WO2023011407A1 - Procédé et appareil de communication - Google Patents

Procédé et appareil de communication Download PDF

Info

Publication number
WO2023011407A1
WO2023011407A1 PCT/CN2022/109421 CN2022109421W WO2023011407A1 WO 2023011407 A1 WO2023011407 A1 WO 2023011407A1 CN 2022109421 W CN2022109421 W CN 2022109421W WO 2023011407 A1 WO2023011407 A1 WO 2023011407A1
Authority
WO
WIPO (PCT)
Prior art keywords
policy
interface
security protection
plane security
user plane
Prior art date
Application number
PCT/CN2022/109421
Other languages
English (en)
Chinese (zh)
Inventor
雷骜
李�赫
吴义壮
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2023011407A1 publication Critical patent/WO2023011407A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • H04W12/37Managing security policies for mobile devices or for controlling mobile applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W92/00Interfaces specially adapted for wireless communication networks
    • H04W92/04Interfaces between hierarchically different network devices
    • H04W92/10Interfaces between hierarchically different network devices between terminal device and access point, i.e. wireless air interface
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W92/00Interfaces specially adapted for wireless communication networks
    • H04W92/16Interfaces between hierarchically similar devices
    • H04W92/18Interfaces between hierarchically similar devices between terminal devices

Definitions

  • the present application relates to the technical field of communication, and more specifically, to a communication method and device.
  • the cellular communication network introduces proximity services (Proximity services, ProSe) communication.
  • ProSe proximity services
  • the terminal device can perform auxiliary communication through the relay device. That is, the terminal device communicates with the relay device, and the relay device communicates with the access network device, so that the terminal device can access the network and obtain corresponding services.
  • the security protection strategy of the Uu interface used by the relay device to establish a relay-type protocol data unit (protocol data unit, PDU) session may be different from the security protection strategy of the PC5 interface used by the relay device to establish a PC5 connection with the terminal device. Matching, resulting in the degradation of security protection, waste of resources and other issues. Therefore, how to make the relay device establish a relay type PDU session and match the strategy used by the PC5 connection is an urgent problem to be solved.
  • PDU protocol data unit
  • the present application provides a communication method and device.
  • a communication method includes:
  • the first network element obtains the first policy, and the first policy is when the first terminal device accesses the network through the first relay device, the Uu interface user plane security used by the first relay device to establish a relay-type protocol data unit PDU session protection strategy.
  • the first network element determines a second policy according to the first policy, and the second policy is used to determine whether to enable user plane security protection of the PC5 interface between the first terminal device and the first relay device.
  • the first network element sends the second policy to the first terminal device and/or the first relay device.
  • the first network element can obtain the Uu interface user plane security protection policy, and determine the PC5 interface user plane security protection policy according to the Uu interface user plane security protection policy, so that the Uu interface and PC5 interface user plane security protection strategy matches. If the user plane security protection policies of the Uu interface and the PC5 interface match, that is, the Uu interface and the PC5 interface use the same level of user plane security protection, the user plane security protection of both the Uu interface and the PC5 interface can be enabled or disabled.
  • the user plane security protection policies of the Uu interface and the PC5 interface do not match, for example, the user plane security protection of the Uu interface is enabled but the user plane security protection of the PC5 interface is not enabled, the first terminal device and the first relay
  • the PC5 connection established between the devices is weak against external attacks, and the Uu interface user plane security protection of the first relay device does not play its due role, or the Uu interface user plane security protection is not enabled, and the PC5 interface is enabled
  • User plane security protection when the first relay device does not need to enable the Uu interface user plane security protection, the PC5 connection established between the first terminal device and the first relay device enables the user plane security protection, resulting in Waste of device processing and network resources. Therefore, adopting the solution of the present application can match the user plane security protection policy of the Uu interface and the PC5 interface, and solve problems such as security protection degradation and resource waste caused by policy mismatch.
  • the second policy is the user plane security protection policy of the PC5 interface or whether to enable the user plane security protection of the PC5 interface.
  • the first network element determines the second strategy according to the first strategy, including:
  • the first network element determines a second policy, and the second policy indicates enabling the user plane security protection of the PC5 interface.
  • the first network element determines a second policy, and the second policy indicates that the user plane security protection of the PC5 interface is not enabled.
  • the first policy indicates preference to enable user plane security protection of the Uu interface
  • the first network element determines a second policy, and the second policy indicates preference to enable user plane security protection of the PC5 interface.
  • the first network element determines whether to enable user plane security protection of the PC5 interface.
  • the first network element sends first indication information to the first remote terminal and/or the first relay device, where the first indication information is used to indicate whether to enable user plane security protection of the PC5 interface.
  • the method further includes:
  • the first network element obtains the third policy, and the third policy is the Uu interface signaling plane security protection policy used by the first relay device to establish a relay-type PDU session when the first terminal device accesses the network through the first relay device .
  • the first network element determines a fourth policy according to the third policy, and the fourth policy is used to determine whether to enable the signaling plane security protection of the PC5 interface between the first terminal device and the first relay device.
  • the first network element sends the fourth policy to the first remote terminal and/or the first relay device.
  • the first network element can obtain the Uu interface signaling plane security protection policy, and determine the PC5 interface signaling plane security protection policy according to the Uu interface signaling plane security protection policy, so that the Uu interface and the PC5 interface signal Match the face security protection policy.
  • the third policy is the signaling plane security protection policy of the PC5 interface or whether to enable the signaling plane security protection of the PC5 interface.
  • the first network element determines a fourth strategy according to the third strategy, including:
  • the first network element determines a fourth policy, and the fourth policy indicates enabling the signaling plane security protection of the PC5 interface.
  • the third policy indicates that the signaling plane security protection of the Uu interface is not enabled
  • the first network element determines a fourth policy, and the fourth policy indicates that the signaling plane security protection of the PC5 interface is not enabled.
  • the method when the second policy indicates enabling the user plane security protection of the PC5 interface, the method further includes:
  • the first network element determines a fourth policy according to the second policy, and the fourth policy indicates enabling signaling plane security protection of the PC5 interface.
  • the method further includes:
  • the first network element determines ProSe parameters corresponding to the first terminal device and/or the first relay device.
  • the first network element sends a first request message to the second network element, where the first request message is used to request a first policy, and the first request message includes a ProSe parameter.
  • the first network element obtains the first policy, including:
  • the first network element obtains the first policy from the second network element.
  • the method further includes:
  • the first network element determines ProSe parameters corresponding to the first terminal device and/or the first relay device.
  • the first network element obtains the first policy, including:
  • the first network element acquires the first policy locally at least according to the ProSe parameter.
  • a communication method in a second aspect, includes:
  • a second correspondence is obtained, where the second correspondence is a one-to-one correspondence between N ProSe parameters of adjacent services and N second strategies, where N is a positive integer.
  • the second correspondence is associated with the first correspondence
  • the first correspondence is a one-to-one correspondence between N ProSe parameters and N first policies
  • the first policy is a Uu interface user plane security protection policy.
  • the first terminal device and the first relay device may respectively acquire the second correspondence, and the second correspondence is associated with the first correspondence.
  • the second policy corresponding to the first ProSe parameter can be determined, and the PC5 connection can be established using this policy.
  • the Uu interface user plane security protection policy used by the first relay device when establishing the relay PDU session is the same as the PC5 interface user plane security protection policy used to establish the PC5 connection matching.
  • the method further includes:
  • a fourth correspondence is acquired, where the fourth correspondence is a one-to-one correspondence between N ProSe parameters of adjacent services and N fourth strategies, where N is a positive integer.
  • the fourth correspondence is associated with the third correspondence
  • the third correspondence is a one-to-one correspondence between N ProSe parameters and N third strategies
  • the third strategy is a Uu interface signaling plane security protection strategy.
  • determine the fourth policy corresponding to the first ProSe parameter, and the fourth policy corresponding to the first ProSe parameter is used to determine whether to enable the signaling plane security of the PC5 interface between the first terminal device and the first relay device Protect.
  • the first terminal device and the first relay device may respectively acquire the fourth correspondence, and the fourth correspondence is associated with the third correspondence.
  • a fourth strategy corresponding to the first ProSe parameter can be determined, and the PC5 connection can be established using this strategy.
  • the Uu interface signaling plane security protection strategy used by the first relay device when establishing a relay PDU session is the same as the PC5 interface signaling plane security policy used to establish a PC5 connection. match the protection strategy.
  • a communication method includes:
  • the third network element obtains the second policy, where the second policy is a PC5 interface user plane security protection policy used when the first terminal device establishes a PC5 connection with the first relay device.
  • the third network element determines the first strategy according to the second strategy, and the first strategy is a Uu interface user plane security protection strategy used by the first relay device to establish a relay-type protocol data unit PDU session.
  • the third network element establishes a relay-type PDU session for the first relay device according to the first policy.
  • the third network element when the third network element needs to establish a relay-type PDU session for the first relay device, the third network element can use the PC5
  • the interface user plane security protection policy is used to determine the Uu interface user plane security protection policy used by the first relay device to establish a relay-type PDU session, so that the first relay device establishes the PC5 connection using the same strategy as the relay-type PDU session.
  • the policy used by the PDU session matches.
  • the third network element determines the first strategy according to the second strategy, including:
  • the third network element determines the first policy, and the first policy indicates enabling the user plane security protection of the Uu interface.
  • the third network element determines the first policy, and the first policy indicates that the user plane security protection of the Uu interface is not enabled.
  • the third network element determines the first policy, and the first policy indicates preference to enable the user plane security protection of the Uu interface.
  • the method further includes:
  • the third network element acquires a fourth policy, where the fourth policy is a PC5 interface signaling plane security protection policy used when the first terminal device establishes a PC5 connection with the first relay device.
  • the third network element determines a third strategy according to the fourth strategy, and the first strategy is a Uu interface signaling plane security protection strategy used by the first relay device to establish a relay-type PDU session.
  • the third network element establishes a relay-type PDU session for the first relay device according to the third policy.
  • a communication device in a fourth aspect, includes a module or a unit configured to execute the method in any possible implementation manner of the first aspect.
  • a communication device including:
  • the transceiver unit is configured to obtain a second correspondence, where the second correspondence is a one-to-one correspondence between N adjacent service ProSe parameters and N second strategies, where N is a positive integer.
  • the second correspondence is associated with the first correspondence
  • the first correspondence is a one-to-one correspondence between N ProSe parameters and N first policies
  • the first policy is a Uu interface user plane security protection policy.
  • the transceiver unit is further configured to obtain the first ProSe parameter.
  • the processing unit is configured to determine a second strategy corresponding to the first ProSe parameter according to the second correspondence, and the second strategy corresponding to the first ProSe parameter is used to determine whether to enable the PC5 interface between the first terminal device and the first relay device user plane security protection.
  • the processing unit is further configured to establish the PC5 connection according to the second policy corresponding to the first ProSe parameter.
  • the transceiver unit is further configured to acquire a fourth correspondence, where the fourth correspondence is a one-to-one correspondence between N adjacent service ProSe parameters and N fourth strategies, where N is a positive integer.
  • the fourth correspondence is associated with the third correspondence
  • the third correspondence is a one-to-one correspondence between N ProSe parameters and N third strategies
  • the third strategy is a Uu interface signaling plane security protection strategy.
  • the processing unit is further configured to determine a fourth strategy corresponding to the first ProSe parameter according to the fourth correspondence, and the fourth strategy corresponding to the first ProSe parameter is used to determine whether to enable the PC5 between the first terminal device and the first relay device. Interface signaling plane security protection.
  • a communication device including:
  • the transceiver unit is configured to acquire a second policy, which is a PC5 interface user plane security protection policy used when the first terminal device establishes a PC5 connection with the first relay device.
  • a second policy which is a PC5 interface user plane security protection policy used when the first terminal device establishes a PC5 connection with the first relay device.
  • the processing unit is configured to determine the first strategy according to the second strategy, and the first strategy is a Uu interface user plane security protection strategy used by the first relay device to establish a relay-type protocol data unit PDU session.
  • the processing unit is further configured to establish a relay-type PDU session for the first relay device according to the first policy.
  • the processing unit is configured to determine the first strategy according to the second strategy, including:
  • the processing unit determines the first policy, and the first policy indicates to enable the user plane security protection of the Uu interface.
  • the processing unit determines the first policy, and the first policy indicates that the user plane security protection of the Uu interface is not enabled.
  • the processing unit determines the first policy, and the first policy indicates preference to enable the user plane security protection of the Uu interface.
  • the transceiver unit is further configured to acquire a fourth policy, which is a PC5 interface signaling plane security protection policy used when the first terminal device establishes a PC5 connection with the first relay device.
  • a fourth policy which is a PC5 interface signaling plane security protection policy used when the first terminal device establishes a PC5 connection with the first relay device.
  • the processing unit is further configured to determine a third strategy according to the fourth strategy, where the first strategy is a Uu interface signaling plane security protection strategy used by the first relay device to establish a relay-type PDU session.
  • the processing unit is further configured to establish a relay-type PDU session for the first relay device according to the third strategy.
  • a communication device including at least one processor.
  • the memory is used to store computer programs.
  • the processor executes the computer programs or instructions stored in the memory, so that the communication device executes the method in any possible implementation manner of the first aspect to the third aspect.
  • a computer-readable storage medium including a computer program.
  • the computer program runs on a computer, the computer executes the method in any possible implementation manner of the first aspect to the third aspect.
  • a chip is provided, and a processing circuit is disposed on the chip, and the processing circuit is configured to execute the method in any possible implementation manner of the first aspect to the third aspect.
  • a computer program product includes: a computer program (also referred to as code, or instruction), when the computer program is executed, the computer executes any one of the first aspect to the third aspect. method in one possible implementation.
  • a computer program also referred to as code, or instruction
  • Fig. 1 shows the architecture of a communication system to which the embodiment of the present application is applicable.
  • Fig. 2 shows an example of a schematic interaction diagram of the method proposed in this application.
  • Fig. 3 shows another example of a schematic interaction diagram of the method proposed in this application.
  • Fig. 4 shows another example of a schematic interaction diagram of the method proposed in this application.
  • Fig. 5 shows another example of a schematic interaction diagram of the method proposed in this application.
  • Fig. 6 shows a schematic block diagram of a communication device provided by the present application.
  • Fig. 7 shows another schematic block diagram of a communication device provided by this application.
  • Fig. 1 shows the architecture of a communication system to which the embodiment of the present application is applicable.
  • the core network includes, but is not limited to, data storage management network elements, mobility management network elements, network open network elements, user plane function network elements, and session management network elements.
  • the data storage management network element is a network element used to store and manage the data of the terminal equipment, for example, in a 5G network, it may be a unified data management function network element (unified data management, UDM).
  • UDM unified data management function network element
  • the unified data management function network element may still be a UDM network element, or may have other names, which are not limited in this application.
  • the mobility management network element is a network element used to manage the mobility of terminal equipment.
  • it may be a mobility management entity (mobility management entity, MME), and in a 5G network, it may be Access and mobility management function (access and mobility management function, AMF) network element.
  • MME mobility management entity
  • AMF Access and mobility management function
  • the access and mobility management functional network element may still be an AMF network element, or may have other names, which are not limited in this application.
  • the network exposure network element is responsible for providing network functions to third-party applications.
  • it can be a network exposure function (NEF) network element.
  • NEF network exposure function
  • the network element with the network opening function may still be an NEF network element, or may have other names, which are not limited in this application.
  • the user plane function network element is responsible for forwarding and receiving user data, for example, in a 5G network, it may be a user plane function (user plane function, UPF) network element.
  • UPF user plane function
  • the user plane functional network element may still be a UPF network element, or may have other names, which are not limited in this application.
  • the session management network element is responsible for the selection of user plane network elements, Internet protocol (internet protocol, IP) address allocation, session establishment, modification, release, etc.
  • Internet protocol Internet protocol
  • IP Internet protocol
  • SMF session management function
  • the network element with the session management function may still be an SMF network element, or may have other names, which are not limited in this application.
  • An access network device is a device that provides wireless communication functions for terminal devices.
  • it can be an access point (access point, AP) in WLAN, a base transceiver station (BTS) in GSM or CDMA, or a It is a base station (nodeB, NB) in WCDMA, or a gNB in a new wireless system (new radio, NR) system, or an evolved base station (evolutional node B, eNB or eNodeB) in LTE.
  • AP access point
  • BTS base transceiver station
  • NB base station
  • gNB new wireless system
  • new radio new radio, NR
  • evolutional node B evolutional node B, eNB or eNodeB
  • 5G network and may also be a radio access network device (radio access network, RAN).
  • radio access network radio access network
  • Terminal equipment may refer to user equipment (user equipment, UE), access terminal, subscriber unit, subscriber station, mobile station, mobile station, remote station, remote terminal, mobile device, user terminal, terminal, wireless communication device, user agent, or user device.
  • the terminal device may also be a cellular phone, a cordless phone, a session initiation protocol (SIP) phone, a wireless local loop (WLL) station, a personal digital assistant (PDA), a Functional handheld devices, computing devices or other processing devices connected to wireless modems, vehicle-mounted devices, drones, wearable devices, terminal devices in future 5G networks or future evolution of public land mobile networks (public land mobile network, PLMN), etc., which are not limited in this embodiment of the present application.
  • SIP session initiation protocol
  • WLL wireless local loop
  • PDA personal digital assistant
  • the terminal device in this application supports proximity-based services (Proximity-based services, ProSe) communication. That is, the terminal device can establish a side link (side link) connection with the relay device, and access the network through the relay device. The communication between the terminal device and the relay device is through the PC5 interface.
  • the terminal device can also be called a remote UE (remote UE).
  • the relay device also supports ProSe communication.
  • the relay device communicates with the remote UE through the PC5 interface, and the relay device communicates with the access network device through the Uu interface.
  • the relay device may be a terminal device or a wireless access device (for example, an access device deployed by an operator).
  • the UDM acquires a first correspondence, where the first correspondence is a correspondence between a proximity-based services (ProSe) parameter and a user plane security protection policy (denoted as the first policy) of the Uu interface.
  • the first strategy is a user plane security protection strategy for the Uu interface used by the relay device to establish a relay-type protocol data unit (protocol data unit, PDU) session when the remote UE accesses the network through the relay device.
  • the first policy is used to indirectly determine whether to enable the user plane security protection used by the relay type PDU session established by the relay device.
  • the first correspondence is preconfigured in the UDM.
  • the UDM obtains the first corresponding relationship from a ProSe application server (ProSe application server) or an application function (application function, AF) network element. It should be noted that the UDM can obtain the first corresponding relationship directly from the ProSe application server or the application function network element, or indirectly obtain the first corresponding relationship through the network exposure function (NEF) network element.
  • ProSe application server ProSe application server
  • application function application function, AF
  • NEF network exposure function
  • the ProSe parameter is a relay service code (relay service code, RSC) parameter. That is, the first correspondence is the correspondence between the RSC parameter and the first policy. For example, the first corresponding relationship may be the content shown in Table 1.
  • RSC relay service code
  • the ProSe parameters are single network slice selection assistance information (single network slice selection assistance information, S-NSSAI) parameters and data network name (data network name, DNN) parameters. That is, the first correspondence is the correspondence between the S-NSSAI and/or the DNN and the first policy. For example, the first corresponding relationship may be the content shown in Table 2.
  • the ProSe parameter is S-NSSAI and/or DNN information
  • the S-NSSAI parameter used by the relay device to establish a relay-type PDU session should be the same as that in the ProSe parameter
  • the S-NSSAI parameters of the relay device shall be the same, and/or the DNN parameters used by the relay device to establish a relay type PDU session shall be the same as the DNN parameters in the ProSe parameters.
  • the relay device and the remote UE are served by the same UDM (for example, UDM#1), and the first corresponding relationship may be configured in UDM#1.
  • the relay device and the remote UE are served by different UDMs (for example, the relay device is served by UDM#1, and the remote UE is served by UDM#2), then UDM#1 and UDM
  • the first corresponding relationship is configured in #2. That is, the same first correspondence is configured in UDM#1 and UDM#2.
  • the SMF acquires the first correspondence.
  • the method may not include S201, but may include S202; or, the method may include both S201 and S202; or, the method may include S201, but not include S202.
  • the relay device #1 (an example of the first relay device) sends a first request message to the AMF, where the first request message is used to request the proximity-based services (Proximity-based services, ProSe) parameters corresponding to the relay device #1 , and/or the remote UE#1 (an example of the first terminal device) sends a second request message to the AMF, where the second request message is used to request the proximity-based services (Proximity-based services, ProSe) parameters corresponding to the remote UE#1.
  • the AMF receives the first request message from the relay device #1 and/or the AMF receives the second request message from the remote UE #1.
  • the first request message may also carry information #1, where the information #1 indicates that the relay device #1 has a relay capability.
  • the second request message may also carry information #2, where the information #2 indicates that the remote UE #1 supports accessing the network through the relay device.
  • relay device #1 and the remote UE#1 may be served by the same AMF, or may be served by different AMFs.
  • the AMF determines that the relay device #1 has a relay capability, and/or determines that the remote UE#1 supports network access through the relay device.
  • the AMF may also determine the relay service supported by the relay device #1, and/or determine the relay service supported by the remote UE#1.
  • the AMF sends the third request message and/or the fourth request message to the PCF.
  • the PCF receives the third request message and/or the fourth request message from the AMF.
  • the third request message is triggered by the first request message, and is used to request the ProSe parameter corresponding to the relay device #1
  • the fourth request message is triggered by the second request message, and is used to request the ProSe parameter corresponding to the remote UE #1 from the PCF .
  • the AMF may carry the relay service information supported by the relay device #1 in the third request message; the AMF may carry the relay service information of the remote UE#1 in the fourth request message.
  • the AMF can request the ProSe parameter of the relay device #1 and the ProSe parameter of the remote UE#1 from the same PCF, or, The AMF may also separately request the ProSe parameters of the relay device #1 and the ProSe parameters of the remote UE#1 from different PCFs.
  • the different AMFs may request the ProSe parameters of the relay device #1 and the ProSe parameters of the remote UE#1 from the same PCF, or the different AMFs may also request The ProSe parameters of the relay device #1 and the ProSe parameters of the remote UE #1 may be requested from different PCFs respectively.
  • the PCF determines the ProSe parameter corresponding to the relay device #1, and/or determines the ProSe parameter corresponding to the remote UE#1.
  • the PCF determines the ProSe parameters corresponding to the relay device #1 according to the relay service supported by the relay device #1. And/or the PCF determines the ProSe parameter corresponding to the remote UE#1 according to the relay service supported by the remote UE#1.
  • the ProSe parameter may be an RSC parameter.
  • the ProSe parameters may be S-NSSAI parameters and/or DNN parameters.
  • the PCF may first determine the RSC parameters, and then determine the S-NSSAI parameters and/or the DNN parameters according to the RSC parameters.
  • the ProSe parameters corresponding to the remote UE#1 are the same as the ProSe parameters corresponding to the relay device #1.
  • the remote UE#1 can access the network through the relay device #1, and the ProSe parameter corresponding to the remote UE#1 and the ProSe parameter corresponding to the relay device #1 are recorded as ProSe parameter #1.
  • the ProSe parameter is an S-NSSAI parameter and/or a DNN parameter
  • the S-NSSAI parameter used by the relay device #1 to establish a relay type PDU session
  • the NSSAI parameters and/or DNN parameters shall be the same as the S-NSSAI parameters and/or DNN parameters in the ProSe parameters.
  • the PCF sends a fifth request message to the UDM, where the fifth request message includes ProSe parameter #1.
  • the UDM receives the fifth request message from the PCF.
  • ProSe parameter #1 included in the fifth request message will be described below.
  • ProSe parameter #1 may be RSC parameter #1.
  • ProSe parameter #1 may be S-NSSAI parameter #1 and/or DNN parameter #1.
  • the UDM determines the first policy #1 according to the first correspondence and the ProSe parameter #1.
  • the first corresponding relationship configured in the UDM is the corresponding relationship between the RSC parameter and the first policy
  • the ProSe parameter #1 included in the third request message is the RSC parameter #1
  • the UDM according to the RSC parameter # 1 and the first corresponding relationship, the first policy #1 is determined.
  • the first correspondence configured in the UDM is the correspondence between the S-NSSAI parameter and/or the DNN parameter and the first policy
  • the ProSe parameter #1 included in the third request message is the S-NSSAI parameter #1 and/or DNN parameter #1
  • the UDM determines the first strategy #1 according to the S-NSSAI parameter #1 and/or DNN parameter #1 and the first corresponding relationship.
  • the UDM sends the first policy #1 to the PCF. Accordingly, the PCF receives the first policy #1.
  • the method further includes the following S210-S212.
  • Case A The method does not include S201 but includes S202.
  • Situation B The method includes S201, but in S208 the UDM does not determine the first policy #1; or in S209 the UDM does not send the first policy #1 to the PCF.
  • Case C The operator configures the PCF to obtain the first policy #1 from the SMF.
  • the PCF sends a sixth request message to the SMF, where the sixth request message includes ProSe parameter #1.
  • the SMF accepts the sixth request message from the PCF.
  • the SMF determines a first policy #1 according to the first correspondence and the ProSe parameter #1.
  • the SMF sends the first policy #1 to the PCF.
  • the PCF receives the first policy #1 from the SMF.
  • the PCF determines the second strategy (referred to as the second strategy #1) according to the first strategy #1, and the second strategy #1 is used to determine whether to enable the user of the PC5 interface between the remote UE#1 and the relay device #1 Surface security protection.
  • the PCF determines the second policy #1 according to the first policy #1.
  • the second policy #1 is a user plane security protection policy for the PC5 interface.
  • the first policy #1 indicates enabling the user plane security protection of the Uu interface, that is, the first policy #1 is that the user plane security protection policy of the Uu interface is REQUIRED.
  • the PCF determines the second policy #1 according to the first policy #1, and the second policy #1 indicates enabling the user plane security protection of the PC5 interface, that is, the second policy #1 is that the user plane security protection policy of the PC5 interface is REQUIRED.
  • the second policy #1 is a user plane confidentiality and/or integrity protection policy of the PC5 interface.
  • the first policy #1 indicates to enable the user plane confidentiality protection and/or the user plane integrity protection of the Uu interface, that is, the first policy #1 is that the user plane confidentiality and/or integrity protection policy of the Uu interface is REQUIRED.
  • the second policy #1 indicates to enable the user plane confidentiality protection and/or the user plane integrity protection of the PC5 interface, that is, the second policy #1 is that the user plane confidentiality and/or integrity protection policy of the PC5 interface is REQUIRED.
  • the second policy #1 is that the user plane confidentiality and/or integrity protection policy of the PC5 interface is REQUIRED
  • the second policy #1 also indicates that the signaling plane confidentiality protection and/or integrity protection of the PC5 interface is enabled. sexual protection.
  • the second policy #1 is a user plane security protection policy for the PC5 interface.
  • the first policy #1 indicates that the user plane security protection of the Uu interface is not enabled, that is, the first policy #1 is that the user plane security protection policy of the Uu interface is NOT NEEDED.
  • the PCF determines the second policy #1 according to the first policy #1, and the second policy #1 indicates that the user plane security protection of the PC5 interface is not enabled, that is, the second policy #1 is that the user plane security protection policy of the PC5 interface is NOT NEEDED.
  • the second policy #1 is a user plane confidentiality and/or integrity protection policy of the PC5 interface.
  • the first policy #1 indicates that the user plane confidentiality and/or user plane integrity protection of the Uu interface is not enabled, that is, the first policy #1 is that the user plane confidentiality and/or integrity protection policy of the Uu interface is NOT NEEDED.
  • the second policy #1 indicates that the user plane confidentiality and/or user plane integrity protection of the PC5 interface is not enabled, that is, the second policy #1 is that the user plane confidentiality and/or integrity protection policy of the PC5 interface is NOT NEEDED.
  • the second policy #1 is that the user plane confidentiality and/or integrity protection policy of the PC5 interface is NOT NEEDED, then the second policy #1 also indicates that the signaling plane confidentiality protection and/or integrity protection of the PC5 interface is not enabled or integrity protection.
  • the second policy #1 is a user plane security protection policy for the PC5 interface.
  • the first policy #1 indicates that it is preferred to enable the user plane security protection of the Uu interface, that is, the first policy #1 is that the user plane security protection policy of the Uu interface is PREFERRED.
  • the PCF determines the second policy #1 according to the first policy #1, and the second policy #1 indicates preference to enable the user plane security protection of the PC5 interface, that is, the second policy #1 is that the user plane security protection policy of the PC5 interface is PREFERRED.
  • the second policy #1 is a user plane confidentiality and/or integrity protection policy of the PC5 interface.
  • the first policy #1 indicates preference to enable the user plane confidentiality and/or user plane integrity protection of the Uu interface, that is, the first policy #1 is that the user plane confidentiality and/or integrity protection policy of the Uu interface is PREFERRED, corresponding
  • the second policy #1 indicates preference to enable the user plane confidentiality and/or user plane integrity protection of the PC5 interface, that is, the second policy #1 is that the user plane confidentiality and/or integrity protection policy of the PC5 interface is PREFERRED .
  • the second policy #1 is that the user plane confidentiality and/or integrity protection policy of the PC5 interface is PREFERRED, then the second policy #1 also indicates preference to enable the signaling plane confidentiality protection and/or Integrity protection.
  • the second policy #1 is a user plane security protection policy for the PC5 interface.
  • the first policy #1 indicates that it is preferred to enable the user plane security of the Uu interface, that is, the first policy #1 is that the user plane security protection policy of the Uu interface is PREFERRED.
  • the PCF can determine whether the user plane security protection of the PC5 interface needs to be enabled between the remote UE #1 and the relay device #1, and determine the second policy #1 accordingly.
  • the PCF can apply ProSe according to the default configuration of the operator, the existing network load, or the PDU session corresponding to the relay type.
  • the provided requirements determine whether the user plane security protection of the PC5 interface needs to be enabled between the remote UE#1 and the relay device#1, and the specific method is not specifically limited here.
  • the second policy #1 is a user plane security protection policy for the PC5 interface.
  • the first policy #1 indicates that it is preferred to enable the user plane security of the Uu interface, that is, the first policy #1 is that the user plane security protection policy of the Uu interface is PREFERRED. If the PCF determines that the user plane security protection of the PC5 interface needs to be enabled, the PCF determines the second policy #1, and the second policy #1 indicates to enable the user plane security protection of the PC5 interface, that is, the second policy #1 is the user plane security protection of the PC5 interface.
  • the confidentiality and/or integrity protection policy is REQUIRED.
  • the second policy #1 is a user plane security protection policy for the PC5 interface.
  • the first policy #1 indicates that it is preferred to enable the user plane security of the Uu interface, that is, the first policy #1 is that the user plane security protection policy of the Uu interface is PREFERRED. If the PCF determines that it is necessary not to enable the user plane security protection of the PC5 interface, the PCF determines the second policy #1, and the second policy #1 indicates that the user plane security protection of the PC5 interface is not enabled, that is, the second policy #1 is the PC5 interface
  • the user plane confidentiality and/or integrity protection policy is NOT NEEDED.
  • the second policy #1 is that the user plane confidentiality and/or integrity protection policy of the PC5 interface is REQUIRED, then the second policy #1 also indicates that the signaling plane confidentiality protection and/or integrity protection of the PC5 interface is enabled. sexual protection.
  • the second policy #1 is that the user plane confidentiality and/or integrity protection policy of the PC5 interface is NOT NEEDED, then the second policy #1 also indicates that the signaling plane confidentiality protection and/or integrity protection of the PC5 interface is not enabled or integrity protection.
  • the second policy #1 is a user plane security protection policy for the PC5 interface.
  • the first policy #1 indicates that it is preferred to enable the user plane security of the Uu interface, that is, the first policy #1 is that the user plane security protection policy of the Uu interface is PREFERRED.
  • the PCF determines the second policy #1 according to the first policy #1, and the second policy #1 indicates preference to enable the user plane security protection of the PC5 interface, that is, the second policy #1 is that the user plane security protection policy of the PC5 interface is PREFERRED.
  • the PCF may determine whether to enable the user plane security protection of the PC5 interface according to the operator's default configuration, the existing network load, or the requirements provided by the ProSe application corresponding to the relay type PDU session, and generate the first indication information.
  • the first indication information is used to indicate whether the user plane security protection of the PC5 interface needs to be enabled between the remote UE #1 and the relay device #1.
  • the second policy #1 is a user plane security protection policy for the PC5 interface.
  • the first policy #1 indicates preference to enable the user plane confidentiality and/or integrity security of the Uu interface, that is, the first policy #1 is that the user plane confidentiality and/or integrity security protection policy of the Uu interface is PREFERRED.
  • the second policy #1 indicates preference to enable the user plane confidentiality and/or user plane integrity protection of the PC5 interface, that is, the second policy #1 is that the user plane confidentiality and/or integrity protection policy of the PC5 interface is PREFERRED.
  • the PCF determines that the user plane security protection of the PC5 interface needs to be enabled, the PCF generates first indication information, where the first indication information indicates enabling the user plane confidentiality and/or integrity protection of the PC5 interface.
  • the second policy #1 is a user plane security protection policy for the PC5 interface.
  • the first policy #1 indicates preference to enable the user plane confidentiality and/or integrity security of the Uu interface, that is, the first policy #1 is that the user plane confidentiality and/or integrity security protection policy of the Uu interface is PREFERRED.
  • the second policy #1 indicates preference to enable the user plane confidentiality and/or user plane integrity protection of the PC5 interface, that is, the second policy #1 is that the user plane confidentiality and/or integrity protection policy of the PC5 interface is PREFERRED.
  • the PCF determines that the user plane security protection of the PC5 interface needs not to be enabled, the PCF generates first indication information, and the first indication information indicates that the user plane confidentiality and/or integrity protection of the PC5 interface is not enabled.
  • the second policy #1 indicates whether to enable the user plane security protection of the PC5 interface.
  • the first policy #1 indicates enabling the user plane security protection of the Uu interface, that is, the first policy #1 is that the user plane security protection policy of the Uu interface is REQUIRED.
  • the PCF determines the second policy #1 according to the first policy #1, and the second policy #1 directly instructs to enable the user plane security protection of the PC5 interface.
  • the second policy #1 indicates whether to enable user plane confidentiality and/or integrity protection of the PC5 interface.
  • the first policy #1 indicates that the user plane confidentiality protection and/or the user plane integrity protection of the Uu interface are enabled, that is, the first policy #1 is that the user plane confidentiality and/or integrity protection policy of the Uu interface is REQUIRED, and the corresponding Specifically, the second policy #1 directly indicates to enable the user plane confidentiality protection and/or the user plane integrity protection of the PC5 interface.
  • the second policy #1 directly indicates to enable the user plane confidentiality and/or integrity protection of the PC5 interface
  • the second policy #1 also indicates to enable the signaling plane confidentiality and/or integrity protection of the PC5 interface .
  • the second policy #1 indicates whether to enable the user plane security protection of the PC5 interface.
  • the first policy #1 indicates that the user plane security protection of the Uu interface is not enabled, that is, the first policy #1 is that the user plane security protection policy of the Uu interface is NOT NEEDED.
  • the PCF determines the second policy #1 according to the first policy #1, and the second policy #1 directly indicates that the user plane security protection of the PC5 interface is not enabled.
  • the second policy #1 indicates whether to enable user plane confidentiality and/or integrity protection of the PC5 interface.
  • the first policy #1 indicates that the user plane confidentiality and/or user plane integrity protection of the Uu interface is not enabled, that is, the first policy #1 is that the user plane confidentiality and/or integrity protection policy of the Uu interface is NOT NEEDED,
  • the second policy #1 directly indicates not to enable user plane confidentiality and/or user plane integrity protection of the PC5 interface.
  • the second policy #1 indicates whether to enable the user plane security protection of the PC5 interface.
  • the first policy #1 indicates that it is preferred to enable the user plane security protection of the Uu interface, that is, the first policy #1 is that the user plane security protection policy of the Uu interface is PREFERRED.
  • the PCF can determine whether the user plane security protection of the PC5 interface needs to be enabled between the remote UE #1 and the relay device #1, and determine the second policy #1 accordingly.
  • the PCF can determine whether the connection between the remote UE #1 and the relay device #1 needs Enable the user plane security protection of the PC5 interface.
  • the specific method is not limited here.
  • the second policy #1 indicates whether to enable user plane confidentiality and/or integrity security protection of the PC5 interface.
  • the first policy #1 indicates preference to enable the user plane confidentiality and/or integrity security of the Uu interface, that is, the first policy #1 is that the user plane confidentiality and/or integrity security protection policy of the Uu interface is PREFERRED. If the PCF determines that the user plane confidentiality and/or integrity security protection of the PC5 interface needs to be enabled, the PCF determines the second policy #1, and the second policy #1 directly indicates that the user plane confidentiality and/or integrity protection of the PC5 interface is enabled .
  • the second policy #1 indicates whether to enable the user plane confidentiality and/or integrity security protection of the PC5 interface.
  • the first policy #1 indicates preference to enable the user plane confidentiality and/or integrity security of the Uu interface, that is, the first policy #1 is that the user plane confidentiality and/or integrity security protection policy of the Uu interface is PREFERRED. If the PCF determines that it is necessary not to enable the user plane confidentiality and/or integrity security protection of the PC5 interface, the PCF determines the second policy #1, and the second policy #1 directly indicates that the user plane confidentiality and/or integrity of the PC5 interface is not enabled. sexual protection.
  • the second policy #1 directly indicates to enable the user plane confidentiality and/or integrity protection of the PC5 interface
  • the second policy #1 also indicates to enable the signaling plane confidentiality and/or integrity protection of the PC5 interface .
  • the PCF sends the second policy #1 to the remote UE #1 and/or the relay device #1.
  • the remote UE #1 and/or the relay device #1 receives the second policy #1.
  • the PCF simultaneously sends the first indication information to the remote UE#1 and/or the relay device#1.
  • the PCF can obtain the Uu interface user plane security protection policy, and determine the PC5 interface user plane security protection policy according to the Uu interface user plane security protection policy, so that the Uu interface matches the PC5 interface user plane security protection policy .
  • the user plane security protection policies of the Uu interface and the PC5 interface do not match, for example, the user plane security protection of the Uu interface is enabled but the user plane security protection of the PC5 interface is not enabled, the remote UE#1 and the relay device
  • the PC5 connection established between #1 has a weak ability to resist external attacks, and the user plane security protection of the Uu interface on the relay device #1 does not play its due role, resulting in a waste of resources. Therefore, adopting the solution of the present application can match the user plane security protection policy of the Uu interface and the PC5 interface, and solve problems such as security protection degradation and resource waste caused by policy mismatch.
  • the method further includes the following S215-S217.
  • the PCF acquires the signaling plane security protection policy (referred to as the third policy #1) of the Uu interface corresponding to the relay device #1 and/or the remote UE #1.
  • the third policy #1 is a Uu interface signaling plane security protection policy used by the relay device #1 to establish a relay type PDU session when the remote UE#1 accesses the network through the relay device #1. It should be understood that if the relay device #1 can subsequently access the network through the remote UE#1, the signaling plane security protection policy of the Uu interface corresponding to the relay device #1 and the remote UE#1 may be the same.
  • the integrity protection of the signaling plane of the Uu interface is forcibly enabled, and whether to enable the confidentiality protection of the signaling plane of the Uu interface is determined by the operator.
  • whether the signaling plane integrity and/or confidentiality protection of the Uu interface is enabled is determined by the operator.
  • a third policy #1 is pre-configured in the PCF.
  • the PCF acquires the third policy #1 from the relay device #1 and/or the access network device corresponding to the remote UE #1.
  • PCF obtains the third policy #1 from relay device #1 and/or remote UE#1 corresponding to other core network elements.
  • other core network elements can be UDM, AMF, SMF or 5G DDNMF, which is not limited here .
  • the PCF determines the fourth strategy (referred to as the fourth strategy #1) according to the third strategy #1, and the fourth strategy #1 is used to determine whether to enable the PC5 interface signaling between the remote UE#1 and the relay device #1 Surface security protection.
  • the third policy #1 indicates to enable the integrity and/or confidentiality protection of the signaling plane of the Uu interface
  • the fourth policy #1 indicates to enable the integrity and/or confidentiality protection of the signaling plane of the PC5 interface.
  • the third policy #1 indicates that the signaling plane integrity and/or confidentiality protection of the Uu interface is not enabled, and the fourth policy #1 indicates that the signaling plane integrity and/or confidentiality protection of the PC5 interface is not enabled.
  • PCF can obtain the Uu interface signaling plane security protection policy, and determine the PC5 interface signaling plane security protection policy according to the Uu interface signaling plane security protection policy, so that the signaling planes of the Uu interface and PC5 interface are safe Protection policies match.
  • the PCF determines the fourth policy #1 according to the second policy #1. Specifically, if the second policy #1 indicates to enable the PC5 interface For user plane confidentiality and/or integrity protection, the PCF determines a fourth policy #1 according to the second policy #1, and the fourth policy #1 indicates enabling the signaling plane confidentiality protection and/or integrity protection of the PC5 interface. In a possible implementation, if the second policy #1 is that the user plane integrity protection/confidentiality protection of the PC5 interface is REQUIRED, then the PCF determines the fourth policy #1 according to the second policy #1, and the fourth policy # 1 indicates that the signaling plane integrity protection/confidentiality protection of the PC5 interface is REQUIRED.
  • the PCF determines the fourth policy #1 according to the second policy #1, and the fourth policy #1 directly indicates to enable the signaling plane integrity protection/confidentiality protection of the PC5 interface.
  • the PCF sends the fourth policy #1 to the remote UE #1 and/or the relay device #1.
  • the remote UE #1 and/or the relay device #1 receives the fourth policy #1.
  • the PCF may determine to enable the signaling plane security protection of the PC5 interface. That is, the fourth policy #1 and/or the second policy #1 also indicate to enable the signaling plane security protection of the PC5 interface.
  • the signaling plane security of the PC5 connection is established according to the fourth policy #1.
  • the second policy #1 can indicate to enable the signaling plane confidentiality and/or integrity protection of the PC5 interface at the same time, when the remote UE #1 and the relay device #1 establish the PC5 connection , establish the signaling plane security of the PC5 connection according to the second policy #1.
  • the PCF acquires a first correspondence.
  • the first correspondence is preconfigured in the PCF.
  • the PCF obtains the first corresponding relationship from a ProSe application server (ProSe application server) or an application function (application function, AF) network element. It should be noted that the PCF can obtain the first corresponding relationship directly from the ProSe application server or the application function network element, or indirectly through the network exposure function (NEF).
  • ProSe application server ProSe application server
  • application function application function, AF
  • NEF network exposure function
  • the first correspondence may also include two situations, the only difference is that the UDM in S201 is replaced by the PCF in this step, which will not be repeated here.
  • the relay device #1 sends a first request message to the AMF, and/or the remote UE#1 sends a second request message to the AMF.
  • the AMF receives the first request message from the relay device #1 and/or the AMF receives the second request message from the remote UE #1.
  • the AMF determines that the relay device #1 has a relay capability, and/or determines that the remote UE#1 supports network access through the relay device.
  • the AMF sends the third request message and/or the fourth request message to the PCF.
  • the PCF receives the third request message and/or the fourth request message from the AMF.
  • the third request message is triggered by the first request message, and is used to request the ProSe parameter corresponding to the relay device #1
  • the fourth request message is triggered by the second request message, and is used to request the ProSe parameter corresponding to the remote UE #1 from the PCF .
  • This process is the same as S205, for details, please refer to the description of S205.
  • the PCF determines the ProSe parameter corresponding to the relay device #1, and/or determines the ProSe parameter corresponding to the remote UE#1.
  • the ProSe parameters corresponding to the remote UE#1 are the same as the ProSe parameters corresponding to the relay device #1.
  • the remote UE#1 can access the network through the relay device #1, and the ProSe parameter corresponding to the remote UE#1 and the ProSe parameter corresponding to the relay device #1 are recorded as ProSe parameter #1.
  • the PCF determines a first policy #1 according to the first correspondence and the ProSe parameter #1.
  • This process is similar to S208. That is, the actions performed by the UDM in S208 are performed by the PCF in S306.
  • the PCF determines the second policy #1 according to the first policy #1.
  • the second policy #1 is used to determine whether to enable the user plane security protection of the PC5 interface between the remote UE #1 and the relay device #1.
  • the PCF sends the second policy #1 to the remote UE #1 and/or the relay device #1.
  • the remote UE #1 and/or the relay device #1 receives the second policy #1.
  • the PCF can also determine the fourth policy #1, and send the fourth policy #1 to the remote UE #1 and/or the relay device #1. In order to avoid repetition, no further description is given here .
  • the relay device #1 and/or the remote UE#1 acquires a second correspondence, where the second correspondence is a correspondence between a ProSe parameter and a second policy.
  • the second policy is used to determine whether to enable the user plane security protection of the PC5 interface between the remote UE and the relay device.
  • the second correspondence may be associated with the first correspondence, and the first correspondence is as described in S201 above.
  • the second correspondence may be determined according to the first correspondence. That is, the association between the second correspondence and the first correspondence is: the user plane security protection policy of the PC5 interface is determined according to the user plane security protection policy of the Uu interface, and the specific determination method can refer to the description in S213, and will not be repeated here .
  • the relay device #1 and the remote UE#1 may also obtain a fourth correspondence, the fourth correspondence is the correspondence between the ProSe parameter and the fourth policy, and the fourth policy is used to determine Whether the signaling plane security protection of the PC5 interface between the remote UE#1 and the relay device #1 is enabled.
  • the fourth correspondence is associated with the third correspondence.
  • the third corresponding relationship is the corresponding relationship between the ProSe parameter and the third strategy, and the third strategy is the signaling plane security protection strategy of the Uu interface.
  • the fourth correspondence may be determined according to the third correspondence. That is, the association between the fourth correspondence and the third correspondence is: the signaling plane security protection policy of the PC5 interface is determined according to the signaling plane security protection policy of the Uu interface.
  • the following describes how the relay device #1 acquires the second correspondence and/or the fourth correspondence, and the manner in which the remote UE#1 acquires the second correspondence and/or the fourth correspondence
  • the relay device #1 Configure the second correspondence and/or the fourth correspondence in the universal integrated circuit card (UICC) used by the relay device #1, and when the remote UE#1 accesses the network through the relay device #1 , the relay device #1 inserts the UICC into the relay device #1, and the relay device #1 uses the UICC to establish a relay-type PDU session with the network.
  • UICC universal integrated circuit card
  • the second correspondence and/or the fourth correspondence are configured in the remote UE#1 using the UICC, and when the remote UE#1 accesses the network through the relay device #1, the remote UE#1 inserts the UICC into the remote In UE#1, the remote UE#1 uses the UICC to establish a connection with the relay device#1.
  • a user equipment is composed of a mobile equipment (mobile equipment, ME) and a UICC.
  • the mobile device is a hardware device that does not have the ability to access the network except for emergency functions. After being inserted into the UICC, it can register and subsequently interact with the network as a UE.
  • the second correspondence and/or the fourth correspondence may be pre-configured in relay device #1 before the UICC is inserted.
  • the second correspondence and/or the fourth correspondence are pre-configured in a mobile equipment (mobile equipment, ME) of the remote UE#1.
  • the second correspondence and/or the fourth correspondence may be preconfigured in the remote UE#1.
  • Relay device #1 acquires the second correspondence and/or the fourth correspondence from the ProSe application server.
  • the remote UE#1 acquires the second correspondence and/or the fourth correspondence from the ProSe application server.
  • ProSe parameters are RSC parameters. That is, the second correspondence is the correspondence between the RSC parameter and the second policy.
  • the fourth correspondence is the correspondence between the RSC parameter and the fourth policy.
  • the second correspondence and the fourth correspondence may be the contents shown in Table 3.
  • the ProSe parameters are S-NSSAI parameters and/or DNN parameters. That is, the second correspondence is the correspondence between the S-NSSAI and/or the DNN and the second policy.
  • the fourth correspondence is the correspondence between the S-NSSAI and/or the DNN and the fourth policy.
  • the second correspondence and the fourth correspondence may be the contents shown in Table 4.
  • the relay device #1 sends a first request message to the AMF, and/or the remote UE#1 sends a second request message to the AMF.
  • the AMF receives the first request message from the relay device #1, and/or receives the second request message from the remote UE#1.
  • the AMF determines that the relay device #1 has a relay capability, and/or determines that the remote UE#1 supports network access through the relay device.
  • the AMF sends the third request message and/or the fourth request message to the PCF.
  • the PCF receives the third request message and/or the fourth request message from the AMF.
  • the third request message is triggered by the first request message, and is used to request the ProSe parameter corresponding to the relay device #1
  • the fourth request message is triggered by the second request message, and is used to request the ProSe parameter corresponding to the remote UE #1 from the PCF .
  • the PCF determines the ProSe parameter corresponding to the relay device #1, and/or determines the ProSe parameter corresponding to the remote UE#1.
  • the ProSe parameters corresponding to the remote UE#1 are the same as the ProSe parameters corresponding to the relay device #1.
  • the remote UE#1 can access the network through the relay device #1, and the ProSe parameter corresponding to the remote UE#1 and the ProSe parameter corresponding to the relay device #1 are recorded as ProSe parameter #1.
  • the PCF sends the ProSe parameter #1 to the remote UE#1, and/or sends the ProSe parameter #1 to the relay device #1.
  • the remote UE #1 receives the ProSe parameter #1
  • the relay device #1 receives the ProSe parameter #1.
  • the remote UE#1 determines a second policy #1 according to the second correspondence and the ProSe parameter #1. And/or the relay device #1 determines the second policy #1 according to the second correspondence and the ProSe parameter #1.
  • the remote UE#1 may also determine the fourth policy #1 according to the fourth correspondence and the ProSe parameter #1. And/or the relay device #1 may also determine the fourth policy #1 according to the fourth correspondence and the ProSe parameter #1.
  • the signaling plane security of the PC5 connection is established according to the fourth policy #1.
  • the remote UE#1 and the relay device #1 can obtain the second correspondence and the fourth correspondence respectively, and the second correspondence is associated with the first correspondence, and the fourth correspondence is associated with the The third correspondence is associated.
  • the second strategy #1 and the fourth strategy #1 corresponding to the ProSe parameter #1 can be determined, and these strategies can be used to Establish a PC5 connection.
  • the Uu interface security protection policy used by relay device #1 when establishing a relay PDU session is related to establishing a PC5 connection The security protection policy of the PC5 interface used matches.
  • the relay device #1 sends a first request message to the AMF, where the first request message is used to request the ProSe parameter corresponding to the relay device #1.
  • the remote UE#1 sends a second request message to the AMF, where the second request message is used to request the ProSe parameter corresponding to the remote UE#1.
  • the AMF determines that the relay device #1 has a relay capability, and/or determines that the remote UE#1 supports network access through the relay device.
  • the AMF may also determine the relay service provided by the remote UE#1, and/or determine the relay service supported by the relay device #1.
  • the AMF sends the third request message and/or the fourth request message to the PCF.
  • the PCF receives the third request message from the AMF and/or receives the fourth request message.
  • the third request message is triggered by the first request message, and is used to request the ProSe parameter corresponding to the relay device #1
  • the fourth request message is triggered by the second request message, and is used to request the ProSe parameter corresponding to the remote UE #1 from the PCF .
  • the AMF may carry the relay service information supported by the relay device #1 in the third request message, and/or carry the relay service information of the remote UE#1 in the fourth request message.
  • the PCF determines the ProSe parameter corresponding to the relay device #1, and/or determines the ProSe parameter corresponding to the remote UE#1.
  • the PCF may also determine the user plane security protection policy of the PC5 interface of the relay device #1 according to the second correspondence relationship. And/or the PCF may also determine the user plane security protection policy of the PC5 interface of the remote UE#1 according to the second correspondence.
  • the PCF may also determine the signaling plane security protection policy of the PC5 interface of the relay device #1 according to the fourth correspondence. And/or the PCF may also determine the signaling plane security protection policy of the PC5 interface of the remote UE#1 according to the fourth correspondence.
  • the second correspondence and the fourth correspondence may be preconfigured in the PCF.
  • the second correspondence is the correspondence between the ProSe parameter and the second policy, the second policy is the user plane security protection policy of the PC5 interface, and the second policy is used to determine whether to enable the PC5 between the remote UE#1 and the relay device #1 Interface user plane security protection.
  • the fourth correspondence is the correspondence between the ProSe parameter and the fourth policy, the fourth policy is the signaling plane security protection policy of the PC5 interface, and the fourth policy is used to determine whether to enable the connection between the remote UE#1 and the relay device #1 The signaling plane security protection of the PC5 interface.
  • the ProSe parameters corresponding to the remote UE#1 are the same as the ProSe parameters corresponding to the relay device #1.
  • the ProSe parameter corresponding to remote UE#1 and the ProSe parameter corresponding to relay device #1 are recorded as ProSe parameter #1
  • remote UE#1 and The user plane security protection strategy of the PC5 interface of the relay device #1 is recorded as the second strategy #1
  • the signaling plane security protection strategy of the remote UE#1 and the PC5 interface of the relay device #1 is recorded as the fourth strategy #1 .
  • the PCF sends the ProSe parameter #1 and the second policy #1 to the relay device #1 and/or the remote UE #1 through the AMF.
  • the relay device #1 and/or the remote UE #1 receives the ProSe parameter #1 and the second policy #1.
  • the PCF also sends the fourth policy #1 to the relay device #1 and/or the remote UE #1 through the AMF.
  • the relay device #1 and/or the remote UE #1 receives the fourth policy #1.
  • the method further includes: S506, the PCF sends the second correspondence and/or the fourth correspondence to the AMF.
  • the relay device #1 sends a seventh request message to the AMF, where the seventh request message requests establishment of a relay PDU session, and the seventh request message includes the ProSe parameter #1.
  • the AMF receives the seventh request message.
  • the AMF determines, according to the seventh request message, that the relay device #1 can establish a PDU session serving the relay service.
  • the AMF may determine whether the relay device #1 can serve the relay service according to the subscription information of the relay device #1, which is not limited here.
  • the method further includes the following S509-S510.
  • the AMF determines the second policy #1 according to the second correspondence and the ProSe parameter #1, and/or the AMF determines the fourth policy #1 according to the fourth correspondence and the ProSe parameter #1.
  • the AMF sends an eighth request message to the SMF, the eighth request message requests to establish a relay PDU session for the relay device #1, and the eighth request message includes the second policy #1, the fourth policy #1, and the ProSe parameter # 1.
  • the SMF receives the eighth request message.
  • the method also includes the following S511-S514.
  • the AMF sends a seventh request message to the SMF.
  • the seventh request message includes ProSe parameter #1.
  • the SMF receives the seventh request message.
  • the SMF sends a ninth request message to the PCF, where the ninth request message is used to request the security protection policy of the PC5 interface of the relay device #1.
  • the ninth request message includes ProSe parameter #1.
  • the PCF receives the ninth request message.
  • the PCF determines the second policy #1 corresponding to the relay device #1 according to the second correspondence and the ProSe parameter #1, and/or the PCF determines the second policy #1 corresponding to the relay device #1 according to the fourth correspondence and the ProSe parameter #1.
  • the PCF sends the second policy #1 and/or the fourth policy #1 to the SMF.
  • the SMF receives the second policy #1 and/or the fourth policy #1 from the PCF.
  • the SMF determines the user plane security protection policy (referred to as the first policy #1) of the Uu interface corresponding to the relay device #1 according to the second policy #1, wherein the first policy #1 is that the remote UE #1 passes through the relay device
  • the relay device #1 establishes the Uu interface user plane security protection policy used by the relay type PDU session.
  • the SMF determines the signaling plane security protection policy (referred to as the third policy #1) of the Uu interface corresponding to the relay device #1 according to the fourth policy #1, wherein the third policy #1 is that the remote UE #1 passes through
  • the relay device #1 accesses the network, the relay device #1 establishes the Uu interface signaling plane security protection policy used by the relay type PDU session.
  • the second policy #1 indicates to enable the user plane security protection of the PC5 interface
  • the first policy #1 indicates to enable the user plane security protection of the Uu interface.
  • the SMF according to the second policy #1 determines the first policy #1, and the first policy #1 indicates to enable the user plane security protection of the Uu interface, that is, the first policy #1 is that the user plane security protection policy of the Uu interface is REQUIRED.
  • the SMF determines the first policy #1 according to the second policy #1, and the first policy #1 indicates to enable The user plane security protection of the Uu interface, that is, the first policy #1 is that the user plane security protection policy of the Uu interface is REQUIRED.
  • the fourth policy #1 indicates enabling the signaling plane security protection of the PC5 interface
  • the third policy #1 indicates enabling the signaling plane security protection of the Uu interface.
  • the fourth policy #1 indicates to enable the signaling plane security protection of the PC5 interface, that is, the fourth policy #1 is that the signaling plane security protection policy of the PC5 interface is REQUIRED
  • the SMF according to the The fourth policy #1 determines the third policy #1
  • the third policy #1 indicates enabling the signaling plane security protection of the Uu interface, that is, the third policy #1 is that the signaling plane security protection policy of the Uu interface is REQUIRED.
  • the SMF determines the third policy #1 according to the fourth policy #1, and the third policy #1 indicates to enable The signaling plane security protection of the Uu interface, that is, the third policy #1 is that the signaling plane security protection policy of the Uu interface is REQUIRED.
  • the second policy #1 indicates that the user plane security protection of the PC5 interface is not enabled, and the first policy #1 indicates that the user plane security protection of the Uu interface is not enabled.
  • the SMF according to the first The second policy #1 determines the first policy #1, and the first policy #1 indicates that the user plane security protection of the Uu interface is not enabled, that is, the first policy #1 is that the user plane security protection policy of the Uu interface is NOT NEEDED.
  • the SMF determines the first policy #1 according to the second policy #1, and the first policy #1 indicates that no Enable the user plane security protection of the Uu interface, that is, the first policy #1 is that the user plane security protection policy of the Uu interface is NOT NEEDED.
  • the fourth policy #1 indicates that the signaling plane security protection of the PC5 interface is not enabled, and the third policy #1 indicates that the signaling plane security protection of the Uu interface is not enabled.
  • the SMF Determine the third policy #1 according to the fourth policy #1 the third policy #1 indicates that the signaling plane security protection of the Uu interface is not enabled, that is, the third policy #1 is that the signaling plane security protection policy of the Uu interface is NOT NEEDED .
  • the SMF determines the third policy #1 according to the fourth policy #1, and the third policy #1 indicates The signaling plane security protection of the Uu interface is not enabled, that is, the third policy #1 is that the signaling plane security protection policy of the Uu interface is NOT NEEDED.
  • the second policy #1 indicates preference to enable the user plane security protection of the PC5 interface
  • the first policy #1 indicates preference to enable the user plane security protection of the Uu interface.
  • the SMF according to the second Policy #1 determines the first policy #1, and the first policy #1 indicates preference to enable the user plane security protection of the Uu interface, that is, the first policy #1 is that the user plane security protection policy of the Uu interface is PREFERRED.
  • the fourth policy #1 indicates preference to enable the signaling plane security protection of the PC5 interface
  • the third policy #1 indicates preference to enable the signaling plane security protection of the Uu interface.
  • the fourth policy #1 indicates preference to enable the signaling plane security protection of the PC5 interface, that is, the fourth policy #1 is that the signaling plane security protection policy of the PC5 interface is PREFERRED
  • the SMF according to The fourth policy #1 determines the third policy #1
  • the third policy #1 indicates preference to enable the signaling plane security protection of the Uu interface, that is, the third policy #1 is that the signaling plane security protection policy of the Uu interface is PREFERRED.
  • the SMF establishes a relay PDU session for the relay device #1 according to the first policy #1 and/or the third policy #1.
  • the SMF when the SMF needs to establish a relay-type PDU session for the relay device #1, the SMF can determine the The Uu interface security protection policy used to establish the relay-type PDU session for the relay device #1, so that the policy used by the relay device #1 to establish the PC5 connection matches the policy used to establish the relay-type PDU session.
  • FIG. 6 is a communication device provided in an embodiment of the present application, where the communication device includes a transceiver unit 601 and a processing unit 602 .
  • the transceiver unit 601 can be used to implement the receiving and sending functions in the method embodiments. Other functions in the method embodiments may be implemented by the processing unit 602 .
  • the transceiver unit can be realized through the input interface and output interface in the data processing chip, and the sending and receiving in the method embodiment correspond to the output and input in the chip respectively.
  • the transceiver unit 601 can also be divided into a receiving unit and a sending unit.
  • the receiving unit can be used to realize the receiving function in the method embodiment, and the sending unit can be used to realize the sending function in the method embodiment.
  • the receiving unit can be realized through the output interface of the data processing chip, and the sending unit can be realized through the input interface of the data processing chip.
  • the transceiver unit and the processing unit may be implemented by the same chip, which is not limited in this application. It should be understood that the transceiver unit 601 in the embodiment of the present application may also be implemented by a transceiver (including a transmitter and a receiver) or a transceiver-related circuit component, and the processing unit 602 may also be implemented by a processor or a processor-related circuit component (or, Called the processing circuit) implementation.
  • the transceiving unit 601 and the processing unit 602 can support the actions performed by the remote UE#1 or the relay device #1 in the above method example.
  • the transceiver unit 601 can complete the sending of the first request message and the second request message in the above method embodiments, and other processes in the technical solution described herein;
  • the processing unit 602 can complete the establishment of the PC5 connection, and the Other processes in the technical plan.
  • the transceiving unit 601 and the processing unit 602 can support actions performed by the AMF in the foregoing method example.
  • the transceiver unit 601 can complete the sending of the third request message and the fourth request message in the above method embodiments, and other processes in the technical solutions described herein;
  • the processing unit 602 can complete the determination that the relay device #1 has a relay Capabilities, remote UE#1 supports network access through relay equipment, and other processes in the technical solutions described herein.
  • the transceiving unit 601 and the processing unit 602 can support actions performed by the PCF in the foregoing method examples.
  • the transceiver unit 601 can complete the sending of the fifth request message in the above method embodiment, and other processes in the technical solution described herein; other processes in the program.
  • the transceiving unit 601 and the processing unit 602 can support actions performed by the UDM in the above method example.
  • the transceiver unit 601 can complete the sending of the first policy #1 in the above method embodiment, and other processes in the technical solution described herein; the processing unit 602 can complete the first policy #1 according to the determination, and the Other processes in the technical plan.
  • the transceiving unit 601 and the processing unit 602 can support actions performed by the SMF in the foregoing method example.
  • the transceiver unit 601 can complete the sending of the ninth request message in the above method embodiment, and other processes in the technical solution described herein; And other processes in the technical solutions described herein.
  • the embodiment of the present application also provides a communication device, as shown in FIG. 7 , including: a processor 701 , a communication interface 702 , and a memory 703 .
  • the processor 701, the communication interface 702, and the memory 703 can be connected to each other through a bus 707;
  • the bus 707 can be a peripheral component interconnect standard (peripheral component interconnect, PCI) bus or an extended industry standard architecture (extended industry standard architecture, EISA) bus etc.
  • PCI peripheral component interconnect
  • EISA extended industry standard architecture
  • the above bus 707 can be divided into address bus, data bus, control bus and so on. For ease of representation, only one thick line is used in FIG. 7 , but it does not mean that there is only one bus or one type of bus.
  • the processor 701 may be a central processing unit (central processing unit, CPU), a network processor (network processor, NP) or a combination of CPU and NP.
  • the processor may further include hardware chips.
  • the aforementioned hardware chip may be an application-specific integrated circuit (application-specific integrated circuit, ASIC), a programmable logic device (programmable logic device, PLD) or a combination thereof.
  • the aforementioned PLD may be a complex programmable logic device (complex programmable logic device, CPLD), a field-programmable gate array (field-programmable gate array, FPGA), a general array logic (generic array logic, GAL) or any combination thereof.
  • Memory 703 may be volatile memory or nonvolatile memory, or may include both volatile and nonvolatile memory.
  • the non-volatile memory can be read-only memory (read-only memory, ROM), programmable read-only memory (programmable ROM, PROM), erasable programmable read-only memory (erasable PROM, EPROM), electrically programmable Erases programmable read-only memory (electrically EPROM, EEPROM) or flash memory.
  • Volatile memory can be random access memory (RAM), which acts as external cache memory.
  • the processor 701 is used to implement data processing operations of the communication device.
  • the communication interface 702 is used to realize the transceiving operation of the communication device.
  • the processor 701, the communication interface 702 and the memory 703 can support the above method example completed by the remote UE#1 or the relay device #1 action.
  • the communication interface 702 can complete the sending of the first request message and the second request message in the above method embodiments, and other processes in the technical solutions described herein; the processor 701 can complete the establishment of the PC5 connection, and the Other processes in the technical plan.
  • the processor 701, the communication interface 702, and the memory 703 can support actions performed by the AMF in the foregoing method example.
  • the communication interface 702 can complete the sending of the third request message and the fourth request message in the above method embodiments, and other processes in the technical solutions described herein;
  • the processor 701 can complete the determination that the relay device #1 has a relay Capabilities, remote UE#1 supports network access through relay equipment, and other processes in the technical solutions described herein.
  • the processor 701, the communication interface 702, and the memory 703 can support actions performed by the PCF in the foregoing method examples.
  • the communication interface 702 can complete the sending of the fifth request message in the above method embodiment, and other processes in the technical solution described herein; the processor 701 can complete the determination of the second strategy #1, and the technical solution described herein in other processes.
  • the processor 701, the communication interface 702, and the memory 703 can support actions performed by the UDM in the foregoing method examples.
  • the communication interface 702 can complete the sending of the first policy #1 in the above method embodiment, and other processes in the technical solutions described herein;
  • the processor 701 can complete the determination of the first policy #1, and the technical solutions described herein other processes in the program.
  • the processor 701, the communication interface 702, and the memory 703 can support the actions performed by the SMF in the above method example.
  • the communication interface 702 can complete the sending of the ninth request message in the above method embodiment, and other processes in the technical solutions described herein;
  • the processor 701 can complete the determination of the first strategy #1, the third strategy #1, and Other processes in the technical solutions described herein.
  • the technical solution of the embodiment of the present application can be applied to various communication systems, for example: global system of mobile communication (global system of mobile communication, GSM) system, code division multiple access (code division multiple access, CDMA) system, broadband code division multiple access (wideband code division multiple access, WCDMA) system, general packet radio service (general packet radio service, GPRS), long term evolution (long term evolution, LTE) system, LTE frequency division duplex (frequency division duplex, FDD) system, LTE Time division duplex (time division duplex, TDD), universal mobile telecommunications system (universal mobile telecommunications system, UMTS), global interconnection microwave access (worldwide interoperability for microwave access, WiMAX) communication system, the future fifth generation (5th generation, 5G) system or new radio (new radio, NR), etc.
  • GSM global system of mobile communication
  • CDMA code division multiple access
  • WCDMA wideband code division multiple access
  • general packet radio service general packet radio service
  • GPRS general packet radio service
  • long term evolution long term
  • the disclosed systems, devices and methods may be implemented in other ways.
  • the device embodiments described above are only illustrative.
  • the division of the units is only a logical function division. In actual implementation, there may be other division methods.
  • multiple units or components can be combined or May be integrated into another system, or some features may be ignored, or not implemented.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be through some interfaces, and the indirect coupling or communication connection of devices or units may be in electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and the components shown as units may or may not be physical units, that is, they may be located in one place, or may be distributed to multiple network units. Part or all of the units can be selected according to actual needs to achieve the purpose of the solution of this embodiment.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, each unit may exist separately physically, or two or more units may be integrated into one unit.
  • the functions described above are realized in the form of software function units and sold or used as independent products, they can be stored in a computer-readable storage medium.
  • the technical solution of the present application is essentially or the part that contributes to the prior art or the part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium, including Several instructions are used to make a computer device (which may be a personal computer, a server, or a network device, etc.) execute all or part of the steps of the methods described in the various embodiments of the present application.
  • the aforementioned storage medium includes: U disk, mobile hard disk, read-only memory (read-only memory, ROM), random access memory (random access memory, RAM), magnetic disk or optical disc and other media that can store program codes. .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

La présente demande concerne un procédé et un appareil de communication. Le procédé comprend les étapes suivantes : un premier élément de réseau acquiert une première politique, la première politique étant une politique de protection de sécurité de plan d'utilisateur d'une interface Uu qui est utilisée par un premier dispositif de relais afin d'établir une session d'unité de données de protocole (PDU) de type relais lorsqu'un premier dispositif terminal accède à un réseau au moyen du premier dispositif de relais ; le premier élément de réseau détermine une seconde politique selon la première politique, la seconde politique étant utilisée pour déterminer s'il faut activer une protection de sécurité de plan d'utilisateur pour une interface PC5 entre le premier dispositif terminal et le premier dispositif de relais ; et le premier élément de réseau envoie la seconde politique au premier dispositif terminal et/ou au premier dispositif de relais. Selon la solution de la présente demande, un premier élément de réseau acquiert une politique de protection de sécurité de plan d'utilisateur d'une interface Uu, de façon à déterminer une politique de protection de sécurité de plan d'utilisateur pour une interface PC5, de sorte que la politique de protection de sécurité de plan d'utilisateur de l'interface Uu corresponde à celle de l'interface PC5, ce qui permet de résoudre les problèmes de passage à une version antérieure de protection de sécurité, de gaspillage de ressources, etc. provoqués par des politiques de non-concordance.
PCT/CN2022/109421 2021-08-04 2022-08-01 Procédé et appareil de communication WO2023011407A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202110889754.7A CN115706998A (zh) 2021-08-04 2021-08-04 通信方法和装置
CN202110889754.7 2021-08-04

Publications (1)

Publication Number Publication Date
WO2023011407A1 true WO2023011407A1 (fr) 2023-02-09

Family

ID=85154365

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/109421 WO2023011407A1 (fr) 2021-08-04 2022-08-01 Procédé et appareil de communication

Country Status (2)

Country Link
CN (1) CN115706998A (fr)
WO (1) WO2023011407A1 (fr)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110912854A (zh) * 2018-09-15 2020-03-24 华为技术有限公司 一种安全保护方法、设备及系统
CN112351431A (zh) * 2019-08-09 2021-02-09 华为技术有限公司 一种安全保护方式确定方法及装置
US20210204306A1 (en) * 2016-01-15 2021-07-01 Yulong Computer Telecommunication Scientific (Shenzhen) Co., Ltd. Resource allocation method and road side unit

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20210204306A1 (en) * 2016-01-15 2021-07-01 Yulong Computer Telecommunication Scientific (Shenzhen) Co., Ltd. Resource allocation method and road side unit
CN110912854A (zh) * 2018-09-15 2020-03-24 华为技术有限公司 一种安全保护方法、设备及系统
CN112351431A (zh) * 2019-08-09 2021-02-09 华为技术有限公司 一种安全保护方式确定方法及装置

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
LG ELECTRONICS: "Solution for handling security policy misalignment over ProSe L3 UE2NW relay", 3GPP DRAFT; S3-202380, vol. SA WG3, 1 October 2020 (2020-10-01), pages 1 - 3, XP051937095 *

Also Published As

Publication number Publication date
CN115706998A (zh) 2023-02-17

Similar Documents

Publication Publication Date Title
US20230093339A1 (en) Session Management Method, Apparatus, and System
EP3691206B1 (fr) Procédé et dispositif de mise à jour de politique
US20220330361A1 (en) Method for establishing connection and obtaining relay service code and communications apparatus
WO2019153766A1 (fr) Procédé de communication sans fil, dispositif de réseau et dispositif terminal
WO2019062499A1 (fr) Procédé de détermination de politique et dispositif de communication
JP7095942B2 (ja) 通信方法、通信装置、及び通信システム
WO2020056611A1 (fr) Procédé et dispositif utilisés dans l'authentification d'une tranche de réseau
US11483898B2 (en) Session management method and session management network element
WO2019062496A1 (fr) Dispositif et procédé d'analyse de données
US20220124500A1 (en) Communication method, terminal device and network device
CN111801961A (zh) 一种确定ssc模式的方法及装置
WO2020087308A1 (fr) Procédé de traitement de service, dispositif et support de stockage associés
EP3499922B1 (fr) Procédé, dispositif et support de stockage lisible par ordinateur pour appliquer la qos sur la base de mappage de données de plan d'utilisateur
CN112154678B (zh) 无线通信的方法和设备
WO2023020297A1 (fr) Procédé et appareil de sélection de relais
WO2019028794A1 (fr) Procédé et dispositif de détermination de chemin de service
WO2020019910A1 (fr) Procédé de communication pour véhicule à tout, dispositif terminal et dispositif de réseau
US20190082347A1 (en) Service data flow sending method and apparatus
WO2023011407A1 (fr) Procédé et appareil de communication
TW202007199A (zh) 一種核心網選擇方法及裝置、終端設備、網路設備
KR20240060670A (ko) 통신 방법 및 장치
WO2020103050A1 (fr) Procédé et appareil d'établissement de canal de données et dispositif de réseau
KR20210127071A (ko) 베어러 구성 방법 및 장치, 네트워크 기기
CN113543157B (zh) 网络资源控制的方法及设备
WO2022021371A1 (fr) Procédé d'établissement de session, dispositif électronique et support de stockage

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22852119

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE