应关系包括第一干扰小区的小区标识和第一小区索引号的对应关系;The network device according to claim 19, wherein the third correspondence includes the correspondence between the cell identities of the N0 cells and the cell index numbers, and the third correspondence includes the first interfering cell The corresponding relationship between the cell identity of the cell and the first cell index number;
    第四对应关系包括所述第一干扰小区的小区标识和第二小区索引号的对应关系;The fourth correspondence includes the correspondence between the cell identity of the first interfering cell and the second cell index number;
    所述第一小区索引号和所述第二小区索引号不同;The first cell index number is different from the second cell index number;
    其中,所述第四对应关系为除所述终端设备之外的一个其他终端设备对应的所述其他终端设备的辅小区和预设的至少一个干扰小区的小区标识与小区索引号的对应关系;或者,Wherein, the fourth correspondence is a correspondence between the secondary cell of the other terminal equipment corresponding to the terminal equipment other than the terminal equipment and the preset cell identifier and cell index number of at least one interfering cell; or,
    所述第三对应关系为所述终端设备的第一承载对应的对应关系,所述第四对应关系为所述第一终端设备的第二承载对应的至少一个辅小区和预设的至少一个干扰小区的小区标识与小区索引号的对应关系。The third correspondence is a correspondence corresponding to the first bearer of the terminal device, and the fourth correspondence is at least one secondary cell corresponding to the second bearer of the first terminal device and at least one preset interference The corresponding relationship between the cell ID of the cell and the cell index number.
  21. 如权利要求15-20任一项所述的网络设备,其特征在于,所述处理模块,具体用于:The network device according to any one of claims 15-20, wherein the processing module is specifically used for:
    根据用于指示所述终端设备的配置信息需受到安全保护的指示信息,通过所述通信模块向所述终端设备发送所述第二消息。Sending the second message to the terminal device through the communication module according to the indication information used to indicate that the configuration information of the terminal device needs to be protected by security.
  22. 如权利要求21所述的网络设备,其特征在于,所述用于指示所述终端设备的配置信息需受到安全保护的指示信息包括以下内容中的至少一项:The network device according to claim 21, wherein the indication information for indicating that the configuration information of the terminal device needs to be protected by security includes at least one of the following:
    所述网络设备接收到的第三指示信息;所述第三指示信息用于指示所述终端设备的配置信息需受到安全保护;The third indication information received by the network device; the third indication information is used to indicate that the configuration information of the terminal device needs to be protected by security;
    所述网络设备接收到的接入层安全模式命令完成消息,所述接入层安全模式命令完成消息用于指示接入层安全保护激活;The access layer security mode command completion message received by the network device, the access layer security mode command completion message is used to indicate the activation of the access layer security protection;
    预设的所述网络设备的配置信息;Preset configuration information of the network device;
    用于指示待发送的信息的信息类型与预设的需受到安全保护的信息类型匹配的信息;或,Information indicating that the information type of the information to be sent matches the preset information type to be protected by security; or,
    所述终端设备的能力信息,所述网络设备的能力信息。Capability information of the terminal device, capability information of the network device.
  23. 一种终端设备,其特征在于,包括通信模块和处理模块;A terminal device, characterized in that it includes a communication module and a processing module;
    所述处理模块用于:The processing module is used for:
    通过所述通信模块接收来自网络设备的第一消息,所述第一消息未受到安全保护,所述第一消息包括所述终端设备的第一用户配置信息;receiving a first message from a network device through the communication module, the first message is not protected by security, and the first message includes first user configuration information of the terminal device;
    通过所述通信模块接收来自所述网络设备的第二消息,所述第二消息受到安全保护,所述第二消息包括所述终端设备的第二用户配置信息,所述第二用户配置信息与所述第一用户配置信息不同;Receive a second message from the network device through the communication module, the second message is protected by security, the second message includes second user configuration information of the terminal device, and the second user configuration information is related to the second user configuration information of the terminal device. The first user configuration information is different;
    根据所述第二用户配置信息通过所述通信模块进行数据传输。performing data transmission through the communication module according to the second user configuration information.
  24. 如权利要求23所述的终端设备,其特征在于,所述第二消息为无线资源控制层消息;和/或,The terminal device according to claim 23, wherein the second message is a radio resource control layer message; and/or,
    所述处理模块,具体用于:根据所述第二用户配置信息通过所述通信模块传输媒体访问控制层、无线链路控制层,或物理层中的至少一项的消息。The processing module is specifically configured to: transmit a message of at least one of a media access control layer, a radio link control layer, or a physical layer through the communication module according to the second user configuration information.
  25. 如权利要求23或24所述的终端设备,其特征在于,所述处理模块,还用于:The terminal device according to claim 23 or 24, wherein the processing module is further used for:
    通过所述通信模块接收来自所述网络设备的第三消息,所述第三消息包括第一指示信息,所述第一指示信息用于指示所述终端设备对应的第一对应关系,所述第一对应关系为信息类型标识与索引值的对应关系;Receive a third message from the network device through the communication module, the third message includes first indication information, and the first indication information is used to indicate a first correspondence corresponding to the terminal device, the first indication information The one-to-one correspondence is the correspondence between the information type identifier and the index value;
    通过所述通信模块接收来自所述网络设备的向所述终端设备发送第四消息,所述第四消息包括:所述第四消息对应的信息类型标识在所述第一对应关系中对应的索引值。A fourth message sent from the network device to the terminal device is received by the communication module, the fourth message includes: an index corresponding to the information type identifier corresponding to the fourth message in the first correspondence value.
  26. 如权利要求23-25任一项所述的终端设备,其特征在于,所述第三消息为无线资源控制层消息;和/或,The terminal device according to any one of claims 23-25, wherein the third message is a radio resource control layer message; and/or,
    所述第四消息为媒体访问控制层消息、无线链路控制层消息,或物理层消息。The fourth message is a medium access control layer message, a radio link control layer message, or a physical layer message.
  27. 如权利要求23-26任一项所述的终端设备,其特征在于,所述处理模块,还用于:The terminal device according to any one of claims 23-26, wherein the processing module is further configured to:
    通过所述通信模块接收来自所述网络设备的第三消息,所述第三消息包括第二指示信息,所述第二指示信息用于指示第三对应关系,所述第三对应关系包括所述终端设备的N1个辅小区的小区标识与小区索引号之间的对应关系;所述N1为正整数;其中,所述第三对应关系是根据N0个小区得到的,所述N0个小区包括所述N1个辅小区和预设的N2个干扰小区,所述N2为正整数,所述N0为所述N1和所述N2的和;Receive a third message from the network device through the communication module, the third message includes second indication information, the second indication information is used to indicate a third correspondence, and the third correspondence includes the The corresponding relationship between cell identities and cell index numbers of the N1 secondary cells of the terminal device; the N1 is a positive integer; wherein, the third corresponding relationship is obtained based on N0 cells, and the N0 cells include all The N1 secondary cells and the preset N2 interfering cells, the N2 is a positive integer, and the N0 is the sum of the N1 and the N2;
    通过所述通信模块接收来自所述网络设备的,所述第四消息包括第一字段,第一字段承载:N0个小区的小区索引号对应的激活指示信息,所述N0个小区中小区的小区索引号对应的激活指示信息用于指示所述小区激活或未激活。Received from the network device through the communication module, the fourth message includes a first field, and the first field carries: activation indication information corresponding to the cell index numbers of N0 cells, and the cells of the cells in the N0 cells The activation indication information corresponding to the index number is used to indicate whether the cell is activated or not activated.
  28. 如权利要求27所述的终端设备,其特征在于,所述第三对应关系为所述N0个小区的小区标识与小区索引号之间的对应关系,所述第三对应关系包括第一干扰小区的小区标识和第一小区索引号的对应关系;The terminal device according to claim 27, wherein the third correspondence is a correspondence between cell identities and cell index numbers of the N0 cells, and the third correspondence includes the first interfering cell The corresponding relationship between the cell identity of the cell and the first cell index number;
    第四对应关系包括所述第一干扰小区的小区标识和第二小区索引号的对应关系;The fourth correspondence includes the correspondence between the cell identity of the first interfering cell and the second cell index number;
    所述第一小区索引号和所述第二小区索引号不同;The first cell index number is different from the second cell index number;
    其中,所述第四对应关系为除所述终端设备之外的一个其他终端设备对应的所述其他终端设备的辅小区和预设的至少一个干扰小区的小区标识与小区索引号的对应关系;或者,Wherein, the fourth correspondence is a correspondence between the secondary cell of the other terminal equipment corresponding to the terminal equipment other than the terminal equipment and the preset cell identifier and cell index number of at least one interfering cell; or,
    所述第三对应关系为所述终端设备的第一承载对应的对应关系,所述第四对应关系为所述第一终端设备的第二承载对应的至少一个辅小区和预设的至少一个干扰小区的小区标识与小区索引号的对应关系。The third correspondence is a correspondence corresponding to the first bearer of the terminal device, and the fourth correspondence is at least one secondary cell corresponding to the second bearer of the first terminal device and at least one preset interference The corresponding relationship between the cell ID of the cell and the cell index number.
  29. 一种通信装置,其特征在于,所述装置包括处理器和通信接口,A communication device, characterized in that the device includes a processor and a communication interface,
    所述通信接口,用于输入和/或输出信息;said communication interface for inputting and/or outputting information;
    所述处理器,用于执行计算机可执行程序,使得权利要求1-14中任一项所述的方法被执行。The processor is configured to execute a computer-executable program, so that the method described in any one of claims 1-14 is executed.
  30. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质存储有计算机可执行程序,所述计算机可执行程序在被计算机调用时,使所述计算机执行如权利要求1-14任一项所述的方法。A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer-executable program, and when the computer-executable program is invoked by a computer, the computer executes any of claims 1-14. one of the methods described.
PCT/CN2022/073692 2021-05-08 2022-01-25 Communication method and apparatus, and storage medium WO2022237236A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202110501160.4 2021-05-08
CN202110501160.4A CN115314888A (en) 2021-05-08 2021-05-08 Communication method, device and storage medium

Publications (1)

Publication Number Publication Date
WO2022237236A1 true WO2022237236A1 (en) 2022-11-17

Family

ID=83854031

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/073692 WO2022237236A1 (en) 2021-05-08 2022-01-25 Communication method and apparatus, and storage medium

Country Status (2)

Country Link
CN (1) CN115314888A (en)
WO (1) WO2022237236A1 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109802809A (en) * 2017-11-17 2019-05-24 华为技术有限公司 Method, terminal device and the network equipment of network insertion
WO2020164600A1 (en) * 2019-02-15 2020-08-20 华为技术有限公司 Information indication method and apparatus
CN111885721A (en) * 2020-06-30 2020-11-03 广东小天才科技有限公司 Resource allocation method, system, terminal equipment and network equipment
US20210021994A1 (en) * 2019-10-07 2021-01-21 Intel Corporation Secure user equipment capability transfer for user equipment with no access stratum security

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109802809A (en) * 2017-11-17 2019-05-24 华为技术有限公司 Method, terminal device and the network equipment of network insertion
WO2020164600A1 (en) * 2019-02-15 2020-08-20 华为技术有限公司 Information indication method and apparatus
US20210021994A1 (en) * 2019-10-07 2021-01-21 Intel Corporation Secure user equipment capability transfer for user equipment with no access stratum security
CN111885721A (en) * 2020-06-30 2020-11-03 广东小天才科技有限公司 Resource allocation method, system, terminal equipment and network equipment

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
NEC: "Combined RRC connection modification and security", 3GPP DRAFT; R2-073550 COMBINED RRC CONNECTION MODIFICATION AND SECURITY, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. RAN WG2, no. Athens, Greece; 20070815, 15 August 2007 (2007-08-15), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France , XP050136243 *

Also Published As

Publication number Publication date
CN115314888A (en) 2022-11-08

Similar Documents

Publication Publication Date Title
US20220287122A1 (en) Methods for enabling multi-link wlans
US11968533B2 (en) Methods and apparatus for secure access control in wireless communications
CN103109496B (en) For the method and apparatus of cryptographic communication of management frames utilizing quality-of-service mechanisms in WLAN system
KR102601585B1 (en) Systems and method for security protection of nas messages
Rinaldi et al. 5G NR system design: A concise survey of key features and capabilities
EP3820198A1 (en) Security protection method, device, and system
EP3817422A1 (en) Communication method and device
US10588019B2 (en) Secure signaling before performing an authentication and key agreement
WO2013165695A1 (en) Secure communications for computing devices utilizing proximity services
US10470044B2 (en) Resolving bidding down attacks for multi-connectivity
KR101461236B1 (en) Methods for performing an Authentication of entities during establishment of wireless call connection
WO2018205874A1 (en) Transmission method, terminal, and network device
US11956715B2 (en) Communications method and apparatus
WO2017219365A1 (en) Data transmission method and apparatus
US20210168614A1 (en) Data Transmission Method and Device
CN113395697B (en) Method and communication device for transmitting paging information
WO2022237236A1 (en) Communication method and apparatus, and storage medium
US20240155335A1 (en) Methods and apparatuses for privacy enhancement through mac address masquerading
WO2021203296A1 (en) Control messaging for multi-beam communications
CN116866900A (en) Encryption method and device based on channel secret key
WO2020147602A1 (en) Authentication method, apparatus and system
US20220303254A1 (en) Protection of communications through user equipment relay
TW202249508A (en) Security handling of 5gs to epc reselection
WO2024031042A1 (en) Nr mobility – security considerations for l1/l2 mobility switching of an spcell
TW202341767A (en) Encrypting discovery messages

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22806213

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE