WO2023004683A1 - Communication method, apparatus, and device - Google Patents
Communication method, apparatus, and device Download PDFInfo
- Publication number
- WO2023004683A1 WO2023004683A1 PCT/CN2021/109252 CN2021109252W WO2023004683A1 WO 2023004683 A1 WO2023004683 A1 WO 2023004683A1 CN 2021109252 W CN2021109252 W CN 2021109252W WO 2023004683 A1 WO2023004683 A1 WO 2023004683A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- communication system
- terminal device
- network device
- request message
- core network
- Prior art date
Links
- 238000004891 communication Methods 0.000 title claims abstract description 558
- 238000000034 method Methods 0.000 title claims abstract description 221
- 230000004044 response Effects 0.000 claims description 100
- 238000012795 verification Methods 0.000 claims description 50
- 238000012545 processing Methods 0.000 claims description 41
- 230000015654 memory Effects 0.000 claims description 37
- 238000004422 calculation algorithm Methods 0.000 claims description 27
- 238000013507 mapping Methods 0.000 claims description 25
- 238000004590 computer program Methods 0.000 claims description 22
- 238000003860 storage Methods 0.000 claims description 18
- 230000002159 abnormal effect Effects 0.000 claims description 16
- 230000008569 process Effects 0.000 description 114
- 230000006870 function Effects 0.000 description 47
- 238000013461 design Methods 0.000 description 36
- 238000007726 management method Methods 0.000 description 20
- 230000005540 biological transmission Effects 0.000 description 11
- 238000010586 diagram Methods 0.000 description 11
- 238000010295 mobile communication Methods 0.000 description 10
- 230000011664 signaling Effects 0.000 description 7
- 230000005856 abnormality Effects 0.000 description 5
- 230000001360 synchronised effect Effects 0.000 description 5
- 230000000977 initiatory effect Effects 0.000 description 4
- 230000007774 longterm Effects 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 230000002776 aggregation Effects 0.000 description 2
- 238000004220 aggregation Methods 0.000 description 2
- 230000003190 augmentative effect Effects 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 2
- 238000013523 data management Methods 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 238000001356 surgical procedure Methods 0.000 description 2
- 230000001413 cellular effect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 238000000802 evaporation-induced self-assembly Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000003032 molecular docking Methods 0.000 description 1
- 238000001228 spectrum Methods 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W36/00—Hand-off or reselection arrangements
Definitions
- the present application relates to the technical field of communication, and in particular to a communication method, device and equipment.
- both a non-access stratum (non access stratum, NAS) of the terminal device and a NAS of a core network in the communication system maintain a set of security contexts.
- the terminal device and the core network need to map the first set of security context in the first communication system to generate the security context in the second communication system.
- the second set of security context after the handover is completed, all NAS messages exchanged between the terminal device and the core network in the second communication system need to use the second set of security context for integrity protection and/or confidentiality protection.
- the first communication system and the second communication system are communication systems of different standards, for example, the first communication system is a 5G communication system, and the second communication system is a 4G communication system.
- the terminal device needs to initiate a tracking area update (tracking area update, TAU) process when switching to the second communication system.
- TAU tracking area update
- the terminal device enters the RRC idle state, and when it initiates the TAU process again, it will be rejected by the core network of the second communication system, resulting in The terminal device cannot successfully register with the second communication system.
- the present application provides a communication method, device, and equipment to improve the registration success rate of terminal equipment in an inter-system handover scenario.
- the embodiment of the present application provides a communication method, the method includes the following steps:
- the terminal device After the terminal device switches from the second communication system to the first communication system, it acquires a first set of security context; wherein, the first set of security context is used for the terminal device to communicate with the first security context located in the first communication system.
- the network device performs security verification; after the terminal device sends a first registration request message to the first core network device, the terminal device releases the wireless link; wherein, the first registration request message uses the first set of security Integrity protection of the context, the first network device includes the first core network device; the terminal device sends a second registration request message to the first core network device, wherein the second registration request message Integrity protection is performed by using a second set of security context, and the second set of security context is used for security verification between the terminal device and the second network device located in the second communication system.
- the idle terminal device when the initial registration process fails and the idle terminal device initiates the registration process again, it continues to use the first set of security context to protect the integrity of the registration request message, while the second core network
- the device can only use the second set of security contexts for integrity verification, so the second registration process of the terminal device will inevitably fail.
- the second set of security context is used to protect the integrity of the registration request message; thus, when the first core network sends the registration request message to the second
- the second core network device requests the context of the terminal device, it can be ensured that the second core network device can successfully perform an integrity check on the registration request message, thereby ensuring that the first core network device can successfully register from the second core network
- the network device obtains the context of the terminal device, so as to ensure that the terminal device can be successfully registered in the first communication system.
- this method can avoid the situation that the registration process initiated by the terminal device is rejected again, improve the registration success rate of the terminal device in the inter-system handover scenario, and reduce the time delay for the terminal device to successfully register to the first communication system , and finally can guarantee the service continuity of the terminal equipment and guarantee the user experience.
- the terminal device may acquire the first set of security contexts through the following steps:
- the terminal device calculates the second set of security contexts according to the set security context mapping algorithm to generate the first set of security contexts.
- the terminal device can acquire the first set of security context corresponding to the first communication system during the inter-system handover process.
- the terminal device when the terminal device receives the registration rejection response message from the first core network device, the terminal device may release the wireless link.
- the terminal device can release the wireless link when receiving the registration rejection response message, thereby initiating the registration procedure again, and continuing to request registration to the first communication system.
- the registration refusal response message includes a refusal reason indication
- the refusal reason indication is used to instruct the terminal device to maintain a registration state.
- the rejection reason indication may be other rejection reason values except the following rejection reason values: #3, #6, #8, #7, #9, #10, #11, #35, #12, #13, #14, #15, #22 (where #22 carries the T3346 value information element (T3346 value IE), and the value of the T3346 value information element is neither 0 nor invalid (deactivated)), #25, #40, #42, #31.
- the terminal device can continue to maintain the registration state after receiving the registration rejection response message, so that the registration process can be initiated again.
- the terminal device may release the wireless link.
- the wireless link abnormality may include: the signal quality of the signal sent by the first AN device in the first communication system is degraded, the bit error rate of data transmitted through the wireless link is high, the wireless link Unable to successfully transmit data, etc., this application does not limit this.
- the terminal device can release the wireless link when the wireless link is abnormal, thereby initiating the registration process again and continuing to request registration to the first communication system.
- the terminal device may release the wireless link.
- the first core network device does not send a registration success response message.
- the first core network device fails to perform the registration step after receiving the first registration request message.
- the terminal device does not receive the registration success response message within a set period of time after sending the first registration request message.
- the terminal device when the terminal device sends the first registration request message, it starts the timer T3430 synchronously.
- the timing duration of the T3430 is 15 seconds.
- the terminal device does not receive the registration success response message; then when the timer T3430 times out, the terminal device abandons the registration process and releases the wireless link road.
- the terminal device can release the wireless link when the initial registration process is unsuccessful, thereby initiating the registration process again, and continuing to request registration to the first communication system.
- the second registration request message includes device information of a second core network device that has the context of the terminal device in the second communication system, and the second network device includes the Describe the second core network equipment.
- the second registration request message may include the first GUTI of the terminal device, and the first GUTI includes the device information of the second core network device (such as the identity of the second core network device or address); wherein, the first GUTI is obtained according to the second GUTI mapping, the first GUTI is the unique identifier of the terminal device in the first communication system; and the second GUTI is the terminal device The unique identifier in the second communication system is assigned to the terminal device by the second core network device in the second communication system.
- the first core network device After the first core network device receives the second registration request message, it can request the second core network device for the The context of the end device.
- the terminal device after the terminal device sends the second registration request message to the first core network device, the terminal device receives a registration success response message from the first core network device.
- the second communication system is a fifth-generation 5G communication system
- the first communication system is a fourth-generation 4G communication system
- the first registration request message is a tracking area update TAU request message
- the second registration request message is a TAU request message.
- the embodiment of the present application provides a communication method, the method includes the following steps:
- the first core network device located in the first communication system receives a registration request message from the terminal device in an idle state; the registration request message uses the first Two sets of security contexts are used for integrity protection; the second set of security contexts is used for security verification between the terminal equipment and the second network equipment located in the second communication system;
- the second core network device of the second communication system sends a context request message; wherein, the context request message includes the registration request message, and the context request message is used to request the context of the terminal device, and the second The network equipment includes the second core network equipment.
- the second set of security context is used to protect the integrity of the registration request message; thus, when the first core network requests the second core network device for the registration request message based on the registration request message.
- the second core network device can successfully perform an integrity check on the registration request message, thereby ensuring that the first core network device can successfully obtain the terminal device from the second core network device context, so as to ensure that the terminal device can be successfully registered in the first communication system.
- this method can avoid the situation that the registration process initiated by the terminal device is rejected again, improve the registration success rate of the terminal device in the inter-system handover scenario, and reduce the time delay for the terminal device to successfully register to the first communication system , and finally can guarantee the service continuity of the terminal equipment and guarantee the user experience.
- the first core network device receives a context response message from the second core network device; the context response message is used to indicate that the request for the context of the terminal device is successful; the first The core network device sends a registration success response message to the terminal device.
- the first core network device when the first core network device successfully acquires the context of the terminal device, it can notify the terminal device that the registration is successful.
- the registration request message includes device information of the second core network device that has the context of the terminal device in the second communication system; the first core network device may according to The device information of the second core device, and sending the context request message to the second core network device.
- the second communication system is a fifth-generation 5G communication system
- the first communication system is a fourth-generation 4G communication system
- the registration request message is a tracking area update TAU request message.
- the embodiment of the present application provides a communication method, the method includes the following steps:
- the second core network device receives a context request message from the first core network device; wherein the second core network device is located in the second communication system, The first core network device is located in the first communication system, the context request message includes a registration request message, and the registration request message uses a second set of security context for integrity protection; the second set of security context uses Security verification is performed between the terminal device and a second network device located in the second communication system, the second network device includes the second core device; the second core network device uses the second A security context is set, and an integrity protection check is performed on the registration request message.
- the second set of security context is used to protect the integrity of the registration request message; thus, when the first core network requests the second core network device for the registration request message based on the registration request message
- the second core network device can successfully perform an integrity check on the registration request message, thereby ensuring that the first core network device can successfully obtain the context of the terminal device from the second core network device , so as to ensure that the terminal device can be successfully registered in the first communication system.
- this method can avoid the situation that the registration process initiated by the terminal device is rejected again, improve the registration success rate of the terminal device in the inter-system handover scenario, and reduce the time delay for the terminal device to successfully register to the first communication system , and finally can guarantee the service continuity of the terminal equipment and guarantee the user experience.
- the second core network device sends a context response message to the first core network device; the context response message is used to indicate that the request for the context of the terminal device is successful .
- the context response message may include the context of the terminal device.
- the registration request message includes device information of the second core network device that has the context of the terminal device in the second communication system.
- the second communication system is a fifth-generation 5G communication system
- the first communication system is a fourth-generation 4G communication system
- the registration request message is a tracking area update TAU request message.
- the embodiment of the present application provides a communication method, the method includes the following steps:
- the terminal device After the terminal device switches from the second communication system to the first communication system, it obtains a first set of security context; wherein, the first set of security context is used for the terminal device and the device located in the first communication system
- the first network device performs security verification; after the terminal device sends a registration request message to the first core network device, the terminal device releases the wireless link; wherein, the registration request message is performed using the first set of security context Integrity protection, the first network device includes the first core network device; the terminal device initiates an attach procedure.
- the terminal device in the idle state can initiate an attachment Procedure to register with the first communication system. Because the terminal device does not re-initiate the registration process, but registers with the first communication system through the attach process. Therefore, this method can enable a terminal device in an idle state to quickly register with the first communication system.
- the solution provided by the embodiment of the present application can avoid the situation that the terminal device is rejected when the registration process is initiated again, improve the registration success rate of the terminal device in the inter-system handover scenario, and reduce the risk of the terminal device successfully registering to the first communication system. The delay can ultimately guarantee the service continuity of terminal equipment and user experience.
- the terminal device may acquire the first set of security contexts through the following steps:
- the terminal device calculates the second set of security contexts according to the set security context mapping algorithm to generate the first set of security contexts.
- the terminal device can acquire the first set of security context corresponding to the first communication system during the inter-system handover process.
- the terminal device when the terminal device receives the registration rejection response message from the first core network device, the terminal device may release the wireless link.
- the terminal device can release the wireless link when receiving the registration rejection response message, so as to register with the first communication system through the attach procedure.
- the registration rejection response message includes a rejection reason indication
- the rejection original value indication is used to instruct the terminal device to maintain the registration state.
- the rejection reason indication may be other rejection reason values except the following rejection reason values: #3, #6, #8, #7, #9, #10, #11, #35, #12, #13, #14, #15, #22 (where #22 carries the T3346 value information element (T3346 value IE), and the value of the T3346 value information element is neither 0 nor invalid (deactivated)), #25, #40, #42, #31.
- the terminal device can continue to maintain the registration state after receiving the registration rejection response message.
- the terminal device may release the wireless link.
- the wireless link abnormality may include: the signal quality of the signal sent by the first AN device in the first communication system is degraded, the bit error rate of data transmitted through the wireless link is high, the wireless link Unable to successfully transmit data, etc., this application does not limit this.
- the terminal device can release the wireless link when the wireless link is abnormal, so as to register with the first communication system through the attach process.
- the terminal device may release the wireless link.
- the first core network device does not send a registration success response message.
- the first core network device fails to perform the registration step after receiving the first registration request message.
- the terminal device does not receive the registration success response message within a set period of time after sending the first registration request message.
- the terminal device when the terminal device sends the first registration request message, it starts the timer T3430 synchronously.
- the timing duration of the T3430 is 15 seconds.
- the terminal device does not receive the registration success response message; then when the timer T3430 times out, the terminal device abandons the registration process and releases the wireless link road.
- the terminal device can release the wireless link when the initial registration process fails, so as to register with the first communication system through the attach process.
- the registration request message includes device information of a second core network device that has the context of the terminal device in the second communication system, and the second network device includes the first Two core network equipment.
- the terminal device may initiate an attach process through the following steps:
- the terminal device sends an attach request message to the first core network device.
- the second communication system is a fifth-generation 5G communication system
- the first communication system is a fourth-generation 4G communication system
- the registration request message is a tracking area update TAU request message.
- the embodiment of the present application provides a communication device, including a unit for performing each step in any one of the above aspects.
- the embodiment of the present application provides a communication device, including at least one processing element and at least one storage element, wherein the at least one storage element is used to store programs and data, and the at least one processing element is used to read and execute The program and data stored in the storage element enable the method provided by any one of the above aspects of the present application to be realized.
- an embodiment of the present application provides a communication system, including: a terminal device for performing the method provided in the first aspect, a first core network device for performing the method provided in the second aspect, and a device for performing The second core network device of the method provided by the third aspect.
- the embodiment of the present application further provides a computer program, which, when the computer program is run on a computer, causes the computer to execute the method provided in any one of the above aspects.
- the embodiment of the present application also provides a computer-readable storage medium, where a computer program is stored in the computer-readable storage medium, and when the computer program is executed by a computer, the computer executes any one of the above-mentioned method provided.
- the embodiment of the present application further provides a chip, the chip is used to read a computer program stored in a memory, and execute the method provided in any one of the above aspects.
- an embodiment of the present application further provides a chip system, where the chip system includes a processor, configured to support a computer device to implement the method provided in any one of the above aspects.
- the chip system further includes a memory, and the memory is used to store necessary programs and data of the computer device.
- the system-on-a-chip may consist of chips, or may include chips and other discrete devices.
- FIG. 1A is a schematic diagram of a confidentiality protection process provided by an embodiment of the present application.
- FIG. 1B is a schematic diagram of an integrity protection process provided by an embodiment of the present application.
- FIG. 2 is a schematic diagram of a communication architecture provided by an embodiment of the present application.
- FIG. 3 is a flowchart of a communication method provided in an embodiment of the present application.
- FIG. 4 is a flow chart of another communication method provided by the embodiment of the present application.
- FIG. 5 is a flow chart of a communication example provided by an embodiment of the present application.
- FIG. 6 is a flow chart of another communication example provided by the embodiment of the present application.
- FIG. 7 is a flowchart of a communication device provided by an embodiment of the present application.
- FIG. 8 is a flowchart of a communication device provided by an embodiment of the present application.
- the present application provides a communication method, device, and equipment to improve the registration success rate of terminal equipment in an inter-system handover scenario.
- the method, the device, and the equipment are based on the same technical concept. Since the principles of solving the problems are similar, the implementation of the device, device, and method can be referred to each other, and the repetition will not be repeated.
- a terminal device is a device that provides voice and/or data connectivity to users.
- the terminal equipment may also be called user equipment (user equipment, UE), mobile station (mobile station, MS), mobile terminal (mobile terminal, MT) and so on.
- UE user equipment
- MS mobile station
- MT mobile terminal
- the UE may be used as an example for illustration.
- the terminal device may be a handheld device with a wireless connection function, a vehicle-mounted device, and the like.
- some terminal devices are: mobile phone (mobile phone), tablet computer, notebook computer, palmtop computer, mobile Internet device (mobile internet device, MID), intelligent sales terminal (point of sale, POS), wearable device, Virtual reality (virtual reality, VR) equipment, augmented reality (augmented reality, AR) equipment, wireless terminals in industrial control (industrial control), wireless terminals in self-driving (self-driving), remote medical surgery (remote medical surgery) ), wireless terminals in smart grid, wireless terminals in transportation safety, wireless terminals in smart city, wireless terminals in smart home, Various smart meters (smart water meters, smart electricity meters, smart gas meters), etc.
- the communication system is used to connect the terminal device to the data network by using the 3rd generation partnership project (3GPP) access technology when the terminal device requests services, and realize the communication between the terminal device and the data network. It is also called a mobile communication system or a 3GPP communication system by transmitting user plane data between users to realize corresponding services. Unless otherwise specified, the communication systems involved in the following embodiments of the present application are all 3GPP communication systems.
- 3GPP 3rd generation partnership project
- the communication system is divided into an access network (access network, AN) and a core network (core network, CN).
- the access network is used to connect the terminal equipment to the core network through the 3GPP access technology.
- the core network is used to connect terminal devices to different data networks.
- the core network can be divided into the control plane and the user plane.
- the present application does not limit the format of the communication system, which may be a third generation (3 rd generation, 3G) communication system, a fourth generation (4 th generation, 4G) communication system (that is, long term evolution (long term evolution) , LTE) communication system, evolved packet system (evolved packet system, EPS)), fifth generation (5 th generation, 5G) communication system (ie 5G system (5G system, 5GS)), or future communication system, or A communication system based on the evolution of any generation of communication system.
- 3G third generation
- 4 th generation, 4G) communication system that is, long term evolution (long term evolution) , LTE) communication system, evolved packet system (evolved packet system, EPS)
- 5G system 5G system
- 5GS 5G system
- future communication system or A communication system based on the evolution of any generation of communication system.
- the access network can also be called an evolved universal mobile telecommunications system (UMTS) terrestrial radio access network (evolved-UMTS terrestrial radio access network, E-UTRAN). It can also be called an evolved packet core network (evolved packet core, EPC).
- UMTS evolved universal mobile telecommunications system
- E-UTRAN evolved-UMTS terrestrial radio access network
- EPC evolved packet core network
- the access network can also be called a 5G radio access network (NG-radio access network, RAN), or NG-RAN, or new radio (NR) System), the core network can also be called 5G core network (5G core, 5GC).
- NG-radio access network RAN
- NG-RAN 5G radio access network
- NR new radio
- the network device is a network element located in the communication system.
- the network device may be an access network device (ie, AN device) in the access network, or a core network device in the core network. This application is not limited to this.
- the AN device is a device that connects the terminal device to the wireless network in the communication system.
- the access network device as a node in the radio access network, may also be called a base station, and may also be called a radio access network (radio access network, RAN) node (or device).
- RAN radio access network
- AN equipment are: new generation Node B (generation Node B, gNB), transmission reception point (transmission reception point, TRP), evolved Node B (evolved Node B, eNB), wireless network controller (radio network controller, RNC), node B (Node B, NB), access point (access point, AP) base station controller (base station controller, BSC), base transceiver station (base transceiver station, BTS), home base station (such as , home evolved NodeB, or home Node B, HNB), or base band unit (BBU), enterprise LTE discrete narrowband aggregation (Enterprise LTE Discrete Spectrum Aggregation, eLTE-DSA) base station, etc.
- generation Node B generation Node B
- TRP transmission reception point
- wireless network controller radio network controller
- node B Node B, NB
- access point access point
- AP base station controller
- base transceiver station base transceiver
- the AN device may include a centralized unit (centralized unit, CU) node and a distributed unit (distributed unit, DU) node.
- CU centralized unit
- DU distributed unit
- This structure separates the protocol layers of the eNB in the long term evolution (LTE) system, the functions of some protocol layers are placed in the CU for centralized control, and the remaining part or all of the functions of the protocol layers are distributed in the DU. Centralized control of DUs.
- LTE long term evolution
- the AN device in a 4G communication system, is called an eNB; in a 5G communication system, the AN device may be called a gNB.
- core network equipment a network element located in the core network, used to realize the functions of the core network, for example, responsible for connecting the terminal equipment to different data networks according to the call request or service request sent by the terminal equipment through the access network services such as billing, mobility management, and session management. Since the method provided in the embodiment of the present application is in the scenario where the terminal device performs inter-system handover, the core network device involved in the present application is a network element in the core network responsible for the mobility management function of the terminal device.
- the core network equipment with the mobility management function can also be called a control plane network element or a control plane. surface equipment.
- a core network device with a mobility management function may be called a mobility management entity (mobility management entity, MME); in a 5G communication system, a core network device with a mobility management function may be called a It is an access and mobility management function (access and mobility management function, AMF) network element, and is referred to as AMF for short.
- MME mobility management entity
- AMF access and mobility management function
- this application does not limit the name of the core network equipment with mobility management functions, it can also implement other functions or integrate with other functional network elements, and it can also be called by other names.
- Security verification also known as secure docking, security verification, security protection, etc., is used to realize the confidentiality protection and/or integrity protection of the receiver and the sender.
- Inter-system switching which is to switch the terminal equipment from a communication system of one standard to a communication system of another standard.
- the terminal device in the radio resource control (radio resource control, RRC) connected state can implement the inter-system handover through a handover (handover) mechanism.
- the wireless link is a wireless connection between the terminal device and the AN device in the communication system, used to transmit service data or signaling between the terminal device and the AN device, and may also be called a wireless connection.
- the wireless link may include a data resource bearer (data resource bearer, DRB) or a signaling resource bearer (signaling resource bearer, SRB), wherein, the DBR is a wireless bearer for transmitting service data, and the SRB is a wireless bearer for transmitting service data.
- the AN device may establish a wireless link of the terminal device based on the RRC connection. Since the radio link is established based on the RRC connection, the state of the radio link is associated with the state of the RRC connection.
- the state of RRC connection includes: RRC connection state (RRC active, referred to as connection state for short), RRC idle state (RRC idle, referred to as idle state for short).
- RRC active referred to as connection state for short
- RRC idle state RRC idle
- the terminal device is in the RRC connection state.
- the terminal device enters the RRC idle state.
- a plurality referred to in this application refers to two or more than two. At least one means one or more than one.
- the attach (attach) process and the tracking area update (tracking area update, TAU) process involved in the embodiment of the present application may be the standard process specified in the communication standard, such as the process specified in the communication standard 24.301.
- the messages and timers involved in the above process can also refer to the definition in the communication standard.
- the NAS of the terminal device and the NAS of the network device (take the core network device as an example) in the communication system maintain a set of security contexts for security verification, so as to realize signaling or The transmission of business data is secure.
- the security verification includes confidentiality protection and/or integrity protection.
- the 3GPP protocol TS33.401 stipulates that the NAS count value (count) in the security context is one of the parameters of confidentiality protection and integrity protection.
- the security context may also include: security protection key parameters and security protection algorithms; wherein, the security protection key parameters include key parameters for generating confidentiality keys and/or integrity keys, or confidentiality A key and/or an integrity key, and a security protection algorithm includes a confidentiality algorithm and/or an integrity algorithm.
- the terminal device can encrypt and/or integrity protect the uplink message according to the maintained security context
- the core network device can encrypt and/or integrity protect the received message according to the maintained security context
- the subsequent uplink message is decrypted and/or integrity checked to obtain the uplink message.
- the core network device can also encrypt and/or integrity protect the downlink message according to the maintained security context, and the terminal device can encrypt and/or integrity protect the received message according to the maintained security context
- the processed downlink message is decrypted and/or integrity checked to obtain the downlink message.
- FIG. 1A is a schematic diagram of a process in which the receiver and the sender use the same set of security contexts for confidentiality protection.
- the sender and the receiver use the confidentiality algorithm to calculate a series of parameters such as the confidentiality key and NAS count to obtain the key stream block; message) to obtain the ciphertext; after the ciphertext is transmitted to the receiver, the receiver uses the key stream block to decrypt the ciphertext to obtain the plaintext.
- FIG. 1B is a schematic diagram of a process in which the receiver and the sender use the same security context to perform integrity protection.
- the sender uses the integrity algorithm to calculate a series of parameters such as the message to be transmitted, the integrity key, and the NAS count, and obtains the check code, and then sends the message and the check code to the receiver at the same time. square.
- the receiver After receiving the message and check code, the receiver uses the integrity algorithm to calculate a series of parameters such as the received message, the integrity key, and NAS count to obtain the check code to be verified; Compare the received check code with the generated check to be verified: if the two are the same, it means that the integrity check of the message is passed/successful, indicating that the message is complete and has not been tampered with; if the two are different, then Indicates that the integrity check of the message has not passed/failed, indicating that the message may have been tampered with and is incomplete.
- each set of security contexts can include uplink security contexts and downlink security contexts, uplink security contexts include uplink NAS counts, and downlink security contexts include downlink NAS counts.
- uplink security context is used for security verification of the uplink message
- downlink security context is used for security verification of the downlink message.
- the information contained in the security context in different communication systems is different, for example, the security protection key parameters or security protection algorithms contained in the security context in the 5G communication system and the 4G communication system are different.
- FIG. 2 shows a communication architecture applicable to the communication method provided by the embodiment of the present application.
- the communication architecture is compatible with a variety of communication systems of different standards, and FIG. 2 only illustrates that the communication architecture includes a 5G communication system and a 4G communication system as an example.
- this application does not limit the communication architecture applicable to the method provided by this application, which may include at least any of the following two communication systems: 5G communication system, 4G communication system, future new generation communication system, global mobile Communication (Global System of Mobile communication, GSM) system, code division multiple access (Code Division Multiple Access, CDMA) system, wideband code division multiple access (Wideband Code Division Multiple Access, WCDMA) system, general packet radio service (General Packet Radio Service, GPRS), Advanced long term evolution (LTE-A) system, Universal Mobile Telecommunications System (UMTS), and the 3rd Generation Partnership Project (The 3rd Generation Partnership Project, 3GPP) Related cellular systems, and communication systems based on the evolution of the above communication systems.
- GSM Global System of Mobile communication
- CDMA code division multiple access
- WCDMA wideband code division multiple access
- GPRS General Packet Radio Service
- LTE-A Advanced long term evolution
- UMTS Universal Mobile Telecommunications System
- 3rd Generation Partnership Project The 3rd Generation Partnership Project, 3GPP
- the communication architecture described in the embodiment of the present application is to illustrate the technical solutions of the embodiments of the present application more clearly, and does not constitute a limitation to the technical solutions provided by the embodiments of the present application.
- the development of the mobile communication system, the evolution of the network architecture, the technical solutions provided by the embodiments of the present application are also applicable to similar technical problems and scenarios.
- the terminal device (such as the UE in the figure) can switch from one communication system to another communication system through inter-system handover.
- the 4G communication system includes two parts: an access network and a core network.
- the access network is the E-UTRAN shown in the figure
- the core network includes the following network elements: mobility management function (mobility management entity, MME), serving network element (serving gateway, SGW), Packet data network gateway (PGW), policy and charging rules function (policy and charging rules function, PCRF) network element (referred to as PCRF), home subscriber server (home subscriber server, HSS), etc.
- MME mobility management function
- serving network element serving gateway, SGW
- PGW Packet data network gateway
- PCRF policy and charging rules function
- PCRF home subscriber server
- HSS home subscriber server
- the PGW can also be divided into: PGW control plane (PGW-control, PGW-C) network elements (referred to as PGW-C) and PGW user plane (PGW-user, PGW-U) network elements Yuan (abbreviated as PGW-U).
- PGW-control, PGW-C PGW control plane
- PGW-U PGW user plane
- Yuan abbreviated as PGW-U
- the 5G communication system also includes two parts: the access network and the core network.
- the access network is the NG-RAN shown in the figure
- the core network includes the following network elements: AMF network element (abbreviated as AMF), user plane function (user plane function, UPF) network element (referred to as UPF), session management function (session management function, SMF) network element (referred to as SMF), policy and charging function (policy and charge function, PCF) network element (referred to as PCF), unified data management (unified data management , UDM) network element (referred to as UDM) and so on.
- AMF AMF network element
- UPF user plane function
- SMF session management function
- PCF policy and charging function
- PCF policy and charging function
- PCF policy and charging function
- UDM unified data management
- UDM unified data management
- UDM unified data management
- the SMF and PGW-C can be integrated in the same network element, or they can be set separately in different devices
- the UPF and PGW-U, the HSS and UDM, and the PCF and PCRF network elements are also the same, and their composition is not specifically limited in this embodiment of the present application.
- Communication between two network devices in a 4G communication system or a 5G communication system can be implemented through corresponding interfaces, as shown in FIG. 2 for details. It should be noted that, in order to realize inter-system handover of terminal equipment between the 5G communication system and the 4G communication system, the AMF in the 5G communication system and the MME in the 4G communication system can also communicate through the interface N26 to realize the handover process transmission of signaling, security context, and context of the terminal device.
- the above network elements in a 4G communication system or a 5G communication system may be network elements implemented on dedicated hardware, or software instances running on dedicated hardware, or implemented on a virtualization platform (such as instance of the virtualization function on the cloud platform).
- the embodiment of the present application does not limit the distribution form of each network element in the communication system.
- each of the above network elements may be deployed in different physical devices, or multiple network elements may be integrated in the same physical device.
- each network element in the communication system, may have other names; When in , the physical device can also have another name.
- a terminal device can switch from one communication system to another through inter-system handover.
- the target communication system where the terminal device performs inter-system handover is referred to as the first communication system
- the source communication system where the terminal device performs inter-system handover is referred to as the second communication system.
- the network devices in the first communication system are called first network devices
- the network devices in the second communication system are called second network devices.
- the first network device may include a first core network device and a first AN device located in the first communication system
- the second network device may include a second core network device located in the second communication system network device and a second AN device.
- both the NAS of the terminal device and the NAS of the first network device in the first communication system will acquire and maintain a first set of security contexts, wherein the first The set of security contexts is used for security verification between the terminal device and the first network device. And after the handover is completed, all NAS messages exchanged between the terminal device and the first network device need to use the first set of security contexts for integrity protection and/or confidentiality protection.
- the first set of security context is generated by calculating the second set of security context according to a set security context mapping algorithm.
- the second set of security context is used for security verification between the terminal device and the second network device located in the second communication system, that is, the second set of security context is stored in the terminal device and the second network device. context.
- the first set of security context maintained by the NAS of the terminal device is generated by the terminal device by calculating the second set of security context stored locally according to a set security context mapping algorithm.
- the first set of security context maintained by the NAS of the first network device may be generated by the second core network device by calculating the second set of security context stored locally according to the set security context mapping algorithm, and finally forwarded to the first network equipment.
- This application uses the same security context mapping algorithm on the terminal device side and the core network side as an example, that is, the first set of security contexts maintained by the terminal device and the first network device are the same.
- the terminal device initiates a registration process by sending a registration request to the first core network device.
- the terminal device will use the first set of security contexts to protect the integrity of the registration request.
- the registration request includes device information of the second core network device that has the context of the terminal device in the second communication system.
- the first core network device After receiving the registration request sent by the terminal device in the idle state, the first core network device obtains the device information of the second core network device from the registration request, and sends a message carrying the registration information to the second core network device according to the device information.
- the context request of the registration request is used to obtain the context of the terminal device from the second core network device.
- the second core network device After the second core network device receives the context request, it will use the second set of security context to verify the integrity of the registration request in the context request, because the registration request is completed by the terminal device using the first set of security context. Therefore, the integrity verification performed by the second core network device on the registration request will fail. As a result, the first core network device cannot obtain the context of the terminal device from the second core network device, and thus the first core network device will reject the terminal device registration request.
- the terminal device can only reside in the first communication system again through the attachment process. This will definitely prolong the time delay for the terminal device to register with the first communication system, thereby causing service continuity and ultimately affecting user experience.
- the registration process may be a TAU process.
- the communication standard TS24.301 stipulates:
- the UE uses the 5G security context to generate a mapped EPS security context (that is, the 4G security context);
- the UE After the handover, the UE sends a TAU request message to the MME, and the UE uses the 4G security context to protect the integrity of the TAU request message.
- the communication standard TS33.501 stipulates:
- the terminal device sends a TAU request carrying a mapped EPS globally unique temporary identity (GUTI) (that is, 4G GUTI) to the MME to start the TAU process.
- the mapped EPS GUTI is obtained according to the 5G GUTI mapping.
- the mapped EPS GUTI contains the device information (such as device address or device identity) of the AMF with UE context in the 5G communication system; after receiving the TAU request, the MME obtains the AMF device information from the mapped EPS GUTI included in the TAU request, The MME forwards the complete TAU request message to the AMF; the AMF uses the 5G security context to check the integrity of the TAU request message.
- the current solution will result in a low success rate of terminal device registration, which in turn will lead to longer network stay time of terminal devices, problems with service terminals, and affect user experience.
- the reason for the above impact is that the first registration process of the terminal device after the handover is unsuccessful, and after the terminal device releases the wireless link, the terminal device that enters the idle state will be rejected when it initiates the registration process again, and can only reside in the handover process through the attach process. later communication system.
- the first communication system may be a 5G communication system
- the second communication system may be a 4G communication system
- the first communication system may be a 4G communication system
- the second communication system may be a 5G communication system A communication system
- the first communication system may be a 5G communication system
- the second communication system may be a 6G communication system or the like.
- the first core network device is a network element with a mobility management function in the first communication system
- the second core device is a network element with a mobility management function in the second communication system.
- the security context used by the terminal device and the network device in the communication system to perform security verification may also be simply referred to as the security context corresponding to the communication system.
- an embodiment of the present application provides a communication method.
- the method can be applied to the communication architecture shown in FIG. 2 .
- Referring to the flowchart shown in FIG. 3 the method provided in the embodiment of the present application will be described in detail below.
- the second communication system establishes a session connection (PDU session) of the terminal device, and the terminal device and the second network device located in the second communication system use a second set of Security context for security verification.
- the second network device includes a second AN device and a second core network device.
- the NAS in the terminal device and the NAS in the second network device respectively maintain the second set of security contexts, and use the second set of security contexts maintained respectively to perform confidentiality protection and Integrity protection, the specific process can refer to the above specific description of FIG. 1A and FIG. 1B , which will not be repeated here.
- S300b When the current network environment meets the inter-system handover condition, trigger the inter-system handover of the terminal device in the connected state; the terminal device, the first network device in the first communication system, and the second network device in the second communication system start An inter-system handover procedure is executed, and the terminal device is handed over from the second communication system to the first communication system.
- the second network device in the second communication system determines that an inter-system handover condition is met, it triggers an inter-system handover process from the second communication system to the first communication system.
- an inter-system handover process from the second communication system to the first communication system.
- the terminal device After the handover is successful, the terminal device successfully camps on the first communication system.
- the terminal device acquires a first set of security contexts, where the first set of security contexts is used to perform security verification between the terminal device and a first network device in the first communication system.
- the first network device includes a first AN device and a first core network device.
- the terminal device may obtain the first set of security contexts by adopting the following steps:
- the terminal device calculates the second set of security contexts maintained by itself according to the locally saved set security context mapping algorithm to generate the first set of security contexts.
- the set security context mapping algorithm may be: the security context mapping algorithm in 3GPP protocol 33501_CR0611r1, which is used to map the security context corresponding to the 5G communication system to the security context corresponding to the 4G communication system.
- the first core network device may, but not limited to, obtain the first set of security context in the following manner: during or after the handover between different systems, the second core network device in the second communication system The device calculates the second set of security context stored locally according to the set security context mapping algorithm, generates the first set of security context, and sends the first set of security context to the first core network device.
- the security context mapping algorithm used by the second core network device should be the same as the security context mapping algorithm used by the terminal device. In this way, it can be ensured that the first set of security contexts generated by the two are the same, thereby ensuring that the terminal device and the first set of security contexts are the same.
- a core device can use the first set of security contexts to successfully implement security verification.
- the terminal device initiates a registration process, and sends a first registration request message to the first core network device; the first core network device receives the first registration request message from the terminal device.
- the first registration request message uses the first set of security context for integrity protection.
- the terminal device after the terminal device is handed over from another system, the terminal device successfully resides in the first communication system, and the terminal device also needs to initiate a registration process to register with the first communication system.
- the registration process in this embodiment may be a TAU process.
- the first registration request may be a TAU request (tracking area update request) message for integrity protection using the first set of security context.
- the first core network device located in the first communication system can learn the RRC connection state of the terminal device. Since the terminal device initiates the registration process in the connected state, the first core network device will perform corresponding registration steps after receiving the first registration request message from the terminal device in the connected state, and according to As a result of the execution, a corresponding registration response message is fed back to the terminal device (if the execution is successful, a registration success response message is fed back; when the execution fails, a registration rejection response message is fed back). For example, the first core network device initiates a location update (update location) process to a data function network element (such as HSS/UDM) in the communication system that stores user-related data (that is, sends a location update request (update location) to the data function network element. location request) message).
- a location update update location
- a data function network element such as HSS/UDM
- the terminal device since the terminal device does not encrypt the first registration request message, after the first core network device receives the first registration request message from the terminal device in the connected state, , using the first set of security context to perform integrity check on the first registration request message (without using the first set of security context to perform decryption processing on the first registration request message), in the integrity check After passing the verification, perform corresponding registration steps according to the first registration request message.
- the first registration request message may carry device information of a second core network device having a context (UE context) of the terminal device in the second communication system.
- UE context a context of the terminal device in the second communication system.
- the device information is used to identify the second core network device in the second communication system, and may be information such as a device identifier of the second core network device or an address of the second core network device. Applications are not limited to this.
- the first registration request message may carry a first GUTI, and similar to the first set of security contexts, the first GUTI is obtained through mapping from the second GUTI.
- the first GUTI includes device information of the second core network device in the second communication system that has the context of the terminal device.
- the first GUTI is the unique identifier of the terminal device in the first communication system
- the second GUTI is the unique identifier of the terminal device in the second communication system, and is determined by the second communication system The second core network device allocated to the terminal device.
- the terminal device After the terminal device sends the first registration request message to the first core network device but has not successfully registered with the first communication system, release the wireless link of the terminal device.
- the wireless link is a wireless connection between the terminal device and the first AN device in the first communication system.
- the terminal device after the wireless link of the terminal device is released, the terminal device enters an idle state, and the first core network device may know that the terminal device is in the idle state.
- the wireless link of the terminal device may be actively released by the first AN device.
- the first AN device actively releases when it is determined that the wireless link is abnormal.
- the terminal device may, but not limited to, release the wireless link in the following ways:
- the registration refusal response message includes a refusal reason indication
- the refusal reason indication is used to instruct the terminal device to maintain the registration state, that is, it will not cause the terminal device to migrate to the de-registered state.
- the rejection reason indication may be other rejection reason values except the following rejection reason values: #3, #6, #8, #7, #9, #10, #11, #35, #12, #13, #14, #15, #22 (where #22 carries the T3346 value information element (T3346 value IE), and the value of the T3346 value information element is neither 0 nor invalid (deactivated)), #25, #40, #42, #31.
- the terminal device will still maintain the registration state after receiving the registration rejection response message, and will initiate the registration process again later.
- Way 2 When the registration success response message from the first core network device is not received, the terminal device releases the wireless link. Wherein, the registration success response message is fed back by the first core device after successfully performing the registration step, and the registration success response message is used to notify the terminal device that the registration process is successful, or that the first core network device will The terminal device is registered with the first communication system.
- the first core network device does not send a registration success response message. For example, the first core network device fails to perform the registration step.
- the terminal device does not receive the registration success response message within a set period of time after sending the first registration request message.
- the terminal device when the terminal device sends the first registration request message, it starts the timer T3430 synchronously.
- the timing duration of the T3430 is 15 seconds.
- the terminal device does not receive the registration success response message; then when the timer T3430 times out, the terminal device abandons the registration process and releases the wireless link road.
- the abnormality of the wireless link may include: the signal quality of the signal sent by the first AN device in the first communication system is reduced, the bit error rate of data transmitted through the wireless link is high, and the wireless link cannot be successful Transmission of data, etc., is not limited in this application.
- S304 The terminal device in the idle state (maintaining the registration state) initiates the registration process again, and sends a second registration request message to the first core device; the first core network device receives the terminal device from the idle state The second registration request message.
- the second registration request message uses a second set of security context for integrity protection.
- the terminal device does not perform encryption processing on the second registration request message.
- the second registration request message may be a TAU request message for integrity protection using a second set of security context.
- the second registration request message also carries device information of a second core network device that has the context of the terminal device in the second communication system.
- the second registration request message carries the first GUTI of the terminal device.
- the first GUTI includes the device information of the second core network device.
- S302 the description of the first registration request message in S302, which will not be repeated here.
- the first core network device sends a context request message to the second core network device located in the second communication system; the second core network device receives the context from the first core network device request message.
- the context request message includes the second registration request message, and the context request message is used to request the context of the terminal device.
- the context of the terminal device includes various information enabling the terminal device to create and maintain wireless links, bearers, and PDU sessions in the communication system to realize communication services.
- the context of the terminal device may include, for example, network capability information, various identifiers of the terminal device, authentication information, created connection information, created bearer information, and the like.
- the second registration request message contains the device information of the second core network device
- the first core network device after receiving the second registration request message, the first core network device, from the Obtain the device information of the second core network device from the second registration request message, and finally send the context request message to the second core device according to the device information of the second core network device.
- the first core network device since the second registration request message is not encrypted but only undergoes integrity protection processing, the first core network device does not need to perform decryption processing and integrity verification on the second registration request message Processing, the device information of the second core device may also be successfully acquired directly from the second registration request message. In this way, the first core network device may determine, according to the device information, that the sending object of the context request message is the second core network device.
- the second core network device acquires the second registration request message from the context request message, and uses the saved second set of security context to perform integrity check on the second registration request message.
- the second core network device may maintain a protection timer for each saved terminal device context.
- the protection timer corresponding to the context of any terminal device expires, the second core network device deletes the context of the terminal device.
- the second core network device stores the context of the terminal device, that is, the protection timer corresponding to the context of the terminal device has not expired.
- the second core network device sends a context response message to the first core network device after passing the integrity check of the second registration request message; the first core network device receives a context response message from the The context response message of the second core network device.
- the context response message is used to indicate that the request for the context of the terminal device is successful.
- the second core network device when the second core network device passes the complete verification of the second registration request message and the second core network device determines that the context of the terminal device is saved, the second core network device sends the context response message to the first core device.
- the second core network device may, but not limited to, send the context of the terminal device to the first core network device in the following manner:
- the second core network device sends the context of the terminal device to the first core network device through the context response message, that is, the context response message includes the context of the terminal device.
- the first core network device sends a registration success response message to the terminal device; the terminal device receives the registration success response message from the first core network device.
- the registration success response message is used to notify the terminal device that this registration process is successful, and that the terminal device has successfully registered in the first communication system.
- the terminal device After the terminal device receives the registration success response message from the first core network device, it successfully registers in the first communication system. Afterwards, the terminal device can create a wireless link, a bearer, and a session in the first communication system, so as to implement communication services.
- the embodiment of the present application provides a communication method.
- the terminal device in the connected state switches from the second communication system to the first communication system after the first registration process fails, causing the terminal device to release the wireless link
- the terminal device in the idle state initiates the registration process again , send to the first core network device in the first communication system a registration request message that adopts the second set of security context for integrity protection; in this way, the first core network device sends the registration request message to the terminal device in the idle state after receiving the
- the context of the terminal device may be requested from the second core network device of the second communication system based on the registration request message; and the second core network device may use the saved second set of security context to successfully register the terminal device.
- An integrity check is performed on the request message, so as to send the context of the terminal device to the first core network device. Therefore, the first core network device can successfully obtain the context of the terminal device from the second core network device, so that the terminal device can successfully register in the first communication system.
- the idle terminal device when the initial registration process fails and the idle terminal device initiates the registration process again, it continues to use the first set of security context to protect the integrity of the registration request message, while the second core network
- the device can only use the second set of security contexts for integrity verification, so the second registration process of the terminal device will inevitably fail.
- the second set of security context is used to protect the integrity of the registration request message; this can ensure that the second core network device can successfully performing an integrity check on the registration request message, thereby ensuring that the first core network device can successfully obtain the context of the terminal device from the second core network device, thereby ensuring that the terminal device can successfully register with the In the first communication system described above.
- the solution provided by the embodiment of the present application can avoid the situation that the registration process initiated by the terminal device is rejected again, improve the registration success rate of the terminal device in the inter-system handover scenario, and reduce the risk of the terminal device successfully registering to the first registration process.
- the delay of the communication system can ultimately guarantee the service continuity of the terminal equipment and guarantee the user experience.
- Another communication method is provided in the embodiment of the present application.
- the method can be applied to the communication architecture shown in FIG. 2 . Referring to the flow chart shown in FIG. 4 , the method provided in the embodiment of the present application will be described in detail below.
- steps S400a-S403 in this embodiment are the same as steps S300a-S303 in Embodiment 1, so the specific description of steps S400a-S403 can refer to the corresponding steps in Embodiment 1, I won't repeat them here.
- the terminal device may enter a de-registration state after performing local de-registration; and then re-reside in the first communication system through a frequency scanning and network search process.
- the terminal device may attach using an attach procedure in a current communication standard. For example, the terminal device needs to access the first communication system through a random access procedure; then, the terminal device sends an attach request (attach request) message to the first core network device in the first communication system, etc. , no further description here.
- the terminal device when the terminal device completes the attachment procedure, it can register with the first communication system.
- the embodiment of the present application provides a communication method.
- this method after the terminal device in the connected state switches from the second communication system to the first communication system after the first registration process fails, causing the terminal device to release the wireless link, the terminal device in the idle state can initiate an attachment Procedure to register with the first communication system. Because the terminal device does not re-initiate the registration process, but registers with the first communication system through the attach process. Therefore, this method can enable a terminal device in an idle state to quickly register with the first communication system.
- the solution provided by the embodiment of the present application can avoid the situation that the terminal device is rejected when the registration process is initiated again, improve the registration success rate of the terminal device in the inter-system handover scenario, and reduce the risk of the terminal device successfully registering to the first communication system.
- the delay can ultimately guarantee the service continuity of terminal equipment and user experience.
- this application also provides some communication examples. Referring to FIG. 5 or FIG. 6, the examples will be described in detail respectively.
- the following example takes UE handover from a 5G communication system to a 4G communication system as an example for illustration.
- the security context corresponding to the 5G communication system is referred to as the 5G security context
- the security context corresponding to the 4G communication system is referred to as the 4G security context
- the network element with mobility management function is marked as AMF
- AN equipment is marked as eNB
- the network element with mobility management function in the core network is marked as MME.
- the data function network elements HSS and UDM that store user data in the 4G communication system and the 5G communication system can be integrated into the same network element, which is recorded as HSS/UDM.
- Example 1 This example is based on the method provided by the embodiment shown in FIG. 3 . Referring to the flow chart shown in Fig. 5, the steps in this example will be described in detail.
- the UE resides in the 5G communication system, establishes a wireless link with the gNB, and a PDU session, and enters a connected state; the UE performs security verification with network devices in the 5G communication system such as the gNB and AMF using the 5G security context.
- Both the UE and the NAS of the network device in the 5G communication system maintain the 5G security context.
- S501 The inter-system handover process of the UE in the connected state triggered by the network (that is, the handover process from the 5G communication system to the 4G communication system).
- S501 may be implemented by using the inter-system switching process in the current communication standard.
- the process may include the following steps S5011-S5018.
- S5012 The AMF performs mapping calculation on the 5G security context maintained by itself according to the saved setting security context mapping algorithm, and generates a 4G security context.
- the 4G security context may also be called a mapped security context, a 5G mapped security context, and the like.
- the AMF sends handover-related information including the 4G security context to the MME in the 4G communication system.
- the MME After receiving the handover related information, the MME saves the handover related information, so that after the handover is successful, it can communicate with the UE according to the handover related information.
- S5014 The AMF sends a handover command (handover command) to the gNB.
- S5015 The gNB sends a handover command to the UE.
- S5016 The UE performs mapping calculation on the 5G security context maintained by itself according to the saved set security context mapping algorithm to generate a 4G security context.
- S5017 The UE sends a handover complete (handover complete) message to the eNB in the 4G communication system.
- S5018 The eNB sends a handover notification (handover notify) to the MME.
- the UE After switching to the 4G communication system, the UE initiates the first TAU process in the 4G communication system, that is, the UE sends a TAU request (TAU request) message to the MME. Wherein, the UE uses the 4G security context to perform integrity protection on the TAU request message.
- TAU request TAU request
- S503 The MME receives the TAU request message, and executes corresponding TAU steps after successfully performing integrity verification on the TAU request message using the 4G security context.
- the TAU step performed by the MME in the current communication standard may be used to implement S503.
- the TAU step may include the following steps S5031-S5034.
- S5031 The MMR sends a location update request (update location request) message to the HSS/UDM.
- the HSS/UDM After receiving the location update request message, the HSS/UDM sends a deregistration notification (Nudm_UECM_DeregistrationNotification) to the AMF in the 5G communication system.
- a deregistration notification (Nudm_UECM_DeregistrationNotification)
- the context of the UE is stored in the AMF, and the deregistration notification is used to notify the AMF to delete the context of the UE.
- the AMF deletes the context of the UE when receiving the notification of deregistration.
- the protection timer continues to run until the AMF deletes the context of the UE when the protection timer expires.
- the radio link of the UE is released.
- TAU reject TAU reject
- S504a The MME sends a TAU reject (TAU reject) message to the UE when an exception occurs during the execution of the TAU step in S503.
- TAU rejection message is used to notify the UE that the current TAU process fails.
- the TAU rejection message includes a rejection reason value indicating that the UE remains in the registered state and will not cause the UE to migrate to the deregistered state. Therefore, after receiving the TAU rejection message, the UE will continue to maintain the registration state.
- the rejection reason value contained in the TAU rejection message may be other rejection reason values except the following rejection reason values:
- #22 (wherein #22 carries the T3346 value information element ( T3346 value IE), and the value of the T3346 value information element is neither 0 nor invalid (deactivated)), #25, #40, #42, #31.
- S504b The UE does not receive the TAU success response message from the MME. Wherein, the TAU success response message is used to notify the UE that the current TAU process is successful. However, the UE does not receive the TAU success response message, and the UE determines that the current TAU procedure fails.
- the UE may not receive the TAU success response message in the following situations:
- Case 3 The UE starts the timer T3430 after sending the TAU request message; and during the timing of T3430, the UE does not receive the TAU success response message until the T3430 times out.
- S504c The UE determines that the radio link is abnormal.
- wireless link abnormalities may include, but are not limited to, the following situations:
- the signal quality of the signal sent by the eNB received by the UE is degraded, the bit error rate of the data transmitted by the UE through the wireless link is high, and the UE cannot successfully transmit data through the wireless link.
- S504d The eNB determines that the radio link is abnormal.
- wireless link abnormalities may include, but are not limited to, the following situations:
- the signal quality of the signal sent by the UE received by the eNB is degraded, the bit error rate of the data transmitted by the eNB through the wireless link is high, and the eNB cannot successfully transmit data through the wireless link.
- S505 In any case of S504a-S504d above, the radio link of the UE is released, and the UE enters an idle state.
- S506 The UE in the idle state re-initiates the TAU process, that is, the UE sends a TAU request message to the MME again. Wherein, this time, the UE adopts the 5G security context to perform integrity protection on the TAU request message.
- the TAU request message sent in S502 and S506 carries the 4G GUTI of the UE (that is, the GUTI of the UE in the 4G communication system).
- the 4G GUTI is obtained by the UE according to the mapping of the 5G GUTI, therefore, the 4G GUTI can also be called a mapped GUTI.
- the 4G GUTI includes the device information of the AMF (for example, the identification or address of the AMF) that saves the context of the UE in the 5G communication system.
- the MME After receiving the TAU request message sent from the UE in the idle state, the MME sends a context request (context request) message to the AMF in the 5G communication system according to the device information of the AMF in the TAU request message.
- the context request message includes the TAU request message, which is used to request the context of the UE.
- the AMF After receiving the context request message, the AMF uses the 5G security context to perform integrity check on the TAU request message, and the check passes.
- the AMF returns a context response (context response) message to the MME.
- the context response message is used to indicate that the request for the context of the UE is successful.
- the context response message includes the context of the UE.
- the MME After receiving the context response message, the MME returns a TAU success response message to the UE.
- the TAU success response message is used to notify that the TAU process is successful, and the UE is successfully registered in the 4G communication system.
- the UE in the connected state fails to perform the first TAU process after the handover, and the UE that enters the idle state continues to use the 4G security context to check the integrity of the TAU request message when it initiates the TAU process again. protection, and the MME will forward the TAU request message to the AMF to obtain the context of the UE, but the AMF can only use the 5G security context for integrity verification. Therefore, the AMF will fail to verify the TAU request message, resulting in the MME being unable to obtain The context of the UE will eventually lead to the failure of the re-initiated TAU procedure of the UE.
- the 5G security context is used to protect the integrity of the TAU request message; this can ensure that when the AMF receives the TAU request message forwarded by the MME, the The AMF can successfully check the integrity of the TAU request message, so as to ensure that the MME can successfully obtain the context of the UE from the AMF, and then ensure that the UE can successfully register in the 4G communication system through the TAU process.
- the solution provided by this example of this application can avoid the situation that the TAU process initiated by the UE is rejected again, improve the registration success rate of the UE in the scenario where the UE switches from the 5G communication system to the 4G communication system, and reduce the UE registration success rate.
- the delay in registering to the 4G communication system can ultimately guarantee the service continuity of the UE and user experience.
- Example 2 This example is based on the method provided by the embodiment shown in FIG. 4 . Referring to the flow chart shown in FIG. 6, the steps in this example will be described in detail. Wherein, as shown in FIG. 5 and FIG. 6 , steps S600 - S605 in this example are the same as steps S500 - S505 in Example 1, therefore, the same steps can be referred to each other, and no further description is given here.
- the UE may perform local de-registration, and then enter the de-registration state; and then re-stay in the 4G communication system through the process of frequency scanning and network search.
- the UE may use an attach procedure in a current communication standard to attach. For example, the UE accesses the 4G communication system through a random access procedure; then sends an attach request message to the MMR to request attachment and registration to the 4G communication system.
- the UE After the UE successfully completes the attach process, it can be registered in the 4G communication system.
- the UE in the idle state can initiate the attach process to register with the 4G communication system. system. Since the UE does not re-initiate the TAU process, but registers to the 4G communication system through the attach process, this example can enable the UE in the idle state to quickly register to the 4G communication system.
- the solution provided by the example of this application can avoid the situation that the UE initiates the TAU process again and is rejected, improve the registration success rate of the UE in the scenario of switching from the 5G communication system to the 4G communication system, and reduce the UE's successful registration to 4G communication.
- the delay of the system can ultimately guarantee the service continuity of the UE and the user experience.
- the present application also provides a communication device, the structure of which is shown in FIG. 7 , including a communication unit 701 and a processing unit 702 .
- the communication apparatus 700 may be applied to a core network device or a UE in the communication architecture shown in FIG. 2 , and may implement the communication methods provided in the above embodiments and examples.
- the physical form of the communication device 700 may be a communication device, such as a core network device or a terminal device (ie UE); or the communication device may be other devices capable of realizing the functions of a communication device, such as a communication The processor or chip inside the device, etc.
- the communication device 700 may be a field-programmable gate array (field-programmable gate array, FPGA), a complex programmable logic device (complex programmable logic device, CPLD), an application specific integrated circuit (application specific integrated circuits, ASIC), Or some programmable chips such as System on a chip (SOC).
- FPGA field-programmable gate array
- CPLD complex programmable logic device
- ASIC application specific integrated circuits
- SOC System on a chip
- the communication unit 701 is configured to receive and send data.
- the communication unit 701 may be implemented through a physical interface, a communication module, a communication interface, and an input/output interface.
- the communication device 700 can be connected with a network cable or cable through the communication unit 701, and then establish a physical connection with other devices.
- the communication unit 701 may be implemented by a transceiver, for example, a mobile communication module.
- the mobile communication module can provide wireless communication solutions including 2G/3G/4G/5G/6G and future generations applied to terminal equipment.
- the mobile communication module may include at least one antenna, at least one filter, a switch, a power amplifier, a low noise amplifier (low noise amplifier, LNA) and the like.
- the terminal device can access the AN device in the mobile communication system through the mobile communication module, and interact with the AN device, so as to realize the interaction between the terminal device and the mobile communication system.
- the communication apparatus 700 is applied to the terminal device in FIG. 3 , for example, the UE in the example shown in FIG. 5 .
- the processing unit 702 is configured to:
- a first set of security context is obtained; wherein, the first set of security context is used for the terminal device to communicate with a device located in the first communication system
- the first network device performs security verification
- the first network device After sending the first registration request message to the first core network device through the communication unit 701, release the wireless link of the terminal device; wherein, the first registration request message uses the first set of security context for complete permanent protection, the first network device includes the first core network device;
- the terminal device performs security verification with the second network device located in the second communication system.
- processing unit 702 when acquiring the first set of security context, is specifically configured to:
- the processing unit 702 is specifically configured to: when releasing the wireless link of the terminal device:
- the communication unit 701 When the communication unit 701 receives a registration rejection response message from the first core network device, release the wireless link.
- the registration refusal response message includes a refusal reason indication, and the refusal reason indication is used to instruct the terminal device to keep the registration state.
- the processing unit 702 is specifically configured to: when releasing the wireless link of the terminal device:
- the processing unit 702 is specifically configured to: when releasing the wireless link of the terminal device:
- the wireless link is released.
- the second registration request message includes device information of a second core network device that has the context of the terminal device in the second communication system, and the second network device includes the second core network device network equipment.
- processing unit 702 is further configured to:
- the communication unit 701 After the communication unit 701 sends the second registration request message to the first core network device, the communication unit 701 receives a registration success response message from the first core network device.
- the second communication system is a fifth-generation 5G communication system
- the first communication system is a fourth-generation 4G communication system
- the first registration request message is a tracking area update TAU request message
- the first The second registration request message is a TAU request message.
- the communication apparatus 700 is applied to a first core network device located in the first communication system in FIG. 3 , for example, the MME in the example shown in FIG. 5 .
- the processing unit 702 is configured to:
- the communication unit 701 receives a registration request message from the terminal device in the idle state; the registration request message uses the second set of security context to perform Integrity protection; the second set of security context is used for security verification between the terminal device and the second network device in the second communication system;
- the context request message includes the registration request message, and the context request message is used to request the In the context of the terminal device, the second network device includes the second core network device.
- processing unit 702 is further configured to:
- the registration request message includes device information of the second core network device that has the context of the terminal device in the second communication system; the processing unit 702, through the communication unit 701 Sending a context request message to a second core network device located in the second communication system includes:
- the second communication system is a fifth-generation 5G communication system
- the first communication system is a fourth-generation 4G communication system
- the registration request message is a tracking area update TAU request message.
- the communication apparatus 700 is applied to a second core network device located in the second communication system in FIG. 3 , such as the AMF in the example shown in FIG. 5 .
- the processing unit 702 is configured to:
- the communication unit 701 receives a context request message from the first core network device; wherein the first core network device is located in the first In a communication system, the context request message includes a registration request message, and the registration request message uses a second set of security context for integrity protection; the second set of security context is used for the terminal device to communicate with the A second network device in the system performs security verification, and the second network device includes the second core device;
- processing unit 702 is further configured to:
- the communication unit 701 sends a context response message to the first core network device; wherein the context response message is used to indicate that the request for the context of the terminal device is successful.
- the registration request message includes device information of the second core network device that has the context of the terminal device in the second communication system.
- the second communication system is a fifth-generation 5G communication system
- the first communication system is a fourth-generation 4G communication system
- the registration request message is a tracking area update TAU request message.
- the communication apparatus 700 is applied to the terminal device in FIG. 4 , for example, the UE in the example shown in FIG. 6 .
- the processing unit 702 is configured to:
- a first set of security context is acquired; wherein, the first set of security context is used for the terminal device and the first communication system
- the first network device in the network performs security verification
- the first network device includes the first core network device;
- processing unit 702 when acquiring the first set of security context, is specifically configured to:
- the processing unit 702 is specifically configured to: when releasing the wireless link of the terminal device:
- the communication unit 701 When the communication unit 701 receives a registration rejection response message from the first core network device, release the wireless link.
- the registration rejection response message includes a rejection reason indication, and the rejection original value indication is used to instruct the terminal device to maintain the registration state.
- the processing unit 702 is specifically configured to: when releasing the wireless link of the terminal device:
- the processing unit 702 is specifically configured to: when releasing the wireless link of the terminal device:
- the wireless link is released.
- the registration request message includes device information of a second core network device that has the context of the terminal device in the second communication system, and the second network device includes the second core network device .
- processing unit 702 when initiating the attach process, is specifically configured to:
- the second communication system is a fifth-generation 5G communication system
- the first communication system is a fourth-generation 4G communication system
- the registration request message is a tracking area update TAU request message.
- each function in each embodiment of the present application Units can be integrated into one processing unit, or physically exist separately, or two or more units can be integrated into one unit.
- the above-mentioned integrated units can be implemented in the form of hardware or in the form of software functional units.
- the integrated unit is realized in the form of a software function unit and sold or used as an independent product, it can be stored in a computer-readable storage medium.
- the technical solution of the present application is essentially or part of the contribution to the prior art or all or part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium , including several instructions to make a computer device (which may be a personal computer, a server, or a network device, etc.) or a processor (processor) execute all or part of the steps of the methods described in the various embodiments of the present application.
- the aforementioned storage media include: U disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disk or optical disc and other media that can store program codes. .
- the communication device 800 includes: a communication module 801 , a processor 802 and a memory 803 . Wherein, the communication module 801, the processor 802 and the memory 803 are connected to each other.
- the communication module 801 , the processor 802 and the memory 803 are connected to each other through a bus 804 .
- the bus 804 may be a peripheral component interconnect standard (peripheral component interconnect, PCI) bus or an extended industry standard architecture (extended industry standard architecture, EISA) bus or the like.
- PCI peripheral component interconnect
- EISA extended industry standard architecture
- the bus can be divided into address bus, data bus, control bus and so on. For ease of representation, only one thick line is used in FIG. 8 , but it does not mean that there is only one bus or one type of bus.
- the communication module 801 is configured to receive and send data to realize communication interaction with other devices.
- the communication module 801 may be implemented through a physical interface, a communication module, a communication interface, and an input/output interface.
- the communication module 801 may also be implemented by a transceiver.
- the communication device 800 may be the terminal device in FIG. 3 , such as the UE in the example shown in FIG. 5 .
- a first set of security context is obtained; wherein, the first set of security context is used for the terminal device to communicate with a device located in the first communication system
- the first network device performs security verification
- the first network device After sending the first registration request message to the first core network device through the communication module 801, release the wireless link of the terminal device; wherein, the first registration request message uses the first set of security context for complete permanent protection, the first network device includes the first core network device;
- the terminal device performs security verification with the second network device located in the second communication system.
- the communication device 800 may be a first core network device located in the first communication system in FIG. 3 , for example, the MME in the example shown in FIG. 5 .
- the processor 802 is configured to:
- the communication module 801 receives a registration request message from the terminal device in the idle state; the registration request message uses the second set of security context to perform Integrity protection; the second set of security context is used for security verification between the terminal device and the second network device in the second communication system;
- the context request message includes the registration request message, and the context request message is used to request the In the context of the terminal device, the second network device includes the second core network device.
- the communication device 800 may be a second core network device located in the second communication system in FIG. 3 , for example, the AMF in the example shown in FIG. 5 .
- the processor 802 is configured to:
- the communication module 801 receives a context request message from the first core network device; wherein the first core network device is located in the first In a communication system, the context request message includes a registration request message, and the registration request message uses a second set of security context for integrity protection; the second set of security context is used for the terminal device to communicate with the A second network device in the system performs security verification, and the second network device includes the second core device;
- the communication device 800 may be the terminal device in FIG. 4 , for example, the UE in the example shown in FIG. 6 .
- a first set of security context is acquired; wherein, the first set of security context is used for the terminal device and the first communication system
- the first network device in the network performs security verification
- the first network device includes the first core network device;
- the memory 803 is used to store program instructions and data.
- the program instructions may include program codes including computer operation instructions.
- the memory 803 may include a random access memory (random access memory, RAM), and may also include a non-volatile memory (non-volatile memory), such as at least one disk memory.
- the processor 802 executes the program instructions stored in the memory 803 and uses the data stored in the memory 803 to implement the above functions, thereby realizing the communication method provided by the above embodiments.
- the memory 803 in FIG. 8 of the present application may be a volatile memory or a non-volatile memory, or may include both volatile and non-volatile memories.
- the non-volatile memory can be read-only memory (Read-Only Memory, ROM), programmable read-only memory (Programmable ROM, PROM), erasable programmable read-only memory (Erasable PROM, EPROM), electronically programmable Erase Programmable Read-Only Memory (Electrically EPROM, EEPROM) or Flash.
- the volatile memory can be Random Access Memory (RAM), which acts as external cache memory.
- RAM Static Random Access Memory
- SRAM Static Random Access Memory
- DRAM Dynamic Random Access Memory
- Synchronous Dynamic Random Access Memory Synchronous Dynamic Random Access Memory
- SDRAM double data rate synchronous dynamic random access memory
- Double Data Rate SDRAM, DDR SDRAM enhanced synchronous dynamic random access memory
- Enhanced SDRAM, ESDRAM synchronous connection dynamic random access memory
- Synchlink DRAM, SLDRAM Direct Memory Bus Random Access Memory
- Direct Rambus RAM Direct Rambus RAM
- an embodiment of the present application further provides a computer program that, when the computer program is run on a computer, causes the computer to execute the communication method provided by the above embodiments.
- the embodiments of the present application also provide a computer-readable storage medium, in which a computer program is stored.
- the computer program When the computer program is executed by a computer, the computer executes the communication provided by the above embodiments. method.
- the storage medium may be any available medium that can be accessed by a computer.
- computer-readable media may include RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage media or other magnetic storage devices, or may be used to carry or store information in the form of instructions or data structures desired program code and any other medium that can be accessed by a computer.
- the embodiments of the present application further provide a chip, the chip is configured to read a computer program stored in a memory, and implement the communication method provided by the above embodiments.
- an embodiment of the present application provides a chip system
- the chip system includes a processor, configured to support a computer device to implement the functions involved in the service device, forwarding device, or site device in the above embodiments.
- the chip system further includes a memory, and the memory is used to store necessary programs and data of the computer device.
- the system-on-a-chip may consist of chips, or may include chips and other discrete devices.
- the embodiments of the present application provide a communication method, device, and equipment.
- the terminal device in the connected state fails to perform the first registration process of the target communication system, causing the terminal device to release the wireless link.
- the terminal device in the idle state initiates the registration process again, Sending a registration request message that uses the security context corresponding to the source communication system for integrity protection.
- the target communication system can successfully obtain the context of the terminal device from the source communication system based on the registration request message, and then enable the terminal device to successfully register with the target communication system.
- this solution can avoid the situation that the registration process initiated by the terminal device is rejected again, improve the registration success rate of the terminal device in the inter-system handover scenario, reduce the registration delay of the terminal device, and finally ensure the business continuity of the terminal device and guarantee user experience.
- the embodiments of the present application may be provided as methods, systems, or computer program products. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.
- computer-usable storage media including but not limited to disk storage, CD-ROM, optical storage, etc.
- These computer program instructions may also be stored in a computer-readable memory capable of directing a computer or other programmable data processing apparatus to operate in a specific manner, such that the instructions stored in the computer-readable memory produce an article of manufacture comprising instruction means, the instructions
- the device realizes the function specified in one or more procedures of the flowchart and/or one or more blocks of the block diagram.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Disclosed in the present application are a communication method, an apparatus, and a device. A solution of the present application comprises: after inter-system handover, and after an initial registration procedure of a connected state terminal device on a target communication system is not successful and causes the terminal device to release a radio link, when the terminal device, which has entered into an idle state, re-initiates a registration procedure, same sends to the target communication system a registration request message for which a security context corresponding to a source communication system has been utilized to perform integrity protection. As a consequence, after receiving the registration request message, the target communication system can successfully obtain a context of the terminal device from the source communication system on the basis of the registration request message, and can thereby enable the terminal device to successfully register to the target communication system. In conclusion, the present solution can prevent the rejection of a registration procedure re-initiated by a terminal device, terminal device registration success rate in an inter-system handover scenario is improved, terminal device registration delay is reduced, the service continuity of a terminal device can ultimately be ensured, and user experience can be guaranteed.
Description
本申请涉及通信技术领域,尤其涉及一种通信方法、装置及设备。The present application relates to the technical field of communication, and in particular to a communication method, device and equipment.
终端设备在通信系统中驻留时,终端设备的非接入层(non access stratum,NAS)与该通信系统内的核心网的NAS均会维护一套安全上下文(security context)。When a terminal device resides in a communication system, both a non-access stratum (non access stratum, NAS) of the terminal device and a NAS of a core network in the communication system maintain a set of security contexts.
在终端设备需要进行异系统切换从第一通信系统切换到第二通信系统的场景中,终端设备和核心网需要对第一通信系统中的第一套安全上下文进行映射,生成第二通信系统中的第二套安全上下文;切换完成后,终端设备和第二通信系统中的核心网之间交互的所有NAS消息都需要使用该第二套安全上下文进行完整性保护和/或机密性保护。其中,第一通信系统和第二通信系统为不同制式的通信系统,例如第一通信系统为5G通信系统,第二通信系统为4G通信系统。In the scenario where the terminal device needs to perform inter-system handover from the first communication system to the second communication system, the terminal device and the core network need to map the first set of security context in the first communication system to generate the security context in the second communication system. The second set of security context; after the handover is completed, all NAS messages exchanged between the terminal device and the core network in the second communication system need to use the second set of security context for integrity protection and/or confidentiality protection. Wherein, the first communication system and the second communication system are communication systems of different standards, for example, the first communication system is a 5G communication system, and the second communication system is a 4G communication system.
目前终端设备在切换到第二通信系统中需要发起跟踪区域更新(tracking area update,TAU)流程。然而,当处于RRC连接态的终端设备在切换到第二通信系统中未完成TAU流程时,该终端设备进入RRC空闲态,再次发起TAU流程时,会被第二通信系统的核心网拒绝,造成终端设备无法成功注册到第二通信系统。At present, the terminal device needs to initiate a tracking area update (tracking area update, TAU) process when switching to the second communication system. However, when a terminal device in the RRC connected state does not complete the TAU process when it is switched to the second communication system, the terminal device enters the RRC idle state, and when it initiates the TAU process again, it will be rejected by the core network of the second communication system, resulting in The terminal device cannot successfully register with the second communication system.
显然,目前的方案会造成终端设备的注册成功率不高,进而导致终端设备的驻网时间变长、业务中断的问题,影响用户体验。Obviously, the current solution will result in a low registration success rate of terminal devices, which in turn will lead to problems such as longer time spent on the network of terminal devices and service interruption, which will affect user experience.
发明内容Contents of the invention
本申请提供一种通信方法、装置及设备,用以提高异系统切换场景中终端设备的注册成功率。The present application provides a communication method, device, and equipment to improve the registration success rate of terminal equipment in an inter-system handover scenario.
第一方面,本申请实施例提供了一种通信方法,该方法包括以下步骤:In the first aspect, the embodiment of the present application provides a communication method, the method includes the following steps:
终端设备在从第二通信系统切换到第一通信系统后,获取第一套安全上下文;其中,所述第一套安全上下文用于所述终端设备与位于所述第一通信系统中的第一网络设备进行安全验证;在所述终端设备向第一核心网设备发送第一注册请求消息之后,所述终端设备释放无线链路;其中,所述第一注册请求消息使用所述第一套安全上下文进行完整性保护,所述第一网络设备中包含所述第一核心网设备;所述终端设备向所述第一核心网设备发送第二注册请求消息,其中,所述第二注册请求消息使用第二套安全上下文进行完整性保护,所述第二套安全上下文用于所述终端设备与位于第二通信系统的第二网络设备进行安全验证。After the terminal device switches from the second communication system to the first communication system, it acquires a first set of security context; wherein, the first set of security context is used for the terminal device to communicate with the first security context located in the first communication system. The network device performs security verification; after the terminal device sends a first registration request message to the first core network device, the terminal device releases the wireless link; wherein, the first registration request message uses the first set of security Integrity protection of the context, the first network device includes the first core network device; the terminal device sends a second registration request message to the first core network device, wherein the second registration request message Integrity protection is performed by using a second set of security context, and the second set of security context is used for security verification between the terminal device and the second network device located in the second communication system.
在传统的方案中,在异系统切换场景中,首次注册流程未成功、进入空闲的终端设备再次发起注册流程时继续使用第一套安全上下文对注册请求消息进行完整性保护,而第二核心网设备只能采用第二套安全上下文进行完整性校验,因此该终端设备的第二次注册流程必然会失败。相对于该传统的方案,在该方法中,终端设备再次发起注册流程时,采用第二套安全上下文对注册请求消息进行完整性保护;这样,当第一核心网基于所述注册请求消息向第二核心网设备请求所述终端设备的上下文时,可以保证第二核心网设备可以成 功对该注册请求消息进行完整性校验,从而保证所述第一核心网设备可以成功从所述第二核心网设备获取所述终端设备的上下文,进而保证所述终端设备可以成功注册到所述第一通信系统中。显然,相对于传统的方案,该方法可以避免终端设备再次发起的注册流程被拒绝的情况,提高异系统切换场景中终端设备的注册成功率,降低终端设备成功注册到第一通信系统的时延,最终可以保障终端设备的业务连续性,保障用户体验。In the traditional solution, in the inter-system handover scenario, when the initial registration process fails and the idle terminal device initiates the registration process again, it continues to use the first set of security context to protect the integrity of the registration request message, while the second core network The device can only use the second set of security contexts for integrity verification, so the second registration process of the terminal device will inevitably fail. Compared with the traditional solution, in this method, when the terminal device initiates the registration process again, the second set of security context is used to protect the integrity of the registration request message; thus, when the first core network sends the registration request message to the second When the second core network device requests the context of the terminal device, it can be ensured that the second core network device can successfully perform an integrity check on the registration request message, thereby ensuring that the first core network device can successfully register from the second core network The network device obtains the context of the terminal device, so as to ensure that the terminal device can be successfully registered in the first communication system. Obviously, compared with the traditional solution, this method can avoid the situation that the registration process initiated by the terminal device is rejected again, improve the registration success rate of the terminal device in the inter-system handover scenario, and reduce the time delay for the terminal device to successfully register to the first communication system , and finally can guarantee the service continuity of the terminal equipment and guarantee the user experience.
在一种可能的设计中,所述终端设备可以通过如下步骤获取第一套安全上下文:In a possible design, the terminal device may acquire the first set of security contexts through the following steps:
所述终端设备根据设定的安全上下文映射算法,对所述第二套安全上下文进行计算,生成所述第一套安全上下文。The terminal device calculates the second set of security contexts according to the set security context mapping algorithm to generate the first set of security contexts.
通过该设计,所述终端设备可以在异系统切换过程获取第一通信系统对应的第一套安全上下文。Through this design, the terminal device can acquire the first set of security context corresponding to the first communication system during the inter-system handover process.
在一种可能的设计中,在所述终端设备接收来自所述第一核心网设备的注册拒绝响应消息时,所述终端设备可以释放无线链路。In a possible design, when the terminal device receives the registration rejection response message from the first core network device, the terminal device may release the wireless link.
通过该设计,所述终端设备可以在接收到注册拒绝响应消息时释放无线链路,从而再次发起注册流程,继续请求注册到第一通信系统。With this design, the terminal device can release the wireless link when receiving the registration rejection response message, thereby initiating the registration procedure again, and continuing to request registration to the first communication system.
在一种可能的设计中,所述注册拒绝响应消息包含拒绝原因指示,所述拒绝原因指示用于指示所述终端设备保持注册状态。示例性的,所述拒绝原因指示可以为除以下拒绝原因值以外的其他拒绝原因值:#3、#6、#8、#7、#9、#10、#11、#35、#12、#13、#14、#15、#22(其中,#22中携带T3346值信息元素(T3346 value IE),且该T3346值信息元素的取值不是0也不是无效(deactivated))、#25、#40、#42、#31。In a possible design, the registration refusal response message includes a refusal reason indication, and the refusal reason indication is used to instruct the terminal device to maintain a registration state. Exemplarily, the rejection reason indication may be other rejection reason values except the following rejection reason values: #3, #6, #8, #7, #9, #10, #11, #35, #12, #13, #14, #15, #22 (where #22 carries the T3346 value information element (T3346 value IE), and the value of the T3346 value information element is neither 0 nor invalid (deactivated)), #25, #40, #42, #31.
通过该设计,所述终端设备可以在接收到注册拒绝响应消息之后,继续保持注册状态,从而可以再次发起注册流程。Through this design, the terminal device can continue to maintain the registration state after receiving the registration rejection response message, so that the registration process can be initiated again.
在一种可能的设计中,在所述无线链路异常时,所述终端设备可以释放无线链路。其中,所述无线链路异常可以包括:所述第一通信系统中的第一AN设备发送信号的信号质量降低,通过所述无线链路传输数据的误码率较高、所述无线链路无法成功传输数据等等,本申请对此不作限定。In a possible design, when the wireless link is abnormal, the terminal device may release the wireless link. Wherein, the wireless link abnormality may include: the signal quality of the signal sent by the first AN device in the first communication system is degraded, the bit error rate of data transmitted through the wireless link is high, the wireless link Unable to successfully transmit data, etc., this application does not limit this.
通过该设计,所述终端设备可以在无线链路异常时释放无线链路,从而再次发起注册流程,继续请求注册到第一通信系统。With this design, the terminal device can release the wireless link when the wireless link is abnormal, thereby initiating the registration process again and continuing to request registration to the first communication system.
在一种可能的设计中,未接收到来自所述第一核心网设备的注册成功响应消息时,所述终端设备可以释放无线链路。其中,在本申请实施例中,存在但不限于以下情况,使所述终端设备未接收到注册成功响应消息:In a possible design, when the registration success response message from the first core network device is not received, the terminal device may release the wireless link. Wherein, in this embodiment of the application, there are but not limited to the following situations, so that the terminal device does not receive the registration success response message:
情况一:所述第一核心网设备未发送注册成功响应消息。例如所述第一核心网设备在接收到第一注册请求消息后执行注册步骤失败。Situation 1: The first core network device does not send a registration success response message. For example, the first core network device fails to perform the registration step after receiving the first registration request message.
情况二:由于消息传输异常,虽然所述第一核心网设备向所述终端设备发送注册成功响应消息,但是所述终端设备未接收到。Situation 2: Due to abnormal message transmission, although the first core network device sends a registration success response message to the terminal device, the terminal device does not receive it.
情况三:所述终端设备在发送所述第一注册请求消息之后的设定时长内未接收到所述注册成功响应消息。示例性的,所述终端设备在发送所述第一注册请求消息时,同步启动定时器T3430。示例性的,所述T3430的计时时长为15秒。在所述定时器T3430计时过程中,所述终端设备未接收到所述注册成功响应消息;那么当所述定时器T3430超时时,所述终端设备放弃本次注册流程,并释放所述无线链路。Situation 3: The terminal device does not receive the registration success response message within a set period of time after sending the first registration request message. Exemplarily, when the terminal device sends the first registration request message, it starts the timer T3430 synchronously. Exemplarily, the timing duration of the T3430 is 15 seconds. During the timing of the timer T3430, the terminal device does not receive the registration success response message; then when the timer T3430 times out, the terminal device abandons the registration process and releases the wireless link road.
终端设备未接收到注册成功响应消息,表示本次注册流程未成功。通过该设计,所述 终端设备可以在首次注册流程未成功时释放无线链路,从而再次发起注册流程,继续请求注册到第一通信系统。If the terminal device does not receive the registration success response message, it means that the registration process is not successful. With this design, the terminal device can release the wireless link when the initial registration process is unsuccessful, thereby initiating the registration process again, and continuing to request registration to the first communication system.
在一种可能的设计中,所述第二注册请求消息中包含所述第二通信系统中具有所述终端设备的上下文的第二核心网设备的设备信息,所述第二网络设备中包含所述第二核心网设备。例如,所述第二注册请求消息中可以包含该终端设备的第一GUTI,而所述第一GUTI中包含所述第二核心网设备的设备信息(例如所述第二核心网设备的标识或地址);其中,所述第一GUTI是根据第二GUTI映射得到的,第一GUTI为所述终端设备在所述第一通信系统中的唯一标识;而所述第二GUTI为所述终端设备在所述第二通信系统中的唯一标识,由第二通信系统中的第二核心网设备分配给所述终端设备的。In a possible design, the second registration request message includes device information of a second core network device that has the context of the terminal device in the second communication system, and the second network device includes the Describe the second core network equipment. For example, the second registration request message may include the first GUTI of the terminal device, and the first GUTI includes the device information of the second core network device (such as the identity of the second core network device or address); wherein, the first GUTI is obtained according to the second GUTI mapping, the first GUTI is the unique identifier of the terminal device in the first communication system; and the second GUTI is the terminal device The unique identifier in the second communication system is assigned to the terminal device by the second core network device in the second communication system.
通过该设计,所述第一核心网设备接收到该第二注册请求消息之后,可以根据该第二注册请求消息中的第二核心网设备的设备信息,向该第二核心网设备请求所述终端设备的上下文。With this design, after the first core network device receives the second registration request message, it can request the second core network device for the The context of the end device.
在一种可能的设计中,在所述终端设备向所述第一核心网设备发送第二注册请求消息之后,所述终端设备接收来自所述第一核心网设备注册成功响应消息。In a possible design, after the terminal device sends the second registration request message to the first core network device, the terminal device receives a registration success response message from the first core network device.
在一种可能的设计中,所述第二通信系统为第五代5G通信系统,所述第一通信系统为第四代4G通信系统;所述第一注册请求消息为跟踪区域更新TAU请求消息,所述第二注册请求消息为TAU请求消息。In a possible design, the second communication system is a fifth-generation 5G communication system, and the first communication system is a fourth-generation 4G communication system; the first registration request message is a tracking area update TAU request message , the second registration request message is a TAU request message.
第二方面,本申请实施例提供了一种通信方法,该方法包括以下步骤:In a second aspect, the embodiment of the present application provides a communication method, the method includes the following steps:
在终端设备从第二通信系统切换到第一通信系统后,位于所述第一通信系统的第一核心网设备接收来自空闲态的所述终端设备的注册请求消息;所述注册请求消息使用第二套安全上下文进行完整性保护;所述第二套安全上下文用于所述终端设备与位于所述第二通信系统中的第二网络设备进行安全验证;所述第一核心网设备向位于所述第二通信系统的第二核心网设备发送上下文请求消息;其中,所述上下文请求消息中包含所述注册请求消息,所述上下文请求消息用于请求所述终端设备的上下文,所述第二网络设备中包含所述第二核心网设备。After the terminal device switches from the second communication system to the first communication system, the first core network device located in the first communication system receives a registration request message from the terminal device in an idle state; the registration request message uses the first Two sets of security contexts are used for integrity protection; the second set of security contexts is used for security verification between the terminal equipment and the second network equipment located in the second communication system; The second core network device of the second communication system sends a context request message; wherein, the context request message includes the registration request message, and the context request message is used to request the context of the terminal device, and the second The network equipment includes the second core network equipment.
在该方法中,终端设备再次发起注册流程时,采用第二套安全上下文对注册请求消息进行完整性保护;这样,当第一核心网基于所述注册请求消息向第二核心网设备请求所述终端设备的上下文时,可以保证第二核心网设备可以成功对该注册请求消息进行完整性校验,从而保证所述第一核心网设备可以成功从所述第二核心网设备获取所述终端设备的上下文,进而保证所述终端设备可以成功注册到所述第一通信系统中。显然,相对于传统的方案,该方法可以避免终端设备再次发起的注册流程被拒绝的情况,提高异系统切换场景中终端设备的注册成功率,降低终端设备成功注册到第一通信系统的时延,最终可以保障终端设备的业务连续性,保障用户体验。In this method, when the terminal device initiates the registration process again, the second set of security context is used to protect the integrity of the registration request message; thus, when the first core network requests the second core network device for the registration request message based on the registration request message When using the context of the terminal device, it can be ensured that the second core network device can successfully perform an integrity check on the registration request message, thereby ensuring that the first core network device can successfully obtain the terminal device from the second core network device context, so as to ensure that the terminal device can be successfully registered in the first communication system. Obviously, compared with the traditional solution, this method can avoid the situation that the registration process initiated by the terminal device is rejected again, improve the registration success rate of the terminal device in the inter-system handover scenario, and reduce the time delay for the terminal device to successfully register to the first communication system , and finally can guarantee the service continuity of the terminal equipment and guarantee the user experience.
在一种可能的设计中,所述第一核心网设备接收来自所述第二核心网设备的上下文响应消息;所述上下文响应消息用于指示请求所述终端设备的上下文成功;所述第一核心网设备向所述终端设备发送注册成功响应消息。In a possible design, the first core network device receives a context response message from the second core network device; the context response message is used to indicate that the request for the context of the terminal device is successful; the first The core network device sends a registration success response message to the terminal device.
通过该设计,当所述第一核心网设备成功获取所述终端设备的上下文时,可以通知所述终端设备注册成功。Through this design, when the first core network device successfully acquires the context of the terminal device, it can notify the terminal device that the registration is successful.
在一种可能的设计中,所述注册请求消息中包含所述第二通信系统中具有所述终端设备的上下文的所述第二核心网设备的设备信息;所述第一核心网设备可以根据所述第二核 心设备的设备信息,向所述第二核心网设备发送所述上下文请求消息。In a possible design, the registration request message includes device information of the second core network device that has the context of the terminal device in the second communication system; the first core network device may according to The device information of the second core device, and sending the context request message to the second core network device.
在一种可能的设计中,所述第二通信系统为第五代5G通信系统,所述第一通信系统为第四代4G通信系统;所述注册请求消息为跟踪区域更新TAU请求消息。In a possible design, the second communication system is a fifth-generation 5G communication system, and the first communication system is a fourth-generation 4G communication system; the registration request message is a tracking area update TAU request message.
第三方面,本申请实施例提供了一种通信方法,该方法包括以下步骤:In a third aspect, the embodiment of the present application provides a communication method, the method includes the following steps:
在终端设备从第二通信系统切换到第一通信系统后,第二核心网设备接收来自第一核心网设备的上下文请求消息;其中,所述第二核心网设备位于所述第二通信系统,所述第一核心网设备位于所述第一通信系统,所述上下文请求消息中包含注册请求消息,所述注册请求消息使用第二套安全上下文进行完整性保护;所述第二套安全上下文用于所述终端设备与位于所述第二通信系统中的第二网络设备进行安全验证,所述第二网络设备中包含所述第二核心设备;所述第二核心网设备使用所述第二套安全上下文,对所述注册请求消息进行完整性保护校验。After the terminal device switches from the second communication system to the first communication system, the second core network device receives a context request message from the first core network device; wherein the second core network device is located in the second communication system, The first core network device is located in the first communication system, the context request message includes a registration request message, and the registration request message uses a second set of security context for integrity protection; the second set of security context uses Security verification is performed between the terminal device and a second network device located in the second communication system, the second network device includes the second core device; the second core network device uses the second A security context is set, and an integrity protection check is performed on the registration request message.
在该方法中,终端设备再次发起注册流程时,采用第二套安全上下文对注册请求消息进行完整性保护;这样,当第一核心网基于所述注册请求消息向第二核心网设备请求所述终端设备的上下文时,第二核心网设备可以成功对该注册请求消息进行完整性校验,从而保证所述第一核心网设备可以成功从所述第二核心网设备获取所述终端设备的上下文,进而保证所述终端设备可以成功注册到所述第一通信系统中。显然,相对于传统的方案,该方法可以避免终端设备再次发起的注册流程被拒绝的情况,提高异系统切换场景中终端设备的注册成功率,降低终端设备成功注册到第一通信系统的时延,最终可以保障终端设备的业务连续性,保障用户体验。In this method, when the terminal device initiates the registration process again, the second set of security context is used to protect the integrity of the registration request message; thus, when the first core network requests the second core network device for the registration request message based on the registration request message When using the context of the terminal device, the second core network device can successfully perform an integrity check on the registration request message, thereby ensuring that the first core network device can successfully obtain the context of the terminal device from the second core network device , so as to ensure that the terminal device can be successfully registered in the first communication system. Obviously, compared with the traditional solution, this method can avoid the situation that the registration process initiated by the terminal device is rejected again, improve the registration success rate of the terminal device in the inter-system handover scenario, and reduce the time delay for the terminal device to successfully register to the first communication system , and finally can guarantee the service continuity of the terminal equipment and guarantee the user experience.
在一种可能的设计中,在校验通过后,所述第二核心网设备向所述第一核心网设备发送上下文响应消息;所述上下文响应消息用于指示请求所述终端设备的上下文成功。可选的,所述上下文响应消息中可以包含所述终端设备的上下文。In a possible design, after the verification is passed, the second core network device sends a context response message to the first core network device; the context response message is used to indicate that the request for the context of the terminal device is successful . Optionally, the context response message may include the context of the terminal device.
在一种可能的设计中,所述注册请求消息中包含所述第二通信系统中具有所述终端设备的上下文的所述第二核心网设备的设备信息。In a possible design, the registration request message includes device information of the second core network device that has the context of the terminal device in the second communication system.
在一种可能的设计中,所述第二通信系统为第五代5G通信系统,所述第一通信系统为第四代4G通信系统;所述注册请求消息为跟踪区域更新TAU请求消息。In a possible design, the second communication system is a fifth-generation 5G communication system, and the first communication system is a fourth-generation 4G communication system; the registration request message is a tracking area update TAU request message.
第四方面,本申请实施例提供了一种通信方法,该方法包括以下步骤:In a fourth aspect, the embodiment of the present application provides a communication method, the method includes the following steps:
终端设备在从第二通信系统切换到第一通信系统后,获取第一套安全上下文;其中,其中,所述第一套安全上下文用于所述终端设备与位于所述第一通信系统中的第一网络设备进行安全验证;在所述终端设备向第一核心网设备发送注册请求消息之后,所述终端设备释放无线链路;其中,所述注册请求消息使用所述第一套安全上下文进行完整性保护,所述第一网络设备中包含所述第一核心网设备;所述终端设备发起附着流程。After the terminal device switches from the second communication system to the first communication system, it obtains a first set of security context; wherein, the first set of security context is used for the terminal device and the device located in the first communication system The first network device performs security verification; after the terminal device sends a registration request message to the first core network device, the terminal device releases the wireless link; wherein, the registration request message is performed using the first set of security context Integrity protection, the first network device includes the first core network device; the terminal device initiates an attach procedure.
在该方法中,连接态的终端设备在从第二通信系统切换到第一通信系统后的首次注册流程未成功导致终端设备释放无线链路后,进入空闲态的所述终端设备即可发起附着流程,以注册到第一通信系统。由于终端设备不再重新发起注册流程,而是通过附着流程注册到所述第一通信系统。因此,该方法可以使得空闲态的终端设备能够快速注册到第一通信系统。相对于上述传统的方案,本申请实施例提供的方案可以避免终端设备再次发起注册流程被拒绝的情况,提高异系统切换场景中终端设备的注册成功率,降低终端设备成功注册到第一通信系统的时延,最终可以保障终端设备的业务连续性,保障用户体验。In this method, after the terminal device in the connected state switches from the second communication system to the first communication system after the first registration process fails, causing the terminal device to release the wireless link, the terminal device in the idle state can initiate an attachment Procedure to register with the first communication system. Because the terminal device does not re-initiate the registration process, but registers with the first communication system through the attach process. Therefore, this method can enable a terminal device in an idle state to quickly register with the first communication system. Compared with the traditional solution above, the solution provided by the embodiment of the present application can avoid the situation that the terminal device is rejected when the registration process is initiated again, improve the registration success rate of the terminal device in the inter-system handover scenario, and reduce the risk of the terminal device successfully registering to the first communication system. The delay can ultimately guarantee the service continuity of terminal equipment and user experience.
在一种可能的设计中,所述终端设备可以通过如下步骤获取第一套安全上下文:In a possible design, the terminal device may acquire the first set of security contexts through the following steps:
所述终端设备根据设定的安全上下文映射算法,对所述第二套安全上下文进行计算,生成所述第一套安全上下文。The terminal device calculates the second set of security contexts according to the set security context mapping algorithm to generate the first set of security contexts.
通过该设计,所述终端设备可以在异系统切换过程获取第一通信系统对应的第一套安全上下文。Through this design, the terminal device can acquire the first set of security context corresponding to the first communication system during the inter-system handover process.
在一种可能的设计中,在所述终端设备接收来自所述第一核心网设备的注册拒绝响应消息时,所述终端设备可以释放无线链路。In a possible design, when the terminal device receives the registration rejection response message from the first core network device, the terminal device may release the wireless link.
通过该设计,所述终端设备可以在接收到注册拒绝响应消息时释放无线链路,从而通过附着流程注册到第一通信系统。With this design, the terminal device can release the wireless link when receiving the registration rejection response message, so as to register with the first communication system through the attach procedure.
在一种可能的设计中,所述注册拒绝响应消息包含拒绝原因指示,所述拒绝原值指示用于指示所述终端设备保持注册状态。示例性的,所述拒绝原因指示可以为除以下拒绝原因值以外的其他拒绝原因值:#3、#6、#8、#7、#9、#10、#11、#35、#12、#13、#14、#15、#22(其中,#22中携带T3346值信息元素(T3346 value IE),且该T3346值信息元素的取值不是0也不是无效(deactivated))、#25、#40、#42、#31。In a possible design, the registration rejection response message includes a rejection reason indication, and the rejection original value indication is used to instruct the terminal device to maintain the registration state. Exemplarily, the rejection reason indication may be other rejection reason values except the following rejection reason values: #3, #6, #8, #7, #9, #10, #11, #35, #12, #13, #14, #15, #22 (where #22 carries the T3346 value information element (T3346 value IE), and the value of the T3346 value information element is neither 0 nor invalid (deactivated)), #25, #40, #42, #31.
通过该设计,所述终端设备可以在接收到注册拒绝响应消息之后,继续保持注册状态。Through this design, the terminal device can continue to maintain the registration state after receiving the registration rejection response message.
在一种可能的设计中,在所述无线链路异常时,所述终端设备可以释放无线链路。其中,所述无线链路异常可以包括:所述第一通信系统中的第一AN设备发送信号的信号质量降低,通过所述无线链路传输数据的误码率较高、所述无线链路无法成功传输数据等等,本申请对此不作限定。In a possible design, when the wireless link is abnormal, the terminal device may release the wireless link. Wherein, the wireless link abnormality may include: the signal quality of the signal sent by the first AN device in the first communication system is degraded, the bit error rate of data transmitted through the wireless link is high, the wireless link Unable to successfully transmit data, etc., this application does not limit this.
通过该设计,所述终端设备可以在无线链路异常时释放无线链路,从而通过附着流程注册到第一通信系统。With this design, the terminal device can release the wireless link when the wireless link is abnormal, so as to register with the first communication system through the attach process.
在一种可能的设计中,未接收到来自所述第一核心网设备的注册成功响应消息时,所述终端设备可以释放无线链路。其中,在本申请实施例中,存在但不限于以下情况,使所述终端设备未接收到注册成功响应消息:In a possible design, when the registration success response message from the first core network device is not received, the terminal device may release the wireless link. Wherein, in this embodiment of the application, there are but not limited to the following situations, so that the terminal device does not receive the registration success response message:
情况一:所述第一核心网设备未发送注册成功响应消息。例如所述第一核心网设备在接收到第一注册请求消息后执行注册步骤失败。Situation 1: The first core network device does not send a registration success response message. For example, the first core network device fails to perform the registration step after receiving the first registration request message.
情况二:由于消息传输异常,虽然所述第一核心网设备向所述终端设备发送注册成功响应消息,但是所述终端设备未接收到。Situation 2: Due to abnormal message transmission, although the first core network device sends a registration success response message to the terminal device, the terminal device does not receive it.
情况三:所述终端设备在发送所述第一注册请求消息之后的设定时长内未接收到所述注册成功响应消息。示例性的,所述终端设备在发送所述第一注册请求消息时,同步启动定时器T3430。示例性的,所述T3430的计时时长为15秒。在所述定时器T3430计时过程中,所述终端设备未接收到所述注册成功响应消息;那么当所述定时器T3430超时时,所述终端设备放弃本次注册流程,并释放所述无线链路。Situation 3: The terminal device does not receive the registration success response message within a set period of time after sending the first registration request message. Exemplarily, when the terminal device sends the first registration request message, it starts the timer T3430 synchronously. Exemplarily, the timing duration of the T3430 is 15 seconds. During the timing of the timer T3430, the terminal device does not receive the registration success response message; then when the timer T3430 times out, the terminal device abandons the registration process and releases the wireless link road.
终端设备未接收到注册成功响应消息,表示本次注册流程未成功。通过该设计,所述终端设备可以在首次注册流程未成功时释放无线链路,从而通过附着流程注册到第一通信系统。If the terminal device does not receive the registration success response message, it means that the registration process is not successful. With this design, the terminal device can release the wireless link when the initial registration process fails, so as to register with the first communication system through the attach process.
在一种可能的设计中,所述注册请求消息中包含所述第二通信系统中具有所述终端设备的上下文的第二核心网设备的设备信息,所述第二网络设备中包含所述第二核心网设备。In a possible design, the registration request message includes device information of a second core network device that has the context of the terminal device in the second communication system, and the second network device includes the first Two core network equipment.
在一种可能的设计中,所述终端设备可以通过以下步骤发起附着流程:In a possible design, the terminal device may initiate an attach process through the following steps:
所述终端设备向所述第一核心网设备发送附着请求消息。The terminal device sends an attach request message to the first core network device.
在一种可能的设计中,所述第二通信系统为第五代5G通信系统,所述第一通信系统 为第四代4G通信系统;所述注册请求消息为跟踪区域更新TAU请求消息。In a possible design, the second communication system is a fifth-generation 5G communication system, and the first communication system is a fourth-generation 4G communication system; the registration request message is a tracking area update TAU request message.
第五方面,本申请实施例提供了一种通信装置,包括用于执行以上任一方面中各个步骤的单元。In a fifth aspect, the embodiment of the present application provides a communication device, including a unit for performing each step in any one of the above aspects.
第六方面,本申请实施例提供了一种通信设备,包括至少一个处理元件和至少一个存储元件,其中该至少一个存储元件用于存储程序和数据,该至少一个处理元件用于读取并执行存储元件存储的程序和数据,以使得本申请以上任一方面提供的方法被实现。In a sixth aspect, the embodiment of the present application provides a communication device, including at least one processing element and at least one storage element, wherein the at least one storage element is used to store programs and data, and the at least one processing element is used to read and execute The program and data stored in the storage element enable the method provided by any one of the above aspects of the present application to be realized.
第七方面,本申请实施例提供了一种通信系统,包括:用于执行第一方面提供的方法的终端设备,用于执行第二方面提供的方法的第一核心网设备,以及用于执行第三方面提供的方法的第二核心网设备。In a seventh aspect, an embodiment of the present application provides a communication system, including: a terminal device for performing the method provided in the first aspect, a first core network device for performing the method provided in the second aspect, and a device for performing The second core network device of the method provided by the third aspect.
第八方面,本申请实施例还提供了一种计算机程序,当所述计算机程序在计算机上运行时,使得所述计算机执行上述任一方面提供的方法。In an eighth aspect, the embodiment of the present application further provides a computer program, which, when the computer program is run on a computer, causes the computer to execute the method provided in any one of the above aspects.
第九方面,本申请实施例还提供了一种计算机可读存储介质,所述计算机可读存储介质中存储有计算机程序,当所述计算机程序被计算机执行时,使得所述计算机执行上述任一方面提供的方法。In the ninth aspect, the embodiment of the present application also provides a computer-readable storage medium, where a computer program is stored in the computer-readable storage medium, and when the computer program is executed by a computer, the computer executes any one of the above-mentioned method provided.
第十方面,本申请实施例还提供了一种芯片,所述芯片用于读取存储器中存储的计算机程序,执行上述任一方面提供的方法。In a tenth aspect, the embodiment of the present application further provides a chip, the chip is used to read a computer program stored in a memory, and execute the method provided in any one of the above aspects.
第十一方面,本申请实施例还提供了一种芯片系统,该芯片系统包括处理器,用于支持计算机装置实现上述任一方面提供的方法。在一种可能的设计中,所述芯片系统还包括存储器,所述存储器用于保存该计算机装置必要的程序和数据。该芯片系统可以由芯片构成,也可以包含芯片和其他分立器件。In an eleventh aspect, an embodiment of the present application further provides a chip system, where the chip system includes a processor, configured to support a computer device to implement the method provided in any one of the above aspects. In a possible design, the chip system further includes a memory, and the memory is used to store necessary programs and data of the computer device. The system-on-a-chip may consist of chips, or may include chips and other discrete devices.
图1A为本申请实施例提供的一种机密性保护过程示意图;FIG. 1A is a schematic diagram of a confidentiality protection process provided by an embodiment of the present application;
图1B为本申请实施例提供的一种完整性保护过程示意图;FIG. 1B is a schematic diagram of an integrity protection process provided by an embodiment of the present application;
图2为本申请实施例提供的一种通信架构的示意图;FIG. 2 is a schematic diagram of a communication architecture provided by an embodiment of the present application;
图3为本申请实施例提供的一种通信方法的流程图;FIG. 3 is a flowchart of a communication method provided in an embodiment of the present application;
图4为本申请实施例提供的另一种通信方法的流程图;FIG. 4 is a flow chart of another communication method provided by the embodiment of the present application;
图5为本申请实施例提供的一种通信实例的流程图;FIG. 5 is a flow chart of a communication example provided by an embodiment of the present application;
图6为本申请实施例提供的另一种通信实例的流程图;FIG. 6 is a flow chart of another communication example provided by the embodiment of the present application;
图7为本申请实施例提供的一种通信装置的流程图;FIG. 7 is a flowchart of a communication device provided by an embodiment of the present application;
图8为本申请实施例提供的一种通信设备的流程图。FIG. 8 is a flowchart of a communication device provided by an embodiment of the present application.
本申请提供一种通信方法、装置及设备,用以提高异系统切换场景中终端设备的注册成功率。其中,方法与装置、设备是基于同一技术构思的,由于解决问题的原理相似,因此装置、设备与方法的实施可以相互参见,重复之处不再赘述。The present application provides a communication method, device, and equipment to improve the registration success rate of terminal equipment in an inter-system handover scenario. Among them, the method, the device, and the equipment are based on the same technical concept. Since the principles of solving the problems are similar, the implementation of the device, device, and method can be referred to each other, and the repetition will not be repeated.
以下对本申请中的部分用语进行解释说明,以便本领域技术人员理解。Some terms used in this application are explained below for the understanding of those skilled in the art.
1)、终端设备,是一种向用户提供语音和/或数据连通性的设备。终端设备又可以称为用户设备(user equipment,UE)、移动台(mobile station,MS)、移动终端(mobile terminal, MT)等。在本申请实施例和实例中,可以以终端设备为UE为例进行说明。1) A terminal device is a device that provides voice and/or data connectivity to users. The terminal equipment may also be called user equipment (user equipment, UE), mobile station (mobile station, MS), mobile terminal (mobile terminal, MT) and so on. In the embodiments and examples of the present application, the UE may be used as an example for illustration.
例如,终端设备可以为具有无线连接功能的手持式设备、车载设备等。目前,一些终端设备的举例为:手机(mobile phone)、平板电脑、笔记本电脑、掌上电脑、移动互联网设备(mobile internet device,MID)、智能销售终端(point of sale,POS)、可穿戴设备,虚拟现实(virtual reality,VR)设备、增强现实(augmented reality,AR)设备、工业控制(industrial control)中的无线终端、无人驾驶(self-driving)中的无线终端、远程手术(remote medical surgery)中的无线终端、智能电网(smart grid)中的无线终端、运输安全(transportation safety)中的无线终端、智慧城市(smart city)中的无线终端、智慧家庭(smart home)中的无线终端、各类智能仪表(智能水表、智能电表、智能燃气表)等。For example, the terminal device may be a handheld device with a wireless connection function, a vehicle-mounted device, and the like. At present, examples of some terminal devices are: mobile phone (mobile phone), tablet computer, notebook computer, palmtop computer, mobile Internet device (mobile internet device, MID), intelligent sales terminal (point of sale, POS), wearable device, Virtual reality (virtual reality, VR) equipment, augmented reality (augmented reality, AR) equipment, wireless terminals in industrial control (industrial control), wireless terminals in self-driving (self-driving), remote medical surgery (remote medical surgery) ), wireless terminals in smart grid, wireless terminals in transportation safety, wireless terminals in smart city, wireless terminals in smart home, Various smart meters (smart water meters, smart electricity meters, smart gas meters), etc.
2)、通信系统,用于在终端设备请求业务时,采用第三代合作伙伴计划(the 3rd generation partnership project,3GPP)接入技术将终端设备接入数据网络,并实现终端设备和数据网络之间用户面数据的传输以实现相应的业务,又称为移动通信系统或3GPP通信系统。除非另外说明,否则在以下本申请实施例中涉及到通信系统均为3GPP通信系统。2) The communication system is used to connect the terminal device to the data network by using the 3rd generation partnership project (3GPP) access technology when the terminal device requests services, and realize the communication between the terminal device and the data network. It is also called a mobile communication system or a 3GPP communication system by transmitting user plane data between users to realize corresponding services. Unless otherwise specified, the communication systems involved in the following embodiments of the present application are all 3GPP communication systems.
其中,通信系统分为接入网(access network,AN)和核心网(core network,CN)。接入网用于通过3GPP接入技术将终端设备汇接到核心网中。核心网用于将终端设备接入到不同的数据网络。另外,按照逻辑功能划分,核心网又可以分为控制面和用户面。Among them, the communication system is divided into an access network (access network, AN) and a core network (core network, CN). The access network is used to connect the terminal equipment to the core network through the 3GPP access technology. The core network is used to connect terminal devices to different data networks. In addition, according to the division of logical functions, the core network can be divided into the control plane and the user plane.
还需说明的是,本申请不限定通信系统的制式,可以为第三代(3
rd generation,3G)通信系统、第四代(4
th generation,4G)通信系统(即长期演进(long term evolution,LTE)通信系统、演进的分组系统(evolved packe system,EPS))、第五代(5
th generation,5G)通信系统(即5G系统(5G system,5GS)),或者未来的通信系统,或者基于任一代通信系统演进的通信系统。
It should also be noted that the present application does not limit the format of the communication system, which may be a third generation (3 rd generation, 3G) communication system, a fourth generation (4 th generation, 4G) communication system (that is, long term evolution (long term evolution) , LTE) communication system, evolved packet system (evolved packet system, EPS)), fifth generation (5 th generation, 5G) communication system (ie 5G system (5G system, 5GS)), or future communication system, or A communication system based on the evolution of any generation of communication system.
例如,在4G通信系统中,接入网还可以称为演进的通用移动通信系统(universal mobile telecommunications system,UMTS)陆地无线接入网(evolved-UMTS terrestrial radio access network,E-UTRAN),核心网还可以称为演进的分组核心网(evolved packet core,EPC)。For example, in a 4G communication system, the access network can also be called an evolved universal mobile telecommunications system (UMTS) terrestrial radio access network (evolved-UMTS terrestrial radio access network, E-UTRAN). It can also be called an evolved packet core network (evolved packet core, EPC).
又例如,在5G通信系统中,接入网还可以称为5G无线接入网(NG-无线接入网(radio access network,RAN),即NG-RAN,或者新无线(new radio,NR)系统),核心网还可以称为5G核心网(5G core,5GC)。For another example, in a 5G communication system, the access network can also be called a 5G radio access network (NG-radio access network, RAN), or NG-RAN, or new radio (NR) System), the core network can also be called 5G core network (5G core, 5GC).
3)、网络设备,为位于通信系统中的网元。所述网络设备可以为接入网中的接入网设备(即AN设备),或者为核心网中的核心网设备。本申请对此不作限定。3) The network device is a network element located in the communication system. The network device may be an access network device (ie, AN device) in the access network, or a core network device in the core network. This application is not limited to this.
4)、AN设备,是通信系统中将终端设备接入到无线网络的设备。所述接入网设备作为无线接入网中的节点,又可以称为基站,还可以称为无线接入网(radio access network,RAN)节点(或设备)。4). The AN device is a device that connects the terminal device to the wireless network in the communication system. The access network device, as a node in the radio access network, may also be called a base station, and may also be called a radio access network (radio access network, RAN) node (or device).
目前,一些AN设备的举例为:新一代节点B(generation Node B,gNB)、传输接收点(transmission reception point,TRP)、演进型节点B(evolved Node B,eNB)、无线网络控制器(radio network controller,RNC)、节点B(Node B,NB)、接入点(access point,AP)基站控制器(base station controller,BSC)、基站收发台(base transceiver station,BTS)、家庭基站(例如,home evolved NodeB,或home Node B,HNB),或基带单元(base band unit,BBU),企业LTE离散窄带聚合(Enterprise LTE Discrete Spectrum Aggregation,eLTE-DSA)基站等。At present, some examples of AN equipment are: new generation Node B (generation Node B, gNB), transmission reception point (transmission reception point, TRP), evolved Node B (evolved Node B, eNB), wireless network controller (radio network controller, RNC), node B (Node B, NB), access point (access point, AP) base station controller (base station controller, BSC), base transceiver station (base transceiver station, BTS), home base station (such as , home evolved NodeB, or home Node B, HNB), or base band unit (BBU), enterprise LTE discrete narrowband aggregation (Enterprise LTE Discrete Spectrum Aggregation, eLTE-DSA) base station, etc.
另外,在一种网络结构中,所述AN设备可以包括集中单元(centralized unit,CU) 节点和分布单元(distributed unit,DU)节点。这种结构将长期演进(long term evolution,LTE)系统中eNB的协议层拆分开,部分协议层的功能放在CU集中控制,剩下部分或全部协议层的功能分布在DU中,由CU集中控制DU。In addition, in a network structure, the AN device may include a centralized unit (centralized unit, CU) node and a distributed unit (distributed unit, DU) node. This structure separates the protocol layers of the eNB in the long term evolution (LTE) system, the functions of some protocol layers are placed in the CU for centralized control, and the remaining part or all of the functions of the protocol layers are distributed in the DU. Centralized control of DUs.
示例性的,在4G通信系统中,所述AN设备称为eNB;在5G通信系统中,所述AN设备可以称为gNB。Exemplarily, in a 4G communication system, the AN device is called an eNB; in a 5G communication system, the AN device may be called a gNB.
5)、核心网设备,位于核心网中的网元,用于实现核心网的功能,例如负责根据终端设备通过接入网发送的呼叫请求或业务请求将所述终端设备接续到不同的数据网络上,以及计费、移动性管理、会话管理等业务。由于本申请实施例提供的方法是在终端设备进行异系统切换的场景中,因此,本申请涉及的核心网设备为核心网中负责终端设备的移动性管理功能的网元。5), core network equipment, a network element located in the core network, used to realize the functions of the core network, for example, responsible for connecting the terminal equipment to different data networks according to the call request or service request sent by the terminal equipment through the access network services such as billing, mobility management, and session management. Since the method provided in the embodiment of the present application is in the scenario where the terminal device performs inter-system handover, the core network device involved in the present application is a network element in the core network responsible for the mobility management function of the terminal device.
由于移动性管理功能为核心网中控制面功能,因此,在核心网拆分为控制面和用户面的通信系统中,具有移动性管理功能的核心网设备又可以称为控制面网元或控制面设备。Since the mobility management function is the function of the control plane in the core network, in a communication system where the core network is split into a control plane and a user plane, the core network equipment with the mobility management function can also be called a control plane network element or a control plane. surface equipment.
示例性的,在4G通信系统中,具有移动性管理功能的核心网设备可以称为移动管理实体(mobility management entity,MME);在5G通信系统中,具有移动性管理功能的核心网设备可以称为接入与移动性管理功能(access and mobility management function,AMF)网元,简称为AMF。Exemplarily, in a 4G communication system, a core network device with a mobility management function may be called a mobility management entity (mobility management entity, MME); in a 5G communication system, a core network device with a mobility management function may be called a It is an access and mobility management function (access and mobility management function, AMF) network element, and is referred to as AMF for short.
还需要说明的是,本申请对具有移动性管理功能的核心网设备的名称并不限定,其还可以实现其他功能或与其他功能网元进行融合,并且还可以称为其他名称。It should also be noted that this application does not limit the name of the core network equipment with mobility management functions, it can also implement other functions or integrate with other functional network elements, and it can also be called by other names.
6)、安全验证,又称为安全对接、安全校验、安全保护等,用于实现接收方和发送方的机密性保护和/或完整性保护。6) Security verification, also known as secure docking, security verification, security protection, etc., is used to realize the confidentiality protection and/or integrity protection of the receiver and the sender.
7)、异系统切换,为将终端设备从一种制式的通信系统切换到另外一种制式的通信系统。其中,在本申请实施例中,处于无线资源控制(radio resource control,RRC)连接态的终端设备可以通过切换(handover)机制实现所述异系统切换。7) Inter-system switching, which is to switch the terminal equipment from a communication system of one standard to a communication system of another standard. Wherein, in the embodiment of the present application, the terminal device in the radio resource control (radio resource control, RRC) connected state can implement the inter-system handover through a handover (handover) mechanism.
8)、无线链路,为终端设备与通信系统中的AN设备之间的无线连接,用于在终端设备和AN设备之间传输业务数据或信令,又可以称为无线连接。示例性的,所述无线链路可以包含数据承载(data resource bearer,DRB)或信令承载(signaling resource bearer,SRB),其中,DBR为用于传输业务数据的无线承载,SRB为用于传输RRC信令或NAS信令的无线承载。8). The wireless link is a wireless connection between the terminal device and the AN device in the communication system, used to transmit service data or signaling between the terminal device and the AN device, and may also be called a wireless connection. Exemplarily, the wireless link may include a data resource bearer (data resource bearer, DRB) or a signaling resource bearer (signaling resource bearer, SRB), wherein, the DBR is a wireless bearer for transmitting service data, and the SRB is a wireless bearer for transmitting service data. Radio bearer of RRC signaling or NAS signaling.
其中,当终端设备与AN设备建立RRC连接之后,AN设备可以基于该RRC连接建立终端设备的无线链路。由于无线链路是根据基于RRC连接建立的,因此无线链路的状态于RRC连接的状态存在关联关系。在通信领域,RRC连接的状态包含:RRC连接态(RRC active,简称为连接态)、RRC空闲态(RRC idle,简称为空闲态)。当终端设备的无线链路在工作状态(未释放)时,终端设备处于RRC连接态。当终端设备的无线链路释放时,终端设备进入RRC空闲态。Wherein, after the terminal device establishes an RRC connection with the AN device, the AN device may establish a wireless link of the terminal device based on the RRC connection. Since the radio link is established based on the RRC connection, the state of the radio link is associated with the state of the RRC connection. In the communication field, the state of RRC connection includes: RRC connection state (RRC active, referred to as connection state for short), RRC idle state (RRC idle, referred to as idle state for short). When the wireless link of the terminal device is in the working state (not released), the terminal device is in the RRC connection state. When the radio link of the terminal device is released, the terminal device enters the RRC idle state.
9)、“和/或”,描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。字符“/”一般表示前后关联对象是一种“或”的关系。9), "and/or", describes the association relationship of associated objects, indicating that there can be three types of relationships, for example, A and/or B, which can mean: A exists alone, A and B exist simultaneously, and B exists independently Condition. The character "/" generally indicates that the contextual objects are an "or" relationship.
需要说明的是,本申请中所涉及的多个,是指两个或两个以上。至少一个,是指一个或一个以上。It should be noted that a plurality referred to in this application refers to two or more than two. At least one means one or more than one.
另外,需要理解的是,在本申请的描述中,“第一”、“第二”等词汇,仅用于区分描述 的目的,而不能理解为指示或暗示相对重要性,也不能理解为指示或暗示顺序。In addition, it should be understood that in the description of this application, words such as "first" and "second" are only used for the purpose of distinguishing descriptions, and cannot be understood as indicating or implying relative importance, nor can they be understood as indicating or imply order.
需要注意的是,本申请实施例涉及的附着(attach)流程、跟踪区域更新(tracking area update,TAU)流程可以为通信标准中规定的标准流程,例如通信标准24.301规定的流程。另外上述流程中涉及的消息以及定时器等也可以参考该通信标准中的定义。It should be noted that the attach (attach) process and the tracking area update (tracking area update, TAU) process involved in the embodiment of the present application may be the standard process specified in the communication standard, such as the process specified in the communication standard 24.301. In addition, the messages and timers involved in the above process can also refer to the definition in the communication standard.
下面先对安全上下文的作用进行说明。The role of the security context will be described below.
在终端设备接入通信系统在通信系统中驻留时,终端设备的NAS与通信系统中的网络设备(以核心网设备为例)的NAS维护一套安全上下文进行安全验证,以实现信令或业务数据的传输安全。所述安全验证包含机密性保护和/或完整性保护。例如,在3GPP协议TS33.401中规定了安全上下文中的NAS计数值(count)是机密性保护和完整性保护的参数之一。又例如,安全上下文中还可以包含:安全保护密钥参数和安全保护算法;其中,安全保护密钥参数包括用于生成机密性密钥和/或完整性密钥的密钥参数,或者机密性密钥和/或完整性密钥,安全保护算法包括机密性算法和/或完整性算法。When a terminal device accesses the communication system and resides in the communication system, the NAS of the terminal device and the NAS of the network device (take the core network device as an example) in the communication system maintain a set of security contexts for security verification, so as to realize signaling or The transmission of business data is secure. The security verification includes confidentiality protection and/or integrity protection. For example, the 3GPP protocol TS33.401 stipulates that the NAS count value (count) in the security context is one of the parameters of confidentiality protection and integrity protection. For another example, the security context may also include: security protection key parameters and security protection algorithms; wherein, the security protection key parameters include key parameters for generating confidentiality keys and/or integrity keys, or confidentiality A key and/or an integrity key, and a security protection algorithm includes a confidentiality algorithm and/or an integrity algorithm.
具体的,在上行传输方向,终端设备可以根据维护的安全上下文对上行消息进行加密和/或完整性保护处理,而核心网设备可以根据维护的安全上下文对接收的加密和/或完整性保护处理后的上行消息进行解密和/或完整性校验,得到该上行消息。Specifically, in the uplink transmission direction, the terminal device can encrypt and/or integrity protect the uplink message according to the maintained security context, and the core network device can encrypt and/or integrity protect the received message according to the maintained security context The subsequent uplink message is decrypted and/or integrity checked to obtain the uplink message.
类似的,在下行传输方向,核心网设备也可以根据维护的安全上下文对下行消息进行加密和/或完整性保护处理,而终端设备可以根据维护的安全上下文对接收的加密和/或完整性保护处理后的下行消息进行解密和/或完整性校验,得到该下行消息。Similarly, in the downlink transmission direction, the core network device can also encrypt and/or integrity protect the downlink message according to the maintained security context, and the terminal device can encrypt and/or integrity protect the received message according to the maintained security context The processed downlink message is decrypted and/or integrity checked to obtain the downlink message.
图1A为接收方和发送方使用同一套安全上下文进行机密性保护的过程示意图。如图1A所示,发送方和接收方采用机密性算法对机密性密钥、NAS count等一系列参数进行计算,得到密钥流块;发送方使用密钥流块对明文(即待传输的消息)进行加密,得到密文;在密文传输到接收方后,接收方使用密钥流块对密文进行解密,得到明文。FIG. 1A is a schematic diagram of a process in which the receiver and the sender use the same set of security contexts for confidentiality protection. As shown in Figure 1A, the sender and the receiver use the confidentiality algorithm to calculate a series of parameters such as the confidentiality key and NAS count to obtain the key stream block; message) to obtain the ciphertext; after the ciphertext is transmitted to the receiver, the receiver uses the key stream block to decrypt the ciphertext to obtain the plaintext.
图1B为接收方和发送方使用同一套安全上下文进行完整性保护的过程示意图。如图1B所示,发送方采用完整性算法对待传输的消息、完整性密钥,以及NAS count等一系列参数进行计算,得到校验码,然后该将该消息和校验码同时发送给接收方。接收方在接收到该消息和校验码后,采用完整性算法对接收的该消息,以及完整性密钥,NAS count等一系列参数进行计算,得到待验证校验码;然后接收方对接收到的校验码和生成的待验证校验进行比对:若二者相同,则表示该消息的完整性校验通过/成功,说明该消息完整、未被篡改,;若二者不同,则表示该消息的完整性校验未通过/失败,说明该消息可能被篡改,不完整。FIG. 1B is a schematic diagram of a process in which the receiver and the sender use the same security context to perform integrity protection. As shown in Figure 1B, the sender uses the integrity algorithm to calculate a series of parameters such as the message to be transmitted, the integrity key, and the NAS count, and obtains the check code, and then sends the message and the check code to the receiver at the same time. square. After receiving the message and check code, the receiver uses the integrity algorithm to calculate a series of parameters such as the received message, the integrity key, and NAS count to obtain the check code to be verified; Compare the received check code with the generated check to be verified: if the two are the same, it means that the integrity check of the message is passed/successful, indicating that the message is complete and has not been tampered with; if the two are different, then Indicates that the integrity check of the message has not passed/failed, indicating that the message may have been tampered with and is incomplete.
通过以上图1A和图1B所示的机密性保护和完整性保护的过程可知,为了保证终端设备和核心网设备之间能够实现安全验证(接收方能够根据维护的安全上下文成功对发送方发送的消息解密或完整性校验),二者维护的安全上下文需要相同,即终端设备和核心网设备二者维护的安全上下文中的NAS count、安全保护密钥参数、安全保护算法均相同。换句话说,终端设备和核心网设备维护同一套安全上下文才能成功实现安全对接。Through the process of confidentiality protection and integrity protection shown in Figure 1A and Figure 1B above, it can be seen that in order to ensure that security verification can be achieved between the terminal device and the core network device (the receiver can successfully verify the information sent by the sender according to the maintained security context), message decryption or integrity verification), the security context maintained by the two needs to be the same, that is, the NAS count, security protection key parameters, and security protection algorithm in the security context maintained by the terminal device and the core network device are the same. In other words, only when the terminal device and the core network device maintain the same set of security contexts can successful interconnection be achieved.
需要说明的是,每套安全上下文中可以包含上行安全上下文和下行安全上下文,上行安全上下文中包含上行NAS count,下行安全上下文中包含下行NAS count。其中,上行安全上下文用于对上行消息进行安全验证,而下行安全上下文用于对下行消息进行安全验证。It should be noted that each set of security contexts can include uplink security contexts and downlink security contexts, uplink security contexts include uplink NAS counts, and downlink security contexts include downlink NAS counts. Wherein, the uplink security context is used for security verification of the uplink message, and the downlink security context is used for security verification of the downlink message.
此外,不同通信系统中的安全上下文中包含的信息存在差异,例如5G通信系统和4G通信系统中的安全上下文中包含的安全保护密钥参数或安全保护算法不同。In addition, the information contained in the security context in different communication systems is different, for example, the security protection key parameters or security protection algorithms contained in the security context in the 5G communication system and the 4G communication system are different.
下面将结合附图,对本申请实施例进行详细描述。Embodiments of the present application will be described in detail below in conjunction with the accompanying drawings.
图2示出了本申请实施例提供的通信方法适用的一种通信架构。其中,本通信架构中兼容有多种不同制式的通信系统,图2仅以该通信架构包含5G通信系统和4G通信系统为例进行说明。FIG. 2 shows a communication architecture applicable to the communication method provided by the embodiment of the present application. Among them, the communication architecture is compatible with a variety of communication systems of different standards, and FIG. 2 only illustrates that the communication architecture includes a 5G communication system and a 4G communication system as an example.
需要说明的是,本申请不对本申请提供方法所适用的通信架构造成限定,该架构中可以至少包含以下任意两种通信系统:5G通信系统、4G通信系统、未来的新一代通信系统、全球移动通讯(Global System of Mobile communication,GSM)系统、码分多址(Code Division Multiple Access,CDMA)系统、宽带码分多址(Wideband Code Division Multiple Access,WCDMA)系统、通用分组无线业务(General Packet Radio Service,GPRS)、先进的长期演进(Advanced long term evolution,LTE-A)系统、通用移动通信系统(Universal Mobile Telecommunication System,UMTS)、以及第三代合作伙伴计划(The 3rd Generation Partnership Project,3GPP)相关的蜂窝系统,以及基于以上通信系统演进的通信系统。It should be noted that this application does not limit the communication architecture applicable to the method provided by this application, which may include at least any of the following two communication systems: 5G communication system, 4G communication system, future new generation communication system, global mobile Communication (Global System of Mobile communication, GSM) system, code division multiple access (Code Division Multiple Access, CDMA) system, wideband code division multiple access (Wideband Code Division Multiple Access, WCDMA) system, general packet radio service (General Packet Radio Service, GPRS), Advanced long term evolution (LTE-A) system, Universal Mobile Telecommunications System (UMTS), and the 3rd Generation Partnership Project (The 3rd Generation Partnership Project, 3GPP) Related cellular systems, and communication systems based on the evolution of the above communication systems.
总之,本申请实施例描述的通信架构是为了更加清楚的说明本申请实施例的技术方案,并不构成对于本申请实施例提供的技术方案的限定,本领域普通技术人员可知,随着通信技术的发展、移动通信系统的演进、网络架构演变,本申请实施例提供的技术方案对于类似的技术问题和场景,同样适用。In a word, the communication architecture described in the embodiment of the present application is to illustrate the technical solutions of the embodiments of the present application more clearly, and does not constitute a limitation to the technical solutions provided by the embodiments of the present application. The development of the mobile communication system, the evolution of the network architecture, the technical solutions provided by the embodiments of the present application are also applicable to similar technical problems and scenarios.
在图2所示的通信架构中,在满足异系统切换条件的情况下,终端设备(例如图中的UE)可以通过异系统切换,从一个通信系统切换到另一个通信系统。In the communication architecture shown in FIG. 2 , if the inter-system handover condition is met, the terminal device (such as the UE in the figure) can switch from one communication system to another communication system through inter-system handover.
如图2中所示,该通信架构中,4G通信系统中包含两部分:接入网和核心网。其中,所述接入网即为图中所示的E-UTRAN,所述核心网中包含以下网元:移动性管理功能(mobility management entity,MME)、服务网元(serving gateway,SGW)、分组数据网关(packet data network gateway,PGW)、策略与计费规则功能(policy and charging rules function,PCRF)网元(简称为PCRF)、归属用户服务器(home subscriber server,HSS)等。As shown in Figure 2, in this communication architecture, the 4G communication system includes two parts: an access network and a core network. Wherein, the access network is the E-UTRAN shown in the figure, and the core network includes the following network elements: mobility management function (mobility management entity, MME), serving network element (serving gateway, SGW), Packet data network gateway (PGW), policy and charging rules function (policy and charging rules function, PCRF) network element (referred to as PCRF), home subscriber server (home subscriber server, HSS), etc.
其中,按照逻辑功能划分,所述PGW还可以分为:PGW控制面(PGW-control,PGW-C)网元(简称为PGW-C)和PGW用户面(PGW-user,PGW-U)网元(简称为PGW-U)。Among them, according to the division of logical functions, the PGW can also be divided into: PGW control plane (PGW-control, PGW-C) network elements (referred to as PGW-C) and PGW user plane (PGW-user, PGW-U) network elements Yuan (abbreviated as PGW-U).
5G通信系统中也包含两部分:接入网和核心网。其中,所述接入网即为图中所示的NG-RAN,所述核心网包含以下网元:AMF网元(简称为AMF)、用户面功能(user plane function,UPF)网元(简称为UPF)、会话管理功能(session management function,SMF)网元(简称为SMF)、策略与计费功能(policy and charge function,PCF)网元(简称为PCF)、统一数据管理(unified data management,UDM)网元(简称为UDM)等。The 5G communication system also includes two parts: the access network and the core network. Wherein, the access network is the NG-RAN shown in the figure, and the core network includes the following network elements: AMF network element (abbreviated as AMF), user plane function (user plane function, UPF) network element (referred to as UPF), session management function (session management function, SMF) network element (referred to as SMF), policy and charging function (policy and charge function, PCF) network element (referred to as PCF), unified data management (unified data management , UDM) network element (referred to as UDM) and so on.
需要说明的是,在图2所示的兼容4G通信系统和5G通信系统的通信架构中,如图所示,SMF和PGW-C可以融合在同一网元中,也可以分开设置在不同的设备中,同样地,UPF和PGW-U、HSS和UDM、以及PCF和PCRF网元亦是如此,在本申请实施例中对其组成方式并不做具体限定。It should be noted that in the communication architecture compatible with the 4G communication system and the 5G communication system shown in Figure 2, as shown in the figure, the SMF and PGW-C can be integrated in the same network element, or they can be set separately in different devices In the same way, the UPF and PGW-U, the HSS and UDM, and the PCF and PCRF network elements are also the same, and their composition is not specifically limited in this embodiment of the present application.
在4G通信系统或5G通信系统中的两个网络设备之间可以通过相应的接口实现通信,具体可以参考图2所示。需要说明的是,为了实现终端设备在5G通信系统和4G通信系统之间异系统切换,5G通信系统中的AMF和4G通信系统中的MME之间也能够通过接口N26进行通信,以实现切换过程中信令、安全上下文以及终端设备的上下文的传输。Communication between two network devices in a 4G communication system or a 5G communication system can be implemented through corresponding interfaces, as shown in FIG. 2 for details. It should be noted that, in order to realize inter-system handover of terminal equipment between the 5G communication system and the 4G communication system, the AMF in the 5G communication system and the MME in the 4G communication system can also communicate through the interface N26 to realize the handover process transmission of signaling, security context, and context of the terminal device.
需要理解的是,4G通信系统或5G通信系统中的以上各网元既可以是在专用硬件上实现的网络元件,也可以是在专用硬件上运行的软件实例,或者是在虚拟化平台(例如云平台)上虚拟化功能的实例。此外,本申请实施例并不限定通信系统中各个网元的分布形式,可选的,以上各个网元可以分别部署在不同的物理设备中,或者多个网元融合在同一物理设备中。It should be understood that the above network elements in a 4G communication system or a 5G communication system may be network elements implemented on dedicated hardware, or software instances running on dedicated hardware, or implemented on a virtualization platform (such as instance of the virtualization function on the cloud platform). In addition, the embodiment of the present application does not limit the distribution form of each network element in the communication system. Optionally, each of the above network elements may be deployed in different physical devices, or multiple network elements may be integrated in the same physical device.
另外,本申请实施例也不对通信系统中各网元的名称进行限定,例如,在不同制式的通信系统中,各网元可以有其它名称;又例如,当多个网元融合在同一物理设备中时,该物理设备也可以有其他名称。In addition, the embodiment of the present application does not limit the name of each network element in the communication system. For example, in different communication systems, each network element may have other names; When in , the physical device can also have another name.
在本通信架构中,终端设备可以通过异系统切换,从一个通信系统切换到另一个通信系统。为了便于说明,本申请以下实施例将终端设备进行异系统切换的目标通信系统称为第一通信系统,将终端设备进行异系统切换的源通信系统称为第二通信系统。进一步的,为了便于区分和说明不同通信系统中的网络设备,将位于第一通信系统中的网络设备称为第一网络设备,将位于第二通信系统中的网络设备称为第二网络设备。其中,所述第一网络设备可以包含位于所述第一通信系统中的第一核心网设备和第一AN设备,所述第二网络设备可以包含位于所述第二通信系统中的第二核心网设备和第二AN设备。In this communication architecture, a terminal device can switch from one communication system to another through inter-system handover. For ease of description, in the following embodiments of the present application, the target communication system where the terminal device performs inter-system handover is referred to as the first communication system, and the source communication system where the terminal device performs inter-system handover is referred to as the second communication system. Further, for the convenience of distinguishing and describing network devices in different communication systems, the network devices in the first communication system are called first network devices, and the network devices in the second communication system are called second network devices. Wherein, the first network device may include a first core network device and a first AN device located in the first communication system, and the second network device may include a second core network device located in the second communication system network device and a second AN device.
当处于连接态的终端设备切换到第一通信系统后,终端设备的NAS和位于第一通信系统中的第一网络设备的NAS均会获取并维护第一套安全上下文,其中,所述第一套安全上下文用于所述终端设备与第一网络设备进行安全验证。并且从切换完成后,终端设备和第一网络设备之间的交互的所有NAS消息均需要使用第一套安全上下文进行完整性保护和/或机密性保护。When a terminal device in the connected state switches to the first communication system, both the NAS of the terminal device and the NAS of the first network device in the first communication system will acquire and maintain a first set of security contexts, wherein the first The set of security contexts is used for security verification between the terminal device and the first network device. And after the handover is completed, all NAS messages exchanged between the terminal device and the first network device need to use the first set of security contexts for integrity protection and/or confidentiality protection.
其中,所述第一套安全上下文是根据设定的安全上下文映射算法,对第二套安全上下文进行计算生成的。而第二套安全上下文用于所述终端设备与位于第二通信系统中的第二网络设备进行安全验证,即所述终端设备和所述第二网络设备中均保存有所述第二套安全上下文。Wherein, the first set of security context is generated by calculating the second set of security context according to a set security context mapping algorithm. The second set of security context is used for security verification between the terminal device and the second network device located in the second communication system, that is, the second set of security context is stored in the terminal device and the second network device. context.
所述终端设备的NAS维护的第一套安全上下文是终端设备根据设定的安全上下文映射算法对本地保存的第二套安全上下文进行计算生成的。The first set of security context maintained by the NAS of the terminal device is generated by the terminal device by calculating the second set of security context stored locally according to a set security context mapping algorithm.
而第一网络设备的NAS维护的第一套安全上下文可以是第二核心网设备根据设定的安全上下文映射算法对本地保存的第二套安全上下文进行计算生成,最终转发给所述第一网络设备的。The first set of security context maintained by the NAS of the first network device may be generated by the second core network device by calculating the second set of security context stored locally according to the set security context mapping algorithm, and finally forwarded to the first network equipment.
本申请以终端设备侧和核心网侧采用相同的安全上下文映射算法为例,即终端设备和第一网络设备维护的第一套安全上下文相同。This application uses the same security context mapping algorithm on the terminal device side and the core network side as an example, that is, the first set of security contexts maintained by the terminal device and the first network device are the same.
在本通信架构中,处于连接态的终端设备切换到第一通信系统后,需要发起注册流程以注册到第一通信系统。然而,在终端设备未成功注册到第一通信系统时终端设备释放无线链路,那么终端设备会进入空闲态。空闲态的终端设备会再次发起注册流程,以继续注册到第一通信系统。In this communication architecture, after a terminal device in a connected state switches to the first communication system, it needs to initiate a registration process to register with the first communication system. However, if the terminal device releases the wireless link when the terminal device fails to register with the first communication system, then the terminal device will enter an idle state. A terminal device in an idle state will initiate a registration process again, so as to continue to register with the first communication system.
其中,终端设备通过向第一核心网设备发送注册请求来发起注册流程。目前,终端设备会使用第一套安全上下文对该注册请求进行完整性保护。其中,注册请求中包含第二通信系统中具有所述终端设备的上下文的第二核心网设备的设备信息。Wherein, the terminal device initiates a registration process by sending a registration request to the first core network device. Currently, the terminal device will use the first set of security contexts to protect the integrity of the registration request. Wherein, the registration request includes device information of the second core network device that has the context of the terminal device in the second communication system.
第一核心网设备在接收到来自处于空闲态的终端设备发送的注册请求后,从该注册请求中获取第二核心网设备的设备信息,并根据该设备信息向第二核心网设备发送携带该注册请求的上下文请求,以从所述第二核心网设备获取所述终端设备的上下文。After receiving the registration request sent by the terminal device in the idle state, the first core network device obtains the device information of the second core network device from the registration request, and sends a message carrying the registration information to the second core network device according to the device information. The context request of the registration request is used to obtain the context of the terminal device from the second core network device.
所述第二核心网设备接收到该上下文请求后,会采用第二套安全上下文对该上下文请求中的注册请求进行完整性校验,由于该注册请求是终端设备采用第一套安全上下文进行完整性保护的,因此,第二核心网设备对该注册请求进行的完整性校验会失败。从而导致第一核心网设备无法从第二核心网设备获取该终端设备的上下文,进而导致第一核心网设备会拒绝终端设备注册请求。After the second core network device receives the context request, it will use the second set of security context to verify the integrity of the registration request in the context request, because the registration request is completed by the terminal device using the first set of security context. Therefore, the integrity verification performed by the second core network device on the registration request will fail. As a result, the first core network device cannot obtain the context of the terminal device from the second core network device, and thus the first core network device will reject the terminal device registration request.
而终端设备的注册请求被拒绝,那么终端设备只能通过附着流程才能再次驻留第一通信系统。这样必定会延长终端设备注册到第一通信系统的时延,从而导致业务的连续性,最终影响用户体验。However, if the registration request of the terminal device is rejected, the terminal device can only reside in the first communication system again through the attachment process. This will definitely prolong the time delay for the terminal device to register with the first communication system, thereby causing service continuity and ultimately affecting user experience.
以5G通信系统切换到4G通信系统为例,注册流程可以为TAU流程。通信标准TS24.301中规定:Taking the switching from a 5G communication system to a 4G communication system as an example, the registration process may be a TAU process. The communication standard TS24.301 stipulates:
UE使用5G安全上下文生成映射的EPS安全上下文(即4G安全上下文);The UE uses the 5G security context to generate a mapped EPS security context (that is, the 4G security context);
切换后,UE向MME发送TAU请求消息,UE使用4G安全上下文对TAU请求消息进行完整性保护。After the handover, the UE sends a TAU request message to the MME, and the UE uses the 4G security context to protect the integrity of the TAU request message.
通信标准TS33.501中规定:The communication standard TS33.501 stipulates:
终端设备向MME发送携带映射的EPS全局唯一临时标识(globally unique temporary identity,GUTI)(即4G GUTI)的TAU请求来启动TAU流程,其中,该映射的EPS GUTI是根据5G GUTI映射得到的,该映射的EPS GUTI中包含5G通信系统中具有UE上下文的AMF的设备信息(例如设备地址或设备标识);MME收到TAU请求后,从TAU请求包含的映射的EPS GUTI中获取AMF的设备信息,MME向该AMF转发完整的TAU请求消息;AMF使用5G安全上下文对该TAU请求消息进行完整性校验。The terminal device sends a TAU request carrying a mapped EPS globally unique temporary identity (GUTI) (that is, 4G GUTI) to the MME to start the TAU process. The mapped EPS GUTI is obtained according to the 5G GUTI mapping. The mapped EPS GUTI contains the device information (such as device address or device identity) of the AMF with UE context in the 5G communication system; after receiving the TAU request, the MME obtains the AMF device information from the mapped EPS GUTI included in the TAU request, The MME forwards the complete TAU request message to the AMF; the AMF uses the 5G security context to check the integrity of the TAU request message.
通过以上描述,在异系统切换场景中,目前的方案会造成终端设备的注册成功率不高,进而导致终端设备的驻网时间变长、业务终端的问题,影响用户体验。造成上述影响的原因为切换后终端设备的首次注册流程未成功导致终端设备释放无线链路后,进入空闲态的终端设备再次发起注册流程时会被拒绝,只能通过附着流程才能驻留到切换后的通信系统。Based on the above description, in the inter-system handover scenario, the current solution will result in a low success rate of terminal device registration, which in turn will lead to longer network stay time of terminal devices, problems with service terminals, and affect user experience. The reason for the above impact is that the first registration process of the terminal device after the handover is unsuccessful, and after the terminal device releases the wireless link, the terminal device that enters the idle state will be rejected when it initiates the registration process again, and can only reside in the handover process through the attach process. later communication system.
需要说明的是,本申请各个实施例不限定所述第一通信系统和所述第二通信系统的制式。示例性的,所述第一通信系统可以为5G通信系统,所述第二通信系统可以为4G通信系统;或者所述第一通信系统可以为4G通信系统,所述第二通信系统可以为5G通信系统;又或者所述第一通信系统可以为5G通信系统,所述第二通信系统可以为6G通信系统等。而第一核心网设备为第一通信系统中具有移动性管理功能的网元,第二核心设备为第二通信系统中具有移动性管理功能的网元。另外,终端设备与通信系统中的网络设备进行安全验证所使用的安全上下文,还可以简称为该通信系统对应的安全上下文。It should be noted that, various embodiments of the present application do not limit the standards of the first communication system and the second communication system. Exemplarily, the first communication system may be a 5G communication system, and the second communication system may be a 4G communication system; or the first communication system may be a 4G communication system, and the second communication system may be a 5G communication system A communication system; or the first communication system may be a 5G communication system, and the second communication system may be a 6G communication system or the like. The first core network device is a network element with a mobility management function in the first communication system, and the second core device is a network element with a mobility management function in the second communication system. In addition, the security context used by the terminal device and the network device in the communication system to perform security verification may also be simply referred to as the security context corresponding to the communication system.
实施例一:Embodiment one:
为了解决上述问题,提高异系统切换场景中终端设备的注册成功率,本申请实施例提供了一种通信方法。该方法可以适用于如图2所示的通信架构中,下面参阅图3所示的流程图,对本申请实施例提供的方法进行详细说明。In order to solve the above problem and improve the registration success rate of the terminal device in the inter-system handover scenario, an embodiment of the present application provides a communication method. The method can be applied to the communication architecture shown in FIG. 2 . Referring to the flowchart shown in FIG. 3 , the method provided in the embodiment of the present application will be described in detail below.
S300a:终端设备驻留在第二通信系统时,第二通信系统建立所述终端设备的会话连接(PDU session),所述终端设备与位于第二通信系统中的第二网络设备使用第二套安全上下文进行安全验证。其中,所述第二网络设备包含第二AN设备和第二核心网设备。S300a: When the terminal device resides in the second communication system, the second communication system establishes a session connection (PDU session) of the terminal device, and the terminal device and the second network device located in the second communication system use a second set of Security context for security verification. Wherein, the second network device includes a second AN device and a second core network device.
具体的,所述终端设备NAS和所述第二网络设备中的NAS分别维护所述第二套安全上下文,并使用各自维护的所述第二套安全上下文,对传输的消息进行机密性保护和完整性保护,具体过程可以参考以上对图1A和图1B的具体描述,此处不再赘述。Specifically, the NAS in the terminal device and the NAS in the second network device respectively maintain the second set of security contexts, and use the second set of security contexts maintained respectively to perform confidentiality protection and Integrity protection, the specific process can refer to the above specific description of FIG. 1A and FIG. 1B , which will not be repeated here.
S300b:在当前网络环境满足异系统切换条件时,触发处于连接态的终端设备的异系统切换;终端设备以及第一通信系统中的第一网络设备、第二通信系统中的第二网络设备启动执行异系统切换流程,所述终端设备从第二通信系统切换到第一通信系统。S300b: When the current network environment meets the inter-system handover condition, trigger the inter-system handover of the terminal device in the connected state; the terminal device, the first network device in the first communication system, and the second network device in the second communication system start An inter-system handover procedure is executed, and the terminal device is handed over from the second communication system to the first communication system.
在一种实施方式中,第二通信系统中的第二网络设备确定满足异系统切换条件时,触发从所述第二通信系统切换到所述第一通信系统的异系统切换流程。以上具体过程可以参考目前的通信协议,此处不再详细赘述。In an implementation manner, when the second network device in the second communication system determines that an inter-system handover condition is met, it triggers an inter-system handover process from the second communication system to the first communication system. For the above specific process, reference may be made to the current communication protocol, which will not be described in detail here.
S301a:在切换成功后,所述终端设备成功驻留到第一通信系统。所述终端设备获取第一套安全上下文,其中,所述第一套安全上下文用于所述终端设备与位于所述第一通信系统中的第一网络设备进行安全验证。所述第一网络设备包含第一AN设备和第一核心网设备。S301a: After the handover is successful, the terminal device successfully camps on the first communication system. The terminal device acquires a first set of security contexts, where the first set of security contexts is used to perform security verification between the terminal device and a first network device in the first communication system. The first network device includes a first AN device and a first core network device.
可选的,所述终端设备可以采用以下步骤,获取所述第一套安全上下文:Optionally, the terminal device may obtain the first set of security contexts by adopting the following steps:
所述终端设备根据本地保存的设定安全上下文映射算法,对自身维护的第二套安全上下文进行计算,生成所述第一套安全上下文。The terminal device calculates the second set of security contexts maintained by itself according to the locally saved set security context mapping algorithm to generate the first set of security contexts.
示例性的,所述设定的安全上下文映射算法可以为:3GPP协议33501_CR0611r1中的安全上下文映射算法,用于实现将5G通信系统对应的安全上下文映射为4G通信系统对应的安全上下文。Exemplarily, the set security context mapping algorithm may be: the security context mapping algorithm in 3GPP protocol 33501_CR0611r1, which is used to map the security context corresponding to the 5G communication system to the security context corresponding to the 4G communication system.
S301b:在切换成功后,所述第一通信系统中的第一核心网设备获取所述第一套安全上下文。S301b: After the handover is successful, the first core network device in the first communication system acquires the first set of security context.
可选的,所述第一核心网设备可以但不限于通过以下方式,获取所述第一套安全上下文:异系统切换过程中或切换成功后,所述第二通信系统中的第二核心网设备根据设定的安全上下文映射算法对本地保存的第二套安全上下文进行计算,生成所述第一套安全上下文,并将所述第一套安全上下文发送给所述第一核心网设备。Optionally, the first core network device may, but not limited to, obtain the first set of security context in the following manner: during or after the handover between different systems, the second core network device in the second communication system The device calculates the second set of security context stored locally according to the set security context mapping algorithm, generates the first set of security context, and sends the first set of security context to the first core network device.
其中,所述第二核心网设备使用的安全上下文映射算法与所述终端设备使用的安全上下文映射算法应该相同,这样,可以保证二者生成的第一套安全上下文相同,进而保证终端设备和第一核心设备可以使用第一套安全上下文成功实现安全验证。Wherein, the security context mapping algorithm used by the second core network device should be the same as the security context mapping algorithm used by the terminal device. In this way, it can be ensured that the first set of security contexts generated by the two are the same, thereby ensuring that the terminal device and the first set of security contexts are the same. A core device can use the first set of security contexts to successfully implement security verification.
S302:所述终端设备发起注册流程,向所述第一核心网设备发送第一注册请求消息;所述第一核心网设备接收来自所述终端设备的所述第一注册请求消息。其中,所述第一注册请求消息使用所述第一套安全上下文进行完整性保护。S302: The terminal device initiates a registration process, and sends a first registration request message to the first core network device; the first core network device receives the first registration request message from the terminal device. Wherein, the first registration request message uses the first set of security context for integrity protection.
在本申请实施例中,所述终端设备在异系统切换后,所述终端设备成功驻留到第一通信系统,所述终端设备还需要发起注册流程,以注册到所述第一通信系统。In this embodiment of the present application, after the terminal device is handed over from another system, the terminal device successfully resides in the first communication system, and the terminal device also needs to initiate a registration process to register with the first communication system.
示例性的,在本实施例中的注册流程可以为TAU流程。所述第一注册请求可以为使用第一套安全上下文进行完整性保护的TAU请求(tracking area update request)消息。Exemplarily, the registration process in this embodiment may be a TAU process. The first registration request may be a TAU request (tracking area update request) message for integrity protection using the first set of security context.
位于第一通信系统的第一核心网设备可以获知终端设备的RRC连接状态。由于所述终端设备是在连接态发起注册流程的,所述第一核心网设备在接收来自连接态的所述终端 设备的所述第一注册请求消息后,会执行相应的注册步骤,并根据执行结果,向所述终端设备反馈相应的注册响应消息(执行成功时,反馈注册成功响应消息;执行失败时,反馈注册拒绝响应消息)。例如,所述第一核心网设备向通信系统中的存储用户相关数据的数据功能网元(例如HSS/UDM)发起位置更新(update location)流程(即向数据功能网元发送位置更新请求(update location request)消息)。The first core network device located in the first communication system can learn the RRC connection state of the terminal device. Since the terminal device initiates the registration process in the connected state, the first core network device will perform corresponding registration steps after receiving the first registration request message from the terminal device in the connected state, and according to As a result of the execution, a corresponding registration response message is fed back to the terminal device (if the execution is successful, a registration success response message is fed back; when the execution fails, a registration rejection response message is fed back). For example, the first core network device initiates a location update (update location) process to a data function network element (such as HSS/UDM) in the communication system that stores user-related data (that is, sends a location update request (update location) to the data function network element. location request) message).
需要说明的是,由于所述终端设备未对所述第一注册请求消息进行加密处理,因此,所述第一核心网设备在接收到来自连接态的终端设备的所述第一注册请求消息后,使用所述第一套安全上下文对所述第一注册请求消息进行完整性校验(而无需使用所述第一套安全上下文对所述第一注册请求消息进行解密处理),在完整性校验通过后,根据该第一注册请求消息执行相应的注册步骤。It should be noted that, since the terminal device does not encrypt the first registration request message, after the first core network device receives the first registration request message from the terminal device in the connected state, , using the first set of security context to perform integrity check on the first registration request message (without using the first set of security context to perform decryption processing on the first registration request message), in the integrity check After passing the verification, perform corresponding registration steps according to the first registration request message.
此外,所述第一注册请求消息中可以携带第二通信系统中具有所述终端设备的上下文(UE context)的第二核心网设备的设备信息。In addition, the first registration request message may carry device information of a second core network device having a context (UE context) of the terminal device in the second communication system.
其中,所述设备信息用于在所述第二通信系统中识别该第二核心网设备,可以为所述第二核心网设备的设备标识或所述第二核心网设备的地址等信息,本申请对此不作限定。Wherein, the device information is used to identify the second core network device in the second communication system, and may be information such as a device identifier of the second core network device or an address of the second core network device. Applications are not limited to this.
示例性的,所述第一注册请求消息中可以携带第一GUTI,而与第一套安全上下文类似的,所述第一GUTI是根据第二GUTI映射得到的。而所述第一GUTI包含了第二通信系统中具有所述终端设备的上下文的第二核心网设备的设备信息。其中,第一GUTI为所述终端设备在所述第一通信系统中的唯一标识;而所述第二GUTI为所述终端设备在所述第二通信系统中的唯一标识,由第二通信系统中的第二核心网设备分配给所述终端设备的。Exemplarily, the first registration request message may carry a first GUTI, and similar to the first set of security contexts, the first GUTI is obtained through mapping from the second GUTI. The first GUTI includes device information of the second core network device in the second communication system that has the context of the terminal device. Wherein, the first GUTI is the unique identifier of the terminal device in the first communication system; and the second GUTI is the unique identifier of the terminal device in the second communication system, and is determined by the second communication system The second core network device allocated to the terminal device.
S303:在所述终端设备向所述第一核心网设备发送所述第一注册请求消息之后,还未成功注册到所述第一通信系统时,所述终端设备的无线链路被释放。其中,所述无线链路为所述终端设备与所述第一通信系统中的第一AN设备之间的无线连接。S303: After the terminal device sends the first registration request message to the first core network device but has not successfully registered with the first communication system, release the wireless link of the terminal device. Wherein, the wireless link is a wireless connection between the terminal device and the first AN device in the first communication system.
在本申请实施例中,所述终端设备的无线链路释放后,所述终端设备进入空闲态,而所述第一核心网设备可以得知所述终端设备处于空闲态。In this embodiment of the present application, after the wireless link of the terminal device is released, the terminal device enters an idle state, and the first core network device may know that the terminal device is in the idle state.
在一种实施方式中,所述终端设备的无线链路可以为所述第一AN设备主动释放的。例如,所述第一AN设备在确定该无线链路异常时主动释放。In an implementation manner, the wireless link of the terminal device may be actively released by the first AN device. For example, the first AN device actively releases when it is determined that the wireless link is abnormal.
在另一种实施方式中,所述终端设备可以但不限于通过以下几种方式,释放所述无线链路:In another implementation manner, the terminal device may, but not limited to, release the wireless link in the following ways:
方式一:在所述终端设备接收来自所述第一核心网设备的注册拒绝响应消息时,所述终端设备释放所述无线链路。其中,所述注册拒绝响应消息为所述第一核心网设备执行注册步骤失败后反馈的,该注册拒绝响应消息用于通知所述终端设备本次注册流程失败,或所述第一核心设备拒绝所述终端设备的注册请求。Manner 1: When the terminal device receives the registration rejection response message from the first core network device, the terminal device releases the wireless link. Wherein, the registration refusal response message is fed back after the first core network device fails to perform the registration step, and the registration refusal response message is used to notify the terminal device that this registration process fails, or that the first core device refuses to register. The registration request of the terminal device.
可选的,所述注册拒绝响应消息包含拒绝原因指示,所述拒绝原因指示用于指示所述终端设备保持注册状态,即不会造成所述终端设备迁移到去注册状态。示例性的,所述拒绝原因指示可以为除以下拒绝原因值以外的其他拒绝原因值:#3、#6、#8、#7、#9、#10、#11、#35、#12、#13、#14、#15、#22(其中,#22中携带T3346值信息元素(T3346 value IE),且该T3346值信息元素的取值不是0也不是无效(deactivated))、#25、#40、#42、#31。Optionally, the registration refusal response message includes a refusal reason indication, and the refusal reason indication is used to instruct the terminal device to maintain the registration state, that is, it will not cause the terminal device to migrate to the de-registered state. Exemplarily, the rejection reason indication may be other rejection reason values except the following rejection reason values: #3, #6, #8, #7, #9, #10, #11, #35, #12, #13, #14, #15, #22 (where #22 carries the T3346 value information element (T3346 value IE), and the value of the T3346 value information element is neither 0 nor invalid (deactivated)), #25, #40, #42, #31.
因此,所述终端设备在收到所述注册拒绝响应消息中,仍会保持注册状态,会在之后再次发起注册流程。Therefore, the terminal device will still maintain the registration state after receiving the registration rejection response message, and will initiate the registration process again later.
方式二:未接收到来自所述第一核心网设备的注册成功响应消息时,所述终端设备释放所述无线链路。其中,所述注册成功响应消息为所述第一核心设备执行注册步骤成功后反馈的,该注册成功响应消息用于通知所述终端设备本次注册流程成功,或所述第一核心网设备将所述终端设备注册到所述第一通信系统。Way 2: When the registration success response message from the first core network device is not received, the terminal device releases the wireless link. Wherein, the registration success response message is fed back by the first core device after successfully performing the registration step, and the registration success response message is used to notify the terminal device that the registration process is successful, or that the first core network device will The terminal device is registered with the first communication system.
在本方式二中,可以存在以下几种情况,使所述终端设备未接收所述注册成功响应消息:In the second method, there may be the following situations, so that the terminal device does not receive the registration success response message:
情况一:所述第一核心网设备未发送注册成功响应消息。例如所述第一核心网设备执行注册步骤失败。Situation 1: The first core network device does not send a registration success response message. For example, the first core network device fails to perform the registration step.
情况二:由于消息传输异常,虽然所述第一核心网设备向所述终端设备发送注册成功响应消息,但是所述终端设备未接收到。Situation 2: Due to abnormal message transmission, although the first core network device sends a registration success response message to the terminal device, the terminal device does not receive it.
情况三:所述终端设备在发送所述第一注册请求消息之后的设定时长内未接收到所述注册成功响应消息。示例性的,所述终端设备在发送所述第一注册请求消息时,同步启动定时器T3430。示例性的,所述T3430的计时时长为15秒。在所述定时器T3430计时过程中,所述终端设备未接收到所述注册成功响应消息;那么当所述定时器T3430超时时,所述终端设备放弃本次注册流程,并释放所述无线链路。Situation 3: The terminal device does not receive the registration success response message within a set period of time after sending the first registration request message. Exemplarily, when the terminal device sends the first registration request message, it starts the timer T3430 synchronously. Exemplarily, the timing duration of the T3430 is 15 seconds. During the timing of the timer T3430, the terminal device does not receive the registration success response message; then when the timer T3430 times out, the terminal device abandons the registration process and releases the wireless link road.
方式三:在所述无线链路异常时,所述终端设备释放所述无线链路。Manner 3: When the wireless link is abnormal, the terminal device releases the wireless link.
所述无线链路异常可以包括:所述第一通信系统中的第一AN设备发送信号的信号质量降低,通过所述无线链路传输数据的误码率较高、所述无线链路无法成功传输数据等等,本申请对此不作限定。The abnormality of the wireless link may include: the signal quality of the signal sent by the first AN device in the first communication system is reduced, the bit error rate of data transmitted through the wireless link is high, and the wireless link cannot be successful Transmission of data, etc., is not limited in this application.
S304:处于空闲态的所述终端设备(保持注册状态)再次发起注册流程,向所述第一核心设备发送第二注册请求消息;所述第一核心网设备接收来自空闲态的所述终端设备的所述第二注册请求消息。其中,所述第二注册请求消息使用第二套安全上下文进行完整性保护。S304: The terminal device in the idle state (maintaining the registration state) initiates the registration process again, and sends a second registration request message to the first core device; the first core network device receives the terminal device from the idle state The second registration request message. Wherein, the second registration request message uses a second set of security context for integrity protection.
在本步骤中,所述终端设备未对所述第二注册请求消息进行加密处理。In this step, the terminal device does not perform encryption processing on the second registration request message.
与第一注册请求消息类似的,所述第二注册请求消息可以为使用第二套安全上下文进行完整性保护的TAU请求消息。另外,所述第二注册请求消息也携带第二通信系统中具有所述终端设备的上下文的第二核心网设备的设备信息。Similar to the first registration request message, the second registration request message may be a TAU request message for integrity protection using a second set of security context. In addition, the second registration request message also carries device information of a second core network device that has the context of the terminal device in the second communication system.
示例性的,所述第二注册请求消息携带所述终端设备的第一GUTI。所述第一GUTI中包含所述第二核心网设备的设备信息,具体描述可以参考S302中的对所述第一注册请求消息的描述,此处不再赘述。Exemplarily, the second registration request message carries the first GUTI of the terminal device. The first GUTI includes the device information of the second core network device. For a specific description, refer to the description of the first registration request message in S302, which will not be repeated here.
S305:所述第一核心网设备向位于所述第二通信系统的所述第二核心网设备发送上下文请求消息;所述第二核心网设备接收来自所述第一核心网设备的所述上下文请求消息。所述上下文请求消息中包含所述第二注册请求消息,所述上下文请求消息中用于请求所述终端设备的上下文。S305: The first core network device sends a context request message to the second core network device located in the second communication system; the second core network device receives the context from the first core network device request message. The context request message includes the second registration request message, and the context request message is used to request the context of the terminal device.
其中,所述终端设备的上下文包含能够使终端设备在通信系统中创建和维护无线链路、承载,以及PDU会话,实现通信业务的各种信息。示例性的,所述终端设备的上下文可以包括诸如网络能力信息、终端设备的各种标识、鉴权信息、创建的连接信息、创建的承载信息等。Wherein, the context of the terminal device includes various information enabling the terminal device to create and maintain wireless links, bearers, and PDU sessions in the communication system to realize communication services. Exemplarily, the context of the terminal device may include, for example, network capability information, various identifiers of the terminal device, authentication information, created connection information, created bearer information, and the like.
在一种实施方式中,在第二注册请求消息中包含所述第二核心网设备的设备信息的情况下,所述第一核心网设备在接收到所述第二注册请求消息后,从所述第二注册请求消息 中获取所述第二核心网设备的设备信息,最后根据所述第二核心网设备的设备信息,向所述第二核心设备发送所述上下文请求消息。In one embodiment, if the second registration request message contains the device information of the second core network device, after receiving the second registration request message, the first core network device, from the Obtain the device information of the second core network device from the second registration request message, and finally send the context request message to the second core device according to the device information of the second core network device.
在该实施方式中,由于所述第二注册请求消息未被加密而只是进行了完整性保护处理,因此,所述第一核心网设备无需对第二注册请求消息进行解密处理和完整性校验处理,也可以直接从所述第二注册请求消息中成功获取所述第二核心设备的设备信息。这样,所述第一核心网设备可以根据该设备信息,确定所述上下文请求消息的发送对象为所述第二核心网设备。In this implementation manner, since the second registration request message is not encrypted but only undergoes integrity protection processing, the first core network device does not need to perform decryption processing and integrity verification on the second registration request message Processing, the device information of the second core device may also be successfully acquired directly from the second registration request message. In this way, the first core network device may determine, according to the device information, that the sending object of the context request message is the second core network device.
S306:所述第二核心网设备从所述上下文请求消息中获取所述第二注册请求消息,并使用保存的第二套安全上下文,对所述第二注册请求消息进行完整性校验。S306: The second core network device acquires the second registration request message from the context request message, and uses the saved second set of security context to perform integrity check on the second registration request message.
在一种实施方式中,所述第二核心网设备中可以针对保存的每个终端设备上下文维护一个保护定时器。当任一个终端设备的上下文对应的保护定时器超时,第二核心网设备即删除该终端设备的上下文。In an implementation manner, the second core network device may maintain a protection timer for each saved terminal device context. When the protection timer corresponding to the context of any terminal device expires, the second core network device deletes the context of the terminal device.
在本申请实施例中,仅以所述第二核心网设备保存有所述终端设备的上下文为例,即所述终端设备的上下文对应的保护定时器未超时。In this embodiment of the present application, it is only taken as an example that the second core network device stores the context of the terminal device, that is, the protection timer corresponding to the context of the terminal device has not expired.
S307:所述第二核心网设备在对所述第二注册请求消息的完整性校验通过后,向所述第一核心网设备发送上下文响应消息;所述第一核心网设备接收来自所述第二核心网设备的所述上下文响应消息。其中,所述上下文响应消息用于指示请求所述终端设备的上下文成功。S307: The second core network device sends a context response message to the first core network device after passing the integrity check of the second registration request message; the first core network device receives a context response message from the The context response message of the second core network device. Wherein, the context response message is used to indicate that the request for the context of the terminal device is successful.
与S306中对应的,当所述第二核心网设备对所述第二注册请求消息的完整校验通过后,且所述第二核心网设备确定保存有所述终端设备的上下文的情况下,所述第二核心网设备向所述第一核心设备发送所述上下文响应消息。可选的,在本申请实施例中,所述第二核心网设备可以但不限于通过以下方式向所述第一核心网设备发送所述终端设备的上下文:Corresponding to S306, when the second core network device passes the complete verification of the second registration request message and the second core network device determines that the context of the terminal device is saved, The second core network device sends the context response message to the first core device. Optionally, in this embodiment of the present application, the second core network device may, but not limited to, send the context of the terminal device to the first core network device in the following manner:
所述第二核心网设备通过所述上下文响应消息向所述第一核心网设备发送所述终端设备的上下文,即所述上下文响应消息中包含所述终端设备的上下文。The second core network device sends the context of the terminal device to the first core network device through the context response message, that is, the context response message includes the context of the terminal device.
S308:所述第一核心网设备向所述终端设备发送注册成功响应消息;所述终端设备接收来自所述第一核心网设备的所述注册成功响应消息。S308: The first core network device sends a registration success response message to the terminal device; the terminal device receives the registration success response message from the first core network device.
所述注册成功响应消息用于通知所述终端设备本次注册流程成功,所述终端设备已成功注册到所述第一通信系统中。The registration success response message is used to notify the terminal device that this registration process is successful, and that the terminal device has successfully registered in the first communication system.
通过以上过程,所述终端设备接收到来自所述第一核心网设备的注册成功响应消息之后,即成功注册到所述第一通信系统中。之后,所述终端设备可以在第一通信系统中创建无线链路、承载、会话,从而实现通信业务。Through the above process, after the terminal device receives the registration success response message from the first core network device, it successfully registers in the first communication system. Afterwards, the terminal device can create a wireless link, a bearer, and a session in the first communication system, so as to implement communication services.
综上,本申请实施例提供了一种通信方法。在该方法中,连接态的终端设备在从第二通信系统切换到第一通信系统后的首次注册流程未成功导致终端设备释放无线链路后,进入空闲态的所述终端设备再次发起注册流程时,向所述第一通信系统中的第一核心网设备发送采用第二套安全上下文进行完整性保护的注册请求消息;这样,第一核心网设备在向接收到空闲态的所述终端设备的注册请求消息时,可以基于该注册请求消息向第二通信系统的第二核心网设备请求所述终端设备的上下文;而第二核心网设备可以采用保存的第二套安全上下文成功对该注册请求消息进行完整性校验,从而向第一核心网设备发送所述终端设备的上下文。因此,所述第一核心网设备可以成功从所述第二核心网设备获取所述终 端设备的上下文,进而使所述终端设备可以成功注册到所述第一通信系统中。To sum up, the embodiment of the present application provides a communication method. In this method, after the terminal device in the connected state switches from the second communication system to the first communication system after the first registration process fails, causing the terminal device to release the wireless link, the terminal device in the idle state initiates the registration process again , send to the first core network device in the first communication system a registration request message that adopts the second set of security context for integrity protection; in this way, the first core network device sends the registration request message to the terminal device in the idle state after receiving the When receiving a registration request message, the context of the terminal device may be requested from the second core network device of the second communication system based on the registration request message; and the second core network device may use the saved second set of security context to successfully register the terminal device. An integrity check is performed on the request message, so as to send the context of the terminal device to the first core network device. Therefore, the first core network device can successfully obtain the context of the terminal device from the second core network device, so that the terminal device can successfully register in the first communication system.
在传统的方案中,在异系统切换场景中,首次注册流程未成功、进入空闲的终端设备再次发起注册流程时继续使用第一套安全上下文对注册请求消息进行完整性保护,而第二核心网设备只能采用第二套安全上下文进行完整性校验,因此该终端设备的第二次注册流程必然会失败。相对于该传统的方案,在本申请实施例提供的方案中,终端设备再次发起注册流程时,采用第二套安全上下文对注册请求消息进行完整性保护;这就可以保证第二核心网设备可以成功对该注册请求消息进行完整性校验,从而保证所述第一核心网设备可以成功从所述第二核心网设备获取所述终端设备的上下文,进而保证所述终端设备可以成功注册到所述第一通信系统中。显然,相对于传统的方案,本申请实施例提供的方案可以避免终端设备再次发起的注册流程被拒绝的情况,提高异系统切换场景中终端设备的注册成功率,降低终端设备成功注册到第一通信系统的时延,最终可以保障终端设备的业务连续性,保障用户体验。In the traditional solution, in the inter-system handover scenario, when the initial registration process fails and the idle terminal device initiates the registration process again, it continues to use the first set of security context to protect the integrity of the registration request message, while the second core network The device can only use the second set of security contexts for integrity verification, so the second registration process of the terminal device will inevitably fail. Compared with the traditional solution, in the solution provided by the embodiment of this application, when the terminal device initiates the registration process again, the second set of security context is used to protect the integrity of the registration request message; this can ensure that the second core network device can successfully performing an integrity check on the registration request message, thereby ensuring that the first core network device can successfully obtain the context of the terminal device from the second core network device, thereby ensuring that the terminal device can successfully register with the In the first communication system described above. Obviously, compared with the traditional solution, the solution provided by the embodiment of the present application can avoid the situation that the registration process initiated by the terminal device is rejected again, improve the registration success rate of the terminal device in the inter-system handover scenario, and reduce the risk of the terminal device successfully registering to the first registration process. The delay of the communication system can ultimately guarantee the service continuity of the terminal equipment and guarantee the user experience.
实施例二:Embodiment two:
为了解决上述问题,降低异系统切换场景中终端设备的注册时延,提高终端设备的注册成功率,本申请实施例提供了另一种通信方法。该方法可以适用于如图2所示通信架构中,下面参阅图4所示的流程图,对本申请实施例提供的方法进行详细说明。In order to solve the above problems, reduce the registration delay of the terminal device in the inter-system handover scenario, and improve the registration success rate of the terminal device, another communication method is provided in the embodiment of the present application. The method can be applied to the communication architecture shown in FIG. 2 . Referring to the flow chart shown in FIG. 4 , the method provided in the embodiment of the present application will be described in detail below.
其中,如图3、图4所示,本实施例中的步骤S400a-S403与实施例一中的步骤S300a-S303相同,因此步骤S400a-S403的具体描述可以参考实施例一中的相应步骤,此处不再赘述。Wherein, as shown in Figure 3 and Figure 4, steps S400a-S403 in this embodiment are the same as steps S300a-S303 in Embodiment 1, so the specific description of steps S400a-S403 can refer to the corresponding steps in Embodiment 1, I won't repeat them here.
S404:连接态的终端设备在从第二通信系统切换到第一通信系统后的首次注册流程未成功导致所述终端设备释放无线链路后,进入空闲态的所述终端设备重新驻留到第一通信系统后,所述终端设备发起附着流程。S404: After the first registration process of the terminal device in the connected state is switched from the second communication system to the first communication system, after the first registration process fails, causing the terminal device to release the wireless link, the terminal device in the idle state re-cams to the first communication system After a communication system is established, the terminal device initiates an attach process.
可选的,所述终端设备可以在进行本地去注册后,进入去注册状态;然后通过扫频搜网流程,重新驻留到第一通信系统。Optionally, the terminal device may enter a de-registration state after performing local de-registration; and then re-reside in the first communication system through a frequency scanning and network search process.
在一种实施方式中,所述终端设备可以采用目前通信标准中的附着流程进行附着。例如,所述终端设备需要通过随机接入过程,接入所述第一通信系统;然后,所述终端设备向第一通信系统中的第一核心网设备发送附着请求(attach request)消息等等,此处不再展开描述。In an implementation manner, the terminal device may attach using an attach procedure in a current communication standard. For example, the terminal device needs to access the first communication system through a random access procedure; then, the terminal device sends an attach request (attach request) message to the first core network device in the first communication system, etc. , no further description here.
通过以上步骤,当所述终端设备完成所述附着流程,即可注册到所述第一通信系统。Through the above steps, when the terminal device completes the attachment procedure, it can register with the first communication system.
综上,本申请实施例提供了一种通信方法。在该方法中,连接态的终端设备在从第二通信系统切换到第一通信系统后的首次注册流程未成功导致终端设备释放无线链路后,进入空闲态的所述终端设备即可发起附着流程,以注册到第一通信系统。由于终端设备不再重新发起注册流程,而是通过附着流程注册到所述第一通信系统。因此,该方法可以使得空闲态的终端设备能够快速注册到第一通信系统。相对于上述传统的方案,本申请实施例提供的方案可以避免终端设备再次发起注册流程被拒绝的情况,提高异系统切换场景中终端设备的注册成功率,降低终端设备成功注册到第一通信系统的时延,最终可以保障终端设备的业务连续性,保障用户体验。To sum up, the embodiment of the present application provides a communication method. In this method, after the terminal device in the connected state switches from the second communication system to the first communication system after the first registration process fails, causing the terminal device to release the wireless link, the terminal device in the idle state can initiate an attachment Procedure to register with the first communication system. Because the terminal device does not re-initiate the registration process, but registers with the first communication system through the attach process. Therefore, this method can enable a terminal device in an idle state to quickly register with the first communication system. Compared with the traditional solution above, the solution provided by the embodiment of the present application can avoid the situation that the terminal device is rejected when the registration process is initiated again, improve the registration success rate of the terminal device in the inter-system handover scenario, and reduce the risk of the terminal device successfully registering to the first communication system. The delay can ultimately guarantee the service continuity of terminal equipment and user experience.
基于本申请提供的以上实施例,本申请还提供了一些通信实例。下面参阅图5或图6, 分别对该实例进行详细说明。以下实例是以UE通过异系统切换从5G通信系统切换到4G通信系统为例进行说明。并且为了便于说明,以下实例中将5G通信系统对应的安全上下文简称为5G安全上下文,4G通信系统对应的安全上下文简称为4G安全上下文;在5G通信系统中,AN设备记为gNB,核心网中具有移动性管理功能的网元记为AMF;而在4G通信系统中,AN设备记为eNB,核心网中具有移动性管理功能的网元记为MME。另外,4G通信系统和5G通信系统中存储用户向数据的数据功能网元HSS和UDM可以融合在同一网元中,记为HSS/UDM。Based on the above embodiments provided in this application, this application also provides some communication examples. Referring to FIG. 5 or FIG. 6, the examples will be described in detail respectively. The following example takes UE handover from a 5G communication system to a 4G communication system as an example for illustration. And for the sake of illustration, in the following examples, the security context corresponding to the 5G communication system is referred to as the 5G security context, and the security context corresponding to the 4G communication system is referred to as the 4G security context; The network element with mobility management function is marked as AMF; in the 4G communication system, AN equipment is marked as eNB, and the network element with mobility management function in the core network is marked as MME. In addition, the data function network elements HSS and UDM that store user data in the 4G communication system and the 5G communication system can be integrated into the same network element, which is recorded as HSS/UDM.
实例一:本实例是基于图3所示的实施例提供的方法的实例。下面参阅图5所示的流程图,该实例中的步骤进行详细说明。Example 1: This example is based on the method provided by the embodiment shown in FIG. 3 . Referring to the flow chart shown in Fig. 5, the steps in this example will be described in detail.
S500:UE驻留在5G通信系统中,与gNB建立无线链路,以及PDU会话,进入连接态;UE与gNB和AMF等5G通信系统中的网络设备使用5G安全上下文进行安全验证。S500: The UE resides in the 5G communication system, establishes a wireless link with the gNB, and a PDU session, and enters a connected state; the UE performs security verification with network devices in the 5G communication system such as the gNB and AMF using the 5G security context.
所述UE和5G通信系统中的网络设备的NAS均维护所述5G安全上下文。Both the UE and the NAS of the network device in the 5G communication system maintain the 5G security context.
S501:网络触发的连接态的该UE的异系统切换流程(即从5G通信系统到4G通信系统的切换流程)。可选的,本实例可以采用目前的通信标准中的异系统切换流程实现本S501。示例性的,该流程可以包括以下步骤S5011-S5018。S501: The inter-system handover process of the UE in the connected state triggered by the network (that is, the handover process from the 5G communication system to the 4G communication system). Optionally, in this example, S501 may be implemented by using the inter-system switching process in the current communication standard. Exemplarily, the process may include the following steps S5011-S5018.
S5011:5G通信系统中该UE接入的gNB确定当前网络环境满足异系统切换条件时,向5G通信系统中的AMF发送切换需求(handover required)消息,以触发连接态的该UE的异系统切换。S5011: When the gNB accessed by the UE in the 5G communication system determines that the current network environment meets the inter-system handover conditions, it sends a handover required (handover required) message to the AMF in the 5G communication system to trigger inter-system handover of the UE in the connected state .
S5012:AMF根据保存的设定安全上下文映射算法,对自身维护的5G安全上下文进行映射计算,生成4G安全上下文。S5012: The AMF performs mapping calculation on the 5G security context maintained by itself according to the saved setting security context mapping algorithm, and generates a 4G security context.
由于所述4G安全上下文是由5G安全上下文进行映射计算得到的,因此,4G安全上下文又可以称为映射的安全上下文、5G映射的安全上下文等。Since the 4G security context is obtained by mapping and calculating the 5G security context, the 4G security context may also be called a mapped security context, a 5G mapped security context, and the like.
S5013:AMF向4G通信系统中的MME发送包含4G安全上下文在内的切换相关信息。S5013: The AMF sends handover-related information including the 4G security context to the MME in the 4G communication system.
MME接收到所述切换相关信息后,保存该切换相关信息,以在切换成功后,可以根据该切换相关信息与该UE进行通信。After receiving the handover related information, the MME saves the handover related information, so that after the handover is successful, it can communicate with the UE according to the handover related information.
S5014:AMF向gNB发送切换命令(handover command)。S5014: The AMF sends a handover command (handover command) to the gNB.
S5015:gNB向该UE发送切换命令。S5015: The gNB sends a handover command to the UE.
S5016:该UE根据保存的设定安全上下文映射算法,对自身维护的5G安全上下文进行映射计算,生成4G安全上下文。S5016: The UE performs mapping calculation on the 5G security context maintained by itself according to the saved set security context mapping algorithm to generate a 4G security context.
S5017:该UE向4G通信系统中的eNB发送切换成功(handover compete)消息。S5017: The UE sends a handover complete (handover complete) message to the eNB in the 4G communication system.
S5018:eNB向MME发送切换通知(handover notify)。S5018: The eNB sends a handover notification (handover notify) to the MME.
S502:UE切换到4G通信系统后,在4G通信系统中发起首次TAU流程,即UE向MME发送TAU请求(TAU request)消息。其中,该UE采用4G安全上下文对该TAU请求消息进行完整性保护。S502: After switching to the 4G communication system, the UE initiates the first TAU process in the 4G communication system, that is, the UE sends a TAU request (TAU request) message to the MME. Wherein, the UE uses the 4G security context to perform integrity protection on the TAU request message.
S503:MME接收到该TAU请求消息,在采用4G安全上下文对该TAU请求消息进行完整性校验成功后,执行相应的TAU步骤。可选的,本实例可以采用目前的通信标准中的MME执行的TAU步骤实现本S503。示例性的,该TAU步骤可以包括以下步骤S5031-S5034。S503: The MME receives the TAU request message, and executes corresponding TAU steps after successfully performing integrity verification on the TAU request message using the 4G security context. Optionally, in this example, the TAU step performed by the MME in the current communication standard may be used to implement S503. Exemplarily, the TAU step may include the following steps S5031-S5034.
S5031:MMR向HSS/UDM发送位置更新请求(update location request)消息。S5031: The MMR sends a location update request (update location request) message to the HSS/UDM.
S5032:HSS/UDM接收到该位置更新请求消息后,向5G通信系统中的AMF发送取 消注册通知(Nudm_UECM_DeregistrationNotification)。其中所述AMF中保存有所述UE的上下文,而所述取消注册通知用于通知所述AMF删除该UE的上下文。S5032: After receiving the location update request message, the HSS/UDM sends a deregistration notification (Nudm_UECM_DeregistrationNotification) to the AMF in the 5G communication system. The context of the UE is stored in the AMF, and the deregistration notification is used to notify the AMF to delete the context of the UE.
S5033:若该UE的上下文的保护定时器未超时,AMF继续维护该UE的上下文。S5033: If the protection timer of the context of the UE has not expired, the AMF continues to maintain the context of the UE.
需要说明的是,若该UE的上下文的保护定时器已超时,则AMF在接收到该取消注册通知时,即删除该UE的上下文。另外,在由于该保护定时器未超时,该AMF继续维护该UE的上下文的情况下,该保护定时器继续运行,直至当该保护定时器超时时,AMF再删除该UE的上下文。It should be noted that, if the protection timer of the context of the UE has expired, the AMF deletes the context of the UE when receiving the notification of deregistration. In addition, when the AMF continues to maintain the context of the UE because the protection timer has not expired, the protection timer continues to run until the AMF deletes the context of the UE when the protection timer expires.
可选的,当以下S504a-S504d中的任一步骤执行时,所述UE的无线链路被释放。Optionally, when any of the following steps S504a-S504d is executed, the radio link of the UE is released.
S504a:MME在执行上述S503中的TAU步骤过程中,发生异常时,向所述UE发送TAU拒绝(TAU reject)消息。其中,该TAU拒绝消息用于通知该UE本次TAU流程失败。S504a: The MME sends a TAU reject (TAU reject) message to the UE when an exception occurs during the execution of the TAU step in S503. Wherein, the TAU rejection message is used to notify the UE that the current TAU process fails.
该TAU拒绝消息中包含指示该UE保持注册状态、不会造成UE迁移到去注册状态的拒绝原因值。因此,该UE在接收到该TAU拒绝消息后,会继续保持注册状态。The TAU rejection message includes a rejection reason value indicating that the UE remains in the registered state and will not cause the UE to migrate to the deregistered state. Therefore, after receiving the TAU rejection message, the UE will continue to maintain the registration state.
示例性的,该TAU拒绝消息中包含的拒绝原因值可以为除以下拒绝原因值以外的其他拒绝原因值:Exemplarily, the rejection reason value contained in the TAU rejection message may be other rejection reason values except the following rejection reason values:
#3、#6、#8、#7、#9、#10、#11、#35、#12、#13、#14、#15、#22(其中,#22中携带T3346值信息元素(T3346 value IE),且该T3346值信息元素的取值不是0也不是无效(deactivated))、#25、#40、#42、#31。#3, #6, #8, #7, #9, #10, #11, #35, #12, #13, #14, #15, #22 (wherein #22 carries the T3346 value information element ( T3346 value IE), and the value of the T3346 value information element is neither 0 nor invalid (deactivated)), #25, #40, #42, #31.
S504b:该UE未接收到来自MME的TAU成功响应消息。其中,该TAU成功响应消息用于通知该UE本次TAU流程成功。而该UE未接收到该TAU成功响应消息,该UE确定本次TAU流程失败。S504b: The UE does not receive the TAU success response message from the MME. Wherein, the TAU success response message is used to notify the UE that the current TAU process is successful. However, the UE does not receive the TAU success response message, and the UE determines that the current TAU procedure fails.
可选的,在以下几种情况可能会使得该UE未接收到TAU成功响应消息:Optionally, the UE may not receive the TAU success response message in the following situations:
情况一:MME执行TAU步骤发生异常,未向UE发送TAU成功响应消息。Situation 1: An exception occurs when the MME executes the TAU step, and does not send a TAU success response message to the UE.
情况二:MME与UE之间的消息传输异常,MME发送到TAU成功响应消息未能够成功传输到UE。Situation 2: The message transmission between the MME and the UE is abnormal, and the successful response message sent by the MME to the TAU fails to be successfully transmitted to the UE.
情况三:UE在发送TAU请求消息后,启动定时器T3430;并且在T3430计时过程中,该UE未接收到该TAU成功响应消息,直至该T3430超时。Case 3: The UE starts the timer T3430 after sending the TAU request message; and during the timing of T3430, the UE does not receive the TAU success response message until the T3430 times out.
S504c:该UE确定无线链路异常。S504c: The UE determines that the radio link is abnormal.
可选的,无线链路异常可以但不限于包括以下情况:Optionally, wireless link abnormalities may include, but are not limited to, the following situations:
UE接收的eNB发送的信号的信号质量降低,UE通过无线链路传输的数据的误码率较高、UE无法通过该无线链路成功传输数据等。The signal quality of the signal sent by the eNB received by the UE is degraded, the bit error rate of the data transmitted by the UE through the wireless link is high, and the UE cannot successfully transmit data through the wireless link.
S504d:eNB确定无线链路异常。S504d: The eNB determines that the radio link is abnormal.
可选的,无线链路异常可以但不限于包括以下情况:Optionally, wireless link abnormalities may include, but are not limited to, the following situations:
eNB接收的该UE发送的信号的信号质量降低,eNB通过无线链路传输的数据的误码率较高、eNB无法通过该无线链路成功传输数据等。The signal quality of the signal sent by the UE received by the eNB is degraded, the bit error rate of the data transmitted by the eNB through the wireless link is high, and the eNB cannot successfully transmit data through the wireless link.
S505:在以上S504a-S504d任一情况下,该UE的无线链路被释放,该UE进入空闲态。S505: In any case of S504a-S504d above, the radio link of the UE is released, and the UE enters an idle state.
S506:空闲态的UE重新发起TAU流程,即UE再次向MME发送TAU请求消息。其中,本次该UE采用5G安全上下文对该TAU请求消息进行完整性保护。S506: The UE in the idle state re-initiates the TAU process, that is, the UE sends a TAU request message to the MME again. Wherein, this time, the UE adopts the 5G security context to perform integrity protection on the TAU request message.
其中,在S502和S506中发送的TAU请求消息中,携带该UE的4G GUTI(即该UE在4G通信系统中的GUTI)。其中,该4G GUTI是UE根据5G GUTI映射得到的,因此, 该4G GUTI又可以称为映射的GUTI。Wherein, the TAU request message sent in S502 and S506 carries the 4G GUTI of the UE (that is, the GUTI of the UE in the 4G communication system). Wherein, the 4G GUTI is obtained by the UE according to the mapping of the 5G GUTI, therefore, the 4G GUTI can also be called a mapped GUTI.
其中,该4G GUTI中包含5G通信系统中的保存该UE的上下文的AMF的设备信息(例如AMF的标识或地址)。Wherein, the 4G GUTI includes the device information of the AMF (for example, the identification or address of the AMF) that saves the context of the UE in the 5G communication system.
S507:MME接收到来自空闲态的UE发送的TAU请求消息后,根据该TAU请求消息中的AMF的设备信息,向5G通信系统中的AMF发送上下文请求(context request)消息。其中,该上下文请求消息包含该TAU请求消息,用于请求该UE的上下文。S507: After receiving the TAU request message sent from the UE in the idle state, the MME sends a context request (context request) message to the AMF in the 5G communication system according to the device information of the AMF in the TAU request message. Wherein, the context request message includes the TAU request message, which is used to request the context of the UE.
S508:AMF接收到该上下文请求消息后,使用5G安全上下文对TAU请求消息进行完整性校验,且校验通过。S508: After receiving the context request message, the AMF uses the 5G security context to perform integrity check on the TAU request message, and the check passes.
S509:AMF向MME返回上下文响应(context response)消息。该上下文响应消息用于指示请求该UE的上下文成功。该上下文响应消息中包含该UE的上下文。S509: The AMF returns a context response (context response) message to the MME. The context response message is used to indicate that the request for the context of the UE is successful. The context response message includes the context of the UE.
S510:MME接收到上下文响应消息后,向UE回复TAU成功响应消息。所述TAU成功响应消息用于通知本次TAU流程成功,该UE成功注册到4G通信系统中。S510: After receiving the context response message, the MME returns a TAU success response message to the UE. The TAU success response message is used to notify that the TAU process is successful, and the UE is successfully registered in the 4G communication system.
在传统的5G通信系统切换到4G通信系统的方案中,连接态的UE在切换后的首次TAU流程未成功,进入空闲的UE再次发起TAU流程时继续使用4G安全上下文对TAU请求消息进行完整性保护,而MME会将该TAU请求消息转发给AMF以获取该UE的上下文,但是AMF只能采用5G安全上下文进行完整性校验,因此,AMF会对TAU请求消息校验失败,导致MME无法获得UE的上下文,最终导致该UE的再次发起的TAU流程必然会失败。相对于该传统的方案,在该实例中,UE再次发起TAU流程时,采用5G安全上下文对TAU请求消息进行完整性保护;这就可以保证AMF在接收到MME转发的该TAU请求消息时,该AMF可以成功对该TAU请求消息进行完整性校验,从而保证MME可以成功从AMF获取该UE的上下文,进而保证该UE可以成功通过TAU流程注册到4G通信系统中。显然,相对于传统的方案,本申请该实例提供的方案可以避免UE再次发起的TAU流程被拒绝的情况,提高UE从5G通信系统切换到4G通信系统场景中UE的注册成功率,降低UE成功注册到4G通信系统的时延,最终可以保障UE的业务连续性,保障用户体验。In the solution of switching from the traditional 5G communication system to the 4G communication system, the UE in the connected state fails to perform the first TAU process after the handover, and the UE that enters the idle state continues to use the 4G security context to check the integrity of the TAU request message when it initiates the TAU process again. protection, and the MME will forward the TAU request message to the AMF to obtain the context of the UE, but the AMF can only use the 5G security context for integrity verification. Therefore, the AMF will fail to verify the TAU request message, resulting in the MME being unable to obtain The context of the UE will eventually lead to the failure of the re-initiated TAU procedure of the UE. Compared with the traditional solution, in this example, when the UE initiates the TAU process again, the 5G security context is used to protect the integrity of the TAU request message; this can ensure that when the AMF receives the TAU request message forwarded by the MME, the The AMF can successfully check the integrity of the TAU request message, so as to ensure that the MME can successfully obtain the context of the UE from the AMF, and then ensure that the UE can successfully register in the 4G communication system through the TAU process. Obviously, compared with the traditional solution, the solution provided by this example of this application can avoid the situation that the TAU process initiated by the UE is rejected again, improve the registration success rate of the UE in the scenario where the UE switches from the 5G communication system to the 4G communication system, and reduce the UE registration success rate. The delay in registering to the 4G communication system can ultimately guarantee the service continuity of the UE and user experience.
实例二:本实例是基于图4所示的实施例提供的方法的实例。下面参阅图6所示的流程图,该实例中的步骤进行详细说明。其中,如图5和图6所示,本实例中的步骤S600-S605与实例一中的步骤S500-S505相同,因此,相同步骤可以相互参考,此处不再展开描述。Example 2: This example is based on the method provided by the embodiment shown in FIG. 4 . Referring to the flow chart shown in FIG. 6, the steps in this example will be described in detail. Wherein, as shown in FIG. 5 and FIG. 6 , steps S600 - S605 in this example are the same as steps S500 - S505 in Example 1, therefore, the same steps can be referred to each other, and no further description is given here.
S606:连接态的UE在从5G通信系统切换到4G通信系统后的首次TAU流程为成功导致该UE释放无线链路后,进入空闲态的UE重新驻留到4G通信系统后,发起附着流程。S606: After the first TAU process of the UE in the connected state after switching from the 5G communication system to the 4G communication system is successful, the UE releases the wireless link, and the UE in the idle state re-cams to the 4G communication system, and initiates an attach process.
其中,该UE可以在进入空闲态之后,进行本地去注册后,进入去注册状态;然后通过扫频搜网流程重新驻留到4G通信系统。Wherein, after entering the idle state, the UE may perform local de-registration, and then enter the de-registration state; and then re-stay in the 4G communication system through the process of frequency scanning and network search.
可选的,UE可以采用目前通信标准中的附着流程进行附着。例如,该UE通过随机接入过程接入4G通信系统;然后向MMR发送附着请求消息以请求附着并注册到4G通信系统。Optionally, the UE may use an attach procedure in a current communication standard to attach. For example, the UE accesses the 4G communication system through a random access procedure; then sends an attach request message to the MMR to request attachment and registration to the 4G communication system.
当该UE成功完成附着流程后,即可注册到4G通信系统中。After the UE successfully completes the attach process, it can be registered in the 4G communication system.
在实例中,连接态的UE在从5G通信系统切换到4G通信系统后的首次TAU流程未成功导致该UE释放无线链路后,进入空闲态的UE即可发起附着流程,以注册到4G通信系统。由于UE不再重新发起TAU流程,而是通过附着流程注册到4G通信系统,因此, 该实例可以使得空闲态的UE能够快速注册到4G通信系统。相对于上述传统的方案,本申请实例提供的方案可以避免UE再次发起TAU流程被拒绝的情况,提高从5G通信系统切换到4G通信系统场景中UE的注册成功率,降低UE成功注册到4G通信系统的时延,最终可以保障UE的业务连续性,保障用户体验。In the example, after the UE in the connected state fails to perform the first TAU process after switching from the 5G communication system to the 4G communication system, causing the UE to release the wireless link, the UE in the idle state can initiate the attach process to register with the 4G communication system. system. Since the UE does not re-initiate the TAU process, but registers to the 4G communication system through the attach process, this example can enable the UE in the idle state to quickly register to the 4G communication system. Compared with the traditional solution above, the solution provided by the example of this application can avoid the situation that the UE initiates the TAU process again and is rejected, improve the registration success rate of the UE in the scenario of switching from the 5G communication system to the 4G communication system, and reduce the UE's successful registration to 4G communication. The delay of the system can ultimately guarantee the service continuity of the UE and the user experience.
基于相同的技术构思,本申请还提供了一种通信装置,该装置的结构如图7所示,包括通信单元701和处理单元702。所述通信装置700可以应用于图2所示的通信架构中的核心网设备,或UE,并可以实现以上实施例以及实例提供的通信方法。可选的,所述通信装置700的物理表现形式可以为一种通信设备,例如核心网设备或终端设备(即UE);或者所述通信装置可以能够实现通信设备的功能的其他装置,例如通信设备内部的处理器或芯片等。具体的,该通信装置700可以为现场可编程门阵列(field-programmable gate array,FPGA)、复杂可编程逻辑器件(complex programmable logic device,CPLD)、专用集成电路(application specific intergrated circuits,ASIC),或片上系统(System on a chip,SOC)等一些可编程的芯片。Based on the same technical concept, the present application also provides a communication device, the structure of which is shown in FIG. 7 , including a communication unit 701 and a processing unit 702 . The communication apparatus 700 may be applied to a core network device or a UE in the communication architecture shown in FIG. 2 , and may implement the communication methods provided in the above embodiments and examples. Optionally, the physical form of the communication device 700 may be a communication device, such as a core network device or a terminal device (ie UE); or the communication device may be other devices capable of realizing the functions of a communication device, such as a communication The processor or chip inside the device, etc. Specifically, the communication device 700 may be a field-programmable gate array (field-programmable gate array, FPGA), a complex programmable logic device (complex programmable logic device, CPLD), an application specific integrated circuit (application specific integrated circuits, ASIC), Or some programmable chips such as System on a chip (SOC).
下面对所述装置700中的各个单元的功能进行介绍。The functions of each unit in the apparatus 700 will be introduced below.
所述通信单元701,用于接收和发送数据。The communication unit 701 is configured to receive and send data.
当所述通信装置700应用于核心网设备时,所述通信单元701可以通过物理接口、通信模块、通信接口、输入输出接口实现。所述通信装置700可以通过该通信单元701连接网线或电缆,进而与其他设备建立物理连接。When the communication device 700 is applied to a core network device, the communication unit 701 may be implemented through a physical interface, a communication module, a communication interface, and an input/output interface. The communication device 700 can be connected with a network cable or cable through the communication unit 701, and then establish a physical connection with other devices.
当所述通信装置700应用于终端设备时,所述通信单元701可以通过收发器实现,例如,移动通信模块。When the communication apparatus 700 is applied to a terminal device, the communication unit 701 may be implemented by a transceiver, for example, a mobile communication module.
移动通信模块可以提供应用在终端设备上的包括2G/3G/4G/5G/6G以及未来新一代等无线通信的解决方案。移动通信模块可以包括至少一个天线、至少一个滤波器,开关,功率放大器,低噪声放大器(low noise amplifier,LNA)等。终端设备可以通过所述移动通信模块接入移动通信系统中的AN设备,并与该AN设备进行交互,从而实现终端设备与移动通信系统的交互。The mobile communication module can provide wireless communication solutions including 2G/3G/4G/5G/6G and future generations applied to terminal equipment. The mobile communication module may include at least one antenna, at least one filter, a switch, a power amplifier, a low noise amplifier (low noise amplifier, LNA) and the like. The terminal device can access the AN device in the mobile communication system through the mobile communication module, and interact with the AN device, so as to realize the interaction between the terminal device and the mobile communication system.
在一种实施方式中,所述通信装置700应用于图3中的终端设备,例如图5所示的实例的UE。所述处理单元702,用于:In an implementation manner, the communication apparatus 700 is applied to the terminal device in FIG. 3 , for example, the UE in the example shown in FIG. 5 . The processing unit 702 is configured to:
在所述终端设备从第二通信系统切换到第一通信系统后,获取第一套安全上下文;其中,所述第一套安全上下文用于所述终端设备与位于所述第一通信系统中的第一网络设备进行安全验证;After the terminal device is switched from the second communication system to the first communication system, a first set of security context is obtained; wherein, the first set of security context is used for the terminal device to communicate with a device located in the first communication system The first network device performs security verification;
在通过所述通信单元701向第一核心网设备发送第一注册请求消息之后,释放所述终端设备的无线链路;其中,所述第一注册请求消息使用所述第一套安全上下文进行完整性保护,所述第一网络设备中包含所述第一核心网设备;After sending the first registration request message to the first core network device through the communication unit 701, release the wireless link of the terminal device; wherein, the first registration request message uses the first set of security context for complete permanent protection, the first network device includes the first core network device;
通过所述通信单元701向所述第一核心网设备发送第二注册请求消息,其中,所述第二注册请求消息使用第二套安全上下文进行完整性保护,所述第二套安全上下文用于所述终端设备与位于第二通信系统的第二网络设备进行安全验证。Send a second registration request message to the first core network device through the communication unit 701, where the second registration request message uses a second set of security context for integrity protection, and the second set of security context is used for The terminal device performs security verification with the second network device located in the second communication system.
可选的,所述处理单元702,在获取第一套安全上下文时,具体用于:Optionally, the processing unit 702, when acquiring the first set of security context, is specifically configured to:
根据设定的安全上下文映射算法,对所述第二套安全上下文进行计算,生成所述第一套安全上下文。Calculate the second set of security contexts according to the set security context mapping algorithm to generate the first set of security contexts.
可选的,所述处理单元702,在释放所述终端设备的无线链路时,具体用于:Optionally, the processing unit 702 is specifically configured to: when releasing the wireless link of the terminal device:
在通过所述通信单元701接收来自所述第一核心网设备的注册拒绝响应消息时,释放所述无线链路。When the communication unit 701 receives a registration rejection response message from the first core network device, release the wireless link.
可选的,所述注册拒绝响应消息包含拒绝原因指示,所述拒绝原因指示用于指示所述终端设备保持注册状态。Optionally, the registration refusal response message includes a refusal reason indication, and the refusal reason indication is used to instruct the terminal device to keep the registration state.
可选的,所述处理单元702,在释放所述终端设备的无线链路时,具体用于:Optionally, the processing unit 702 is specifically configured to: when releasing the wireless link of the terminal device:
在所述无线链路异常时,释放所述无线链路。When the wireless link is abnormal, release the wireless link.
可选的,所述处理单元702,在释放所述终端设备的无线链路时,具体用于:Optionally, the processing unit 702 is specifically configured to: when releasing the wireless link of the terminal device:
未通过所述通信单元701接收到来自所述第一核心网设备的注册成功响应消息时,释放所述无线链路。When the communication unit 701 does not receive a registration success response message from the first core network device, the wireless link is released.
可选的,所述第二注册请求消息中包含所述第二通信系统中具有所述终端设备的上下文的第二核心网设备的设备信息,所述第二网络设备中包含所述第二核心网设备。Optionally, the second registration request message includes device information of a second core network device that has the context of the terminal device in the second communication system, and the second network device includes the second core network device network equipment.
可选的,所述处理单元702,还用于:Optionally, the processing unit 702 is further configured to:
在通过所述通信单元701向所述第一核心网设备发送第二注册请求消息之后,通过所述通信单元701接收来自所述第一核心网设备注册成功响应消息。After the communication unit 701 sends the second registration request message to the first core network device, the communication unit 701 receives a registration success response message from the first core network device.
可选的,所述第二通信系统为第五代5G通信系统,所述第一通信系统为第四代4G通信系统;所述第一注册请求消息为跟踪区域更新TAU请求消息,所述第二注册请求消息为TAU请求消息。Optionally, the second communication system is a fifth-generation 5G communication system, and the first communication system is a fourth-generation 4G communication system; the first registration request message is a tracking area update TAU request message, and the first The second registration request message is a TAU request message.
在一种实施方式中,所述通信装置700应用于图3中位于第一通信系统的第一核心网设备,例如图5所示的示例中的MME。所述处理单元702,用于:In an implementation manner, the communication apparatus 700 is applied to a first core network device located in the first communication system in FIG. 3 , for example, the MME in the example shown in FIG. 5 . The processing unit 702 is configured to:
在终端设备从第二通信系统切换到所述第一通信系统后,通过所述通信单元701接收来自空闲态的所述终端设备的注册请求消息;所述注册请求消息使用第二套安全上下文进行完整性保护;所述第二套安全上下文用于所述终端设备与位于所述第二通信系统中的第二网络设备进行安全验证;After the terminal device switches from the second communication system to the first communication system, the communication unit 701 receives a registration request message from the terminal device in the idle state; the registration request message uses the second set of security context to perform Integrity protection; the second set of security context is used for security verification between the terminal device and the second network device in the second communication system;
通过所述通信单元701向位于所述第二通信系统的第二核心网设备发送上下文请求消息;其中,所述上下文请求消息中包含所述注册请求消息,所述上下文请求消息用于请求所述终端设备的上下文,所述第二网络设备中包含所述第二核心网设备。Send a context request message to the second core network device located in the second communication system through the communication unit 701; wherein, the context request message includes the registration request message, and the context request message is used to request the In the context of the terminal device, the second network device includes the second core network device.
可选的,所述处理单元702,还用于:Optionally, the processing unit 702 is further configured to:
通过所述通信单元701接收来自所述第二核心网设备的上下文响应消息;其中,所述上下文响应消息用于指示请求所述终端设备的上下文成功;Receive a context response message from the second core network device through the communication unit 701; wherein the context response message is used to indicate that the request for the context of the terminal device is successful;
通过所述通信单元701向所述终端设备发送注册成功响应消息。Send a registration success response message to the terminal device through the communication unit 701 .
可选的,所述注册请求消息中包含所述第二通信系统中具有所述终端设备的上下文的所述第二核心网设备的设备信息;所述处理单元702,在通过所述通信单元701向位于所述第二通信系统的第二核心网设备发送上下文请求消息,包括:Optionally, the registration request message includes device information of the second core network device that has the context of the terminal device in the second communication system; the processing unit 702, through the communication unit 701 Sending a context request message to a second core network device located in the second communication system includes:
根据所述第二核心设备的设备信息,向所述第二核心网设备发送所述上下文请求消息。Sending the context request message to the second core network device according to the device information of the second core device.
可选的,所述第二通信系统为第五代5G通信系统,所述第一通信系统为第四代4G通信系统;所述注册请求消息为跟踪区域更新TAU请求消息。Optionally, the second communication system is a fifth-generation 5G communication system, and the first communication system is a fourth-generation 4G communication system; the registration request message is a tracking area update TAU request message.
在一种实施方式中,所述通信装置700应用于图3中位于第二通信系统的第二核心网 设备,例如图5所示的示例中的AMF。所述处理单元702,用于:In an implementation manner, the communication apparatus 700 is applied to a second core network device located in the second communication system in FIG. 3 , such as the AMF in the example shown in FIG. 5 . The processing unit 702 is configured to:
在终端设备从所述第二通信系统切换到第一通信系统后,通过所述通信单元701接收来自第一核心网设备的上下文请求消息;其中,所述第一核心网设备位于所述第一通信系统,所述上下文请求消息中包含注册请求消息,所述注册请求消息使用第二套安全上下文进行完整性保护;所述第二套安全上下文用于所述终端设备与位于所述第二通信系统中的第二网络设备进行安全验证,所述第二网络设备中包含所述第二核心设备;After the terminal device switches from the second communication system to the first communication system, the communication unit 701 receives a context request message from the first core network device; wherein the first core network device is located in the first In a communication system, the context request message includes a registration request message, and the registration request message uses a second set of security context for integrity protection; the second set of security context is used for the terminal device to communicate with the A second network device in the system performs security verification, and the second network device includes the second core device;
使用所述第二套安全上下文,对所述注册请求消息进行完整性保护校验。Perform integrity protection check on the registration request message by using the second set of security context.
可选的,所述处理单元702,还用于:Optionally, the processing unit 702 is further configured to:
在校验通过后,通过所述通信单元701向所述第一核心网设备发送上下文响应消息;其中,所述上下文响应消息用于指示请求所述终端设备的上下文成功。After the verification is passed, the communication unit 701 sends a context response message to the first core network device; wherein the context response message is used to indicate that the request for the context of the terminal device is successful.
可选的,所述注册请求消息中包含所述第二通信系统中具有所述终端设备的上下文的所述第二核心网设备的设备信息。Optionally, the registration request message includes device information of the second core network device that has the context of the terminal device in the second communication system.
可选的,所述第二通信系统为第五代5G通信系统,所述第一通信系统为第四代4G通信系统;所述注册请求消息为跟踪区域更新TAU请求消息。Optionally, the second communication system is a fifth-generation 5G communication system, and the first communication system is a fourth-generation 4G communication system; the registration request message is a tracking area update TAU request message.
在一种实施方式中,所述通信装置700应用于图4中的终端设备,例如图6所示的示例中的UE。所述处理单元702,用于:In an implementation manner, the communication apparatus 700 is applied to the terminal device in FIG. 4 , for example, the UE in the example shown in FIG. 6 . The processing unit 702 is configured to:
在所述终端设备从第二通信系统切换到第一通信系统后,获取第一套安全上下文;其中,其中,所述第一套安全上下文用于所述终端设备与位于所述第一通信系统中的第一网络设备进行安全验证;After the terminal device is switched from the second communication system to the first communication system, a first set of security context is acquired; wherein, the first set of security context is used for the terminal device and the first communication system The first network device in the network performs security verification;
在通过所述通信单元701向第一核心网设备发送注册请求消息之后,释放所述终端设备的无线链路;其中,所述注册请求消息使用所述第一套安全上下文进行完整性保护,所述第一网络设备中包含所述第一核心网设备;After the registration request message is sent to the first core network device through the communication unit 701, the wireless link of the terminal device is released; wherein, the registration request message uses the first set of security context for integrity protection, so The first network device includes the first core network device;
发起附着流程。Initiate the attach process.
可选的,所述处理单元702,在获取第一套安全上下文时,具体用于:Optionally, the processing unit 702, when acquiring the first set of security context, is specifically configured to:
根据设定的安全上下文映射算法,对所述第二套安全上下文进行计算,生成所述第一套安全上下文。Calculate the second set of security contexts according to the set security context mapping algorithm to generate the first set of security contexts.
可选的,所述处理单元702,在释放所述终端设备的无线链路时,具体用于:Optionally, the processing unit 702 is specifically configured to: when releasing the wireless link of the terminal device:
在通过所述通信单元701接收来自所述第一核心网设备的注册拒绝响应消息时,释放所述无线链路。When the communication unit 701 receives a registration rejection response message from the first core network device, release the wireless link.
可选的,所述注册拒绝响应消息包含拒绝原因指示,所述拒绝原值指示用于指示所述终端设备保持注册状态。Optionally, the registration rejection response message includes a rejection reason indication, and the rejection original value indication is used to instruct the terminal device to maintain the registration state.
可选的,所述处理单元702,在释放所述终端设备的无线链路时,具体用于:Optionally, the processing unit 702 is specifically configured to: when releasing the wireless link of the terminal device:
在所述无线链路异常时,释放所述无线链路。When the wireless link is abnormal, release the wireless link.
可选的,所述处理单元702,在释放所述终端设备的无线链路时,具体用于:Optionally, the processing unit 702 is specifically configured to: when releasing the wireless link of the terminal device:
未通过所述通信单元701接收到来自所述第一核心网设备的注册成功响应消息时,释放所述无线链路。When the communication unit 701 does not receive a registration success response message from the first core network device, the wireless link is released.
可选的,所述注册请求消息中包含所述第二通信系统中具有所述终端设备的上下文的第二核心网设备的设备信息,所述第二网络设备中包含所述第二核心网设备。Optionally, the registration request message includes device information of a second core network device that has the context of the terminal device in the second communication system, and the second network device includes the second core network device .
可选的,所述处理单元702,在发起附着流程时,具体用于:Optionally, the processing unit 702, when initiating the attach process, is specifically configured to:
通过所述通信单元701向所述第一核心网设备发送附着请求消息。Send an attach request message to the first core network device through the communication unit 701 .
可选的,所述第二通信系统为第五代5G通信系统,所述第一通信系统为第四代4G通信系统;所述注册请求消息为跟踪区域更新TAU请求消息。Optionally, the second communication system is a fifth-generation 5G communication system, and the first communication system is a fourth-generation 4G communication system; the registration request message is a tracking area update TAU request message.
需要说明的是,本申请以上实施例中对模块的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。It should be noted that the division of modules in the above embodiments of the present application is schematic, and is only a logical function division. In actual implementation, there may be other division methods. In addition, each function in each embodiment of the present application Units can be integrated into one processing unit, or physically exist separately, or two or more units can be integrated into one unit. The above-mentioned integrated units can be implemented in the form of hardware or in the form of software functional units.
所述集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)或处理器(processor)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(Read-Only Memory,ROM)、随机存取存储器(Random Access Memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。If the integrated unit is realized in the form of a software function unit and sold or used as an independent product, it can be stored in a computer-readable storage medium. Based on this understanding, the technical solution of the present application is essentially or part of the contribution to the prior art or all or part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium , including several instructions to make a computer device (which may be a personal computer, a server, or a network device, etc.) or a processor (processor) execute all or part of the steps of the methods described in the various embodiments of the present application. The aforementioned storage media include: U disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disk or optical disc and other media that can store program codes. .
基于相同的技术构思,本申请还提供了一种通信设备,所述通信设备可以应用于如图2所示的通信架构中的核心网设备或UE,可以实现以上实施例以及实例提供的通信方法,具有图7所示的通信装置的功能。参阅图8所示,所述通信设备800包括:通信模块801、处理器802以及存储器803。其中,所述通信模块801、所述处理器802以及所述存储器803之间相互连接。Based on the same technical concept, this application also provides a communication device, which can be applied to the core network device or UE in the communication architecture shown in Figure 2, and can implement the communication methods provided in the above embodiments and examples , having the functions of the communication device shown in FIG. 7 . Referring to FIG. 8 , the communication device 800 includes: a communication module 801 , a processor 802 and a memory 803 . Wherein, the communication module 801, the processor 802 and the memory 803 are connected to each other.
可选的,所述通信模块801、所述处理器802以及所述存储器803之间通过总线804相互连接。所述总线804可以是外设部件互连标准(peripheral component interconnect,PCI)总线或扩展工业标准结构(extended industry standard architecture,EISA)总线等。所述总线可以分为地址总线、数据总线、控制总线等。为便于表示,图8中仅用一条粗线表示,但并不表示仅有一根总线或一种类型的总线。Optionally, the communication module 801 , the processor 802 and the memory 803 are connected to each other through a bus 804 . The bus 804 may be a peripheral component interconnect standard (peripheral component interconnect, PCI) bus or an extended industry standard architecture (extended industry standard architecture, EISA) bus or the like. The bus can be divided into address bus, data bus, control bus and so on. For ease of representation, only one thick line is used in FIG. 8 , but it does not mean that there is only one bus or one type of bus.
所述通信模块801,用于接收和发送数据,实现与其他设备之间的通信交互。例如,当所述通信设备800应用于核心网设备时,所述通信模块801可以通过物理接口、通信模块、通信接口、输入输出接口实现。又例如,当所述通信设备800应用于终端设备时,所述通信模块801还可以通过收发器实现。The communication module 801 is configured to receive and send data to realize communication interaction with other devices. For example, when the communication device 800 is applied to a core network device, the communication module 801 may be implemented through a physical interface, a communication module, a communication interface, and an input/output interface. For another example, when the communication device 800 is applied to a terminal device, the communication module 801 may also be implemented by a transceiver.
在一种实施方式中,所述通信设备800可以为图3中的终端设备,例如图5所示的实例的UE。处理器802,用于:In an implementation manner, the communication device 800 may be the terminal device in FIG. 3 , such as the UE in the example shown in FIG. 5 . Processor 802 for:
在所述终端设备从第二通信系统切换到第一通信系统后,获取第一套安全上下文;其中,所述第一套安全上下文用于所述终端设备与位于所述第一通信系统中的第一网络设备进行安全验证;After the terminal device is switched from the second communication system to the first communication system, a first set of security context is obtained; wherein, the first set of security context is used for the terminal device to communicate with a device located in the first communication system The first network device performs security verification;
在通过所述通信模块801向第一核心网设备发送第一注册请求消息之后,释放所述终端设备的无线链路;其中,所述第一注册请求消息使用所述第一套安全上下文进行完整性保护,所述第一网络设备中包含所述第一核心网设备;After sending the first registration request message to the first core network device through the communication module 801, release the wireless link of the terminal device; wherein, the first registration request message uses the first set of security context for complete permanent protection, the first network device includes the first core network device;
通过所述通信模块801向所述第一核心网设备发送第二注册请求消息,其中,所述第 二注册请求消息使用第二套安全上下文进行完整性保护,所述第二套安全上下文用于所述终端设备与位于第二通信系统的第二网络设备进行安全验证。Send a second registration request message to the first core network device through the communication module 801, where the second registration request message uses a second set of security context for integrity protection, and the second set of security context is used for The terminal device performs security verification with the second network device located in the second communication system.
在另一种实施方式中,所述通信设备800可以为图3中位于第一通信系统的第一核心网设备,例如图5所示的示例中的MME。所述处理器802,用于:In another implementation manner, the communication device 800 may be a first core network device located in the first communication system in FIG. 3 , for example, the MME in the example shown in FIG. 5 . The processor 802 is configured to:
在终端设备从第二通信系统切换到所述第一通信系统后,通过所述通信模块801接收来自空闲态的所述终端设备的注册请求消息;所述注册请求消息使用第二套安全上下文进行完整性保护;所述第二套安全上下文用于所述终端设备与位于所述第二通信系统中的第二网络设备进行安全验证;After the terminal device switches from the second communication system to the first communication system, the communication module 801 receives a registration request message from the terminal device in the idle state; the registration request message uses the second set of security context to perform Integrity protection; the second set of security context is used for security verification between the terminal device and the second network device in the second communication system;
通过所述通信模块801向位于所述第二通信系统的第二核心网设备发送上下文请求消息;其中,所述上下文请求消息中包含所述注册请求消息,所述上下文请求消息用于请求所述终端设备的上下文,所述第二网络设备中包含所述第二核心网设备。Send a context request message to the second core network device located in the second communication system through the communication module 801; wherein, the context request message includes the registration request message, and the context request message is used to request the In the context of the terminal device, the second network device includes the second core network device.
在另一种实施方式中,所述通信设备800可以为图3中位于第二通信系统的第二核心网设备,例如图5所示的示例中的AMF。所述处理器802,用于:In another implementation manner, the communication device 800 may be a second core network device located in the second communication system in FIG. 3 , for example, the AMF in the example shown in FIG. 5 . The processor 802 is configured to:
在终端设备从所述第二通信系统切换到第一通信系统后,通过所述通信模块801接收来自第一核心网设备的上下文请求消息;其中,所述第一核心网设备位于所述第一通信系统,所述上下文请求消息中包含注册请求消息,所述注册请求消息使用第二套安全上下文进行完整性保护;所述第二套安全上下文用于所述终端设备与位于所述第二通信系统中的第二网络设备进行安全验证,所述第二网络设备中包含所述第二核心设备;After the terminal device switches from the second communication system to the first communication system, the communication module 801 receives a context request message from the first core network device; wherein the first core network device is located in the first In a communication system, the context request message includes a registration request message, and the registration request message uses a second set of security context for integrity protection; the second set of security context is used for the terminal device to communicate with the A second network device in the system performs security verification, and the second network device includes the second core device;
使用所述第二套安全上下文,对所述注册请求消息进行完整性保护校验。Perform integrity protection check on the registration request message by using the second set of security context.
在另一种实施方式中,所述通信设备800可以为图4中的终端设备,例如图6所示的示例中的UE。处理器802,用于:In another implementation manner, the communication device 800 may be the terminal device in FIG. 4 , for example, the UE in the example shown in FIG. 6 . Processor 802 for:
在所述终端设备从第二通信系统切换到第一通信系统后,获取第一套安全上下文;其中,其中,所述第一套安全上下文用于所述终端设备与位于所述第一通信系统中的第一网络设备进行安全验证;After the terminal device is switched from the second communication system to the first communication system, a first set of security context is acquired; wherein, the first set of security context is used for the terminal device and the first communication system The first network device in the network performs security verification;
在通过所述通信模块801向第一核心网设备发送注册请求消息之后,释放所述终端设备的无线链路;其中,所述注册请求消息使用所述第一套安全上下文进行完整性保护,所述第一网络设备中包含所述第一核心网设备;After the registration request message is sent to the first core network device through the communication module 801, the wireless link of the terminal device is released; wherein, the registration request message uses the first set of security context for integrity protection, so The first network device includes the first core network device;
发起附着流程。Initiate the attach process.
需要说明的是,本实施例不对所述处理器802的具体功能进行详细描述,所述处理器802的具体功能可以参考以上实施例以及实例提供的通信方法中的描述,以及图7所示实施例中对所述通信装置700的具体功能描述,此处不再赘述。It should be noted that this embodiment does not describe the specific functions of the processor 802 in detail. For the specific functions of the processor 802, refer to the descriptions in the communication methods provided in the above embodiments and examples, and the implementation shown in FIG. 7 The specific functions of the communication device 700 are described in the example, which will not be repeated here.
所述存储器803,用于存放程序指令和数据等。具体地,程序指令可以包括程序代码,该程序代码包括计算机操作指令。存储器803可能包含随机存取存储器(random access memory,RAM),也可能还包括非易失性存储器(non-volatile memory),例如至少一个磁盘存储器。处理器802执行存储器803所存放的程序指令,并使用所述存储器803中存储的数据,实现上述功能,从而实现上述实施例提供的通信方法。The memory 803 is used to store program instructions and data. Specifically, the program instructions may include program codes including computer operation instructions. The memory 803 may include a random access memory (random access memory, RAM), and may also include a non-volatile memory (non-volatile memory), such as at least one disk memory. The processor 802 executes the program instructions stored in the memory 803 and uses the data stored in the memory 803 to implement the above functions, thereby realizing the communication method provided by the above embodiments.
可以理解,本申请图8中的存储器803可以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(Read-Only Memory,ROM)、可编程只读存储器(Programmable ROM,PROM)、可擦除可编程只读存储器(Erasable PROM,EPROM)、电可擦除可编程只读存储器(Electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(Random Access Memory,RAM),其用作外部高速缓存。通过示例性但不是限制性说明,许多形式的RAM可用,例如静态随机存取存储器(Static RAM,SRAM)、动态随机存取存储器(Dynamic RAM,DRAM)、同步动态随机存取存储器(Synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(Double Data Rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(Enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(Synchlink DRAM,SLDRAM)和直接内存总线随机存取存储器(Direct Rambus RAM,DR RAM)。应注意,本文描述的系统和方法的存储器旨在包括但不限于这些和任意其它适合类型的存储器。It can be understood that the memory 803 in FIG. 8 of the present application may be a volatile memory or a non-volatile memory, or may include both volatile and non-volatile memories. Among them, the non-volatile memory can be read-only memory (Read-Only Memory, ROM), programmable read-only memory (Programmable ROM, PROM), erasable programmable read-only memory (Erasable PROM, EPROM), electronically programmable Erase Programmable Read-Only Memory (Electrically EPROM, EEPROM) or Flash. The volatile memory can be Random Access Memory (RAM), which acts as external cache memory. By way of illustration and not limitation, many forms of RAM are available, such as Static Random Access Memory (Static RAM, SRAM), Dynamic Random Access Memory (Dynamic RAM, DRAM), Synchronous Dynamic Random Access Memory (Synchronous DRAM, SDRAM), double data rate synchronous dynamic random access memory (Double Data Rate SDRAM, DDR SDRAM), enhanced synchronous dynamic random access memory (Enhanced SDRAM, ESDRAM), synchronous connection dynamic random access memory (Synchlink DRAM, SLDRAM ) and Direct Memory Bus Random Access Memory (Direct Rambus RAM, DR RAM). It should be noted that the memory of the systems and methods described herein is intended to include, but not be limited to, these and any other suitable types of memory.
基于以上实施例,本申请实施例还提供了一种计算机程序,当所述计算机程序在计算机上运行时,使得所述计算机执行以上实施例提供的通信方法。Based on the above embodiments, an embodiment of the present application further provides a computer program that, when the computer program is run on a computer, causes the computer to execute the communication method provided by the above embodiments.
基于以上实施例,本申请实施例还提供了一种计算机可读存储介质,该计算机可读存储介质中存储有计算机程序,所述计算机程序被计算机执行时,使得计算机执行以上实施例提供的通信方法。Based on the above embodiments, the embodiments of the present application also provide a computer-readable storage medium, in which a computer program is stored. When the computer program is executed by a computer, the computer executes the communication provided by the above embodiments. method.
其中,存储介质可以是计算机能够存取的任何可用介质。以此为例但不限于:计算机可读介质可以包括RAM、ROM、EEPROM、CD-ROM或其他光盘存储、磁盘存储介质或者其他磁存储设备、或者能够用于携带或存储具有指令或数据结构形式的期望的程序代码并能够由计算机存取的任何其他介质。Wherein, the storage medium may be any available medium that can be accessed by a computer. By way of example but not limitation: computer-readable media may include RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage media or other magnetic storage devices, or may be used to carry or store information in the form of instructions or data structures desired program code and any other medium that can be accessed by a computer.
基于以上实施例,本申请实施例还提供了一种芯片,所述芯片用于读取存储器中存储的计算机程序,实现以上实施例提供的通信方法。Based on the above embodiments, the embodiments of the present application further provide a chip, the chip is configured to read a computer program stored in a memory, and implement the communication method provided by the above embodiments.
基于以上实施例,本申请实施例提供了一种芯片系统,该芯片系统包括处理器,用于支持计算机装置实现以上实施例中业务设备、转发设备或站点设备所涉及的功能。在一种可能的设计中,所述芯片系统还包括存储器,所述存储器用于保存该计算机装置必要的程序和数据。该芯片系统,可以由芯片构成,也可以包含芯片和其他分立器件。Based on the above embodiments, an embodiment of the present application provides a chip system, the chip system includes a processor, configured to support a computer device to implement the functions involved in the service device, forwarding device, or site device in the above embodiments. In a possible design, the chip system further includes a memory, and the memory is used to store necessary programs and data of the computer device. The system-on-a-chip may consist of chips, or may include chips and other discrete devices.
综上所述,本申请实施例提供了一种通信方法、装置及设备。该方案中,在异系统切换后,连接态的终端设备在目标通信系统的首次注册流程未成功导致终端设备释放无线链路后,进入空闲态的终端设备再次发起注册流程时,向目标通信系统发送采用源通信系统对应的安全上下文进行完整性保护的注册请求消息。这样,目标通信系统接收到该注册请求消息后,可以基于该注册请求消息成功从源通信系统获取到该终端设备的上下文,进而可以使该终端设备成功注册到目标通信系统。综上,该方案可以避免终端设备再次发起的注册流程被拒绝的情况,提高异系统切换场景中终端设备的注册成功率,降低终端设备注册时延,最终可以保障终端设备的业务连续性,保障用户体验。To sum up, the embodiments of the present application provide a communication method, device, and equipment. In this solution, after inter-system handover, the terminal device in the connected state fails to perform the first registration process of the target communication system, causing the terminal device to release the wireless link. When the terminal device in the idle state initiates the registration process again, Sending a registration request message that uses the security context corresponding to the source communication system for integrity protection. In this way, after receiving the registration request message, the target communication system can successfully obtain the context of the terminal device from the source communication system based on the registration request message, and then enable the terminal device to successfully register with the target communication system. To sum up, this solution can avoid the situation that the registration process initiated by the terminal device is rejected again, improve the registration success rate of the terminal device in the inter-system handover scenario, reduce the registration delay of the terminal device, and finally ensure the business continuity of the terminal device and guarantee user experience.
本领域内的技术人员应明白,本申请的实施例可提供为方法、系统、或计算机程序产品。因此,本申请可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本申请可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。Those skilled in the art should understand that the embodiments of the present application may be provided as methods, systems, or computer program products. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.
本申请是参照根据本申请的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to the present application. It should be understood that each procedure and/or block in the flowchart and/or block diagram, and a combination of procedures and/or blocks in the flowchart and/or block diagram can be realized by computer program instructions. These computer program instructions may be provided to a general purpose computer, special purpose computer, embedded processor, or processor of other programmable data processing equipment to produce a machine such that the instructions executed by the processor of the computer or other programmable data processing equipment produce a An apparatus for realizing the functions specified in one or more procedures of the flowchart and/or one or more blocks of the block diagram.
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。These computer program instructions may also be stored in a computer-readable memory capable of directing a computer or other programmable data processing apparatus to operate in a specific manner, such that the instructions stored in the computer-readable memory produce an article of manufacture comprising instruction means, the instructions The device realizes the function specified in one or more procedures of the flowchart and/or one or more blocks of the block diagram.
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。These computer program instructions can also be loaded onto a computer or other programmable data processing device, causing a series of operational steps to be performed on the computer or other programmable device to produce a computer-implemented process, thereby The instructions provide steps for implementing the functions specified in the flow chart or blocks of the flowchart and/or the block or blocks of the block diagrams.
显然,本领域的技术人员可以对本申请进行各种改动和变型而不脱离本申请的保护范围。这样,倘若本申请的这些修改和变型属于本申请权利要求及其等同技术的范围之内,则本申请也意图包含这些改动和变型在内。Apparently, those skilled in the art can make various changes and modifications to this application without departing from the protection scope of this application. In this way, if these modifications and variations of the present application fall within the scope of the claims of the present application and their equivalent technologies, the present application is also intended to include these modifications and variations.
Claims (38)
- 一种通信方法,其特征在于,包括:A communication method, characterized in that, comprising:终端设备在从第二通信系统切换到第一通信系统后,获取第一套安全上下文;其中,所述第一套安全上下文用于所述终端设备与位于所述第一通信系统中的第一网络设备进行安全验证;After the terminal device switches from the second communication system to the first communication system, it acquires a first set of security context; wherein, the first set of security context is used for the terminal device to communicate with the first security context located in the first communication system. Security verification of network equipment;在所述终端设备向第一核心网设备发送第一注册请求消息之后,所述终端设备释放无线链路;其中,所述第一注册请求消息使用所述第一套安全上下文进行完整性保护,所述第一网络设备中包含所述第一核心网设备;After the terminal device sends a first registration request message to the first core network device, the terminal device releases the wireless link; wherein, the first registration request message uses the first set of security context for integrity protection, The first network device includes the first core network device;所述终端设备向所述第一核心网设备发送第二注册请求消息,其中,所述第二注册请求消息使用第二套安全上下文进行完整性保护,所述第二套安全上下文用于所述终端设备与位于第二通信系统的第二网络设备进行安全验证。The terminal device sends a second registration request message to the first core network device, where the second registration request message uses a second set of security context for integrity protection, and the second set of security context is used for the The terminal device performs security verification with the second network device located in the second communication system.
- 如权利要求1所述的方法,其特征在于,所述终端设备获取第一套安全上下文,包括:The method according to claim 1, wherein said terminal device obtaining a first set of security context comprises:所述终端设备根据设定的安全上下文映射算法,对所述第二套安全上下文进行计算,生成所述第一套安全上下文。The terminal device calculates the second set of security contexts according to the set security context mapping algorithm to generate the first set of security contexts.
- 如权利要求1或2所述的方法,其特征在于,所述终端设备释放无线链路,包括:The method according to claim 1 or 2, wherein the release of the wireless link by the terminal device comprises:在所述终端设备接收来自所述第一核心网设备的注册拒绝响应消息时,所述终端设备释放所述无线链路。When the terminal device receives the registration rejection response message from the first core network device, the terminal device releases the wireless link.
- 如权利要求3所述的方法,其特征在于,所述注册拒绝响应消息包含拒绝原因指示,所述拒绝原因指示用于指示所述终端设备保持注册状态。The method according to claim 3, wherein the registration refusal response message includes a refusal reason indication, and the refusal reason indication is used to instruct the terminal device to maintain a registration state.
- 如权利要求1或2所述的方法,其特征在于,所述终端设备释放无线链路,包括:The method according to claim 1 or 2, wherein the release of the wireless link by the terminal device comprises:在所述无线链路异常时,所述终端设备释放所述无线链路。When the wireless link is abnormal, the terminal device releases the wireless link.
- 如权利要求1或2所述的方法,其特征在于,所述终端设备释放无线链路,包括:The method according to claim 1 or 2, wherein the release of the wireless link by the terminal device comprises:未接收到来自所述第一核心网设备的注册成功响应消息时,所述终端设备释放所述无线链路。When the registration success response message from the first core network device is not received, the terminal device releases the wireless link.
- 如权利要求1-6任一项所述的方法,其特征在于,所述第二注册请求消息中包含所述第二通信系统中具有所述终端设备的上下文的第二核心网设备的设备信息,所述第二网络设备中包含所述第二核心网设备。The method according to any one of claims 1-6, wherein the second registration request message includes device information of a second core network device that has the context of the terminal device in the second communication system , the second network device includes the second core network device.
- 如权利要求1-7任一项所述的方法,其特征在于,在所述终端设备向所述第一核心网设备发送第二注册请求消息之后,所述方法还包括:The method according to any one of claims 1-7, wherein after the terminal device sends a second registration request message to the first core network device, the method further comprises:所述终端设备接收来自所述第一核心网设备注册成功响应消息。The terminal device receives a registration success response message from the first core network device.
- 如权利要求1-8任一项所述的方法,其特征在于,所述第二通信系统为第五代5G通信系统,所述第一通信系统为第四代4G通信系统;The method according to any one of claims 1-8, wherein the second communication system is a fifth-generation 5G communication system, and the first communication system is a fourth-generation 4G communication system;所述第一注册请求消息为跟踪区域更新TAU请求消息,所述第二注册请求消息为TAU请求消息。The first registration request message is a tracking area update TAU request message, and the second registration request message is a TAU request message.
- 一种通信方法,其特征在于,包括:A communication method, characterized in that, comprising:在终端设备从第二通信系统切换到第一通信系统后,位于所述第一通信系统的第一核心网设备接收来自空闲态的所述终端设备的注册请求消息;所述注册请求消息使用第二套安全上下文进行完整性保护;所述第二套安全上下文用于所述终端设备与位于所述第二通 信系统中的第二网络设备进行安全验证;After the terminal device switches from the second communication system to the first communication system, the first core network device located in the first communication system receives a registration request message from the terminal device in an idle state; the registration request message uses the first performing integrity protection with two sets of security contexts; the second set of security contexts is used to perform security verification between the terminal device and a second network device located in the second communication system;所述第一核心网设备向位于所述第二通信系统的第二核心网设备发送上下文请求消息;其中,所述上下文请求消息中包含所述注册请求消息,所述上下文请求消息用于请求所述终端设备的上下文,所述第二网络设备中包含所述第二核心网设备。The first core network device sends a context request message to a second core network device located in the second communication system; wherein the context request message includes the registration request message, and the context request message is used to request the In the context of the terminal device, the second network device includes the second core network device.
- 如权利要求10所述的方法,其特征在于,所述方法还包括:The method of claim 10, further comprising:所述第一核心网设备接收来自所述第二核心网设备的上下文响应消息;所述上下文响应消息用于指示请求所述终端设备的上下文成功;The first core network device receives a context response message from the second core network device; the context response message is used to indicate that the request for the context of the terminal device is successful;所述第一核心网设备向所述终端设备发送注册成功响应消息。The first core network device sends a registration success response message to the terminal device.
- 如权利要求10或11所述的方法,其特征在于,所述注册请求消息中包含所述第二通信系统中具有所述终端设备的上下文的所述第二核心网设备的设备信息;所述第一核心网设备向位于所述第二通信系统的第二核心网设备发送上下文请求消息,包括:The method according to claim 10 or 11, wherein the registration request message includes device information of the second core network device that has the context of the terminal device in the second communication system; the The first core network device sends a context request message to the second core network device located in the second communication system, including:所述第一核心网设备根据所述第二核心设备的设备信息,向所述第二核心网设备发送所述上下文请求消息。The first core network device sends the context request message to the second core network device according to the device information of the second core network device.
- 如权利要求10-12任一项所述的方法,其特征在于,所述第二通信系统为第五代5G通信系统,所述第一通信系统为第四代4G通信系统;The method according to any one of claims 10-12, wherein the second communication system is a fifth-generation 5G communication system, and the first communication system is a fourth-generation 4G communication system;所述注册请求消息为跟踪区域更新TAU请求消息。The registration request message is a tracking area update TAU request message.
- 一种通信方法,其特征在于,包括:A communication method, characterized in that, comprising:在终端设备从第二通信系统切换到第一通信系统后,第二核心网设备接收来自第一核心网设备的上下文请求消息;其中,所述第二核心网设备位于所述第二通信系统,所述第一核心网设备位于所述第一通信系统,所述上下文请求消息中包含注册请求消息,所述注册请求消息使用第二套安全上下文进行完整性保护;所述第二套安全上下文用于所述终端设备与位于所述第二通信系统中的第二网络设备进行安全验证,所述第二网络设备中包含所述第二核心设备;After the terminal device switches from the second communication system to the first communication system, the second core network device receives a context request message from the first core network device; wherein the second core network device is located in the second communication system, The first core network device is located in the first communication system, the context request message includes a registration request message, and the registration request message uses a second set of security context for integrity protection; the second set of security context uses performing security verification between the terminal device and a second network device located in the second communication system, where the second network device includes the second core device;所述第二核心网设备使用所述第二套安全上下文,对所述注册请求消息进行完整性保护校验。The second core network device uses the second set of security context to perform integrity protection check on the registration request message.
- 如权利要求14所述的方法,其特征在于,所述方法还包括:The method of claim 14, further comprising:在校验通过后,所述第二核心网设备向所述第一核心网设备发送上下文响应消息;所述上下文响应消息用于指示请求所述终端设备的上下文成功。After the verification is passed, the second core network device sends a context response message to the first core network device; the context response message is used to indicate that the request for the context of the terminal device is successful.
- 如权利要求14或15所述的方法,其特征在于,所述注册请求消息中包含所述第二通信系统中具有所述终端设备的上下文的所述第二核心网设备的设备信息。The method according to claim 14 or 15, wherein the registration request message includes device information of the second core network device having the context of the terminal device in the second communication system.
- 如权利要求14-16任一项所述的方法,其特征在于,所述第二通信系统为第五代5G通信系统,所述第一通信系统为第四代4G通信系统;The method according to any one of claims 14-16, wherein the second communication system is a fifth-generation 5G communication system, and the first communication system is a fourth-generation 4G communication system;所述注册请求消息为跟踪区域更新TAU请求消息。The registration request message is a tracking area update TAU request message.
- 一种通信装置,应用于终端设备,其特征在于,包括:A communication device applied to terminal equipment, characterized in that it includes:通信单元,用于接收和发送数据;a communication unit for receiving and sending data;处理单元,用于:processing unit for:在所述终端设备从第二通信系统切换到第一通信系统后,获取第一套安全上下文;其中,所述第一套安全上下文用于所述终端设备与位于所述第一通信系统中的第一网络设备进行安全验证;After the terminal device is switched from the second communication system to the first communication system, a first set of security context is obtained; wherein, the first set of security context is used for the terminal device to communicate with a device located in the first communication system The first network device performs security verification;在通过所述通信单元向第一核心网设备发送第一注册请求消息之后,释放所述终端设 备的无线链路;其中,所述第一注册请求消息使用所述第一套安全上下文进行完整性保护,所述第一网络设备中包含所述第一核心网设备;After sending the first registration request message to the first core network device through the communication unit, release the wireless link of the terminal device; wherein, the first registration request message uses the first set of security context for integrity protection, the first network device includes the first core network device;通过所述通信单元向所述第一核心网设备发送第二注册请求消息,其中,所述第二注册请求消息使用第二套安全上下文进行完整性保护,所述第二套安全上下文用于所述终端设备与位于第二通信系统的第二网络设备进行安全验证。Send a second registration request message to the first core network device through the communication unit, where the second registration request message uses a second set of security context for integrity protection, and the second set of security context is used for all The terminal device performs security verification with the second network device located in the second communication system.
- 如权利要求18所述的装置,其特征在于,所述处理单元,在获取第一套安全上下文时,具体用于:The device according to claim 18, wherein the processing unit, when acquiring the first set of security context, is specifically configured to:根据设定的安全上下文映射算法,对所述第二套安全上下文进行计算,生成所述第一套安全上下文。Calculate the second set of security contexts according to the set security context mapping algorithm to generate the first set of security contexts.
- 如权利要求18或19所述的装置,其特征在于,所述处理单元,在释放所述终端设备的无线链路时,具体用于:The apparatus according to claim 18 or 19, wherein the processing unit, when releasing the wireless link of the terminal device, is specifically configured to:在通过所述通信单元接收来自所述第一核心网设备的注册拒绝响应消息时,释放所述无线链路。Release the wireless link when the communication unit receives a registration rejection response message from the first core network device.
- 如权利要求20所述的装置,其特征在于,所述注册拒绝响应消息包含拒绝原因指示,所述拒绝原因指示用于指示所述终端设备保持注册状态。The apparatus according to claim 20, wherein the registration refusal response message includes a refusal reason indication, and the refusal reason indication is used to instruct the terminal device to maintain a registration state.
- 如权利要求18或19所述的装置,其特征在于,所述处理单元,在释放所述终端设备的无线链路时,具体用于:The apparatus according to claim 18 or 19, wherein the processing unit, when releasing the wireless link of the terminal device, is specifically configured to:在所述无线链路异常时,释放所述无线链路。When the wireless link is abnormal, release the wireless link.
- 如权利要求18或19所述的装置,其特征在于,所述处理单元,在释放所述终端设备的无线链路时,具体用于:The apparatus according to claim 18 or 19, wherein the processing unit, when releasing the wireless link of the terminal device, is specifically configured to:未通过所述通信单元接收到来自所述第一核心网设备的注册成功响应消息时,释放所述无线链路。releasing the wireless link when the registration success response message from the first core network device is not received through the communication unit.
- 如权利要求18-23任一项所述的装置,其特征在于,所述第二注册请求消息中包含所述第二通信系统中具有所述终端设备的上下文的第二核心网设备的设备信息,所述第二网络设备中包含所述第二核心网设备。The device according to any one of claims 18-23, wherein the second registration request message includes the device information of the second core network device that has the context of the terminal device in the second communication system , the second network device includes the second core network device.
- 如权利要求18-24任一项所述的装置,其特征在于,所述处理单元,还用于:The device according to any one of claims 18-24, wherein the processing unit is further configured to:在通过所述通信单元向所述第一核心网设备发送第二注册请求消息之后,通过所述通信单元接收来自所述第一核心网设备注册成功响应消息。After the communication unit sends the second registration request message to the first core network device, the communication unit receives a registration success response message from the first core network device.
- 如权利要求18-25任一项所述的装置,其特征在于,所述第二通信系统为第五代5G通信系统,所述第一通信系统为第四代4G通信系统;The device according to any one of claims 18-25, wherein the second communication system is a fifth-generation 5G communication system, and the first communication system is a fourth-generation 4G communication system;所述第一注册请求消息为跟踪区域更新TAU请求消息,所述第二注册请求消息为TAU请求消息。The first registration request message is a tracking area update TAU request message, and the second registration request message is a TAU request message.
- 一种通信装置,应用于第一核心网设备,所述第一核心网设备位于第一通信系统,其特征在于,包括:A communication device, applied to a first core network device, where the first core network device is located in a first communication system, characterized in that it includes:通信单元,用于接收和发送数据;a communication unit for receiving and sending data;处理单元,用于:processing unit for:在终端设备从第二通信系统切换到所述第一通信系统后,通过所述通信单元接收来自空闲态的所述终端设备的注册请求消息;所述注册请求消息使用第二套安全上下文进行完整性保护;所述第二套安全上下文用于所述终端设备与位于所述第二通信系统中的第二网络设备进行安全验证;After the terminal device switches from the second communication system to the first communication system, the communication unit receives a registration request message from the terminal device in the idle state; the registration request message uses the second set of security context for complete security protection; the second set of security context is used for security verification between the terminal device and the second network device located in the second communication system;通过所述通信单元向位于所述第二通信系统的第二核心网设备发送上下文请求消息;其中,所述上下文请求消息中包含所述注册请求消息,所述上下文请求消息用于请求所述终端设备的上下文,所述第二网络设备中包含所述第二核心网设备。Send a context request message to a second core network device located in the second communication system through the communication unit; wherein, the context request message includes the registration request message, and the context request message is used to request the terminal A device context, where the second network device includes the second core network device.
- 如权利要求27所述的装置,其特征在于,所述处理单元,还用于:The device according to claim 27, wherein the processing unit is further configured to:通过所述通信单元接收来自所述第二核心网设备的上下文响应消息;其中,所述上下文响应消息用于指示请求所述终端设备的上下文成功;receiving a context response message from the second core network device through the communication unit; wherein the context response message is used to indicate that the request for the context of the terminal device is successful;通过所述通信单元向所述终端设备发送注册成功响应消息。Sending a registration success response message to the terminal device through the communication unit.
- 如权利要求27或28所述的装置,其特征在于,所述注册请求消息中包含所述第二通信系统中具有所述终端设备的上下文的所述第二核心网设备的设备信息;所述处理单元,在通过所述通信单元向位于所述第二通信系统的第二核心网设备发送上下文请求消息,包括:The device according to claim 27 or 28, wherein the registration request message includes device information of the second core network device that has the context of the terminal device in the second communication system; the The processing unit, sending the context request message to the second core network device located in the second communication system through the communication unit, includes:根据所述第二核心设备的设备信息,向所述第二核心网设备发送所述上下文请求消息。Sending the context request message to the second core network device according to the device information of the second core device.
- 如权利要求27-29任一项所述的装置,其特征在于,所述第二通信系统为第五代5G通信系统,所述第一通信系统为第四代4G通信系统;The device according to any one of claims 27-29, wherein the second communication system is a fifth-generation 5G communication system, and the first communication system is a fourth-generation 4G communication system;所述注册请求消息为跟踪区域更新TAU请求消息。The registration request message is a tracking area update TAU request message.
- 一种通信装置,应用于第二核心网设备,所述第二核心网设备位于第二通信系统,其特征在于,包括:A communication device, applied to a second core network device, where the second core network device is located in a second communication system, characterized in that it includes:通信单元,用于接收和发送数据;a communication unit for receiving and sending data;处理单元,用于:processing unit for:在终端设备从所述第二通信系统切换到第一通信系统后,通过所述通信单元接收来自第一核心网设备的上下文请求消息;其中,所述第一核心网设备位于所述第一通信系统,所述上下文请求消息中包含注册请求消息,所述注册请求消息使用第二套安全上下文进行完整性保护;所述第二套安全上下文用于所述终端设备与位于所述第二通信系统中的第二网络设备进行安全验证,所述第二网络设备中包含所述第二核心设备;After the terminal device switches from the second communication system to the first communication system, the communication unit receives a context request message from the first core network device; wherein the first core network device is located in the first communication In the system, the context request message includes a registration request message, and the registration request message uses a second set of security context for integrity protection; the second set of security context is used for the terminal device and the terminal device located in the second communication system Perform security verification on the second network device in the second network device, the second network device includes the second core device;使用所述第二套安全上下文,对所述注册请求消息进行完整性保护校验。Perform integrity protection check on the registration request message by using the second set of security context.
- 如权利要求31所述的装置,其特征在于,所述处理单元,还用于:The device according to claim 31, wherein the processing unit is further configured to:在校验通过后,通过所述通信单元向所述第一核心网设备发送上下文响应消息;其中,所述上下文响应消息用于指示请求所述终端设备的上下文成功。After the verification is passed, the communication unit sends a context response message to the first core network device; wherein the context response message is used to indicate that the request for the context of the terminal device is successful.
- 如权利要求31或32所述的装置,其特征在于,所述注册请求消息中包含所述第二通信系统中具有所述终端设备的上下文的所述第二核心网设备的设备信息。The apparatus according to claim 31 or 32, wherein the registration request message includes the device information of the second core network device having the context of the terminal device in the second communication system.
- 如权利要求31-33任一项所述的装置,其特征在于,所述第二通信系统为第五代5G通信系统,所述第一通信系统为第四代4G通信系统;The device according to any one of claims 31-33, wherein the second communication system is a fifth-generation 5G communication system, and the first communication system is a fourth-generation 4G communication system;所述注册请求消息为跟踪区域更新TAU请求消息。The registration request message is a tracking area update TAU request message.
- 一种通信设备,其特征在于,包括:A communication device, characterized in that it includes:通信模块,用于接收和发送数据;A communication module for receiving and sending data;处理器,用于通过所述通信模块,实现权利要求1-17任一项所述的方法。A processor, configured to implement the method according to any one of claims 1-17 through the communication module.
- 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质中存储有计算机程序,当所述计算机程序在计算机上运行时,使得计算机执行权利要求1-17任一项所述的方法。A computer-readable storage medium, characterized in that a computer program is stored in the computer-readable storage medium, and when the computer program is run on a computer, the computer is made to execute the method described in any one of claims 1-17. method.
- 一种计算机程序产品,其特征在于,当所述计算机程序产品在计算机上运行时,使 得所述计算机执行权利要求1-17任一项所述的方法。A computer program product, characterized in that, when the computer program product is run on a computer, the computer is made to execute the method according to any one of claims 1-17.
- 一种芯片,其特征在于,所述芯片与存储器耦合,所述芯片读取存储器中存储的计算机程序,执行权利要求1-17任一项所述的方法。A chip, characterized in that the chip is coupled with a memory, and the chip reads a computer program stored in the memory to execute the method according to any one of claims 1-17.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202180007897.9A CN115885540A (en) | 2021-07-29 | 2021-07-29 | Communication method, device and equipment |
PCT/CN2021/109252 WO2023004683A1 (en) | 2021-07-29 | 2021-07-29 | Communication method, apparatus, and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2021/109252 WO2023004683A1 (en) | 2021-07-29 | 2021-07-29 | Communication method, apparatus, and device |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2023004683A1 true WO2023004683A1 (en) | 2023-02-02 |
Family
ID=85086030
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2021/109252 WO2023004683A1 (en) | 2021-07-29 | 2021-07-29 | Communication method, apparatus, and device |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN115885540A (en) |
WO (1) | WO2023004683A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117812549A (en) * | 2024-02-29 | 2024-04-02 | 荣耀终端有限公司 | Communication method and device |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130322407A1 (en) * | 2011-02-08 | 2013-12-05 | Ntt Docomo, Inc. | Mobile communication system, mobile communication method, packet data network gateway, and serving gateway |
CN112738881A (en) * | 2020-12-30 | 2021-04-30 | 展讯通信(上海)有限公司 | Network registration method and device |
CN112911658A (en) * | 2019-12-04 | 2021-06-04 | 大唐移动通信设备有限公司 | Communication method and device |
-
2021
- 2021-07-29 WO PCT/CN2021/109252 patent/WO2023004683A1/en active Application Filing
- 2021-07-29 CN CN202180007897.9A patent/CN115885540A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130322407A1 (en) * | 2011-02-08 | 2013-12-05 | Ntt Docomo, Inc. | Mobile communication system, mobile communication method, packet data network gateway, and serving gateway |
CN112911658A (en) * | 2019-12-04 | 2021-06-04 | 大唐移动通信设备有限公司 | Communication method and device |
CN112738881A (en) * | 2020-12-30 | 2021-04-30 | 展讯通信(上海)有限公司 | Network registration method and device |
Non-Patent Citations (2)
Title |
---|
"3 Generation Partnership Project; Technical Specification Group Services and System Aspects; Security architecture and procedures for 5G system (Release 17)", 3GPP STANDARD; TECHNICAL SPECIFICATION; 3GPP TS 33.501, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. SA WG3, no. V17.2.1, 5 July 2021 (2021-07-05), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France , pages 1 - 257, XP052030072 * |
"3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Non-Access-Stratum (NAS) protocol for Evolved Packet System (EPS); Stage 3 (Release 17))", 3GPP STANDARD; TECHNICAL SPECIFICATION; 3GPP TS 24.301, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. CT WG1, no. V17.3.0, 28 June 2021 (2021-06-28), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France , pages 1 - 564, XP052029846 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117812549A (en) * | 2024-02-29 | 2024-04-02 | 荣耀终端有限公司 | Communication method and device |
Also Published As
Publication number | Publication date |
---|---|
CN115885540A (en) | 2023-03-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10873889B2 (en) | Handover apparatus and method | |
US20210243597A1 (en) | Multi-RAT Access Stratum Security | |
US20190335332A1 (en) | Authorization and Verification Method and Apparatus | |
WO2018171703A1 (en) | Communication method and device | |
US9107066B2 (en) | Encryption in a wireless telecommunications | |
US10320754B2 (en) | Data transmission method and apparatus | |
US11553345B2 (en) | Communication terminal, network device, communication method, and non-transitory computer readable medium | |
WO2017147772A1 (en) | Method of transmitting information and core network access apparatus | |
US20220272607A1 (en) | Network Access Method and Communication Apparatus | |
AU2024200711A1 (en) | Managing security keys in a communication system | |
CN113170369B (en) | Method and apparatus for security context handling during intersystem changes | |
JP6473171B2 (en) | Indication of IMEISV via MAP for inter-MSC handover | |
WO2023004683A1 (en) | Communication method, apparatus, and device | |
US8995959B2 (en) | Prevention of mismatch of authentication parameter in hybrid communication system | |
TW201921987A (en) | A method and network device for transmitting data are provided | |
WO2022067815A1 (en) | Communication method and apparatus, and device | |
US20240114586A1 (en) | Handling communication errors during early data communication | |
EP4380298A1 (en) | Message transmission method and communication apparatus | |
US20240188164A1 (en) | Managing radio connections during early data commuinication via a distributed base station | |
WO2021146913A1 (en) | Information backup method and apparatus, storage medium and computer device | |
US20120198227A1 (en) | Cipher key generation in communication system | |
CN110933669A (en) | Method for quickly registering cross-RAT user |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 21951291 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 21951291 Country of ref document: EP Kind code of ref document: A1 |