WO2022237236A1 - Procédé et appareil de communication, et support de stockage - Google Patents

Procédé et appareil de communication, et support de stockage Download PDF

Info

Publication number
WO2022237236A1
WO2022237236A1 PCT/CN2022/073692 CN2022073692W WO2022237236A1 WO 2022237236 A1 WO2022237236 A1 WO 2022237236A1 CN 2022073692 W CN2022073692 W CN 2022073692W WO 2022237236 A1 WO2022237236 A1 WO 2022237236A1
Authority
WO
WIPO (PCT)
Prior art keywords
message
cell
terminal device
correspondence
information
Prior art date
Application number
PCT/CN2022/073692
Other languages
English (en)
Chinese (zh)
Inventor
郭龙华
习燕
吴�荣
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2022237236A1 publication Critical patent/WO2022237236A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption

Definitions

  • the present application relates to the technical field of communication, and in particular to a communication method, device and storage medium.
  • the terminal device When the terminal device is in an idle state, the terminal device and the network device are in an out-of-synchronization state, and the terminal device lacks available uplink resources. Once the terminal device needs to send uplink data or download downlink data, it needs to switch from the idle state to the connected state through a random access process.
  • the terminal device sends a random access request to the network device.
  • the network device returns a random access response to the terminal device, and performs uplink authorization on the terminal device in the random access response.
  • the terminal device may send a radio resource control (radio resource control, RRC) establishment request.
  • RRC radio resource control
  • the network device returns an RRC setup response to the terminal device.
  • the RRC establishment response includes user-specific configuration information.
  • the present application provides a communication method, device and storage medium to reduce the risk of information leakage.
  • the present application provides a communication method, including: a network device sends a first message to a terminal device, the first message is not protected by security, and the first message includes first user configuration information of the terminal device.
  • the network device sends a second message to the terminal device, the second message is protected by security, the second message includes second user configuration information of the terminal device, and the second user configuration information is different from the first user configuration information.
  • the network device performs data transmission with the terminal device according to the second user configuration information.
  • the first message is not protected by security
  • the first user configuration information is easily obtained by an attacker
  • the second user configuration information transmitted through the second message protected by security is different from the first user configuration information
  • the attacker cannot It is easy to obtain the configuration information of the second user from the second message protected by security, so that the security of data transmission can be improved.
  • the first user configuration information includes first downlink control information; the second user configuration information includes second downlink control information.
  • the risk of downlink control information leakage can be reduced, thereby further improving data security.
  • At least one of the first user configuration information or the second user configuration information includes at least one of the following:
  • the first message is a radio resource control establishment response message; the second message is a radio resource control configuration message or a radio resource control reconfiguration message. In this way, it can be further compatible with the existing technology.
  • the second user configuration information is used to assist message transmission of at least one of a medium access control layer, a radio link control layer, or a physical layer.
  • the information received by the radio resource control layer can be used to protect the information of at least one of the medium access control layer, the radio link control layer, or the physical layer, thereby improving the security of the underlying information.
  • the radio link control layer, or the physical layer may not be protected by security, because the media access control layer, radio link control layer, or A message of at least one of the radio link control layer or the physical layer can improve the security of information in such underlying messages.
  • the network device after the network device sends the first message to the terminal device and before the network device sends the second message to the terminal device, it further includes that the network device receives a security mode command completion message, and the security mode command completion message is used to Indicates that access stratum or non-access stratum security is active. Since the first message is sent before receiving the security mode command completion message, the first message has not received security protection, so the first user configuration information is easily obtained by an attacker. Since the second user configuration information is sent after the security protection is activated, the second user configuration information can be protected, thereby improving the security of data transmission.
  • the network device is an access network element or a mobility management network element.
  • the security mode command completion message is used to indicate activation of security protection at the access layer.
  • the security mode command completion message is used to indicate that the security protection of the non-access stratum is activated.
  • the network device sending the second message to the terminal device includes: the network device sending the second message to the terminal device according to indication information used to indicate that configuration information of the terminal device needs to be protected by security.
  • the solution provided by the embodiment of the present application can be enabled. If the indication information used to indicate that the configuration information of the terminal device needs to be protected by security is not obtained , then it may not be required to carry the user configuration information in the second message or the user configuration information carried in the second message is not required to be different from the first user configuration information, thereby improving data transmission efficiency.
  • the indication information used to indicate that the configuration information of the terminal device needs to be protected by security includes at least one of the following contents:
  • the third instruction information received by the network device is used to indicate that the configuration information of the terminal device needs to be protected; the access layer security mode command completion message received by the network device, the access layer security mode command completion message is used It is used to indicate the activation of security protection at the access layer; the configuration information of the preset network equipment; the information used to indicate that the information type of the information to be sent matches the preset information type that needs to be protected by security; or, the capability information of the terminal equipment , the capability information of the network device. In this way, the flexibility of the scheme can be improved.
  • the third indication information includes at least one of the following contents: a security level of the terminal device, a session security requirement, a security capability of the terminal device, or a core network security policy corresponding to the terminal device.
  • a security level of the terminal device a session security requirement
  • a security capability of the terminal device a security capability of the terminal device
  • a core network security policy corresponding to the terminal device it can be determined whether to improve the security of the user configuration information of the terminal device according to information such as the security level of the terminal device, so that personalized customization can be provided, for example, different information protection policies can be provided for terminal devices with different security levels.
  • the preset information types that need to be protected by security include at least one of the following: media access control layer information that needs to be protected by security; information that needs to be protected by radio link control layer ; or, Physical layer information to be protected by security.
  • media access control layer information that needs to be protected by security
  • information that needs to be protected by radio link control layer or, Physical layer information to be protected by security.
  • the present application provides a communication method, the method further includes: the network device sends a third message to the terminal device, the third message includes first indication information, and the first indication information is used to indicate the first corresponding relationship of the terminal device , the first correspondence is the correspondence between the information type identifier and the index value.
  • the network device sends a fourth message to the terminal device, where the fourth message includes: an index value corresponding to the information type identifier corresponding to the fourth message in the first correspondence relationship.
  • the fourth message no longer carries the information type identifier, but the index value corresponding to the information type identifier, after the attacker obtains the fourth message, it can increase the difficulty of cracking, and may not be able to obtain the correct information type identifier, so that further Improve the security of data transmission.
  • the information type identifier includes a logical channel identifier. This can increase the difficulty for an attacker to obtain the logical channel identifier, thereby improving the security of information transmission.
  • the first indication information includes at least one of the following contents: the first corresponding relationship; in this way, the terminal device does not need to recalculate the first corresponding relationship, so that the calculation amount of the terminal device can be reduced.
  • the preset rule is used to generate the first correspondence; in this way, the amount of data to be transmitted by the network device can be reduced.
  • a preset calculation formula used to generate the first correspondence relationship In this way, the amount of data to be transmitted by the network device can be reduced. And it can also improve the flexibility of the scheme.
  • the index value in the first correspondence can be obtained through one of the following: calculated by a randomization algorithm; obtained according to a preset rule; according to the information type identifier and the preset first calculated by a calculation formula; or calculated according to a preset value and a preset second calculation formula. In this way, the flexibility of the scheme can be improved.
  • the first correspondence includes a correspondence between a first information type identifier and a first index value
  • the second correspondence includes a correspondence between the first information type identifier and a second index value.
  • the first index value and the first index value are different.
  • the second correspondence is the correspondence between an information type identifier and an index value corresponding to a terminal equipment other than the terminal equipment; or, the first correspondence is the correspondence corresponding to the first bearer of the terminal equipment, and the second correspondence The relationship is the correspondence between the information type identifier corresponding to the second bearer of the first terminal device and the index value.
  • the correspondence between the information type identifier and the index value can be at the granularity of the terminal device or at the granularity of the bearer, and can be set flexibly. Compared with using a set of correspondence for all terminal devices, this embodiment can Further improve security.
  • the third message is protected by security.
  • the first corresponding relationship can be protected, and it is difficult for an attacker to obtain the first corresponding relationship, so the security of data transmission can be improved.
  • the third message is a radio resource control layer message, so it can be better compatible with the existing technology.
  • the fourth message is a medium access control layer message, a radio link control layer message; or a physical layer message.
  • the fourth message is not secured.
  • the information received by the radio resource control layer can be used to protect the information of at least one of the medium access control layer, the radio link control layer, or the physical layer, thereby improving the security of the underlying information.
  • at least one message transmission in the media access control layer, the radio link control layer, or the physical layer may not be protected by security, because the media access control layer, radio link control layer, or A message of at least one of the radio link control layer or the physical layer can improve the security of information in such underlying messages.
  • the fourth message is: a message of a media access control control element.
  • the media access control control element message can be better protected, and the security of the media access control control element message can be improved.
  • the fourth message is a secondary cell activation message, and the fourth message is used to request activation of the secondary cell. In this way, the security of the secondary cell activation message can be improved.
  • the network device sending the fourth message to the terminal device includes: the network device sending the fourth message to the terminal device according to indication information used to indicate that configuration information of the terminal device needs to be protected by security. In this way, it is possible to flexibly choose whether to further protect the information according to whether to obtain the indication information used to indicate that the configuration information of the terminal device needs to be protected, thereby improving the flexibility of the solution.
  • the present application provides a communication method, and the method further includes: a network device sending a third message to a terminal device.
  • the third message includes the second indication information.
  • the second indication information is used to indicate a third correspondence
  • the third correspondence includes correspondences between cell identities and cell index numbers of the N1 secondary cells of the terminal device.
  • N1 is a positive integer; wherein, the third correspondence is obtained based on N0 cells, N0 cells include N1 secondary cells and preset N2 interfering cells, N2 is a positive integer, and N0 is the sum of N1 and N2.
  • the network device sends a fourth message to the terminal device, the fourth message includes a first field, and the first field carries: activation indication information corresponding to cell index numbers of N0 cells, activation indication information corresponding to cell index numbers of cells among the N0 cells It is used to indicate whether the cell is activated or deactivated. Since the index number is generated for the cell according to the interfering cell and the secondary cell, and the activation indication information of the interfering cell is added to the first field, it is difficult for the attacker to obtain the correct activation cell information from the information in the first field. This increases the difficulty for attackers to obtain private information.
  • the third correspondence further includes: a correspondence between a cell identifier of at least one interfering cell among the N2 interfering cells and a cell index number.
  • the terminal device can determine which cells corresponding to the activation indication information in the fourth message are interfering cells, so that part of the information can be discarded, and then the correct cell index number of the activated cell can be obtained.
  • the third message further includes indication information for indicating that the cell corresponding to the cell identifier of the interfering cell is the interfering cell.
  • the terminal device can determine which cells corresponding to the cell index numbers are interfering cells, thereby laying a foundation for subsequently removing information corresponding to the interfering cells from the first field.
  • the activation indication information corresponding to the cell index number of the interfering cell indicates that the interfering cell is activated. In this way, it can increase the difficulty for an attacker to obtain the correct number of activated cells.
  • the cell index number of the cell in the N0 cells is: the serial number of the cell obtained by sorting the N1 secondary cells and the N2 interfering cells;
  • the first field sequentially carries the activation instruction information corresponding to the N0 cells according to the serial numbers of the cells in the N0 cells. In this way, it can be further compatible with the existing technology.
  • N1 is an integer greater than 1
  • there are at least two secondary cells and the cell sequence numbers of at least one interfering cell are included between the cell sequence numbers of the two secondary cells. In this way, it can further increase the difficulty for an attacker to obtain the correct number of secondary cells.
  • the third correspondence is the correspondence between the cell IDs of the N0 cells and the cell index numbers
  • the third correspondence includes the correspondence between the cell IDs of the first interfering cell and the first cell index numbers relation.
  • the fourth correspondence includes the correspondence between the cell identifier of the first interfering cell and the index number of the second cell.
  • the first cell index number and the second cell index number are different.
  • the fourth correspondence is the correspondence between the secondary cell of the terminal equipment other than the terminal equipment and the preset cell identifier and cell index number of at least one interfering cell.
  • the third correspondence is the correspondence corresponding to the first bearer of the terminal device
  • the fourth correspondence is the cell identity and cell identity of at least one secondary cell corresponding to the second bearer of the first terminal device and at least one preset interfering cell Correspondence between index numbers. That is to say, the correspondence between the cell ID and the cell index number can be at the granularity of the terminal device or at the granularity of the bearer, and can be flexibly set. Compared with using a set of correspondence for all terminal devices, this embodiment can Further improve security.
  • the third message is protected by security.
  • the first corresponding relationship can be protected, and it is difficult for an attacker to obtain the first corresponding relationship, so the security of data transmission can be improved.
  • the third message is a radio resource control layer message, so it can be better compatible with the existing technology.
  • the fourth message is a medium access control layer message, a radio link control layer message, or a physical layer message.
  • the fourth message is not secured.
  • the information received by the radio resource control layer can be used to protect the information of at least one of the medium access control layer, the radio link control layer, or the physical layer, thereby improving the security of the underlying information.
  • at least one message transmission in the media access control layer, the radio link control layer, or the physical layer may not be protected by security, because the media access control layer, radio link control layer, or A message of at least one of the radio link control layer or the physical layer can improve the security of information in such underlying messages.
  • the fourth message is: a message of a media access control control element.
  • the media access control control element message can be better protected, and the security of the media access control control element message can be improved.
  • the fourth message is a secondary cell activation message, and the fourth message is used to request activation of the secondary cell. In this way, the security of the secondary cell activation message can be improved.
  • the network device sending the fourth message to the terminal device includes: the network device sending the fourth message to the terminal device according to indication information used to indicate that configuration information of the terminal device needs to be protected by security. In this way, it is possible to flexibly choose whether to further protect the information according to whether to obtain the indication information used to indicate that the configuration information of the terminal device needs to be protected, thereby improving the flexibility of the solution.
  • the present application provides a communication method, the method includes a terminal device receiving a first message from a network device, the first message is not protected by security, and the first message includes first user configuration information of the terminal device.
  • the terminal device receives the second message from the network device, the second message is protected by security, the second message includes second user configuration information of the terminal device, and the second user configuration information is different from the first user configuration information.
  • the terminal device performs data transmission according to the configuration information of the second user.
  • the first message is not protected by security
  • the first user configuration information is easily obtained by an attacker
  • the second user configuration information transmitted through the second message protected by security is different from the first user configuration information
  • the attacker cannot It is easy to obtain the configuration information of the second user from the second message protected by security, so that the security of data transmission can be improved.
  • the first user configuration information includes first downlink control information; the second user configuration information includes second downlink control information.
  • the risk of downlink control information leakage can be reduced, thereby further improving data security.
  • At least one item of the first user configuration information or the second user configuration information includes at least one of the following contents: a scrambling code identifier; a partial bandwidth; The position; the number of start symbols of the physical downlink control channel; the length of the downlink control information; the candidate set; or, the time domain table of the physical downlink shared channel.
  • the first message is a radio resource control establishment response message; the second message is a radio resource control configuration message or a radio resource control reconfiguration message. In this way, it can be further compatible with the existing technology.
  • the second user configuration information is used to assist message transmission of at least one of a medium access control layer, a radio link control layer, or a physical layer.
  • the information received by the radio resource control layer can be used to protect the information of at least one of the medium access control layer, the radio link control layer, or the physical layer, thereby improving the security of the underlying information.
  • the radio link control layer, or the physical layer may not be protected by security, because the media access control layer, radio link control layer, or A message of at least one of the radio link control layer or the physical layer can improve the security of information in such underlying messages.
  • the terminal device performs data transmission according to the second user configuration information, including: the terminal device transmits the physical layer, media access control layer or radio link control layer according to the second user configuration information in the second message at least one of the messages.
  • the information received by the radio resource control layer can be used to protect the information of at least one of the medium access control layer, the radio link control layer, or the physical layer, thereby improving the security of the underlying information.
  • the present application provides a communication method, the method further includes: the terminal device receives a third message from the network device, the third message includes first indication information, and the first indication information is used to indicate the first correspondence corresponding to the terminal device. relationship, the first corresponding relationship is the corresponding relationship between the information type identifier and the index value.
  • the terminal device receives a fourth message sent from the network device to the terminal device, where the fourth message includes: an index value corresponding to the information type identifier corresponding to the fourth message in the first correspondence.
  • the terminal device determines the information type identifier corresponding to the index value in the fourth message according to the first indication information.
  • the fourth message no longer carries the information type identifier, but the index value corresponding to the information type identifier, after the attacker obtains the fourth message, it can increase the difficulty of cracking, and may not be able to obtain the correct information type identifier, so that further Improve the security of data transmission.
  • the information type identifier includes: a logical channel identifier. This can increase the difficulty for an attacker to obtain the logical channel identifier, thereby improving the security of information transmission.
  • the first indication information includes: the first corresponding relationship; in this way, the terminal device does not need to recalculate the first corresponding relationship, so that the calculation amount of the terminal device can be reduced.
  • the first indication information includes: a first corresponding relationship; a preset rule for generating the first corresponding relationship; in this way, the amount of data to be transmitted by the network device can be reduced.
  • the first indication information includes: a first corresponding relationship; and a preset calculation formula used to generate the first corresponding relationship. In this way, the amount of data to be transmitted by the network device can be reduced. And it can also improve the flexibility of the scheme.
  • the index value in the first correspondence can be obtained through one of the following: calculated by a randomization algorithm; obtained according to a preset rule; according to the information type identifier and the preset first calculated by a calculation formula; or calculated according to a preset value and a preset second calculation formula. In this way, the flexibility of the scheme can be improved.
  • the first correspondence includes the correspondence between the first information type identifier and the first index value
  • the second correspondence includes the correspondence between the first information type identifier and the second index value.
  • the first index value is different from the first index value
  • the second correspondence is a correspondence between an information type identifier and an index value corresponding to a terminal device other than the terminal device.
  • the first correspondence is the correspondence corresponding to the first bearer of the terminal device
  • the second correspondence is the correspondence between the information type identifier and the index value corresponding to the second bearer of the first terminal device.
  • the correspondence between the information type identifier and the index value can be at the granularity of the terminal device or at the granularity of the bearer, and can be set flexibly. Compared with using a set of correspondence for all terminal devices, this embodiment can Further improve security.
  • the third message is protected by security.
  • the first corresponding relationship can be protected, and it is difficult for an attacker to obtain the first corresponding relationship, so the security of data transmission can be improved.
  • the third message is a radio resource control layer message, so that it can be better compatible with the existing technology.
  • the fourth message is a medium access control layer message, a radio link control layer message, or a physical layer message.
  • the fourth message is not secured.
  • the information received by the radio resource control layer can be used to protect the information of at least one of the medium access control layer, the radio link control layer, or the physical layer, thereby improving the security of the underlying information.
  • at least one message transmission in the media access control layer, the radio link control layer, or the physical layer may not be protected by security, because the media access control layer, radio link control layer, or A message of at least one of the radio link control layer or the physical layer can improve the security of information in such underlying messages.
  • the fourth message is: a message of a media access control control element.
  • the media access control control element message can be better protected, and the security of the media access control control element message can be improved.
  • the fourth message is a secondary cell activation message, and the fourth message is used to request activation of the secondary cell. In this way, the security of the secondary cell activation message can be improved.
  • the present application provides a communication method, the method further includes: the terminal device receives a third message from the network device, the third message includes second indication information, the second indication information is used to indicate the third correspondence, and the third The corresponding relationship includes the corresponding relationship between the cell identifiers of the N1 secondary cells of the terminal device and the cell index number; N1 is a positive integer; wherein, the third corresponding relationship is obtained based on N0 cells, and the N0 cells include N1 secondary cells and preset N2 interfering cells, N2 is a positive integer, and N0 is the sum of N1 and N2.
  • the terminal device receives from the network device, the fourth message includes a first field, and the first field carries: activation indication information corresponding to the cell index numbers of N0 cells, and the activation indication information corresponding to the cell index numbers of the cells in the N0 cells is used for Indicates whether the cell is active or not.
  • the terminal device determines the activated secondary cell among the N2 secondary cells according to the second indication information. Since the index number is generated for the cell according to the interfering cell and the secondary cell, and the activation indication information of the interfering cell is added to the first field, it is difficult for the attacker to obtain the correct activation cell information from the information in the first field. This increases the difficulty for attackers to obtain private information.
  • the third correspondence further includes: a correspondence between a cell identifier of at least one interfering cell among the N2 interfering cells and a cell index number.
  • the terminal device can determine which cells corresponding to the activation indication information in the fourth message are interfering cells, so that this part of information can be discarded, and then the correct cell index number of the activated cell can be obtained.
  • the third message further includes indication information for indicating that the cell corresponding to the cell identifier of the interfering cell is the interfering cell.
  • the terminal device can determine which cells corresponding to the cell index numbers are interfering cells, thereby laying a foundation for subsequently removing information corresponding to the interfering cells from the first field.
  • the activation indication information corresponding to the cell index number of the interfering cell indicates that the interfering cell is activated. In this way, it can increase the difficulty for an attacker to obtain the correct number of activated cells.
  • the cell index number of the cell in the N0 cells is: the serial number of the cell obtained by sorting the N1 secondary cells and the N2 interfering cells.
  • the first field sequentially carries the activation instruction information corresponding to the N0 cells according to the serial numbers of the cells in the N0 cells. In this way, it can be further compatible with the existing technology.
  • N1 is an integer greater than 1
  • there are at least two secondary cells and the cell sequence numbers of at least one interfering cell are included between the cell sequence numbers of the two secondary cells. In this way, it can further increase the difficulty for an attacker to obtain the correct number of secondary cells.
  • the third correspondence is the correspondence between the cell IDs of the N0 cells and the cell index numbers
  • the third correspondence includes the correspondence between the cell IDs of the first interfering cell and the first cell index numbers relation.
  • the fourth correspondence includes the correspondence between the cell identifier of the first interfering cell and the index number of the second cell.
  • the first cell index number and the second cell index number are different.
  • the fourth correspondence relationship is a correspondence relationship between a secondary cell of a terminal equipment other than the terminal equipment corresponding to a cell identifier and a cell index number of at least one preset interfering cell.
  • the third correspondence is the correspondence corresponding to the first bearer of the terminal device
  • the fourth correspondence is the cell identity and cell identity of at least one secondary cell corresponding to the second bearer of the first terminal device and at least one preset interfering cell Correspondence between index numbers. That is to say, the correspondence between the cell ID and the cell index number can be at the granularity of the terminal device or at the granularity of the bearer, and can be flexibly set. Compared with using a set of correspondence for all terminal devices, this embodiment can Further improve security.
  • the third message is protected by security.
  • the first corresponding relationship can be protected, and it is difficult for an attacker to obtain the first corresponding relationship, so the security of data transmission can be improved.
  • the third message is a radio resource control layer message, so that it can be better compatible with the existing technology.
  • the fourth message is a medium access control layer message, a radio link control layer message, or a physical layer message.
  • the fourth message is not secured.
  • the information received by the radio resource control layer can be used to protect the information of at least one of the medium access control layer, the radio link control layer, or the physical layer, thereby improving the security of the underlying information.
  • at least one message transmission in the media access control layer, the radio link control layer, or the physical layer may not be protected by security, because the media access control layer, radio link control layer, or A message of at least one of the radio link control layer or the physical layer can improve the security of information in such underlying messages.
  • the fourth message is: a message of a media access control control element.
  • the media access control control element message can be better protected, and the security of the media access control control element message can be improved.
  • the fourth message is a secondary cell activation message, and the fourth message is used to request activation of the secondary cell. In this way, the security of the secondary cell activation message can be improved.
  • the present application further provides a communication device.
  • the communication device may be any device at the sending end or device at the receiving end that performs data transmission in a wireless manner.
  • a communication chip, a terminal device, or a network device such as a base station, etc.
  • the device at the sending end and the device at the receiving end are relative.
  • the communication device can be used as the above-mentioned network equipment or a communication chip that can be used in network equipment; in some communication processes, the communication device can be used as the above-mentioned terminal equipment or a communication chip that can be used in terminal equipment.
  • a communication device including a communication unit and a processing unit, so as to implement any implementation manner of any communication method in the first aspect to the sixth aspect.
  • the communication unit is used to perform functions related to transmission and reception.
  • the communication unit includes a receiving unit and a sending unit.
  • the communication device is a communication chip, and the communication unit may be an input-output circuit or port of the communication chip.
  • the communication unit may be a transmitter and a receiver, or the communication unit may be a transmitter and a receiver.
  • the communication device further includes various modules that can be used to implement any implementation manner of any communication method from the first aspect to the sixth aspect.
  • a communication device is provided, and the communication device is the above-mentioned terminal device or network device. Includes processor and memory.
  • a transceiver is also included, the memory is used to store computer programs or instructions, the processor is used to call and run the computer programs or instructions from the memory, and when the processor executes the computer programs or instructions in the memory, the The communication device executes any implementation manner of any communication method in the foregoing first aspect to the sixth aspect.
  • processors there are one or more processors, and one or more memories.
  • the memory may be integrated with the processor, or the memory may be separated from the processor.
  • the transceiver may include a transmitter (transmitter) and a receiver (receiver).
  • a communication device including a processor.
  • the processor is coupled with the memory, and may be used to execute any one of the first aspect to the sixth aspect, and the method in any possible implementation manner of the first aspect to the sixth aspect.
  • the communication device further includes a memory.
  • the communication device further includes a communication interface, and the processor is coupled to the communication interface.
  • the communication device is a terminal device.
  • the communication interface may be a transceiver, or an input/output interface.
  • the transceiver may be a transceiver circuit.
  • the input/output interface may be an input/output circuit.
  • the communication device is a network device.
  • the communication interface may be a transceiver, or an input/output interface.
  • the transceiver may be a transceiver circuit.
  • the input/output interface may be an input/output circuit.
  • the communication device is a chip or a chip system.
  • the communication interface may be an input/output interface, an interface circuit, an output circuit, an input circuit, pins or related circuits on the chip or the chip system.
  • a processor may also be embodied as processing circuitry or logic circuitry.
  • a system in a tenth aspect, includes the above-mentioned terminal device and network device.
  • a computer program product includes: a computer program (also referred to as code, or an instruction), when the computer program is executed, the computer executes any possible The method in the implementation manner, or causing the computer to execute the method in any one of the implementation manners from the first aspect to the sixth aspect above.
  • a computer program also referred to as code, or an instruction
  • a computer-readable storage medium stores a computer program (also referred to as code, or an instruction) which, when running on a computer, enables the computer to perform any of the above-mentioned first aspects.
  • a computer program also referred to as code, or an instruction
  • a chip system may include a processor.
  • the processor is coupled with the memory, and may be used to execute any one of the first aspect to the sixth aspect, and the method in any possible implementation manner of any one of the first aspect to the sixth aspect.
  • the chip system further includes a memory.
  • Memory used to store computer programs (also called code, or instructions).
  • a processor configured to call and run a computer program from a memory, so that the device installed with the system-on-a-chip executes any one of the first to sixth aspects, and any possible one of any one of the first to sixth aspects method in the implementation.
  • a processing device including: an input circuit, an output circuit, and a processing circuit.
  • the processing circuit is used to receive signals through the input circuit and transmit signals through the output circuit, so that any one of the first aspect to the sixth aspect, and the method in any possible implementation manner of the first aspect to the sixth aspect are realized.
  • the above-mentioned processing device may be a chip, the input circuit may be an input pin, the output circuit may be an output pin, and the processing circuit may be a transistor, a gate circuit, a flip-flop, and various logic circuits.
  • the input signal received by the input circuit may be received and input by, for example but not limited to, the receiver, the output signal of the output circuit may be, for example but not limited to, output to the transmitter and transmitted by the transmitter, and the input circuit and the output
  • the circuit may be the same circuit, which is used as an input circuit and an output circuit respectively at different times.
  • the embodiment of the present application does not limit the specific implementation manners of the processor and various circuits.
  • Figure 1 is a schematic diagram of a 5G network architecture based on a service architecture
  • Figure 2 is a schematic diagram of a 5G network architecture based on a point-to-point interface
  • Figure 3a is a schematic structural diagram of a control plane protocol stack under a 5G communication system
  • Figure 3b is a schematic structural diagram of a user plane protocol stack in a 5G communication system
  • FIG. 4 is a schematic structural diagram of a communication device provided in an embodiment of the present application.
  • FIG. 5 is a schematic flowchart of a communication method provided by an embodiment of the present application.
  • FIG. 6 is a schematic flowchart of another communication method provided by the embodiment of the present application.
  • FIG. 7 is a schematic flowchart of another communication method provided by the embodiment of the present application.
  • FIG. 8 is a schematic structural diagram of a possible MAC PDU provided by the embodiment of the present application.
  • FIG. 9 is a schematic flowchart of another communication method provided by the embodiment of the present application.
  • FIG. 10 is a schematic flowchart of another communication method provided by the embodiment of the present application.
  • FIG. 11 is a schematic structural diagram of another communication device provided by an embodiment of the present application.
  • the communication system applicable to this application may include terminal equipment and network equipment, and the network equipment may be an access network equipment (such as the following (wireless) access network (radio access network, (R) AN) network element), or a core network equipment, or a module, component or chip inside an access network device, or a module, component or chip inside a core network device, and the like.
  • an access network equipment such as the following (wireless) access network (radio access network, (R) AN) network element
  • R radio access network
  • AN radio access network
  • core network equipment or a module, component or chip inside an access network device, or a module, component or chip inside a core network device, and the like.
  • the communication system applicable to this application can be the fifth generation (5th generation, 5G) network architecture, of course, it can also be used in other network architectures, such as the Global System of Mobile communication (GSM) system, code division multiple access (Code Division Multiple Access, CDMA) system, Wideband Code Division Multiple Access (WCDMA) system, General Packet Radio Service (GPRS), Long Term Evolution (LTE) system, Advanced long term evolution (LTE-A) system, Universal Mobile Telecommunications System (UMTS), evolved Long Term Evolution (eLTE) system and future 6G and other mobile communications system.
  • GSM Global System of Mobile communication
  • CDMA code division multiple access
  • WCDMA Wideband Code Division Multiple Access
  • GPRS General Packet Radio Service
  • LTE Long Term Evolution
  • LTE-A Advanced long term evolution
  • UMTS Universal Mobile Telecommunications System
  • eLTE evolved Long Term Evolution
  • the embodiment of the application is introduced by taking the application of the embodiment of the application to the 5G network architecture as an example.
  • Figure 1 is a possible 5G network architecture provided by the embodiment of the application.
  • the communication system architecture applicable to the embodiment of the present application is introduced below in conjunction with FIG. 1.
  • the network architecture generally includes the following devices, network elements, and networks:
  • the terminal equipment is shown as an example of user equipment (user equipment, UE).
  • the terminal device in the embodiment of the present application may be a device for implementing a wireless communication function.
  • the terminal equipment may be a user equipment (user equipment, UE), an access terminal, a terminal unit, a terminal station, a mobile station, or a mobile station in a 5G network or a future evolved public land mobile network (PLMN).
  • PLMN public land mobile network
  • remote station remote terminal, mobile device, wireless communication device, terminal agent or terminal device, etc.
  • An access terminal may be a cellular phone, a cordless phone, a session initiation protocol (SIP) phone, a wireless local loop (WLL) station, a personal digital assistant (PDA), a Functional handheld devices, computing devices or other processing devices connected to wireless modems, vehicle-mounted devices or wearable devices, virtual reality (virtual reality, VR) terminal devices, augmented reality (augmented reality, AR) terminal devices, industrial control (industrial Wireless terminals in control, wireless terminals in self driving, wireless terminals in remote medical, wireless terminals in smart grid, wireless terminals in transportation safety Terminals, wireless terminals in smart cities, wireless terminals in smart homes, etc. Terminals can be mobile or fixed.
  • the above-mentioned terminal device can establish a connection with the operator network through an interface provided by the operator network (such as N1, etc.), and use services such as data and/or voice provided by the operator network.
  • the terminal device can also access the DN through the operator's network, and use the operator's service deployed on the DN, and/or the service provided by a third party.
  • the above-mentioned third party may be a service party other than the operator's network and the terminal device, and may provide other services such as data and/or voice for the terminal device.
  • the specific form of expression of the above-mentioned third party can be determined according to the actual application scenario, and is not limited here.
  • (wireless) access network radio access network, (R) AN) network element: used to provide network access functions for authorized terminal equipment in a specific area, and can use different quality network elements according to the level of terminal equipment and business requirements. transport tunnel.
  • RAN is a sub-network of the operator's network, and is an implementation system between service nodes and terminal equipment in the operator's network.
  • the terminal equipment To access the operator's network, the terminal equipment first passes through the RAN, and then can be connected to the service node of the operator's network through the RAN.
  • the RAN device in this application is a device that provides a wireless communication function for a terminal device, and the RAN device is also called an access network device.
  • the RAN equipment in this application includes but is not limited to: next-generation base station (g nodeB, gNB) in 5G, evolved node B (evolved node B, eNB), radio network controller (radio network controller, RNC), node B (node B, NB), base station controller (base station controller, BSC), base transceiver station (base transceiver station, BTS), home base station (for example, home evolved nodeB, or home node B, HNB), baseband unit (baseBand unit, BBU), transmission point (transmitting and receiving point, TRP), transmission point (transmitting point, TP), mobile switching center, etc.
  • next-generation base station g nodeB, gNB
  • 5G evolved node B (evolved node B, eNB), radio network controller (radio network controller, RNC), node B (node B, NB), base station controller (base station controller, BSC), base transceiver station (base transceiver station, BTS
  • User plane network element used for packet routing and forwarding and quality of service (QoS) processing of user plane data.
  • QoS quality of service
  • the user plane network element may be a user plane function (user plane function, UPF) network element, for example, may include an intermediate user plane function (intermediate user plane function, I-UPF) network element, or at least one of the anchor user plane function (PDU Session anchor user plane function, PSA-UPF) network element.
  • UPF user plane function
  • I-UPF intermediate user plane function
  • PSA-UPF anchor user plane function
  • the user plane network element may still be a UPF network element, or may have other names, which are not limited in this application.
  • Data network data network, DN
  • DN data network
  • the data network may be DN1 and DN2.
  • the data network may still be a DN, or may have other names, which are not limited in this application.
  • Mobility management network element mainly used for mobility management and access management, etc., and can be used to implement functions other than session management in mobility management network element (mobility management entity, MME) functions, for example, legal functions such as monitoring and access authorization/authentication.
  • MME mobility management entity
  • the access and mobility management may be an access and mobility management function (access and mobility management function, AMF) network element.
  • AMF access and mobility management function
  • the access and mobility management may still be an AMF network element, or may have other names, which are not limited in this application.
  • Session management network element mainly used for session management, Internet protocol (internet protocol, IP) address allocation and management of terminal equipment, selection of manageable user plane functions, policy control and charging interface endpoints and downlink data notification etc.
  • Internet protocol Internet protocol, IP
  • the session management network element may be a session management function (session management function, SMF) network element, for example, may include an intermediate session management function (intermediate session management function, I-SMF) network element, or at least one item in an anchor session management function (anchor session management function, A-SMF) network element.
  • SMF session management function
  • I-SMF intermediate session management function
  • A-SMF anchor session management function
  • the session management network element may still be an SMF network element, or may have other names, which are not limited in this application.
  • Policy control network element a unified policy framework for guiding network behavior, providing policy rule information, etc. for control plane functional network elements (such as AMF, SMF network elements, etc.).
  • the policy control network element may be a policy control function (policy control function, PCF) network element.
  • policy control network element may still be a PCF network element, or may have other names, which are not limited in this application.
  • Authentication service network element used for authentication services, generating keys to realize two-way authentication of terminal equipment, and supporting a unified authentication framework.
  • the authentication service network element may be an authentication server function (authentication server function, AUSF) network element.
  • the authentication service function network element may still be an AUSF network element, or may have other names, which are not limited in this application.
  • the data management network element can be a unified data management (unified data management, UDM) network element, which can be used to process terminal device identification, access authentication, registration and mobility management Wait.
  • UDM unified data management
  • the unified data management may still be a UDM network element, or may have other names, which are not limited in this application.
  • the data management network element can also be a unified database (Unified Data Repository, UDR). It is responsible for the access function of contract data, policy data, application data and other types of data.
  • UDR Unified Data Repository
  • the PCF may obtain policy decision-related or corresponding subscription information from the UDR.
  • the unified database may still be UDR, or may have other names, which are not limited in this application.
  • Application network element used for data routing for application impact, access to network elements with open network functions, and interaction with the policy framework for policy control, etc.
  • the application network element may be an application function (application function, AF) network element.
  • the application network element may still be an AF network element, or may have other names, which are not limited in this application.
  • Network storage network element used to maintain real-time information of all network function services in the network.
  • the network storage network element may be a network registry function (network repository function, NRF) network element.
  • NRF network repository function
  • the network storage network element may still be an NRF network element, or may have other names, which are not limited in this application.
  • Network slice selection network element used to provide network slice selection function.
  • the network slice selection network element can be a network slice selection function (Network Slice Selection Function, NSSF) network element.
  • NSSF Network Slice Selection Function
  • the network slice selection network element can still be NSSF A network element, or, may also have other names, which are not limited in this application.
  • Network capability opening network element used to provide network customization functions.
  • the network capability exposure network element can be a network exposure function (network exposure function, NEF) network element.
  • NEF network exposure function
  • the network capability exposure network element can still be a NEF network element. element, or may have other names, which are not limited in this application.
  • the applicable communication system architecture in this embodiment of the present application may also include other network elements, such as a network analysis function network element and a service communication function network element.
  • the network element with the network analysis function is used to provide the network slice instance-level data analysis function. For example, it is possible to obtain data, then use the data for training and analysis, and make corresponding inferences based on the analysis results.
  • the network analysis function network element may be a network analysis function (network analytics function, NWDAF) network element.
  • Nnssf, Nausf, Nnef, Npcf, Nudm, Naf, Namf, Nsmf, N1, N2, N3, N4, and N6 are interface serial numbers.
  • interface serial numbers refer to the meanings defined in the 3GPP standard protocol, and there is no limitation here.
  • the above-mentioned network element or function may be a network element in a hardware device, a software function running on dedicated hardware, or a virtualization function instantiated on a platform (for example, a cloud platform).
  • the above-mentioned network elements or functions can be divided into one or more services, and further, there may also be services that exist independently of network functions.
  • an instance of the above-mentioned function, or an instance of a service included in the above-mentioned function, or a service instance existing independently of the network function may be referred to as a service instance.
  • the embodiments of the present application are not limited to the above-mentioned system architecture, and can also be applied to other communication systems in the future, such as the 6th generation communication (the 6th generation, 6G) system architecture and the like.
  • the names of the various network elements used above in the embodiments of the present application may keep the same function in the future communication system, but the names will be changed.
  • FIG. 2 exemplarily shows a schematic diagram of a service-based architecture-based 5G network architecture provided by an embodiment of the present application.
  • N7 The interface between PCF and SMF, which is used to deliver protocol data unit (protocol data unit, PDU) session granularity and business data flow granularity control policy.
  • protocol data unit protocol data unit
  • PDU protocol data unit
  • N15 the interface between the PCF and the AMF, used to issue UE policies and access control-related policies.
  • N5 the interface between the AF and the PCF, used for sending application service requests and reporting network events.
  • N4 The interface between SMF and UPF, which is used to transfer information between the control plane and the user plane, including controlling the distribution of forwarding rules for the user plane, QoS control rules, traffic statistics rules, etc., and reporting of user plane information .
  • N11 The interface between SMF and AMF, used to transfer PDU session tunnel information between RAN and UPF, transfer control messages sent to UE, transfer radio resource control information sent to RAN, etc.
  • N2 the interface between the AMF and the RAN, used to transmit radio bearer control information from the core network side to the RAN.
  • N1 The interface between the AMF and the UE, which has nothing to do with access, and is used to transfer QoS control rules to the UE.
  • N8 The interface between AMF and UDM, which is used for AMF to obtain subscription data and authentication data related to access and mobility management from UDM, and for AMF to register UE current mobility management related information with UDM.
  • N10 the interface between the SMF and the UDM, used for the SMF to obtain session management-related subscription data from the UDM, and for the SMF to register UE current session-related information with the UDM.
  • N35 interface between UDM and UDR, used for UDM to obtain user subscription data information from UDR.
  • N36 the interface between the PCF and the UDR, used for the PCF to obtain policy-related subscription data and application data-related information from the UDR.
  • N12 The interface between AMF and AUSF, used for AMF to initiate an authentication process to AUSF, which can carry SUCI as a subscription identifier;
  • N13 interface between UDM and AUSF, used for AUSF to obtain user authentication vector from UDM to execute the authentication process.
  • N22 an interface between the NSSF and the AMF, used for the AMF to receive slice selection information from the NSSF.
  • Fig. 3a exemplarily shows a schematic structural diagram of a control plane protocol stack in a 5G communication system
  • Fig. 3b exemplarily shows a structural schematic diagram of a user plane protocol stack in a 5G communication system
  • the control plane protocol stack of the terminal device may include: non-access (non-access stratum, NAS) layer, radio resource control (Radio Resource Control, RRC) layer, packet data convergence protocol (Packet Data Convergence Protocol) , PDCP) layer, radio link control (radio link control, RLC) layer, media access control (media access control, MAC) layer, physical (physical, PHY) layer.
  • the control plane protocol stack of gNB may include: RRC layer, PDCP layer, RLC layer, MAC layer and PHY layer.
  • AMF's control plane protocol stack may include a NAS layer.
  • the user plane protocol stack of the terminal device may include: a service data adaptation protocol (service data adaptation protocol, SDAP) layer, a PDCP layer, an RLC layer, a MAC layer, and a PHY layer.
  • SDAP service data adaptation protocol
  • the user plane protocol stack of gNB may include: SDAP layer, PDCP layer, RLC layer, MAC layer and PHY layer.
  • the NAS layer is the non-access layer, which can be mainly used for the connection and mobility control between the terminal equipment and the AMF.
  • the AMF receives messages from the base station, it is not initiated by the base station.
  • the base station only transparently transmits the message sent by the terminal device to the AMF and cannot identify or change this part of the message, so it is called NAS message.
  • the NAS message is the interaction between the terminal device and the AMF, such as mobility and connection process messages such as attachment, bearer establishment, and service request.
  • the RRC layer can be mainly used to handle all signaling between the terminal equipment and the network elements of the 5G communication system (messages between the user and the base station), including system information, admission control, security management, cell reselection, measurement reporting, Handover and mobility, NAS messaging, radio resource management, etc.
  • the SDAP layer is located above the packet data convergence protocol (PDCP) layer, and directly carries Internet protocol (internet protocol, IP) data packets, which can be used for the user plane.
  • IP Internet protocol
  • the main functions of the 5G PDCP layer may include at least one of the following:
  • Control plane integrity verification (4G only has control plane, 5G user plane can be selectively verified);
  • the PDCP of the gNodeB performs offloading and has a routing function.
  • the RLC layer is located below the PDCP layer, and entities can be divided into transparent mode (Transparent mode, TM)_entity, unacknowledged mode (unacknowledged mode, UM) entity, unacknowledged mode (acknowledged mode, AM) entity, AM data transmission and reception share one entity , the UM and TM transceiver entities are separated, and the main functions are as follows:
  • TM transparent mode broadcast message
  • UM non-confirmation mode voice service, delay requirement
  • AM confirmation mode common service, high accuracy
  • the function of the 5GMAC layer is similar to that of 4G.
  • the main function is scheduling.
  • the functions include: resource scheduling, mapping between logical channels and transport channels, multiplexing/demultiplexing, and HARQ (asynchronous uplink and downlink).
  • the main functions of the 5G physical layer may include: error detection, forward error correction (forward error correction, FEC) encryption and decryption, rate matching, physical channel mapping, adjustment and demodulation, frequency synchronization and time synchronization, wireless measurement, multi-input Multi-output technology (multi input multi output, MIMO) processing.
  • FEC forward error correction
  • FEC forward error correction
  • the RLC layer, the MAC layer, and the PHY layer are below the PDCP layer, and the messages transmitted on these layers are not protected by security, for example, they may not be protected by the security protection of the PDCP layer, or they may also be called not protected by confidentiality and Integrity protection.
  • the terminal device or network device in the embodiment of the present application may also be called a communication device, which may be a general-purpose device or a dedicated device, which is not specifically limited in the embodiment of the present application.
  • the relevant functions of the terminal device or network device in the embodiment of this application can be implemented by one device, or by multiple devices, or by one or more Function modules are implemented, which is not specifically limited in this embodiment of the present application. It can be understood that the above functions can be network elements in hardware devices, software functions running on dedicated hardware, or a combination of hardware and software, or instantiated on a platform (for example, a cloud platform) virtualization capabilities.
  • FIG. 4 is a schematic structural diagram of a communication device 300 provided by an embodiment of the present application.
  • the communication device 300 includes one or more processors 301, communication lines 302, and at least one communication interface (in FIG. 4, it is only exemplary to include a communication interface 304 and a processor 301 for illustration), optional can also include memory 303 .
  • Processor 301 may be a chip.
  • the processor 301 may be a field programmable gate array (field programmable gate array, FPGA), may be an application specific integrated circuit (ASIC), may also be a system chip (system on chip, SoC), or It can be a central processing unit (central processor unit, CPU), or a network processor (network processor, NP), or a digital signal processing circuit (digital signal processor, DSP), or a microcontroller (micro controller) unit, MCU), it can also be a programmable controller (programmable logic device, PLD) or other integrated chips.
  • FPGA field programmable gate array
  • ASIC application specific integrated circuit
  • SoC system on chip
  • CPU central processing unit
  • NP network processor
  • DSP digital signal processing circuit
  • microcontroller micro controller
  • MCU microcontroller
  • PLD programmable logic device
  • each step of the method in the embodiment of the present application may be completed by an integrated logic circuit of hardware in a processor or an instruction in the form of software.
  • the steps of the methods disclosed in connection with the embodiments of the present application may be directly implemented by a hardware processor, or implemented by a combination of hardware and software modules in the processor.
  • the software module can be located in a mature storage medium in the field such as random access memory, flash memory, read-only memory, programmable read-only memory or electrically erasable programmable memory, register.
  • the storage medium is located in the memory 303, and the processor 301 reads the information in the memory 303, and completes the steps of the above method in combination with its hardware.
  • the processor 301 in the embodiment of the present application may be an integrated circuit chip, which has a signal processing capability.
  • each step of the above-mentioned method embodiments may be completed by an integrated logic circuit of hardware in a processor or instructions in the form of software.
  • the above-mentioned processor may be a general-purpose processor, a digital signal processor (DSP), an application-specific integrated circuit (ASIC), a field-programmable gate array (FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components .
  • DSP digital signal processor
  • ASIC application-specific integrated circuit
  • FPGA field-programmable gate array
  • Various methods, steps, and logic block diagrams disclosed in the embodiments of the present application may be implemented or executed.
  • a general-purpose processor may be a microprocessor, or the processor may be any conventional processor, or the like.
  • the steps of the method disclosed in connection with the embodiments of the present application may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor.
  • the software module can be located in a mature storage medium in the field such as random access memory, flash memory, read-only memory, programmable read-only memory or electrically erasable programmable memory, register.
  • the storage medium is located in the memory, and the processor reads the information in the memory, and completes the steps of the above method in combination with its hardware.
  • Communication line 302 may include a path for connecting between different components.
  • the communication interface 304 may be a transceiver module for communicating with other devices or communication networks, such as Ethernet, RAN, wireless local area networks (wireless local area networks, WLAN) and the like.
  • the transceiver module may be a device such as a transceiver or a transceiver.
  • the communication interface 304 may also be a transceiver circuit located in the processor 301 to realize signal input and signal output of the processor.
  • the memory 303 may be a device having a storage function. It can be understood that the memory 303 in the embodiment of the present application may be a volatile memory or a nonvolatile memory, or may include both volatile and nonvolatile memories.
  • the non-volatile memory can be read-only memory (read-only memory, ROM), programmable read-only memory (programmable ROM, PROM), erasable programmable read-only memory (erasable PROM, EPROM), electrically programmable Erases programmable read-only memory (electrically EPROM, EEPROM) or flash memory.
  • Volatile memory can be random access memory (RAM), which acts as external cache memory.
  • RAM random access memory
  • static RAM static random access memory
  • dynamic RAM dynamic random access memory
  • DRAM dynamic random access memory
  • SDRAM synchronous dynamic random access memory
  • double data rate synchronous dynamic random access memory double data rate SDRAM, DDR SDRAM
  • enhanced synchronous dynamic random access memory enhanced SDRAM, ESDRAM
  • serial link DRAM SLDRAM
  • direct memory bus random access memory direct rambus RAM, DR RAM
  • the memory 303 is used to store computer-executed instructions for implementing the solution of the present application, and the execution is controlled by the processor 301 .
  • the processor 301 is configured to execute computer-executed instructions stored in the memory 303, so as to implement the methods provided in the embodiments of the present application.
  • the processor 301 may also perform processing-related functions in the methods provided in the following embodiments of the present application, and the communication interface 304 is responsible for communicating with other devices or communication networks.
  • the example does not specifically limit this.
  • the computer-executed instructions in the embodiments of the present application may also be referred to as application program codes, which is not specifically limited in the embodiments of the present application.
  • the processor 301 may include one or more CPUs, for example, CPU0 and CPU1 in FIG. 4 .
  • the communications device 300 may include multiple processors, for example, the processor 301 and the processor 308 in FIG. 4 .
  • processors may be a single-core processor or a multi-core processor.
  • the processor here may include but not limited to at least one of the following: central processing unit (central processing unit, CPU), microprocessor, digital signal processor (DSP), microcontroller (microcontroller unit, MCU), or artificial intelligence
  • central processing unit central processing unit, CPU
  • microprocessor digital signal processor
  • microcontroller microcontroller unit, MCU
  • artificial intelligence Various types of computing devices that run software such as processors, each computing device may include one or more cores for executing software instructions to perform calculations or processing.
  • the communication device 300 may further include an output device 305 and an input device 306 .
  • Output device 305 is in communication with processor 301 and can display information in a variety of ways.
  • the output device 305 may be a liquid crystal display (liquid crystal display, LCD), a light emitting diode (light emitting diode, LED) display device, a cathode ray tube (cathode ray tube, CRT) display device, or a projector (projector) Wait.
  • the input device 306 communicates with the processor 301 and can receive user input in various ways.
  • the input device 306 may be a mouse, a keyboard, a touch screen device, or a sensing device, among others.
  • the above-mentioned communication device 300 may sometimes also be referred to as a communication device, which may be a general-purpose device or a special-purpose device.
  • the communication device 300 can be a desktop computer, a portable computer, a network server, a personal digital assistant (PDA), a mobile phone, a tablet computer, a wireless terminal device, an embedded device, the above-mentioned terminal device, the above-mentioned network device, or a 4 devices with similar structures.
  • PDA personal digital assistant
  • the embodiment of the present application does not limit the type of the communication device 300 .
  • At least one of the following or similar expressions refer to any combination of these items, including any combination of single or plural items.
  • at least one item (piece) of a, b, or c can represent: a, b, c, a-b, a-c, b-c, or a-b-c, where a, b, c can be single or multiple .
  • words such as “first” and “second” are used to distinguish the same or similar items with basically the same function and effect.
  • words such as “first” and “second” do not limit the number and execution order, and words such as “first” and “second” do not necessarily limit the difference.
  • words such as “exemplary” or “for example” are used as examples, illustrations or illustrations. Any embodiment or design scheme described as “exemplary” or “for example” in the embodiments of the present application shall not be interpreted as being more preferred or more advantageous than other embodiments or design schemes.
  • the use of words such as “exemplary” or “such as” is intended to present related concepts in a concrete manner for easy understanding.
  • the network architecture and business scenarios described in the embodiments of the present application are for more clearly illustrating the technical solutions of the embodiments of the present application, and do not constitute limitations on the technical solutions provided by the embodiments of the present application. With the evolution of the network architecture and the emergence of new business scenarios, the technical solutions provided in the embodiments of the present application are also applicable to similar technical problems.
  • FIG. 5 exemplarily shows a schematic flow chart of a communication method provided by an embodiment of the present application.
  • the communication method can be executed by a network device and a terminal device, where the terminal device can be, for example, the aforementioned FIG. 1 and FIG. 2 , the terminal device in FIG. 3a, FIG. 3b or FIG. 4, the network device may be, for example, the access network element (such as gNB) or the mobility management network in the aforementioned FIG. 1, FIG. 2, FIG. 3a, FIG. 3b or FIG.
  • the element (such as AMF) may also be other network elements, and only these two network elements are used as examples here. It can also be executed by chips or components inside the network equipment and chips or components inside the terminal equipment.
  • the method includes:
  • the network device sends a first message to the terminal device.
  • the terminal device receives the first message from the network device.
  • the first message is not protected by security, and the first message includes first user configuration information of the terminal device.
  • the first user configuration information may be an RRC message. This first message is sent before security activation and is not secured.
  • the network device performs data transmission with the terminal device according to the first user configuration information.
  • the RLC layer, the MAC layer, and the PHY layer are below the PDCP layer, and the messages transmitted on these layers are not protected by security, for example, they may not be protected by the security protection of the PDCP layer, or they may also be called not protected by confidentiality and Integrity protection.
  • the network device acquires indication information used to indicate that the configuration information of the terminal device needs to be protected by security.
  • S502 is an optional step and is not required.
  • S502 is marked as a dotted line, which means that S502 can be executed or not. That is, S502 may not be executed before S503, but S502 may also be executed.
  • S502 may also occur after the security protection of the terminal device's access layer or non-access layer is activated. Do explain.
  • the network device to obtain the indication information used to indicate that the configuration information of the terminal device needs to be protected by security, and the following will introduce them respectively:
  • the indication information used to indicate that the configuration information of the terminal device needs to be protected by security is: the third indication information received by the network device.
  • the third indication information is used to indicate that the configuration information of the terminal device needs to be protected by security.
  • other network elements may send the third indication information to the network device (such as gNB or AMF), and correspondingly, the network device receives the third indication information.
  • the network device such as gNB or AMF
  • the third indication information includes at least one of the following:
  • the security level of the terminal device the session security requirement, the security capability of the terminal device, or the core network security policy corresponding to the terminal device.
  • the network element of the core network issues the security level of the terminal equipment to the network equipment.
  • the network element side of the core network issues the security level of the terminal equipment for the terminal equipment with a higher security level.
  • the network element of the core network may deliver the security level of the terminal device to the terminal device having security level information, that is, the network element of the core network may or may not screen according to the security level of the terminal device.
  • the network device may infer that the configuration information of the terminal device needs to be protected by security.
  • the network device may also judge according to the received security level of the terminal device whether the security level satisfies the preset security level requirements, and if so, infer that the configuration information of the terminal device needs to be protected by security.
  • the indication information used to indicate that the configuration information of the terminal device needs to be protected by security is: the security mode command completion message received by the network device.
  • the security mode command complete message is used to indicate the activation of access stratum or non-access stratum security protection.
  • the indication information used to indicate that the configuration information of the terminal device needs to be protected by security is: a security mode command completion message received by the network device and verified successfully, and the successful verification may indicate that the security The mode command complete message was successfully received.
  • the security mode command completion message may be an access layer security mode command completion message, and the message may be used to indicate activation of access layer security protection.
  • the security mode command completion message may be a non-access stratum security mode command completion message, and the message may be used to indicate activation of non-access stratum security protection.
  • the indication information used to indicate that the configuration information of the terminal device needs to be protected by security is: preset configuration information of the network device, or a preset policy of the network device.
  • a network device is set to preset one or more durations. Within the preset duration, the configuration information of terminal devices that need to transmit signaling needs to be received safety protection.
  • the network device may determine that the configuration information of the terminal device needs to be protected by security if it is determined that the current time is within the preset time period according to the preset time period.
  • the network device can set that terminal devices in a characteristic area need to be protected by security.
  • the network device can determine whether the terminal device needs to be protected by security according to the area to which the terminal device belongs.
  • the area may be the signal coverage area of the network device.
  • the indication information used to indicate that the configuration information of the terminal device needs to be protected by security is: the information used to indicate that the information type of the information to be sent matches the preset information type that needs to be protected by security.
  • some types of information that need to be protected by security may also be preset, such as some sensitive information that requires confidentiality protection, such as proprietary configuration information (UE specific config) of the terminal equipment, For example, cell configuration information (such as cell group config) and/or radio bearer configuration (such as radio bearer config) of the terminal device may be included.
  • UE specific config proprietary configuration information
  • cell configuration information such as cell group config
  • radio bearer configuration such as radio bearer config
  • the preset information types to be protected include at least one of the following:
  • MAC layer information that needs to be protected by security; information on the RLC layer that needs to be protected by radio link control; or information on the physical PHY layer that needs to be protected by security. Because the level of protection of the underlying information of the MAC layer, RLC layer and PHY layer is slightly insufficient in the prior art, therefore, in the embodiment of the present application, it is possible to target the sensitive MAC layer, RLC layer or PHY layer that needs confidentiality protection Additional protection of information, which can further improve the security of user information and reduce the possibility of information leakage.
  • the indication information used to indicate that the configuration information of the terminal device needs to be protected by security includes: capability information of the terminal device and capability information of the network device.
  • the network device may determine to acquire the indication information used to indicate that the configuration information of the terminal device needs to be protected by security.
  • the network device can determine to obtain An indication that the configuration information of the terminal device needs to be protected by security.
  • the network device sends the second message to the terminal device.
  • the terminal device receives the second message from the network device.
  • the second message is protected by security, the second message includes second user configuration information of the terminal device, and the second user configuration information is different from the first user configuration information.
  • the user configuration information may include specific configuration information (UE specific config) of the terminal equipment.
  • the user configuration information may include at least one item of cell configuration information (such as cell group config) or radio bearer configuration (such as radio bearer config) of the terminal device.
  • the user configuration information may include downlink control information.
  • the first user configuration information includes first downlink control information; the second user configuration information includes second downlink control information.
  • At least one item of the first user configuration information or the second user configuration information includes at least one of the following:
  • BWP bandwidth part
  • DCI downlink control information
  • PDSCH physical downlink shared channel
  • Table 1 below exemplarily shows examples of the first user configuration information and the second user configuration information.
  • Table 1 Example of first user configuration information and second user configuration information
  • the value of the parameter item in the second user configuration information can be different from the parameter value in the first parameter item.
  • the parameter is at most 16 In the first user configuration information, the contents of each row from row 0 to row 15 can be indicated, and the contents of rows 0 to 15 in the first user configuration information can be randomly changed in order to obtain the second user configuration information, such as Change the content of line 0 in the first user configuration information to line 5, so that the difficulty for an attacker to crack can be increased.
  • the PDCCH may indicate to the terminal device which row to use.
  • the difference between the first user configuration information and the second user configuration information may mean that there is at least one parameter item in the second user configuration information, and the parameter value of the parameter item in the second user configuration information is the same as that in the second user configuration information
  • the parameter values in the user configuration information are different. It may also mean that the parameter value of each parameter item in the second user configuration information is different from the parameter value of the parameter item in the first user configuration information.
  • the parameter items in the second user configuration information may be the same as the parameter items in the first user configuration information.
  • the parameter items in the second user configuration information may be different from the parameter items in the first user configuration information, for example, the parameter items in the second user configuration information may be less than or more than the first user configuration information.
  • a parameter item in user configuration information may mean that there is at least one parameter item in the second user configuration information, and the parameter value of the parameter item in the second user configuration information is the same as that in the second user configuration information
  • the parameter values in the user configuration information are different. It may also mean that the parameter value of each
  • At least one or all parameter items in the first user configuration information and the second user configuration information may be different. Or all the parameter items in the first user configuration information and the second user configuration information are the same, but the value of at least one parameter item or all parameter items may be different.
  • the configuration objects or content of the first user configuration information and the second user configuration information may be the same, but the object values are different.
  • S503 may be replaced by: the network device sends to the terminal device the information carrying the second user's Second message of configuration information.
  • the network device does not obtain the indication information used to indicate that the configuration information of the terminal device needs to be protected by security, it may not be required to carry the information different from the first user configuration information in the second message.
  • the second user configuration information may not carry or not carry the user configuration information, for example, it may carry the first user configuration information, but it is no longer required that the user configuration information carried in the second message User configuration information is different. If the second message does not carry user configuration information, the terminal device can transmit data with the network device according to the first user configuration information in the first message; if the second message carries user configuration information, the terminal device can transmit data according to Data is transmitted between the user configuration information carried in the second message and the network device.
  • the attacker may further steal other information according to the configuration information of the first user in the obtained first message, resulting in a relatively serious degree of information leakage.
  • the network device performs data transmission with the terminal device according to the second user configuration information.
  • the first message is not protected by security
  • the first user configuration information in the first message is more likely to be leaked
  • the second message is protected by security
  • the second message is required to carry
  • the configuration information of the second user is different from the configuration information of the first user. Therefore, the possibility of the attacker obtaining the configuration information of the second user is relatively small, and the possibility of further stealing other information based on the configuration information of the second user is also small. Thereby, the degree of information leakage can be reduced.
  • FIG. 6 exemplarily shows a schematic flowchart of another communication method provided by the embodiment of the present application.
  • the network device is the gNB
  • the first message is the RRC establishment response
  • the second message is the RRC reconfiguration message as an example to introduce in conjunction with FIG. 6 .
  • the method includes:
  • the terminal device sends a random access request to the network device.
  • a network device receives a random access request from a terminal device.
  • the terminal device when the terminal device is in an idle state, the terminal device and the network device are in an out-of-synchronization state, and the terminal device lacks available uplink resources. Once the terminal device needs to send uplink data or download downlink data, it needs to switch from the idle state to the connected state through a random access process. When the terminal device initiates a random access procedure, S601 may be executed.
  • the random access request can be a random access preamble.
  • the network device sends a random access response to the terminal device, and performs uplink authorization on the terminal device in the random access response.
  • the terminal device receives the random access response from the network device.
  • the random access response may be a random access response.
  • the terminal device may send an RRC establishment request (also called an RRC establishment request message).
  • the network device can receive the RRC establishment request from the terminal device.
  • the RRC establishment request may be an RRC setup request.
  • the network device sends an RRC establishment response (also referred to as RRC establishment, or an RRC establishment response message) to the terminal device.
  • the RRC setup response includes first user configuration information.
  • the terminal device may receive the RRC setup response from the network device.
  • S604 may be an example of the foregoing S501, and the first message may be an RRC establishment response in S604.
  • the RRC establishment response can be written as RRC setup, or RRC setup response.
  • User configuration information may include user-specific configuration information (eg, UE-specific config).
  • the user configuration information may include at least one item of cell configuration information (such as cell group config) or radio bearer configuration (such as radio bearer config) of the terminal device.
  • the cell configuration information (such as cell group config) may include the configuration of the signaling radio bearer (signaling radio bearer, SRB) 1 message in the MAC layer, the phy layer, and the RLC layer.
  • the terminal device performs a registration process or a service request process in the core network, and activates access layer or non-access security.
  • the network device when the network device receives the security mode command completion message and the verification is successful, it means that the security of the access layer or the non-access layer is activated.
  • the network device acquires indication information used to indicate that the configuration information of the terminal device needs to be protected by security. For this S606, reference may be made to the related content of the aforementioned S502, which will not be repeated here.
  • S606 is an optional step, which may or may not be executed.
  • S606 is a dotted line, indicating that S606 is an optional step to be executed.
  • the network device sends an RRC reconfiguration message to the terminal device, where the RRC reconfiguration message includes second user configuration information, and the second user configuration information is different from the first user configuration information.
  • the RRC reconfiguration message may be RRC reconfig.
  • the second message may be an RRC reconfiguration message.
  • the terminal device sends an RRC reconfiguration complete message to the network device.
  • the terminal device after successfully parsing the content in the RRC reconfiguration message, the terminal device returns an RRC reconfiguration complete message after verifying that the integrity protection is successful.
  • S601 to S604 can be transmitted on a public channel, and the security protection has not been activated yet. All messages are available to the attacker.
  • the terminal device and the network device can be configured according to the user configuration information, and subsequent messages can be transmitted on a channel specific to the terminal device.
  • multiple RRC reconfiguration messages may be initiated after S605.
  • the user configuration information carried in subsequent RRC reconfiguration messages may be required to be consistent with the first user configuration information. The information is different.
  • the RRC reconfiguration message may not carry the user configuration information (in this case, the terminal device according to the transmission of data between a user configuration information and a network device), or it is more likely that the user configuration information carried in the RRC reconfiguration message is the same as the first user configuration information, so the attacker may use the acquired first user configuration information To obtain data packets between terminal equipment and network equipment, and monitor and tamper with PHY layer, MAC layer, and RLC layer messages. Further, it may lead to misconfiguration of resources between terminal devices and network devices, degradation of transmission performance, and even interruption of connections. Attackers eavesdropping on messages may also lead to privacy leaks of terminal devices.
  • the second user configuration information different from the first user configuration information is required to be carried in the RRC reconfiguration message. Therefore, when an attacker wants to obtain the data packet of the terminal device, he cannot obtain it based on the first user configuration information. , but need to guess the physical layer parameter configuration of the terminal device, such as parameters in DCI such as scrambling code ID, BWP, position/number of PDCCH start symbols, DCI length, different candidate sets, etc. Since the DCI information in the second user configuration information is invisible to the attacker, the data can be hidden to a certain extent, which can increase the difficulty of the attack, thereby reducing the possibility of information leakage.
  • FIG. 7 exemplarily shows a schematic flow chart of a communication method, which can be executed by a network device and a terminal device, where the terminal device can be, for example, the aforementioned FIG. 1, FIG. 2, FIG. 3a, and FIG. 3b Or the terminal device in FIG. 4, the network device may be, for example, the access network element (such as gNB) or the mobility management network element (such as AMF) in the aforementioned FIG. 1, FIG. 2, FIG. 3a, FIG. 3b or FIG. 4, It may also be other network elements, and only these two network elements are used as examples here. It can also be executed by chips or components inside the network equipment and chips or components inside the terminal equipment. As shown in Figure 7, the method includes:
  • the network device sends a third message to the terminal device.
  • the terminal device receives the third message from the network device.
  • the third message includes first indication information, where the first indication information is used to indicate a first correspondence relationship corresponding to the terminal device, and the first correspondence relationship is a correspondence relationship between an information type identifier and an index value.
  • the third message is protected by security. In this way, the transmission process of the first indication information can be more secure.
  • the third message may occur after the aforementioned S605, that is, after the terminal device performs a registration process or a service request process in the core network, and activates the access layer or non-access security, thus, the first Three messages can be protected, thereby improving the security of information transmission.
  • the third message is a radio resource control RRC layer message, such as the aforementioned RRC reconfiguration message, the aforementioned RRC reconfiguration message in S607, or other RRC reconfiguration messages. information. In this way, the third message can be protected by security, so that the security of information transmission can be improved.
  • the index value in the first correspondence can be obtained by one of the following:
  • the first indication information may be the first correspondence, or indication information used to indicate the first correspondence, and the terminal device may calculate or determine the information type identifier and the index value according to the indication information used to indicate the first correspondence.
  • the first indication information may be the preset rule, and the terminal device may determine the correspondence between the information type identifier and the index value according to the preset rule.
  • the first indication information can also be the preset first calculation formula, and the terminal device can determine the The corresponding relationship between the information type identifier and the index value is displayed.
  • the first indication information can also be the preset second calculation formula and the preset value
  • the terminal device can The preset second calculation formula determines the corresponding relationship between the information type identifier and the index value.
  • the granularity of the "correspondence between information type identifiers and index values" in the embodiment of the present application may be the granularity of the terminal device, that is, the "correspondence between information type identifiers and index values" corresponding to the terminal device can be established for each terminal device,
  • the "correspondence relationship between information type identifiers and index values" corresponding to two terminal devices may be different.
  • the terminal device corresponding to the foregoing first correspondence is referred to as a first terminal device, and the first correspondence corresponding to the first terminal device includes a correspondence between a first information type identifier and a first index value.
  • the second terminal device corresponds to the second correspondence
  • the second correspondence includes The correspondence between the first information type identifier and the second index value.
  • the first index value and the first index value are different. That is, for at least one information type identifier, two different values may be obtained in the "correspondence relationship between information type identifiers and index values" corresponding to two different terminal devices. That is to say, the embodiment of the present application does not use the same set of correspondence between information type identifiers and index values for all terminal devices, but can be set separately for different terminal devices, thereby further improving security.
  • the granularity of "correspondence between information type identifier and index value" may be the granularity of bearer, that is, for each bearer of a terminal device, the "information type identifier and index value" corresponding to the bearer of the terminal device can be established.
  • the corresponding relationship between the two bearers of the terminal device may be different from the corresponding relationship between the information type identifier and the index value.
  • the aforementioned first correspondence corresponds to the first bearer of the first terminal device, and the first correspondence corresponding to the first bearer includes a correspondence between the first information type identifier and the first index value.
  • the second bearer of the first terminal device also corresponds to a second correspondence, and the second correspondence includes a correspondence between the first information type identifier and the second index value.
  • the first index value and the first index value are different. That is, for at least one information type identifier, two different values can be obtained in the "correspondence relationship between information type identifiers and index values" corresponding to at least two bearers of the same terminal device. That is to say, the embodiment of the present application does not use the same set of correspondence between information type identifiers and index values for all bearers of the terminal device, but can be set separately for different bearers of the terminal device, thereby further improving security.
  • the network device sends a fourth message to the terminal device.
  • the terminal device receives the fourth message from the network device.
  • the fourth message includes: an index value corresponding to the information type identifier corresponding to the fourth message in the first correspondence.
  • the terminal device determines the information type identifier corresponding to the index value in the fourth message according to the first indication information.
  • the method may further include: the network device acquires indication information for indicating that the configuration information of the terminal device needs to be protected by security.
  • the foregoing S702 may be replaced with: the network device sends the fourth message to the terminal device according to the indication information used to indicate that the configuration information of the terminal device needs to be protected by security.
  • the relevant content of this step please refer to the above-mentioned introduction about the implementation manner a1 to the implementation manner a5 in S502, which will not be repeated here.
  • the capability information of the terminal device indicates that the terminal device is capable of supporting the determination of the first correspondence according to the first indication information, and determines the index value corresponding to the index value in the fourth message according to the first correspondence.
  • information type identification and the network device has the ability to generate the first correspondence, and according to the first correspondence, the field carrying the information type identification in the fourth message carries the index value corresponding to the field carrying the information type identification, then the network device determines to obtain The instruction information used to indicate that the configuration information of the terminal device needs to be protected by security.
  • the fourth message is a MAC layer message, an RLC layer message, or a PHY layer message.
  • the fourth message is not secured. In this way, on the one hand, the transmission efficiency of the message can be taken into account, and on the other hand, because the information type identifier in the fourth message is protected, that is, the fourth message does not carry the information type identifier, but carries its corresponding index value, so The possibility of leakage of the information type identifier in the fourth message can be reduced, thereby further improving security.
  • the fourth message is: a message including a MAC Control Element (MAC Control Element, MAC CE).
  • the fourth message may be sent after the aforementioned network device receives the RRC reconfiguration complete message sent by the terminal device (the RRC reconfiguration message is the aforementioned third message).
  • Fig. 8 exemplarily shows a schematic structural diagram of a possible MAC PDU.
  • a MAC PDU may consist of 1 MAC header (MAC header)+0 or more MAC service data units (service data unit, SDU)+0 or more MAC CE+possible padding.
  • the MAC header (MAC header) is composed of one or more MAC sub-headers (MAC sub-header).
  • the field corresponding to each MAC sub-header can be a MAC PDU, or a MAC CE, or padding.
  • the MAC sub-header (MAC sub-header) in the MAC PDU can contain the following types:
  • MAC sub-header In addition to the last MAC sub-header (MAC sub-header) in the MAC PDU and the MAC sub-header (MAC sub-header) for the fixed-length MAC CE, there can be 6 other MAC sub-headers (MAC sub-header) Domain composition: R/R/E/LCID/F/L.
  • the last MAC sub-header (MAC sub-header) in the MAC PDU and the MAC sub-header (MAC sub-header) for the fixed-length MAC CE consist of 4 fields: R/R/E/LCID.
  • the MAC sub-header (MAC sub-header) corresponding to padding also consists of 4 fields: R/R/E/LCID.
  • R It can represent a reserved bit, which is set to 0.
  • E It can be used to indicate whether the following is the data field or the MAC header field. 1 means that the next Mac sub-header is next, and 0 means that the next is the data field.
  • L field F It can indicate whether the length of the L field is 7 bits or 15 bits. When the length indicated by L exceeds 127, it is set to 1, otherwise it is 0.
  • L It can indicate the data length of MAC CE or MAC SDU.
  • LCID short for logical channel ID (LCID).
  • the LCID field can be used to carry the code point or initial index value of the LCID.
  • the information carried by the LCID field is used to indicate the MAC SDU corresponding to the MAC sub-header, or the type of the corresponding MAC CE, or the corresponding padding.
  • Table 2 The corresponding relationship between the value of the LCID and the code point or initial index value of the LCID is shown in Table 2 below.
  • the MAC sub-header may include an information type identifier, which is used to indicate the information type of the information carried by the field corresponding to the MAC sub-header (MAC sub-header).
  • Information type identification may also be called information purpose identification, information role identification, and so on.
  • the information type identifier may be a code point or an initial index value of a logical channel identifier (logical channel ID, LCID).
  • logical channel ID logical channel ID
  • LCID initial index value of a logical channel identifier
  • the index value corresponding to the LCID defined in the standard is called the initial index value.
  • the index value in the first correspondence in the embodiment of the present application is referred to as an index value.
  • the corresponding relationship between the index value and the information type identifier can be established.
  • the code point whose information type identifier is LCID as an example, a possible index value, LCID code point and Correspondence between LCID values.
  • the fourth message is a secondary cell activation message, and the fourth message is used to request activation of the secondary cell.
  • the information type identifier (LCID code point) in the fourth message should be 58. It is determined according to Table 3 that the corresponding index value is 50, then the field used to carry the information type identifier in the fourth message carries 50 instead of 58. After the assailant obtains the fourth message, if he does not know the correspondence between the index value and the information type identifier, he will determine that the message is SP SRS activation signaling according to the 50 carried in the fourth message, and he does not know the The fourth message is a secondary cell activation message.
  • the scheme provided by the embodiment of the present application can realize the hiding and protection of the information type identification in the message header of the fourth message, so that the security can be further improved, so that the attacker cannot correctly understand the message type and increase the attack speed.
  • the attack difficulty of the attacker can realize the hiding and protection of the information type identification in the message header of the fourth message, so that the security can be further improved, so that the attacker cannot correctly understand the message type and increase the attack speed.
  • FIG. 9 exemplarily shows a schematic flowchart of another communication method provided by the embodiment of the present application.
  • the communication method can be executed by a network device and a terminal device, where the terminal device can be, for example, the aforementioned FIG. 1 and FIG. 2.
  • the terminal device in Figure 3a, Figure 3b or Figure 4 the network device can be, for example, the access network element (such as gNB) or mobility management network element (such as gNB) in Figure 1, Figure 2, Figure 3a, Figure 3b or Figure 4 mentioned above
  • the network element (such as AMF) may also be other network elements, and only these two network elements are used as examples here. It can also be executed by chips or components inside the network equipment and chips or components inside the terminal equipment.
  • the method includes:
  • the network device sends a third message to the terminal device.
  • the terminal device receives the third message from the network device.
  • the third message includes second indication information, where the second indication information is used to indicate the third correspondence.
  • the third correspondence includes the correspondence between cell identities and cell index numbers of the N1 secondary cells of the terminal device.
  • N1 is a positive integer.
  • the third corresponding relationship is obtained based on N0 cells, and N0 cells include N1 secondary cells and preset N2 interfering cells, N2 is a positive integer, and N0 is the sum of N1 and N2.
  • the third correspondence may further include cell index numbers of the N2 interfering cells.
  • the cell index number of each cell may be randomly generated, and there may not be a sorting relationship among the cells.
  • the cells may be sorted according to their identifiers, and the cell index numbers of the cells are sequentially generated.
  • N1 is an integer greater than 1
  • at least one interfering cell is arranged between two secondary cells.
  • the second indication information may be the third correspondence, or indication information for indicating the third correspondence, and the terminal device may determine the correspondence between the cell identifier and the cell index number according to the indication information for indicating the third correspondence. For example, if the cell index number is obtained through a preset rule, the second indication information may be the preset rule, and the terminal device may determine the correspondence between the cell ID and the cell index number according to the preset rule.
  • the preset rule may be based on The cell identifiers are sorted, and three interfering cells are continuously added after the first cell, and the index numbers of the cells are obtained according to the sequence numbers of the sorted cells.
  • the granularity of the "correspondence between cell identifiers and cell index numbers” may be the granularity of terminal devices, that is, the “correspondence between cell identifiers and cell index numbers" corresponding to the terminal device can be established for each terminal device,
  • the "correspondence relationship between cell identifiers and cell index numbers" corresponding to the two terminal devices may be different.
  • the terminal device corresponding to the aforementioned third correspondence is called the first terminal equipment, and the third correspondence corresponding to the first terminal equipment includes the correspondence between the first cell identifier and the first cell index number.
  • the second terminal device corresponds to the third correspondence
  • the third correspondence includes The corresponding relationship between the first cell identifier and the second cell index number.
  • the first cell index number is different from the first cell index number. That is, for at least one cell ID, two different cell index numbers can be obtained in the "correspondence relationship between cell IDs and cell index numbers" corresponding to two different terminal devices. That is to say, in the embodiment of the present application, the same set of correspondence between cell identifiers and cell index numbers is not used for all terminal devices, but can be set separately for different terminal devices, thereby further improving security.
  • the granularity of "correspondence between cell ID and cell index number" in the embodiment of the present application may be the granularity of bearer, that is, for each bearer of a terminal device, the "cell ID and cell index" corresponding to the bearer of the terminal device can be established.
  • the corresponding relationship between the two bearers of the terminal device may be different from the corresponding relationship between the cell ID and the cell index number.
  • the foregoing third correspondence corresponds to the first bearer of the first terminal device, and the third correspondence corresponding to the first bearer includes a correspondence between the first cell identifier and the first cell index number.
  • the second bearer of the first terminal device also corresponds to a third correspondence, and the third correspondence includes a correspondence between the first cell identifier and the second cell index number.
  • the first cell index number is different from the first cell index number. That is, for at least one cell ID, two different values may be obtained in the "correspondence between cell IDs and cell index numbers" corresponding to at least two bearers of the same terminal device. That is to say, in the embodiment of the present application, the same set of correspondence between cell identifiers and cell index numbers is not used for all bearers of the terminal equipment, but can be set separately for different bearers of the terminal equipment, thereby further improving security.
  • the network device sends a fourth message to the terminal device.
  • the fourth message includes a first field, and the first field carries: activation indication information corresponding to the cell index numbers of N0 cells, activation information corresponding to the cell index numbers of the N0 cells
  • the indication information is used to indicate whether the cell is activated or not activated.
  • the cell index numbers of the cells among the N0 cells may be index numbers allocated for the cells, and there may not be a sorting relationship among them.
  • the cell index number of the cell in the N0 cells is: the serial number of the cell obtained by sorting the N1 secondary cells and the N2 interfering cells. That is, the index number can show the sorting relationship between the cells, for example, the sorting can be performed according to the cell ID.
  • the first field sequentially carries the activation indication information corresponding to the N0 cells according to the serial numbers of the cells in the N0 cells. Therefore, the terminal device can determine the cell index number corresponding to the activation indication information according to the sorting of the activation indication information.
  • the fourth message may also carry indication information for indicating a correspondence between the activation indication information and the cell index number. In this case, it is not required that the arrangement of the activation indication information satisfy a certain ordering relationship. The terminal device may determine the cell index number corresponding to each activation indication information according to the indication information used to indicate the correspondence between the activation indication information and the cell index number.
  • S902 or S91 may further include: the network device acquires indication information for indicating that the configuration information of the terminal device needs to be protected by security.
  • the foregoing S902 may be replaced with: the network device sends the fourth message to the terminal device according to the indication information used to indicate that the configuration information of the terminal device needs to be protected by security.
  • the network device sends the fourth message to the terminal device according to the indication information used to indicate that the configuration information of the terminal device needs to be protected by security.
  • the capability information indication of the terminal device the terminal device has the ability to identify the activation indication information of the interfering cell, and the network device has the ability to generate the third corresponding relationship according to the secondary cell and the interfering cell, and according to the first Three correspondences, the fourth message is capable of carrying the activation indication information corresponding to the interfering cell and the secondary cell; then the network device determines to obtain the indication information used to indicate that the configuration information of the terminal device needs to be protected by security.
  • the terminal device determines an activated secondary cell among the N2 secondary cells according to the first field of the fourth message and the foregoing third correspondence.
  • the two schemes of FIG. 9 and FIG. 7 in the embodiment of the present application may be implemented separately, for example, only the scheme of FIG. 9 is used, or only the scheme of FIG. 7 is applied.
  • the schemes of FIG. 9 and FIG. 7 may also be used in combination, for example, the second indication information and the aforementioned first indication information may be carried in the third message.
  • the information type identifier is encrypted, and the index value is used to replace the information type identifier, and the information of the interfering cell may also be added in the secondary cell in S902, so as to encrypt the message content.
  • the aforementioned scheme in FIG. 5 can be implemented alone, or can be used in combination with at least one of FIG. 9 or FIG. 7 , such as combining FIG. 5 with FIG. 7 and FIG. 9 , such
  • the aforementioned second message and the third message may be the same message, or may be two messages, such as two RRC reconfiguration messages.
  • Enhanced Mobile Broadband is an important scenario for 5G applications.
  • Typical applications of this scenario include 2k/4k video and VR/AR, etc.
  • These applications require ultra-high transmission data rates: the upstream peak rate must reach 10Gbits per second (Gbit/s); the downstream peak rate must reach 20Gbit/s.
  • the peak rate is closely related to the bandwidth available to the user. If the data is regarded as vehicles on the highway, the bandwidth of the cell is the number of lanes of the highway. Under the same conditions, the more lanes there are, the faster the maximum speed the vehicle can reach.
  • the cell bandwidth of 5G can reach up to 100MHz in the low frequency band and 400MHz in the high frequency band.
  • the peak user downlink rate can only reach 1.6+Gbit/s (the subcarrier spacing is 30kHz, 4 streams are transmitted in parallel, the modulation method is 256QAM, and the subframe ratio is 4:1). Such a peak rate is still far from meeting the requirements of the eMBB scenario.
  • CA carrier aggregation
  • PCC Primary Carrier
  • PCell primary cell
  • SCC secondary Carrier
  • SCell secondary cell
  • the terminal equipment performs an initial connection establishment process or a connection reestablishment process in the cell.
  • the PCell can be responsible for handling all signaling with the terminal equipment.
  • Each terminal device can connect to multiple SCells. SCell is added during RRC reconfiguration to provide additional radio resources. There may be no RRC connection between the terminal equipment and the SCell.
  • FIG. 10 exemplarily shows a schematic flowchart of another communication method provided by the embodiment of the present application, as shown in FIG. 10:
  • the terminal device reports a measurement report of the secondary cell to the primary cell of the base station.
  • the primary cell receives the measurement report of the secondary cell from the terminal device.
  • the measurement report message of the secondary cell may be secondary cell channel measurement.
  • the measurement report of the secondary cell may be an RRC message, which may be protected by security, or the message is protected by integrity and confidentiality.
  • the terminal device can be triggered periodically or by a specific event to start measuring the signal quality of the secondary cell, and record the characteristics of the network environment at a certain time and point during the call process by taking a certain measurement content as a unit .
  • the terminal device can measure the secondary cell, and send the measurement report of the secondary cell to the primary cell in the network device.
  • the cell IDs may be #102, #398, #209, and #452 respectively.
  • the primary cell may send to the terminal device indication information for indicating the correspondence between the secondary cell and the cell index number of the terminal device.
  • This information may be carried in the third message of S901 above.
  • S1002 refer to the introduction about the third message in FIG. 7 or FIG. 9 , and details are not repeated here.
  • the third message may be secondary cell configuration information, which may be secondary cell configuration.
  • the primary cell may number the secondary cell, and send a message including the numbering information of the secondary cell to the terminal device.
  • the message may be sent in an RRC message, and the message may be protected by integrity and encryption.
  • the primary cell sends a secondary cell activation message to the terminal device.
  • the fourth message in FIG. 7 and FIG. 9 may be the secondary cell activation message in S1003, which may be secondary cell activation.
  • the fourth message is used to activate the secondary cell.
  • the secondary cell activation message is a MAC layer message, and the message is not protected by security, or not protected by integrity and confidentiality.
  • the primary cell when the primary cell receives a large amount of downlink data and can increase the peak rate by activating the secondary cell, the primary cell sends a secondary cell activation message to the UE to activate at least one secondary cell.
  • the terminal device selects a corresponding secondary cell for activation according to the secondary cell activation message, and establishes a data transmission channel from the terminal device to the secondary cell, and then performs data transmission with the secondary cell.
  • the cell IDs of the four secondary cells of the terminal device are respectively #102, #398, #209, and #452
  • the fourth message is a secondary cell activation message as an example for illustration.
  • Table 4 exemplarily shows a schematic table in which the primary cell only numbers N1 secondary cells (N1 is 4).
  • Table 5 exemplarily shows a corresponding relationship between the cell index numbers generated according to Table 4 and the corresponding activation indication information.
  • Table 5 Schematic table of the corresponding relationship between the cell index number and the corresponding activation indication information generated according to Table 4
  • the main cell needs to activate the cell with the number 1/2/4, it can carry "1101000" in the first field of the fourth message, because the first field is based on the cell index number.
  • the ordering relationship places the activation indication information corresponding to each cell index number in sequence. A bit of 1 indicates that the cell corresponding to the cell index number corresponding to the bit is activated, and a bit of 0 indicates inactivation. Therefore, it can be determined that the cell numbered 1/2/4 is activated according to "1101000" in the first field. Further, the terminal device can determine the numbered cell as 1/2 according to the correspondence between the secondary cell and the cell index number, such as Table 4.
  • the cell identifiers of the cells of /4 are respectively: #452, #209, and #102.
  • the secondary cell activation message is a MAC CE message
  • the code point or initial index value of the LCID in the MAC header is 58
  • the message header of the secondary cell activation message can carry the index value in the scheme shown in Figure 7 above , for example, according to the aforementioned Table 3, 50 can be carried.
  • the content in the fourth message is plain text, and an attacker can obtain the content in the fourth message.
  • the attacker can count the number of 1 bits in the first field, and then obtain the number of activated cells.
  • the attacker can walk in a certain area and record the corresponding relationship between the location path and the number of activated cells. According to the obtained sample data, the corresponding relationship between the location information and the number of cells can be generated.
  • the location information of the terminal device can be further inferred. It can be seen that the schemes in Table 4 and Table 5 may easily lead to leakage of private information of the terminal device, such as location information.
  • the embodiment of this application proposes the solution shown in FIG. 9 above.
  • the first field does not only carry the cell activation indication of N1 secondary cells. Instead, it may carry cell activation indication information of N0 cells, and the N0 cells include N1 secondary cells and N2 interfering cells.
  • Table 6 and Table 7 are used for illustration below.
  • Table 6 exemplarily shows a schematic diagram of numbering N1 secondary cells (N1 is 4) and N2 interfering cells by the primary cell.
  • Table 7 exemplarily shows the corresponding relationship between the cell index numbers generated according to Table 6 and the corresponding activation indication information.
  • Table 7 Schematic table of the corresponding relationship between the cell index number and the corresponding activation indication information generated according to Table 6
  • the primary cell has added an interfering cell to the secondary cell, and uniformly numbered the secondary cell and the interfering cell.
  • the interfering cell is the cell whose cell ID is #000 in Table 6. The cell numbers are shown in Table 6. If the primary cell needs to activate "#452, #209, #102", the cell numbers of which are 1/5/7, then "1110101" can be carried in the first field of the fourth message.
  • the terminal device can sequentially determine the cell index number of the activated secondary cell according to the information carried in the first field, and further determine the cell identity of the activated secondary cell according to the "third correspondence between the cell ID of the secondary cell and the cell index number" .
  • the third correspondence may also include the correspondence between the cell ID of the interfering cell and the cell index number, and indicate that the preset cell ID (such as #000) of the terminal device is the interfering cell, then The terminal device may ignore the activation indication information corresponding to the cell identifier #000.
  • the activation indication information corresponding to #000 may also be called noise information, which is used to interfere and confuse attackers. However, the terminal equipment can remove the noise information, and then obtain the correct identification of the cell to be activated.
  • the cell activation indication information of the interfering cell may be set to any value, 0 or 1, for example, all may be set to 0, for example, "1000101" may be carried in the first field of the fourth message.
  • the attacker does not know that the secondary cell and the interfering cell are numbered together, but thinks that the numbering is only for the secondary cell, so it can be inferred that the terminal device has 7 The number of secondary cells. It can be seen that since the attacker cannot understand the noise information in the fourth message, the attack difficulty can be increased, and the information can be kept secret and hidden. For example, the quantity information of the secondary cell can be kept secret and hidden.
  • the activation indication information corresponding to at least one interfering cell may be set to 1. That is, for at least one interfering cell, the activation indication information of the interfering cell is used to indicate that the interfering cell is activated. For example, "1100101" may be carried in the first field of the fourth message. In this case, after obtaining the information in the first field, the attacker does not know that the secondary cell and the interfering cell are numbered together, but thinks that the numbering is only for the secondary cell, so it can be inferred that the terminal device has 7 The number of secondary cells, and the activated number is 4. It can be seen that the quantity information of the secondary cell can be kept secret and hidden.
  • the methods and/or steps implemented by the terminal device may also be implemented by components (such as chips or circuits) that can be used for the terminal device.
  • the methods and/or steps implemented by network equipment may also be implemented by components (such as chips or circuits) that can be used in network equipment.
  • FIG. 11 is a schematic diagram of a communication device provided by an embodiment of the present application.
  • the communication device may be the terminal device in the above method embodiment, or a device including the above terminal device, or a component that can be used in the terminal device, or a chip or a circuit (for example, a chip or a circuit in the first policy control network element ).
  • the communication device may be the network device in the above-mentioned method embodiment, or a device including the above-mentioned network device, or a component that can be used in the network device, or a chip or a circuit (for example, a chip or a circuit in the second policy control network element ).
  • the communication device 1100 includes a processing module 1102 and a communication module 1101 . Further, the communication device 1100 may include a storage module 1103 or may not include a storage module 1103 . The dotted line in the storage module 1103 in the figure further indicates that the storage module is optional.
  • the processing module 1102 can be a processor or a controller, such as a general-purpose central processing unit (central processing unit, CPU), a general-purpose processor, a digital signal processing (digital signal processing, DSP), an application specific integrated circuit (application specific integrated circuit) circuits, ASIC), field programmable gate array (field programmable gate array, FPGA) or other programmable logic devices, transistor logic devices, hardware components or any combination thereof. It can implement or execute the various illustrative logical blocks, modules and circuits described in connection with the present disclosure.
  • the processor can also be a combination of computing functions, for example, a combination of one or more microprocessors, a combination of DSP and a microprocessor, and so on.
  • the processing module 1102 can execute computer-executable instructions stored in the storage module.
  • the storage module 1103 may be a memory.
  • the storage module can be a storage module in the chip, such as a register, a cache, etc.
  • the storage module can also be a storage module outside the chip in the communication device, such as a read-only memory (read-only memory, ROM). ) or other types of static storage devices that can store static information and instructions, random access memory (random access memory, RAM), etc.
  • ROM read-only memory
  • RAM random access memory
  • the communication module 1101 is an interface circuit of the communication device for receiving signals from other devices.
  • the communication module 1101 is an interface circuit for the chip to receive signals from other chips or devices, or an interface circuit for the chip to send signals to other chips or devices.
  • the communication module 1101 may be, for example, a transceiver.
  • the transceiver may include a radio frequency circuit.
  • the communication module 1101 may be, for example, an input/output interface, a pin, or a circuit.
  • the functions/implementation process of the communication module 1101 and the processing module 1102 in FIG. 11 can be realized by calling the computer-executed instructions stored in the memory 303 by the processor 301 in the communication device 300 shown in FIG. 4 .
  • the function/implementation process of the processing module 1102 in FIG. 11 can be implemented by calling the computer execution instructions stored in the memory 303 by the processor 301 in the communication device 300 shown in FIG. /The implementation process can be implemented through the communication interface 304 in the communication device 300 shown in FIG. 4 .
  • the processing module 1102 is configured to send the first message to the terminal device through the communication module 1101 and send the second message to the terminal device.
  • the first message is not protected by security, and the first message includes first user configuration information of the terminal device.
  • the second message is protected by security, the second message includes second user configuration information of the terminal device, and the second user configuration information is different from the first user configuration information.
  • Data transmission is performed between the terminal device and the second user configuration information.
  • the processing module 1102 is configured to send the third message to the terminal device through the communication module 1101 .
  • the third message includes first indication information, where the first indication information is used to indicate a first correspondence relationship corresponding to the terminal device, and the first correspondence relationship is a correspondence relationship between an information type identifier and an index value.
  • the fourth message includes: an index value corresponding to the information type identifier corresponding to the fourth message in the first correspondence.
  • the processing module 1102 is configured to send the third message to the terminal device through the communication module 1101 .
  • the third message includes second indication information, and the second indication information is used to indicate a third correspondence, and the third correspondence includes the correspondence between cell identities and cell index numbers of N1 secondary cells of the terminal device; N1 is a positive integer ; Wherein, the third corresponding relationship is obtained based on N0 cells, N0 cells include N1 secondary cells and preset N2 interfering cells, N2 is a positive integer, and N0 is the sum of N1 and N2.
  • the fourth message includes a first field, and the first field carries: activation indication information corresponding to the cell index numbers of N0 cells, and the activation indication information corresponding to the cell index numbers of the cells in the N0 cells is used to indicate whether the cell is activated or not activated.
  • the processing module 1102 is configured to receive the first message from the network device through the communication module 1101 and receive the second message from the network device.
  • the first message is not protected by security, and the first message includes first user configuration information of the terminal device.
  • the second message is protected by security, the second message includes second user configuration information of the terminal device, and the second user configuration information is different from the first user configuration information.
  • Data transmission is performed between the terminal device and the second user configuration information.
  • the processing module 1102 is configured to receive the third message from the network device through the communication module 1101 .
  • a fourth message is received from the network device.
  • the third message includes first indication information, where the first indication information is used to indicate a first correspondence relationship corresponding to the terminal device, and the first correspondence relationship is a correspondence relationship between an information type identifier and an index value.
  • the fourth message includes: an index value corresponding to the information type identifier corresponding to the fourth message in the first correspondence.
  • the processing module 1102 is configured to receive the third message from the network device through the communication module 1101 .
  • a fourth message is received from the network device.
  • the third message includes second indication information, and the second indication information is used to indicate a third correspondence, and the third correspondence includes the correspondence between cell identities and cell index numbers of N1 secondary cells of the terminal device; N1 is a positive integer ;
  • the third corresponding relationship is obtained based on N0 cells, N0 cells include N1 secondary cells and preset N2 interfering cells, N2 is a positive integer, and N0 is the sum of N1 and N2.
  • the fourth message includes a first field, and the first field carries: activation indication information corresponding to the cell index numbers of N0 cells, and the activation indication information corresponding to the cell index numbers of the cells in the N0 cells is used to indicate whether the cell is activated or not activated.
  • the communication device includes hardware structures and/or software modules corresponding to each function.
  • the present application can be implemented in the form of hardware or a combination of hardware and computer software in combination with the units and algorithm steps of each example described in the embodiments disclosed herein. Whether a certain function is executed by hardware or computer software drives hardware depends on the specific application and design constraints of the technical solution. Those skilled in the art may use different methods to implement the described functions for each specific application, but such implementation should not be regarded as exceeding the scope of the present application.
  • the present application also provides a computer program product, the computer program product including: computer program code or instruction, when the computer program code or instruction is run on the computer, the computer is made to execute the , the method of any one of the embodiments shown in FIG. 6 , FIG. 7 , FIG. 9 or FIG. 10 .
  • the present application also provides a computer-readable storage medium, the computer-readable medium stores program codes, and when the program codes are run on a computer, the computer executes the steps shown in Figures 5 and 6. , the method of any one of the embodiments shown in FIG. 7 , FIG. 9 or FIG. 10 .
  • the present application further provides a chip system, where the chip system may include a processor.
  • the processor is coupled with the memory, and may be used to execute the method in any one of the embodiments shown in FIG. 5 , FIG. 6 , FIG. 7 , FIG. 9 or FIG. 10 .
  • the chip system further includes a memory. Memory, used to store computer programs (also called code, or instructions).
  • the processor is configured to call and run the computer program from the memory, so that the device installed with the system-on-a-chip executes the method of any one of the embodiments shown in FIG. 5 , FIG. 6 , FIG. 7 , FIG. 9 or FIG. 10 .
  • the present application further provides a system, which includes the aforementioned terminal device and network device.
  • all or part of them may be implemented by software, hardware, firmware or any combination thereof.
  • software When implemented using software, it may be implemented in whole or in part in the form of a computer program product.
  • a computer program product includes one or more computer instructions. When the computer instructions are loaded and executed on the computer, the processes or functions according to the embodiments of the present application are generated in whole or in part.
  • a computer can be a general purpose computer, special purpose computer, computer network, or other programmable device.
  • Computer instructions may be stored in or transmitted from one computer-readable storage medium to another computer-readable storage medium, e.g.
  • the computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device including a server, a data center, and the like integrated with one or more available media. Available media can be magnetic media (e.g., floppy disk, hard disk, magnetic tape), optical media (e.g., high-density digital video disc (digital video disc, DVD)), or semiconductor media (e.g., solid state disk (solid state disc, SSD) )Wait.
  • magnetic media e.g., floppy disk, hard disk, magnetic tape
  • optical media e.g., high-density digital video disc (digital video disc, DVD)
  • semiconductor media e.g., solid state disk (solid state disc, SSD)
  • the network equipment in each of the above device embodiments corresponds to the terminal equipment and the network equipment or terminal equipment in the method embodiments, and the corresponding modules or units perform corresponding steps, for example, the communication module (transceiver) performs receiving or sending in the method embodiments Steps, other steps except sending and receiving can be executed by a processing module (processor).
  • a processing module for the functions of the specific units, reference may be made to the corresponding method embodiments. Wherein, there may be one or more processors.
  • a component may be, but is not limited to being, a process running on a processor, a processor, an object, an executable, a thread of execution, a program, and/or a computer.
  • an application running on a computing device and the computing device can be components.
  • One or more components can reside within a process and/or thread of execution and a component can be localized on one computer and/or distributed between two or more computers.
  • these components can execute from various computer readable media having various data structures stored thereon.
  • a component may, for example, be based on a signal having one or more packets of data (e.g., data from two components interacting with another component between a local system, a distributed system, and/or a network, such as the Internet via a signal interacting with other systems). Communicate through local and/or remote processes.
  • packets of data e.g., data from two components interacting with another component between a local system, a distributed system, and/or a network, such as the Internet via a signal interacting with other systems.
  • the disclosed systems, devices and methods may be implemented in other ways.
  • the device embodiments described above are only illustrative.
  • the division of units is only a logical function division. In actual implementation, there may be other division methods.
  • multiple units or components can be combined or integrated. to another system, or some features may be ignored, or not implemented.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be through some interfaces, and the indirect coupling or communication connection of devices or units may be in electrical, mechanical or other forms.
  • a unit described as a separate component may or may not be physically separated, and a component displayed as a unit may or may not be a physical unit, that is, it may be located in one place, or may be distributed to multiple network units. Part or all of the units can be selected according to actual needs to achieve the purpose of the solution of this embodiment.
  • each functional unit in each embodiment of the present application may be integrated into one processing module, each unit may exist separately physically, or two or more units may be integrated into one unit. If the functions are realized in the form of software functional units and sold or used as independent products, they can be stored in a computer-readable storage medium.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

La présente invention concerne un procédé et un appareil de communication, et un support de stockage, à utiliser pour réduire le risque de fuite d'informations. Dans la présente demande, un dispositif de réseau envoie un premier message à un dispositif terminal, le premier message n'étant pas sujet à une protection de la sécurité et comprenant des premières informations de configuration d'utilisateur du dispositif terminal ; le dispositif de réseau envoie un second message au dispositif terminal, le second message étant sujet à une protection de la sécurité et comprenant des secondes informations de configuration d'utilisateur du dispositif terminal, et les secondes informations de configuration d'utilisateur étant différentes des premières informations de configuration d'utilisateur ; et le dispositif de réseau réalise une transmission de données avec le dispositif terminal selon les secondes informations de configuration d'utilisateur. Puisque le premier message n'est pas sujet à une protection de la sécurité, les premières informations de configuration d'utilisateur sont facilement obtenues par un attaquant ; et puisque les secondes informations de configuration d'utilisateur transmises au moyen du second message qui est sujet à une protection de la sécurité sont différentes des premières informations de configuration d'utilisateur, il n'est pas facile à l'attaquant d'obtenir les secondes informations de configuration d'utilisateur du second message qui est sujet à une protection de la sécurité, de sorte que la sécurité de transmission de données peut être améliorée.
PCT/CN2022/073692 2021-05-08 2022-01-25 Procédé et appareil de communication, et support de stockage WO2022237236A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202110501160.4A CN115314888A (zh) 2021-05-08 2021-05-08 一种通信方法、装置和存储介质
CN202110501160.4 2021-05-08

Publications (1)

Publication Number Publication Date
WO2022237236A1 true WO2022237236A1 (fr) 2022-11-17

Family

ID=83854031

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/073692 WO2022237236A1 (fr) 2021-05-08 2022-01-25 Procédé et appareil de communication, et support de stockage

Country Status (2)

Country Link
CN (1) CN115314888A (fr)
WO (1) WO2022237236A1 (fr)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109802809A (zh) * 2017-11-17 2019-05-24 华为技术有限公司 网络接入的方法、终端设备和网络设备
WO2020164600A1 (fr) * 2019-02-15 2020-08-20 华为技术有限公司 Procédé et appareil d'indication d'informations
CN111885721A (zh) * 2020-06-30 2020-11-03 广东小天才科技有限公司 一种资源配置方法、系统、终端设备及网络设备
US20210021994A1 (en) * 2019-10-07 2021-01-21 Intel Corporation Secure user equipment capability transfer for user equipment with no access stratum security

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109802809A (zh) * 2017-11-17 2019-05-24 华为技术有限公司 网络接入的方法、终端设备和网络设备
WO2020164600A1 (fr) * 2019-02-15 2020-08-20 华为技术有限公司 Procédé et appareil d'indication d'informations
US20210021994A1 (en) * 2019-10-07 2021-01-21 Intel Corporation Secure user equipment capability transfer for user equipment with no access stratum security
CN111885721A (zh) * 2020-06-30 2020-11-03 广东小天才科技有限公司 一种资源配置方法、系统、终端设备及网络设备

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
NEC: "Combined RRC connection modification and security", 3GPP DRAFT; R2-073550 COMBINED RRC CONNECTION MODIFICATION AND SECURITY, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. RAN WG2, no. Athens, Greece; 20070815, 15 August 2007 (2007-08-15), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France , XP050136243 *

Also Published As

Publication number Publication date
CN115314888A (zh) 2022-11-08

Similar Documents

Publication Publication Date Title
US20220287122A1 (en) Methods for enabling multi-link wlans
US11968533B2 (en) Methods and apparatus for secure access control in wireless communications
CN103109496B (zh) 无线局域网络系统中针对利用服务质量机制的管理帧的密码通信的方法及设备
KR102601585B1 (ko) Nas 메시지의 보안 보호를 위한 시스템 및 방법
Rinaldi et al. 5G NR system design: A concise survey of key features and capabilities
EP3820198A1 (fr) Système, dispositif et procédé de protection de sécurité
EP3817422A1 (fr) Procédé et dispositif de communication
US10588019B2 (en) Secure signaling before performing an authentication and key agreement
WO2013165695A1 (fr) Communications sécurisées pour des dispositifs informatiques utilisant des services de proximité
US10470044B2 (en) Resolving bidding down attacks for multi-connectivity
KR101461236B1 (ko) 무선 호를 연결 과정에서 엔티티의 인증을 수행하는 방법
WO2018205874A1 (fr) Procédé de transmission, terminal et dispositif de réseau
US11956715B2 (en) Communications method and apparatus
WO2017219365A1 (fr) Appareil et procédé de transmission de données
US20210168614A1 (en) Data Transmission Method and Device
CN113395697B (zh) 传输寻呼信息的方法和通信装置
WO2022237236A1 (fr) Procédé et appareil de communication, et support de stockage
US20240155335A1 (en) Methods and apparatuses for privacy enhancement through mac address masquerading
WO2021203296A1 (fr) Messagerie de commande pour communications à faisceaux multiples
CN116866900A (zh) 一种基于信道秘钥的加密方法及装置
WO2020147602A1 (fr) Procédé, appareil et système d'authentification
WO2022020033A1 (fr) Protection de communications par l'intermédiaire d'un relais d'équipement utilisateur
TW202249508A (zh) 5g系統對演進封包系統重選擇的安全處理
WO2024031042A1 (fr) Considérations de sécurité de mobilité nr pour la commutation de mobilité l1/l2 d'une cellule spcell
KR20220050795A (ko) 이동통신 시스템에서 사용자 식별자 매핑 방지 방법 및 그 시스템

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22806213

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 22806213

Country of ref document: EP

Kind code of ref document: A1