WO2023070509A1 - 信息处理方法及装置、通信设备及存储介质 - Google Patents

信息处理方法及装置、通信设备及存储介质 Download PDF

Info

Publication number
WO2023070509A1
WO2023070509A1 PCT/CN2021/127350 CN2021127350W WO2023070509A1 WO 2023070509 A1 WO2023070509 A1 WO 2023070509A1 CN 2021127350 W CN2021127350 W CN 2021127350W WO 2023070509 A1 WO2023070509 A1 WO 2023070509A1
Authority
WO
WIPO (PCT)
Prior art keywords
security policy
default
specific
security
prose service
Prior art date
Application number
PCT/CN2021/127350
Other languages
English (en)
French (fr)
Inventor
洪伟
Original Assignee
北京小米移动软件有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京小米移动软件有限公司 filed Critical 北京小米移动软件有限公司
Priority to CN202180003631.7A priority Critical patent/CN116368834A/zh
Priority to PCT/CN2021/127350 priority patent/WO2023070509A1/zh
Publication of WO2023070509A1 publication Critical patent/WO2023070509A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • H04W12/37Managing security policies for mobile devices or for controlling mobile applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/50Secure pairing of devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/14Direct-mode setup
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity
    • H04W12/106Packet or message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W92/00Interfaces specially adapted for wireless communication networks
    • H04W92/16Interfaces between hierarchically similar devices
    • H04W92/18Interfaces between hierarchically similar devices between terminal devices

Definitions

  • the present disclosure relates to the technical field of wireless communication but is not limited to the technical field of wireless communication, and in particular relates to an information processing method and device, a communication device, and a storage medium.
  • PC5 security policy provided by PCF or ProSe application server to ProSe UE.
  • These security policies include On the list of ProSe businesses requiring security. Among them, each ProSe service is assigned its corresponding PC5 security policy.
  • the PC5 security policy configuration for 5G ProSe services can reuse the PC5 security policy configuration mechanism for eV2X services defined in 3GPP TS 33.536.
  • the negotiation and implementation of the PC5 security policy can also reuse the process defined in 3GPP TS 33.536, where the PC5 security policy needs to be carried in the relevant process messages.
  • Embodiments of the present disclosure provide an information processing method and device, a communication device, and a storage medium.
  • the first aspect of the embodiments of the present disclosure provides an information processing method, which is executed by a first user equipment UE, and the method includes:
  • Obtaining a default PC5 security policy wherein the default PC5 security policy is used to protect the PC5 connection of the target ProSe service when the specific PC5 security policy of the target ProSe service based on proximity communication service is not obtained.
  • the second aspect of the embodiments of the present disclosure provides an information processing method, wherein, executed by the PCF, the method includes:
  • a third aspect of an embodiment of the present disclosure provides an information processing device, wherein the device includes:
  • the obtaining module is configured to obtain a default PC5 security policy, wherein the default PC5 security policy is used to protect the target ProSe when the specific PC5 security policy of the target ProSe service based on proximity communication service is not obtained.
  • Business PC5 connection is configured to obtain a default PC5 security policy, wherein the default PC5 security policy is used to protect the target ProSe when the specific PC5 security policy of the target ProSe service based on proximity communication service is not obtained.
  • an information processing device includes:
  • the first configuration module is configured to configure a default PC5 security policy, wherein the default PC5 security policy is used to protect the PC5 connection of the target ProSe service.
  • the fifth aspect of the embodiments of the present disclosure provides a communication device, including a processor, a transceiver, a memory, and an executable program stored on the memory and capable of being run by the processor, wherein the processor runs the executable
  • the program executes the information processing method provided in the aforementioned first or second aspect.
  • the sixth aspect of the embodiments of the present disclosure provides a computer storage medium, the computer storage medium stores an executable program; after the executable program is executed by a processor, it can realize the information provided by the aforementioned first aspect or the second aspect Approach.
  • the default PC5 security policy when performing PC5 communication based on the PC5 interface, when the specific PC5 security policy of the target ProSe service is not obtained, the default PC5 security policy can be used to determine the communication between the two UEs.
  • PC5 connection protection so that when the specific PC5 security policy of the target ProSe service is not obtained, the PC5 connection security can be successfully established based on the default PC5 security policy, and the PC5 communication of the target ProSe service can be protected.
  • Fig. 1 is a schematic structural diagram of a wireless communication system according to an exemplary embodiment
  • Fig. 2 is a schematic flowchart of an information processing method according to an exemplary embodiment
  • Fig. 3 is a schematic flowchart of an information processing method according to an exemplary embodiment
  • Fig. 4 is a schematic flowchart of an information processing method according to an exemplary embodiment
  • Fig. 5 is a schematic flowchart of an information processing method according to an exemplary embodiment
  • Fig. 6 is a schematic structural diagram of an information processing device according to an exemplary embodiment
  • Fig. 7 is a schematic structural diagram of an information processing device according to an exemplary embodiment
  • Fig. 8 is a schematic structural diagram of a UE according to an exemplary embodiment
  • Fig. 9 is a schematic structural diagram of a communication device according to an exemplary embodiment.
  • first, second, third, etc. may use the terms first, second, third, etc. to describe various information, the information should not be limited to these terms. These terms are only used to distinguish information of the same type from one another. For example, without departing from the scope of the embodiments of the present disclosure, first information may also be called second information, and similarly, second information may also be called first information. Depending on the context, the word “if” as used herein may be interpreted as “at” or "when” or "in response to a determination.”
  • FIG. 1 shows a schematic structural diagram of a wireless communication system provided by an embodiment of the present disclosure.
  • the wireless communication system is a communication system based on cellular mobile communication technology, and the wireless communication system may include: several UEs 11 and several access devices 12 .
  • UE11 may be a device that provides voice and/or data connectivity to a user.
  • UE11 can communicate with one or more core networks via a radio access network (Radio Access Network, RAN), and UE11 can be an Internet of Things UE, such as a sensor device, a mobile phone (or called a "cellular" phone) and a device with an Internet of Things
  • RAN Radio Access Network
  • UE11 can be an Internet of Things UE, such as a sensor device, a mobile phone (or called a "cellular" phone) and a device with an Internet of Things
  • the UE's computer for example, may be a fixed, portable, pocket, hand-held, built-in or vehicle-mounted device.
  • UE11 may also be a device of an unmanned aerial vehicle.
  • UE11 may also be a vehicle-mounted device, for example, it may be a trip computer with a wireless communication function, or a wireless communication device connected externally to the trip computer.
  • the UE11 may also be a roadside device, for example, it may be a street lamp, a signal lamp, or other roadside devices with a wireless communication function.
  • the access device 12 may be a network side device in a wireless communication system.
  • the wireless communication system may be a fourth generation mobile communication technology (the 4th generation mobile communication, 4G) system, also known as a Long Term Evolution (LTE) system; or, the wireless communication system may also be a 5G system, Also known as new radio (NR) system or 5G NR system.
  • the wireless communication system may also be a next-generation system of the 5G system.
  • the access network in the 5G system can be called NG-RAN (New Generation-Radio Access Network, New Generation Radio Access Network).
  • the MTC system the MTC system.
  • the access device 12 may be an evolved access device (eNB) adopted in a 4G system.
  • the access device 12 may also be an access device (gNB) adopting a centralized and distributed architecture in the 5G system.
  • eNB evolved access device
  • gNB access device
  • the access device 12 adopts a centralized distributed architecture it usually includes a centralized unit (central unit, CU) and at least two distributed units (distributed unit, DU).
  • the centralized unit is provided with a packet data convergence protocol (Packet Data Convergence Protocol, PDCP) layer, radio link layer control protocol (Radio Link Control, RLC) layer, media access control (Media Access Control, MAC) layer protocol stack;
  • PDCP Packet Data Convergence Protocol
  • RLC Radio Link Control
  • MAC media access control
  • a physical (Physical, PHY) layer protocol stack is set in the unit, and the embodiment of the present disclosure does not limit the specific implementation manner of the access device 12 .
  • a wireless connection may be established between the access device 12 and the UE 11 through a wireless air interface.
  • the wireless air interface is a wireless air interface based on the fourth-generation mobile communication network technology (4G) standard; or, the wireless air interface is a wireless air interface based on the fifth-generation mobile communication network technology (5G) standard, such as
  • the wireless air interface is a new air interface; alternatively, the wireless air interface may also be a wireless air interface based on a technical standard of a next-generation mobile communication network based on 5G.
  • an E2E (End to End, end-to-end) connection can also be established between UE11.
  • V2V vehicle to vehicle, vehicle-to-vehicle
  • V2I vehicle to Infrastructure, vehicle-to-roadside equipment
  • V2P vehicle to pedestrian, vehicle-to-person communication in vehicle to everything (V2X) communication Wait for the scene.
  • the above wireless communication system may further include a network management device 13 .
  • the network management device 13 may be a core network device in the wireless communication system, for example, the network management device 13 may be a mobility management entity (Mobility Management Entity, MME).
  • MME Mobility Management Entity
  • the network management device can also be other core network devices, such as Serving GateWay (SGW), Public Data Network Gateway (Public Data Network GateWay, PGW), policy and charging rule functional unit (Policy and Charging Rules Function, PCRF) or Home Subscriber Server (Home Subscriber Server, HSS), etc.
  • SGW Serving GateWay
  • PGW Public Data Network Gateway
  • PCRF Policy and Charging Rules Function
  • HSS Home Subscriber Server
  • an embodiment of the present disclosure provides an information processing method, which is executed by a first user equipment UE, and the method includes:
  • S110 Obtain a default PC5 security policy, wherein the default PC5 security policy is used to protect the PC5 connection of the target ProSe service when the specific PC5 security policy of the target proximity-based communication service ProSe service is not obtained .
  • the information processing method provided in the embodiments of the present disclosure may be applied to a UE, and the UE may be a first UE, and the UE communicating with PC5 that communicates with the first UE is a second UE.
  • the first UE may be a UE that needs to perform PC5 connection with the second UE and perform PC5 communication based on the PC5 connection.
  • the second UE may be any UE different from the first UE.
  • the first UE may be the initiator or receiver of PC5 communication.
  • the default PC5 security policy here is a kind of PC5 security policy, which is used to provide security guarantee for PC5 connection by using the default PC5 security policy when no specific PC5 security policy specific to the target ProSe service is obtained.
  • the default PC5 security policy may be a security policy configured by a communication operator, which may be oriented to all ProSe services of the communication network.
  • the default PC5 security policy may indicate at least one of the following:
  • PC5 communication signaling and/or data based on PC5 connection need to be encrypted and/or integrity protected, that is, communication signaling and/or data integrity protection and/or need to be performed during PC5 communication based on PC5 connection encryption;
  • PC5-based PC5 communication signaling and/or data may or may not be encrypted and/or may or may not be integrity protected
  • PC5 communication signaling and/or data based on PC5 connection do not need to be encrypted and/or integrity protected, that is, communication signaling and/or data integrity protection and/or integrity protection are not required during PC5 communication based on PC5 connection or encrypted.
  • the default PC5 security policy can be configured with different security protection requirements for different types of ProSe services; and/or according to different PC5 communication environments, and/or different PC5 communication UEs, configured with different PC5 security protection requirements.
  • the PC5 security protection requirements suitable for the current communication situation can be selected according to different ProSe services, communication environments and/or communication UEs to perform secure PC5 communication.
  • the default PC5 security policy may be a public PC5 security policy, that is, a PC5 policy supported by various ProSe services. And the specific PC5 security policy is only for its designated ProSe business.
  • the UE when the UE does not obtain the specific PC5 security policy for the target ProSe service, it can still protect the PC5 connection establishment based on the default PC5 security policy and perform PC5 communication based on the PC5 connection, reducing the The PC5 connection cannot be established and the PC5 communication cannot be realized due to the failure to obtain the specific PC5 security policy for the target ProSe service.
  • an information processing method provided by an embodiment of the present disclosure may include:
  • the specific PC5 security policy of the target ProSe service shall prevail to protect the PC5 connection established by the target ProSe.
  • the specific PC5 security policy is used preferentially.
  • the specific PC5 security policy may be specially formulated for the target ProSe by the service provider or communication operator of the target ProSe service, so the specific PC5 security policy of the target ProSe service is specially formulated for the security requirements of the target ProSe service, so that it has business Particularity, priority is given to providing PC5 connection security protection according to the specific PC5 security policy of the target ProSe service, which can meet the specific security requirements of the target ProSe service.
  • the method includes:
  • S100 Receive the specific PC5 security policy of the target ProSe service from the policy control function PCF; or receive the specific PC5 security policy of the target ProSe service from the ProSe application server.
  • the UE Before performing PC5 communication (or direct connection communication, or sidelink (SL) communication) of the target ProSe service, the UE may first request the specific PC5 security policy from the PCF or the ProSe application server of the target ProSe.
  • PC5 communication or direct connection communication, or sidelink (SL) communication
  • SL sidelink
  • the UE may inquire whether the specific PC5 security policy of the target ProSe service is stored locally, if the UE locally stores the specific PC5 security policy, and determines that it is the latest version of the specific PC5 security policy, Then there is no need to make another request to the PCF or ProSe application server.
  • the specific PC5 security policy of the UE receiving the target ProSe service from the PCF and/or the ProSe application server may include:
  • the response message includes at least one of the following:
  • the UE When the UE does not request the specific PC5 security policy of the target ProSe service from the PCF or ProSe application server, or when the response message indicates that the field carrying the specific PC5 security policy is empty, it can be considered that the corresponding specific PC5 security policy has not been obtained, then At this time, the security protection of the PC5 connection of the target ProSe service is performed according to the default PC5 security policy.
  • the above is only a way to obtain a specific PC5 security policy from the PCF or ProSe application server.
  • the relevant information of the PC5 security policy is sent to the UE. If the UE does not find the relevant information of the specific PC5 security policy in the response message requesting ProSe communication, it can be considered that the specific PC5 security policy of the target ProSe service has not been obtained.
  • the specific PC5 security policies are different for different ProSe services.
  • the specific PC5 security policies of different ProSe services have different policy content and/or policy identifiers, so as to meet the security requirements of different ProSe services.
  • the specific PC5 security policy of the target ProSe service is determined according to the security requirements of the target ProSe service.
  • the default PC5 security policy may be pre-configured in the first UE
  • the default PC5 security policy is received from the PCF.
  • the default PC5 security policy may be specified in the communication standard, and pre-written into the UE based on the communication standard. In this way, any UE knows the default PC5 security policy in advance, so that when the specific PC5 security policy of the target ProSe service is not obtained, the communication of the target ProSe service can be performed based on the default PC5 security policy.
  • the method also includes:
  • the default PC5 security policy or the specific PC5 security policy negotiate with the second UE the security parameters of the PC5 connection protecting the target ProSe service.
  • the security parameters include but are not limited to at least one of the following:
  • the first parameter indicating whether the PC5 signaling is encrypted
  • the second parameter indicating whether the PC5 data is encrypted
  • the third parameter indicating whether PC5 signaling needs integrity protection
  • the fourth parameter indicating whether the PC5 data needs integrity protection
  • a fifth parameter indicating the encryption and integrity protection algorithm (the same algorithm).
  • the first UE first negotiates security parameters before establishing PC5 communication with the second UE.
  • security parameters are negotiated according to a default PC5 security policy or a specific PC5 security policy.
  • the security parameters for protecting the PC5 connection of the target ProSe service will be negotiated with the second UE according to the specific PC5 security policy; When using a security policy, it will negotiate with the second UE the security parameters of the PC5 connection protecting the target ProSe service according to the default PC5 security policy.
  • the default PC5 security policy includes:
  • the default PC5 security policy is the default security protection requirement for any ProSe service
  • the PC5 connection protection can be performed for any ProSe service according to the default PC5 security policy.
  • the specific PC5 security policy has a higher priority than the default PC5 security policy.
  • the default PC5 security policy is equivalent to the backup security policy of the specific PC5 security policy of each ProSe service.
  • the specific PC5 security policy is not configured or is not obtained due to an exception, the PC5 connection of the target ProSe service can be performed based on the default PC5 security policy. security protection.
  • an embodiment of the present disclosure provides an information processing method, which is executed by a PCF, and the method includes:
  • S210 Configure a default PC5 security policy, wherein the default PC5 security policy is used to protect the PC5 connection of the target ProSe service when the specific PC5 security policy of the target proximity-based service ProSe service is not obtained.
  • the PCF can store a default PC5 security policy, and the default PC5 security policy can be configured to the PCF by the network management device.
  • the S210 may include at least one of the following:
  • the default PC5 security policy is updated irregularly, which may include: updating the default PC5 security policy when a new ProSe service or a new type of ProSe service is introduced.
  • the method also includes:
  • the PCF If the PCF is configured with the default PC5 security policy, it will proactively push or send the PC5 security policy to the UE based on the request of the UE, so that the UE stores the default PC5 security policy.
  • the method also includes:
  • the PCF can also configure a specific PC5 security policy for the target ProSe service according to the instructions of the ProSe application server.
  • the PCF can also send the specific PC5 security policy to the UE for protecting the PC5 connection of the target ProSe service when the UE communicates with the target ProSe service.
  • the specific PC5 security policy has a higher priority than the default PC5 security policy.
  • the default PC5 security policy includes:
  • the default PC5 security policy contains the default security protection requirements for any ProSe service, so that when the specific PC5 security policy of any ProSe service is not obtained, the protection of the PC5 connection of the corresponding ProSe service can be provided based on the default PC5 security policy .
  • PC5 communication can be ensured by the PC5 security policies provided by the PCF or ProSe application server to the ProSeUE, and these PC5 security policies are included in the list of ProSe services requiring security protection. Wherein, each ProSe service can be assigned its corresponding PC5 security policy.
  • the PC5 security policy configuration of the ProSe service can use the PC5 security policy configuration mechanism of the eV2X service.
  • the negotiation and implementation of the PC5 security policy can also use the process defined in related technologies, where the PC5 security policy can be carried in the relevant process message.
  • ProSe service providers may not assign corresponding security policies to the specific ProSe services they provide, which will result in the absence of the UE's PC5 security policy. If a ProSe terminal does not configure the PC5 security policy when establishing direct communication for a specific 5G ProSe service, it cannot negotiate and implement the PC5 security policy with the peer terminal, and thus cannot establish direct communication between terminals.
  • 5G ProSe services may be very diverse and offered by various ProSe service providers, some of which may not be able to effectively assign PC5 security policies to the specific services they provide.
  • a specific PC5 security policy is bound to a specific ProSe service.
  • the default PC5 security policy has no special binding relationship with any specific ProSe service. This security policy is used when the ProSe service provider does not provide a PC5 security policy for a specific ProSe service.
  • the configuration of a specific PC5 security policy is based on the actual security requirements of a specific ProSe service. According to a specific PC5 security policy, there can be "REQUIRED”, optional “PREFERRED”, and “NOT NEEDED” options for encryption and integrity protection. .
  • the configuration of the default PC5 security policy is not based on the actual security requirements of the specific ProSe service, but can be determined by the operator supporting the ProSe service.
  • the default PC5 security policy can also provide "REQUIRED”, “PREFERRED”, and “NOT NEEDED” options for encryption and integrity protection respectively.
  • the PCF or ProSe application server can provide specific PC5 security policies for the terminal. Policy delivery is protected by the non-access stratum (NAS). If the ProSe service provider does not provide this type of PC5 security policy, then this specific PC5 security policy may not be provided for the UE.
  • NAS non-access stratum
  • the default PC5 security policy can be pre-configured on the UE, or delivered to the terminal by the PCF. Delivery is protected by NAS security. This type of PC5 security policy can be configured by the operator and provided to the UE by the PCF.
  • ProSe UE may be configured with different types of PC5 security policies before establishing PC5 connections with other UEs.
  • the UE needs to determine the security policy used for direct communication with the peer UE according to the priorities of different PC5 security policy types.
  • the priority of a specific PC5 security policy is higher than that of the default PC5 security policy.
  • the UE uses the default PC5 security policy when establishing a PC5 connection.
  • an embodiment of the present disclosure provides an information processing device, wherein the device includes:
  • the obtaining module 110 is configured to obtain a default PC5 security policy, wherein the default PC5 security policy is used to protect the target when the specific PC5 security policy of the target ProSe service based on the proximity communication service is not obtained PC5 connection for ProSe services.
  • the information processing device may be included in the first UE.
  • the acquiring module 110 includes, but is not limited to, a program module; after the program module is executed by the processor, the functions of the above-mentioned modules can be realized.
  • the acquisition module 110 can be a combination of hardware and software; the combination of hardware and software includes, but is not limited to, a programmable array; the programmable array includes, but is not limited to: a field programmable array and/or a complex programmable array.
  • the acquisition module 110 may be a pure hardware module; the pure hardware module includes but is not limited to an application specific integrated circuit.
  • the device also includes:
  • the protection module is configured to protect the PC5 connection based on the target ProSe service according to the specific PC5 security policy when the specific PC5 security policy of the target ProSe service is obtained.
  • the device includes:
  • the receiving module is configured to receive the specific PC5 security policy of the target ProSe service from the policy control function PCF; or receive the specific PC5 security policy of the target ProSe service from the ProSe application server.
  • the specific PC5 security policies are different for different ProSe services.
  • the specific PC5 security policy of the target ProSe service is determined according to the security requirements of the target ProSe service.
  • the default PC5 security policy is preconfigured in the first UE
  • the default PC5 security policy is received from the PCF.
  • the device also includes:
  • the negotiation module is configured to negotiate with the second UE the security parameters of the PC5 connection protecting the target ProSe service according to the default PC5 security policy or the specific PC5 security policy.
  • the default PC5 security policy includes:
  • the specific PC5 security policy has a higher priority than the default PC5 security policy.
  • an embodiment of the present disclosure provides an information processing device, wherein the device includes:
  • the first configuration module 210 is configured to configure a default PC5 security policy, wherein the default PC5 security policy is used to protect the PC5 connection of the target ProSe service.
  • the information processing device may be included in a PCF.
  • the first configuration module 210 includes, but is not limited to, a program module; after the program module is executed by the processor, the functions of the above-mentioned modules can be realized.
  • the first configuration module 210 may be a combination of hardware and software; the combination of hardware and software includes, but is not limited to, a programmable array; the programmable array includes, but is not limited to: a field programmable array and/or or complex programmable arrays.
  • the first configuration module 210 may be a pure hardware module; the pure hardware module includes but is not limited to an application specific integrated circuit.
  • the device also includes:
  • the second sending module is configured to send the default PC5 security policy to the UE.
  • the device also includes:
  • the second configuration module is configured to configure the specific PC5 security policy for the target ProSe service.
  • the specific PC5 security policy has a higher priority than the default PC5 security policy.
  • the default PC5 security policy includes:
  • An embodiment of the present disclosure provides a communication device, including:
  • memory for storing processor-executable instructions
  • the processor is configured to execute the information processing method provided by any of the aforementioned technical solutions.
  • the processor may include various types of storage media, which are non-transitory computer storage media, and can continue to memorize and store information thereon after the communication device is powered off.
  • the communication device includes: a UE or a core network device.
  • the core network equipment including cables is not limited to PCF.
  • the processor may be connected to the memory through a bus, etc., for reading the executable program stored on the memory, for example, at least one of the methods shown in FIG. 2 to FIG. 5 .
  • Fig. 8 is a block diagram of a UE 800 according to an exemplary embodiment.
  • UE 800 may be a mobile phone, computer, digital broadcast user equipment, messaging device, game console, tablet device, medical device, fitness device, personal digital assistant, and the like.
  • UE 800 may include one or more of the following components: processing component 802, memory 804, power supply component 806, multimedia component 808, audio component 810, input/output (I/O) interface 812, sensor component 814, and communication Component 816.
  • Processing component 802 generally controls the overall operations of UE 800, such as those associated with display, phone calls, data communications, camera operations, and recording operations.
  • the processing component 802 may include one or more processors 820 to execute instructions to complete all or part of the steps of the above method.
  • processing component 802 may include one or more modules that facilitate interaction between processing component 802 and other components.
  • processing component 802 may include a multimedia module to facilitate interaction between multimedia component 808 and processing component 802 .
  • the memory 804 is configured to store various types of data to support operations at the UE 800 . Examples of such data include instructions for any application or method operating on UE 800, contact data, phonebook data, messages, pictures, videos, etc.
  • the memory 804 may be implemented by any type of volatile or non-volatile storage device or a combination thereof, such as static random access memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable Programmable Read Only Memory (EPROM), Programmable Read Only Memory (PROM), Read Only Memory (ROM), Magnetic Memory, Flash Memory, Magnetic or Optical Disk.
  • SRAM static random access memory
  • EEPROM electrically erasable programmable read-only memory
  • EPROM erasable Programmable Read Only Memory
  • PROM Programmable Read Only Memory
  • ROM Read Only Memory
  • Magnetic Memory Flash Memory
  • Magnetic or Optical Disk Magnetic Disk
  • the power supply component 806 provides power to various components of the UE 800 .
  • Power components 806 may include a power management system, one or more power supplies, and other components associated with generating, managing, and distributing power for UE 800 .
  • the multimedia component 808 includes a screen providing an output interface between the UE 800 and the user.
  • the screen may include a liquid crystal display (LCD) and a touch panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive input signals from a user.
  • the touch panel includes one or more touch sensors to sense touches, swipes, and gestures on the touch panel. The touch sensor may not only sense a boundary of a touch or swipe action, but also detect duration and pressure associated with the touch or swipe action.
  • the multimedia component 808 includes a front camera and/or a rear camera. When the UE800 is in an operation mode, such as a shooting mode or a video mode, the front camera and/or the rear camera can receive external multimedia data. Each front camera and rear camera can be a fixed optical lens system or have focal length and optical zoom capability.
  • the audio component 810 is configured to output and/or input audio signals.
  • the audio component 810 includes a microphone (MIC), which is configured to receive an external audio signal when the UE 800 is in an operation mode, such as a call mode, a recording mode, and a voice recognition mode. Received audio signals may be further stored in memory 804 or sent via communication component 816 .
  • the audio component 810 also includes a speaker for outputting audio signals.
  • the I/O interface 812 provides an interface between the processing component 802 and a peripheral interface module, which may be a keyboard, a click wheel, a button, and the like. These buttons may include, but are not limited to: a home button, volume buttons, start button, and lock button.
  • Sensor component 814 includes one or more sensors for providing various aspects of status assessment for UE 800 .
  • the sensor component 814 can detect the open/closed state of the device 800, the relative positioning of components, such as the display and the keypad of the UE800, the sensor component 814 can also detect the position change of the UE800 or a component of the UE800, the user and Presence or absence of UE800 contact, UE800 orientation or acceleration/deceleration and temperature change of UE800.
  • Sensor assembly 814 may include a proximity sensor configured to detect the presence of nearby objects in the absence of any physical contact.
  • Sensor assembly 814 may also include an optical sensor, such as a CMOS or CCD image sensor, for use in imaging applications.
  • the sensor component 814 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor or a temperature sensor.
  • Communication component 816 is configured to facilitate wired or wireless communications between UE 800 and other devices.
  • the UE800 can access wireless networks based on communication standards, such as WiFi, 2G or 3G, or a combination thereof.
  • the communication component 816 receives broadcast signals or broadcast related information from an external broadcast management system via a broadcast channel.
  • the communication component 816 also includes a near field communication (NFC) module to facilitate short-range communication.
  • NFC near field communication
  • the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, Infrared Data Association (IrDA) technology, Ultra Wide Band (UWB) technology, Bluetooth (BT) technology, and other technologies.
  • RFID Radio Frequency Identification
  • IrDA Infrared Data Association
  • UWB Ultra Wide Band
  • Bluetooth Bluetooth
  • UE 800 may be powered by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gates Arrays (FPGAs), controllers, microcontrollers, microprocessors or other electronic implementations for performing the methods described above.
  • ASICs Application Specific Integrated Circuits
  • DSPs Digital Signal Processors
  • DSPDs Digital Signal Processing Devices
  • PLDs Programmable Logic Devices
  • FPGAs Field Programmable Gates Arrays
  • controllers microcontrollers, microprocessors or other electronic implementations for performing the methods described above.
  • non-transitory computer-readable storage medium including instructions, such as the memory 804 including instructions, which can be executed by the processor 820 of the UE 800 to complete the above method.
  • the non-transitory computer readable storage medium may be ROM, random access memory (RAM), CD-ROM, magnetic tape, floppy disk, optical data storage device, and the like.
  • an embodiment of the present disclosure shows a structure of an access device.
  • the communication device 900 may be provided as a network side device.
  • the communication device may be the aforementioned core network device.
  • the core network equipment includes but not limited to PCF.
  • communication device 900 includes processing component 922 , which further includes one or more processors, and a memory resource represented by memory 932 for storing instructions executable by processing component 922 , such as application programs.
  • the application program stored in memory 932 may include one or more modules each corresponding to a set of instructions.
  • the processing component 922 is configured to execute instructions to execute any of the aforementioned methods applied to the access device, for example, the methods shown in FIG. 2 to FIG. 5 .
  • the communication device 900 may also include: a power supply component 926 configured to perform power management of the communication device 900; a wired or wireless network interface 950 configured to connect the communication device 900 to a network; and an input/output (I/O ) interface 958.
  • the communication device 900 may operate an operating system stored in the memory 932, such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM or the like.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本公开实施例提供一种信息处理方法及装置、通信设备及存储介质。被第一用户设备UE执行的信息处理方法包括:获取缺省PC5安全策略,其中,所述缺省PC5安全策略,用于在未获取到目标基于邻近通信服务ProSe业务的特定PC5安全策略时,用于保护所述目标ProSe业务的PC5连接。

Description

信息处理方法及装置、通信设备及存储介质 技术领域
本公开涉及无线通信技术领域但不限于无线通信技术领域,尤其涉及一种信息处理方法及装置、通信设备及存储介质。
背景技术
在5G基于邻近通信服务(Proximity Sevice,ProSe)安全的当前版本3GPP TR 33.847中,PC5直连通信的保护是通过PCF或ProSe应用服务器向ProSe UE提供的PC5安全策略来确保的,这些安全策略包含在需要安全保护的ProSe业务列表中。其中,每个ProSe业务都分配了其对应的PC5安全策略。
5G ProSe业务的PC5安全策略配置可以重用3GPP TS 33.536中定义的eV2X业务的PC5安全策略配置机制。PC5安全策略的协商和实施还可以重用3GPP TS 33.536中定义的过程,其中PC5安全策略需要在相关流程消息中携带。
发明内容
本公开实施例提供一种信息处理方法及装置、通信设备及存储介质。
本公开实施例第一方面提供一种信息处理方法,其中,被第一用户设备UE执行,所述方法包括:
获取缺省PC5安全策略,其中,所述缺省PC5安全策略,用于在未获取到目标基于邻近通信服务ProSe业务的特定PC5安全策略时,用于保护所述目标ProSe业务的PC5连接。
本公开实施例第二方面提供一种信息处理方法,其中,被PCF执行,所述方法包括:
配置缺省PC5安全策略,其中,所述缺省PC5安全策略,用于在未获取到目标基于邻近的服务ProSe业务的特定PC5安全策略,用于保护所述目标ProSe业务的PC5连接。
本公开实施例第三方面提供一种信息处理装置,其中,所述装置包括:
获取模块,被配置为获取缺省PC5安全策略,其中,所述缺省PC5安全策略,用于在未获取到目标基于邻近通信服务ProSe业务的特定PC5安全策略时,用于保护所述目标ProSe业务的PC5连接。
本公开实施例第四方面提供一种信息处理装置,所述装置包括:
第一配置模块,被配置为配置缺省PC5安全策略,其中,所述缺省PC5安全策略,用于在未获取到目标基于邻近的服务ProSe业务的特定PC5安全策略时,用于保护所述目标ProSe业务的PC5 连接。
本公开实施例第五方面提供一种通信设备,包括处理器、收发器、存储器及存储在存储器上并能够由所述处理器运行的可执行程序,其中,所述处理器运行所述可执行程序时执行如前述第一方面或第二方面提供的信息处理方法。
本公开实施例第六方面提供一种计算机存储介质,所述计算机存储介质存储有可执行程序;所述可执行程序被处理器执行后,能够实现前述的第一方面或第二方面提供的信息处理方法。
本公开实施例提供的技术方案,在进行基于PC5接口的PC5通信时,可以在未获取到目标ProSe业务的特定PC5安全策略时,可以根据缺省PC5安全策略,确定进行两个UE之间的PC5连接的保护,从而实现在未获取到目标ProSe业务的特定PC5安全策略时,可以基于缺省PC5安全策略顺利建立PC5连接安全,并保护目标ProSe业务的PC5通信。
应当理解的是,以上的一般描述和后文的细节描述仅是示例性和解释性的,并不能限制本公开实施例。
附图说明
此处的附图被并入说明书中并构成本说明书的一部分,示出了符合本发明实施例,并与说明书一起用于解释本发明实施例的原理。
图1是根据一示例性实施例示出的一种无线通信系统的结构示意图;
图2是根据一示例性实施例示出的一种信息处理方法的流程示意图;
图3是根据一示例性实施例示出的一种信息处理方法的流程示意图;
图4是根据一示例性实施例示出的一种信息处理方法的流程示意图;
图5是根据一示例性实施例示出的一种信息处理方法的流程示意图;
图6是根据一示例性实施例示出的一种信息处理装置的结构示意图;
图7是根据一示例性实施例示出的一种信息处理装置的结构示意图;
图8是根据一示例性实施例示出的一种UE的结构示意图;
图9是根据一示例性实施例示出的一种通信设备的结构示意图。
具体实施方式
这里将详细地对示例性实施例进行说明,其示例表示在附图中。下面的描述涉及附图时,除非另有表示,不同附图中的相同数字表示相同或相似的要素。以下示例性实施例中所描述的实施方式并不代表与本发明实施例相一致的所有实施方式。相反,它们仅是与如所附权利要求书中所详述的、本发明实施例的一些方面相一致的装置和方法的例子。
在本公开实施例使用的术语是仅仅出于描述特定实施例的目的,而非旨在限制本公开实施例。在本公开实施例和所附权利要求书中所使用的单数形式的“一种”、“一”和“该”也旨在包括多数 形式,除非上下文清楚地表示其他含义。还应当理解,本文中使用的术语“和/或”是指并包含一个或多个相关联的列出项目的任何或所有可能组合。
应当理解,尽管在本公开实施例可能采用术语第一、第二、第三等来描述各种信息,但这些信息不应限于这些术语。这些术语仅用来将同一类型的信息彼此区分开。例如,在不脱离本公开实施例范围的情况下,第一信息也可以被称为第二信息,类似地,第二信息也可以被称为第一信息。取决于语境,如在此所使用的词语“如果”可以被解释成为“在……时”或“当……时”或“响应于确定”。
请参考图1,其示出了本公开实施例提供的一种无线通信系统的结构示意图。如图1所示,无线通信系统是基于蜂窝移动通信技术的通信系统,该无线通信系统可以包括:若干个UE11以及若干个接入设备12。
其中,UE11可以是指向用户提供语音和/或数据连通性的设备。UE11可以经无线接入网(Radio Access Network,RAN)与一个或多个核心网进行通信,UE11可以是物联网UE,如传感器设备、移动电话(或称为“蜂窝”电话)和具有物联网UE的计算机,例如,可以是固定式、便携式、袖珍式、手持式、计算机内置的或者车载的装置。例如,站(Station,STA)、订户单元(subscriber unit)、订户站(subscriber station)、移动站(mobile station)、移动台(mobile)、远程站(remote station)、接入点、远程UE(remote terminal)、接入UE(access terminal)、用户装置(user terminal)、用户代理(user agent)、用户设备(user device)、或用户UE(user equipment,UE)。或者,UE11也可以是无人飞行器的设备。或者,UE11也可以是车载设备,比如,可以是具有无线通信功能的行车电脑,或者是外接行车电脑的无线通信设备。或者,UE11也可以是路边设备,比如,可以是具有无线通信功能的路灯、信号灯或者其它路边设备等。
接入设备12可以是无线通信系统中的网络侧设备。其中,该无线通信系统可以是第四代移动通信技术(the 4th generation mobile communication,4G)系统,又称长期演进(Long Term Evolution,LTE)系统;或者,该无线通信系统也可以是5G系统,又称新空口(new radio,NR)系统或5G NR系统。或者,该无线通信系统也可以是5G系统的再下一代系统。其中,5G系统中的接入网可以称为NG-RAN(New Generation-Radio Access Network,新一代无线接入网)。或者,MTC系统。
其中,接入设备12可以是4G系统中采用的演进型接入设备(eNB)。或者,接入设备12也可以是5G系统中采用集中分布式架构的接入设备(gNB)。当接入设备12采用集中分布式架构时,通常包括集中单元(central unit,CU)和至少两个分布单元(distributed unit,DU)。集中单元中设置有分组数据汇聚协议(Packet Data Convergence Protocol,PDCP)层、无线链路层控制协议(Radio Link Control,RLC)层、媒体访问控制(Media Access Control,MAC)层的协议栈;分布单元中设置有物理(Physical,PHY)层协议栈,本公开实施例对接入设备12的具体实现方式不加以限定。
接入设备12和UE11之间可以通过无线空口建立无线连接。在不同的实施方式中,该无线空口是基于第四代移动通信网络技术(4G)标准的无线空口;或者,该无线空口是基于第五代移动通信网络技术(5G)标准的无线空口,比如该无线空口是新空口;或者,该无线空口也可以是基于5G 的更下一代移动通信网络技术标准的无线空口。
在一些实施例中,UE11之间还可以建立E2E(End to End,端到端)连接。比如车联网通信(vehicle to everything,V2X)中的V2V(vehicle to vehicle,车对车)通信、V2I(vehicle to Infrastructure,车对路边设备)通信和V2P(vehicle to pedestrian,车对人)通信等场景。
在一些实施例中,上述无线通信系统还可以包含网络管理设备13。
若干个接入设备12分别与网络管理设备13相连。其中,网络管理设备13可以是无线通信系统中的核心网设备,比如,该网络管理设备13可以是演进的数据分组核心网(Evolved Packet Core,EPC)中的移动性管理实体(Mobility Management Entity,MME)。或者,该网络管理设备也可以是其它的核心网设备,比如服务网关(Serving GateWay,SGW)、公用数据网网关(Public Data Network GateWay,PGW)、策略与计费规则功能单元(Policy and Charging Rules Function,PCRF)或者归属签约用户服务器(Home Subscriber Server,HSS)等。对于网络管理设备13的实现形态,本公开实施例不做限定。
如图2所示,本公开实施例提供一种信息处理方法,其中,被第一用户设备UE执行,所述方法包括:
S110:获取缺省PC5安全策略,其中,所述缺省PC5安全策略,用于在未获取到目标基于邻近通信服务ProSe业务的特定PC5安全策略时,用于保护所述目标ProSe业务的PC5连接。
本公开实施例中提供的信息处理方法,可应用于UE,该UE可以为第一UE,则与第一UE进行通信的PC5通信的UE为第二UE。该第一UE可为需要与第二UE进行PC5连接并基于PC5连接进行PC5通信的UE。第二UE可为任意不同于第一UE的UE。该第一UE可以为PC5通信的发起端或者接受端。
此处的缺省PC5安全策略为PC5安全策略的一种,是用于在没有获取到专门针对目标ProSe业务的特定PC5安全策略时,就可以使用缺省PC5安全策略提供PC5连接的安全保障。
示例性地,缺省PC5安全策略可为通信运营商配置的安全策略,可以面向通信网络的所有ProSe业务。例如,缺省PC5安全策略可以指示以下至少之一:
需要,指示基于PC5连接的PC5通信信令和/或数据需加密和/或完整性保护,即在基于PC5连接的PC5通信时,需要进行通信信令和/或数据的完整性保护和/或加密;
可选地,指示基于PC5的PC5通信信令和/或数据可以加密也可以不加密和/或可进行完整性保护也可不进行完整性保护;
不需要,指示基于PC5连接的PC5通信信令和/或数据无需加密和/或完整性保护,即在基于PC5连接的PC5通信时,无需进行通信信令和/或数据的完整性保护和/或加密。
在一些实施例中,所述缺省PC5安全策略针对不同类型的ProSe业务可配置不同的安全保护要求;和/或根据不同的PC5通信环境,和/或不同的PC5通信UE,配置有不同的PC5安全保护要求。
如此,可以即便是基于缺省PC5安全策略,也可以根据不同ProSe业务、通信环境和/或通信UE,选择合适当前通信状况的PC5安全保护要求进行安全的PC5通信。
当然以上仅仅是对缺省PC5安全策略的举例说明,具体实施例不局限于该举例。
在本公开实施例中,所述缺省PC5安全策略可为公用PC5安全策略,即为多种ProSe业务所供养的PC5策略。而特定PC5安全策略仅仅针对其指定的ProSe业务。
通过缺省PC5安全策略的引入,可以使得UE在未获取到针对目标ProSe业务的特定PC5安全策略时,依然可以基于缺省PC5安全策略保护PC5连接建立并进行基于PC5连接的PC5通信,减少因为未获取到针对目标ProSe业务的特定PC5安全策略导致的PC5连接无法建立及PC5通信无法实现的问题。
在一些实施例中,如图3所示,本公开实施例提供一种信息处理方法可包括:
S120:当获取到目标ProSe业务的特定PC5安全策略时,根据特定PC5安全策略保护基于目标ProSe业务的PC5连接。
在本公开实施例中,若获取到目标ProSe业务的特定PC5安全策略,则以特定PC5安全策略为准,进行针对目标ProSe建立的PC5连接的保护。
即如果同时获取到了缺省PC5安全策略和特定PC5安全策略,则优先使用特定PC5安全策略。
该特定PC5安全策略可以是目标ProSe业务的服务提供商或者通信运营商针对目标ProSe专门制定的,因此目标ProSe业务的特定PC5安全策略是针对目标ProSe业务的安全需求专门制定的,从而具有业务的特殊性,优先根据目标ProSe业务的特定PC5安全策略提供PC5连接安全保护,可以满足目标ProSe业务的特定安全需求。
在一些实施例中,如图4所示,所述方法包括:
S100:从策略控制功能PCF接收所述目标ProSe业务的特定PC5安全策略;或者,从ProSe应用服务器接收所述目标ProSe业务的特定PC5安全策略。
UE在进行目标ProSe业务的PC5通信(或者说直连通信,或者sidelink(SL)通信)之前,可以先向PCF或者目标ProSe的ProSe应用服务器请求所述特定PC5安全策略。
示例性地,UE在向PCF请求所述特定PC5安全策略之前,可以查询本地是否存储有该目标ProSe业务的特定PC5安全策略,如果UE本地存储有,且确定为最新特定PC5安全策略的版本,则无需向PCF或者ProSe应用服务器再次请求。
示例性地,所述UE从PCF和/或ProSe应用服务器接收目标ProSe业务的特定PC5安全策略可包括:
向PCF或者ProSe应用服务器发送请求消息,其中,所述请求消息包含:目标ProSe业务的业务标识;
接收PCF或者ProSe应用服务器返回的响应消息。
在一个实施例中,所述响应消息包括以下至少之一:
所述特定PC5安全策略的策略标识;
所述特定PC5安全策略的策略条目;
否认反馈,指示无所述目标ProSe业务的特定PC5安全策略。
当UE没有从PCF或者ProSe应用服务器请求到目标ProSe业务的特定PC5安全策略时,或者响应消息指示携带特定PC5安全策略的字段为空时,都可认为没有获取到对应的特定PC5安全策略,则此时根据缺省PC5安全策略进行目标ProSe业务的PC5连接的安全保护。
当然以上仅仅是从PCF或者ProSe应用服务器获取特定PC5安全策略的一种方式,具体实现过程中UE在请求PC5通信时,网络侧的PCF或者ProSe应用服务器可以在请求ProSe通信的响应消息中将特定PC5安全策略的相关信息发送给UE,若UE在请求ProSe通信的响应消息中未发现特定PC5安全策略的相关信息,则可认为没有获取到目标ProSe业务的特定PC5安全策略。
在一些实施例中,不同ProSe业务的所述特定PC5安全策略不同。
例如,不同ProSe业务的特定PC5安全策略的策略内容不同和/或策略标识不同,以满足不同ProSe业务的安全需求。
在一些实施例中,所述目标ProSe业务的特定PC5安全策略是根据所述目标ProSe业务的安全需求确定的。
在一些实施例中,所述缺省PC5安全策略可预先配置在所述第一UE内;
或者,
所述缺省PC5安全策略是从PCF接收的。
例如,缺省PC5安全策略可以是规定在通信标准中,并且基于通信标准预先写入到UE中的。如此,任何一个UE都预先知晓缺省PC5安全策略,从而在没有获取到目标ProSe业务的特定PC5安全策略时,就可以基于缺省PC5安全策略进行目标ProSe业务的通信。
在一些实施例中,所述方法还包括:
根据所述缺省PC5安全策略或者特定PC5安全策略,与第二UE协商保护所述目标ProSe业务的PC5连接的安全参数。
该安全参数包括但不限于以下至少之一:
指示PC5信令是否加密的第一参数;
指示PC5数据是否加密的第二参数;
指示PC5信令是否需完整性保护的第三参数;
指示PC5数据是否需完整性保护的第四参数;
指示加密和完整性保护算法(相同算法)的第五参数;
当然以上仅仅是举例,具体实现时不局限于上述举例。
在本公开实施例中,第一UE在与第二UE进行PC5通信建立之前,先协商安全参数。具体根据缺省PC5安全策略或者特定PC5安全策略来进行安全参数的协商。
示例性地,在获取到目标ProSe业务的特定PC5安全策略时,会根据特定PC5安全策略,与第二UE协商保护目标ProSe业务的PC5连接的安全参数,在未获取到目标ProSe业务的特定PC5安全策略时,会根据缺省PC5安全策略,与第二UE协商保护目标ProSe业务的PC5连接的安全参数。
在一些实施例中所述缺省PC5安全策略,包括:
针对任意ProSe业务的缺省安全保护要求。
由于缺省PC5安全策略是针对任意ProSe业务的缺省安全保护要求,因此可以在没有获取到特定PC5安全保护策略时,针对任意ProSe业务都可以按照缺省PC5安全策略进行PC5连接的保护。
在一些实施例中,所述特定PC5安全策略的优先级高于所述缺省PC5安全策略。
缺省PC5安全策略相当于各ProSe业务的特定PC5安全策略的备用安全策略,在特定PC5安全策略未配置或者异常引起的未获取到时,可以基于缺省PC5安全策略进行目标ProSe业务的PC5连接的安全保护。
如图5所示,本公开实施例提供一种信息处理方法,其中,被PCF执行,所述方法包括:
S210:配置缺省PC5安全策略,其中,所述缺省PC5安全策略,用于在未获取到目标基于邻近的服务ProSe业务的特定PC5安全策略,用于保护所述目标ProSe业务的PC5连接。
PCF可以存储缺省PC5安全策略,该缺省PC5安全策略可以是网管设备配置到PCF的。
在一些实施例中,该S210可包括以下至少之一:
初始配置缺省PC5安全策略;
定期或不定期更新缺省PC5安全策略。
不定期更新缺省PC5安全策略,可包括:引入新的ProSe业务或者新类型的ProSe业务时的缺省PC5安全策略更新。
当然以上仅仅是举例,具体实现时不局限于上述任意举例。
在一些实施例中,所述方法还包括:
将所述缺省PC5安全策略发送给UE。
若PCF配置有缺省PC5安全策略之后,会主动推送或者基于UE请求的向UE发送所述PC5安全策略,以使得UE存储有缺省PC5安全策略。
在一些实施例中,所述方法还包括:
配置针对所述目标ProSe业务的所述特定PC5安全策略。
PCF还可以根据ProSe应用服务器的指示,配置针对目标ProSe业务的特定PC5安全策略。
若PCF配置有特定PC5安全策略之后,还可以将该特定PC5安全策略发送给UE,供UE在进行目标ProSe业务通信时,保护目标ProSe业务的PC5连接。
在一些实施例中,所述特定PC5安全策略的优先级高于所述缺省PC5安全策略。
在一些实施例中,所述缺省PC5安全策略,包括:
针对任意ProSe业务的缺省安全保护要求。
缺省PC5安全策略包含针对任意ProSe业务的缺省安全保护要求,如此在任意一个ProSe业务的特定PC5安全策略未获取到时,都可以基于缺省PC5安全策略提供对应ProSe业务的PC5连接的保护。
PC5直连通信(简称PC5通信)可通过PCF或ProSe应用服务器向ProSeUE提供的PC5安全策略来确保的,这些PC5安全策略包含在需要安全保护的ProSe业务列表中。其中,每个ProSe业 务都可分配了其对应的PC5安全策略。
ProSe业务的PC5安全策略配置可以使用eV2X业务的PC5安全策略配置机制。PC5安全策略的协商和实施还可以使用相关技术中定义的过程,其中PC5安全策略可在相关流程消息中携带。
然而在实际部署中,一些ProSe业务提供者可能没有为其提供的特定ProSe业务分配相应的安全策略,这将导致UE的PC5安全策略缺失。如果某台ProSe终端在为特定5GProSe业务建立直连通信时,没有配置PC5安全策略,则无法与对端终端进行PC5安全策略的协商和实施,从而无法建立终端间的直连通信。
5GProSe业务可能非常多样化,并由各ProSe业务提供商提供,其中一些提供商可能无法有效地为其提供的特定服务分配PC5安全策略。
在本申请实施例中,
定义不同类型的PC5安全策略;
配置缺省PC5安全策略(又可以称为默认PC5安全策略),通过PC5接口保护ProSe业务。
将已配置的缺省PC5安全策略安全地下发到UE。
当UE上配置了多种PC5安全策略,例如,配置了缺省PC5安全策略和特定PC5安全策略时,需选择使用哪种PC5安全策略。
特定PC5安全策略与特定的ProSe业务绑定。
缺省PC5安全策略与任何特定的ProSe业务无特殊绑定关系,当ProSe业务提供者没有为特定的ProSe业务提供PC5安全策略时使用此安全策略。
特定PC5安全策略的配置是基于特定ProSe业务的实际安全需求,根据特定PC5安全策略,可以分别有需要“REQUIRED”、可选“PREFERRED”、不需要“NOT NEEDED”选项用于加密和完整性保护。
缺省PC5安全策略的配置不是基于具体的ProSe业务的实际安全需求,可以由支持ProSe业务的运营商决定。缺省PC5安全策略还可以分别为加密和完整性保护提供“REQUIRED”、“PREFERRED”、“NOT NEEDED”选项。
PCF或ProSe应用服务器可以为终端提供具体的PC5安全策略。策略下发受非接入层(NAS)安全保护。如果ProSe业务提供商没有提供这种类型的PC5安全策略,那么可能不会为UE提供这种特定PC5安全策略。
缺省PC5安全策略可以在UE上预先配置,也可以由PCF向终端下发。下发受NAS安全保护。这种类型的PC5安全策略可由运营商配置,并由PCF提供给UE。
由于引入了不同类型的PC5安全策略,ProSe UE在与其他UE建立PC5连接之前,可能会同时配置有不同类型的PC5安全策略。UE需要根据不同PC5安全策略类型的优先级确定与对端UE直连通信时使用的安全策略。
特定PC5安全策略优先级高于缺省PC5安全策略的优先级。
如果UE上只配置了缺省PC5安全策略,则UE建立PC5连接时使用缺省PC5安全策略。
如果UE上同时配置了PC5安全策略和缺省PC5安全策略,则使用特定PC5安全策略。
如图6所示,本公开实施例提供一种信息处理装置,其中,所述装置包括:
获取模块110,被配置为获取缺省PC5安全策略,其中,所述缺省PC5安全策略,用于在未获取到目标基于邻近通信服务ProSe业务的特定PC5安全策略时,用于保护所述目标ProSe业务的PC5连接。
该信息处理装置可包含在第一UE中。
在一个实施例中,所述获取模块110包括但不限于程序模块;该程序模块被处理器执行之后,能够实现上述各个模块的功能。
在一些实施例中,所述获取模块110可为软硬结合模块;所述软硬结合模块包括但不限于可编程阵列;所述可编程阵列包括但不限于:现场可编程阵列和/或复杂可编程阵列。
在还有一些实施例中,所述获取模块110可为纯硬件模块;所述纯硬件模块包括但不限于专用集成电路。
在一些实施例中,所述装置还包括:
保护模块,被配置为当获取到所述目标ProSe业务的特定PC5安全策略时,根据所述特定PC5安全策略保护基于目标ProSe业务的PC5连接。
在一些实施例中,所述装置包括:
接收模块,被配置为从策略控制功能PCF接收所述目标ProSe业务的特定PC5安全策略;或者,从ProSe应用服务器接收所述目标ProSe业务的特定PC5安全策略。
在一些实施例中,不同ProSe业务的所述特定PC5安全策略不同。
在一些实施例中,所述目标ProSe业务的特定PC5安全策略是根据所述目标ProSe业务的安全需求确定的。
在一些实施例中,所述缺省PC5安全策略预先配置在所述第一UE内;
或者,
所述缺省PC5安全策略是从PCF接收的。
在一些实施例中,所述装置还包括:
协商模块,被配置为根据所述缺省PC5安全策略或者特定PC5安全策略,与第二UE协商保护所述目标ProSe业务的PC5连接的安全参数。
在一些实施例中,所述缺省PC5安全策略,包括:
针对任意ProSe业务的缺省安全保护要求。
在一些实施例中,所述特定PC5安全策略的优先级高于所述缺省PC5安全策略。
如图7所示,本公开实施例提供一种信息处理装置,其中,所述装置包括:
第一配置模块210,被配置为配置缺省PC5安全策略,其中,所述缺省PC5安全策略,用于在未获取到目标基于邻近的服务ProSe业务的特定PC5安全策略,用于保护所述目标ProSe业务的PC5连接。
该信息处理装置可包含在PCF中。
在一个实施例中,所述第一配置模块210包括但不限于程序模块;该程序模块被处理器执行之后,能够实现上述各个模块的功能。
在一些实施例中,所述第一配置模块210可为软硬结合模块;所述软硬结合模块包括但不限于可编程阵列;所述可编程阵列包括但不限于:现场可编程阵列和/或复杂可编程阵列。
在还有一些实施例中,所述第一配置模块210可为纯硬件模块;所述纯硬件模块包括但不限于专用集成电路。
在一些实施例中,所述装置还包括:
第二发送模块,被配置为将所述缺省PC5安全策略发送给UE。
在一些实施例中,所述装置还包括:
第二配置模块,被配置为配置针对所述目标ProSe业务的所述特定PC5安全策略。
在一些实施例中,所述特定PC5安全策略的优先级高于所述缺省PC5安全策略。
在一些实施例中,所述缺省PC5安全策略,包括:
针对任意ProSe业务的缺省安全保护要求。
本公开实施例提供一种通信设备,包括:
用于存储处理器可执行指令的存储器;
处理器,分别存储器连接;
其中,处理器被配置为执行前述任意技术方案提供的信息处理方法。
处理器可包括各种类型的存储介质,该存储介质为非临时性计算机存储介质,在通信设备掉电之后能够继续记忆存储其上的信息。
这里,所述通信设备包括:UE或者核心网设备。该核心网设备包括电缆不限于PCF。
所述处理器可以通过总线等与存储器连接,用于读取存储器上存储的可执行程序,例如,如图2至图5所示的方法的至少其中之一。
图8是根据一示例性实施例示出的一种UE800的框图。例如,UE800可以是移动电话、计算机、数字广播用户设备、消息收发设备、游戏控制台、平板设备、医疗设备、健身设备、个人数字助理等。
参照图8,UE800可以包括以下一个或多个组件:处理组件802、存储器804、电源组件806、多媒体组件808、音频组件810、输入/输出(I/O)接口812、传感器组件814、以及通信组件816。
处理组件802通常控制UE800的整体操作,诸如与显示、电话呼叫、数据通信、相机操作和记录操作相关联的操作。处理组件802可以包括一个或多个处理器820来执行指令,以完成上述的方法的全部或部分步骤。此外,处理组件802可以包括一个或多个模块,便于处理组件802和其他组件之间的交互。例如,处理组件802可以包括多媒体模块,以方便多媒体组件808和处理组件802之间的交互。
存储器804被配置为存储各种类型的数据以支持在UE800的操作。这些数据的示例包括用于在 UE800上操作的任何应用程序或方法的指令、联系人数据、电话簿数据、消息、图片、视频等。存储器804可以由任何类型的易失性或非易失性存储设备或者它们的组合实现,如静态随机存取存储器(SRAM)、电可擦除可编程只读存储器(EEPROM)、可擦除可编程只读存储器(EPROM)、可编程只读存储器(PROM)、只读存储器(ROM)、磁存储器、快闪存储器、磁盘或光盘。
电源组件806为UE800的各种组件提供电力。电源组件806可以包括电源管理系统、一个或多个电源、及其他与为UE800生成、管理和分配电力相关联的组件。
多媒体组件808包括在所述UE800和用户之间的提供一个输出接口的屏幕。在一些实施例中,屏幕可以包括液晶显示器(LCD)和触摸面板(TP)。如果屏幕包括触摸面板,屏幕可以被实现为触摸屏,以接收来自用户的输入信号。触摸面板包括一个或多个触摸传感器以感测触摸、滑动和触摸面板上的手势。所述触摸传感器可以不仅感测触摸或滑动动作的边界,而且还检测与所述触摸或滑动操作相关的持续时间和压力。在一些实施例中,多媒体组件808包括一个前置摄像头和/或后置摄像头。当UE800处于操作模式,如拍摄模式或视频模式时,前置摄像头和/或后置摄像头可以接收外部的多媒体数据。每个前置摄像头和后置摄像头可以是一个固定的光学透镜系统或具有焦距和光学变焦能力。
音频组件810被配置为输出和/或输入音频信号。例如,音频组件810包括一个麦克风(MIC),当UE800处于操作模式,如呼叫模式、记录模式和语音识别模式时,麦克风被配置为接收外部音频信号。所接收的音频信号可以被进一步存储在存储器804或经由通信组件816发送。在一些实施例中,音频组件810还包括一个扬声器,用于输出音频信号。
I/O接口812为处理组件802和外围接口模块之间提供接口,上述外围接口模块可以是键盘、点击轮、按钮等。这些按钮可包括但不限于:主页按钮、音量按钮、启动按钮和锁定按钮。
传感器组件814包括一个或多个传感器,用于为UE800提供各个方面的状态评估。例如,传感器组件814可以检测到设备800的打开/关闭状态、组件的相对定位,例如所述组件为UE800的显示器和小键盘,传感器组件814还可以检测UE800或UE800一个组件的位置改变、用户与UE800接触的存在或不存在、UE800方位或加速/减速和UE800的温度变化。传感器组件814可以包括接近传感器,被配置用来在没有任何的物理接触时检测附近物体的存在。传感器组件814还可以包括光传感器,如CMOS或CCD图像传感器,用于在成像应用中使用。在一些实施例中,该传感器组件814还可以包括加速度传感器、陀螺仪传感器、磁传感器、压力传感器或温度传感器。
通信组件816被配置为便于UE800和其他设备之间有线或无线方式的通信。UE800可以接入基于通信标准的无线网络,如WiFi、2G或3G,或它们的组合。在一个示例性实施例中,通信组件816经由广播信道接收来自外部广播管理系统的广播信号或广播相关信息。在一个示例性实施例中,所述通信组件816还包括近场通信(NFC)模块,以促进短程通信。例如,在NFC模块可基于射频识别(RFID)技术、红外数据协会(IrDA)技术、超宽带(UWB)技术、蓝牙(BT)技术和其他技术来实现。
在示例性实施例中,UE800可以被一个或多个应用专用集成电路(ASIC)、数字信号处理器 (DSP)、数字信号处理设备(DSPD)、可编程逻辑器件(PLD)、现场可编程门阵列(FPGA)、控制器、微控制器、微处理器或其他电子元件实现,用于执行上述方法。
在示例性实施例中,还提供了一种包括指令的非临时性计算机可读存储介质,例如包括指令的存储器804,上述指令可由UE800的处理器820执行以完成上述方法。例如,所述非临时性计算机可读存储介质可以是ROM、随机存取存储器(RAM)、CD-ROM、磁带、软盘和光数据存储设备等。
如图9所示,本公开一实施例示出一种接入设备的结构。例如,通信设备900可以被提供为一网络侧设备。该通信设备可为前述的核心网设备。该核心网设备包括但不限于PCF。
参照图9,通信设备900包括处理组件922,其进一步包括一个或多个处理器,以及由存储器932所代表的存储器资源,用于存储可由处理组件922执行的指令,例如应用程序。存储器932中存储的应用程序可以包括一个或一个以上的每一个对应于一组指令的模块。此外,处理组件922被配置为执行指令,以执行前述应用在所述接入设备的任意方法,例如,如图2至图5所示的方法。
通信设备900还可以包括:一个电源组件926,被配置为执行通信设备900的电源管理;一个有线或无线网络接口950,被配置为将通信设备900连接到网络;和一个输入输出(I/O)接口958。通信设备900可以操作存储在存储器932的操作系统,例如Windows Server TM、Mac OS XTM、UnixTM、LinuxTM、FreeBSDTM或类似的。
本领域技术人员在考虑说明书及实践这里公开的发明后,将容易想到本发明的其它实施方案。本公开旨在涵盖本发明的任何变型、用途或者适应性变化,这些变型、用途或者适应性变化遵循本发明的一般性原理并包括本公开未公开的本技术领域中的公知常识或惯用技术手段。说明书和实施例仅被视为示例性的,本发明的真正范围和精神由下面的权利要求指出。
应当理解的是,本发明并不局限于上面已经描述并在附图中示出的精确结构,并且可以在不脱离其范围的情况下进行各种修改和改变。本发明的范围仅由所附权利要求来限制。

Claims (30)

  1. 一种信息处理方法,其中,被第一用户设备UE执行,所述方法包括:
    获取缺省PC5安全策略,其中,所述缺省PC5安全策略,用于在未获取到目标基于邻近通信服务ProSe业务的特定PC5安全策略时,用于保护所述目标ProSe业务的PC5连接。
  2. 根据权利要求1所述的方法,其中,所述方法还包括以下至少之一:
    当获取到所述目标ProSe业务的特定PC5安全策略时,根据所述特定PC5安全策略保护基于目标ProSe业务的PC5连接。
  3. 根据权利要求2所述的方法,其中,所述方法包括:
    从策略控制功能PCF接收所述目标ProSe业务的特定PC5安全策略;
    或者,
    从ProSe应用服务器接收所述目标ProSe业务的特定PC5安全策略。
  4. 根据权利要求1至3任一项所述的方法,其中,不同ProSe业务的所述特定PC5安全策略不同。
  5. 根据权利要求2至4任一项所述的方法,其中,所述目标ProSe业务的特定PC5安全策略是根据所述目标ProSe业务的安全需求确定的。
  6. 根据权利要求1至5任一项所述的方法,其中,所述缺省PC5安全策略预先配置在所述第一UE内;
    或者,
    所述缺省PC5安全策略是从PCF接收的。
  7. 根据权利要求2至6任一项所述的方法,其中,所述方法还包括:
    根据所述缺省PC5安全策略或者特定PC5安全策略,与第二UE协商保护所述目标ProSe业务的PC5连接的安全参数。
  8. 根据权利要求1至7任一项所述的方法,其中,所述缺省PC5安全策略,包括:
    针对任意ProSe业务的缺省安全保护要求。
  9. 根据权利要求2至5任一项或7所述的方法,其中,所述特定PC5安全策略的优先级高于所述缺省PC5安全策略。
  10. 一种信息处理方法,其中,被PCF执行,所述方法包括:
    配置缺省PC5安全策略,其中,所述缺省PC5安全策略,用于在未获取到目标基于邻近的服务ProSe业务的特定PC5安全策略,用于保护所述目标ProSe业务的PC5连接。
  11. 根据权利要求10所述的方法,其中,所述方法还包括:
    将所述缺省PC5安全策略发送给UE。
  12. 根据权利要求10或11所述的方法,其中,所述方法还包括:
    配置针对所述目标ProSe业务的所述特定PC5安全策略。
  13. 根据权利要求12所述的方法,其中,所述特定PC5安全策略的优先级高于所述缺省PC5安全策略。
  14. 根据权利要求10至13任一项所述的方法,其中,所述缺省PC5安全策略,包括:
    针对任意ProSe业务的缺省安全保护要求。
  15. 一种信息处理装置,其中,所述装置包括:
    获取模块,被配置为获取缺省PC5安全策略,其中,所述缺省PC5安全策略,用于在未获取到目标基于邻近通信服务ProSe业务的特定PC5安全策略时,用于保护所述目标ProSe业务的PC5连接。
  16. 根据权利要求15所述的装置,其中,所述装置还包括:
    保护模块,被配置为当获取到所述目标ProSe业务的特定PC5安全策略时,根据所述特定PC5安全策略保护基于目标ProSe业务的PC5连接。
  17. 根据权利要求16所述的装置,其中,所述装置包括:
    接收模块,被配置为从策略控制功能PCF接收所述目标ProSe业务的特定PC5安全策略;或者,从ProSe应用服务器接收所述目标ProSe业务的特定PC5安全策略。
  18. 根据权利要求15至17任一项所述的装置,其中,不同ProSe业务的所述特定PC5安全策略不同。
  19. 根据权利要求15至18任一项所述的装置,其中,所述目标ProSe业务的特定PC5安全策略是根据所述目标ProSe业务的安全需求确定的。
  20. 根据权利要求15至19任一项所述的装置,其中,所述缺省PC5安全策略预先配置在所述第一UE内;
    或者,
    所述缺省PC5安全策略是从PCF接收的。
  21. 根据权利要求15至20任一项所述的装置,其中,所述装置还包括:
    协商模块,被配置为根据所述缺省PC5安全策略或者特定PC5安全策略,与第二UE协商保护所述目标ProSe业务的PC5连接的安全参数。
  22. 根据权利要求15至21任一项所述的装置,其中,所述缺省PC5安全策略,包括:
    针对任意ProSe业务的缺省安全保护要求。
  23. 根据权利要求15至21任一项或21所述的方法,其中,所述特定PC5安全策略的优先级高于所述缺省PC5安全策略。
  24. 一种信息处理装置,其中,所述装置包括:
    第一配置模块,被配置为配置缺省PC5安全策略,其中,所述缺省PC5安全策略,用于在未获取到目标基于邻近的服务ProSe业务的特定PC5安全策略时,用于保护所述目标ProSe业务的PC5连接。
  25. 根据权利要求24所述的装置,其中,所述装置还包括:
    第二发送模块,被配置为将所述缺省PC5安全策略发送给UE。
  26. 根据权利要求24或25所述的装置,其中,所述装置还包括:
    第二配置模块,被配置为配置针对所述目标ProSe业务的所述特定PC5安全策略。
  27. 根据权利要求26所述的装置,其中,所述特定PC5安全策略的优先级高于所述缺省PC5安全策略。
  28. 根据权利要求15至27任一项所述的装置,其中,所述缺省PC5安全策略,包括:
    针对任意ProSe业务的缺省安全保护要求。
  29. 一种通信设备,包括处理器、收发器、存储器及存储在存储器上并能够由所述处理器运行的可执行程序,其中,所述处理器运行所述可执行程序时执行如权利要求1至9或10至14任一项所述的方法。
  30. 一种计算机存储介质,所述计算机存储介质存储有可执行程序;所述可执行程序被处理器执行后,能够实现如权利要求1至9或10至14任一项所述的方法。
PCT/CN2021/127350 2021-10-29 2021-10-29 信息处理方法及装置、通信设备及存储介质 WO2023070509A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202180003631.7A CN116368834A (zh) 2021-10-29 2021-10-29 信息处理方法及装置、通信设备及存储介质
PCT/CN2021/127350 WO2023070509A1 (zh) 2021-10-29 2021-10-29 信息处理方法及装置、通信设备及存储介质

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2021/127350 WO2023070509A1 (zh) 2021-10-29 2021-10-29 信息处理方法及装置、通信设备及存储介质

Publications (1)

Publication Number Publication Date
WO2023070509A1 true WO2023070509A1 (zh) 2023-05-04

Family

ID=86158792

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/127350 WO2023070509A1 (zh) 2021-10-29 2021-10-29 信息处理方法及装置、通信设备及存储介质

Country Status (2)

Country Link
CN (1) CN116368834A (zh)
WO (1) WO2023070509A1 (zh)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20200178343A1 (en) * 2017-08-09 2020-06-04 Lg Electronics Inc. Method for performing rrc connection procedure in wireless communication system and apparatus therefor
US20210258793A1 (en) * 2020-02-17 2021-08-19 Samsung Electronics Co., Ltd. Method and apparatus for handling security policies in v2x communication system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20200178343A1 (en) * 2017-08-09 2020-06-04 Lg Electronics Inc. Method for performing rrc connection procedure in wireless communication system and apparatus therefor
US20210258793A1 (en) * 2020-02-17 2021-08-19 Samsung Electronics Co., Ltd. Method and apparatus for handling security policies in v2x communication system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
APPLE: "pCR: Security policy for unicast message in PC5", 3GPP TSG-SA WG3 MEETING #98BIS-E, S3-200601, 3 April 2020 (2020-04-03), XP051868531 *
XIAOMI: "ProSe: New Solution for Key Issue #17", 3GPP TSG-SA3 MEETING #104-E S3-212965, 9 August 2021 (2021-08-09), XP052063614 *

Also Published As

Publication number Publication date
CN116368834A (zh) 2023-06-30

Similar Documents

Publication Publication Date Title
WO2023060490A1 (zh) 能力信息的上报方法、装置、通信设备及存储介质
WO2023070509A1 (zh) 信息处理方法及装置、通信设备及存储介质
WO2022174393A1 (zh) 能力交互方法和装置、交互触发方法和装置
WO2024055329A1 (zh) 邻近服务ProSe的无线通信方法、装置、通信设备及存储介质
WO2023070685A1 (zh) 中继通信的方法、装置、通信设备及存储介质
WO2024000124A1 (zh) 寻呼协商方法、装置、通信设备及存储介质
WO2023065091A1 (zh) 寻呼过滤规则确定方法及装置、通信设备及存储介质
WO2023220893A1 (zh) 中继通信方法、装置、通信设备及存储介质
WO2022236642A1 (zh) 信息处理方法、装置、通信设备及存储介质
WO2022236746A1 (zh) 能力信息的传输方法、装置、通信设备及存储介质
WO2023077524A1 (zh) 一种寻呼过滤的方法、装置、通信设备及存储介质
WO2023070560A1 (zh) 信息传输方法、装置、通信设备和存储介质
WO2023184172A1 (zh) 创建pin的方法、装置、通信设备及存储介质
WO2024031390A1 (zh) 个人物联网信息更新方法、装置、通信设备及存储介质
WO2023151055A1 (zh) 发送配置信息的方法、装置、通信设备及存储介质
WO2024031400A1 (zh) 确定激活或去激活辅小区的方法、装置及存储介质
WO2022236607A1 (zh) 选网信息的传输方法、装置、通信设备及存储介质
WO2024031640A1 (zh) 一种信息传输方法、装置、通信设备及存储介质
WO2023092412A1 (zh) 终端与网络同步的方法、装置、通信设备及存储介质
WO2023123433A1 (zh) 终端的功率配置方法、装置、通信设备及存储介质
WO2022236602A1 (zh) 能力指示信息的传输方法、装置、通信设备及存储介质
WO2023216208A1 (zh) 定位配置信息处理方法、装置、通信设备及存储介质
WO2023137677A1 (zh) 切换bwp的方法、装置、通信设备及存储介质
WO2024060057A1 (zh) 信息处理方法及装置、通信设备及存储介质
WO2023102855A1 (zh) 监听可获得性指示信息的方法、装置、设备及存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21961868

Country of ref document: EP

Kind code of ref document: A1