WO2023011407A1 - Communication method and apparatus - Google Patents

Communication method and apparatus Download PDF

Info

Publication number
WO2023011407A1
WO2023011407A1 PCT/CN2022/109421 CN2022109421W WO2023011407A1 WO 2023011407 A1 WO2023011407 A1 WO 2023011407A1 CN 2022109421 W CN2022109421 W CN 2022109421W WO 2023011407 A1 WO2023011407 A1 WO 2023011407A1
Authority
WO
WIPO (PCT)
Prior art keywords
policy
interface
security protection
plane security
user plane
Prior art date
Application number
PCT/CN2022/109421
Other languages
French (fr)
Chinese (zh)
Inventor
雷骜
李�赫
吴义壮
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2023011407A1 publication Critical patent/WO2023011407A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • H04W12/37Managing security policies for mobile devices or for controlling mobile applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W92/00Interfaces specially adapted for wireless communication networks
    • H04W92/04Interfaces between hierarchically different network devices
    • H04W92/10Interfaces between hierarchically different network devices between terminal device and access point, i.e. wireless air interface
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W92/00Interfaces specially adapted for wireless communication networks
    • H04W92/16Interfaces between hierarchically similar devices
    • H04W92/18Interfaces between hierarchically similar devices between terminal devices

Definitions

  • the present application relates to the technical field of communication, and more specifically, to a communication method and device.
  • the cellular communication network introduces proximity services (Proximity services, ProSe) communication.
  • ProSe proximity services
  • the terminal device can perform auxiliary communication through the relay device. That is, the terminal device communicates with the relay device, and the relay device communicates with the access network device, so that the terminal device can access the network and obtain corresponding services.
  • the security protection strategy of the Uu interface used by the relay device to establish a relay-type protocol data unit (protocol data unit, PDU) session may be different from the security protection strategy of the PC5 interface used by the relay device to establish a PC5 connection with the terminal device. Matching, resulting in the degradation of security protection, waste of resources and other issues. Therefore, how to make the relay device establish a relay type PDU session and match the strategy used by the PC5 connection is an urgent problem to be solved.
  • PDU protocol data unit
  • the present application provides a communication method and device.
  • a communication method includes:
  • the first network element obtains the first policy, and the first policy is when the first terminal device accesses the network through the first relay device, the Uu interface user plane security used by the first relay device to establish a relay-type protocol data unit PDU session protection strategy.
  • the first network element determines a second policy according to the first policy, and the second policy is used to determine whether to enable user plane security protection of the PC5 interface between the first terminal device and the first relay device.
  • the first network element sends the second policy to the first terminal device and/or the first relay device.
  • the first network element can obtain the Uu interface user plane security protection policy, and determine the PC5 interface user plane security protection policy according to the Uu interface user plane security protection policy, so that the Uu interface and PC5 interface user plane security protection strategy matches. If the user plane security protection policies of the Uu interface and the PC5 interface match, that is, the Uu interface and the PC5 interface use the same level of user plane security protection, the user plane security protection of both the Uu interface and the PC5 interface can be enabled or disabled.
  • the user plane security protection policies of the Uu interface and the PC5 interface do not match, for example, the user plane security protection of the Uu interface is enabled but the user plane security protection of the PC5 interface is not enabled, the first terminal device and the first relay
  • the PC5 connection established between the devices is weak against external attacks, and the Uu interface user plane security protection of the first relay device does not play its due role, or the Uu interface user plane security protection is not enabled, and the PC5 interface is enabled
  • User plane security protection when the first relay device does not need to enable the Uu interface user plane security protection, the PC5 connection established between the first terminal device and the first relay device enables the user plane security protection, resulting in Waste of device processing and network resources. Therefore, adopting the solution of the present application can match the user plane security protection policy of the Uu interface and the PC5 interface, and solve problems such as security protection degradation and resource waste caused by policy mismatch.
  • the second policy is the user plane security protection policy of the PC5 interface or whether to enable the user plane security protection of the PC5 interface.
  • the first network element determines the second strategy according to the first strategy, including:
  • the first network element determines a second policy, and the second policy indicates enabling the user plane security protection of the PC5 interface.
  • the first network element determines a second policy, and the second policy indicates that the user plane security protection of the PC5 interface is not enabled.
  • the first policy indicates preference to enable user plane security protection of the Uu interface
  • the first network element determines a second policy, and the second policy indicates preference to enable user plane security protection of the PC5 interface.
  • the first network element determines whether to enable user plane security protection of the PC5 interface.
  • the first network element sends first indication information to the first remote terminal and/or the first relay device, where the first indication information is used to indicate whether to enable user plane security protection of the PC5 interface.
  • the method further includes:
  • the first network element obtains the third policy, and the third policy is the Uu interface signaling plane security protection policy used by the first relay device to establish a relay-type PDU session when the first terminal device accesses the network through the first relay device .
  • the first network element determines a fourth policy according to the third policy, and the fourth policy is used to determine whether to enable the signaling plane security protection of the PC5 interface between the first terminal device and the first relay device.
  • the first network element sends the fourth policy to the first remote terminal and/or the first relay device.
  • the first network element can obtain the Uu interface signaling plane security protection policy, and determine the PC5 interface signaling plane security protection policy according to the Uu interface signaling plane security protection policy, so that the Uu interface and the PC5 interface signal Match the face security protection policy.
  • the third policy is the signaling plane security protection policy of the PC5 interface or whether to enable the signaling plane security protection of the PC5 interface.
  • the first network element determines a fourth strategy according to the third strategy, including:
  • the first network element determines a fourth policy, and the fourth policy indicates enabling the signaling plane security protection of the PC5 interface.
  • the third policy indicates that the signaling plane security protection of the Uu interface is not enabled
  • the first network element determines a fourth policy, and the fourth policy indicates that the signaling plane security protection of the PC5 interface is not enabled.
  • the method when the second policy indicates enabling the user plane security protection of the PC5 interface, the method further includes:
  • the first network element determines a fourth policy according to the second policy, and the fourth policy indicates enabling signaling plane security protection of the PC5 interface.
  • the method further includes:
  • the first network element determines ProSe parameters corresponding to the first terminal device and/or the first relay device.
  • the first network element sends a first request message to the second network element, where the first request message is used to request a first policy, and the first request message includes a ProSe parameter.
  • the first network element obtains the first policy, including:
  • the first network element obtains the first policy from the second network element.
  • the method further includes:
  • the first network element determines ProSe parameters corresponding to the first terminal device and/or the first relay device.
  • the first network element obtains the first policy, including:
  • the first network element acquires the first policy locally at least according to the ProSe parameter.
  • a communication method in a second aspect, includes:
  • a second correspondence is obtained, where the second correspondence is a one-to-one correspondence between N ProSe parameters of adjacent services and N second strategies, where N is a positive integer.
  • the second correspondence is associated with the first correspondence
  • the first correspondence is a one-to-one correspondence between N ProSe parameters and N first policies
  • the first policy is a Uu interface user plane security protection policy.
  • the first terminal device and the first relay device may respectively acquire the second correspondence, and the second correspondence is associated with the first correspondence.
  • the second policy corresponding to the first ProSe parameter can be determined, and the PC5 connection can be established using this policy.
  • the Uu interface user plane security protection policy used by the first relay device when establishing the relay PDU session is the same as the PC5 interface user plane security protection policy used to establish the PC5 connection matching.
  • the method further includes:
  • a fourth correspondence is acquired, where the fourth correspondence is a one-to-one correspondence between N ProSe parameters of adjacent services and N fourth strategies, where N is a positive integer.
  • the fourth correspondence is associated with the third correspondence
  • the third correspondence is a one-to-one correspondence between N ProSe parameters and N third strategies
  • the third strategy is a Uu interface signaling plane security protection strategy.
  • determine the fourth policy corresponding to the first ProSe parameter, and the fourth policy corresponding to the first ProSe parameter is used to determine whether to enable the signaling plane security of the PC5 interface between the first terminal device and the first relay device Protect.
  • the first terminal device and the first relay device may respectively acquire the fourth correspondence, and the fourth correspondence is associated with the third correspondence.
  • a fourth strategy corresponding to the first ProSe parameter can be determined, and the PC5 connection can be established using this strategy.
  • the Uu interface signaling plane security protection strategy used by the first relay device when establishing a relay PDU session is the same as the PC5 interface signaling plane security policy used to establish a PC5 connection. match the protection strategy.
  • a communication method includes:
  • the third network element obtains the second policy, where the second policy is a PC5 interface user plane security protection policy used when the first terminal device establishes a PC5 connection with the first relay device.
  • the third network element determines the first strategy according to the second strategy, and the first strategy is a Uu interface user plane security protection strategy used by the first relay device to establish a relay-type protocol data unit PDU session.
  • the third network element establishes a relay-type PDU session for the first relay device according to the first policy.
  • the third network element when the third network element needs to establish a relay-type PDU session for the first relay device, the third network element can use the PC5
  • the interface user plane security protection policy is used to determine the Uu interface user plane security protection policy used by the first relay device to establish a relay-type PDU session, so that the first relay device establishes the PC5 connection using the same strategy as the relay-type PDU session.
  • the policy used by the PDU session matches.
  • the third network element determines the first strategy according to the second strategy, including:
  • the third network element determines the first policy, and the first policy indicates enabling the user plane security protection of the Uu interface.
  • the third network element determines the first policy, and the first policy indicates that the user plane security protection of the Uu interface is not enabled.
  • the third network element determines the first policy, and the first policy indicates preference to enable the user plane security protection of the Uu interface.
  • the method further includes:
  • the third network element acquires a fourth policy, where the fourth policy is a PC5 interface signaling plane security protection policy used when the first terminal device establishes a PC5 connection with the first relay device.
  • the third network element determines a third strategy according to the fourth strategy, and the first strategy is a Uu interface signaling plane security protection strategy used by the first relay device to establish a relay-type PDU session.
  • the third network element establishes a relay-type PDU session for the first relay device according to the third policy.
  • a communication device in a fourth aspect, includes a module or a unit configured to execute the method in any possible implementation manner of the first aspect.
  • a communication device including:
  • the transceiver unit is configured to obtain a second correspondence, where the second correspondence is a one-to-one correspondence between N adjacent service ProSe parameters and N second strategies, where N is a positive integer.
  • the second correspondence is associated with the first correspondence
  • the first correspondence is a one-to-one correspondence between N ProSe parameters and N first policies
  • the first policy is a Uu interface user plane security protection policy.
  • the transceiver unit is further configured to obtain the first ProSe parameter.
  • the processing unit is configured to determine a second strategy corresponding to the first ProSe parameter according to the second correspondence, and the second strategy corresponding to the first ProSe parameter is used to determine whether to enable the PC5 interface between the first terminal device and the first relay device user plane security protection.
  • the processing unit is further configured to establish the PC5 connection according to the second policy corresponding to the first ProSe parameter.
  • the transceiver unit is further configured to acquire a fourth correspondence, where the fourth correspondence is a one-to-one correspondence between N adjacent service ProSe parameters and N fourth strategies, where N is a positive integer.
  • the fourth correspondence is associated with the third correspondence
  • the third correspondence is a one-to-one correspondence between N ProSe parameters and N third strategies
  • the third strategy is a Uu interface signaling plane security protection strategy.
  • the processing unit is further configured to determine a fourth strategy corresponding to the first ProSe parameter according to the fourth correspondence, and the fourth strategy corresponding to the first ProSe parameter is used to determine whether to enable the PC5 between the first terminal device and the first relay device. Interface signaling plane security protection.
  • a communication device including:
  • the transceiver unit is configured to acquire a second policy, which is a PC5 interface user plane security protection policy used when the first terminal device establishes a PC5 connection with the first relay device.
  • a second policy which is a PC5 interface user plane security protection policy used when the first terminal device establishes a PC5 connection with the first relay device.
  • the processing unit is configured to determine the first strategy according to the second strategy, and the first strategy is a Uu interface user plane security protection strategy used by the first relay device to establish a relay-type protocol data unit PDU session.
  • the processing unit is further configured to establish a relay-type PDU session for the first relay device according to the first policy.
  • the processing unit is configured to determine the first strategy according to the second strategy, including:
  • the processing unit determines the first policy, and the first policy indicates to enable the user plane security protection of the Uu interface.
  • the processing unit determines the first policy, and the first policy indicates that the user plane security protection of the Uu interface is not enabled.
  • the processing unit determines the first policy, and the first policy indicates preference to enable the user plane security protection of the Uu interface.
  • the transceiver unit is further configured to acquire a fourth policy, which is a PC5 interface signaling plane security protection policy used when the first terminal device establishes a PC5 connection with the first relay device.
  • a fourth policy which is a PC5 interface signaling plane security protection policy used when the first terminal device establishes a PC5 connection with the first relay device.
  • the processing unit is further configured to determine a third strategy according to the fourth strategy, where the first strategy is a Uu interface signaling plane security protection strategy used by the first relay device to establish a relay-type PDU session.
  • the processing unit is further configured to establish a relay-type PDU session for the first relay device according to the third strategy.
  • a communication device including at least one processor.
  • the memory is used to store computer programs.
  • the processor executes the computer programs or instructions stored in the memory, so that the communication device executes the method in any possible implementation manner of the first aspect to the third aspect.
  • a computer-readable storage medium including a computer program.
  • the computer program runs on a computer, the computer executes the method in any possible implementation manner of the first aspect to the third aspect.
  • a chip is provided, and a processing circuit is disposed on the chip, and the processing circuit is configured to execute the method in any possible implementation manner of the first aspect to the third aspect.
  • a computer program product includes: a computer program (also referred to as code, or instruction), when the computer program is executed, the computer executes any one of the first aspect to the third aspect. method in one possible implementation.
  • a computer program also referred to as code, or instruction
  • Fig. 1 shows the architecture of a communication system to which the embodiment of the present application is applicable.
  • Fig. 2 shows an example of a schematic interaction diagram of the method proposed in this application.
  • Fig. 3 shows another example of a schematic interaction diagram of the method proposed in this application.
  • Fig. 4 shows another example of a schematic interaction diagram of the method proposed in this application.
  • Fig. 5 shows another example of a schematic interaction diagram of the method proposed in this application.
  • Fig. 6 shows a schematic block diagram of a communication device provided by the present application.
  • Fig. 7 shows another schematic block diagram of a communication device provided by this application.
  • Fig. 1 shows the architecture of a communication system to which the embodiment of the present application is applicable.
  • the core network includes, but is not limited to, data storage management network elements, mobility management network elements, network open network elements, user plane function network elements, and session management network elements.
  • the data storage management network element is a network element used to store and manage the data of the terminal equipment, for example, in a 5G network, it may be a unified data management function network element (unified data management, UDM).
  • UDM unified data management function network element
  • the unified data management function network element may still be a UDM network element, or may have other names, which are not limited in this application.
  • the mobility management network element is a network element used to manage the mobility of terminal equipment.
  • it may be a mobility management entity (mobility management entity, MME), and in a 5G network, it may be Access and mobility management function (access and mobility management function, AMF) network element.
  • MME mobility management entity
  • AMF Access and mobility management function
  • the access and mobility management functional network element may still be an AMF network element, or may have other names, which are not limited in this application.
  • the network exposure network element is responsible for providing network functions to third-party applications.
  • it can be a network exposure function (NEF) network element.
  • NEF network exposure function
  • the network element with the network opening function may still be an NEF network element, or may have other names, which are not limited in this application.
  • the user plane function network element is responsible for forwarding and receiving user data, for example, in a 5G network, it may be a user plane function (user plane function, UPF) network element.
  • UPF user plane function
  • the user plane functional network element may still be a UPF network element, or may have other names, which are not limited in this application.
  • the session management network element is responsible for the selection of user plane network elements, Internet protocol (internet protocol, IP) address allocation, session establishment, modification, release, etc.
  • Internet protocol Internet protocol
  • IP Internet protocol
  • SMF session management function
  • the network element with the session management function may still be an SMF network element, or may have other names, which are not limited in this application.
  • An access network device is a device that provides wireless communication functions for terminal devices.
  • it can be an access point (access point, AP) in WLAN, a base transceiver station (BTS) in GSM or CDMA, or a It is a base station (nodeB, NB) in WCDMA, or a gNB in a new wireless system (new radio, NR) system, or an evolved base station (evolutional node B, eNB or eNodeB) in LTE.
  • AP access point
  • BTS base transceiver station
  • NB base station
  • gNB new wireless system
  • new radio new radio, NR
  • evolutional node B evolutional node B, eNB or eNodeB
  • 5G network and may also be a radio access network device (radio access network, RAN).
  • radio access network radio access network
  • Terminal equipment may refer to user equipment (user equipment, UE), access terminal, subscriber unit, subscriber station, mobile station, mobile station, remote station, remote terminal, mobile device, user terminal, terminal, wireless communication device, user agent, or user device.
  • the terminal device may also be a cellular phone, a cordless phone, a session initiation protocol (SIP) phone, a wireless local loop (WLL) station, a personal digital assistant (PDA), a Functional handheld devices, computing devices or other processing devices connected to wireless modems, vehicle-mounted devices, drones, wearable devices, terminal devices in future 5G networks or future evolution of public land mobile networks (public land mobile network, PLMN), etc., which are not limited in this embodiment of the present application.
  • SIP session initiation protocol
  • WLL wireless local loop
  • PDA personal digital assistant
  • the terminal device in this application supports proximity-based services (Proximity-based services, ProSe) communication. That is, the terminal device can establish a side link (side link) connection with the relay device, and access the network through the relay device. The communication between the terminal device and the relay device is through the PC5 interface.
  • the terminal device can also be called a remote UE (remote UE).
  • the relay device also supports ProSe communication.
  • the relay device communicates with the remote UE through the PC5 interface, and the relay device communicates with the access network device through the Uu interface.
  • the relay device may be a terminal device or a wireless access device (for example, an access device deployed by an operator).
  • the UDM acquires a first correspondence, where the first correspondence is a correspondence between a proximity-based services (ProSe) parameter and a user plane security protection policy (denoted as the first policy) of the Uu interface.
  • the first strategy is a user plane security protection strategy for the Uu interface used by the relay device to establish a relay-type protocol data unit (protocol data unit, PDU) session when the remote UE accesses the network through the relay device.
  • the first policy is used to indirectly determine whether to enable the user plane security protection used by the relay type PDU session established by the relay device.
  • the first correspondence is preconfigured in the UDM.
  • the UDM obtains the first corresponding relationship from a ProSe application server (ProSe application server) or an application function (application function, AF) network element. It should be noted that the UDM can obtain the first corresponding relationship directly from the ProSe application server or the application function network element, or indirectly obtain the first corresponding relationship through the network exposure function (NEF) network element.
  • ProSe application server ProSe application server
  • application function application function, AF
  • NEF network exposure function
  • the ProSe parameter is a relay service code (relay service code, RSC) parameter. That is, the first correspondence is the correspondence between the RSC parameter and the first policy. For example, the first corresponding relationship may be the content shown in Table 1.
  • RSC relay service code
  • the ProSe parameters are single network slice selection assistance information (single network slice selection assistance information, S-NSSAI) parameters and data network name (data network name, DNN) parameters. That is, the first correspondence is the correspondence between the S-NSSAI and/or the DNN and the first policy. For example, the first corresponding relationship may be the content shown in Table 2.
  • the ProSe parameter is S-NSSAI and/or DNN information
  • the S-NSSAI parameter used by the relay device to establish a relay-type PDU session should be the same as that in the ProSe parameter
  • the S-NSSAI parameters of the relay device shall be the same, and/or the DNN parameters used by the relay device to establish a relay type PDU session shall be the same as the DNN parameters in the ProSe parameters.
  • the relay device and the remote UE are served by the same UDM (for example, UDM#1), and the first corresponding relationship may be configured in UDM#1.
  • the relay device and the remote UE are served by different UDMs (for example, the relay device is served by UDM#1, and the remote UE is served by UDM#2), then UDM#1 and UDM
  • the first corresponding relationship is configured in #2. That is, the same first correspondence is configured in UDM#1 and UDM#2.
  • the SMF acquires the first correspondence.
  • the method may not include S201, but may include S202; or, the method may include both S201 and S202; or, the method may include S201, but not include S202.
  • the relay device #1 (an example of the first relay device) sends a first request message to the AMF, where the first request message is used to request the proximity-based services (Proximity-based services, ProSe) parameters corresponding to the relay device #1 , and/or the remote UE#1 (an example of the first terminal device) sends a second request message to the AMF, where the second request message is used to request the proximity-based services (Proximity-based services, ProSe) parameters corresponding to the remote UE#1.
  • the AMF receives the first request message from the relay device #1 and/or the AMF receives the second request message from the remote UE #1.
  • the first request message may also carry information #1, where the information #1 indicates that the relay device #1 has a relay capability.
  • the second request message may also carry information #2, where the information #2 indicates that the remote UE #1 supports accessing the network through the relay device.
  • relay device #1 and the remote UE#1 may be served by the same AMF, or may be served by different AMFs.
  • the AMF determines that the relay device #1 has a relay capability, and/or determines that the remote UE#1 supports network access through the relay device.
  • the AMF may also determine the relay service supported by the relay device #1, and/or determine the relay service supported by the remote UE#1.
  • the AMF sends the third request message and/or the fourth request message to the PCF.
  • the PCF receives the third request message and/or the fourth request message from the AMF.
  • the third request message is triggered by the first request message, and is used to request the ProSe parameter corresponding to the relay device #1
  • the fourth request message is triggered by the second request message, and is used to request the ProSe parameter corresponding to the remote UE #1 from the PCF .
  • the AMF may carry the relay service information supported by the relay device #1 in the third request message; the AMF may carry the relay service information of the remote UE#1 in the fourth request message.
  • the AMF can request the ProSe parameter of the relay device #1 and the ProSe parameter of the remote UE#1 from the same PCF, or, The AMF may also separately request the ProSe parameters of the relay device #1 and the ProSe parameters of the remote UE#1 from different PCFs.
  • the different AMFs may request the ProSe parameters of the relay device #1 and the ProSe parameters of the remote UE#1 from the same PCF, or the different AMFs may also request The ProSe parameters of the relay device #1 and the ProSe parameters of the remote UE #1 may be requested from different PCFs respectively.
  • the PCF determines the ProSe parameter corresponding to the relay device #1, and/or determines the ProSe parameter corresponding to the remote UE#1.
  • the PCF determines the ProSe parameters corresponding to the relay device #1 according to the relay service supported by the relay device #1. And/or the PCF determines the ProSe parameter corresponding to the remote UE#1 according to the relay service supported by the remote UE#1.
  • the ProSe parameter may be an RSC parameter.
  • the ProSe parameters may be S-NSSAI parameters and/or DNN parameters.
  • the PCF may first determine the RSC parameters, and then determine the S-NSSAI parameters and/or the DNN parameters according to the RSC parameters.
  • the ProSe parameters corresponding to the remote UE#1 are the same as the ProSe parameters corresponding to the relay device #1.
  • the remote UE#1 can access the network through the relay device #1, and the ProSe parameter corresponding to the remote UE#1 and the ProSe parameter corresponding to the relay device #1 are recorded as ProSe parameter #1.
  • the ProSe parameter is an S-NSSAI parameter and/or a DNN parameter
  • the S-NSSAI parameter used by the relay device #1 to establish a relay type PDU session
  • the NSSAI parameters and/or DNN parameters shall be the same as the S-NSSAI parameters and/or DNN parameters in the ProSe parameters.
  • the PCF sends a fifth request message to the UDM, where the fifth request message includes ProSe parameter #1.
  • the UDM receives the fifth request message from the PCF.
  • ProSe parameter #1 included in the fifth request message will be described below.
  • ProSe parameter #1 may be RSC parameter #1.
  • ProSe parameter #1 may be S-NSSAI parameter #1 and/or DNN parameter #1.
  • the UDM determines the first policy #1 according to the first correspondence and the ProSe parameter #1.
  • the first corresponding relationship configured in the UDM is the corresponding relationship between the RSC parameter and the first policy
  • the ProSe parameter #1 included in the third request message is the RSC parameter #1
  • the UDM according to the RSC parameter # 1 and the first corresponding relationship, the first policy #1 is determined.
  • the first correspondence configured in the UDM is the correspondence between the S-NSSAI parameter and/or the DNN parameter and the first policy
  • the ProSe parameter #1 included in the third request message is the S-NSSAI parameter #1 and/or DNN parameter #1
  • the UDM determines the first strategy #1 according to the S-NSSAI parameter #1 and/or DNN parameter #1 and the first corresponding relationship.
  • the UDM sends the first policy #1 to the PCF. Accordingly, the PCF receives the first policy #1.
  • the method further includes the following S210-S212.
  • Case A The method does not include S201 but includes S202.
  • Situation B The method includes S201, but in S208 the UDM does not determine the first policy #1; or in S209 the UDM does not send the first policy #1 to the PCF.
  • Case C The operator configures the PCF to obtain the first policy #1 from the SMF.
  • the PCF sends a sixth request message to the SMF, where the sixth request message includes ProSe parameter #1.
  • the SMF accepts the sixth request message from the PCF.
  • the SMF determines a first policy #1 according to the first correspondence and the ProSe parameter #1.
  • the SMF sends the first policy #1 to the PCF.
  • the PCF receives the first policy #1 from the SMF.
  • the PCF determines the second strategy (referred to as the second strategy #1) according to the first strategy #1, and the second strategy #1 is used to determine whether to enable the user of the PC5 interface between the remote UE#1 and the relay device #1 Surface security protection.
  • the PCF determines the second policy #1 according to the first policy #1.
  • the second policy #1 is a user plane security protection policy for the PC5 interface.
  • the first policy #1 indicates enabling the user plane security protection of the Uu interface, that is, the first policy #1 is that the user plane security protection policy of the Uu interface is REQUIRED.
  • the PCF determines the second policy #1 according to the first policy #1, and the second policy #1 indicates enabling the user plane security protection of the PC5 interface, that is, the second policy #1 is that the user plane security protection policy of the PC5 interface is REQUIRED.
  • the second policy #1 is a user plane confidentiality and/or integrity protection policy of the PC5 interface.
  • the first policy #1 indicates to enable the user plane confidentiality protection and/or the user plane integrity protection of the Uu interface, that is, the first policy #1 is that the user plane confidentiality and/or integrity protection policy of the Uu interface is REQUIRED.
  • the second policy #1 indicates to enable the user plane confidentiality protection and/or the user plane integrity protection of the PC5 interface, that is, the second policy #1 is that the user plane confidentiality and/or integrity protection policy of the PC5 interface is REQUIRED.
  • the second policy #1 is that the user plane confidentiality and/or integrity protection policy of the PC5 interface is REQUIRED
  • the second policy #1 also indicates that the signaling plane confidentiality protection and/or integrity protection of the PC5 interface is enabled. sexual protection.
  • the second policy #1 is a user plane security protection policy for the PC5 interface.
  • the first policy #1 indicates that the user plane security protection of the Uu interface is not enabled, that is, the first policy #1 is that the user plane security protection policy of the Uu interface is NOT NEEDED.
  • the PCF determines the second policy #1 according to the first policy #1, and the second policy #1 indicates that the user plane security protection of the PC5 interface is not enabled, that is, the second policy #1 is that the user plane security protection policy of the PC5 interface is NOT NEEDED.
  • the second policy #1 is a user plane confidentiality and/or integrity protection policy of the PC5 interface.
  • the first policy #1 indicates that the user plane confidentiality and/or user plane integrity protection of the Uu interface is not enabled, that is, the first policy #1 is that the user plane confidentiality and/or integrity protection policy of the Uu interface is NOT NEEDED.
  • the second policy #1 indicates that the user plane confidentiality and/or user plane integrity protection of the PC5 interface is not enabled, that is, the second policy #1 is that the user plane confidentiality and/or integrity protection policy of the PC5 interface is NOT NEEDED.
  • the second policy #1 is that the user plane confidentiality and/or integrity protection policy of the PC5 interface is NOT NEEDED, then the second policy #1 also indicates that the signaling plane confidentiality protection and/or integrity protection of the PC5 interface is not enabled or integrity protection.
  • the second policy #1 is a user plane security protection policy for the PC5 interface.
  • the first policy #1 indicates that it is preferred to enable the user plane security protection of the Uu interface, that is, the first policy #1 is that the user plane security protection policy of the Uu interface is PREFERRED.
  • the PCF determines the second policy #1 according to the first policy #1, and the second policy #1 indicates preference to enable the user plane security protection of the PC5 interface, that is, the second policy #1 is that the user plane security protection policy of the PC5 interface is PREFERRED.
  • the second policy #1 is a user plane confidentiality and/or integrity protection policy of the PC5 interface.
  • the first policy #1 indicates preference to enable the user plane confidentiality and/or user plane integrity protection of the Uu interface, that is, the first policy #1 is that the user plane confidentiality and/or integrity protection policy of the Uu interface is PREFERRED, corresponding
  • the second policy #1 indicates preference to enable the user plane confidentiality and/or user plane integrity protection of the PC5 interface, that is, the second policy #1 is that the user plane confidentiality and/or integrity protection policy of the PC5 interface is PREFERRED .
  • the second policy #1 is that the user plane confidentiality and/or integrity protection policy of the PC5 interface is PREFERRED, then the second policy #1 also indicates preference to enable the signaling plane confidentiality protection and/or Integrity protection.
  • the second policy #1 is a user plane security protection policy for the PC5 interface.
  • the first policy #1 indicates that it is preferred to enable the user plane security of the Uu interface, that is, the first policy #1 is that the user plane security protection policy of the Uu interface is PREFERRED.
  • the PCF can determine whether the user plane security protection of the PC5 interface needs to be enabled between the remote UE #1 and the relay device #1, and determine the second policy #1 accordingly.
  • the PCF can apply ProSe according to the default configuration of the operator, the existing network load, or the PDU session corresponding to the relay type.
  • the provided requirements determine whether the user plane security protection of the PC5 interface needs to be enabled between the remote UE#1 and the relay device#1, and the specific method is not specifically limited here.
  • the second policy #1 is a user plane security protection policy for the PC5 interface.
  • the first policy #1 indicates that it is preferred to enable the user plane security of the Uu interface, that is, the first policy #1 is that the user plane security protection policy of the Uu interface is PREFERRED. If the PCF determines that the user plane security protection of the PC5 interface needs to be enabled, the PCF determines the second policy #1, and the second policy #1 indicates to enable the user plane security protection of the PC5 interface, that is, the second policy #1 is the user plane security protection of the PC5 interface.
  • the confidentiality and/or integrity protection policy is REQUIRED.
  • the second policy #1 is a user plane security protection policy for the PC5 interface.
  • the first policy #1 indicates that it is preferred to enable the user plane security of the Uu interface, that is, the first policy #1 is that the user plane security protection policy of the Uu interface is PREFERRED. If the PCF determines that it is necessary not to enable the user plane security protection of the PC5 interface, the PCF determines the second policy #1, and the second policy #1 indicates that the user plane security protection of the PC5 interface is not enabled, that is, the second policy #1 is the PC5 interface
  • the user plane confidentiality and/or integrity protection policy is NOT NEEDED.
  • the second policy #1 is that the user plane confidentiality and/or integrity protection policy of the PC5 interface is REQUIRED, then the second policy #1 also indicates that the signaling plane confidentiality protection and/or integrity protection of the PC5 interface is enabled. sexual protection.
  • the second policy #1 is that the user plane confidentiality and/or integrity protection policy of the PC5 interface is NOT NEEDED, then the second policy #1 also indicates that the signaling plane confidentiality protection and/or integrity protection of the PC5 interface is not enabled or integrity protection.
  • the second policy #1 is a user plane security protection policy for the PC5 interface.
  • the first policy #1 indicates that it is preferred to enable the user plane security of the Uu interface, that is, the first policy #1 is that the user plane security protection policy of the Uu interface is PREFERRED.
  • the PCF determines the second policy #1 according to the first policy #1, and the second policy #1 indicates preference to enable the user plane security protection of the PC5 interface, that is, the second policy #1 is that the user plane security protection policy of the PC5 interface is PREFERRED.
  • the PCF may determine whether to enable the user plane security protection of the PC5 interface according to the operator's default configuration, the existing network load, or the requirements provided by the ProSe application corresponding to the relay type PDU session, and generate the first indication information.
  • the first indication information is used to indicate whether the user plane security protection of the PC5 interface needs to be enabled between the remote UE #1 and the relay device #1.
  • the second policy #1 is a user plane security protection policy for the PC5 interface.
  • the first policy #1 indicates preference to enable the user plane confidentiality and/or integrity security of the Uu interface, that is, the first policy #1 is that the user plane confidentiality and/or integrity security protection policy of the Uu interface is PREFERRED.
  • the second policy #1 indicates preference to enable the user plane confidentiality and/or user plane integrity protection of the PC5 interface, that is, the second policy #1 is that the user plane confidentiality and/or integrity protection policy of the PC5 interface is PREFERRED.
  • the PCF determines that the user plane security protection of the PC5 interface needs to be enabled, the PCF generates first indication information, where the first indication information indicates enabling the user plane confidentiality and/or integrity protection of the PC5 interface.
  • the second policy #1 is a user plane security protection policy for the PC5 interface.
  • the first policy #1 indicates preference to enable the user plane confidentiality and/or integrity security of the Uu interface, that is, the first policy #1 is that the user plane confidentiality and/or integrity security protection policy of the Uu interface is PREFERRED.
  • the second policy #1 indicates preference to enable the user plane confidentiality and/or user plane integrity protection of the PC5 interface, that is, the second policy #1 is that the user plane confidentiality and/or integrity protection policy of the PC5 interface is PREFERRED.
  • the PCF determines that the user plane security protection of the PC5 interface needs not to be enabled, the PCF generates first indication information, and the first indication information indicates that the user plane confidentiality and/or integrity protection of the PC5 interface is not enabled.
  • the second policy #1 indicates whether to enable the user plane security protection of the PC5 interface.
  • the first policy #1 indicates enabling the user plane security protection of the Uu interface, that is, the first policy #1 is that the user plane security protection policy of the Uu interface is REQUIRED.
  • the PCF determines the second policy #1 according to the first policy #1, and the second policy #1 directly instructs to enable the user plane security protection of the PC5 interface.
  • the second policy #1 indicates whether to enable user plane confidentiality and/or integrity protection of the PC5 interface.
  • the first policy #1 indicates that the user plane confidentiality protection and/or the user plane integrity protection of the Uu interface are enabled, that is, the first policy #1 is that the user plane confidentiality and/or integrity protection policy of the Uu interface is REQUIRED, and the corresponding Specifically, the second policy #1 directly indicates to enable the user plane confidentiality protection and/or the user plane integrity protection of the PC5 interface.
  • the second policy #1 directly indicates to enable the user plane confidentiality and/or integrity protection of the PC5 interface
  • the second policy #1 also indicates to enable the signaling plane confidentiality and/or integrity protection of the PC5 interface .
  • the second policy #1 indicates whether to enable the user plane security protection of the PC5 interface.
  • the first policy #1 indicates that the user plane security protection of the Uu interface is not enabled, that is, the first policy #1 is that the user plane security protection policy of the Uu interface is NOT NEEDED.
  • the PCF determines the second policy #1 according to the first policy #1, and the second policy #1 directly indicates that the user plane security protection of the PC5 interface is not enabled.
  • the second policy #1 indicates whether to enable user plane confidentiality and/or integrity protection of the PC5 interface.
  • the first policy #1 indicates that the user plane confidentiality and/or user plane integrity protection of the Uu interface is not enabled, that is, the first policy #1 is that the user plane confidentiality and/or integrity protection policy of the Uu interface is NOT NEEDED,
  • the second policy #1 directly indicates not to enable user plane confidentiality and/or user plane integrity protection of the PC5 interface.
  • the second policy #1 indicates whether to enable the user plane security protection of the PC5 interface.
  • the first policy #1 indicates that it is preferred to enable the user plane security protection of the Uu interface, that is, the first policy #1 is that the user plane security protection policy of the Uu interface is PREFERRED.
  • the PCF can determine whether the user plane security protection of the PC5 interface needs to be enabled between the remote UE #1 and the relay device #1, and determine the second policy #1 accordingly.
  • the PCF can determine whether the connection between the remote UE #1 and the relay device #1 needs Enable the user plane security protection of the PC5 interface.
  • the specific method is not limited here.
  • the second policy #1 indicates whether to enable user plane confidentiality and/or integrity security protection of the PC5 interface.
  • the first policy #1 indicates preference to enable the user plane confidentiality and/or integrity security of the Uu interface, that is, the first policy #1 is that the user plane confidentiality and/or integrity security protection policy of the Uu interface is PREFERRED. If the PCF determines that the user plane confidentiality and/or integrity security protection of the PC5 interface needs to be enabled, the PCF determines the second policy #1, and the second policy #1 directly indicates that the user plane confidentiality and/or integrity protection of the PC5 interface is enabled .
  • the second policy #1 indicates whether to enable the user plane confidentiality and/or integrity security protection of the PC5 interface.
  • the first policy #1 indicates preference to enable the user plane confidentiality and/or integrity security of the Uu interface, that is, the first policy #1 is that the user plane confidentiality and/or integrity security protection policy of the Uu interface is PREFERRED. If the PCF determines that it is necessary not to enable the user plane confidentiality and/or integrity security protection of the PC5 interface, the PCF determines the second policy #1, and the second policy #1 directly indicates that the user plane confidentiality and/or integrity of the PC5 interface is not enabled. sexual protection.
  • the second policy #1 directly indicates to enable the user plane confidentiality and/or integrity protection of the PC5 interface
  • the second policy #1 also indicates to enable the signaling plane confidentiality and/or integrity protection of the PC5 interface .
  • the PCF sends the second policy #1 to the remote UE #1 and/or the relay device #1.
  • the remote UE #1 and/or the relay device #1 receives the second policy #1.
  • the PCF simultaneously sends the first indication information to the remote UE#1 and/or the relay device#1.
  • the PCF can obtain the Uu interface user plane security protection policy, and determine the PC5 interface user plane security protection policy according to the Uu interface user plane security protection policy, so that the Uu interface matches the PC5 interface user plane security protection policy .
  • the user plane security protection policies of the Uu interface and the PC5 interface do not match, for example, the user plane security protection of the Uu interface is enabled but the user plane security protection of the PC5 interface is not enabled, the remote UE#1 and the relay device
  • the PC5 connection established between #1 has a weak ability to resist external attacks, and the user plane security protection of the Uu interface on the relay device #1 does not play its due role, resulting in a waste of resources. Therefore, adopting the solution of the present application can match the user plane security protection policy of the Uu interface and the PC5 interface, and solve problems such as security protection degradation and resource waste caused by policy mismatch.
  • the method further includes the following S215-S217.
  • the PCF acquires the signaling plane security protection policy (referred to as the third policy #1) of the Uu interface corresponding to the relay device #1 and/or the remote UE #1.
  • the third policy #1 is a Uu interface signaling plane security protection policy used by the relay device #1 to establish a relay type PDU session when the remote UE#1 accesses the network through the relay device #1. It should be understood that if the relay device #1 can subsequently access the network through the remote UE#1, the signaling plane security protection policy of the Uu interface corresponding to the relay device #1 and the remote UE#1 may be the same.
  • the integrity protection of the signaling plane of the Uu interface is forcibly enabled, and whether to enable the confidentiality protection of the signaling plane of the Uu interface is determined by the operator.
  • whether the signaling plane integrity and/or confidentiality protection of the Uu interface is enabled is determined by the operator.
  • a third policy #1 is pre-configured in the PCF.
  • the PCF acquires the third policy #1 from the relay device #1 and/or the access network device corresponding to the remote UE #1.
  • PCF obtains the third policy #1 from relay device #1 and/or remote UE#1 corresponding to other core network elements.
  • other core network elements can be UDM, AMF, SMF or 5G DDNMF, which is not limited here .
  • the PCF determines the fourth strategy (referred to as the fourth strategy #1) according to the third strategy #1, and the fourth strategy #1 is used to determine whether to enable the PC5 interface signaling between the remote UE#1 and the relay device #1 Surface security protection.
  • the third policy #1 indicates to enable the integrity and/or confidentiality protection of the signaling plane of the Uu interface
  • the fourth policy #1 indicates to enable the integrity and/or confidentiality protection of the signaling plane of the PC5 interface.
  • the third policy #1 indicates that the signaling plane integrity and/or confidentiality protection of the Uu interface is not enabled, and the fourth policy #1 indicates that the signaling plane integrity and/or confidentiality protection of the PC5 interface is not enabled.
  • PCF can obtain the Uu interface signaling plane security protection policy, and determine the PC5 interface signaling plane security protection policy according to the Uu interface signaling plane security protection policy, so that the signaling planes of the Uu interface and PC5 interface are safe Protection policies match.
  • the PCF determines the fourth policy #1 according to the second policy #1. Specifically, if the second policy #1 indicates to enable the PC5 interface For user plane confidentiality and/or integrity protection, the PCF determines a fourth policy #1 according to the second policy #1, and the fourth policy #1 indicates enabling the signaling plane confidentiality protection and/or integrity protection of the PC5 interface. In a possible implementation, if the second policy #1 is that the user plane integrity protection/confidentiality protection of the PC5 interface is REQUIRED, then the PCF determines the fourth policy #1 according to the second policy #1, and the fourth policy # 1 indicates that the signaling plane integrity protection/confidentiality protection of the PC5 interface is REQUIRED.
  • the PCF determines the fourth policy #1 according to the second policy #1, and the fourth policy #1 directly indicates to enable the signaling plane integrity protection/confidentiality protection of the PC5 interface.
  • the PCF sends the fourth policy #1 to the remote UE #1 and/or the relay device #1.
  • the remote UE #1 and/or the relay device #1 receives the fourth policy #1.
  • the PCF may determine to enable the signaling plane security protection of the PC5 interface. That is, the fourth policy #1 and/or the second policy #1 also indicate to enable the signaling plane security protection of the PC5 interface.
  • the signaling plane security of the PC5 connection is established according to the fourth policy #1.
  • the second policy #1 can indicate to enable the signaling plane confidentiality and/or integrity protection of the PC5 interface at the same time, when the remote UE #1 and the relay device #1 establish the PC5 connection , establish the signaling plane security of the PC5 connection according to the second policy #1.
  • the PCF acquires a first correspondence.
  • the first correspondence is preconfigured in the PCF.
  • the PCF obtains the first corresponding relationship from a ProSe application server (ProSe application server) or an application function (application function, AF) network element. It should be noted that the PCF can obtain the first corresponding relationship directly from the ProSe application server or the application function network element, or indirectly through the network exposure function (NEF).
  • ProSe application server ProSe application server
  • application function application function, AF
  • NEF network exposure function
  • the first correspondence may also include two situations, the only difference is that the UDM in S201 is replaced by the PCF in this step, which will not be repeated here.
  • the relay device #1 sends a first request message to the AMF, and/or the remote UE#1 sends a second request message to the AMF.
  • the AMF receives the first request message from the relay device #1 and/or the AMF receives the second request message from the remote UE #1.
  • the AMF determines that the relay device #1 has a relay capability, and/or determines that the remote UE#1 supports network access through the relay device.
  • the AMF sends the third request message and/or the fourth request message to the PCF.
  • the PCF receives the third request message and/or the fourth request message from the AMF.
  • the third request message is triggered by the first request message, and is used to request the ProSe parameter corresponding to the relay device #1
  • the fourth request message is triggered by the second request message, and is used to request the ProSe parameter corresponding to the remote UE #1 from the PCF .
  • This process is the same as S205, for details, please refer to the description of S205.
  • the PCF determines the ProSe parameter corresponding to the relay device #1, and/or determines the ProSe parameter corresponding to the remote UE#1.
  • the ProSe parameters corresponding to the remote UE#1 are the same as the ProSe parameters corresponding to the relay device #1.
  • the remote UE#1 can access the network through the relay device #1, and the ProSe parameter corresponding to the remote UE#1 and the ProSe parameter corresponding to the relay device #1 are recorded as ProSe parameter #1.
  • the PCF determines a first policy #1 according to the first correspondence and the ProSe parameter #1.
  • This process is similar to S208. That is, the actions performed by the UDM in S208 are performed by the PCF in S306.
  • the PCF determines the second policy #1 according to the first policy #1.
  • the second policy #1 is used to determine whether to enable the user plane security protection of the PC5 interface between the remote UE #1 and the relay device #1.
  • the PCF sends the second policy #1 to the remote UE #1 and/or the relay device #1.
  • the remote UE #1 and/or the relay device #1 receives the second policy #1.
  • the PCF can also determine the fourth policy #1, and send the fourth policy #1 to the remote UE #1 and/or the relay device #1. In order to avoid repetition, no further description is given here .
  • the relay device #1 and/or the remote UE#1 acquires a second correspondence, where the second correspondence is a correspondence between a ProSe parameter and a second policy.
  • the second policy is used to determine whether to enable the user plane security protection of the PC5 interface between the remote UE and the relay device.
  • the second correspondence may be associated with the first correspondence, and the first correspondence is as described in S201 above.
  • the second correspondence may be determined according to the first correspondence. That is, the association between the second correspondence and the first correspondence is: the user plane security protection policy of the PC5 interface is determined according to the user plane security protection policy of the Uu interface, and the specific determination method can refer to the description in S213, and will not be repeated here .
  • the relay device #1 and the remote UE#1 may also obtain a fourth correspondence, the fourth correspondence is the correspondence between the ProSe parameter and the fourth policy, and the fourth policy is used to determine Whether the signaling plane security protection of the PC5 interface between the remote UE#1 and the relay device #1 is enabled.
  • the fourth correspondence is associated with the third correspondence.
  • the third corresponding relationship is the corresponding relationship between the ProSe parameter and the third strategy, and the third strategy is the signaling plane security protection strategy of the Uu interface.
  • the fourth correspondence may be determined according to the third correspondence. That is, the association between the fourth correspondence and the third correspondence is: the signaling plane security protection policy of the PC5 interface is determined according to the signaling plane security protection policy of the Uu interface.
  • the following describes how the relay device #1 acquires the second correspondence and/or the fourth correspondence, and the manner in which the remote UE#1 acquires the second correspondence and/or the fourth correspondence
  • the relay device #1 Configure the second correspondence and/or the fourth correspondence in the universal integrated circuit card (UICC) used by the relay device #1, and when the remote UE#1 accesses the network through the relay device #1 , the relay device #1 inserts the UICC into the relay device #1, and the relay device #1 uses the UICC to establish a relay-type PDU session with the network.
  • UICC universal integrated circuit card
  • the second correspondence and/or the fourth correspondence are configured in the remote UE#1 using the UICC, and when the remote UE#1 accesses the network through the relay device #1, the remote UE#1 inserts the UICC into the remote In UE#1, the remote UE#1 uses the UICC to establish a connection with the relay device#1.
  • a user equipment is composed of a mobile equipment (mobile equipment, ME) and a UICC.
  • the mobile device is a hardware device that does not have the ability to access the network except for emergency functions. After being inserted into the UICC, it can register and subsequently interact with the network as a UE.
  • the second correspondence and/or the fourth correspondence may be pre-configured in relay device #1 before the UICC is inserted.
  • the second correspondence and/or the fourth correspondence are pre-configured in a mobile equipment (mobile equipment, ME) of the remote UE#1.
  • the second correspondence and/or the fourth correspondence may be preconfigured in the remote UE#1.
  • Relay device #1 acquires the second correspondence and/or the fourth correspondence from the ProSe application server.
  • the remote UE#1 acquires the second correspondence and/or the fourth correspondence from the ProSe application server.
  • ProSe parameters are RSC parameters. That is, the second correspondence is the correspondence between the RSC parameter and the second policy.
  • the fourth correspondence is the correspondence between the RSC parameter and the fourth policy.
  • the second correspondence and the fourth correspondence may be the contents shown in Table 3.
  • the ProSe parameters are S-NSSAI parameters and/or DNN parameters. That is, the second correspondence is the correspondence between the S-NSSAI and/or the DNN and the second policy.
  • the fourth correspondence is the correspondence between the S-NSSAI and/or the DNN and the fourth policy.
  • the second correspondence and the fourth correspondence may be the contents shown in Table 4.
  • the relay device #1 sends a first request message to the AMF, and/or the remote UE#1 sends a second request message to the AMF.
  • the AMF receives the first request message from the relay device #1, and/or receives the second request message from the remote UE#1.
  • the AMF determines that the relay device #1 has a relay capability, and/or determines that the remote UE#1 supports network access through the relay device.
  • the AMF sends the third request message and/or the fourth request message to the PCF.
  • the PCF receives the third request message and/or the fourth request message from the AMF.
  • the third request message is triggered by the first request message, and is used to request the ProSe parameter corresponding to the relay device #1
  • the fourth request message is triggered by the second request message, and is used to request the ProSe parameter corresponding to the remote UE #1 from the PCF .
  • the PCF determines the ProSe parameter corresponding to the relay device #1, and/or determines the ProSe parameter corresponding to the remote UE#1.
  • the ProSe parameters corresponding to the remote UE#1 are the same as the ProSe parameters corresponding to the relay device #1.
  • the remote UE#1 can access the network through the relay device #1, and the ProSe parameter corresponding to the remote UE#1 and the ProSe parameter corresponding to the relay device #1 are recorded as ProSe parameter #1.
  • the PCF sends the ProSe parameter #1 to the remote UE#1, and/or sends the ProSe parameter #1 to the relay device #1.
  • the remote UE #1 receives the ProSe parameter #1
  • the relay device #1 receives the ProSe parameter #1.
  • the remote UE#1 determines a second policy #1 according to the second correspondence and the ProSe parameter #1. And/or the relay device #1 determines the second policy #1 according to the second correspondence and the ProSe parameter #1.
  • the remote UE#1 may also determine the fourth policy #1 according to the fourth correspondence and the ProSe parameter #1. And/or the relay device #1 may also determine the fourth policy #1 according to the fourth correspondence and the ProSe parameter #1.
  • the signaling plane security of the PC5 connection is established according to the fourth policy #1.
  • the remote UE#1 and the relay device #1 can obtain the second correspondence and the fourth correspondence respectively, and the second correspondence is associated with the first correspondence, and the fourth correspondence is associated with the The third correspondence is associated.
  • the second strategy #1 and the fourth strategy #1 corresponding to the ProSe parameter #1 can be determined, and these strategies can be used to Establish a PC5 connection.
  • the Uu interface security protection policy used by relay device #1 when establishing a relay PDU session is related to establishing a PC5 connection The security protection policy of the PC5 interface used matches.
  • the relay device #1 sends a first request message to the AMF, where the first request message is used to request the ProSe parameter corresponding to the relay device #1.
  • the remote UE#1 sends a second request message to the AMF, where the second request message is used to request the ProSe parameter corresponding to the remote UE#1.
  • the AMF determines that the relay device #1 has a relay capability, and/or determines that the remote UE#1 supports network access through the relay device.
  • the AMF may also determine the relay service provided by the remote UE#1, and/or determine the relay service supported by the relay device #1.
  • the AMF sends the third request message and/or the fourth request message to the PCF.
  • the PCF receives the third request message from the AMF and/or receives the fourth request message.
  • the third request message is triggered by the first request message, and is used to request the ProSe parameter corresponding to the relay device #1
  • the fourth request message is triggered by the second request message, and is used to request the ProSe parameter corresponding to the remote UE #1 from the PCF .
  • the AMF may carry the relay service information supported by the relay device #1 in the third request message, and/or carry the relay service information of the remote UE#1 in the fourth request message.
  • the PCF determines the ProSe parameter corresponding to the relay device #1, and/or determines the ProSe parameter corresponding to the remote UE#1.
  • the PCF may also determine the user plane security protection policy of the PC5 interface of the relay device #1 according to the second correspondence relationship. And/or the PCF may also determine the user plane security protection policy of the PC5 interface of the remote UE#1 according to the second correspondence.
  • the PCF may also determine the signaling plane security protection policy of the PC5 interface of the relay device #1 according to the fourth correspondence. And/or the PCF may also determine the signaling plane security protection policy of the PC5 interface of the remote UE#1 according to the fourth correspondence.
  • the second correspondence and the fourth correspondence may be preconfigured in the PCF.
  • the second correspondence is the correspondence between the ProSe parameter and the second policy, the second policy is the user plane security protection policy of the PC5 interface, and the second policy is used to determine whether to enable the PC5 between the remote UE#1 and the relay device #1 Interface user plane security protection.
  • the fourth correspondence is the correspondence between the ProSe parameter and the fourth policy, the fourth policy is the signaling plane security protection policy of the PC5 interface, and the fourth policy is used to determine whether to enable the connection between the remote UE#1 and the relay device #1 The signaling plane security protection of the PC5 interface.
  • the ProSe parameters corresponding to the remote UE#1 are the same as the ProSe parameters corresponding to the relay device #1.
  • the ProSe parameter corresponding to remote UE#1 and the ProSe parameter corresponding to relay device #1 are recorded as ProSe parameter #1
  • remote UE#1 and The user plane security protection strategy of the PC5 interface of the relay device #1 is recorded as the second strategy #1
  • the signaling plane security protection strategy of the remote UE#1 and the PC5 interface of the relay device #1 is recorded as the fourth strategy #1 .
  • the PCF sends the ProSe parameter #1 and the second policy #1 to the relay device #1 and/or the remote UE #1 through the AMF.
  • the relay device #1 and/or the remote UE #1 receives the ProSe parameter #1 and the second policy #1.
  • the PCF also sends the fourth policy #1 to the relay device #1 and/or the remote UE #1 through the AMF.
  • the relay device #1 and/or the remote UE #1 receives the fourth policy #1.
  • the method further includes: S506, the PCF sends the second correspondence and/or the fourth correspondence to the AMF.
  • the relay device #1 sends a seventh request message to the AMF, where the seventh request message requests establishment of a relay PDU session, and the seventh request message includes the ProSe parameter #1.
  • the AMF receives the seventh request message.
  • the AMF determines, according to the seventh request message, that the relay device #1 can establish a PDU session serving the relay service.
  • the AMF may determine whether the relay device #1 can serve the relay service according to the subscription information of the relay device #1, which is not limited here.
  • the method further includes the following S509-S510.
  • the AMF determines the second policy #1 according to the second correspondence and the ProSe parameter #1, and/or the AMF determines the fourth policy #1 according to the fourth correspondence and the ProSe parameter #1.
  • the AMF sends an eighth request message to the SMF, the eighth request message requests to establish a relay PDU session for the relay device #1, and the eighth request message includes the second policy #1, the fourth policy #1, and the ProSe parameter # 1.
  • the SMF receives the eighth request message.
  • the method also includes the following S511-S514.
  • the AMF sends a seventh request message to the SMF.
  • the seventh request message includes ProSe parameter #1.
  • the SMF receives the seventh request message.
  • the SMF sends a ninth request message to the PCF, where the ninth request message is used to request the security protection policy of the PC5 interface of the relay device #1.
  • the ninth request message includes ProSe parameter #1.
  • the PCF receives the ninth request message.
  • the PCF determines the second policy #1 corresponding to the relay device #1 according to the second correspondence and the ProSe parameter #1, and/or the PCF determines the second policy #1 corresponding to the relay device #1 according to the fourth correspondence and the ProSe parameter #1.
  • the PCF sends the second policy #1 and/or the fourth policy #1 to the SMF.
  • the SMF receives the second policy #1 and/or the fourth policy #1 from the PCF.
  • the SMF determines the user plane security protection policy (referred to as the first policy #1) of the Uu interface corresponding to the relay device #1 according to the second policy #1, wherein the first policy #1 is that the remote UE #1 passes through the relay device
  • the relay device #1 establishes the Uu interface user plane security protection policy used by the relay type PDU session.
  • the SMF determines the signaling plane security protection policy (referred to as the third policy #1) of the Uu interface corresponding to the relay device #1 according to the fourth policy #1, wherein the third policy #1 is that the remote UE #1 passes through
  • the relay device #1 accesses the network, the relay device #1 establishes the Uu interface signaling plane security protection policy used by the relay type PDU session.
  • the second policy #1 indicates to enable the user plane security protection of the PC5 interface
  • the first policy #1 indicates to enable the user plane security protection of the Uu interface.
  • the SMF according to the second policy #1 determines the first policy #1, and the first policy #1 indicates to enable the user plane security protection of the Uu interface, that is, the first policy #1 is that the user plane security protection policy of the Uu interface is REQUIRED.
  • the SMF determines the first policy #1 according to the second policy #1, and the first policy #1 indicates to enable The user plane security protection of the Uu interface, that is, the first policy #1 is that the user plane security protection policy of the Uu interface is REQUIRED.
  • the fourth policy #1 indicates enabling the signaling plane security protection of the PC5 interface
  • the third policy #1 indicates enabling the signaling plane security protection of the Uu interface.
  • the fourth policy #1 indicates to enable the signaling plane security protection of the PC5 interface, that is, the fourth policy #1 is that the signaling plane security protection policy of the PC5 interface is REQUIRED
  • the SMF according to the The fourth policy #1 determines the third policy #1
  • the third policy #1 indicates enabling the signaling plane security protection of the Uu interface, that is, the third policy #1 is that the signaling plane security protection policy of the Uu interface is REQUIRED.
  • the SMF determines the third policy #1 according to the fourth policy #1, and the third policy #1 indicates to enable The signaling plane security protection of the Uu interface, that is, the third policy #1 is that the signaling plane security protection policy of the Uu interface is REQUIRED.
  • the second policy #1 indicates that the user plane security protection of the PC5 interface is not enabled, and the first policy #1 indicates that the user plane security protection of the Uu interface is not enabled.
  • the SMF according to the first The second policy #1 determines the first policy #1, and the first policy #1 indicates that the user plane security protection of the Uu interface is not enabled, that is, the first policy #1 is that the user plane security protection policy of the Uu interface is NOT NEEDED.
  • the SMF determines the first policy #1 according to the second policy #1, and the first policy #1 indicates that no Enable the user plane security protection of the Uu interface, that is, the first policy #1 is that the user plane security protection policy of the Uu interface is NOT NEEDED.
  • the fourth policy #1 indicates that the signaling plane security protection of the PC5 interface is not enabled, and the third policy #1 indicates that the signaling plane security protection of the Uu interface is not enabled.
  • the SMF Determine the third policy #1 according to the fourth policy #1 the third policy #1 indicates that the signaling plane security protection of the Uu interface is not enabled, that is, the third policy #1 is that the signaling plane security protection policy of the Uu interface is NOT NEEDED .
  • the SMF determines the third policy #1 according to the fourth policy #1, and the third policy #1 indicates The signaling plane security protection of the Uu interface is not enabled, that is, the third policy #1 is that the signaling plane security protection policy of the Uu interface is NOT NEEDED.
  • the second policy #1 indicates preference to enable the user plane security protection of the PC5 interface
  • the first policy #1 indicates preference to enable the user plane security protection of the Uu interface.
  • the SMF according to the second Policy #1 determines the first policy #1, and the first policy #1 indicates preference to enable the user plane security protection of the Uu interface, that is, the first policy #1 is that the user plane security protection policy of the Uu interface is PREFERRED.
  • the fourth policy #1 indicates preference to enable the signaling plane security protection of the PC5 interface
  • the third policy #1 indicates preference to enable the signaling plane security protection of the Uu interface.
  • the fourth policy #1 indicates preference to enable the signaling plane security protection of the PC5 interface, that is, the fourth policy #1 is that the signaling plane security protection policy of the PC5 interface is PREFERRED
  • the SMF according to The fourth policy #1 determines the third policy #1
  • the third policy #1 indicates preference to enable the signaling plane security protection of the Uu interface, that is, the third policy #1 is that the signaling plane security protection policy of the Uu interface is PREFERRED.
  • the SMF establishes a relay PDU session for the relay device #1 according to the first policy #1 and/or the third policy #1.
  • the SMF when the SMF needs to establish a relay-type PDU session for the relay device #1, the SMF can determine the The Uu interface security protection policy used to establish the relay-type PDU session for the relay device #1, so that the policy used by the relay device #1 to establish the PC5 connection matches the policy used to establish the relay-type PDU session.
  • FIG. 6 is a communication device provided in an embodiment of the present application, where the communication device includes a transceiver unit 601 and a processing unit 602 .
  • the transceiver unit 601 can be used to implement the receiving and sending functions in the method embodiments. Other functions in the method embodiments may be implemented by the processing unit 602 .
  • the transceiver unit can be realized through the input interface and output interface in the data processing chip, and the sending and receiving in the method embodiment correspond to the output and input in the chip respectively.
  • the transceiver unit 601 can also be divided into a receiving unit and a sending unit.
  • the receiving unit can be used to realize the receiving function in the method embodiment, and the sending unit can be used to realize the sending function in the method embodiment.
  • the receiving unit can be realized through the output interface of the data processing chip, and the sending unit can be realized through the input interface of the data processing chip.
  • the transceiver unit and the processing unit may be implemented by the same chip, which is not limited in this application. It should be understood that the transceiver unit 601 in the embodiment of the present application may also be implemented by a transceiver (including a transmitter and a receiver) or a transceiver-related circuit component, and the processing unit 602 may also be implemented by a processor or a processor-related circuit component (or, Called the processing circuit) implementation.
  • the transceiving unit 601 and the processing unit 602 can support the actions performed by the remote UE#1 or the relay device #1 in the above method example.
  • the transceiver unit 601 can complete the sending of the first request message and the second request message in the above method embodiments, and other processes in the technical solution described herein;
  • the processing unit 602 can complete the establishment of the PC5 connection, and the Other processes in the technical plan.
  • the transceiving unit 601 and the processing unit 602 can support actions performed by the AMF in the foregoing method example.
  • the transceiver unit 601 can complete the sending of the third request message and the fourth request message in the above method embodiments, and other processes in the technical solutions described herein;
  • the processing unit 602 can complete the determination that the relay device #1 has a relay Capabilities, remote UE#1 supports network access through relay equipment, and other processes in the technical solutions described herein.
  • the transceiving unit 601 and the processing unit 602 can support actions performed by the PCF in the foregoing method examples.
  • the transceiver unit 601 can complete the sending of the fifth request message in the above method embodiment, and other processes in the technical solution described herein; other processes in the program.
  • the transceiving unit 601 and the processing unit 602 can support actions performed by the UDM in the above method example.
  • the transceiver unit 601 can complete the sending of the first policy #1 in the above method embodiment, and other processes in the technical solution described herein; the processing unit 602 can complete the first policy #1 according to the determination, and the Other processes in the technical plan.
  • the transceiving unit 601 and the processing unit 602 can support actions performed by the SMF in the foregoing method example.
  • the transceiver unit 601 can complete the sending of the ninth request message in the above method embodiment, and other processes in the technical solution described herein; And other processes in the technical solutions described herein.
  • the embodiment of the present application also provides a communication device, as shown in FIG. 7 , including: a processor 701 , a communication interface 702 , and a memory 703 .
  • the processor 701, the communication interface 702, and the memory 703 can be connected to each other through a bus 707;
  • the bus 707 can be a peripheral component interconnect standard (peripheral component interconnect, PCI) bus or an extended industry standard architecture (extended industry standard architecture, EISA) bus etc.
  • PCI peripheral component interconnect
  • EISA extended industry standard architecture
  • the above bus 707 can be divided into address bus, data bus, control bus and so on. For ease of representation, only one thick line is used in FIG. 7 , but it does not mean that there is only one bus or one type of bus.
  • the processor 701 may be a central processing unit (central processing unit, CPU), a network processor (network processor, NP) or a combination of CPU and NP.
  • the processor may further include hardware chips.
  • the aforementioned hardware chip may be an application-specific integrated circuit (application-specific integrated circuit, ASIC), a programmable logic device (programmable logic device, PLD) or a combination thereof.
  • the aforementioned PLD may be a complex programmable logic device (complex programmable logic device, CPLD), a field-programmable gate array (field-programmable gate array, FPGA), a general array logic (generic array logic, GAL) or any combination thereof.
  • Memory 703 may be volatile memory or nonvolatile memory, or may include both volatile and nonvolatile memory.
  • the non-volatile memory can be read-only memory (read-only memory, ROM), programmable read-only memory (programmable ROM, PROM), erasable programmable read-only memory (erasable PROM, EPROM), electrically programmable Erases programmable read-only memory (electrically EPROM, EEPROM) or flash memory.
  • Volatile memory can be random access memory (RAM), which acts as external cache memory.
  • the processor 701 is used to implement data processing operations of the communication device.
  • the communication interface 702 is used to realize the transceiving operation of the communication device.
  • the processor 701, the communication interface 702 and the memory 703 can support the above method example completed by the remote UE#1 or the relay device #1 action.
  • the communication interface 702 can complete the sending of the first request message and the second request message in the above method embodiments, and other processes in the technical solutions described herein; the processor 701 can complete the establishment of the PC5 connection, and the Other processes in the technical plan.
  • the processor 701, the communication interface 702, and the memory 703 can support actions performed by the AMF in the foregoing method example.
  • the communication interface 702 can complete the sending of the third request message and the fourth request message in the above method embodiments, and other processes in the technical solutions described herein;
  • the processor 701 can complete the determination that the relay device #1 has a relay Capabilities, remote UE#1 supports network access through relay equipment, and other processes in the technical solutions described herein.
  • the processor 701, the communication interface 702, and the memory 703 can support actions performed by the PCF in the foregoing method examples.
  • the communication interface 702 can complete the sending of the fifth request message in the above method embodiment, and other processes in the technical solution described herein; the processor 701 can complete the determination of the second strategy #1, and the technical solution described herein in other processes.
  • the processor 701, the communication interface 702, and the memory 703 can support actions performed by the UDM in the foregoing method examples.
  • the communication interface 702 can complete the sending of the first policy #1 in the above method embodiment, and other processes in the technical solutions described herein;
  • the processor 701 can complete the determination of the first policy #1, and the technical solutions described herein other processes in the program.
  • the processor 701, the communication interface 702, and the memory 703 can support the actions performed by the SMF in the above method example.
  • the communication interface 702 can complete the sending of the ninth request message in the above method embodiment, and other processes in the technical solutions described herein;
  • the processor 701 can complete the determination of the first strategy #1, the third strategy #1, and Other processes in the technical solutions described herein.
  • the technical solution of the embodiment of the present application can be applied to various communication systems, for example: global system of mobile communication (global system of mobile communication, GSM) system, code division multiple access (code division multiple access, CDMA) system, broadband code division multiple access (wideband code division multiple access, WCDMA) system, general packet radio service (general packet radio service, GPRS), long term evolution (long term evolution, LTE) system, LTE frequency division duplex (frequency division duplex, FDD) system, LTE Time division duplex (time division duplex, TDD), universal mobile telecommunications system (universal mobile telecommunications system, UMTS), global interconnection microwave access (worldwide interoperability for microwave access, WiMAX) communication system, the future fifth generation (5th generation, 5G) system or new radio (new radio, NR), etc.
  • GSM global system of mobile communication
  • CDMA code division multiple access
  • WCDMA wideband code division multiple access
  • general packet radio service general packet radio service
  • GPRS general packet radio service
  • long term evolution long term
  • the disclosed systems, devices and methods may be implemented in other ways.
  • the device embodiments described above are only illustrative.
  • the division of the units is only a logical function division. In actual implementation, there may be other division methods.
  • multiple units or components can be combined or May be integrated into another system, or some features may be ignored, or not implemented.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be through some interfaces, and the indirect coupling or communication connection of devices or units may be in electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and the components shown as units may or may not be physical units, that is, they may be located in one place, or may be distributed to multiple network units. Part or all of the units can be selected according to actual needs to achieve the purpose of the solution of this embodiment.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, each unit may exist separately physically, or two or more units may be integrated into one unit.
  • the functions described above are realized in the form of software function units and sold or used as independent products, they can be stored in a computer-readable storage medium.
  • the technical solution of the present application is essentially or the part that contributes to the prior art or the part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium, including Several instructions are used to make a computer device (which may be a personal computer, a server, or a network device, etc.) execute all or part of the steps of the methods described in the various embodiments of the present application.
  • the aforementioned storage medium includes: U disk, mobile hard disk, read-only memory (read-only memory, ROM), random access memory (random access memory, RAM), magnetic disk or optical disc and other media that can store program codes. .

Abstract

Provided in the present application are a communication method and apparatus. The method comprises: a first network element acquiring a first policy, wherein the first policy is a user plane security protection policy of a Uu interface that is used by a first relay device to establish a relay-type protocol data unit (PDU) session when a first terminal device accesses a network by means of the first relay device; the first network element determining a second policy according to the first policy, wherein the second policy is used for determining whether to enable user plane security protection for a PC5 interface between the first terminal device and the first relay device; and the first network element sending the second policy to the first terminal device and/or the first relay device. According to the solution of the present application, a first network element acquires a user plane security protection policy of a Uu interface, so as to determine a user plane security protection policy for a PC5 interface, such that the user plane security protection policy of the Uu interface matches that of the PC5 interface, thereby solving the problems of security protection downgrading, resource wasting, etc. caused by mismatching policies.

Description

通信方法和装置Communication method and device
本申请要求于2021年8月4日提交中国专利局、申请号为202110889754.7、申请名称为“通信方法和装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。This application claims the priority of a Chinese patent application with application number 202110889754.7 and application title "Communication Method and Device" filed with the China Patent Office on August 4, 2021, the entire contents of which are incorporated herein by reference.
技术领域technical field
本申请涉及通信技术领域,并且更具体地,涉及一种通信方法和装置。The present application relates to the technical field of communication, and more specifically, to a communication method and device.
背景技术Background technique
为了提高无线频谱利用率,蜂窝通信网络引入了临近业务(proximity services,ProSe)通信。当终端设备处于网络覆盖之外或与接入网设备之间的通信质量较差时,终端设备可以通过中继设备进行辅助通信。即,终端设备与中继设备进行通信,中继设备与接入网设备通信,从而使得终端设备可以接入网络,获得相应的服务。然而,中继设备建立中继类型的协议数据单元(protocol data unit,PDU)会话使用的Uu接口的安全保护策略可能与中继设备与终端设备建立的PC5连接使用的PC5接口的安全保护策略不匹配,导致出现安全保护降级、资源浪费等问题。因此,如何使中继设备建立中继类型PDU会话以及PC5连接使用的策略相匹配是一个亟待解决的问题。In order to improve the utilization rate of wireless spectrum, the cellular communication network introduces proximity services (Proximity services, ProSe) communication. When the terminal device is out of network coverage or the communication quality with the access network device is poor, the terminal device can perform auxiliary communication through the relay device. That is, the terminal device communicates with the relay device, and the relay device communicates with the access network device, so that the terminal device can access the network and obtain corresponding services. However, the security protection strategy of the Uu interface used by the relay device to establish a relay-type protocol data unit (protocol data unit, PDU) session may be different from the security protection strategy of the PC5 interface used by the relay device to establish a PC5 connection with the terminal device. Matching, resulting in the degradation of security protection, waste of resources and other issues. Therefore, how to make the relay device establish a relay type PDU session and match the strategy used by the PC5 connection is an urgent problem to be solved.
发明内容Contents of the invention
本申请提供一种通信方法和装置。The present application provides a communication method and device.
第一方面,提供了一种通信方法,该方法包括:In a first aspect, a communication method is provided, and the method includes:
第一网元获取第一策略,第一策略为第一终端设备通过第一中继设备接入网络时,第一中继设备建立中继类型的协议数据单元PDU会话使用的Uu接口用户面安全保护策略。The first network element obtains the first policy, and the first policy is when the first terminal device accesses the network through the first relay device, the Uu interface user plane security used by the first relay device to establish a relay-type protocol data unit PDU session protection strategy.
第一网元根据第一策略,确定第二策略,第二策略用于确定是否开启第一终端设备和第一中继设备之间的PC5接口用户面安全保护。The first network element determines a second policy according to the first policy, and the second policy is used to determine whether to enable user plane security protection of the PC5 interface between the first terminal device and the first relay device.
第一网元向第一终端设备和/或第一中继设备发送第二策略。The first network element sends the second policy to the first terminal device and/or the first relay device.
根据本申请的方案,第一网元可以获取Uu接口用户面安全保护策略,并根据Uu接口用户面安全保护策略确定PC5接口用户面安全保护策略,从而使得Uu接口与PC5接口的用户面安全保护策略相匹配。如果Uu接口与PC5接口的用户面安全保护策略匹配,即Uu接口与PC5接口使用同等级的用户面安全保护,可以是Uu接口与PC5接口的用户面安全保护均开启或均不开启。相比而言,如果Uu接口与PC5接口的用户面安全保护策略不匹配,例如,开启Uu接口用户面安全保护,而未开启PC5接口用户面安全保护,则第一终端设备与第一中继设备之间建立的PC5连接抵抗外部攻击的能力较弱,第一中继设备开启Uu接口用户面安全保护也未起到应有的作用,或者未开启Uu接口用户面安全保护,而开启PC5接口用户面安全保护,则在第一中继设备不需要开启Uu接口用户面安全保护的情况下,第一终端设备与第一中继设备之间建立的PC5连接开启了用户面安全保护,造 成了设备处理和网络资源的浪费。因此,采用本申请的方案可以使得Uu接口与PC5接口的用户面安全保护策略相匹配,解决由于策略不匹配造成的安全保护降级、资源浪费等问题。According to the solution of this application, the first network element can obtain the Uu interface user plane security protection policy, and determine the PC5 interface user plane security protection policy according to the Uu interface user plane security protection policy, so that the Uu interface and PC5 interface user plane security protection strategy matches. If the user plane security protection policies of the Uu interface and the PC5 interface match, that is, the Uu interface and the PC5 interface use the same level of user plane security protection, the user plane security protection of both the Uu interface and the PC5 interface can be enabled or disabled. In contrast, if the user plane security protection policies of the Uu interface and the PC5 interface do not match, for example, the user plane security protection of the Uu interface is enabled but the user plane security protection of the PC5 interface is not enabled, the first terminal device and the first relay The PC5 connection established between the devices is weak against external attacks, and the Uu interface user plane security protection of the first relay device does not play its due role, or the Uu interface user plane security protection is not enabled, and the PC5 interface is enabled User plane security protection, when the first relay device does not need to enable the Uu interface user plane security protection, the PC5 connection established between the first terminal device and the first relay device enables the user plane security protection, resulting in Waste of device processing and network resources. Therefore, adopting the solution of the present application can match the user plane security protection policy of the Uu interface and the PC5 interface, and solve problems such as security protection degradation and resource waste caused by policy mismatch.
结合第一方面,在第一方面的某些实现方式中,第二策略为PC5接口的用户面安全保护策略或是否开启PC5接口的用户面安全保护。第一网元根据第一策略,确定第二策略,包括:With reference to the first aspect, in some implementation manners of the first aspect, the second policy is the user plane security protection policy of the PC5 interface or whether to enable the user plane security protection of the PC5 interface. The first network element determines the second strategy according to the first strategy, including:
当第一策略指示开启Uu接口的用户面安全保护时,第一网元确定第二策略,第二策略指示开启PC5接口的用户面安全保护。当第一策略指示不开启Uu接口的用户面安全保护时,第一网元确定第二策略,第二策略指示不开启PC5接口的用户面安全保护。当第一策略指示偏好开启Uu接口的用户面安全保护时,第一网元确定第二策略,第二策略指示偏好开启PC5接口的用户面安全保护。结合第一方面,在第一方面的某些实现方式中,在第一策略指示偏好开启Uu接口的用户面安全保护时的情况下,该方法还包括:When the first policy indicates enabling the user plane security protection of the Uu interface, the first network element determines a second policy, and the second policy indicates enabling the user plane security protection of the PC5 interface. When the first policy indicates that the user plane security protection of the Uu interface is not enabled, the first network element determines a second policy, and the second policy indicates that the user plane security protection of the PC5 interface is not enabled. When the first policy indicates preference to enable user plane security protection of the Uu interface, the first network element determines a second policy, and the second policy indicates preference to enable user plane security protection of the PC5 interface. With reference to the first aspect, in some implementations of the first aspect, when the first policy indicates that the user plane security protection of the Uu interface is preferred, the method further includes:
第一网元确定是否开启PC5接口的用户面安全保护。第一网元向第一远程终端和/或第一中继设备发送第一指示信息,第一指示信息用于指示是否开启PC5接口的用户面安全保护。The first network element determines whether to enable user plane security protection of the PC5 interface. The first network element sends first indication information to the first remote terminal and/or the first relay device, where the first indication information is used to indicate whether to enable user plane security protection of the PC5 interface.
结合第一方面,在第一方面的某些实现方式中,该方法还包括:In combination with the first aspect, in some implementations of the first aspect, the method further includes:
第一网元获取第三策略,第三策略为第一终端设备通过第一中继设备接入网络时,第一中继设备建立中继类型的PDU会话使用的Uu接口信令面安全保护策略。第一网元根据第三策略,确定第四策略,第四策略用于确定是否开启第一终端设备和第一中继设备之间的PC5接口的信令面安全保护。第一网元向第一远程终端和/或第一中继设备发送第四策略。The first network element obtains the third policy, and the third policy is the Uu interface signaling plane security protection policy used by the first relay device to establish a relay-type PDU session when the first terminal device accesses the network through the first relay device . The first network element determines a fourth policy according to the third policy, and the fourth policy is used to determine whether to enable the signaling plane security protection of the PC5 interface between the first terminal device and the first relay device. The first network element sends the fourth policy to the first remote terminal and/or the first relay device.
根据本申请的方案,第一网元可以获取Uu接口信令面安全保护策略,并根据Uu接口信令面安全保护策略确定PC5接口信令面安全保护策略,从而使得Uu接口与PC5接口的信令面安全保护策略相匹配。According to the scheme of the present application, the first network element can obtain the Uu interface signaling plane security protection policy, and determine the PC5 interface signaling plane security protection policy according to the Uu interface signaling plane security protection policy, so that the Uu interface and the PC5 interface signal Match the face security protection policy.
结合第一方面,在第一方面的某些实现方式中,第三策略为PC5接口的信令面安全保护策略或是否开启PC5接口的信令面安全保护。第一网元根据第三策略,确定第四策略,包括:With reference to the first aspect, in some implementation manners of the first aspect, the third policy is the signaling plane security protection policy of the PC5 interface or whether to enable the signaling plane security protection of the PC5 interface. The first network element determines a fourth strategy according to the third strategy, including:
当第三策略指示开启Uu接口的信令面安全保护时,第一网元确定第四策略,第四策略指示开启PC5接口的信令面安全保护。当第三策略指示不开启Uu接口的信令面安全保护时,第一网元确定第四策略,第四策略指示不开启PC5接口的信令面安全保护。When the third policy indicates enabling the signaling plane security protection of the Uu interface, the first network element determines a fourth policy, and the fourth policy indicates enabling the signaling plane security protection of the PC5 interface. When the third policy indicates that the signaling plane security protection of the Uu interface is not enabled, the first network element determines a fourth policy, and the fourth policy indicates that the signaling plane security protection of the PC5 interface is not enabled.
结合第一方面,在第一方面的某些实现方式中,当第二策略指示开启PC5接口的用户面安全保护时,该方法还包括:With reference to the first aspect, in some implementations of the first aspect, when the second policy indicates enabling the user plane security protection of the PC5 interface, the method further includes:
第一网元根据第二策略,确定第四策略,第四策略指示开启PC5接口的信令面安全保护。The first network element determines a fourth policy according to the second policy, and the fourth policy indicates enabling signaling plane security protection of the PC5 interface.
结合第一方面,在第一方面的某些实现方式中,该方法还包括:In combination with the first aspect, in some implementations of the first aspect, the method further includes:
第一网元确定第一终端设备和/或第一中继设备对应的临近业务ProSe参数。第一网元向第二网元发送第一请求消息,第一请求消息用于请求第一策略,第一请求消息包括ProSe参数。The first network element determines ProSe parameters corresponding to the first terminal device and/or the first relay device. The first network element sends a first request message to the second network element, where the first request message is used to request a first policy, and the first request message includes a ProSe parameter.
第一网元获取第一策略,包括:The first network element obtains the first policy, including:
第一网元从第二网元获取第一策略。The first network element obtains the first policy from the second network element.
结合第一方面,在第一方面的某些实现方式中,该方法还包括:In combination with the first aspect, in some implementations of the first aspect, the method further includes:
第一网元确定第一终端设备和/或第一中继设备对应的临近业务ProSe参数。第一网元获取第一策略,包括:The first network element determines ProSe parameters corresponding to the first terminal device and/or the first relay device. The first network element obtains the first policy, including:
第一网元至少根据ProSe参数,从本地获取第一策略。The first network element acquires the first policy locally at least according to the ProSe parameter.
第二方面,提供了一种通信方法,该方法包括:In a second aspect, a communication method is provided, and the method includes:
获取第二对应关系,第二对应关系为N个临近业务ProSe参数与N个第二策略的一一对应关系,N为正整数。其中,第二对应关系与第一对应关系相关联,第一对应关系为N个ProSe参数与N个第一策略的一一对应关系,第一策略为Uu接口用户面安全保护策略。获取第一ProSe参数。根据第二对应关系,确定第一ProSe参数对应的第二策略,第一ProSe参数对应的第二策略用于确定是否开启第一终端设备与第一中继设备之间PC5接口的用户面安全保护。根据第一ProSe参数对应的第二策略建立PC5连接。A second correspondence is obtained, where the second correspondence is a one-to-one correspondence between N ProSe parameters of adjacent services and N second strategies, where N is a positive integer. Wherein, the second correspondence is associated with the first correspondence, the first correspondence is a one-to-one correspondence between N ProSe parameters and N first policies, and the first policy is a Uu interface user plane security protection policy. Get the first ProSe parameter. According to the second correspondence, determine the second strategy corresponding to the first ProSe parameter, and the second strategy corresponding to the first ProSe parameter is used to determine whether to enable the user plane security protection of the PC5 interface between the first terminal device and the first relay device . The PC5 connection is established according to the second policy corresponding to the first ProSe parameter.
根据本申请的方案,第一终端设备和第一中继设备可以分别获取第二对应关系,并且,该第二对应关系是与第一对应关系相关联的。在此基础上,当第一终端设备和第一中继设备获取了相同的第一ProSe参数时,可以确定第一ProSe参数对应的第二策略,利用此策略建立PC5连接。此外,由于第二对应关系与第一对应关系相关联,第一中继设备在建立中继PDU会话时使用的Uu接口用户面安全保护策略是与建立PC5连接使用的PC5接口用户面安全保护策略相匹配的。According to the solution of the present application, the first terminal device and the first relay device may respectively acquire the second correspondence, and the second correspondence is associated with the first correspondence. On this basis, when the first terminal device and the first relay device obtain the same first ProSe parameter, the second policy corresponding to the first ProSe parameter can be determined, and the PC5 connection can be established using this policy. In addition, since the second correspondence is associated with the first correspondence, the Uu interface user plane security protection policy used by the first relay device when establishing the relay PDU session is the same as the PC5 interface user plane security protection policy used to establish the PC5 connection matching.
结合第二方面,在第二方面的某些实现方式中,该方法还包括:With reference to the second aspect, in some implementation manners of the second aspect, the method further includes:
获取第四对应关系,第四对应关系为N个临近业务ProSe参数与N个第四策略的一一对应关系,N为正整数。其中,第四对应关系与第三对应关系相关联,第三对应关系为N个ProSe参数与N个第三策略的一一对应关系,第三策略为Uu接口信令面安全保护策略。根据第四对应关系,确定第一ProSe参数对应的第四策略,第一ProSe参数对应的第四策略用于确定是否开启第一终端设备与第一中继设备之间PC5接口的信令面安全保护。A fourth correspondence is acquired, where the fourth correspondence is a one-to-one correspondence between N ProSe parameters of adjacent services and N fourth strategies, where N is a positive integer. Wherein, the fourth correspondence is associated with the third correspondence, the third correspondence is a one-to-one correspondence between N ProSe parameters and N third strategies, and the third strategy is a Uu interface signaling plane security protection strategy. According to the fourth correspondence, determine the fourth policy corresponding to the first ProSe parameter, and the fourth policy corresponding to the first ProSe parameter is used to determine whether to enable the signaling plane security of the PC5 interface between the first terminal device and the first relay device Protect.
根据本申请的方案,第一终端设备和第一中继设备可以分别获取第四对应关系,并且,该第四对应关系是与第三对应关系相关联的。在此基础上,当第一终端设备和第一中继设备获取了相同的第一ProSe参数时,可以确定第一ProSe参数对应的第四策略,利用此策略建立PC5连接。此外,由于第四对应关系与第三对应关系相关联,第一中继设备在建立中继PDU会话时使用的Uu接口信令面安全保护策略是与建立PC5连接使用的PC5接口信令面安全保护策略相匹配的。According to the solution of the present application, the first terminal device and the first relay device may respectively acquire the fourth correspondence, and the fourth correspondence is associated with the third correspondence. On this basis, when the first terminal device and the first relay device have acquired the same first ProSe parameter, a fourth strategy corresponding to the first ProSe parameter can be determined, and the PC5 connection can be established using this strategy. In addition, since the fourth correspondence is associated with the third correspondence, the Uu interface signaling plane security protection strategy used by the first relay device when establishing a relay PDU session is the same as the PC5 interface signaling plane security policy used to establish a PC5 connection. match the protection strategy.
第三方面,提供了一种通信方法,该方法包括:In a third aspect, a communication method is provided, and the method includes:
第三网元获取第二策略,该第二策略为第一终端设备与第一中继设备建立PC5连接时使用的PC5接口用户面安全保护策略。The third network element obtains the second policy, where the second policy is a PC5 interface user plane security protection policy used when the first terminal device establishes a PC5 connection with the first relay device.
第三网元根据第二策略,确定第一策略,第一策略为第一中继设备建立中继类型的协议数据单元PDU会话使用的Uu接口用户面安全保护策略。The third network element determines the first strategy according to the second strategy, and the first strategy is a Uu interface user plane security protection strategy used by the first relay device to establish a relay-type protocol data unit PDU session.
第三网元根据第一策略为第一中继设备建立中继类型的PDU会话。The third network element establishes a relay-type PDU session for the first relay device according to the first policy.
根据本申请的方案,当第三网元需要为第一中继设备建立中继类型的PDU会话时,第三网元可以根据第一终端设备与第一中继设备建立PC5连接时使用的PC5接口用户面安全保护策略,确定为第一中继设备建立中继类型的PDU会话使用的Uu接口用户面安全 保护策略,从而使得第一中继设备建立PC5连接使用的策略与建立中继类型的PDU会话使用的策略相匹配。According to the solution of this application, when the third network element needs to establish a relay-type PDU session for the first relay device, the third network element can use the PC5 The interface user plane security protection policy is used to determine the Uu interface user plane security protection policy used by the first relay device to establish a relay-type PDU session, so that the first relay device establishes the PC5 connection using the same strategy as the relay-type PDU session. The policy used by the PDU session matches.
结合第三方面,在第三方面的某些实现方式中,第三网元根据第二策略,确定第一策略,包括:With reference to the third aspect, in some implementation manners of the third aspect, the third network element determines the first strategy according to the second strategy, including:
当第二策略指示开启PC5接口的用户面安全保护时,第三网元确定第一策略,第一策略指示开启Uu接口的用户面安全保护。当第二策略指示不开启PC5接口的用户面安全保护时,第三网元确定第一策略,第一策略指示不开启Uu接口的用户面安全保护。当第二策略指示偏好开启PC5接口的用户面安全保护时,第三网元确定第一策略,第一策略指示偏好开启Uu接口的用户面安全保护。When the second policy indicates enabling the user plane security protection of the PC5 interface, the third network element determines the first policy, and the first policy indicates enabling the user plane security protection of the Uu interface. When the second policy indicates that the user plane security protection of the PC5 interface is not enabled, the third network element determines the first policy, and the first policy indicates that the user plane security protection of the Uu interface is not enabled. When the second policy indicates preference to enable the user plane security protection of the PC5 interface, the third network element determines the first policy, and the first policy indicates preference to enable the user plane security protection of the Uu interface.
结合第三方面,在第三方面的某些实现方式中,该方法还包括:In combination with the third aspect, in some implementations of the third aspect, the method further includes:
第三网元获取第四策略,该第四策略为第一终端设备与第一中继设备建立PC5连接时使用的PC5接口信令面安全保护策略。The third network element acquires a fourth policy, where the fourth policy is a PC5 interface signaling plane security protection policy used when the first terminal device establishes a PC5 connection with the first relay device.
第三网元根据第四策略,确定第三策略,第一策略为第一中继设备建立中继类型的PDU会话使用的Uu接口信令面安全保护策略。The third network element determines a third strategy according to the fourth strategy, and the first strategy is a Uu interface signaling plane security protection strategy used by the first relay device to establish a relay-type PDU session.
第三网元根据第三策略为第一中继设备建立中继类型的PDU会话。The third network element establishes a relay-type PDU session for the first relay device according to the third policy.
第四方面,提供一种通信装置,该通信装置包括用于执行该第一方面中任一种可能实现方式中的方法的模块或单元。In a fourth aspect, a communication device is provided, and the communication device includes a module or a unit configured to execute the method in any possible implementation manner of the first aspect.
第五方面,提供一种通信装置,包括:In a fifth aspect, a communication device is provided, including:
收发单元,用于获取第二对应关系,第二对应关系为N个临近业务ProSe参数与N个第二策略的一一对应关系,N为正整数。其中,第二对应关系与第一对应关系相关联,第一对应关系为N个ProSe参数与N个第一策略的一一对应关系,第一策略为Uu接口用户面安全保护策略。The transceiver unit is configured to obtain a second correspondence, where the second correspondence is a one-to-one correspondence between N adjacent service ProSe parameters and N second strategies, where N is a positive integer. Wherein, the second correspondence is associated with the first correspondence, the first correspondence is a one-to-one correspondence between N ProSe parameters and N first policies, and the first policy is a Uu interface user plane security protection policy.
收发单元,还用于获取第一ProSe参数。The transceiver unit is further configured to obtain the first ProSe parameter.
处理单元,用于根据第二对应关系,确定第一ProSe参数对应的第二策略,第一ProSe参数对应的第二策略用于确定是否开启第一终端设备与第一中继设备之间PC5接口的用户面安全保护。The processing unit is configured to determine a second strategy corresponding to the first ProSe parameter according to the second correspondence, and the second strategy corresponding to the first ProSe parameter is used to determine whether to enable the PC5 interface between the first terminal device and the first relay device user plane security protection.
处理单元,还用于根据第一ProSe参数对应的第二策略建立PC5连接。The processing unit is further configured to establish the PC5 connection according to the second policy corresponding to the first ProSe parameter.
结合第五方面,在第五方面的某些实现方式中,In combination with the fifth aspect, in some implementations of the fifth aspect,
收发单元,还用于获取第四对应关系,第四对应关系为N个临近业务ProSe参数与N个第四策略的一一对应关系,N为正整数。其中,第四对应关系与第三对应关系相关联,第三对应关系为N个ProSe参数与N个第三策略的一一对应关系,第三策略为Uu接口信令面安全保护策略。The transceiver unit is further configured to acquire a fourth correspondence, where the fourth correspondence is a one-to-one correspondence between N adjacent service ProSe parameters and N fourth strategies, where N is a positive integer. Wherein, the fourth correspondence is associated with the third correspondence, the third correspondence is a one-to-one correspondence between N ProSe parameters and N third strategies, and the third strategy is a Uu interface signaling plane security protection strategy.
处理单元,还用于根据第四对应关系,确定第一ProSe参数对应的第四策略,第一ProSe参数对应的第四策略用于确定是否开启第一终端设备与第一中继设备之间PC5接口的信令面安全保护。The processing unit is further configured to determine a fourth strategy corresponding to the first ProSe parameter according to the fourth correspondence, and the fourth strategy corresponding to the first ProSe parameter is used to determine whether to enable the PC5 between the first terminal device and the first relay device. Interface signaling plane security protection.
第六方面,提供一种通信装置,包括:In a sixth aspect, a communication device is provided, including:
收发单元,用于获取第二策略,该第二策略为第一终端设备与第一中继设备建立PC5连接时使用的PC5接口用户面安全保护策略。The transceiver unit is configured to acquire a second policy, which is a PC5 interface user plane security protection policy used when the first terminal device establishes a PC5 connection with the first relay device.
处理单元,用于根据第二策略,确定第一策略,第一策略为第一中继设备建立中继类 型的协议数据单元PDU会话使用的Uu接口用户面安全保护策略。The processing unit is configured to determine the first strategy according to the second strategy, and the first strategy is a Uu interface user plane security protection strategy used by the first relay device to establish a relay-type protocol data unit PDU session.
处理单元,还用于根据第一策略为第一中继设备建立中继类型的PDU会话。The processing unit is further configured to establish a relay-type PDU session for the first relay device according to the first policy.
结合第六方面,在第六方面的某些实现方式中,处理单元,用于根据第二策略,确定第一策略,包括:With reference to the sixth aspect, in some implementation manners of the sixth aspect, the processing unit is configured to determine the first strategy according to the second strategy, including:
当第二策略指示开启PC5接口的用户面安全保护时,处理单元确定第一策略,第一策略指示开启Uu接口的用户面安全保护。当第二策略指示不开启PC5接口的用户面安全保护时,处理单元确定第一策略,第一策略指示不开启Uu接口的用户面安全保护。当第二策略指示偏好开启PC5接口的用户面安全保护时,处理单元确定第一策略,第一策略指示偏好开启Uu接口的用户面安全保护。When the second policy indicates to enable the user plane security protection of the PC5 interface, the processing unit determines the first policy, and the first policy indicates to enable the user plane security protection of the Uu interface. When the second policy indicates that the user plane security protection of the PC5 interface is not enabled, the processing unit determines the first policy, and the first policy indicates that the user plane security protection of the Uu interface is not enabled. When the second policy indicates preference to enable the user plane security protection of the PC5 interface, the processing unit determines the first policy, and the first policy indicates preference to enable the user plane security protection of the Uu interface.
结合第六方面,在第六方面的某些实现方式中,In combination with the sixth aspect, in some implementations of the sixth aspect,
收发单元,还用于获取第四策略,该第四策略为第一终端设备与第一中继设备建立PC5连接时使用的PC5接口信令面安全保护策略。The transceiver unit is further configured to acquire a fourth policy, which is a PC5 interface signaling plane security protection policy used when the first terminal device establishes a PC5 connection with the first relay device.
处理单元,还用于根据第四策略,确定第三策略,第一策略为第一中继设备建立中继类型的PDU会话使用的Uu接口信令面安全保护策略。The processing unit is further configured to determine a third strategy according to the fourth strategy, where the first strategy is a Uu interface signaling plane security protection strategy used by the first relay device to establish a relay-type PDU session.
处理单元,还用于根据第三策略为第一中继设备建立中继类型的PDU会话。The processing unit is further configured to establish a relay-type PDU session for the first relay device according to the third strategy.
第七方面,提供一种通信装置,包括至少一个处理器。该存储器用于存储计算机程序,当该通信装置运行时,处理器执行存储器存储的计算机程序或指令,使得该通信装置执行第一方面至第三方面中任一种可能实现方式中的方法。In a seventh aspect, a communication device is provided, including at least one processor. The memory is used to store computer programs. When the communication device is running, the processor executes the computer programs or instructions stored in the memory, so that the communication device executes the method in any possible implementation manner of the first aspect to the third aspect.
第八方面,提供一种计算机可读存储介质,包括计算机程序,当计算机程序在计算机上运行时,使得计算机执行第一方面至第三方面中任一种可能实现方式中的方法。In an eighth aspect, a computer-readable storage medium is provided, including a computer program. When the computer program runs on a computer, the computer executes the method in any possible implementation manner of the first aspect to the third aspect.
第九方面,提供一种芯片,芯片上设置有处理电路,处理电路用于执行第一方面至第三方面中任一种可能实现方式中的方法。In a ninth aspect, a chip is provided, and a processing circuit is disposed on the chip, and the processing circuit is configured to execute the method in any possible implementation manner of the first aspect to the third aspect.
第十方面,提供了一种计算机程序产品,计算机程序产品包括:计算机程序(也可以称为代码,或指令),当计算机程序被运行时,使得计算机执行第一方面至第三方面中任一种可能实现方式中的方法。In a tenth aspect, a computer program product is provided, and the computer program product includes: a computer program (also referred to as code, or instruction), when the computer program is executed, the computer executes any one of the first aspect to the third aspect. method in one possible implementation.
附图说明Description of drawings
图1示出了本申请实施例适用的通信系统的架构。Fig. 1 shows the architecture of a communication system to which the embodiment of the present application is applicable.
图2示出了本申请所提出的方法的一例示意性交互图。Fig. 2 shows an example of a schematic interaction diagram of the method proposed in this application.
图3示出了本申请所提出的方法的另一例示意性交互图。Fig. 3 shows another example of a schematic interaction diagram of the method proposed in this application.
图4示出了本申请所提出的方法的另一例示意性交互图。Fig. 4 shows another example of a schematic interaction diagram of the method proposed in this application.
图5示出了本申请所提出的方法的另一例示意性交互图。Fig. 5 shows another example of a schematic interaction diagram of the method proposed in this application.
图6示出本申请提供的通信设备的一种示意性框图。Fig. 6 shows a schematic block diagram of a communication device provided by the present application.
图7示出本申请提供的通信设备的另一种示意性框图。Fig. 7 shows another schematic block diagram of a communication device provided by this application.
具体实施方式Detailed ways
下面将结合附图,对本申请中的技术方案进行描述。The technical solution in this application will be described below with reference to the accompanying drawings.
图1示出了本申请实施例适用的通信系统的架构。Fig. 1 shows the architecture of a communication system to which the embodiment of the present application is applicable.
下面结合图1对本申请中涉及的一些术语进行说明。Some terms involved in this application will be described below with reference to FIG. 1 .
1、核心网1. Core network
核心网中包括但不限于数据存储管理网元、移动性管理网元、网络开放网元、用户面功能网元、会话管理网元等。The core network includes, but is not limited to, data storage management network elements, mobility management network elements, network open network elements, user plane function network elements, and session management network elements.
其中,数据存储管理网元是一种用于对终端设备的数据进行存储与管理的网元,例如,在5G网络中,可以是统一数据管理功能网元(unified data management,UDM)。在未来通信系统中,统一数据管理功能网元仍可以是UDM网元,或者,还可以有其它的名称,本申请不做限定。Wherein, the data storage management network element is a network element used to store and manage the data of the terminal equipment, for example, in a 5G network, it may be a unified data management function network element (unified data management, UDM). In the future communication system, the unified data management function network element may still be a UDM network element, or may have other names, which are not limited in this application.
移动性管理网元,是一种用于对终端设备的移动性进行管理的网元,例如,在4G网络中,可以是移动管理实体(mobility management entity,MME),在5G网络中,可以是接入和移动性管理功能(access and mobility management function,AMF)网元。在未来通信系统中,接入和移动性管理功能网元仍可以是AMF网元,或者,还可以有其它的名称,本申请不做限定。The mobility management network element is a network element used to manage the mobility of terminal equipment. For example, in a 4G network, it may be a mobility management entity (mobility management entity, MME), and in a 5G network, it may be Access and mobility management function (access and mobility management function, AMF) network element. In the future communication system, the access and mobility management functional network element may still be an AMF network element, or may have other names, which are not limited in this application.
网络开放网元,负责将网络的功能提供给第三方应用,例如,在5G网络中,可以是网络开放功能(network exposure function,NEF)网元。在未来通信系统中,网络开放功能网元仍可以是NEF网元,或者,还可以有其它的名称,本申请不做限定。The network exposure network element is responsible for providing network functions to third-party applications. For example, in a 5G network, it can be a network exposure function (NEF) network element. In the future communication system, the network element with the network opening function may still be an NEF network element, or may have other names, which are not limited in this application.
用户面功能网元负责用户数据的转发和接收,例如,在5G网络中,可以是用户面功能(user plane function,UPF)网元。在未来通信系统中,用户面功能网元仍可以是UPF网元,或者,还可以有其它的名称,本申请不做限定。The user plane function network element is responsible for forwarding and receiving user data, for example, in a 5G network, it may be a user plane function (user plane function, UPF) network element. In the future communication system, the user plane functional network element may still be a UPF network element, or may have other names, which are not limited in this application.
会话管理网元,负责用户面网元的选择、因特网协议(internet protocol,IP)地址分配、会话的建立、修改、释放等。例如,在5G网络中,可以是会话管理功能(session management function,SMF)网元。在未来通信系统中,会话管理功能网元仍可以是SMF网元,或者,还可以有其它的名称,本申请不做限定。The session management network element is responsible for the selection of user plane network elements, Internet protocol (internet protocol, IP) address allocation, session establishment, modification, release, etc. For example, in a 5G network, it may be a session management function (session management function, SMF) network element. In the future communication system, the network element with the session management function may still be an SMF network element, or may have other names, which are not limited in this application.
2、接入网设备2. Access network equipment
接入网设备是一种为终端设备提供无线通信功能的设备,例如,可以是WLAN中的接入点(access point,AP),GSM或CDMA中的基站(base transceiver station,BTS),也可以是WCDMA中的基站(nodeB,NB),或者是新型无线系统(new radio,NR)系统中的gNB,还可以是LTE中的演进型基站(evolutional node B,eNB或eNodeB),在5G网络中,还可以是无线接入网设备(radio access network,RAN)。An access network device is a device that provides wireless communication functions for terminal devices. For example, it can be an access point (access point, AP) in WLAN, a base transceiver station (BTS) in GSM or CDMA, or a It is a base station (nodeB, NB) in WCDMA, or a gNB in a new wireless system (new radio, NR) system, or an evolved base station (evolutional node B, eNB or eNodeB) in LTE. In a 5G network , and may also be a radio access network device (radio access network, RAN).
3、终端设备3. Terminal equipment
终端设备可以指用户设备(user equipment,UE)、接入终端、用户单元、用户站、移动站、移动台、远方站、远程终端、移动设备、用户终端、终端、无线通信设备、用户代理或用户装置。终端设备还可以是蜂窝电话、无绳电话、会话启动协议(session initiation protocol,SIP)电话、无线本地环路(wireless local loop,WLL)站、个人数字处理(personal digital assistant,PDA)、具有无线通信功能的手持设备、计算设备或连接到无线调制解调器的其它处理设备、车载设备、无人机、可穿戴设备,未来5G网络中的终端设备或者未来演进的公用陆地移动通信网络(public land mobile network,PLMN)中的终端设备等,本申请实施例对此并不限定。Terminal equipment may refer to user equipment (user equipment, UE), access terminal, subscriber unit, subscriber station, mobile station, mobile station, remote station, remote terminal, mobile device, user terminal, terminal, wireless communication device, user agent, or user device. The terminal device may also be a cellular phone, a cordless phone, a session initiation protocol (SIP) phone, a wireless local loop (WLL) station, a personal digital assistant (PDA), a Functional handheld devices, computing devices or other processing devices connected to wireless modems, vehicle-mounted devices, drones, wearable devices, terminal devices in future 5G networks or future evolution of public land mobile networks (public land mobile network, PLMN), etc., which are not limited in this embodiment of the present application.
应理解,本申请中的终端设备支持临近业务(proximity-based services,ProSe)通信。即,终端设备可以与中继设备建立侧链路(side link)连接,通过中继设备接入网络。终 端设备与中继设备之间是通过PC5接口通信的。当终端设备通过中继设备接入网络时,终端设备又可以称为远端UE(remote UE)。It should be understood that the terminal device in this application supports proximity-based services (Proximity-based services, ProSe) communication. That is, the terminal device can establish a side link (side link) connection with the relay device, and access the network through the relay device. The communication between the terminal device and the relay device is through the PC5 interface. When a terminal device accesses the network through a relay device, the terminal device can also be called a remote UE (remote UE).
4、中继设备4. Relay equipment
中继设备同样支持ProSe通信,中继设备与远端UE通过PC5接口通信,中继设备与接入网设备通过Uu接口通信。中继设备可以是终端设备或者无线接入设备(例如运营商部署的接入设备)。The relay device also supports ProSe communication. The relay device communicates with the remote UE through the PC5 interface, and the relay device communicates with the access network device through the Uu interface. The relay device may be a terminal device or a wireless access device (for example, an access device deployed by an operator).
下面结合图2对本申请提出的方案进行详细说明。应理解,图2所示的方案可以应用于图1的通信系统中。The scheme proposed in this application will be described in detail below with reference to FIG. 2 . It should be understood that the solution shown in FIG. 2 can be applied to the communication system in FIG. 1 .
S201,UDM获取第一对应关系,该第一对应关系为临近业务(proximity-based services,ProSe)参数和Uu接口的用户面安全保护策略(记为,第一策略)的对应关系。其中,第一策略为远程UE通过中继设备接入网络时,中继设备建立中继类型的协议数据单元(protocol data unit,PDU)会话使用的Uu接口的用户面安全保护策略。第一策略用于间接确定是否开启中继设备建立的中继类型的PDU会话使用的用户面安全保护。S201. The UDM acquires a first correspondence, where the first correspondence is a correspondence between a proximity-based services (ProSe) parameter and a user plane security protection policy (denoted as the first policy) of the Uu interface. Wherein, the first strategy is a user plane security protection strategy for the Uu interface used by the relay device to establish a relay-type protocol data unit (protocol data unit, PDU) session when the remote UE accesses the network through the relay device. The first policy is used to indirectly determine whether to enable the user plane security protection used by the relay type PDU session established by the relay device.
下面介绍UDM获取第一对应关系的方式。The following describes how the UDM acquires the first correspondence.
方式1:Method 1:
第一对应关系为在UDM中预配置的。The first correspondence is preconfigured in the UDM.
方式2:Method 2:
UDM从ProSe应用服务器(ProSe application server)或者应用功能(application function,AF)网元获取第一对应关系。需要说明的是,UDM可以直接从ProSe应用服务器或应用功能网元获取第一对应关系,也可间接的通过网络开放功能(network exposure function,NEF)网元获取第一对应关系。The UDM obtains the first corresponding relationship from a ProSe application server (ProSe application server) or an application function (application function, AF) network element. It should be noted that the UDM can obtain the first corresponding relationship directly from the ProSe application server or the application function network element, or indirectly obtain the first corresponding relationship through the network exposure function (NEF) network element.
下面对第一对应关系进行说明。The first corresponding relationship will be described below.
情况1:Case 1:
ProSe参数为中继服务代码(relay service code,RSC)参数。即,第一对应关系为RSC参数与第一策略的对应关系。例如,该第一对应关系可以为表1所示的内容。The ProSe parameter is a relay service code (relay service code, RSC) parameter. That is, the first correspondence is the correspondence between the RSC parameter and the first policy. For example, the first corresponding relationship may be the content shown in Table 1.
表1Table 1
RSC#1RSC#1 第一策略#1First Strategy #1
RSC#2RSC#2 第一策略#2First Strategy #2
RSC#3RSC#3 第一策略#3First Strategy #3
情况2:Case 2:
ProSe参数为单网络切片选择辅助信息(single network slice selection assistance information,S-NSSAI)参数和数据网络名称(data network name,DNN)参数。即,第一对应关系为S-NSSAI和/或DNN与第一策略的对应关系。例如,该第一对应关系可以为表2所示的内容。The ProSe parameters are single network slice selection assistance information (single network slice selection assistance information, S-NSSAI) parameters and data network name (data network name, DNN) parameters. That is, the first correspondence is the correspondence between the S-NSSAI and/or the DNN and the first policy. For example, the first corresponding relationship may be the content shown in Table 2.
表2Table 2
S-NSSAI#1和/或DNN#1S-NSSAI#1 and/or DNN#1 第一策略#1First Strategy #1
S-NSSAI#2和/或DNN#2S-NSSAI#2 and/or DNN#2 第一策略#2First Strategy #2
S-NSSAI#3和/或DNN#3S-NSSAI#3 and/or DNN#3 第一策略#3First Strategy #3
需要说明的是,如果ProSe参数为S-NSSAI和/或DNN信息,远程UE通过中继设备 接入网络时,中继设备建立中继类型的PDU会话使用的S-NSSAI参数应与ProSe参数中的S-NSSAI参数相同,和/或中继设备建立中继类型的PDU会话使用的DNN参数应与ProSe参数中的DNN参数相同。It should be noted that if the ProSe parameter is S-NSSAI and/or DNN information, when the remote UE accesses the network through the relay device, the S-NSSAI parameter used by the relay device to establish a relay-type PDU session should be the same as that in the ProSe parameter The S-NSSAI parameters of the relay device shall be the same, and/or the DNN parameters used by the relay device to establish a relay type PDU session shall be the same as the DNN parameters in the ProSe parameters.
在一种可能的实现方式中,中继设备与远程UE由相同的UDM进行服务(例如,UDM#1),则可以在UDM#1中配置第一对应关系。In a possible implementation manner, the relay device and the remote UE are served by the same UDM (for example, UDM#1), and the first corresponding relationship may be configured in UDM#1.
在另一种可能的实现方式中,中继设备与远程UE由不同的UDM服务(例如,中继设备由UDM#1服务,远程UE由UDM#2服务),则需要在UDM#1和UDM#2中均配置第一对应关系。即,在UDM#1和UDM#2中配置相同的第一对应关系。In another possible implementation, the relay device and the remote UE are served by different UDMs (for example, the relay device is served by UDM#1, and the remote UE is served by UDM#2), then UDM#1 and UDM The first corresponding relationship is configured in #2. That is, the same first correspondence is configured in UDM#1 and UDM#2.
S202,SMF获取第一对应关系。S202. The SMF acquires the first correspondence.
该过程与S201类似,其中,SMF获取第一对应关系的方式也可以有两种,第一对应关系也可以分为两种情况,具体可参考S201中第一对应关系的获取方式,在此不再赘述。This process is similar to S201, wherein there are two ways for SMF to obtain the first corresponding relationship, and the first corresponding relationship can also be divided into two situations. For details, please refer to the method for obtaining the first corresponding relationship in S201, which will not be described here. Let me repeat.
在一种可能的实现方式中,该方法可以不包括S201,而包括S202;或者,该方法可以既包括S201也包括S202;或者,该方法可以包括S201,而不包括S202。In a possible implementation manner, the method may not include S201, but may include S202; or, the method may include both S201 and S202; or, the method may include S201, but not include S202.
S203,中继设备#1(第一中继设备的一例)向AMF发送第一请求消息,该第一请求消息用于请求中继设备#1对应的临近业务(proximity-based services,ProSe)参数,和/或远程UE#1(第一终端设备的一例)向AMF发送第二请求消息,该第二请求消息用于请求远程UE#1对应的临近业务(proximity-based services,ProSe)参数。相应的,AMF接收来自中继设备#1的第一请求消息和/或AMF接收来自远程UE#1的第二请求消息。S203, the relay device #1 (an example of the first relay device) sends a first request message to the AMF, where the first request message is used to request the proximity-based services (Proximity-based services, ProSe) parameters corresponding to the relay device #1 , and/or the remote UE#1 (an example of the first terminal device) sends a second request message to the AMF, where the second request message is used to request the proximity-based services (Proximity-based services, ProSe) parameters corresponding to the remote UE#1. Correspondingly, the AMF receives the first request message from the relay device #1 and/or the AMF receives the second request message from the remote UE #1.
在一种可能的实现方式中,第一请求消息还可以携带信息#1,该信息#1指示中继设备#1具有中继能力。第二请求消息还可以携带信息#2,该信息#2指示远程UE#1支持通过中继设备接入网络。In a possible implementation manner, the first request message may also carry information #1, where the information #1 indicates that the relay device #1 has a relay capability. The second request message may also carry information #2, where the information #2 indicates that the remote UE #1 supports accessing the network through the relay device.
需要说明的是,中继设备#1与远程UE#1可以由相同的AMF服务,也可由不同的AMF服务。It should be noted that the relay device #1 and the remote UE#1 may be served by the same AMF, or may be served by different AMFs.
S204,AMF确定中继设备#1具有中继能力,和/或确定远程UE#1支持通过中继设备接入网络。S204, the AMF determines that the relay device #1 has a relay capability, and/or determines that the remote UE#1 supports network access through the relay device.
应理解,AMF还可以确定中继设备#1支持的中继业务,和/或确定远程UE#1支持的中继业务。It should be understood that the AMF may also determine the relay service supported by the relay device #1, and/or determine the relay service supported by the remote UE#1.
S205,AMF向PCF发送第三请求消息和/或第四请求消息。相应的,PCF接收来自AMF的第三请求消息和/或第四请求消息。S205. The AMF sends the third request message and/or the fourth request message to the PCF. Correspondingly, the PCF receives the third request message and/or the fourth request message from the AMF.
其中,第三请求消息由第一请求消息触发,用于请求中继设备#1对应的ProSe参数,第四请求消息由第二请求消息触发,用于向PCF请求远程UE#1对应的ProSe参数。Wherein, the third request message is triggered by the first request message, and is used to request the ProSe parameter corresponding to the relay device #1, and the fourth request message is triggered by the second request message, and is used to request the ProSe parameter corresponding to the remote UE #1 from the PCF .
其中,AMF可以在第三请求消息中携带中继设备#1支持的中继业务信息;AMF可以在第四请求消息中携带远程UE#1具有的中继业务信息。Wherein, the AMF may carry the relay service information supported by the relay device #1 in the third request message; the AMF may carry the relay service information of the remote UE#1 in the fourth request message.
需要说明的是,如果中继设备#1与远程UE#1可以由相同的AMF服务,则该AMF可以向同一PCF请求中继设备#1的ProSe参数与远程UE#1的ProSe参数,或者,该AMF也可向不同的PCF分别请求中继设备#1的ProSe参数与远程UE#1的ProSe参数。It should be noted that if the relay device #1 and the remote UE#1 can be served by the same AMF, the AMF can request the ProSe parameter of the relay device #1 and the ProSe parameter of the remote UE#1 from the same PCF, or, The AMF may also separately request the ProSe parameters of the relay device #1 and the ProSe parameters of the remote UE#1 from different PCFs.
如果中继设备#1与远程UE#1由不同的AMF服务,则不同的AMF可以向相同的PCF请求中继设备#1的ProSe参数与远程UE#1的ProSe参数,或者,不同的AMF也可向不同的PCF分别请求中继设备#1的ProSe参数与远程UE#1的ProSe参数。If the relay device #1 and the remote UE#1 are served by different AMFs, the different AMFs may request the ProSe parameters of the relay device #1 and the ProSe parameters of the remote UE#1 from the same PCF, or the different AMFs may also request The ProSe parameters of the relay device #1 and the ProSe parameters of the remote UE #1 may be requested from different PCFs respectively.
S206,PCF确定中继设备#1对应的ProSe参数,和/或确定远程UE#1对应的ProSe参数。S206, the PCF determines the ProSe parameter corresponding to the relay device #1, and/or determines the ProSe parameter corresponding to the remote UE#1.
PCF根据中继设备#1支持的中继业务,确定中继设备#1对应的ProSe参数。和/或PCF根据远程UE#1支持的中继业务,确定远程UE#1对应的ProSe参数。The PCF determines the ProSe parameters corresponding to the relay device #1 according to the relay service supported by the relay device #1. And/or the PCF determines the ProSe parameter corresponding to the remote UE#1 according to the relay service supported by the remote UE#1.
下面对ProSe参数进行说明。The ProSe parameters are described below.
情况1:Case 1:
与S201中情况1对应,ProSe参数可以为RSC参数。Corresponding to case 1 in S201, the ProSe parameter may be an RSC parameter.
情况2:Case 2:
与S201中情况2对应,ProSe参数可以为S-NSSAI参数和/或DNN参数。Corresponding to case 2 in S201, the ProSe parameters may be S-NSSAI parameters and/or DNN parameters.
应理解,PCF可以先确定RSC参数,然后根据RSC参数确定S-NSSAI参数和/或DNN参数。It should be understood that the PCF may first determine the RSC parameters, and then determine the S-NSSAI parameters and/or the DNN parameters according to the RSC parameters.
应理解,如果远程UE#1后续可以通过中继设备#1接入网络,则远程UE#1对应的ProSe参数与中继设备#1对应的ProSe参数相同。下面假设远程UE#1可以通过中继设备#1接入网络,并且将远程UE#1对应的ProSe参数与中继设备#1对应的ProSe参数记为ProSe参数#1。It should be understood that if the remote UE#1 can subsequently access the network through the relay device #1, the ProSe parameters corresponding to the remote UE#1 are the same as the ProSe parameters corresponding to the relay device #1. In the following, it is assumed that the remote UE#1 can access the network through the relay device #1, and the ProSe parameter corresponding to the remote UE#1 and the ProSe parameter corresponding to the relay device #1 are recorded as ProSe parameter #1.
需要说明的是,如果ProSe参数为S-NSSAI参数和/或DNN参数,远程UE#1通过中继设备#1接入网络时,中继设备#1建立中继类型的PDU会话使用的S-NSSAI参数和/或DNN参数应与ProSe参数中的S-NSSAI参数和/或DNN参数相同。It should be noted that if the ProSe parameter is an S-NSSAI parameter and/or a DNN parameter, when the remote UE#1 accesses the network through the relay device #1, the S-NSSAI parameter used by the relay device #1 to establish a relay type PDU session The NSSAI parameters and/or DNN parameters shall be the same as the S-NSSAI parameters and/or DNN parameters in the ProSe parameters.
S207,PCF向UDM发送第五请求消息,该第五请求消息中包括ProSe参数#1。相应的,UDM接收来自PCF的第五请求消息。S207. The PCF sends a fifth request message to the UDM, where the fifth request message includes ProSe parameter #1. Correspondingly, the UDM receives the fifth request message from the PCF.
下面对第五请求消息中包括的ProSe参数#1进行说明。ProSe parameter #1 included in the fifth request message will be described below.
情况1:Case 1:
与S201中的情况1对应,ProSe参数#1可以为RSC参数#1。Corresponding to case 1 in S201, ProSe parameter #1 may be RSC parameter #1.
情况2:Case 2:
与S201中的情况2对应,ProSe参数#1可以为S-NSSAI参数#1和/或DNN参数#1。Corresponding to case 2 in S201, ProSe parameter #1 may be S-NSSAI parameter #1 and/or DNN parameter #1.
S208,UDM根据第一对应关系以及ProSe参数#1,确定第一策略#1。S208. The UDM determines the first policy #1 according to the first correspondence and the ProSe parameter #1.
下面介绍UDM根据第一对应关系以及ProSe参数#1确定第一策略#1的几种情况。Several situations in which the UDM determines the first policy #1 according to the first correspondence and the ProSe parameter #1 are introduced below.
情况1:Case 1:
与S201中的情况1对应,UDM中配置的第一对应关系为RSC参数与第一策略的对应关系,第三请求消息中包括的ProSe参数#1为RSC参数#1,则UDM根据RSC参数#1以及第一对应关系,确定第一策略#1。Corresponding to case 1 in S201, the first corresponding relationship configured in the UDM is the corresponding relationship between the RSC parameter and the first policy, and the ProSe parameter #1 included in the third request message is the RSC parameter #1, then the UDM according to the RSC parameter # 1 and the first corresponding relationship, the first policy #1 is determined.
情况2:Case 2:
与S201中的情况2对应,UDM中配置的第一对应关系为S-NSSAI参数和/或DNN参数与第一策略的对应关系,第三请求消息中包括的ProSe参数#1为S-NSSAI参数#1和/或DNN参数#1,则UDM根据S-NSSAI参数#1和/或DNN参数#1以及第一对应关系,确定第一策略#1。Corresponding to case 2 in S201, the first correspondence configured in the UDM is the correspondence between the S-NSSAI parameter and/or the DNN parameter and the first policy, and the ProSe parameter #1 included in the third request message is the S-NSSAI parameter #1 and/or DNN parameter #1, the UDM determines the first strategy #1 according to the S-NSSAI parameter #1 and/or DNN parameter #1 and the first corresponding relationship.
S209,UDM向PCF发送第一策略#1。相应地,PCF接收第一策略#1。S209. The UDM sends the first policy #1 to the PCF. Accordingly, the PCF receives the first policy #1.
应理解,在以下三种情况中的任意一种或几种之下,该方法还包括下述S210-S212。It should be understood that, under any one or several of the following three situations, the method further includes the following S210-S212.
情况A:该方法不包括S201而包括S202。Case A: The method does not include S201 but includes S202.
情况B:该方法包括S201,但是在S208中UDM并没有确定第一策略#1;或在S209中UDM没有向PCF发送第一策略#1。Situation B: The method includes S201, but in S208 the UDM does not determine the first policy #1; or in S209 the UDM does not send the first policy #1 to the PCF.
情况C:运营商配置PCF必须从SMF获取第一策略#1。Case C: The operator configures the PCF to obtain the first policy #1 from the SMF.
S210,PCF向SMF发送第六请求消息,该第六请求消息中包括ProSe参数#1。相应的,SMF接受来自PCF的第六请求消息。S210, the PCF sends a sixth request message to the SMF, where the sixth request message includes ProSe parameter #1. Correspondingly, the SMF accepts the sixth request message from the PCF.
该过程与S207类似,具体可以参考S207的描述,不同仅在于S207中的UDM替换为此步中的SMF,此处不再赘述。This process is similar to S207. For details, refer to the description of S207. The only difference is that the UDM in S207 is replaced by the SMF in this step, which will not be repeated here.
S211,SMF根据第一对应关系以及ProSe参数#1,确定第一策略#1。S211. The SMF determines a first policy #1 according to the first correspondence and the ProSe parameter #1.
该过程与S208类似,具体可以参考S208的描述,不同仅在于S208中的UDM替换为此步中的SMF,此处不再赘述。This process is similar to S208, for details, please refer to the description of S208, the only difference is that the UDM in S208 is replaced by the SMF in this step, which will not be repeated here.
S212,SMF向PCF发送第一策略#1。相应地,PCF接收来自于SMF的第一策略#1。S212. The SMF sends the first policy #1 to the PCF. Correspondingly, the PCF receives the first policy #1 from the SMF.
S213,PCF根据第一策略#1确定第二策略(记为第二策略#1),第二策略#1用于确定是否开启远程UE#1与中继设备#1之间的PC5接口的用户面安全保护。下面介绍PCF根据第一策略#1确定第二策略#1的几种情况。S213, the PCF determines the second strategy (referred to as the second strategy #1) according to the first strategy #1, and the second strategy #1 is used to determine whether to enable the user of the PC5 interface between the remote UE#1 and the relay device #1 Surface security protection. Several situations in which the PCF determines the second policy #1 according to the first policy #1 are introduced below.
情况1:Case 1:
第二策略#1为PC5接口的用户面安全保护策略。第一策略#1指示开启Uu接口的用户面安全保护,即,第一策略#1为Uu接口的用户面安全保护策略为REQUIRED。PCF根据第一策略#1确定第二策略#1,第二策略#1指示开启PC5接口的用户面安全保护,即,第二策略#1为PC5接口的用户面安全保护策略为REQUIRED。The second policy #1 is a user plane security protection policy for the PC5 interface. The first policy #1 indicates enabling the user plane security protection of the Uu interface, that is, the first policy #1 is that the user plane security protection policy of the Uu interface is REQUIRED. The PCF determines the second policy #1 according to the first policy #1, and the second policy #1 indicates enabling the user plane security protection of the PC5 interface, that is, the second policy #1 is that the user plane security protection policy of the PC5 interface is REQUIRED.
具体地,第二策略#1为PC5接口的用户面机密性和/或完整性保护策略。第一策略#1指示开启Uu接口的用户面机密性保护和/或用户面完整性保护,即,第一策略#1为Uu接口的用户面机密性和/或完整性保护策略为REQUIRED。相应地,第二策略#1指示开启PC5接口的用户面机密性保护和/或用户面完整性保护,即,第二策略#1为PC5接口的用户面机密性和/或完整性保护策略为REQUIRED。可选的,如果第二策略#1为PC5接口的用户面机密性和/或完整性保护策略为REQUIRED,则第二策略#1同时指示开启PC5接口的信令面机密性保护和/或完整性保护。Specifically, the second policy #1 is a user plane confidentiality and/or integrity protection policy of the PC5 interface. The first policy #1 indicates to enable the user plane confidentiality protection and/or the user plane integrity protection of the Uu interface, that is, the first policy #1 is that the user plane confidentiality and/or integrity protection policy of the Uu interface is REQUIRED. Correspondingly, the second policy #1 indicates to enable the user plane confidentiality protection and/or the user plane integrity protection of the PC5 interface, that is, the second policy #1 is that the user plane confidentiality and/or integrity protection policy of the PC5 interface is REQUIRED. Optionally, if the second policy #1 is that the user plane confidentiality and/or integrity protection policy of the PC5 interface is REQUIRED, then the second policy #1 also indicates that the signaling plane confidentiality protection and/or integrity protection of the PC5 interface is enabled. sexual protection.
情况2:Case 2:
第二策略#1为PC5接口的用户面安全保护策略。第一策略#1指示不开启Uu接口的用户面安全保护,即,第一策略#1为Uu接口的用户面安全保护策略为NOT NEEDED。PCF根据第一策略#1确定第二策略#1,第二策略#1指示不开启PC5接口的用户面安全保护,即,第二策略#1为PC5接口的用户面安全保护策略为NOT NEEDED。The second policy #1 is a user plane security protection policy for the PC5 interface. The first policy #1 indicates that the user plane security protection of the Uu interface is not enabled, that is, the first policy #1 is that the user plane security protection policy of the Uu interface is NOT NEEDED. The PCF determines the second policy #1 according to the first policy #1, and the second policy #1 indicates that the user plane security protection of the PC5 interface is not enabled, that is, the second policy #1 is that the user plane security protection policy of the PC5 interface is NOT NEEDED.
具体地,第二策略#1为PC5接口的用户面机密性和/或完整性保护策略。第一策略#1指示不开启Uu接口的用户面机密性和/或用户面完整性保护,即,第一策略#1为Uu接口的用户面机密性和/或完整性保护策略为NOT NEEDED。相应地,第二策略#1指示不开启PC5接口的用户面机密性和/或用户面完整性保护,即,第二策略#1为PC5接口的用户面机密性和/或完整性保护策略为NOT NEEDED。Specifically, the second policy #1 is a user plane confidentiality and/or integrity protection policy of the PC5 interface. The first policy #1 indicates that the user plane confidentiality and/or user plane integrity protection of the Uu interface is not enabled, that is, the first policy #1 is that the user plane confidentiality and/or integrity protection policy of the Uu interface is NOT NEEDED. Correspondingly, the second policy #1 indicates that the user plane confidentiality and/or user plane integrity protection of the PC5 interface is not enabled, that is, the second policy #1 is that the user plane confidentiality and/or integrity protection policy of the PC5 interface is NOT NEEDED.
可选的,如果第二策略#1为PC5接口的用户面机密性和/或完整性保护策略为NOT NEEDED,则第二策略#1同时指示不开启PC5接口的信令面机密性保护和/或完整性保护。Optionally, if the second policy #1 is that the user plane confidentiality and/or integrity protection policy of the PC5 interface is NOT NEEDED, then the second policy #1 also indicates that the signaling plane confidentiality protection and/or integrity protection of the PC5 interface is not enabled or integrity protection.
情况3:Case 3:
第二策略#1为PC5接口的用户面安全保护策略。第一策略#1指示偏好开启Uu接口的用户面安全保护,即,第一策略#1为Uu接口的用户面安全保护策略为PREFERRED。PCF根据第一策略#1确定第二策略#1,第二策略#1指示偏好开启PC5接口的用户面安全保护,即,第二策略#1为PC5接口的用户面安全保护策略为PREFERRED。The second policy #1 is a user plane security protection policy for the PC5 interface. The first policy #1 indicates that it is preferred to enable the user plane security protection of the Uu interface, that is, the first policy #1 is that the user plane security protection policy of the Uu interface is PREFERRED. The PCF determines the second policy #1 according to the first policy #1, and the second policy #1 indicates preference to enable the user plane security protection of the PC5 interface, that is, the second policy #1 is that the user plane security protection policy of the PC5 interface is PREFERRED.
具体地,第二策略#1为PC5接口的用户面机密性和/或完整性保护策略。第一策略#1指示偏好开启Uu接口的用户面机密性和/或用户面完整性保护,即,第一策略#1为Uu接口的用户面机密性和/或完整性保护策略为PREFERRED,相应地,第二策略#1指示偏好开启PC5接口的用户面机密性和/或用户面完整性保护,即,第二策略#1为PC5接口的用户面机密性和/或完整性保护策略为PREFERRED。Specifically, the second policy #1 is a user plane confidentiality and/or integrity protection policy of the PC5 interface. The first policy #1 indicates preference to enable the user plane confidentiality and/or user plane integrity protection of the Uu interface, that is, the first policy #1 is that the user plane confidentiality and/or integrity protection policy of the Uu interface is PREFERRED, corresponding Specifically, the second policy #1 indicates preference to enable the user plane confidentiality and/or user plane integrity protection of the PC5 interface, that is, the second policy #1 is that the user plane confidentiality and/or integrity protection policy of the PC5 interface is PREFERRED .
可选的,如果第二策略#1为PC5接口的用户面机密性和/或完整性保护策略为PREFERRED,则第二策略#1同时指示偏好开启PC5接口的信令面机密性保护和/或完整性保护。Optionally, if the second policy #1 is that the user plane confidentiality and/or integrity protection policy of the PC5 interface is PREFERRED, then the second policy #1 also indicates preference to enable the signaling plane confidentiality protection and/or Integrity protection.
情况4:Case 4:
第二策略#1为PC5接口的用户面安全保护策略。第一策略#1指示偏好开启Uu接口的用户面安全,即,第一策略#1为Uu接口的用户面安全保护策略为PREFERRED。PCF可以确定远程UE#1与中继设备#1之间是否需要开启PC5接口的用户面安全保护,并对应的确定第二策略#1。The second policy #1 is a user plane security protection policy for the PC5 interface. The first policy #1 indicates that it is preferred to enable the user plane security of the Uu interface, that is, the first policy #1 is that the user plane security protection policy of the Uu interface is PREFERRED. The PCF can determine whether the user plane security protection of the PC5 interface needs to be enabled between the remote UE #1 and the relay device #1, and determine the second policy #1 accordingly.
在一种可能的实现方式中,在第一策略#1指示偏好开启Uu接口的用户面安全情况下,PCF可以根据运营商默认配置、现有网络负载或中继类型的PDU会话对应的ProSe应用提供的需求确定远程UE#1与中继设备#1之间是否需要开启PC5接口的用户面安全保护,具体方法此处不做具体限定。In a possible implementation, in the case where the first policy #1 indicates that the Uu interface is preferred for user plane security, the PCF can apply ProSe according to the default configuration of the operator, the existing network load, or the PDU session corresponding to the relay type. The provided requirements determine whether the user plane security protection of the PC5 interface needs to be enabled between the remote UE#1 and the relay device#1, and the specific method is not specifically limited here.
具体地,第二策略#1为PC5接口的用户面安全保护策略。第一策略#1指示偏好开启Uu接口的用户面安全,即,第一策略#1为Uu接口的用户面安全保护策略为PREFERRED。如果PCF确定需要开启PC5接口的用户面安全保护,则PCF确定第二策略#1,第二策略#1指示开启PC5接口的用户面安全保护,即,第二策略#1为PC5接口的用户面机密性和/或完整性保护策略为REQUIRED。Specifically, the second policy #1 is a user plane security protection policy for the PC5 interface. The first policy #1 indicates that it is preferred to enable the user plane security of the Uu interface, that is, the first policy #1 is that the user plane security protection policy of the Uu interface is PREFERRED. If the PCF determines that the user plane security protection of the PC5 interface needs to be enabled, the PCF determines the second policy #1, and the second policy #1 indicates to enable the user plane security protection of the PC5 interface, that is, the second policy #1 is the user plane security protection of the PC5 interface. The confidentiality and/or integrity protection policy is REQUIRED.
第二策略#1为PC5接口的用户面安全保护策略。第一策略#1指示偏好开启Uu接口的用户面安全,即,第一策略#1为Uu接口的用户面安全保护策略为PREFERRED。如果PCF确定需要不开启PC5接口的用户面安全保护,则PCF确定第二策略#1,第二策略#1指示不开启PC5接口的用户面安全保护,即,第二策略#1为PC5接口的用户面机密性和/或完整性保护策略为NOT NEEDED。The second policy #1 is a user plane security protection policy for the PC5 interface. The first policy #1 indicates that it is preferred to enable the user plane security of the Uu interface, that is, the first policy #1 is that the user plane security protection policy of the Uu interface is PREFERRED. If the PCF determines that it is necessary not to enable the user plane security protection of the PC5 interface, the PCF determines the second policy #1, and the second policy #1 indicates that the user plane security protection of the PC5 interface is not enabled, that is, the second policy #1 is the PC5 interface The user plane confidentiality and/or integrity protection policy is NOT NEEDED.
可选的,如果第二策略#1为PC5接口的用户面机密性和/或完整性保护策略为REQUIRED,则第二策略#1同时指示开启PC5接口的信令面机密性保护和/或完整性保护。Optionally, if the second policy #1 is that the user plane confidentiality and/or integrity protection policy of the PC5 interface is REQUIRED, then the second policy #1 also indicates that the signaling plane confidentiality protection and/or integrity protection of the PC5 interface is enabled. sexual protection.
可选的,如果第二策略#1为PC5接口的用户面机密性和/或完整性保护策略为NOT NEEDED,则第二策略#1同时指示不开启PC5接口的信令面机密性保护和/或完整性保护。Optionally, if the second policy #1 is that the user plane confidentiality and/or integrity protection policy of the PC5 interface is NOT NEEDED, then the second policy #1 also indicates that the signaling plane confidentiality protection and/or integrity protection of the PC5 interface is not enabled or integrity protection.
情况5:Case 5:
第二策略#1为PC5接口的用户面安全保护策略。第一策略#1指示偏好开启Uu接口的用户面安全,即,第一策略#1为Uu接口的用户面安全保护策略为PREFERRED。PCF根据第一策略#1确定第二策略#1,第二策略#1指示偏好开启PC5接口的用户面安全保护, 即,第二策略#1为PC5接口的用户面安全保护策略为PREFERRED。The second policy #1 is a user plane security protection policy for the PC5 interface. The first policy #1 indicates that it is preferred to enable the user plane security of the Uu interface, that is, the first policy #1 is that the user plane security protection policy of the Uu interface is PREFERRED. The PCF determines the second policy #1 according to the first policy #1, and the second policy #1 indicates preference to enable the user plane security protection of the PC5 interface, that is, the second policy #1 is that the user plane security protection policy of the PC5 interface is PREFERRED.
此外,PCF可以根据运营商默认配置、现有网络负载或中继类型的PDU会话对应的ProSe应用提供的需求确定是否需要开启PC5接口的用户面安全保护,并生成第一指示信息。第一指示信息用于指示远程UE#1与中继设备#1之间是否需要开启PC5接口的用户面安全保护。In addition, the PCF may determine whether to enable the user plane security protection of the PC5 interface according to the operator's default configuration, the existing network load, or the requirements provided by the ProSe application corresponding to the relay type PDU session, and generate the first indication information. The first indication information is used to indicate whether the user plane security protection of the PC5 interface needs to be enabled between the remote UE #1 and the relay device #1.
具体地,第二策略#1为PC5接口的用户面安全保护策略。第一策略#1指示偏好开启Uu接口的用户面机密性和/或完整性安全,即,第一策略#1为Uu接口的用户面机密性和/或完整性安全保护策略为PREFERRED。相应地,第二策略#1指示偏好开启PC5接口的用户面机密性和/或用户面完整性保护,即,第二策略#1为PC5接口的用户面机密性和/或完整性保护策略为PREFERRED。此外,如果PCF确定需要开启PC5接口的用户面安全保护,则PCF生成第一指示信息,第一指示信息指示开启PC5接口的用户面机密性和/或完整性保护。Specifically, the second policy #1 is a user plane security protection policy for the PC5 interface. The first policy #1 indicates preference to enable the user plane confidentiality and/or integrity security of the Uu interface, that is, the first policy #1 is that the user plane confidentiality and/or integrity security protection policy of the Uu interface is PREFERRED. Correspondingly, the second policy #1 indicates preference to enable the user plane confidentiality and/or user plane integrity protection of the PC5 interface, that is, the second policy #1 is that the user plane confidentiality and/or integrity protection policy of the PC5 interface is PREFERRED. In addition, if the PCF determines that the user plane security protection of the PC5 interface needs to be enabled, the PCF generates first indication information, where the first indication information indicates enabling the user plane confidentiality and/or integrity protection of the PC5 interface.
第二策略#1为PC5接口的用户面安全保护策略。第一策略#1指示偏好开启Uu接口的用户面机密性和/或完整性安全,即,第一策略#1为Uu接口的用户面机密性和/或完整性安全保护策略为PREFERRED。相应地,第二策略#1指示偏好开启PC5接口的用户面机密性和/或用户面完整性保护,即,第二策略#1为PC5接口的用户面机密性和/或完整性保护策略为PREFERRED。此外,如果PCF确定需要不开启PC5接口的用户面安全保护,则PCF生成第一指示信息,第一指示信息指示不开启PC5接口的用户面机密性和/或完整性保护。The second policy #1 is a user plane security protection policy for the PC5 interface. The first policy #1 indicates preference to enable the user plane confidentiality and/or integrity security of the Uu interface, that is, the first policy #1 is that the user plane confidentiality and/or integrity security protection policy of the Uu interface is PREFERRED. Correspondingly, the second policy #1 indicates preference to enable the user plane confidentiality and/or user plane integrity protection of the PC5 interface, that is, the second policy #1 is that the user plane confidentiality and/or integrity protection policy of the PC5 interface is PREFERRED. In addition, if the PCF determines that the user plane security protection of the PC5 interface needs not to be enabled, the PCF generates first indication information, and the first indication information indicates that the user plane confidentiality and/or integrity protection of the PC5 interface is not enabled.
情况6:Case 6:
第二策略#1指示是否开启PC5接口的用户面安全保护。第一策略#1指示开启Uu接口的用户面安全保护,即,第一策略#1为Uu接口的用户面安全保护策略为REQUIRED。PCF根据第一策略#1确定第二策略#1,第二策略#1直接指示开启PC5接口的用户面安全保护。The second policy #1 indicates whether to enable the user plane security protection of the PC5 interface. The first policy #1 indicates enabling the user plane security protection of the Uu interface, that is, the first policy #1 is that the user plane security protection policy of the Uu interface is REQUIRED. The PCF determines the second policy #1 according to the first policy #1, and the second policy #1 directly instructs to enable the user plane security protection of the PC5 interface.
具体地,第二策略#1指示是否开启PC5接口的用户面机密性和/或完整性保护。第一策略#1指示开启Uu接口的用户面机密性保护和/或用户面完整性保护,即,第一策略#1为Uu接口的用户面机密性和/或完整性保护策略为REQUIRED,相应地,第二策略#1直接指示开启PC5接口的用户面机密性保护和/或用户面完整性保护。Specifically, the second policy #1 indicates whether to enable user plane confidentiality and/or integrity protection of the PC5 interface. The first policy #1 indicates that the user plane confidentiality protection and/or the user plane integrity protection of the Uu interface are enabled, that is, the first policy #1 is that the user plane confidentiality and/or integrity protection policy of the Uu interface is REQUIRED, and the corresponding Specifically, the second policy #1 directly indicates to enable the user plane confidentiality protection and/or the user plane integrity protection of the PC5 interface.
可选的,如果第二策略#1直接指示开启PC5接口的用户面机密性和/或完整性保护,则第二策略#1同时指示开启PC5接口的信令面机密性和/或完整性保护。Optionally, if the second policy #1 directly indicates to enable the user plane confidentiality and/or integrity protection of the PC5 interface, the second policy #1 also indicates to enable the signaling plane confidentiality and/or integrity protection of the PC5 interface .
情况7:Case 7:
第二策略#1指示是否开启PC5接口的用户面安全保护。第一策略#1指示不开启Uu接口的用户面安全保护,即,第一策略#1为Uu接口的用户面安全保护策略为NOT NEEDED。PCF根据第一策略#1确定第二策略#1,第二策略#1直接指示不开启PC5接口的用户面安全保护。The second policy #1 indicates whether to enable the user plane security protection of the PC5 interface. The first policy #1 indicates that the user plane security protection of the Uu interface is not enabled, that is, the first policy #1 is that the user plane security protection policy of the Uu interface is NOT NEEDED. The PCF determines the second policy #1 according to the first policy #1, and the second policy #1 directly indicates that the user plane security protection of the PC5 interface is not enabled.
具体地,第二策略#1指示是否开启PC5接口的用户面机密性和/或完整性保护。第一策略#1指示不开启Uu接口的用户面机密性和/或用户面完整性保护,即,第一策略#1为Uu接口的用户面机密性和/或完整性保护策略为NOT NEEDED,相应地,第二策略#1直接指示不开启PC5接口的用户面机密性和/或用户面完整性保护。Specifically, the second policy #1 indicates whether to enable user plane confidentiality and/or integrity protection of the PC5 interface. The first policy #1 indicates that the user plane confidentiality and/or user plane integrity protection of the Uu interface is not enabled, that is, the first policy #1 is that the user plane confidentiality and/or integrity protection policy of the Uu interface is NOT NEEDED, Correspondingly, the second policy #1 directly indicates not to enable user plane confidentiality and/or user plane integrity protection of the PC5 interface.
情况8:Case 8:
第二策略#1指示是否开启PC5接口的用户面安全保护。第一策略#1指示偏好开启Uu接口的用户面安全保护,即,第一策略#1为Uu接口的用户面安全保护策略为PREFERRED。PCF可以确定远程UE#1与中继设备#1之间是否需要开启PC5接口的用户面安全保护,并对应的确定第二策略#1。The second policy #1 indicates whether to enable the user plane security protection of the PC5 interface. The first policy #1 indicates that it is preferred to enable the user plane security protection of the Uu interface, that is, the first policy #1 is that the user plane security protection policy of the Uu interface is PREFERRED. The PCF can determine whether the user plane security protection of the PC5 interface needs to be enabled between the remote UE #1 and the relay device #1, and determine the second policy #1 accordingly.
在一种可能的实现方式中,PCF可以根据运营商默认配置、现有网络负载或中继类型的PDU会话对应的ProSe应用提供的需求确定远程UE#1与中继设备#1之间是否需要开启PC5接口的用户面安全保护,具体方法此处不做具体限定。In a possible implementation, the PCF can determine whether the connection between the remote UE #1 and the relay device #1 needs Enable the user plane security protection of the PC5 interface. The specific method is not limited here.
具体地,第二策略#1指示是否开启PC5接口的用户面机密性和/或完整性安全保护。第一策略#1指示偏好开启Uu接口的用户面机密性和/或完整性安全,即,第一策略#1为Uu接口的用户面机密性和/或完整性安全保护策略为PREFERRED。如果PCF确定需要开启PC5接口的用户面机密性和/或完整性安全保护,则PCF确定第二策略#1,第二策略#1直接指示开启PC5接口的用户面机密性和/或完整性保护。Specifically, the second policy #1 indicates whether to enable user plane confidentiality and/or integrity security protection of the PC5 interface. The first policy #1 indicates preference to enable the user plane confidentiality and/or integrity security of the Uu interface, that is, the first policy #1 is that the user plane confidentiality and/or integrity security protection policy of the Uu interface is PREFERRED. If the PCF determines that the user plane confidentiality and/or integrity security protection of the PC5 interface needs to be enabled, the PCF determines the second policy #1, and the second policy #1 directly indicates that the user plane confidentiality and/or integrity protection of the PC5 interface is enabled .
第二策略#1指示是否开启PC5接口的用户面机密性和/或完整性安全保护。第一策略#1指示偏好开启Uu接口的用户面机密性和/或完整性安全,即,第一策略#1为Uu接口的用户面机密性和/或完整性安全保护策略为PREFERRED。如果PCF确定需要不开启PC5接口的用户面机密性和/或完整性安全保护,则PCF确定第二策略#1,第二策略#1直接指示不开启PC5接口的用户面机密性和/或完整性保护。The second policy #1 indicates whether to enable the user plane confidentiality and/or integrity security protection of the PC5 interface. The first policy #1 indicates preference to enable the user plane confidentiality and/or integrity security of the Uu interface, that is, the first policy #1 is that the user plane confidentiality and/or integrity security protection policy of the Uu interface is PREFERRED. If the PCF determines that it is necessary not to enable the user plane confidentiality and/or integrity security protection of the PC5 interface, the PCF determines the second policy #1, and the second policy #1 directly indicates that the user plane confidentiality and/or integrity of the PC5 interface is not enabled. sexual protection.
可选的,如果第二策略#1直接指示开启PC5接口的用户面机密性和/或完整性保护,则第二策略#1同时指示开启PC5接口的信令面机密性和/或完整性保护。Optionally, if the second policy #1 directly indicates to enable the user plane confidentiality and/or integrity protection of the PC5 interface, the second policy #1 also indicates to enable the signaling plane confidentiality and/or integrity protection of the PC5 interface .
S214,PCF向远程UE#1和/或中继设备#1发送第二策略#1。相应地,远程UE#1和/或中继设备#1接收第二策略#1。S214, the PCF sends the second policy #1 to the remote UE #1 and/or the relay device #1. Correspondingly, the remote UE #1 and/or the relay device #1 receives the second policy #1.
可选的,如果S213按照情况5进行,则PCF同时向远程UE#1和/或中继设备#1发送第一指示信息。Optionally, if S213 is performed according to Case 5, the PCF simultaneously sends the first indication information to the remote UE#1 and/or the relay device#1.
根据本申请的方案,PCF可以获取Uu接口用户面安全保护策略,并根据Uu接口用户面安全保护策略确定PC5接口用户面安全保护策略,从而使得Uu接口与PC5接口的用户面安全保护策略相匹配。相比而言,如果Uu接口与PC5接口的用户面安全保护策略不匹配,例如,开启Uu接口用户面安全保护,而未开启PC5接口用户面安全保护,则远端UE#1与中继设备#1之间建立的PC5连接抵抗外部攻击的能力较弱,中继设备#1开启Uu接口用户面安全保护也未起到应有的作用,造成资源的浪费。因此,采用本申请的方案可以使得Uu接口与PC5接口的用户面安全保护策略相匹配,解决由于策略不匹配造成的安全保护降级、资源浪费等问题。According to the solution of this application, the PCF can obtain the Uu interface user plane security protection policy, and determine the PC5 interface user plane security protection policy according to the Uu interface user plane security protection policy, so that the Uu interface matches the PC5 interface user plane security protection policy . In contrast, if the user plane security protection policies of the Uu interface and the PC5 interface do not match, for example, the user plane security protection of the Uu interface is enabled but the user plane security protection of the PC5 interface is not enabled, the remote UE#1 and the relay device The PC5 connection established between #1 has a weak ability to resist external attacks, and the user plane security protection of the Uu interface on the relay device #1 does not play its due role, resulting in a waste of resources. Therefore, adopting the solution of the present application can match the user plane security protection policy of the Uu interface and the PC5 interface, and solve problems such as security protection degradation and resource waste caused by policy mismatch.
在一种可能的实现方式中,该方法还包括下述S215-S217。In a possible implementation manner, the method further includes the following S215-S217.
S215,PCF获取中继设备#1和/或远程UE#1对应的Uu接口的信令面安全保护策略(记为第三策略#1)。S215. The PCF acquires the signaling plane security protection policy (referred to as the third policy #1) of the Uu interface corresponding to the relay device #1 and/or the remote UE #1.
其中,第三策略#1为远程UE#1通过中继设备#1接入网络时,中继设备#1建立中继类型的PDU会话使用的Uu接口信令面安全保护策略。应理解,如果中继设备#1后续可以通过远程UE#1接入网络,则中继设备#1和远程UE#1对应的Uu接口的信令面安全保护策略可以是相同的。Wherein, the third policy #1 is a Uu interface signaling plane security protection policy used by the relay device #1 to establish a relay type PDU session when the remote UE#1 accesses the network through the relay device #1. It should be understood that if the relay device #1 can subsequently access the network through the remote UE#1, the signaling plane security protection policy of the Uu interface corresponding to the relay device #1 and the remote UE#1 may be the same.
应理解,在一种可能的实现方式中,Uu接口的信令面完整性保护是强制性开启的,而是否开启Uu接口信令面机密性保护是由运营商决定的。It should be understood that, in a possible implementation manner, the integrity protection of the signaling plane of the Uu interface is forcibly enabled, and whether to enable the confidentiality protection of the signaling plane of the Uu interface is determined by the operator.
可选的,Uu接口的信令面完整性和/或机密性保护是否开启,均由运营商确定。Optionally, whether the signaling plane integrity and/or confidentiality protection of the Uu interface is enabled is determined by the operator.
下面介绍PCF获取第三策略#1的方式:The following describes how the PCF obtains the third policy #1:
方式1:Method 1:
在PCF中预配置第三策略#1。A third policy #1 is pre-configured in the PCF.
方式2:Method 2:
PCF从中继设备#1和/或远程UE#1对应的接入网设备获取第三策略#1。The PCF acquires the third policy #1 from the relay device #1 and/or the access network device corresponding to the remote UE #1.
方式3:Method 3:
PCF从中继设备#1和/或远程UE#1对应其他的核心网网元获取第三策略#1,例如,其他核心网网元可以是UDM、AMF、SMF或5G DDNMF,此处不做限定。PCF obtains the third policy #1 from relay device #1 and/or remote UE#1 corresponding to other core network elements. For example, other core network elements can be UDM, AMF, SMF or 5G DDNMF, which is not limited here .
S216,PCF根据第三策略#1确定第四策略(记为第四策略#1),第四策略#1用于确定是否开启远程UE#1与中继设备#1之间的PC5接口信令面安全保护。S216, the PCF determines the fourth strategy (referred to as the fourth strategy #1) according to the third strategy #1, and the fourth strategy #1 is used to determine whether to enable the PC5 interface signaling between the remote UE#1 and the relay device #1 Surface security protection.
下面介绍PCF根据第三策略#1确定第四策略#1的几种情况。Several situations in which the PCF determines the fourth strategy #1 according to the third strategy #1 are introduced below.
情况1:Case 1:
第三策略#1指示开启Uu接口的信令面完整性和/或机密性保护,则第四策略#1指示开启PC5接口的信令面完整性和/或机密性保护。The third policy #1 indicates to enable the integrity and/or confidentiality protection of the signaling plane of the Uu interface, and the fourth policy #1 indicates to enable the integrity and/or confidentiality protection of the signaling plane of the PC5 interface.
情况2:Case 2:
第三策略#1指示不开启Uu接口的信令面完整性和/或机密性保护,则第四策略#1指示不开启PC5接口的信令面完整性和/或机密性保护。The third policy #1 indicates that the signaling plane integrity and/or confidentiality protection of the Uu interface is not enabled, and the fourth policy #1 indicates that the signaling plane integrity and/or confidentiality protection of the PC5 interface is not enabled.
根据本申请的方案,PCF可以获取Uu接口信令面安全保护策略,并根据Uu接口信令面安全保护策略确定PC5接口信令面安全保护策略,从而使得Uu接口与PC5接口的信令面安全保护策略相匹配。According to the solution of this application, PCF can obtain the Uu interface signaling plane security protection policy, and determine the PC5 interface signaling plane security protection policy according to the Uu interface signaling plane security protection policy, so that the signaling planes of the Uu interface and PC5 interface are safe Protection policies match.
可选的,PCF还可不根据第三策略#1确定第四策略#1,而改为根据第二策略#1确定第四策略#1,具体的,如果第二策略#1指示开启PC5接口的用户面机密性和/或完整性安全保护,则PCF根据第二策略#1确定第四策略#1,第四策略#1指示开启PC5接口的信令面机密性保护和/或完整性保护。在一种可能的实现方式中,如果第二策略#1为PC5接口的用户面完整性保护/机密性保护为REQUIRED,则PCF根据第二策略#1确定第四策略#1,第四策略#1为PC5接口的信令面完整性保护/机密性保护为REQUIRED。在另一种可能的实现方式中,如果第二策略#1为PC5接口的用户面完整性保护/机密性保护为REQUIRED,则PCF根据第二策略#1确定第四策略#1,第四策略#1直接指示开启PC5接口的信令面完整性保护/机密性保护。Optionally, instead of determining the fourth policy #1 according to the third policy #1, the PCF determines the fourth policy #1 according to the second policy #1. Specifically, if the second policy #1 indicates to enable the PC5 interface For user plane confidentiality and/or integrity protection, the PCF determines a fourth policy #1 according to the second policy #1, and the fourth policy #1 indicates enabling the signaling plane confidentiality protection and/or integrity protection of the PC5 interface. In a possible implementation, if the second policy #1 is that the user plane integrity protection/confidentiality protection of the PC5 interface is REQUIRED, then the PCF determines the fourth policy #1 according to the second policy #1, and the fourth policy # 1 indicates that the signaling plane integrity protection/confidentiality protection of the PC5 interface is REQUIRED. In another possible implementation, if the second policy #1 is that the user plane integrity protection/confidentiality protection of the PC5 interface is REQUIRED, then the PCF determines the fourth policy #1 according to the second policy #1, and the fourth policy #1 directly indicates to enable the signaling plane integrity protection/confidentiality protection of the PC5 interface.
S217,PCF向远程UE#1和/或中继设备#1发送第四策略#1。相应地,远程UE#1和/或中继设备#1接收第四策略#1。S217, the PCF sends the fourth policy #1 to the remote UE #1 and/or the relay device #1. Correspondingly, the remote UE #1 and/or the relay device #1 receives the fourth policy #1.
应理解,在一种可能的实现方式中,如果PCF确定的第二策略#1指示开启PC5接口的用户面安全保护,则PCF可以确定开启PC5接口的信令面安全保护。即,第四策略#1和/或第二策略#1还指示开启PC5接口的信令面安全保护。It should be understood that, in a possible implementation manner, if the second policy #1 determined by the PCF indicates enabling the user plane security protection of the PC5 interface, the PCF may determine to enable the signaling plane security protection of the PC5 interface. That is, the fourth policy #1 and/or the second policy #1 also indicate to enable the signaling plane security protection of the PC5 interface.
S218,远程UE#1与中继设备#1在建立PC5连接时,根据第二策略#1建立该PC5连接的用户面安全。S218, when the remote UE #1 and the relay device #1 establish the PC5 connection, establish the user plane security of the PC5 connection according to the second policy #1.
在一种可能的实现方式中,远程UE#1与中继设备#1在建立PC5连接时,根据第四策略#1建立该PC5连接的信令面安全。In a possible implementation manner, when the remote UE #1 and the relay device #1 establish the PC5 connection, the signaling plane security of the PC5 connection is established according to the fourth policy #1.
在一种可能的实现方式中,如果第二策略#1可同时指示开启PC5接口的信令面机密性和/或完整性保护,则远程UE#1与中继设备#1在建立PC5连接时,根据第二策略#1建立该PC5连接的信令面安全。In a possible implementation, if the second policy #1 can indicate to enable the signaling plane confidentiality and/or integrity protection of the PC5 interface at the same time, when the remote UE #1 and the relay device #1 establish the PC5 connection , establish the signaling plane security of the PC5 connection according to the second policy #1.
可选的,如果S213按照情况5进行,远程UE#1与中继设备#1在建立PC5连接时,根据第一指示信息建立该PC5连接的用户面安全。Optionally, if S213 is performed according to case 5, when the remote UE#1 and the relay device#1 establish the PC5 connection, establish the user plane security of the PC5 connection according to the first indication information.
在一种可能的实现方式中,在S213按照情况5进行的情况下,当远程UE#1与中继设备#1协商PC5连接的用户面安全保护开启方式时,可以优先根据第一指示信息建立该PC5连接的用户面安全;或者,也可以不根据第一指示信息建立该PC5连接的用户面安全,而仍使用第二策略#1建立该PC5连接的用户面安全,本申请对此不作限定。In a possible implementation, when S213 is performed according to case 5, when the remote UE#1 negotiates with the relay device#1 about the way to enable the user plane security protection of the PC5 connection, it may preferentially establish the The user plane security of the PC5 connection; or, the user plane security of the PC5 connection may not be established according to the first instruction information, and the second policy #1 is still used to establish the user plane security of the PC5 connection, which is not limited in this application .
下面结合图3对本申请提出的方案进行详细说明。应理解,图3所示的方案可以应用于图1的通信系统中。The solution proposed by this application will be described in detail below with reference to FIG. 3 . It should be understood that the solution shown in FIG. 3 may be applied to the communication system in FIG. 1 .
S301,PCF获取第一对应关系。S301. The PCF acquires a first correspondence.
下面介绍PCF获取第一对应关系的方式。The manner in which the PCF obtains the first correspondence is introduced below.
方式1:Method 1:
第一对应关系为在PCF中预配置的。The first correspondence is preconfigured in the PCF.
方式2:Method 2:
PCF从ProSe应用服务器(ProSe application server)或者应用功能(application function,AF)网元获取第一对应关系。需要说明的是,PCF可以直接从ProSe应用服务器或应用功能网元获取第一对应关系,也可间接的通过网络开放网元(network exposure function,NEF)获取。The PCF obtains the first corresponding relationship from a ProSe application server (ProSe application server) or an application function (application function, AF) network element. It should be noted that the PCF can obtain the first corresponding relationship directly from the ProSe application server or the application function network element, or indirectly through the network exposure function (NEF).
与S201中相同,该第一对应关系也可以包括两种情况,不同仅在于S201中的UDM替换为此步中的PCF,在此不再赘述。Same as in S201, the first correspondence may also include two situations, the only difference is that the UDM in S201 is replaced by the PCF in this step, which will not be repeated here.
S302,中继设备#1向AMF发送第一请求消息,和/或远程UE#1向AMF发送第二请求消息。相应的,AMF接收来自中继设备#1的第一请求消息和/或AMF接收来自远程UE#1的第二请求消息。S302, the relay device #1 sends a first request message to the AMF, and/or the remote UE#1 sends a second request message to the AMF. Correspondingly, the AMF receives the first request message from the relay device #1 and/or the AMF receives the second request message from the remote UE #1.
具体可以参考S203的描述,在此不再赘述。For details, reference may be made to the description of S203, which will not be repeated here.
S303,AMF确定中继设备#1具有中继能力,和/或确定远程UE#1支持通过中继设备接入网络。S303. The AMF determines that the relay device #1 has a relay capability, and/or determines that the remote UE#1 supports network access through the relay device.
该过程与S204相同,具体可以参考S204的描述。This process is the same as S204, for details, please refer to the description of S204.
S304,AMF向PCF发送第三请求消息和/或第四请求消息。相应的,PCF接收来自AMF的第三请求消息和/或第四请求消息。S304. The AMF sends the third request message and/or the fourth request message to the PCF. Correspondingly, the PCF receives the third request message and/or the fourth request message from the AMF.
其中,第三请求消息由第一请求消息触发,用于请求中继设备#1对应的ProSe参数,第四请求消息由第二请求消息触发,用于向PCF请求远程UE#1对应的ProSe参数。该过程与S205相同,具体可以参考S205的描述。Wherein, the third request message is triggered by the first request message, and is used to request the ProSe parameter corresponding to the relay device #1, and the fourth request message is triggered by the second request message, and is used to request the ProSe parameter corresponding to the remote UE #1 from the PCF . This process is the same as S205, for details, please refer to the description of S205.
S305,PCF确定中继设备#1对应的ProSe参数,和/或确定远程UE#1对应的ProSe参数。S305, the PCF determines the ProSe parameter corresponding to the relay device #1, and/or determines the ProSe parameter corresponding to the remote UE#1.
该过程与S206相同,具体可以参考S206的描述。This process is the same as S206, for details, please refer to the description of S206.
应理解,如果远程UE#1后续可以通过中继设备#1接入网络,则远程UE#1对应的ProSe参数与中继设备#1对应的ProSe参数相同。下面假设远程UE#1可以通过中继设备#1接入网络,并且将远程UE#1对应的ProSe参数与中继设备#1对应的ProSe参数记为ProSe参数#1。It should be understood that if the remote UE#1 can subsequently access the network through the relay device #1, the ProSe parameters corresponding to the remote UE#1 are the same as the ProSe parameters corresponding to the relay device #1. In the following, it is assumed that the remote UE#1 can access the network through the relay device #1, and the ProSe parameter corresponding to the remote UE#1 and the ProSe parameter corresponding to the relay device #1 are recorded as ProSe parameter #1.
S306,PCF根据第一对应关系和ProSe参数#1,确定第一策略#1。S306. The PCF determines a first policy #1 according to the first correspondence and the ProSe parameter #1.
该过程与S208类似。即,S208中由UDM执行的动作,在S306中由PCF执行。This process is similar to S208. That is, the actions performed by the UDM in S208 are performed by the PCF in S306.
S307,PCF根据第一策略#1确定第二策略#1。第二策略#1用于确定是否开启远程UE#1与中继设备#1之间的PC5接口用户面安全保护。S307. The PCF determines the second policy #1 according to the first policy #1. The second policy #1 is used to determine whether to enable the user plane security protection of the PC5 interface between the remote UE #1 and the relay device #1.
该过程与S213相同,具体可以参考S213的描述。This process is the same as S213, for details, please refer to the description of S213.
S308,PCF向远程UE#1和/或中继设备#1发送第二策略#1。相应地,远程UE#1和/或中继设备#1接收第二策略#1。S308. The PCF sends the second policy #1 to the remote UE #1 and/or the relay device #1. Correspondingly, the remote UE #1 and/or the relay device #1 receives the second policy #1.
该过程与S214相同,具体可以参考S214的描述。This process is the same as S214, for details, please refer to the description of S214.
应理解,与S215-S217相同,PCF同样可以确定第四策略#1,并向远程UE#1和/或中继设备#1发送第四策略#1,为了避免重复,在此不再展开说明。It should be understood that, similar to S215-S217, the PCF can also determine the fourth policy #1, and send the fourth policy #1 to the remote UE #1 and/or the relay device #1. In order to avoid repetition, no further description is given here .
S309,远程UE#1与中继设备#1在建立PC5连接时,根据第二策略#1建立该PC5连接的用户面安全。S309, when the remote UE #1 and the relay device #1 establish the PC5 connection, establish the user plane security of the PC5 connection according to the second policy #1.
该过程与S218相同,具体可以参考S218的描述。This process is the same as S218, for details, please refer to the description of S218.
下面结合图4对本申请提出的方案进行详细说明。应理解,图4所示的方案可以应用于图1的通信系统中。The scheme proposed in this application will be described in detail below with reference to FIG. 4 . It should be understood that the solution shown in FIG. 4 may be applied to the communication system in FIG. 1 .
S401,中继设备#1和/或远程UE#1获取第二对应关系,该第二对应关系为ProSe参数与第二策略的对应关系。该第二策略用于确定是否开启远程UE与中继设备之间PC5接口的用户面安全保护。S401. The relay device #1 and/or the remote UE#1 acquires a second correspondence, where the second correspondence is a correspondence between a ProSe parameter and a second policy. The second policy is used to determine whether to enable the user plane security protection of the PC5 interface between the remote UE and the relay device.
应理解,该第二对应关系可与第一对应关系相关联,第一对应关系如前S201所述。在一种可能的实现方式中,可以根据第一对应关系确定第二对应关系。即第二对应关系与第一对应关系的关联关系为:PC5接口的用户面安全保护策略是根据Uu接口的用户面安全保护策略确定的,具体确定方式可以参考S213中描述,此处不再赘述。It should be understood that the second correspondence may be associated with the first correspondence, and the first correspondence is as described in S201 above. In a possible implementation manner, the second correspondence may be determined according to the first correspondence. That is, the association between the second correspondence and the first correspondence is: the user plane security protection policy of the PC5 interface is determined according to the user plane security protection policy of the Uu interface, and the specific determination method can refer to the description in S213, and will not be repeated here .
在一种可能的实现方式中,中继设备#1和远程UE#1还可以获取第四对应关系,该第四对应关系为ProSe参数与第四策略的对应关系,该第四策略用于确定远程UE#1与中继设备#1之间PC5接口的信令面安全保护是否开启。In a possible implementation manner, the relay device #1 and the remote UE#1 may also obtain a fourth correspondence, the fourth correspondence is the correspondence between the ProSe parameter and the fourth policy, and the fourth policy is used to determine Whether the signaling plane security protection of the PC5 interface between the remote UE#1 and the relay device #1 is enabled.
应理解,第四对应关系与第三对应关系相关联。第三对应关系为ProSe参数与第三策略之间的对应关系,该第三策略为Uu接口的信令面安全保护策略。在一种可能的实现方式中,可以根据第三对应关系确定第四对应关系。即第四对应关系与第三对应关系的关联关系为:PC5接口的信令面安全保护策略是根据Uu接口的信令面安全保护策略确定的。It should be understood that the fourth correspondence is associated with the third correspondence. The third corresponding relationship is the corresponding relationship between the ProSe parameter and the third strategy, and the third strategy is the signaling plane security protection strategy of the Uu interface. In a possible implementation manner, the fourth correspondence may be determined according to the third correspondence. That is, the association between the fourth correspondence and the third correspondence is: the signaling plane security protection policy of the PC5 interface is determined according to the signaling plane security protection policy of the Uu interface.
下面介绍中继设备#1获取第二对应关系和/或第四对应关系的方式,和远程UE#1获取第二对应关系和/或第四对应关系的方式The following describes how the relay device #1 acquires the second correspondence and/or the fourth correspondence, and the manner in which the remote UE#1 acquires the second correspondence and/or the fourth correspondence
方式1:Method 1:
在中继设备#1使用的通用集成电路卡(universal integrated circuit card,UICC)中配置第二对应关系和/或第四对应关系,并且在远程UE#1通过中继设备#1接入网络时,中继设备#1将该UICC插入中继设备#1中,中继设备#1使用该UICC与网络建立中继类型 的PDU会话。Configure the second correspondence and/or the fourth correspondence in the universal integrated circuit card (UICC) used by the relay device #1, and when the remote UE#1 accesses the network through the relay device #1 , the relay device #1 inserts the UICC into the relay device #1, and the relay device #1 uses the UICC to establish a relay-type PDU session with the network.
类似地,在远程UE#1使用UICC中配置第二对应关系和/或第四对应关系,并且在远程UE#1通过中继设备#1接入网络时,远程UE#1将该UICC插入远程UE#1中,远程UE#1使用该UICC与中继设备#1建立连接。Similarly, the second correspondence and/or the fourth correspondence are configured in the remote UE#1 using the UICC, and when the remote UE#1 accesses the network through the relay device #1, the remote UE#1 inserts the UICC into the remote In UE#1, the remote UE#1 uses the UICC to establish a connection with the relay device#1.
需要说明的是,用户设备(user equipment,UE)由移动设备(mobile equipment,ME)和UICC组成。具体地,移动设备为硬件设备,不具有除紧急功能外的接入网络的能力,在插入UICC后,可以作为UE与网络进行注册和后续交互。It should be noted that a user equipment (user equipment, UE) is composed of a mobile equipment (mobile equipment, ME) and a UICC. Specifically, the mobile device is a hardware device that does not have the ability to access the network except for emergency functions. After being inserted into the UICC, it can register and subsequently interact with the network as a UE.
方式2:Method 2:
在中继设备#1的移动设备(mobile equipment,ME)中预配置第二对应关系和/或第四对应关系。Pre-configure the second correspondence and/or the fourth correspondence in a mobile equipment (mobile equipment, ME) of the relay device #1.
应理解,可以在未插入UICC前,在中继设备#1中预配置第二对应关系和/或第四对应关系。It should be understood that the second correspondence and/or the fourth correspondence may be pre-configured in relay device #1 before the UICC is inserted.
类似地,在远程UE#1的移动设备(mobile equipment,ME)中预配置第二对应关系和/或第四对应关系。Similarly, the second correspondence and/or the fourth correspondence are pre-configured in a mobile equipment (mobile equipment, ME) of the remote UE#1.
应理解,可以在未插入UICC前,在远程UE#1中预配置第二对应关系和/或第四对应关系。It should be understood that, before the UICC is not inserted, the second correspondence and/or the fourth correspondence may be preconfigured in the remote UE#1.
方式3:Method 3:
中继设备#1从ProSe application server获取第二对应关系和/或第四对应关系。Relay device #1 acquires the second correspondence and/or the fourth correspondence from the ProSe application server.
类似地,远程UE#1从ProSe application server获取第二对应关系和/或第四对应关系。Similarly, the remote UE#1 acquires the second correspondence and/or the fourth correspondence from the ProSe application server.
下面对第二对应关系和第四对应关系进行说明。The second corresponding relationship and the fourth corresponding relationship will be described below.
情况1:Case 1:
ProSe参数为RSC参数。即,第二对应关系为RSC参数与第二策略的对应关系。第四对应关系为RSC参数与第四策略的对应关系。例如,该第二对应关系和第四对应关系可以为表3所示的内容。ProSe parameters are RSC parameters. That is, the second correspondence is the correspondence between the RSC parameter and the second policy. The fourth correspondence is the correspondence between the RSC parameter and the fourth policy. For example, the second correspondence and the fourth correspondence may be the contents shown in Table 3.
表3table 3
RSC#1RSC#1 第二策略#1Second Strategy #1 第四策略#1Fourth Strategy #1
RSC#2RSC#2 第二策略#2Second Strategy #2 第四策略#2Fourth Strategy #2
RSC#3RSC#3 第二策略#3Second Strategy #3 第四策略#3Fourth Strategy #3
情况2:Case 2:
ProSe参数为S-NSSAI参数和/或DNN参数。即,第二对应关系为S-NSSAI和/或DNN与第二策略的对应关系。第四对应关系为S-NSSAI和/或DNN与第四策略的对应关系。例如,该第二对应关系和第四对应关系可以为表4所示的内容。The ProSe parameters are S-NSSAI parameters and/or DNN parameters. That is, the second correspondence is the correspondence between the S-NSSAI and/or the DNN and the second policy. The fourth correspondence is the correspondence between the S-NSSAI and/or the DNN and the fourth policy. For example, the second correspondence and the fourth correspondence may be the contents shown in Table 4.
表4Table 4
S-NSSAI#1和/或DNN#1S-NSSAI#1 and/or DNN#1 第二策略#1Second Strategy #1 第四策略#1Fourth Strategy #1
S-NSSAI#2和/或DNN#2S-NSSAI#2 and/or DNN#2 第二策略#2Second Strategy #2 第四策略#2Fourth Strategy #2
S-NSSAI#3和/或DNN#3S-NSSAI#3 and/or DNN#3 第二策略#3Second Strategy #3 第四策略#3Fourth Strategy #3
S402,中继设备#1向AMF发送第一请求消息,和/或远程UE#1向AMF发送第二请求消息。相应的,AMF接收来自于中继设备#1的第一请求消息,和/或接收来自于远程UE#1的第二请求消息。S402, the relay device #1 sends a first request message to the AMF, and/or the remote UE#1 sends a second request message to the AMF. Correspondingly, the AMF receives the first request message from the relay device #1, and/or receives the second request message from the remote UE#1.
该过程与S203相同,具体可以参考S203的描述。This process is the same as S203, for details, please refer to the description of S203.
S403,AMF确定中继设备#1具有中继能力,和/或确定远程UE#1支持通过中继设备接入网络。S403, the AMF determines that the relay device #1 has a relay capability, and/or determines that the remote UE#1 supports network access through the relay device.
该过程与S204相同,具体可以参考S204的描述。This process is the same as S204, for details, please refer to the description of S204.
S404,AMF向PCF发送第三请求消息和/或第四请求消息。相应的,PCF接收来自AMF第三请求消息和/或第四请求消息。S404. The AMF sends the third request message and/or the fourth request message to the PCF. Correspondingly, the PCF receives the third request message and/or the fourth request message from the AMF.
其中,第三请求消息由第一请求消息触发,用于请求中继设备#1对应的ProSe参数,第四请求消息由第二请求消息触发,用于向PCF请求远程UE#1对应的ProSe参数。Wherein, the third request message is triggered by the first request message, and is used to request the ProSe parameter corresponding to the relay device #1, and the fourth request message is triggered by the second request message, and is used to request the ProSe parameter corresponding to the remote UE #1 from the PCF .
该过程与S205相同,具体可以参考S205的描述。This process is the same as S205, for details, please refer to the description of S205.
S405,PCF确定中继设备#1对应的ProSe参数,和/或确定远程UE#1对应的ProSe参数。S405, the PCF determines the ProSe parameter corresponding to the relay device #1, and/or determines the ProSe parameter corresponding to the remote UE#1.
该过程与S206相同,具体可以参考S206的描述。This process is the same as S206, for details, please refer to the description of S206.
应理解,如果远程UE#1后续可以通过中继设备#1接入网络,则远程UE#1对应的ProSe参数与中继设备#1对应的ProSe参数相同。下面假设远程UE#1可以通过中继设备#1接入网络,并且将远程UE#1对应的ProSe参数与中继设备#1对应的ProSe参数记为ProSe参数#1。It should be understood that if the remote UE#1 can subsequently access the network through the relay device #1, the ProSe parameters corresponding to the remote UE#1 are the same as the ProSe parameters corresponding to the relay device #1. In the following, it is assumed that the remote UE#1 can access the network through the relay device #1, and the ProSe parameter corresponding to the remote UE#1 and the ProSe parameter corresponding to the relay device #1 are recorded as ProSe parameter #1.
S406,PCF向远程UE#1发送ProSe参数#1,和/或向中继设备#1发送ProSe参数#1。相应地,远程UE#1接收ProSe参数#1,和/或中继设备#1接收ProSe参数#1。S406, the PCF sends the ProSe parameter #1 to the remote UE#1, and/or sends the ProSe parameter #1 to the relay device #1. Correspondingly, the remote UE #1 receives the ProSe parameter #1, and/or the relay device #1 receives the ProSe parameter #1.
S407,远程UE#1根据第二对应关系和ProSe参数#1确定第二策略#1。和/或中继设备#1根据第二对应关系和ProSe参数#1确定第二策略#1。S407, the remote UE#1 determines a second policy #1 according to the second correspondence and the ProSe parameter #1. And/or the relay device #1 determines the second policy #1 according to the second correspondence and the ProSe parameter #1.
在一种可能的实现方式中,远程UE#1还可以根据第四对应关系和ProSe参数#1确定第四策略#1。和/或中继设备#1还可以根据第四对应关系和ProSe参数#1确定第四策略#1。In a possible implementation manner, the remote UE#1 may also determine the fourth policy #1 according to the fourth correspondence and the ProSe parameter #1. And/or the relay device #1 may also determine the fourth policy #1 according to the fourth correspondence and the ProSe parameter #1.
S408,远程UE#1与中继设备#1在建立PC5连接时,根据第二策略#1建立该PC5连接的用户面安全。S408, when the remote UE #1 and the relay device #1 establish the PC5 connection, establish the user plane security of the PC5 connection according to the second policy #1.
在一种可能的实现方式中,远程UE#1与中继设备#1在建立PC5连接时,根据第四策略#1建立该PC5连接的信令面安全。In a possible implementation manner, when the remote UE #1 and the relay device #1 establish the PC5 connection, the signaling plane security of the PC5 connection is established according to the fourth policy #1.
根据本申请的方案,远端UE#1和中继设备#1可以分别获取第二对应关系、第四对应关系,并且,该第二对应关系与第一对应关系相关联、第四对应关系与第三对应关系相关联。在此基础上,当远端UE#1和中继设备#1获取了相同的ProSe参数#1时,可以确定ProSe参数#1对应的第二策略#1、第四策略#1,利用这些策略建立PC5连接。此外,由于第二对应关系与第一对应关系相关联、第四对应关系与第三对应关系相关联,中继设备#1在建立中继PDU会话时使用的Uu接口安全保护策略与建立PC5连接使用的PC5接口安全保护策略是相匹配的。According to the solution of the present application, the remote UE#1 and the relay device #1 can obtain the second correspondence and the fourth correspondence respectively, and the second correspondence is associated with the first correspondence, and the fourth correspondence is associated with the The third correspondence is associated. On this basis, when the remote UE#1 and the relay device #1 have acquired the same ProSe parameter #1, the second strategy #1 and the fourth strategy #1 corresponding to the ProSe parameter #1 can be determined, and these strategies can be used to Establish a PC5 connection. In addition, since the second correspondence is associated with the first correspondence, and the fourth correspondence is associated with the third correspondence, the Uu interface security protection policy used by relay device #1 when establishing a relay PDU session is related to establishing a PC5 connection The security protection policy of the PC5 interface used matches.
下面结合图5对本申请提出的方案进行详细说明。应理解,图5所示的方案可以应用于图1的通信系统中。The scheme proposed in this application will be described in detail below with reference to FIG. 5 . It should be understood that the solution shown in FIG. 5 can be applied to the communication system in FIG. 1 .
S501,中继设备#1向AMF发送第一请求消息,该第一请求消息用于请求中继设备#1对应的ProSe参数。S501. The relay device #1 sends a first request message to the AMF, where the first request message is used to request the ProSe parameter corresponding to the relay device #1.
和/或远程UE#1向AMF发送第二请求消息,该第二请求消息用于请求远程UE#1对应的ProSe参数。And/or the remote UE#1 sends a second request message to the AMF, where the second request message is used to request the ProSe parameter corresponding to the remote UE#1.
S502,AMF确定中继设备#1具有中继能力,和/或确定远程UE#1支持通过中继设备接入网络。S502. The AMF determines that the relay device #1 has a relay capability, and/or determines that the remote UE#1 supports network access through the relay device.
应理解,AMF还可以确定远程UE#1具有的中继业务,和/或确定中继设备#1支持的中继业务。It should be understood that the AMF may also determine the relay service provided by the remote UE#1, and/or determine the relay service supported by the relay device #1.
S503,AMF向PCF发送第三请求消息和/或第四请求消息。相应的,PCF接收来自AMF第三请求消息和/或接收第四请求消息。S503. The AMF sends the third request message and/or the fourth request message to the PCF. Correspondingly, the PCF receives the third request message from the AMF and/or receives the fourth request message.
其中,第三请求消息由第一请求消息触发,用于请求中继设备#1对应的ProSe参数,第四请求消息由第二请求消息触发,用于向PCF请求远程UE#1对应的ProSe参数。Wherein, the third request message is triggered by the first request message, and is used to request the ProSe parameter corresponding to the relay device #1, and the fourth request message is triggered by the second request message, and is used to request the ProSe parameter corresponding to the remote UE #1 from the PCF .
其中,AMF可以在第三请求消息中携带中继设备#1支持的中继业务信息,和/或在第四请求消息中携带远程UE#1具有的中继业务信息。Wherein, the AMF may carry the relay service information supported by the relay device #1 in the third request message, and/or carry the relay service information of the remote UE#1 in the fourth request message.
S504,PCF确定中继设备#1对应的ProSe参数,和/或确定远程UE#1对应的ProSe参数。S504, the PCF determines the ProSe parameter corresponding to the relay device #1, and/or determines the ProSe parameter corresponding to the remote UE#1.
该过程与S206相同,具体可以参考S206的描述。This process is the same as S206, for details, please refer to the description of S206.
此外,PCF还可以根据第二对应关系,确定中继设备#1的PC5接口的用户面安全保护策略。和/或PCF还可以根据第二对应关系,确定远程UE#1的PC5接口的用户面安全保护策略。In addition, the PCF may also determine the user plane security protection policy of the PC5 interface of the relay device #1 according to the second correspondence relationship. And/or the PCF may also determine the user plane security protection policy of the PC5 interface of the remote UE#1 according to the second correspondence.
在一种可能的实现方式中,PCF还可以根据第四对应关系,确定中继设备#1的PC5接口的信令面安全保护策略。和/或PCF还可以根据第四对应关系,确定远程UE#1的PC5接口的信令面安全保护策略。In a possible implementation manner, the PCF may also determine the signaling plane security protection policy of the PC5 interface of the relay device #1 according to the fourth correspondence. And/or the PCF may also determine the signaling plane security protection policy of the PC5 interface of the remote UE#1 according to the fourth correspondence.
应理解,可以在PCF中预配置第二对应关系和第四对应关系。第二对应关系为ProSe参数与第二策略的对应关系,该第二策略为PC5接口的用户面安全保护策略,第二策略用于确定是否开启远程UE#1与中继设备#1之间PC5接口的用户面安全保护。第四对应关系为ProSe参数与第四策略的对应关系,该第四策略为PC5接口的信令面安全保护策略,第四策略用于确定是否开启远程UE#1与中继设备#1之间PC5接口的信令面安全保护。It should be understood that the second correspondence and the fourth correspondence may be preconfigured in the PCF. The second correspondence is the correspondence between the ProSe parameter and the second policy, the second policy is the user plane security protection policy of the PC5 interface, and the second policy is used to determine whether to enable the PC5 between the remote UE#1 and the relay device #1 Interface user plane security protection. The fourth correspondence is the correspondence between the ProSe parameter and the fourth policy, the fourth policy is the signaling plane security protection policy of the PC5 interface, and the fourth policy is used to determine whether to enable the connection between the remote UE#1 and the relay device #1 The signaling plane security protection of the PC5 interface.
应理解,如果远程UE#1后续可以通过中继设备#1接入网络,则远程UE#1对应的ProSe参数与中继设备#1对应的ProSe参数相同。下面假设远程UE#1可以通过中继设备#1接入网络,并且将远程UE#1对应的ProSe参数与中继设备#1对应的ProSe参数记为ProSe参数#1、将远程UE#1和中继设备#1的PC5接口的用户面安全保护策略记为第二策略#1、将远程UE#1和中继设备#1的PC5接口的信令面安全保护策略记为第四策略#1。It should be understood that if the remote UE#1 can subsequently access the network through the relay device #1, the ProSe parameters corresponding to the remote UE#1 are the same as the ProSe parameters corresponding to the relay device #1. In the following, it is assumed that remote UE#1 can access the network through relay device #1, and the ProSe parameter corresponding to remote UE#1 and the ProSe parameter corresponding to relay device #1 are recorded as ProSe parameter #1, and remote UE#1 and The user plane security protection strategy of the PC5 interface of the relay device #1 is recorded as the second strategy #1, and the signaling plane security protection strategy of the remote UE#1 and the PC5 interface of the relay device #1 is recorded as the fourth strategy #1 .
S505,PCF通过AMF向中继设备#1和/或远程UE#1发送ProSe参数#1和第二策略#1。相应地,中继设备#1和/或远程UE#1接收ProSe参数#1和第二策略#1。S505, the PCF sends the ProSe parameter #1 and the second policy #1 to the relay device #1 and/or the remote UE #1 through the AMF. Correspondingly, the relay device #1 and/or the remote UE #1 receives the ProSe parameter #1 and the second policy #1.
可选的,PCF还通过AMF向中继设备#1和/或远程UE#1发送第四策略#1。相应地,中继设备#1和/或远程UE#1接收第四策略#1。Optionally, the PCF also sends the fourth policy #1 to the relay device #1 and/or the remote UE #1 through the AMF. Correspondingly, the relay device #1 and/or the remote UE #1 receives the fourth policy #1.
在一种可能的实现方式中,该方法还包括:S506,PCF向AMF发送第二对应关系和/或第四对应关系。In a possible implementation manner, the method further includes: S506, the PCF sends the second correspondence and/or the fourth correspondence to the AMF.
S507,中继设备#1向AMF发送第七请求消息,该第七请求消息请求建立中继PDU会话,该第七请求消息中包括ProSe参数#1。相应地,AMF接收第七请求消息。S507, the relay device #1 sends a seventh request message to the AMF, where the seventh request message requests establishment of a relay PDU session, and the seventh request message includes the ProSe parameter #1. Correspondingly, the AMF receives the seventh request message.
S508,AMF根据第七请求消息,确定中继设备#1可以建立为中继业务服务的PDU会话。S508. The AMF determines, according to the seventh request message, that the relay device #1 can establish a PDU session serving the relay service.
在一种可能的实现方式中,AMF可以根据中继设备#1的签约信息,确定中继设备#1是否可以为中继业务服务,此处不做限定。In a possible implementation manner, the AMF may determine whether the relay device #1 can serve the relay service according to the subscription information of the relay device #1, which is not limited here.
在该方法包括S506的情况下,该方法还包括下述S509-S510。In the case that the method includes S506, the method further includes the following S509-S510.
S509,AMF根据第二对应关系以及ProSe参数#1确定第二策略#1,和/或AMF根据第四对应关系以及ProSe参数#1第四策略#1。S509, the AMF determines the second policy #1 according to the second correspondence and the ProSe parameter #1, and/or the AMF determines the fourth policy #1 according to the fourth correspondence and the ProSe parameter #1.
S510,AMF向SMF发送第八请求消息,该第八请求消息请求为中继设备#1建立中继PDU会话,该第八请求消息包括第二策略#1、第四策略#1、ProSe参数#1。相应地,SMF接收第八请求消息。S510, the AMF sends an eighth request message to the SMF, the eighth request message requests to establish a relay PDU session for the relay device #1, and the eighth request message includes the second policy #1, the fourth policy #1, and the ProSe parameter # 1. Correspondingly, the SMF receives the eighth request message.
在该方法不包括S506的情况下,该方法包括还包括下述S511-S514。In the case that the method does not include S506, the method also includes the following S511-S514.
S511,AMF向SMF发送第七请求消息。该第七请求消息中包括ProSe参数#1。相应地SMF接收第七请求消息。S511. The AMF sends a seventh request message to the SMF. The seventh request message includes ProSe parameter #1. Correspondingly, the SMF receives the seventh request message.
S512,SMF向PCF发送第九请求消息,该第九请求消息用于请求中继设备#1的PC5接口的安全保护策略。该第九请求消息中包括ProSe参数#1。相应地,PCF接收该第九请求消息。S512. The SMF sends a ninth request message to the PCF, where the ninth request message is used to request the security protection policy of the PC5 interface of the relay device #1. The ninth request message includes ProSe parameter #1. Correspondingly, the PCF receives the ninth request message.
S513,PCF根据第二对应关系和ProSe参数#1确定中继设备#1对应的第二策略#1,和/或PCF根据第四对应关系和ProSe参数#1确定中继设备#1对应的第四策略#1。S513. The PCF determines the second policy #1 corresponding to the relay device #1 according to the second correspondence and the ProSe parameter #1, and/or the PCF determines the second policy #1 corresponding to the relay device #1 according to the fourth correspondence and the ProSe parameter #1. Four Strategies #1.
S514,PCF向SMF发送第二策略#1和/或第四策略#1。相应地,SMF接收来自于PCF的第二策略#1和/或第四策略#1。S514, the PCF sends the second policy #1 and/or the fourth policy #1 to the SMF. Correspondingly, the SMF receives the second policy #1 and/or the fourth policy #1 from the PCF.
S515,SMF根据第二策略#1确定中继设备#1对应的Uu接口的用户面安全保护策略(记为第一策略#1),其中第一策略#1为远程UE#1通过中继设备#1接入网络时,中继设备#1建立中继类型的PDU会话使用的Uu接口用户面安全保护策略。S515, the SMF determines the user plane security protection policy (referred to as the first policy #1) of the Uu interface corresponding to the relay device #1 according to the second policy #1, wherein the first policy #1 is that the remote UE #1 passes through the relay device When #1 accesses the network, the relay device #1 establishes the Uu interface user plane security protection policy used by the relay type PDU session.
和/或SMF根据第四策略#1确定中继设备#1对应的Uu接口的信令面安全保护策略(记为第三策略#1),其中第三策略#1为远程UE#1通过中继设备#1接入网络时,中继设备#1建立中继类型的PDU会话使用的Uu接口信令面安全保护策略。And/or the SMF determines the signaling plane security protection policy (referred to as the third policy #1) of the Uu interface corresponding to the relay device #1 according to the fourth policy #1, wherein the third policy #1 is that the remote UE #1 passes through When the relay device #1 accesses the network, the relay device #1 establishes the Uu interface signaling plane security protection policy used by the relay type PDU session.
下面介绍SMF根据第二策略#1确定第一策略#1、和/或根据第四策略#1确定第三策略#1的几种情况。Several situations in which the SMF determines the first strategy #1 according to the second strategy #1 and/or determines the third strategy #1 according to the fourth strategy #1 are introduced below.
情况1:Case 1:
第二策略#1指示开启PC5接口的用户面安全保护,则第一策略#1指示开启Uu接口的用户面安全保护。The second policy #1 indicates to enable the user plane security protection of the PC5 interface, and the first policy #1 indicates to enable the user plane security protection of the Uu interface.
在一种可能的实现方式中,如果第二策略#1指示开启PC5接口的用户面安全保护,即,第二策略#1为PC5接口的用户面安全保护策略为REQUIRED,则SMF根据第二策略#1确定第一策略#1,第一策略#1指示开启Uu接口的用户面安全保护,即,第一策略#1为Uu接口的用户面安全保护策略为REQUIRED。In a possible implementation, if the second policy #1 indicates to enable the user plane security protection of the PC5 interface, that is, the second policy #1 is that the user plane security protection policy of the PC5 interface is REQUIRED, then the SMF according to the second policy #1 determines the first policy #1, and the first policy #1 indicates to enable the user plane security protection of the Uu interface, that is, the first policy #1 is that the user plane security protection policy of the Uu interface is REQUIRED.
在另一种可能的实现方式中,如果第二策略#1为直接指示开启PC5接口的用户面安全保护,则SMF根据第二策略#1确定第一策略#1,第一策略#1指示开启Uu接口的用户面安全保护,即,第一策略#1为Uu接口的用户面安全保护策略为REQUIRED。In another possible implementation, if the second policy #1 is a direct instruction to enable the user plane security protection of the PC5 interface, the SMF determines the first policy #1 according to the second policy #1, and the first policy #1 indicates to enable The user plane security protection of the Uu interface, that is, the first policy #1 is that the user plane security protection policy of the Uu interface is REQUIRED.
第四策略#1指示开启PC5接口的信令面安全保护,则第三策略#1指示开启Uu接口的信令面安全保护。The fourth policy #1 indicates enabling the signaling plane security protection of the PC5 interface, and the third policy #1 indicates enabling the signaling plane security protection of the Uu interface.
在一种可能的实现方式中,如果第四策略#1指示开启PC5接口的信令面安全保护, 即,第四策略#1为PC5接口的信令面安全保护策略为REQUIRED,则SMF根据第四策略#1确定第三策略#1,第三策略#1指示开启Uu接口的信令面安全保护,即,第三策略#1为Uu接口的信令面安全保护策略为REQUIRED。In a possible implementation, if the fourth policy #1 indicates to enable the signaling plane security protection of the PC5 interface, that is, the fourth policy #1 is that the signaling plane security protection policy of the PC5 interface is REQUIRED, then the SMF according to the The fourth policy #1 determines the third policy #1, and the third policy #1 indicates enabling the signaling plane security protection of the Uu interface, that is, the third policy #1 is that the signaling plane security protection policy of the Uu interface is REQUIRED.
在另一种可能的实现方式中,如果第四策略#1直接指示开启PC5接口的信令面安全保护,则SMF根据第四策略#1确定第三策略#1,第三策略#1指示开启Uu接口的信令面安全保护,即,第三策略#1为Uu接口的信令面安全保护策略为REQUIRED。In another possible implementation, if the fourth policy #1 directly indicates to enable the signaling plane security protection of the PC5 interface, the SMF determines the third policy #1 according to the fourth policy #1, and the third policy #1 indicates to enable The signaling plane security protection of the Uu interface, that is, the third policy #1 is that the signaling plane security protection policy of the Uu interface is REQUIRED.
情况2:Case 2:
第二策略#1指示不开启PC5接口的用户面安全保护,则第一策略#1指示不开启Uu接口的用户面安全保护。The second policy #1 indicates that the user plane security protection of the PC5 interface is not enabled, and the first policy #1 indicates that the user plane security protection of the Uu interface is not enabled.
在一种可能的实现方式中,如果第二策略#1指示不开启PC5接口的用户面安全保护,即,第二策略#1为PC5接口的用户面安全保护策略为NOT NEEDED,则SMF根据第二策略#1确定第一策略#1,第一策略#1指示不开启Uu接口的用户面安全保护,即,第一策略#1为Uu接口的用户面安全保护策略为NOT NEEDED。In a possible implementation, if the second policy #1 indicates that the user plane security protection of the PC5 interface is not enabled, that is, the second policy #1 is that the user plane security protection policy of the PC5 interface is NOT NEEDED, then the SMF according to the first The second policy #1 determines the first policy #1, and the first policy #1 indicates that the user plane security protection of the Uu interface is not enabled, that is, the first policy #1 is that the user plane security protection policy of the Uu interface is NOT NEEDED.
在另一种可能的实现方式中,如果第二策略#1直接指示不开启PC5接口的用户面安全保护,则SMF根据第二策略#1确定第一策略#1,第一策略#1指示不开启Uu接口的用户面安全保护,即,第一策略#1为Uu接口的用户面安全保护策略为NOT NEEDED。In another possible implementation, if the second policy #1 directly indicates that the user plane security protection of the PC5 interface is not enabled, the SMF determines the first policy #1 according to the second policy #1, and the first policy #1 indicates that no Enable the user plane security protection of the Uu interface, that is, the first policy #1 is that the user plane security protection policy of the Uu interface is NOT NEEDED.
第四策略#1指示不开启PC5接口的信令面安全保护,则第三策略#1指示不开启Uu接口的信令面安全保护。The fourth policy #1 indicates that the signaling plane security protection of the PC5 interface is not enabled, and the third policy #1 indicates that the signaling plane security protection of the Uu interface is not enabled.
在一种可能的实现方式中,如果第四策略#1指示不开启PC5接口的信令面安全保护,即,第四策略#1为PC5接口的信令面安全保护策略为NOT NEEDED,则SMF根据第四策略#1确定第三策略#1,第三策略#1指示不开启Uu接口的信令面安全保护,即,第三策略#1为Uu接口的信令面安全保护策略为NOT NEEDED。In a possible implementation, if the fourth policy #1 indicates that the signaling plane security protection of the PC5 interface is not enabled, that is, the fourth policy #1 is that the signaling plane security protection policy of the PC5 interface is NOT NEEDED, then the SMF Determine the third policy #1 according to the fourth policy #1, the third policy #1 indicates that the signaling plane security protection of the Uu interface is not enabled, that is, the third policy #1 is that the signaling plane security protection policy of the Uu interface is NOT NEEDED .
在另一种可能的实现方式中,如果第四策略#1直接指示不开启PC5接口的信令面安全保护,则SMF根据第四策略#1确定第三策略#1,第三策略#1指示不开启Uu接口的信令面安全保护,即,第三策略#1为Uu接口的信令面安全保护策略为NOT NEEDED。In another possible implementation, if the fourth policy #1 directly indicates that the signaling plane security protection of the PC5 interface is not enabled, the SMF determines the third policy #1 according to the fourth policy #1, and the third policy #1 indicates The signaling plane security protection of the Uu interface is not enabled, that is, the third policy #1 is that the signaling plane security protection policy of the Uu interface is NOT NEEDED.
情况3:Case 3:
第二策略#1指示偏好开启PC5接口的用户面安全保护,则第一策略#1指示偏好开启Uu接口的用户面安全保护。The second policy #1 indicates preference to enable the user plane security protection of the PC5 interface, and the first policy #1 indicates preference to enable the user plane security protection of the Uu interface.
在一种可能的实现方式中,如果第二策略#1指示偏好开启PC5接口的用户面安全保护,即,第二策略#1为PC5接口的用户面安全保护策略为PREFERRED,则SMF根据第二策略#1确定第一策略#1,第一策略#1指示偏好开启Uu接口的用户面安全保护,即,第一策略#1为Uu接口的用户面安全保护策略为PREFERRED。In a possible implementation manner, if the second policy #1 indicates that the user plane security protection of the PC5 interface is preferred, that is, the second policy #1 is that the user plane security protection policy of the PC5 interface is PREFERRED, then the SMF according to the second Policy #1 determines the first policy #1, and the first policy #1 indicates preference to enable the user plane security protection of the Uu interface, that is, the first policy #1 is that the user plane security protection policy of the Uu interface is PREFERRED.
第四策略#1指示偏好开启PC5接口的信令面安全保护,则第三策略#1指示偏好开启Uu接口的信令面安全保护。The fourth policy #1 indicates preference to enable the signaling plane security protection of the PC5 interface, and the third policy #1 indicates preference to enable the signaling plane security protection of the Uu interface.
在一种可能的实现方式中,如果第四策略#1指示偏好开启PC5接口的信令面安全保护,即,第四策略#1为PC5接口的信令面安全保护策略为PREFERRED,则SMF根据第四策略#1确定第三策略#1,第三策略#1指示偏好开启Uu接口的信令面安全保护,即,第三策略#1为Uu接口的信令面安全保护策略为PREFERRED。In a possible implementation, if the fourth policy #1 indicates preference to enable the signaling plane security protection of the PC5 interface, that is, the fourth policy #1 is that the signaling plane security protection policy of the PC5 interface is PREFERRED, then the SMF according to The fourth policy #1 determines the third policy #1, and the third policy #1 indicates preference to enable the signaling plane security protection of the Uu interface, that is, the third policy #1 is that the signaling plane security protection policy of the Uu interface is PREFERRED.
S516,SMF根据第一策略#1和/或第三策略#1为中继设备#1建立中继PDU会话。S516, the SMF establishes a relay PDU session for the relay device #1 according to the first policy #1 and/or the third policy #1.
根据本申请的方案,当SMF需要为中继设备#1建立中继类型的PDU会话时,SMF可以根据远程UE#1与中继设备#1建立PC5连接时使用的PC5接口安全保护策略,确定为中继设备#1建立中继类型的PDU会话使用的Uu接口安全保护策略,从而使得中继设备#1建立PC5连接使用的策略与建立中继类型的PDU会话使用的策略相匹配。According to the solution of this application, when the SMF needs to establish a relay-type PDU session for the relay device #1, the SMF can determine the The Uu interface security protection policy used to establish the relay-type PDU session for the relay device #1, so that the policy used by the relay device #1 to establish the PC5 connection matches the policy used to establish the relay-type PDU session.
根据前述方法,图6为本申请实施例提供的一种通信设备,该通信设备包括收发单元601和处理单元602。收发单元601可用于实现方法实施例中的接收和发送功能。方法实施例中的其他的功能可以通过处理单元602来实现。收发单元可以通过数据处理芯片中的输入接口和输出接口来实现,方法实施例中的发送和接收分别对应芯片中的输出和输入。收发单元601还可以拆分为接收单元和发送单元,接收单元可用于实现方法实施例中的接收功能,发送单元可用于实现方法实施例中的发送功能。接收单元可通过数据处理芯片中的输出接口来实现,发送单元可通过数据处理芯片的输入接口来实现。此外,收发单元和处理单元可以通过同一芯片来实现,本申请在此不作限定。应理解,本申请实施例中的收发单元601还可以由收发器(包括发射器和接收器)或收发器相关电路组件实现,处理单元602还可以由处理器或处理器相关电路组件(或者,称为处理电路)实现。According to the foregoing method, FIG. 6 is a communication device provided in an embodiment of the present application, where the communication device includes a transceiver unit 601 and a processing unit 602 . The transceiver unit 601 can be used to implement the receiving and sending functions in the method embodiments. Other functions in the method embodiments may be implemented by the processing unit 602 . The transceiver unit can be realized through the input interface and output interface in the data processing chip, and the sending and receiving in the method embodiment correspond to the output and input in the chip respectively. The transceiver unit 601 can also be divided into a receiving unit and a sending unit. The receiving unit can be used to realize the receiving function in the method embodiment, and the sending unit can be used to realize the sending function in the method embodiment. The receiving unit can be realized through the output interface of the data processing chip, and the sending unit can be realized through the input interface of the data processing chip. In addition, the transceiver unit and the processing unit may be implemented by the same chip, which is not limited in this application. It should be understood that the transceiver unit 601 in the embodiment of the present application may also be implemented by a transceiver (including a transmitter and a receiver) or a transceiver-related circuit component, and the processing unit 602 may also be implemented by a processor or a processor-related circuit component (or, Called the processing circuit) implementation.
示例性地,当该通信设备为远程UE#1或者中继设备#1时,收发单元601和处理单元602能够支持上述方法示例中由远程UE#1或者中继设备#1完成的动作。例如,收发单元601可以完成上述方法实施例中的发送第一请求消息、第二请求消息,以及本文所描述的技术方案中的其它过程;处理单元602可以完成建立PC5连接,以及本文所描述的技术方案中的其它过程。Exemplarily, when the communication device is the remote UE#1 or the relay device #1, the transceiving unit 601 and the processing unit 602 can support the actions performed by the remote UE#1 or the relay device #1 in the above method example. For example, the transceiver unit 601 can complete the sending of the first request message and the second request message in the above method embodiments, and other processes in the technical solution described herein; the processing unit 602 can complete the establishment of the PC5 connection, and the Other processes in the technical plan.
示例性地,当该通信设备为AMF时,收发单元601和处理单元602能够支持上述方法示例中由AMF完成的动作。例如,收发单元601可以完成上述方法实施例中的发送第三请求消息、第四请求消息,以及本文所描述的技术方案中的其它过程;处理单元602可以完成确定中继设备#1具有中继能力、远程UE#1支持通过中继设备接入网络,以及本文所描述的技术方案中的其它过程。Exemplarily, when the communication device is an AMF, the transceiving unit 601 and the processing unit 602 can support actions performed by the AMF in the foregoing method example. For example, the transceiver unit 601 can complete the sending of the third request message and the fourth request message in the above method embodiments, and other processes in the technical solutions described herein; the processing unit 602 can complete the determination that the relay device #1 has a relay Capabilities, remote UE#1 supports network access through relay equipment, and other processes in the technical solutions described herein.
示例性地,当该通信设备为PCF时,收发单元601和处理单元602能够支持上述方法示例中由PCF完成的动作。例如,收发单元601可以完成上述方法实施例中的发送第五请求消息,以及本文所描述的技术方案中的其它过程;处理单元602可以完成根据确定第二策略#1,以及本文所描述的技术方案中的其它过程。Exemplarily, when the communication device is a PCF, the transceiving unit 601 and the processing unit 602 can support actions performed by the PCF in the foregoing method examples. For example, the transceiver unit 601 can complete the sending of the fifth request message in the above method embodiment, and other processes in the technical solution described herein; other processes in the program.
示例性地,当该通信设备为UDM时,收发单元601和处理单元602能够支持上述方法示例中由UDM完成的动作。例如,收发单元601可以完成上述方法实施例中的发送第一策略#1,以及本文所描述的技术方案中的其它过程;处理单元602可以完成根据确定第一策略#1,以及本文所描述的技术方案中的其它过程。Exemplarily, when the communication device is a UDM, the transceiving unit 601 and the processing unit 602 can support actions performed by the UDM in the above method example. For example, the transceiver unit 601 can complete the sending of the first policy #1 in the above method embodiment, and other processes in the technical solution described herein; the processing unit 602 can complete the first policy #1 according to the determination, and the Other processes in the technical plan.
示例性地,当该通信设备为SMF时,收发单元601和处理单元602能够支持上述方法示例中由SMF完成的动作。例如,收发单元601可以完成上述方法实施例中的发送第九请求消息,以及本文所描述的技术方案中的其它过程;处理单元602可以完成根据确定第一策略#1、第三策略#1,以及本文所描述的技术方案中的其它过程。Exemplarily, when the communication device is an SMF, the transceiving unit 601 and the processing unit 602 can support actions performed by the SMF in the foregoing method example. For example, the transceiver unit 601 can complete the sending of the ninth request message in the above method embodiment, and other processes in the technical solution described herein; And other processes in the technical solutions described herein.
本申请实施例还提供一种通信装置,如图7所示,包括:处理器701、通信接口702、存储器703。其中,处理器701、通信接口702以及存储器703可以通过总线707相互连接;总线707可以是外设部件互连标准(peripheral component interconnect,PCI)总线或 扩展工业标准结构(extended industry standard architecture,EISA)总线等。上述总线707可以分为地址总线、数据总线和控制总线等。为便于表示,图7中仅用一条粗线表示,但并不表示仅有一根总线或一种类型的总线。处理器701可以是中央处理器(central processing unit,CPU),网络处理器(network processor,NP)或者CPU和NP的组合。处理器还可以进一步包括硬件芯片。上述硬件芯片可以是专用集成电路(application-specific integrated circuit,ASIC),可编程逻辑器件(programmable logic device,PLD)或其组合。上述PLD可以是复杂可编程逻辑器件(complex programmable logic device,CPLD),现场可编程逻辑门阵列(field-programmable gate array,FPGA),通用阵列逻辑(generic array logic,GAL)或其任意组合。存储器703可以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(read-only memory,ROM)、可编程只读存储器(programmable ROM,PROM)、可擦除可编程只读存储器(erasable PROM,EPROM)、电可擦除可编程只读存储器(electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(random access memory,RAM),其用作外部高速缓存。The embodiment of the present application also provides a communication device, as shown in FIG. 7 , including: a processor 701 , a communication interface 702 , and a memory 703 . Wherein, the processor 701, the communication interface 702, and the memory 703 can be connected to each other through a bus 707; the bus 707 can be a peripheral component interconnect standard (peripheral component interconnect, PCI) bus or an extended industry standard architecture (extended industry standard architecture, EISA) bus etc. The above bus 707 can be divided into address bus, data bus, control bus and so on. For ease of representation, only one thick line is used in FIG. 7 , but it does not mean that there is only one bus or one type of bus. The processor 701 may be a central processing unit (central processing unit, CPU), a network processor (network processor, NP) or a combination of CPU and NP. The processor may further include hardware chips. The aforementioned hardware chip may be an application-specific integrated circuit (application-specific integrated circuit, ASIC), a programmable logic device (programmable logic device, PLD) or a combination thereof. The aforementioned PLD may be a complex programmable logic device (complex programmable logic device, CPLD), a field-programmable gate array (field-programmable gate array, FPGA), a general array logic (generic array logic, GAL) or any combination thereof. Memory 703 may be volatile memory or nonvolatile memory, or may include both volatile and nonvolatile memory. Among them, the non-volatile memory can be read-only memory (read-only memory, ROM), programmable read-only memory (programmable ROM, PROM), erasable programmable read-only memory (erasable PROM, EPROM), electrically programmable Erases programmable read-only memory (electrically EPROM, EEPROM) or flash memory. Volatile memory can be random access memory (RAM), which acts as external cache memory.
处理器701用于实现通信装置的数据处理操作。通信接口702用于实现通信装置的收发操作。The processor 701 is used to implement data processing operations of the communication device. The communication interface 702 is used to realize the transceiving operation of the communication device.
示例性地,当该通信装置为远程UE#1或者中继设备#1时,处理器701、通信接口702和存储器703能够支持上述方法示例中由远程UE#1或者中继设备#1完成的动作。例如,通信接口702可以完成上述方法实施例中的发送第一请求消息、第二请求消息,以及本文所描述的技术方案中的其它过程;处理器701可以完成建立PC5连接,以及本文所描述的技术方案中的其它过程。Exemplarily, when the communication device is a remote UE#1 or a relay device #1, the processor 701, the communication interface 702 and the memory 703 can support the above method example completed by the remote UE#1 or the relay device #1 action. For example, the communication interface 702 can complete the sending of the first request message and the second request message in the above method embodiments, and other processes in the technical solutions described herein; the processor 701 can complete the establishment of the PC5 connection, and the Other processes in the technical plan.
示例性地,当该通信装置为AMF时,处理器701、通信接口702和存储器703能够支持上述方法示例中由AMF完成的动作。例如,通信接口702可以完成上述方法实施例中的发送第三请求消息、第四请求消息,以及本文所描述的技术方案中的其它过程;处理器701可以完成确定中继设备#1具有中继能力、远程UE#1支持通过中继设备接入网络,以及本文所描述的技术方案中的其它过程。Exemplarily, when the communication device is an AMF, the processor 701, the communication interface 702, and the memory 703 can support actions performed by the AMF in the foregoing method example. For example, the communication interface 702 can complete the sending of the third request message and the fourth request message in the above method embodiments, and other processes in the technical solutions described herein; the processor 701 can complete the determination that the relay device #1 has a relay Capabilities, remote UE#1 supports network access through relay equipment, and other processes in the technical solutions described herein.
示例性地,当该通信装置为PCF时,处理器701、通信接口702和存储器703能够支持上述方法示例中由PCF完成的动作。例如,通信接口702可以完成上述方法实施例中的发送第五请求消息,以及本文所描述的技术方案中的其它过程;处理器701可以完成确定第二策略#1,以及本文所描述的技术方案中的其它过程。Exemplarily, when the communication device is a PCF, the processor 701, the communication interface 702, and the memory 703 can support actions performed by the PCF in the foregoing method examples. For example, the communication interface 702 can complete the sending of the fifth request message in the above method embodiment, and other processes in the technical solution described herein; the processor 701 can complete the determination of the second strategy #1, and the technical solution described herein in other processes.
示例性地,当该通信装置为UDM时,处理器701、通信接口702和存储器703能够支持上述方法示例中由UDM完成的动作。例如,通信接口702可以完成上述方法实施例中的发送第一策略#1,以及本文所描述的技术方案中的其它过程;处理器701可以完成确定第一策略#1,以及本文所描述的技术方案中的其它过程。Exemplarily, when the communication device is a UDM, the processor 701, the communication interface 702, and the memory 703 can support actions performed by the UDM in the foregoing method examples. For example, the communication interface 702 can complete the sending of the first policy #1 in the above method embodiment, and other processes in the technical solutions described herein; the processor 701 can complete the determination of the first policy #1, and the technical solutions described herein other processes in the program.
示例性地,当该通信装置为SMF时,处理器701、通信接口702和存储器703能够支持上述方法示例中由SMF完成的动作。例如,通信接口702可以完成上述方法实施例中的发送第九请求消息,以及本文所描述的技术方案中的其它过程;处理器701可以完成确定第一策略#1、第三策略#1,以及本文所描述的技术方案中的其它过程。Exemplarily, when the communication device is an SMF, the processor 701, the communication interface 702, and the memory 703 can support the actions performed by the SMF in the above method example. For example, the communication interface 702 can complete the sending of the ninth request message in the above method embodiment, and other processes in the technical solutions described herein; the processor 701 can complete the determination of the first strategy #1, the third strategy #1, and Other processes in the technical solutions described herein.
本申请实施例的技术方案可以应用于各种通信系统,例如:全球移动通讯(global  system of mobile communication,GSM)系统、码分多址(code division multiple access,CDMA)系统、宽带码分多址(wideband code division multiple access,WCDMA)系统、通用分组无线业务(general packet radio service,GPRS)、长期演进(long term evolution,LTE)系统、LTE频分双工(frequency division duplex,FDD)系统、LTE时分双工(time division duplex,TDD)、通用移动通信系统(universal mobile telecommunication system,UMTS)、全球互联微波接入(worldwide interoperability for microwave access,WiMAX)通信系统、未来的第五代(5th generation,5G)系统或新无线(new radio,NR)等。The technical solution of the embodiment of the present application can be applied to various communication systems, for example: global system of mobile communication (global system of mobile communication, GSM) system, code division multiple access (code division multiple access, CDMA) system, broadband code division multiple access (wideband code division multiple access, WCDMA) system, general packet radio service (general packet radio service, GPRS), long term evolution (long term evolution, LTE) system, LTE frequency division duplex (frequency division duplex, FDD) system, LTE Time division duplex (time division duplex, TDD), universal mobile telecommunications system (universal mobile telecommunications system, UMTS), global interconnection microwave access (worldwide interoperability for microwave access, WiMAX) communication system, the future fifth generation (5th generation, 5G) system or new radio (new radio, NR), etc.
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。Those skilled in the art can appreciate that the units and algorithm steps of the examples described in conjunction with the embodiments disclosed herein can be implemented by electronic hardware, or a combination of computer software and electronic hardware. Whether these functions are executed by hardware or software depends on the specific application and design constraints of the technical solution. Those skilled in the art may use different methods to implement the described functions for each specific application, but such implementation should not be regarded as exceeding the scope of the present application.
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。Those skilled in the art can clearly understand that for the convenience and brevity of the description, the specific working process of the above-described system, device and unit can refer to the corresponding process in the foregoing method embodiment, which will not be repeated here.
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。In the several embodiments provided in this application, it should be understood that the disclosed systems, devices and methods may be implemented in other ways. For example, the device embodiments described above are only illustrative. For example, the division of the units is only a logical function division. In actual implementation, there may be other division methods. For example, multiple units or components can be combined or May be integrated into another system, or some features may be ignored, or not implemented. In another point, the mutual coupling or direct coupling or communication connection shown or discussed may be through some interfaces, and the indirect coupling or communication connection of devices or units may be in electrical, mechanical or other forms.
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。The units described as separate components may or may not be physically separated, and the components shown as units may or may not be physical units, that is, they may be located in one place, or may be distributed to multiple network units. Part or all of the units can be selected according to actual needs to achieve the purpose of the solution of this embodiment.
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。In addition, each functional unit in each embodiment of the present application may be integrated into one processing unit, each unit may exist separately physically, or two or more units may be integrated into one unit.
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(read-only memory,ROM)、随机存取存储器(random access memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。If the functions described above are realized in the form of software function units and sold or used as independent products, they can be stored in a computer-readable storage medium. Based on this understanding, the technical solution of the present application is essentially or the part that contributes to the prior art or the part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium, including Several instructions are used to make a computer device (which may be a personal computer, a server, or a network device, etc.) execute all or part of the steps of the methods described in the various embodiments of the present application. The aforementioned storage medium includes: U disk, mobile hard disk, read-only memory (read-only memory, ROM), random access memory (random access memory, RAM), magnetic disk or optical disc and other media that can store program codes. .
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以所述权利要求的保护范围为准。The above is only a specific implementation of the application, but the scope of protection of the application is not limited thereto. Anyone familiar with the technical field can easily think of changes or substitutions within the technical scope disclosed in the application. Should be covered within the protection scope of this application. Therefore, the protection scope of the present application should be determined by the protection scope of the claims.

Claims (19)

  1. 一种通信方法,其特征在于,包括:A communication method, characterized in that, comprising:
    第一网元获取第一策略,所述第一策略为第一终端设备通过第一中继设备接入网络时,第一中继设备建立中继类型的协议数据单元PDU会话使用的Uu接口用户面安全保护策略;The first network element obtains the first policy, the first policy is the Uu interface user used by the first relay device to establish a relay-type protocol data unit PDU session when the first terminal device accesses the network through the first relay device Surface security protection strategy;
    所述第一网元根据所述第一策略,确定第二策略,所述第二策略用于确定是否开启所述第一终端设备和所述第一中继设备之间的PC5接口用户面安全保护;The first network element determines a second policy according to the first policy, and the second policy is used to determine whether to enable the user plane security of the PC5 interface between the first terminal device and the first relay device Protect;
    所述第一网元向所述第一终端设备和/或所述第一中继设备发送所述第二策略。The first network element sends the second policy to the first terminal device and/or the first relay device.
  2. 根据权利要求1所述的方法,其特征在于,The method according to claim 1, characterized in that,
    所述第二策略为PC5接口的用户面安全保护策略或是否开启PC5接口的用户面安全保护;The second policy is the user plane security protection policy of the PC5 interface or whether to enable the user plane security protection of the PC5 interface;
    所述第一网元根据所述第一策略,确定第二策略,包括:The first network element determines a second strategy according to the first strategy, including:
    当所述第一策略指示开启Uu接口的用户面安全保护时,所述第一网元确定所述第二策略,所述第二策略指示开启PC5接口的用户面安全保护;When the first strategy indicates to enable the user plane security protection of the Uu interface, the first network element determines the second strategy, and the second strategy indicates to enable the user plane security protection of the PC5 interface;
    当所述第一策略指示不开启Uu接口的用户面安全保护时,所述第一网元确定所述第二策略,所述第二策略指示不开启PC5接口的用户面安全保护;When the first strategy indicates that the user plane security protection of the Uu interface is not enabled, the first network element determines the second strategy, and the second strategy indicates that the user plane security protection of the PC5 interface is not enabled;
    当所述第一策略指示偏好开启Uu接口的用户面安全保护时,所述第一网元确定所述第二策略,所述第二策略指示偏好开启PC5接口的用户面安全保护。When the first policy indicates preference to enable user plane security protection of the Uu interface, the first network element determines the second policy, and the second policy indicates preference to enable user plane security protection of the PC5 interface.
  3. 根据权利要求1或2所述的方法,其特征在于,The method according to claim 1 or 2, characterized in that,
    在所述第一策略指示偏好开启Uu接口的用户面安全保护时的情况下,所述方法还包括:In the case where the first policy indicates preference to enable user plane security protection of the Uu interface, the method further includes:
    所述第一网元确定是否开启PC5接口的用户面安全保护;The first network element determines whether to enable the user plane security protection of the PC5 interface;
    所述第一网元向所述第一远程终端和/或所述第一中继设备发送第一指示信息,所述第一指示信息用于指示是否开启PC5接口的用户面安全保护。The first network element sends first indication information to the first remote terminal and/or the first relay device, where the first indication information is used to indicate whether to enable user plane security protection of the PC5 interface.
  4. 根据权利要求1-3中任一项所述的方法,其特征在于,所述方法还包括:The method according to any one of claims 1-3, further comprising:
    所述第一网元获取第三策略,所述第三策略为所述第一终端设备通过所述第一中继设备接入网络时,所述第一中继设备建立中继类型的PDU会话使用的Uu接口信令面安全保护策略;The first network element acquires a third policy, the third policy is when the first terminal device accesses the network through the first relay device, the first relay device establishes a relay-type PDU session Uu interface signaling plane security protection strategy used;
    所述第一网元根据所述第三策略,确定第四策略,所述第四策略用于确定是否开启所述第一终端设备和所述第一中继设备之间的PC5接口的信令面安全保护;The first network element determines a fourth strategy according to the third strategy, and the fourth strategy is used to determine whether to enable signaling of the PC5 interface between the first terminal device and the first relay device surface security protection;
    所述第一网元向所述第一远程终端和/或所述第一中继设备发送所述第四策略。The first network element sends the fourth policy to the first remote terminal and/or the first relay device.
  5. 根据权利要求4所述的方法,其特征在于,The method according to claim 4, characterized in that,
    所述第三策略为PC5接口的信令面安全保护策略或是否开启PC5接口的信令面安全保护;The third policy is the signaling plane security protection policy of the PC5 interface or whether to enable the signaling plane security protection of the PC5 interface;
    所述第一网元根据所述第三策略,确定第四策略,包括:The first network element determines a fourth strategy according to the third strategy, including:
    当所述第三策略指示开启Uu接口的信令面安全保护时,所述第一网元确定所述第四策略,所述第四策略指示开启PC5接口的信令面安全保护;When the third strategy indicates enabling the signaling plane security protection of the Uu interface, the first network element determines the fourth strategy, and the fourth strategy indicates enabling the signaling plane security protection of the PC5 interface;
    当所述第三策略指示不开启Uu接口的信令面安全保护时,所述第一网元确定所述第四策略,所述第四策略指示不开启PC5接口的信令面安全保护。When the third policy indicates that the signaling plane security protection of the Uu interface is not enabled, the first network element determines the fourth policy, and the fourth policy indicates that the signaling plane security protection of the PC5 interface is not enabled.
  6. 根据权利要求1-3中任一项所述的方法,其特征在于,The method according to any one of claims 1-3, characterized in that,
    当所述第二策略指示开启PC5接口的用户面安全保护时,所述方法还包括:When the second policy indicates to enable the user plane security protection of the PC5 interface, the method further includes:
    所述第一网元根据所述第二策略,确定第四策略,所述第四策略指示开启PC5接口的信令面安全保护。The first network element determines a fourth policy according to the second policy, and the fourth policy indicates enabling signaling plane security protection of the PC5 interface.
  7. 根据权利要求1-6中任一项所述的方法,其特征在于,The method according to any one of claims 1-6, characterized in that,
    所述方法还包括:The method also includes:
    所述第一网元确定所述第一终端设备和/或所述第一中继设备对应的临近业务ProSe参数;determining, by the first network element, ProSe parameters corresponding to the first terminal device and/or the first relay device;
    所述第一网元向第二网元发送第一请求消息,所述第一请求消息用于请求所述第一策略,所述第一请求消息包括所述ProSe参数;The first network element sends a first request message to the second network element, the first request message is used to request the first policy, and the first request message includes the ProSe parameter;
    所述第一网元获取第一策略,包括:The obtaining of the first policy by the first network element includes:
    所述第一网元从所述第二网元获取所述第一策略。The first network element acquires the first policy from the second network element.
  8. 根据权利要求1-6中任一项所述的方法,其特征在于,The method according to any one of claims 1-6, characterized in that,
    所述方法还包括:The method also includes:
    所述第一网元确定所述第一终端设备和/或所述第一中继设备对应的临近业务ProSe参数;determining, by the first network element, ProSe parameters corresponding to the first terminal device and/or the first relay device;
    所述第一网元获取第一策略,包括:The obtaining of the first policy by the first network element includes:
    所述第一网元至少根据所述ProSe参数,从本地获取所述第一策略。The first network element acquires the first policy locally at least according to the ProSe parameter.
  9. 一种通信装置,其特征在于,包括:A communication device, characterized by comprising:
    收发单元,用于获取第一策略,所述第一策略为第一终端设备通过第一中继设备接入网络时,第一中继设备建立中继类型的协议数据单元PDU会话使用的Uu接口用户面安全保护策略;A transceiver unit, configured to obtain a first policy, the first policy being the Uu interface used by the first relay device to establish a relay-type protocol data unit PDU session when the first terminal device accesses the network through the first relay device User plane security protection strategy;
    处理单元,用于根据所述第一策略,确定第二策略,所述第二策略用于确定是否开启所述第一终端设备和所述第一中继设备之间的PC5接口用户面安全保护;A processing unit, configured to determine a second policy according to the first policy, and the second policy is used to determine whether to enable the user plane security protection of the PC5 interface between the first terminal device and the first relay device ;
    所述第一网元向所述第一远程终端和/或所述第一中继设备发送所述第二策略。The first network element sends the second policy to the first remote terminal and/or the first relay device.
  10. 根据权利要求9所述的装置,其特征在于,The device according to claim 9, characterized in that,
    所述第二策略为PC5接口的用户面安全保护策略或是否开启PC5接口的用户面安全保护;The second policy is the user plane security protection policy of the PC5 interface or whether to enable the user plane security protection of the PC5 interface;
    所述处理单元,用于根据所述第一策略,确定第二策略,包括:The processing unit is configured to determine a second strategy according to the first strategy, including:
    当所述第一策略指示开启Uu接口的用户面安全保护时,所述处理单元确定所述第二策略,所述第二策略指示开启PC5接口的用户面安全保护;When the first strategy indicates to enable the user plane security protection of the Uu interface, the processing unit determines the second strategy, and the second strategy indicates to enable the user plane security protection of the PC5 interface;
    当所述第一策略指示不开启Uu接口的用户面安全保护时,所述处理单元确定所述第二策略,所述第二策略指示不开启PC5接口的用户面安全保护;When the first strategy indicates that the user plane security protection of the Uu interface is not enabled, the processing unit determines the second strategy, and the second strategy indicates that the user plane security protection of the PC5 interface is not enabled;
    当所述第一策略指示偏好开启Uu接口的用户面安全保护时,所述处理单元确定所述第二策略,所述第二策略指示偏好开启PC5接口的用户面安全保护。When the first policy indicates preference to enable user plane security protection of the Uu interface, the processing unit determines the second policy, and the second policy indicates preference to enable user plane security protection of the PC5 interface.
  11. 根据权利要求9或10所述的装置,其特征在于,A device according to claim 9 or 10, characterized in that
    在所述第一策略指示偏好开启Uu接口的用户面安全保护时的情况下,In the case where the first policy indicates that the user plane security protection of the Uu interface is preferred to be enabled,
    所述处理单元,还用于确定是否开启PC5接口的用户面安全保护;The processing unit is also used to determine whether to enable the user plane security protection of the PC5 interface;
    所述收发单元,还用于向所述第一远程终端和/或所述第一中继设备发送第一指示信息,所述第一指示信息用于指示是否开启PC5接口的用户面安全保护。The transceiver unit is further configured to send first indication information to the first remote terminal and/or the first relay device, where the first indication information is used to indicate whether to enable the user plane security protection of the PC5 interface.
  12. 根据权利要求9-11中任一项所述的装置,其特征在于,The device according to any one of claims 9-11, characterized in that,
    所述收发单元,还用于获取第三策略,所述第三策略为所述第一终端设备通过所述第一中继设备接入网络时,所述第一中继设备建立中继类型的PDU会话使用的Uu接口信令面安全保护策略;The transceiving unit is further configured to obtain a third policy, the third policy being that the first relay device establishes a relay type when the first terminal device accesses the network through the first relay device. The Uu interface signaling plane security protection policy used by the PDU session;
    所述处理单元,还用于根据所述第三策略,确定第四策略,所述第四策略用于确定是否开启所述第一终端设备和所述第一中继设备之间的PC5接口的信令面安全保护;The processing unit is further configured to determine a fourth strategy according to the third strategy, and the fourth strategy is used to determine whether to enable the PC5 interface between the first terminal device and the first relay device. Signaling plane security protection;
    所述收发单元,还用于向所述第一远程终端和/或所述第一中继设备发送所述第四策略。The transceiving unit is further configured to send the fourth policy to the first remote terminal and/or the first relay device.
  13. 根据权利要求12所述的装置,其特征在于,The device according to claim 12, characterized in that,
    所述第三策略为PC5接口的信令面安全保护策略或是否开启PC5接口的信令面安全保护;The third policy is the signaling plane security protection policy of the PC5 interface or whether to enable the signaling plane security protection of the PC5 interface;
    所述处理单元,还用于根据所述第三策略,确定第四策略,包括:The processing unit is further configured to determine a fourth strategy according to the third strategy, including:
    当所述第三策略指示开启Uu接口的信令面安全保护时,所述处理单元确定所述第四策略,所述第四策略指示开启PC5接口的信令面安全保护;When the third policy indicates to enable the signaling plane security protection of the Uu interface, the processing unit determines the fourth policy, and the fourth policy indicates to enable the signaling plane security protection of the PC5 interface;
    当所述第三策略指示不开启Uu接口的信令面安全保护时,所述处理单元确定所述第四策略,所述第四策略指示不开启PC5接口的信令面安全保护。When the third policy indicates that the signaling plane security protection of the Uu interface is not enabled, the processing unit determines the fourth policy, and the fourth policy indicates that the signaling plane security protection of the PC5 interface is not enabled.
  14. 根据权利要求9-11中任一项所述的装置,其特征在于,The device according to any one of claims 9-11, characterized in that,
    当所述第二策略指示开启PC5接口的用户面安全保护时,When the second policy indicates to enable the user plane security protection of the PC5 interface,
    所述处理单元,还用于根据所述第二策略,确定第四策略,所述第四策略指示开启PC5接口的信令面安全保护。The processing unit is further configured to determine a fourth policy according to the second policy, and the fourth policy indicates enabling signaling plane security protection of the PC5 interface.
  15. 根据权利要求9-14中任一项所述的装置,其特征在于,The device according to any one of claims 9-14, characterized in that,
    所述处理单元,还用于确定所述第一终端设备和/或所述第一中继设备对应的临近业务ProSe参数;The processing unit is further configured to determine ProSe parameters corresponding to the first terminal device and/or the first relay device;
    所述收发单元,还用于向第二网元发送第一请求消息,所述第一请求消息用于请求所述第一策略,所述第一请求消息包括所述ProSe参数;The transceiver unit is further configured to send a first request message to a second network element, the first request message is used to request the first policy, and the first request message includes the ProSe parameter;
    所述收发单元,用于获取第一策略,包括:The transceiver unit, configured to obtain the first strategy, includes:
    所述收发单元从所述第二网元获取所述第一策略。The transceiving unit acquires the first policy from the second network element.
  16. 根据权利要求9-14中任一项所述的装置,其特征在于,The device according to any one of claims 9-14, characterized in that,
    所述处理单元,还用于确定所述第一终端设备和/或所述第一中继设备对应的临近业务ProSe参数;The processing unit is further configured to determine ProSe parameters corresponding to the first terminal device and/or the first relay device;
    所述收发单元,用于获取第一策略,包括:The transceiver unit, configured to obtain the first strategy, includes:
    所述收发单元至少根据所述ProSe参数,从本地获取所述第一策略。The transceiving unit obtains the first policy locally at least according to the ProSe parameter.
  17. 一种通信设备,其特征在于,包括:处理器和存储器,所述处理器用于执行所述存储器中存储的计算机程序或指令,使得所述通信设备执行如权利要求1-8中任一项所述的方法。A communication device, characterized by comprising: a processor and a memory, the processor is used to execute computer programs or instructions stored in the memory, so that the communication device performs the process described in any one of claims 1-8. described method.
  18. 一种计算机可读存储介质,其特征在于,包括计算机程序或指令,当所述计算机 程序或所述指令在计算机上运行时,使得所述计算机执行如权利要求1-8中任意一项所述的方法。A computer-readable storage medium, which is characterized in that it includes a computer program or an instruction, and when the computer program or the instruction is run on a computer, the computer executes the computer program described in any one of claims 1-8. Methods.
  19. 一种芯片系统,其特征在于,包括:至少一个处理器,用于执行存储器中的计算机程序或指令,使得如权利要求1-8中任一项所述的方法被实现。A system on a chip, characterized by comprising: at least one processor, configured to execute computer programs or instructions in a memory, so that the method according to any one of claims 1-8 is implemented.
PCT/CN2022/109421 2021-08-04 2022-08-01 Communication method and apparatus WO2023011407A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202110889754.7 2021-08-04
CN202110889754.7A CN115706998A (en) 2021-08-04 2021-08-04 Communication method and device

Publications (1)

Publication Number Publication Date
WO2023011407A1 true WO2023011407A1 (en) 2023-02-09

Family

ID=85154365

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/109421 WO2023011407A1 (en) 2021-08-04 2022-08-01 Communication method and apparatus

Country Status (2)

Country Link
CN (1) CN115706998A (en)
WO (1) WO2023011407A1 (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110912854A (en) * 2018-09-15 2020-03-24 华为技术有限公司 Safety protection method, equipment and system
CN112351431A (en) * 2019-08-09 2021-02-09 华为技术有限公司 Method and device for determining safety protection mode
US20210204306A1 (en) * 2016-01-15 2021-07-01 Yulong Computer Telecommunication Scientific (Shenzhen) Co., Ltd. Resource allocation method and road side unit

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20210204306A1 (en) * 2016-01-15 2021-07-01 Yulong Computer Telecommunication Scientific (Shenzhen) Co., Ltd. Resource allocation method and road side unit
CN110912854A (en) * 2018-09-15 2020-03-24 华为技术有限公司 Safety protection method, equipment and system
CN112351431A (en) * 2019-08-09 2021-02-09 华为技术有限公司 Method and device for determining safety protection mode

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
LG ELECTRONICS: "Solution for handling security policy misalignment over ProSe L3 UE2NW relay", 3GPP DRAFT; S3-202380, vol. SA WG3, 1 October 2020 (2020-10-01), pages 1 - 3, XP051937095 *

Also Published As

Publication number Publication date
CN115706998A (en) 2023-02-17

Similar Documents

Publication Publication Date Title
US20230093339A1 (en) Session Management Method, Apparatus, and System
EP3691206B1 (en) Policy update method and apparatus
US20220330361A1 (en) Method for establishing connection and obtaining relay service code and communications apparatus
WO2019153766A1 (en) Wireless communication method, network device, and terminal device
WO2019062499A1 (en) Method for policy determination and communication device
JP7095942B2 (en) Communication methods, communication devices, and communication systems
WO2020056611A1 (en) Method and device for use in network slice authentication
US11483898B2 (en) Session management method and session management network element
WO2019062496A1 (en) Data analysis method and data analysis device
US20220124500A1 (en) Communication method, terminal device and network device
CN111801961A (en) Method and device for determining SSC mode
EP3499922B1 (en) Method, device and computer-readable storage medium for applying qos based on user plane data mapping
WO2023020297A1 (en) Relay selection method and apparatus
WO2019028794A1 (en) Method and device for determining service path
CN112154678B (en) Method and apparatus for wireless communication
WO2020019910A1 (en) Method for communication in vehicle to everything, terminal device, and network device
WO2020087308A1 (en) Service processing method, device, and storage medium
US20190082347A1 (en) Service data flow sending method and apparatus
WO2023011407A1 (en) Communication method and apparatus
WO2020087546A1 (en) Network information transmission method and obtaining method, network device, and terminal device
KR20210127071A (en) Bearer configuration method and device, network device
CN113543157B (en) Method and equipment for controlling network resources
WO2022021371A1 (en) Session establishment method, electronic device and storage medium
WO2019028795A1 (en) Method and device for determining service path
WO2023020276A1 (en) Multicast broadcast service data transmission method and apparatus, and device and storage medium

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22852119

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE