WO2023070685A1 - 中继通信的方法、装置、通信设备及存储介质 - Google Patents

中继通信的方法、装置、通信设备及存储介质 Download PDF

Info

Publication number
WO2023070685A1
WO2023070685A1 PCT/CN2021/128008 CN2021128008W WO2023070685A1 WO 2023070685 A1 WO2023070685 A1 WO 2023070685A1 CN 2021128008 W CN2021128008 W CN 2021128008W WO 2023070685 A1 WO2023070685 A1 WO 2023070685A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
security policy
security
policy information
network node
Prior art date
Application number
PCT/CN2021/128008
Other languages
English (en)
French (fr)
Inventor
洪伟
Original Assignee
北京小米移动软件有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京小米移动软件有限公司 filed Critical 北京小米移动软件有限公司
Priority to CN202180003729.2A priority Critical patent/CN116391448A/zh
Priority to PCT/CN2021/128008 priority patent/WO2023070685A1/zh
Publication of WO2023070685A1 publication Critical patent/WO2023070685A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • H04W12/37Managing security policies for mobile devices or for controlling mobile applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/14Direct-mode setup
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices
    • H04W88/04Terminal devices adapted for relaying to or from another terminal or user

Definitions

  • the present disclosure relates to the technical field of wireless communication but is not limited to the technical field of wireless communication, and in particular relates to a method, device, communication device and storage medium for relay communication.
  • Relay communication means that when the remote terminal cannot communicate with the network due to network signal coverage and other reasons, the relay function of the relay terminal can be used to continue communication with the network.
  • the remote terminal can first transmit the data that needs to be transmitted to the network to the relay terminal, and then the relay terminal transmits the data to the network; or, the network can first transmit the data that needs to be transmitted to the remote terminal After being transmitted to the relay terminal, the relay terminal transmits the data to the remote terminal, thereby realizing communication between the remote terminal and the network.
  • the embodiment of the present disclosure discloses a relay communication method, device, communication device and storage medium.
  • a relay communication method is provided, wherein the method is executed by a first network node, and the method includes:
  • the security policy information is at least used for: when the second terminal performs relay communication with the network through the first terminal, the user of the relay service data transmitted between the first terminal and the second terminal based on PC5 Surface security protection.
  • a relay communication method is provided, wherein the method is executed by a first terminal, and the method includes:
  • the security policy information is at least used for: when the second terminal performs relay communication with the network through the first terminal, the user plane security of the relay service data transmitted between the first terminal and the second terminal based on PC5 sexual protection.
  • a relay communication method wherein the method is executed by a second terminal, and the method includes:
  • the security policy information is at least used for: when the second terminal performs relay communication with the network through the first terminal, the user of the relay service data transmitted between the first terminal and the second terminal based on PC5 Surface security protection.
  • a relay communication method is provided, wherein the method is performed by a second network node, and the method includes:
  • the security policy information is at least used for: when the second terminal performs relay communication with the network through the first terminal, the user of the relay service data transmitted between the first terminal and the second terminal based on PC5 Surface security protection.
  • a relay communication method is provided, wherein the method is performed by a base station, and the method includes:
  • the security policy information is at least used for: when the second terminal performs relay communication with the network through the first terminal, the user of the relay service data transmitted between the first terminal and the second terminal based on PC5 Surface security protection.
  • a relay communication device wherein the device includes:
  • a sending module configured to send security policy information to the first terminal
  • the security policy information is at least used for: when the second terminal performs relay communication with the network through the first terminal, the user of the relay service data transmitted between the first terminal and the second terminal based on PC5 Surface security protection.
  • a relay communication device wherein the device includes:
  • a receiving module configured to receive security policy information sent by the first network node
  • the security policy information is at least used for: when the second terminal performs relay communication with the network through the first terminal, the user plane security of the relay service data transmitted between the first terminal and the second terminal based on PC5 sexual protection.
  • a relay communication device wherein the device includes:
  • a receiving module configured to receive the security policy information sent by the first terminal
  • the security policy information is at least used for: when the second terminal performs relay communication with the network through the first terminal, the user of the relay service data transmitted between the first terminal and the second terminal based on PC5 Surface security protection.
  • a relay communication device wherein the device includes:
  • an obtaining module configured to obtain security policy information from the first network node
  • the security policy information is at least used for: when the second terminal performs relay communication with the network through the first terminal, the user of the relay service data transmitted between the first terminal and the second terminal based on PC5 Surface security protection.
  • a relay communication device wherein the device includes:
  • a receiving module configured to receive the security policy information sent by the second network node
  • the security policy information is at least used for: when the second terminal performs relay communication with the network through the first terminal, the user of the relay service data transmitted between the first terminal and the second terminal based on PC5 Surface security protection.
  • a communication device includes:
  • the processor is configured to implement the method described in any embodiment of the present disclosure when running the executable instruction.
  • a computer storage medium stores a computer executable program, and when the executable program is executed by a processor, the method described in any embodiment of the present disclosure is implemented .
  • the security policy information is sent to the first terminal; wherein the security policy information is at least used for: when the second terminal performs relay communication with the network through the first terminal, the first terminal and the User plane security protection of the relay service data transmitted between the second terminals based on the PC5.
  • the security policy information is at least used for: when the second terminal performs relay communication with the network through the first terminal, the first terminal and the User plane security protection of the relay service data transmitted between the second terminals based on the PC5.
  • Fig. 1 is a schematic structural diagram of a wireless communication system according to an exemplary embodiment.
  • Fig. 2 is a schematic flowchart of a relay communication method according to an exemplary embodiment.
  • Fig. 3 is a schematic flowchart of a relay communication method according to an exemplary embodiment.
  • Fig. 4 is a schematic flowchart of a relay communication method according to an exemplary embodiment.
  • Fig. 5 is a schematic flowchart of a relay communication method according to an exemplary embodiment.
  • Fig. 6 is a schematic flowchart of a relay communication method according to an exemplary embodiment.
  • Fig. 7 is a schematic flowchart of a relay communication method according to an exemplary embodiment.
  • Fig. 8 is a schematic flowchart of a relay communication method according to an exemplary embodiment.
  • Fig. 9 is a schematic flowchart of a relay communication method according to an exemplary embodiment.
  • Fig. 10 is a schematic flowchart of a relay communication method according to an exemplary embodiment.
  • Fig. 11 is a schematic flowchart of a relay communication method according to an exemplary embodiment.
  • Fig. 12 is a schematic flowchart of a relay communication method according to an exemplary embodiment.
  • Fig. 13 is a schematic flowchart of a relay communication method according to an exemplary embodiment.
  • Fig. 14 is a schematic flowchart of a relay communication method according to an exemplary embodiment.
  • Fig. 15 is a schematic flowchart of a relay communication method according to an exemplary embodiment.
  • Fig. 16 is a schematic flowchart of a relay communication method according to an exemplary embodiment.
  • Fig. 17 is a schematic flowchart of a relay communication method according to an exemplary embodiment.
  • Fig. 18 is a schematic flowchart of a relay communication method according to an exemplary embodiment.
  • Fig. 19 is a schematic flowchart of a relay communication method according to an exemplary embodiment.
  • Fig. 20 is a schematic flowchart of a relay communication method according to an exemplary embodiment.
  • Fig. 21 is a schematic flowchart of a relay communication method according to an exemplary embodiment.
  • Fig. 22 is a schematic flowchart of a relay communication method according to an exemplary embodiment.
  • Fig. 23 is a schematic flowchart of a relay communication method according to an exemplary embodiment.
  • Fig. 24 is a schematic flowchart of a relay communication method according to an exemplary embodiment.
  • Fig. 25 is a schematic flowchart of a relay communication method according to an exemplary embodiment.
  • Fig. 26 is a schematic flowchart of a relay communication method according to an exemplary embodiment.
  • Fig. 27 is a schematic flowchart of a relay communication method according to an exemplary embodiment.
  • Fig. 28 is a schematic flowchart of a relay communication method according to an exemplary embodiment.
  • Fig. 29 is a schematic flowchart of a relay communication method according to an exemplary embodiment.
  • Fig. 30 is a schematic flowchart of a relay communication method according to an exemplary embodiment.
  • Fig. 31 is a schematic flowchart of a relay communication method according to an exemplary embodiment.
  • Fig. 32 is a schematic flowchart of a relay communication method according to an exemplary embodiment.
  • Fig. 33 is a schematic flowchart of a relay communication method according to an exemplary embodiment.
  • Fig. 34 is a schematic flowchart of a relay communication method according to an exemplary embodiment.
  • Fig. 35 is a schematic flowchart of a relay communication method according to an exemplary embodiment.
  • Fig. 36 is a schematic flowchart of a relay communication method according to an exemplary embodiment.
  • Fig. 37 is a schematic flowchart of a relay communication method according to an exemplary embodiment.
  • Fig. 38 is a schematic flowchart of a relay communication method according to an exemplary embodiment.
  • Fig. 39 is a schematic diagram of a relay communication device according to an exemplary embodiment.
  • Fig. 40 is a schematic diagram of a relay communication device according to an exemplary embodiment.
  • Fig. 41 is a schematic diagram of a relay communication device according to an exemplary embodiment.
  • Fig. 42 is a schematic diagram of a relay communication device according to an exemplary embodiment.
  • Fig. 43 is a schematic diagram of a relay communication device according to an exemplary embodiment.
  • Fig. 44 is a schematic structural diagram of a terminal according to an exemplary embodiment.
  • Fig. 45 is a block diagram of a base station according to an exemplary embodiment.
  • first, second, third, etc. may use the terms first, second, third, etc. to describe various information, the information should not be limited to these terms. These terms are only used to distinguish information of the same type from one another. For example, without departing from the scope of the embodiments of the present disclosure, first information may also be called second information, and similarly, second information may also be called first information. Depending on the context, the word “if” as used herein may be interpreted as “at” or "when” or "in response to a determination.”
  • the term “greater than” or “less than” is used herein when characterizing a size relationship. However, those skilled in the art can understand that the term “greater than” also covers the meaning of “greater than or equal to”, and “less than” also covers the meaning of "less than or equal to”.
  • FIG. 1 shows a schematic structural diagram of a wireless communication system provided by an embodiment of the present disclosure.
  • the wireless communication system is a communication system based on mobile communication technology, and the wireless communication system may include: several user equipments 110 and several base stations 120 .
  • the user equipment 110 may be a device that provides voice and/or data connectivity to the user.
  • the user equipment 110 can communicate with one or more core networks via a radio access network (Radio Access Network, RAN), and the user equipment 110 can be an Internet of Things user equipment, such as a sensor device, a mobile phone, and a computer with an Internet of Things user equipment , for example, may be a fixed, portable, pocket, hand-held, computer built-in, or vehicle-mounted device.
  • RAN Radio Access Network
  • Station For example, Station (Station, STA), subscriber unit (subscriber unit), subscriber station (subscriber station), mobile station (mobile station), mobile station (mobile), remote station (remote station), access point, remote user equipment (remote terminal), access user equipment (access terminal), user device (user terminal), user agent (user agent), user equipment (user device), or user equipment (user equipment).
  • the user equipment 110 may also be equipment of an unmanned aerial vehicle.
  • the user equipment 110 may also be a vehicle-mounted device, for example, a trip computer with a wireless communication function, or a wireless user device connected externally to the trip computer.
  • the user equipment 110 may also be a roadside device, for example, may be a street lamp, a signal lamp, or other roadside devices with a wireless communication function.
  • the base station 120 may be a network side device in a wireless communication system.
  • the wireless communication system may be a fourth generation mobile communication technology (the 4th generation mobile communication, 4G) system, also known as a Long Term Evolution (LTE) system; or, the wireless communication system may also be a 5G system, Also known as new air interface system or 5G NR system.
  • the wireless communication system may also be a next-generation system of the 5G system.
  • the access network in the 5G system can be called NG-RAN (New Generation-Radio Access Network, New Generation Radio Access Network).
  • the base station 120 may be an evolved base station (eNB) adopted in a 4G system.
  • the base station 120 may also be a base station (gNB) adopting a centralized distributed architecture in the 5G system.
  • eNB evolved base station
  • gNB base station
  • the base station 120 adopts a centralized distributed architecture it generally includes a centralized unit (central unit, CU) and at least two distributed units (distributed unit, DU).
  • the centralized unit is provided with a packet data convergence protocol (Packet Data Convergence Protocol, PDCP) layer, radio link layer control protocol (Radio Link Control, RLC) layer, media access control (Media Access Control, MAC) layer protocol stack;
  • PDCP Packet Data Convergence Protocol
  • RLC Radio Link Control
  • MAC media access control
  • a physical (Physical, PHY) layer protocol stack is set in the unit, and the embodiment of the present disclosure does not limit the specific implementation manner of the base station 120 .
  • a wireless connection may be established between the base station 120 and the user equipment 110 through a wireless air interface.
  • the wireless air interface is a wireless air interface based on the fourth-generation mobile communication network technology (4G) standard; or, the wireless air interface is a wireless air interface based on the fifth-generation mobile communication network technology (5G) standard, such as
  • the wireless air interface is a new air interface; alternatively, the wireless air interface may also be a wireless air interface based on a technical standard of a next-generation mobile communication network based on 5G.
  • an E2E (End to End, end-to-end) connection may also be established between user equipment 110.
  • V2V vehicle to vehicle, vehicle-to-vehicle
  • V2I vehicle to Infrastructure, vehicle-to-roadside equipment
  • V2P vehicle to pedestrian, vehicle-to-person communication in vehicle to everything (V2X) communication Wait for the scene.
  • the above user equipment may be regarded as the terminal equipment in the following embodiments.
  • the foregoing wireless communication system may further include a network management device 130 .
  • the network management device 130 may be a core network device in a wireless communication system, for example, the network management device 130 may be a Mobility Management Entity (Mobility Management Entity) in an evolved packet core network (Evolved Packet Core, EPC), MME).
  • the network management device can also be other core network devices, such as Serving GateWay (SGW), Public Data Network Gateway (Public Data Network GateWay, PGW), policy and charging rule functional unit (Policy and Charging Rules Function, PCRF) or Home Subscriber Server (Home Subscriber Server, HSS), etc.
  • SGW Serving GateWay
  • PGW Public Data Network Gateway
  • PCRF Policy and Charging Rules Function
  • HSS Home Subscriber Server
  • the embodiments of the present disclosure list a plurality of implementation manners to clearly illustrate the technical solutions of the embodiments of the present disclosure.
  • those skilled in the art can understand that the multiple embodiments provided by the embodiments of the present disclosure can be executed independently, or combined with the methods of other embodiments in the embodiments of the present disclosure, and can also be executed alone or in combination It is then executed together with some methods in other related technologies; this is not limited in the embodiment of the present disclosure.
  • a control plane and user plane solution is provided for user-to-network relay.
  • the 5G proximity communication service (Proximity-based Service) key management function (PKMF, ProSe Key Management Function) is used to support the security key management of the PC5 connection of ProSe indirect or relay communication.
  • PKMF ProSe Key Management Function
  • LTE Long Term Evolution
  • PKMF ProSe Key Management Function
  • the reference point PC8 which relies on the user plane of the core network, is used to transmit security parameters to the terminal.
  • a policy control function (PCF, Policy Control Function) is used to provide PC5 policies for ProSe direct communication during service authorization to protect PC5 connections.
  • PCF Policy Control Function
  • this disclosure may aim to provide PC5 security policies for terminals through 5G PKMF through users to protect the security of PC5 user plane of ProSe relay communication.
  • 5G PKMF can correctly configure PC5 security policy for ProSe relay communication.
  • 5G PKMF can securely provide the configured PC5 security policies to remote UEs and relay UEs. The PC5 security policy on the remote UE and on the relay UE can correctly activate security protection for the requested ProSe relay service.
  • PC5 control plane security may be established during the establishment of PC5 direct communication between the remote UE and the relay UE through the direct security mode command procedure.
  • the PC5 user plane security when the remote terminal requests indirect communication from the network, the PC5 user plane security is only used to protect the ProSe service data exchanged between the peer terminals. At the same time, it is used to protect the connection service provided by the relay terminal requested by the remote terminal. Further, the connectivity service provided by the relay terminal is used to support the relay service provided by the network to the remote terminal through the relay terminal. Therefore, the PC5 user plane security for ProSe relay communication needs to be consistent with the user plane security requirements of the specific relay service provided by the network. For encryption and integrity protection, there can be “REQUIRED” or "PREFERRED” or “NOT NEEDED" ".
  • PC5 control plane security is always required, and there is no need to configure PC5 control plane security policy for the specific relay service requested by the remote terminal.
  • the PC5 user plane security policy is the same as the user plane security policy set by the network for the specific relay service requested by the remote terminal.
  • a relay communication method is provided in this embodiment, where the method is executed by the first network node, and the method includes:
  • Step 21 sending security policy information to the first terminal
  • the security policy information is at least used for user plane security protection of relay service data transmitted between the first terminal and the second terminal based on the PC5 when the second terminal performs relay communication with the network through the first terminal.
  • the network node involved in the present disclosure may be a core network element.
  • the first network node may be a PKMF.
  • the second network node may be a session management function (SMF, Session Management Function).
  • the terminals involved in the present disclosure may be, but not limited to, mobile phones, wearable devices, vehicle-mounted terminals, road side units (RSU, Road Side Unit), smart home terminals, industrial sensing devices and/or medical devices, etc.
  • RSU road side units
  • smart home terminals industrial sensing devices and/or medical devices, etc.
  • the base station involved in the present disclosure may be an access device for a terminal to access a network.
  • the base station may be various types of base stations, for example, a base station of a third-generation mobile communication (3G) network, a base station of a fourth-generation mobile communication (4G) network, a base station of a fifth-generation mobile communication (5G) network, or other Evolved base station.
  • 3G third-generation mobile communication
  • 4G fourth-generation mobile communication
  • 5G fifth-generation mobile communication
  • the user plane security protection includes: integrity protection and/or encryption of user plane data.
  • integrity protection and encryption of user plane data need to be performed on data transmitted between the first terminal and the second terminal. It should be noted that the communication between the first terminal and the second terminal is based on the PC5 protocol.
  • the first network node sends security policy information to the first terminal. After receiving the security policy information, the first terminal forwards the security policy information to the second terminal.
  • the second terminal sends a direct communication request message to the first terminal. After receiving the direct communication request message, the first terminal sends a key request message to the first network node. After receiving the key request message, the first network node will send a key response message carrying security policy information to the first terminal. After receiving the key response message, the first terminal sends a direct security mode command message carrying security policy information to the second terminal.
  • the first network node may determine the security policy information according to the relay service code (RSC, Relay Service Code) and the mapping relationship between the RSC and the security policy.
  • RSC relay service code
  • different RSCs may correspond to different security policy information.
  • Correspondence between different security policies and RSCs may be stored in a list form in advance, and after the first network node determines the target RSC, it may obtain the security policy information corresponding to the target RSC from the list by querying the list.
  • the first network node receives the RSC sent by the first terminal. After receiving the RSC, it is determined whether the first terminal is authorized for the relay service. If it is determined that the first terminal is authorized to provide the relay service, security policy information is determined based on the RSC and the mapping relationship between the RSC and the security policy. It should be noted that the determination of the security policy information may be, but not limited to, the above manner.
  • the first terminal and the second terminal may perform security protection based on the security policy information when transmitting data of the relay service between the first terminal and the second terminal.
  • the first terminal obtains the discovery parameter, the PKMF address and the discovery security parameter from a Proximity Communications Service Name Management Function (DDNMF, Direct Discovery Name Management Function).
  • DDNMF Proximity Communications Service Name Management Function
  • the second terminal obtains the discovery parameter, the PKMF address and the discovery security parameter from the DDNMF.
  • the first terminal and the second terminal will perform a discovery process based on the discovery parameter and the discovery security parameter.
  • the DDNMF may be included in the first network node, or deployed separately.
  • the security policy information is sent to the first terminal; wherein, the security policy information is at least used for: when the second terminal performs relay communication with the network through the first terminal, between the first terminal and the second terminal User plane security protection based on relay service data transmitted by PC5.
  • the security policy information is at least used for: when the second terminal performs relay communication with the network through the first terminal, between the first terminal and the second terminal User plane security protection based on relay service data transmitted by PC5.
  • a relay communication method is provided in this embodiment, where the method is performed by the first network node, and the method includes:
  • Step 31 receiving the relay service code RSC sent by the first terminal
  • Step 32 In response to determining that the first terminal is authorized to provide the relay service, determine security policy information based on the RSC and the mapping relationship between the RSC and the security policy.
  • the first network node receives the key request message carrying the RSC sent by the first terminal. It is determined whether the first terminal is authorized to relay the service. If it is determined that the first terminal is authorized to provide the relay service, security policy information is determined based on the RSC and the mapping relationship between the RSC and the security policy. It should be noted that the PRUK identifier and/or the first freshness parameter may also be carried in the key request message.
  • the RSCs sent by the first terminal are different. Different RSCs correspond to different security policy information.
  • the first RSC corresponds to the first security policy information
  • the second RSC corresponds to the second security policy information.
  • the first network node may determine that the security policy information is the first security policy information based on the first RSC after receiving the first RSC. policy information.
  • a relay communication method is provided in this embodiment, where the method is executed by the first network node, and the method includes:
  • Step 41 Receive the key request message carrying the RSC sent by the first terminal.
  • the first terminal after receiving the direct communication request carrying the RSC sent by the second terminal, the first terminal sends a key request message carrying the RSC to the first network node.
  • the direct communication request message may also carry the PRUK identifier and/or the first freshness parameter.
  • the key request message carrying the RSC sent by the first terminal is received. It is determined whether the first terminal is authorized to relay the service. If it is determined that the first terminal is authorized to provide the relay service, security policy information is determined based on the RSC and the mapping relationship between the RSC and the security policy. It should be noted that the PRUK identifier and/or the first freshness parameter may also be carried in the key request message.
  • a relay communication method is provided in this embodiment, where the method is performed by the first network node, and the method includes:
  • Step 51 Send a key response message carrying security policy information to the first terminal for the key request message.
  • the second terminal sends a direct communication request message to the first terminal.
  • the first terminal After receiving the direct communication request message, the first terminal sends a key request message to the first network node. After receiving the key request message, the first network node will send a key response message carrying security policy information to the first terminal. After receiving the key response message, the first terminal sends a direct security mode command message carrying security policy information to the second terminal.
  • the key response message also carries K NRP and/or a second freshness parameter, where the K NRP is used to generate a session key.
  • a relay communication method is provided in this embodiment, where the method is executed by the first network node, and the method includes:
  • Step 61 Receive a remote user key request message sent by the second terminal.
  • the remote user key request message is used to request to obtain PRUK and/or PRUK ID.
  • the first network node After the first network node receives the remote user key request message sent by the second terminal, it determines whether the second terminal is authorized for the relay service, and in response to determining that the second terminal is authorized for the relay service, sends a message carrying the PRUK and PRUK ID information.
  • a relay communication method is provided in this embodiment, where the method is performed by the first network node, and the method includes:
  • Step 71 Determine whether the second terminal is authorized to receive the relay service
  • Step 72 In response to the second terminal being authorized to receive the relay service, send the proximity communication service relay user key PRUK and/or the PRUK identifier to the second terminal.
  • a remote user key request message sent by the second terminal is received. It is determined whether the second terminal is authorized to receive the relay service. In response to the second terminal being authorized to receive the relay service, sending the proximity communication service relay user key PRUK and/or the PRUK identifier to the second terminal; or, in response to the second terminal not being authorized to receive the relay service, not Send the proximity communication service relay user key PRUK and/or the PRUK identifier to the second terminal.
  • a relay communication method is provided in this embodiment, where the method is executed by the first terminal, and the method includes:
  • Step 81 Receive security policy information sent by the first network node
  • the security policy information is at least used for user plane security protection of relay service data transmitted between the first terminal and the second terminal based on the PC5 when the second terminal performs relay communication with the network through the first terminal.
  • the network node involved in the present disclosure may be a core network element.
  • the first network node may be a PKMF.
  • the second network node may be a session management function (SMF, Session Management Function).
  • the terminals involved in the present disclosure may be, but not limited to, mobile phones, wearable devices, vehicle-mounted terminals, road side units (RSU, Road Side Unit), smart home terminals, industrial sensing devices and/or medical devices, etc.
  • RSU road side units
  • smart home terminals industrial sensing devices and/or medical devices, etc.
  • the base station involved in the present disclosure may be an access device for a terminal to access a network.
  • the base station may be various types of base stations, for example, a base station of a third-generation mobile communication (3G) network, a base station of a fourth-generation mobile communication (4G) network, a base station of a fifth-generation mobile communication (5G) network, or other Evolved base station.
  • 3G third-generation mobile communication
  • 4G fourth-generation mobile communication
  • 5G fifth-generation mobile communication
  • the user plane security protection includes: integrity protection and/or encryption of user plane data.
  • integrity protection and encryption of user plane data need to be performed on data transmitted between the first terminal and the second terminal. It should be noted that the communication between the first terminal and the second terminal is based on the PC5 protocol.
  • the first network node sends security policy information to the first terminal. After receiving the security policy information, the first terminal forwards the security policy information to the second terminal.
  • the second terminal sends a direct communication request message to the first terminal. After receiving the direct communication request message, the first terminal sends a key request message to the first network node. After receiving the key request message, the first network node will send a key response message carrying security policy information to the first terminal. After receiving the key response message, the first terminal sends a direct security mode command message carrying security policy information to the second terminal.
  • the first network node may determine the security policy information according to the relay service code (RSC, Relay Service Code) and the mapping relationship between the RSC and the security policy.
  • RSC relay service code
  • different RSCs may correspond to different security policy information.
  • Correspondence between different security policies and RSCs may be stored in a list form in advance, and after the first network node determines the target RSC, it may obtain the security policy information corresponding to the target RSC from the list by querying the list.
  • the first network node receives the RSC sent by the first terminal, where the RSC is sent by the second terminal to the first terminal. After receiving the RSC, it is determined whether the first terminal is authorized for the relay service. If it is determined that the first terminal is authorized to provide the relay service, security policy information is determined based on the RSC and the mapping relationship between the RSC and the security policy. It should be noted that the determination of the security policy information may be, but not limited to, the above manner.
  • the first terminal and the second terminal may perform security protection based on the security policy information when transmitting data of the relay service between the first terminal and the second terminal.
  • the first terminal obtains the discovery parameter, the PKMF address and the discovery security parameter from a Proximity Communications Service Name Management Function (DDNMF, Direct Discovery Name Management Function).
  • DDNMF Proximity Communications Service Name Management Function
  • the second terminal obtains the discovery parameter, the PKMF address and the discovery security parameter from the DDNMF.
  • the first terminal and the second terminal will perform a discovery process based on the discovery parameter and the discovery security parameter.
  • the DDNMF may be included in the first network node, or deployed separately.
  • a relay communication method is provided in this embodiment, where the method is executed by the first terminal, and the method includes:
  • Step 91 Receive the RSC sent by the second terminal
  • the RSC is used for the first network node to determine security policy information.
  • the first terminal receives the direct communication request carrying the RSC sent by the second terminal. After receiving the direct communication request message, the first terminal sends a key request message carrying the RSC to the first network node. After receiving the key request message, the first network node will send a key response message carrying security policy information to the first terminal. After receiving the key response message, the first terminal sends a direct security mode command message carrying security policy information to the second terminal.
  • the direct communication request may also carry the PRUK identifier and/or the first freshness parameter.
  • the key response message also carries K NRP and/or a second freshness parameter, where K NRP is used to generate the session key.
  • the first network node may determine the security policy information according to the RSC and the mapping relationship between the RSC and the security policy.
  • different RSCs may correspond to different security policy information.
  • the corresponding relationship between different security policies and RSCs may be stored in a list form in advance, and after the target RSC is determined, the security policy information corresponding to the target RSC may be obtained from the list by querying the list.
  • a relay communication method is provided in this embodiment, where the method is performed by the first terminal, and the method includes:
  • Step 101 Receive a direct communication request message carrying an RSC sent by a second terminal.
  • the direct communication request message carrying the RSC sent by the second terminal is received.
  • the first terminal After receiving the direct communication request message, the first terminal sends a key request message carrying the RSC to the first network node.
  • the first network node After receiving the key request message, the first network node will send a key response message carrying security policy information to the first terminal.
  • the first terminal After receiving the key response message, the first terminal sends a direct security mode command message carrying security policy information to the second terminal.
  • the direct communication request may also carry the PRUK identifier and/or the first freshness parameter.
  • the key response message also carries K NRP and/or a second freshness parameter, where K NRP is used to generate the session key.
  • This embodiment provides a relay communication method, wherein the method is executed by a first terminal, and the method includes: sending an RSC to a first network node.
  • the key request message may be to send a key request message carrying the RSC to the first network node.
  • the key request message also carries the PRUK identifier and/or the first freshness parameter.
  • a relay communication method is provided in this embodiment, where the method is performed by the first terminal, and the method includes:
  • Step 111 Receive a key response message carrying the security policy information sent by the first network node.
  • the first network node after receiving the key request message, the first network node sends a key response message carrying security policy information to the first terminal. After receiving the key response message, the first terminal sends a direct security mode command message carrying security policy information to the second terminal. It should be noted that the key response message also carries K NRP and/or the second freshness parameter, where K NRP is used to generate the session key.
  • a relay communication method is provided in this embodiment, where the method is executed by the first terminal, and the method includes:
  • Step 121 Send security policy information to the second terminal.
  • the second terminal sends a direct communication request message to the first terminal.
  • the first terminal After receiving the direct communication request message, the first terminal sends a key request message to the first network node. After receiving the key request message, the first network node will send a key response message carrying security policy information to the first terminal. After receiving the key response message, the first terminal sends a direct security mode command message carrying security policy information to the second terminal.
  • the first terminal and the second terminal may perform security protection based on the security policy information when transmitting data of the relay service between the first terminal and the second terminal.
  • a relay communication method is provided in this embodiment, where the method is performed by the first terminal, and the method includes:
  • Step 131 Send a direct security mode command message carrying security policy information to the second terminal.
  • the second terminal sends a direct communication request message to the first terminal.
  • the first terminal After receiving the direct communication request message, the first terminal sends a key request message to the first network node. After receiving the key request message, the first network node will send a key response message carrying security policy information to the first terminal. After receiving the key response message, the first terminal sends a direct security mode command message carrying security policy information to the second terminal.
  • the first terminal and the second terminal may perform security protection based on the security policy information when transmitting data of the relay service between the first terminal and the second terminal.
  • the direct security mode command message also carries the K NRP and/or the second freshness parameter; the K NRP is used to generate the session key.
  • the security mode command message is integrity protected by a session key generated based on the K NRP .
  • a relay communication method is provided in this embodiment, where the method is performed by the first terminal, and the method includes:
  • Step 141 Receive a direct security mode completion message sent by the second terminal.
  • a direct security mode command message carrying security policy information is sent to the second terminal, wherein the direct security mode command message also carries K NRP and/or a second freshness parameter; the security mode command message is passed based on K NRP
  • the generated session key is integrity protected.
  • the second terminal After receiving the direct security mode command message, the second terminal will perform integrity verification of the direct security mode command message. In response to the success of the integrity verification, it is determined that the first terminal is authorized to provide the relay service, and a direct security mode completion message is sent to the first terminal.
  • the direct security mode command message also carries the K NRP and/or the second freshness parameter; the K NRP is used to generate the session key.
  • the security mode command message is integrity protected by a session key generated based on the K NRP .
  • a relay communication method is provided in this embodiment, where the method is performed by the first terminal, and the method includes:
  • Step 151 Receive a message indicating the user plane security activation status of the Uu interface sent by the base station.
  • the base station may receive the security policy information sent by the second network node and activate the security protection of the user plane of the Uu interface based on the security policy information. Sending a message indicating the user plane security activation status of the Uu interface to the first terminal. After receiving the message indicating the user plane security activation state of the Uu interface sent by the base station, the first terminal determines whether the user plane security activation state of the Uu interface matches the security policy indicated by the security policy information provided by the first network node.
  • a relay communication method is provided in this embodiment, where the method is performed by the first terminal, and the method includes:
  • Step 161. Determine whether the user plane security activation status of the Uu interface matches the security policy indicated by the security policy information provided by the first network node;
  • Step 162 In response to the Uu interface user plane security activation state matching the security policy indicated by the security policy information provided by the first network node, activate the user plane security protection on the Uu interface and/or PC5 interface; or, in response to the Uu interface user plane security protection If the security activation status of the plane does not match the security policy information, a response message indicating an error is sent to the base station.
  • a relay communication method is provided in this embodiment, where the method is performed by the first terminal, and the method includes:
  • Step 171 Send a direct communication acceptance message to the second terminal, where the direct communication acceptance message carries the security activation status of the user plane of the PC5 interface.
  • the first terminal sends a direct communication acceptance message to the second terminal, where the direct communication acceptance message carries the user plane security activation status of the PC5 interface.
  • the second terminal determines whether the security activation state of the user plane of the PC5 interface matches the security policy indicated by the security policy information; in response to the match of the security activation state of the user plane of the PC5 interface with the security policy indicated by the security policy information, the second terminal activates the user plane of the PC5 interface Security protection; or, in response to a mismatch between the security activation state of the PC5 interface user plane and the security policy indicated by the security policy information, the second terminal sends a response message indicating an error to the first terminal.
  • a relay communication method is provided in this embodiment, where the method is performed by the first terminal, and the method includes:
  • Step 181 In response to receiving the direct security mode completion message, send a request message for initiating a PDU session establishment process to the second network node.
  • a request message for initiating a PDU session establishment procedure is sent to the second network node.
  • the second network node acquires security policy information from the first network node. The security policy indicated by the security policy information is set as the user plane security policy of the PDU session requested by the first terminal.
  • a relay communication method is provided in this embodiment, where the method is performed by the first terminal, and the method includes:
  • Step 191. Obtain at least one of the following information from the first network node: a discovery parameter, an address of the first network node, and a discovery security parameter.
  • the first terminal acquires the discovery parameter, the PKMF address and the discovery security parameter from the proximity communication service name management function.
  • the second terminal obtains the discovery parameter, the PKMF address and the discovery security parameter from the DDNMF.
  • the first terminal and the second terminal will perform a discovery process based on the discovery parameter and the discovery security parameter.
  • the DDNMF may be included in the first network node, or deployed separately.
  • a relay communication method is provided in this embodiment, where the method is performed by a second terminal, and the method includes:
  • Step 201 receiving security policy information sent by the first terminal
  • the security policy information is at least used for user plane security protection of relay service data transmitted between the first terminal and the second terminal based on the PC5 when the second terminal performs relay communication with the network through the first terminal.
  • the network node involved in the present disclosure may be a core network element.
  • the first network node may be a PKMF.
  • the second network node may be a session management function (SMF, Session Management Function).
  • the terminals involved in the present disclosure may be, but not limited to, mobile phones, wearable devices, vehicle-mounted terminals, road side units (RSU, Road Side Unit), smart home terminals, industrial sensing devices and/or medical devices, etc.
  • RSU road side units
  • smart home terminals industrial sensing devices and/or medical devices, etc.
  • the base station involved in the present disclosure may be an access device for a terminal to access a network.
  • the base station may be various types of base stations, for example, a base station of a third-generation mobile communication (3G) network, a base station of a fourth-generation mobile communication (4G) network, a base station of a fifth-generation mobile communication (5G) network, or other Evolved base station.
  • 3G third-generation mobile communication
  • 4G fourth-generation mobile communication
  • 5G fifth-generation mobile communication
  • the user plane security protection includes: integrity protection and/or encryption of user plane data.
  • integrity protection and encryption of user plane data need to be performed on data transmitted between the first terminal and the second terminal. It should be noted that the communication between the first terminal and the second terminal is based on the PC5 protocol.
  • the first network node sends security policy information to the first terminal. After receiving the security policy information, the first terminal forwards the security policy information to the second terminal.
  • the second terminal sends a direct communication request message to the first terminal. After receiving the direct communication request message, the first terminal sends a key request message to the first network node. After receiving the key request message, the first network node will send a key response message carrying security policy information to the first terminal. After receiving the key response message, the first terminal sends a direct security mode command message carrying security policy information to the second terminal.
  • the first network node may determine the security policy information according to a relay service code (RSC, Relay Service Code) and a mapping relationship between the RSC and the security policy.
  • RSC relay service code
  • different RSCs may correspond to different security policy information.
  • Correspondence between different security policies and RSCs may be stored in a list form in advance, and after the first network node determines the target RSC, it may obtain the security policy information corresponding to the target RSC from the list by querying the list.
  • the first network node receives the RSC sent by the first terminal. After receiving the RSC, it is determined whether the first terminal is authorized for the relay service. If it is determined that the first terminal is authorized to provide the relay service, security policy information is determined based on the RSC and the mapping relationship between the RSC and the security policy. It should be noted that the determination of the security policy information may be, but not limited to, the above manner.
  • the first terminal and the second terminal may perform security protection based on the security policy information when transmitting data of the relay service between the first terminal and the second terminal.
  • the first terminal obtains the discovery parameter, the PKMF address and the discovery security parameter from a Proximity Communications Service Name Management Function (DDNMF, Direct Discovery Name Management Function).
  • DDNMF Proximity Communications Service Name Management Function
  • the second terminal obtains the discovery parameter, the PKMF address and the discovery security parameter from the DDNMF.
  • the first terminal and the second terminal will perform a discovery process based on the discovery parameter and the discovery security parameter.
  • the DDNMF may be included in the first network node, or deployed separately.
  • a relay communication method is provided in this embodiment, where the method is performed by a second terminal, and the method includes:
  • Step 211 sending the RSC to the first terminal
  • the RSC is used for the first network node to determine security policy information.
  • the second terminal sends the RSC to the first terminal.
  • the first terminal sends a key request message carrying the RSC to the first network node. It is determined whether the first terminal is authorized to relay the service. If it is determined that the first terminal is authorized to provide the relay service, security policy information is determined based on the RSC and the mapping relationship between the RSC and the security policy. It should be noted that the PRUK identifier and/or the first freshness parameter may also be carried in the key request message.
  • the RSCs sent by the first terminal are different. Different RSCs correspond to different security policy information.
  • the first RSC corresponds to the first security policy information
  • the second RSC corresponds to the second security policy information.
  • the first network node may determine that the security policy information is the first security policy information based on the first RSC after receiving the first RSC. policy information.
  • a relay communication method is provided in this embodiment, where the method is performed by a second terminal, and the method includes:
  • Step 221 Send a direct communication request message carrying the RSC to the first terminal.
  • the direct communication request message also carries the PRUK identifier and/or the first freshness parameter.
  • a relay communication method is provided in this embodiment, where the method is performed by a second terminal, and the method includes:
  • Step 231 Receive a direct security mode command message carrying security policy information sent by the first terminal.
  • the second terminal sends a direct communication request message to the first terminal.
  • the first terminal After receiving the direct communication request message, the first terminal sends a key request message to the first network node. After receiving the key request message, the first network node will send a key response message carrying security policy information to the first terminal. After receiving the key response message, the first terminal sends a direct security mode command message carrying security policy information to the second terminal.
  • the first terminal and the second terminal acquire the security policy information, they may perform security protection based on the security policy information when transmitting data of the relay service between the first terminal and the second terminal.
  • the direct security mode command message also carries the K NRP and/or the second freshness parameter; the K NRP is used to generate the session key.
  • the security mode command message is integrity protected by a session key generated based on the K NRP .
  • a relay communication method is provided in this embodiment, where the method is performed by a second terminal, and the method includes:
  • Step 241 performing integrity verification of the direct security mode command message
  • Step 242 in response to successful integrity verification, determine that the first terminal is authorized to provide relay services
  • Step 243 In response to the success of the integrity verification, send a direct security mode completion message to the first terminal.
  • the first terminal sends a direct security mode command message carrying security policy information to the second terminal, wherein the direct security mode command message also carries K NRP and/or a second freshness parameter; the security mode command message passes Integrity protection based on the session key generated by K NRP .
  • the second terminal After receiving the direct security mode command message, the second terminal will perform integrity verification of the direct security mode command message. In response to the success of the integrity verification, it is determined that the first terminal is authorized to provide the relay service, and a direct security mode completion message is sent to the first terminal.
  • the direct security mode command message also carries the K NRP and/or the second freshness parameter; the K NRP is used to generate the session key.
  • the security mode command message is integrity protected by a session key generated based on the K NRP .
  • a relay communication method is provided in this embodiment, where the method is performed by a second terminal, and the method includes:
  • Step 251 Receive a direct communication acceptance message sent by the first terminal, where the direct communication acceptance message carries the user plane security activation status of the PC5 interface.
  • the base station may receive the security policy information sent by the second network node and activate the security protection of the user plane of the Uu interface based on the security policy information. Sending a message indicating the user plane security activation status of the Uu interface to the first terminal. After receiving the message indicating the user plane security activation state of the Uu interface sent by the base station, the first terminal determines whether the user plane security activation state of the Uu interface matches the security policy indicated by the security policy information provided by the first network node.
  • a relay communication method is provided in this embodiment, where the method is performed by a second terminal, and the method includes:
  • Step 261 determine whether the security activation state of the user plane of the PC5 interface matches the security policy indicated by the security policy information
  • Step 262 In response to the match between the security activation state of the user plane of the PC5 interface and the security policy indicated by the security policy information, activate the security protection of the user plane of the PC5 interface; or, in response to the security activation status of the user plane of the PC5 interface and the security policy indicated by the security policy information If the policy does not match, a response message indicating an error is sent to the first terminal.
  • this embodiment provides a relay communication method, wherein the method is performed by the second terminal, and the method includes:
  • Step 271 Send a remote user key request message to the first network node of the first terminal.
  • the remote user key request message is used to request to obtain PRUK and/or PRUK ID.
  • the first network node After the first network node receives the remote user key request message sent by the second terminal, it determines whether the second terminal is authorized for the relay service, and in response to determining that the second terminal is authorized for the relay service, sends a message carrying the PRUK and PRUK ID information.
  • a relay communication method is provided in this embodiment, where the method is performed by a second terminal, and the method includes:
  • Step 281 Receive the PRUK and/or PRUK identifier sent by the first network node for the remote user key request message.
  • a remote user key request message sent by the second terminal is received. It is determined whether the second terminal is authorized to receive the relay service. In response to the second terminal being authorized to receive the relay service, sending the proximity communication service relay user key PRUK and/or the PRUK identifier to the second terminal; or, in response to the second terminal not being authorized to receive the relay service, not Send the proximity communication service relay user key PRUK and/or the PRUK identifier to the second terminal.
  • a relay communication method is provided in this embodiment, where the method is performed by a second terminal, and the method includes:
  • Step 291. Obtain at least one of the following information from the first network node: a discovery parameter, an address of the first network node, and a discovery security parameter.
  • the first terminal acquires the discovery parameter, the PKMF address and the discovery security parameter from the proximity communication service name management function.
  • the second terminal obtains the discovery parameter, the PKMF address and the discovery security parameter from the DDNMF.
  • the first terminal and the second terminal will perform a discovery process based on the discovery parameter and the discovery security parameter.
  • the DDNMF may be included in the first network node, or deployed separately.
  • a relay communication method is provided in this embodiment, where the method is performed by a second network node, and the method includes:
  • Step 301 Obtain security policy information from the first network node
  • the security policy information is at least used for user plane security protection of relay service data transmitted between the first terminal and the second terminal based on the PC5 when the second terminal performs relay communication with the network through the first terminal.
  • the network node involved in the present disclosure may be a core network element.
  • the first network node may be a PKMF.
  • the second network node may be a session management function (SMF, Session Management Function).
  • the terminals involved in the present disclosure may be, but not limited to, mobile phones, wearable devices, vehicle-mounted terminals, road side units (RSU, Road Side Unit), smart home terminals, industrial sensing devices and/or medical devices, etc.
  • RSU road side units
  • smart home terminals industrial sensing devices and/or medical devices, etc.
  • the base station involved in the present disclosure may be an access device for a terminal to access a network.
  • the base station may be various types of base stations, for example, a base station of a third-generation mobile communication (3G) network, a base station of a fourth-generation mobile communication (4G) network, a base station of a fifth-generation mobile communication (5G) network, or other Evolved base station.
  • 3G third-generation mobile communication
  • 4G fourth-generation mobile communication
  • 5G fifth-generation mobile communication
  • the user plane security protection includes: integrity protection and/or encryption of user plane data.
  • integrity protection and encryption of user plane data need to be performed on data transmitted between the first terminal and the second terminal. It should be noted that the communication between the first terminal and the second terminal is based on the PC5 protocol.
  • the first network node sends security policy information to the first terminal. After receiving the security policy information, the first terminal forwards the security policy information to the second terminal.
  • the second terminal sends a direct communication request message to the first terminal. After receiving the direct communication request message, the first terminal sends a key request message to the first network node. After receiving the key request message, the first network node will send a key response message carrying security policy information to the first terminal. After receiving the key response message, the first terminal sends a direct security mode command message carrying security policy information to the second terminal.
  • the first network node may determine the security policy information according to the relay service code (RSC, Relay Service Code) and the mapping relationship between the RSC and the security policy.
  • RSC relay service code
  • different RSCs may correspond to different security policy information.
  • Correspondence between different security policies and RSCs may be stored in a list form in advance, and after the first network node determines the target RSC, it may obtain the security policy information corresponding to the target RSC from the list by querying the list.
  • the first network node receives the RSC sent by the first terminal. After receiving the RSC, it is determined whether the first terminal is authorized for the relay service. If it is determined that the first terminal is authorized to provide the relay service, security policy information is determined based on the RSC and the mapping relationship between the RSC and the security policy. It should be noted that the determination of the security policy information may be, but not limited to, the above manner.
  • the first terminal and the second terminal may perform security protection based on the security policy information when transmitting data of the relay service between the first terminal and the second terminal.
  • the first terminal obtains the discovery parameter, the PKMF address and the discovery security parameter from a Proximity Communications Service Name Management Function (DDNMF, Direct Discovery Name Management Function).
  • DDNMF Proximity Communications Service Name Management Function
  • the second terminal obtains the discovery parameter, the PKMF address and the discovery security parameter from the DDNMF.
  • the first terminal and the second terminal will perform a discovery process based on the discovery parameter and the discovery security parameter.
  • the DDNMF may be included in the first network node, or deployed separately.
  • a relay communication method is provided in this embodiment, where the method is performed by a second network node, and the method includes:
  • Step 311 Obtain the security policy information from the first network node in response to receiving a request message from the first terminal for initiating a protocol data unit (PDU) session establishment process.
  • PDU protocol data unit
  • the first terminal in response to receiving the direct security mode completion message, sends a request message for initiating a PDU session establishment process to the second network node.
  • the second network node acquires security policy information from the first network node. Setting the security policy indicated by the security policy information as the user plane security policy of the PDU session requested by the first terminal.
  • a relay communication method is provided in this embodiment, where the method is performed by a second network node, and the method includes:
  • Step 321 Set the security policy indicated by the security policy information as the user plane security policy of the PDU session requested by the first terminal.
  • Step 322 sending security policy information to the base station.
  • a request message for initiating a protocol data unit PDU session establishment procedure is sent to the second network node.
  • the second network node acquires security policy information from the first network node. Setting the security policy indicated by the security policy information as the user plane security policy of the PDU session requested by the first terminal. Send security policy information to the base station.
  • a relay communication method is provided in this embodiment, where the method is performed by a base station, and the method includes:
  • Step 331 Receive security policy information sent by the second network node
  • the security policy information is at least used for user plane security protection of relay service data transmitted between the first terminal and the second terminal based on the PC5 when the second terminal performs relay communication with the network through the first terminal.
  • a request message for initiating a PDU session establishment procedure is sent to the second network node.
  • the second network node acquires security policy information from the first network node.
  • the security policy indicated by the security policy information is set as the user plane security policy of the PDU session requested by the first terminal.
  • the base station also sends a message indicating the user plane security activation status of the Uu interface to the first terminal.
  • the first terminal determines whether the user plane security activation state of the Uu interface matches the security policy indicated by the security policy information provided by the first network node.
  • the first terminal determines whether the user plane security activation state of the Uu interface matches the security policy indicated by the security policy information provided by the first network node.
  • a relay communication method is provided in this embodiment, where the method is performed by a base station, and the method includes:
  • Step 341 activate the user plane security protection of the Uu interface based on the security policy information.
  • the user plane security protection includes integrity protection and encryption.
  • a relay communication method is provided in this embodiment, where the method is performed by a base station, and the method includes:
  • Step 351 Send a message indicating the user plane security activation status of the Uu interface to the first terminal.
  • the base station may receive the security policy information sent by the second network node and activate the security protection of the user plane of the Uu interface based on the security policy information. Sending a message indicating the user plane security activation status of the Uu interface to the first terminal.
  • a relay communication method is provided in this embodiment, where the method is performed by a base station, and the method includes:
  • Step 361 Receive an error indication response message sent by the first terminal, where the error indication response message is used to indicate that the Uu interface user plane security activation state does not match the security policy indicated by the security policy information.
  • the base station sends a message indicating the user plane security activation state of the Uu interface to the first terminal.
  • the first terminal determines whether the user plane security activation state of the Uu interface matches the security policy indicated by the security policy information provided by the first network node.
  • the first terminal determines whether the user plane security activation state of the Uu interface matches the security policy indicated by the security policy information provided by the first network node.
  • a relay communication method is provided in this embodiment, the method includes:
  • Step 1a the second terminal obtains the discovery parameter and the address of the first network node from the ProSe name management function.
  • Step 2a the second terminal obtains the discovery security parameter from the proximity communication service name management function.
  • Step 3a the first terminal obtains the discovery parameter and the address of the first network node from the ProSe name management function.
  • Step 4a the first terminal obtains the discovery security parameter from the proximity communication service name management function.
  • Step 5a the second terminal sends a remote key request message to the first network node of the first terminal.
  • step 6a the first network node sends a key response message carrying security policy information to the first terminal in response to the key request message.
  • the key response message carries the proximity communication service relay user key PRUK and the PRUK identifier.
  • Step 7a execute the discovery process.
  • Step 8a the second terminal sends a direct communication request message to the first terminal, wherein the direct communication request message carries a PRUK identifier, a relay service code RSC and a first freshness parameter.
  • Step 9a the first terminal sends a key request message to the first network node, wherein the key request message carries a PRUK identifier, a relay service code RSC and a first freshness parameter.
  • Step 10a the first network node sends a key response message carrying security policy information to the first terminal in response to the key request message, where the key response message carries K NRP and a second freshness parameter.
  • the first network node which may be the PKMF
  • the 5G PKMF will check whether the U2N relay (which may be the first terminal) is authorized to act as the intermediate node of the remote UE (which may be the second terminal). continue. If the U2N relay is authorized to provide the relay service, the 5G PKMF generates the second freshness parameter and derives K NRP .
  • 5G PKMF selects the PC5UP security policy for the relay service according to the received RSC and the PC5UP security policy configuration list of all the relay services it supports. Then, the PKMF sends to the U2N relay a key response message containing K NRP , freshness parameter 2 (the second freshness parameter) and the PC5UP security policy of the requested relay service. In this way, the U2N relay is configured with the PC5UP security policy of the relay service.
  • Step 11a the first terminal sends a direct security mode command message carrying security policy information to the second terminal, wherein the direct security mode command message also carries K NRP and a second freshness parameter.
  • the U2N relay may send a Direct Security Mode Command message to the remote UE, and the message includes K NRP , K NRP freshness parameter 2 and PC5UP security policy requesting relay service.
  • Direct security mode command messages are integrity protected using the KNRP-derived session key KNRP-SESS, so the PC5UP security policy for the requested relay service is protected over the PC5 link.
  • Step 12a modify the authorization of the first terminal.
  • the remote UE derives the K NRP and the session key KNRP-SESS in the same way as the U2N relay, and processes the direct security mode command.
  • the remote UE then verifies the integrity of the Direct Security Mode Command message. If successful, the remote UE is assured that the U2N relay is authorized to provide relay services. Then, the remote UE stores the PC5 user plane UP security policy of the relay service received from the U2N relay.
  • Step 13a the second terminal sends a direct security mode completion message to the first terminal.
  • the remote UE responds to the U2N relay with a direct security mode complete message.
  • Direct security mode completion messages are encrypted and integrity protected.
  • Step 14a modify the authorization of the second terminal.
  • the U2N relay verifies the integrity of the direct security mode completion message. If successful, the U2N relay ensures that the remote UE is authorized to obtain relay services.
  • Step 15a complete the rest of the relay service process.
  • the remote UE and the U2N relay may continue the rest of the relay service process through the secure PC5 link.
  • the U2N Relay After the U2N Relay (corresponding to the first terminal) confirms that the Remote UE (corresponding to the second terminal) is authorized to obtain the Relay service after successfully verifying the Direct Security Mode Complete message from the Remote UE, the U2N Relay initiates a new PDU session establishment process to the SMF .
  • a relay communication method is provided in this embodiment, the method includes:
  • Step 1b Obtain security policy information from the first network node.
  • it may be the UP security policy for the SMF (corresponding to the second network node) to obtain the service of the U2N Relay relay from the 5G PKMF.
  • Step 2b Set the security policy indicated by the security policy information as the user plane security policy of the PDU session requested by the first terminal.
  • the SMF sets the UP security policy of the relay service as the UP security policy of the requested PDU session, and provides the UP security policy to the NG-RAN.
  • Step 3b Activate the user plane security protection of the Uu interface based on the security policy information.
  • the U2N relay checks whether the received Uu UP security activation status matches the PC5UP security policy provided by 5G PKMF. If they match, the U2N relay activates UP security on its Uu interface and PC5 interface. If they do not match, the U2N relay returns an error message to the NG-RAN.
  • the method may also include: the U2N relay sends a Direct Communication Accept message to the Remote UE, and accepts the establishment of the PC5 connection, including its PC5UP security activation status. The entire message is protected by PC5 signaling security, so the PC5UP security activation indication sent from the relay is protected. At the same time, the U2N relay sends a remote UE report to its SMF.
  • the method may further include: the remote UE checks whether the received PC5UP security activation status matches the PC5UP security policy provided by the 5G PKMF. If they match, the remote UE activates its PC5UP security. If they do not match, the remote UE returns an error message to the U2N relay.
  • the method may also include: the service data relayed between the remote UE and the network through the PC5 link and the Uu link is now protected and sent according to the UP security policy of the relay service.
  • Example 1 and Example 2 can be implemented in combination.
  • an embodiment of the present disclosure provides a relay communication device, wherein the device includes:
  • the security policy information is at least used for user plane security protection of relay service data transmitted between the first terminal and the second terminal based on the PC5 when the second terminal performs relay communication with the network through the first terminal.
  • an embodiment of the present disclosure provides a relay communication device, wherein the device includes:
  • a receiving module 401 configured to receive security policy information sent by the first terminal
  • the security policy information is at least used for user plane security protection of relay service data transmitted between the first terminal and the second terminal based on the PC5 when the second terminal performs relay communication with the network through the first terminal.
  • an embodiment of the present disclosure provides a relay communication device, wherein the device includes:
  • a receiving module 411 configured to receive security policy information sent by the first terminal
  • the security policy information is at least used for user plane security protection of relay service data transmitted between the first terminal and the second terminal based on the PC5 when the second terminal performs relay communication with the network through the first terminal.
  • an embodiment of the present disclosure provides a relay communication device, wherein the device includes:
  • An obtaining module 421, configured to obtain security policy information from the first network node
  • the security policy information is at least used for user plane security protection of relay service data transmitted between the first terminal and the second terminal based on the PC5 when the second terminal performs relay communication with the network through the first terminal.
  • an embodiment of the present disclosure provides a relay communication device, wherein the device includes:
  • a receiving module 431, configured to receive the security policy information sent by the second network node
  • the security policy information is at least used for user plane security protection of relay service data transmitted between the first terminal and the second terminal based on the PC5 when the second terminal performs relay communication with the network through the first terminal.
  • An embodiment of the present disclosure provides a communication device, which includes:
  • memory for storing processor-executable instructions
  • the processor is configured to implement the method applied to any embodiment of the present disclosure when executing the executable instructions.
  • the processor may include various types of storage media, which are non-transitory computer storage media, and can continue to memorize and store information thereon after the communication device is powered off.
  • the processor can be connected to the memory through a bus or the like, and is used to read the executable program stored in the memory.
  • An embodiment of the present disclosure further provides a computer storage medium, wherein the computer storage medium stores a computer executable program, and when the executable program is executed by a processor, the method of any embodiment of the present disclosure is implemented.
  • an embodiment of the present disclosure provides a terminal structure.
  • this embodiment provides a terminal 800, which specifically can be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a game console, a tablet device, a medical device, a fitness device, a personal digital assistant, etc. .
  • the terminal 800 may include one or more of the following components: a processing component 802, a memory 804, a power supply component 806, a multimedia component 808, an audio component 810, an input/output (I/O) interface 812, a sensor component 814, and communication component 816 .
  • the processing component 802 generally controls the overall operations of the terminal 800, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations.
  • the processing component 802 may include one or more processors 820 to execute instructions to complete all or part of the steps of the above method. Additionally, processing component 802 may include one or more modules that facilitate interaction between processing component 802 and other components. For example, processing component 802 may include a multimedia module to facilitate interaction between multimedia component 808 and processing component 802 .
  • the memory 804 is configured to store various types of data to support operations at the device 800 . Examples of such data include instructions for any application or method operating on the terminal 800, contact data, phonebook data, messages, pictures, videos, etc.
  • the memory 804 can be implemented by any type of volatile or non-volatile storage device or their combination, such as static random access memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable Programmable Read Only Memory (EPROM), Programmable Read Only Memory (PROM), Read Only Memory (ROM), Magnetic Memory, Flash Memory, Magnetic or Optical Disk.
  • SRAM static random access memory
  • EEPROM electrically erasable programmable read-only memory
  • EPROM erasable Programmable Read Only Memory
  • PROM Programmable Read Only Memory
  • ROM Read Only Memory
  • Magnetic Memory Flash Memory
  • Magnetic or Optical Disk Magnetic Disk
  • the power supply component 806 provides power to various components of the terminal 800 .
  • Power components 806 may include a power management system, one or more power supplies, and other components associated with generating, managing, and distributing power for terminal 800 .
  • the multimedia component 808 includes a screen providing an output interface between the terminal 800 and the user.
  • the screen may include a liquid crystal display (LCD) and a touch panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive input signals from a user.
  • the touch panel includes one or more touch sensors to sense touches, swipes, and gestures on the touch panel. The touch sensor may not only sense a boundary of a touch or a swipe action, but also detect duration and pressure associated with the touch or swipe operation.
  • the multimedia component 808 includes a front camera and/or a rear camera. When the device 800 is in an operation mode, such as a shooting mode or a video mode, the front camera and/or the rear camera can receive external multimedia data. Each front camera and rear camera can be a fixed optical lens system or have focal length and optical zoom capability.
  • the audio component 810 is configured to output and/or input audio signals.
  • the audio component 810 includes a microphone (MIC), which is configured to receive an external audio signal when the terminal 800 is in an operation mode, such as a call mode, a recording mode and a voice recognition mode. Received audio signals may be further stored in memory 804 or sent via communication component 816 .
  • the audio component 810 also includes a speaker for outputting audio signals.
  • the I/O interface 812 provides an interface between the processing component 802 and a peripheral interface module, which may be a keyboard, a click wheel, a button, and the like. These buttons may include, but are not limited to: a home button, volume buttons, start button, and lock button.
  • the sensor component 814 includes one or more sensors for providing various aspects of a state assessment of the terminal 800 .
  • the sensor component 814 can detect the open/closed state of the device 800, the relative positioning of components, such as the display and the keypad of the terminal 800, the sensor component 814 can also detect the terminal 800 or a change in the position of a component of the terminal 800, and the user The presence or absence of contact with the terminal 800, the terminal 800 orientation or acceleration/deceleration and the temperature change of the terminal 800.
  • Sensor assembly 814 may include a proximity sensor configured to detect the presence of nearby objects in the absence of any physical contact.
  • Sensor assembly 814 may also include an optical sensor, such as a CMOS or CCD image sensor, for use in imaging applications.
  • the sensor component 814 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor or a temperature sensor.
  • the communication component 816 is configured to facilitate wired or wireless communication between the terminal 800 and other devices.
  • the terminal 800 can access a wireless network based on communication standards, such as Wi-Fi, 2G or 3G, or a combination thereof.
  • the communication component 816 receives broadcast signals or broadcast related information from an external broadcast management system via a broadcast channel.
  • the communication component 816 also includes a near field communication (NFC) module to facilitate short-range communication.
  • NFC near field communication
  • the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, Infrared Data Association (IrDA) technology, Ultra Wide Band (UWB) technology, Bluetooth (BT) technology and other technologies.
  • RFID Radio Frequency Identification
  • IrDA Infrared Data Association
  • UWB Ultra Wide Band
  • Bluetooth Bluetooth
  • terminal 800 may be programmed by one or more application specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing devices (DSPDs), programmable logic devices (PLDs), field programmable A gate array (FPGA), controller, microcontroller, microprocessor or other electronic component implementation for performing the methods described above.
  • ASICs application specific integrated circuits
  • DSPs digital signal processors
  • DSPDs digital signal processing devices
  • PLDs programmable logic devices
  • FPGA field programmable A gate array
  • controller microcontroller, microprocessor or other electronic component implementation for performing the methods described above.
  • non-transitory computer-readable storage medium including instructions, such as the memory 804 including instructions, which can be executed by the processor 820 of the terminal 800 to complete the above method.
  • the non-transitory computer readable storage medium may be ROM, random access memory (RAM), CD-ROM, magnetic tape, floppy disk, optical data storage device, and the like.
  • an embodiment of the present disclosure shows a structure of a base station.
  • the base station 900 may be provided as a network side device.
  • base station 900 includes processing component 922 , which further includes one or more processors, and a memory resource represented by memory 932 for storing instructions executable by processing component 922 , such as application programs.
  • the application program stored in memory 932 may include one or more modules each corresponding to a set of instructions.
  • the processing component 922 is configured to execute instructions, so as to perform any of the aforementioned methods applied to the base station.
  • Base station 900 may also include a power component 926 configured to perform power management of base station 900, a wired or wireless network interface 950 configured to connect base station 900 to a network, and an input-output (I/O) interface 958.
  • the base station 900 can operate based on an operating system stored in the memory 932, such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM or similar.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

本公开实施例提供了一种中继通信方法,其中,方法由第一网络节点执行,方法包括:向第一终端发送安全策略信息;其中,安全策略信息,至少用于:第二终端通过第一终端与网络进行中继通信时,第一终端和第二终端之间基于PC5传输的中继服务数据的用户面安全性保护。

Description

中继通信的方法、装置、通信设备及存储介质 技术领域
本公开涉及无线通信技术领域但不限于无线通信技术领域,尤其涉及一种中继通信的方法、装置、通信设备及存储介质。
背景技术
中继通信是在远端终端由于网络信号覆盖等原因不能够与网络进行通信时,可以利用中继终端的中继功能与网络继续通信。在一种场景下,远端终端可以将需要传输至网络的数据先传输给中继终端后,由中继终端将该据传输给网络;或者,网络可以将需要传输至远端终端的数据先传输给中继终端后,由中继终端将该数据传输给远端终端,从而实现远端终端和网络之间的通信。
相关技术中,在进行中继通信的过程中,需要对远端终端与网络之间传输的数据进行安全性保护以减少安全隐患。
发明内容
本公开实施例公开了一种中继通信的方法、装置、通信设备及存储介质。
根据本公开实施例的第一方面,提供一种中继通信方法,其中,所述方法由第一网络节点执行,所述方法包括:
向第一终端发送安全策略信息;
其中,所述安全策略信息,至少用于:第二终端通过所述第一终端与网络进行中继通信时,第一终端和所述第二终端之间基于PC5传输的中继服务数据的用户面安全性保护。
根据本公开实施例的第二方面,提供一种中继通信方法,其中,所述方法由第一终端执行,所述方法包括:
接收第一网络节点发送的安全策略信息;
其中,所述安全策略信息,至少用于:第二终端通过第一终端与网络进行中继通信时,第一终端和所述第二终端之间基于PC5传输的中继服务数据的用户面安全性保护。
根据本公开实施例的第三方面,提供一种中继通信方法,其中,所述方法由第二终端执行,所述方法包括:
接收第一终端发送的安全策略信息;
其中,所述安全策略信息,至少用于:第二终端通过所述第一终端与网络进行中继通信时,第一终端和所述第二终端之间基于PC5传输的中继服务数据的用户面安全性保护。
根据本公开实施例的第四方面,提供一种中继通信方法,其中,所述方法由第二网络节点执行,所述方法包括:
从所述第一网络节点获取安全策略信息;
其中,所述安全策略信息,至少用于:第二终端通过所述第一终端与网络进行中继通信时,第一终端和所述第二终端之间基于PC5传输的中继服务数据的用户面安全性保护。
根据本公开实施例的第五方面,提供一种中继通信方法,其中,所述方法由基站执行,所述方法包括:
接收第二网络节点发送的安全策略信息;
其中,所述安全策略信息,至少用于:第二终端通过所述第一终端与网络进行中继通信时,第一终端和所述第二终端之间基于PC5传输的中继服务数据的用户面安全性保护。
根据本公开实施例的第六方面,提供一种中继通信装置,其中,装置包括:
发送模块,用于向第一终端发送安全策略信息;
其中,所述安全策略信息,至少用于:第二终端通过所述第一终端与网络进行中继通信时,第一终端和所述第二终端之间基于PC5传输的中继服务数据的用户面安全性保护。
根据本公开实施例的第七方面,提供一种中继通信装置,其中,所述装置包括:
接收模块,用于接收第一网络节点发送的安全策略信息;
其中,所述安全策略信息,至少用于:第二终端通过第一终端与网络进行中继通信时,第一终端和所述第二终端之间基于PC5传输的中继服务数据的用户面安全性保护。
根据本公开实施例的第八方面,提供一种中继通信装置,其中,所述装置包括:
接收模块,用于接收第一终端发送的安全策略信息;
其中,所述安全策略信息,至少用于:第二终端通过所述第一终端与网络进行中继通信时,第一终端和所述第二终端之间基于PC5传输的中继服务数据的用户面安全性保护。
根据本公开实施例的第九方面,提供一种中继通信装置,其中,所述装置包括:
获取模块,用于从所述第一网络节点获取安全策略信息;
其中,所述安全策略信息,至少用于:第二终端通过所述第一终端与网络进行中继通信时,第一终端和所述第二终端之间基于PC5传输的中继服务数据的用户面安全性保护。
根据本公开实施例的第十方面,提供一种中继通信装置,其中,所述装置包括:
接收模块,用于接收第二网络节点发送的用安全策略信息;
其中,所述安全策略信息,至少用于:第二终端通过所述第一终端与网络进行中继通信时,第一终端和所述第二终端之间基于PC5传输的中继服务数据的用户面安全性保护。
根据本公开实施例的第十一方面,提供一种通信设备,所述通信设备,包括:
处理器;
用于存储所述处理器可执行指令的存储器;
其中,所述处理器被配置为:用于运行所述可执行指令时,实现本公开任意实施例所述的方法。
根据本公开实施例的第十二方面,提供一种计算机存储介质,所述计算机存储介质存储有计算机可执行程序,所述可执行程序被处理器执行时实现本公开任意实施例所述的方法。
在本公开实施例中,向第一终端发送安全策略信息;其中,所述安全策略信息,至少用于:第二终 端通过所述第一终端与网络进行中继通信时,第一终端和所述第二终端之间基于PC5传输的中继服务数据的用户面安全性保护。如此,在第二终端通过所述第一终端与网络进行中继通信时,就可以基于所述安全策略信息对第一终端和所述第二终端之间基于PC5传输的中继服务数据的用户面进行安全性保护,相较于在进行中继服务数据传输时不能执行安全保护的方式,可以使得第二终端与网络之间的中继数据的传输更加安全。
附图说明
图1是根据一示例性实施例示出的一种无线通信系统的结构示意图。
图2是根据一示例性实施例示出的一种中继通信方法的流程示意图。
图3是根据一示例性实施例示出的一种中继通信方法的流程示意图。
图4是根据一示例性实施例示出的一种中继通信方法的流程示意图。
图5是根据一示例性实施例示出的一种中继通信方法的流程示意图。
图6是根据一示例性实施例示出的一种中继通信方法的流程示意图。
图7是根据一示例性实施例示出的一种中继通信方法的流程示意图。
图8是根据一示例性实施例示出的一种中继通信方法的流程示意图。
图9是根据一示例性实施例示出的一种中继通信方法的流程示意图。
图10是根据一示例性实施例示出的一种中继通信方法的流程示意图。
图11是根据一示例性实施例示出的一种中继通信方法的流程示意图。
图12是根据一示例性实施例示出的一种中继通信方法的流程示意图。
图13是根据一示例性实施例示出的一种中继通信方法的流程示意图。
图14是根据一示例性实施例示出的一种中继通信方法的流程示意图。
图15是根据一示例性实施例示出的一种中继通信方法的流程示意图。
图16是根据一示例性实施例示出的一种中继通信方法的流程示意图。
图17是根据一示例性实施例示出的一种中继通信方法的流程示意图。
图18是根据一示例性实施例示出的一种中继通信方法的流程示意图。
图19是根据一示例性实施例示出的一种中继通信方法的流程示意图。
图20是根据一示例性实施例示出的一种中继通信方法的流程示意图。
图21是根据一示例性实施例示出的一种中继通信方法的流程示意图。
图22是根据一示例性实施例示出的一种中继通信方法的流程示意图。
图23是根据一示例性实施例示出的一种中继通信方法的流程示意图。
图24是根据一示例性实施例示出的一种中继通信方法的流程示意图。
图25是根据一示例性实施例示出的一种中继通信方法的流程示意图。
图26是根据一示例性实施例示出的一种中继通信方法的流程示意图。
图27是根据一示例性实施例示出的一种中继通信方法的流程示意图。
图28是根据一示例性实施例示出的一种中继通信方法的流程示意图。
图29是根据一示例性实施例示出的一种中继通信方法的流程示意图。
图30是根据一示例性实施例示出的一种中继通信方法的流程示意图。
图31是根据一示例性实施例示出的一种中继通信方法的流程示意图。
图32是根据一示例性实施例示出的一种中继通信方法的流程示意图。
图33是根据一示例性实施例示出的一种中继通信方法的流程示意图。
图34是根据一示例性实施例示出的一种中继通信方法的流程示意图。
图35是根据一示例性实施例示出的一种中继通信方法的流程示意图。
图36是根据一示例性实施例示出的一种中继通信方法的流程示意图。
图37是根据一示例性实施例示出的一种中继通信方法的流程示意图。
图38是根据一示例性实施例示出的一种中继通信方法的流程示意图。
图39是根据一示例性实施例示出的一种中继通信装置的示意图。
图40是根据一示例性实施例示出的一种中继通信装置的示意图。
图41是根据一示例性实施例示出的一种中继通信装置的示意图。
图42是根据一示例性实施例示出的一种中继通信装置的示意图。
图43是根据一示例性实施例示出的一种中继通信装置的示意图。
图44是根据一示例性实施例示出的一种终端的结构示意图。
图45是根据一示例性实施例示出的一种基站的框图。
具体实施方式
这里将详细地对示例性实施例进行说明,其示例表示在附图中。下面的描述涉及附图时,除非另有表示,不同附图中的相同数字表示相同或相似的要素。以下示例性实施例中所描述的实施方式并不代表与本公开实施例相一致的所有实施方式。相反,它们仅是与如所附权利要求书中所详述的、本公开实施例的一些方面相一致的装置和方法的例子。
在本公开实施例使用的术语是仅仅出于描述特定实施例的目的,而非旨在限制本公开实施例。在本公开实施例和所附权利要求书中所使用的单数形式的“一种”和“该”也旨在包括多数形式,除非上下文清楚地表示其他含义。还应当理解,本文中使用的术语“和/或”是指并包含一个或多个相关联的列出项目的任何或所有可能组合。
应当理解,尽管在本公开实施例可能采用术语第一、第二、第三等来描述各种信息,但这些信息不应限于这些术语。这些术语仅用来将同一类型的信息彼此区分开。例如,在不脱离本公开实施例范围的情况下,第一信息也可以被称为第二信息,类似地,第二信息也可以被称为第一信息。取决于语境,如在此所使用的词语“如果”可以被解释成为“在……时”或“当……时”或“响应于确定”。
出于简洁和便于理解的目的,本文在表征大小关系时,所使用的术语为“大于”或“小于”。但对于本领域技术人员来说,可以理解:术语“大于”也涵盖了“大于等于”的含义,“小于”也涵盖了“小于等于”的含义。
请参考图1,其示出了本公开实施例提供的一种无线通信系统的结构示意图。如图1所示,无线通 信系统是基于移动通信技术的通信系统,该无线通信系统可以包括:若干个用户设备110以及若干个基站120。
其中,用户设备110可以是指向用户提供语音和/或数据连通性的设备。用户设备110可以经无线接入网(Radio Access Network,RAN)与一个或多个核心网进行通信,用户设备110可以是物联网用户设备,如传感器设备、移动电话和具有物联网用户设备的计算机,例如,可以是固定式、便携式、袖珍式、手持式、计算机内置的或者车载的装置。例如,站(Station,STA)、订户单元(subscriber unit)、订户站(subscriber station),移动站(mobile station)、移动台(mobile)、远程站(remote station)、接入点、远程用户设备(remote terminal)、接入用户设备(access terminal)、用户装置(user terminal)、用户代理(user agent)、用户设备(user device)、或用户设备(user equipment)。或者,用户设备110也可以是无人飞行器的设备。或者,用户设备110也可以是车载设备,比如,可以是具有无线通信功能的行车电脑,或者是外接行车电脑的无线用户设备。或者,用户设备110也可以是路边设备,比如,可以是具有无线通信功能的路灯、信号灯或者其它路边设备等。
基站120可以是无线通信系统中的网络侧设备。其中,该无线通信系统可以是第四代移动通信技术(the 4th generation mobile communication,4G)系统,又称长期演进(Long Term Evolution,LTE)系统;或者,该无线通信系统也可以是5G系统,又称新空口系统或5G NR系统。或者,该无线通信系统也可以是5G系统的再下一代系统。其中,5G系统中的接入网可以称为NG-RAN(New Generation-Radio Access Network,新一代无线接入网)。
其中,基站120可以是4G系统中采用的演进型基站(eNB)。或者,基站120也可以是5G系统中采用集中分布式架构的基站(gNB)。当基站120采用集中分布式架构时,通常包括集中单元(central unit,CU)和至少两个分布单元(distributed unit,DU)。集中单元中设置有分组数据汇聚协议(Packet Data Convergence Protocol,PDCP)层、无线链路层控制协议(Radio Link Control,RLC)层、媒体访问控制(Media Access Control,MAC)层的协议栈;分布单元中设置有物理(Physical,PHY)层协议栈,本公开实施例对基站120的具体实现方式不加以限定。
基站120和用户设备110之间可以通过无线空口建立无线连接。在不同的实施方式中,该无线空口是基于第四代移动通信网络技术(4G)标准的无线空口;或者,该无线空口是基于第五代移动通信网络技术(5G)标准的无线空口,比如该无线空口是新空口;或者,该无线空口也可以是基于5G的更下一代移动通信网络技术标准的无线空口。
在一些实施例中,用户设备110之间还可以建立E2E(End to End,端到端)连接。比如车联网通信(vehicle to everything,V2X)中的V2V(vehicle to vehicle,车对车)通信、V2I(vehicle to Infrastructure,车对路边设备)通信和V2P(vehicle to pedestrian,车对人)通信等场景。
这里,上述用户设备可认为是下面实施例的终端设备。
在一些实施例中,上述无线通信系统还可以包含网络管理设备130。
若干个基站120分别与网络管理设备130相连。其中,网络管理设备130可以是无线通信系统中的核心网设备,比如,该网络管理设备130可以是演进的数据分组核心网(Evolved Packet Core,EPC)中的移动性管理实体(Mobility Management Entity,MME)。或者,该网络管理设备也可以是其它的核 心网设备,比如服务网关(Serving GateWay,SGW)、公用数据网网关(Public Data Network GateWay,PGW)、策略与计费规则功能单元(Policy and Charging Rules Function,PCRF)或者归属签约用户服务器(Home Subscriber Server,HSS)等。对于网络管理设备130的实现形态,本公开实施例不做限定。
为了便于本领域内技术人员理解,本公开实施例列举了多个实施方式以对本公开实施例的技术方案进行清晰地说明。当然,本领域内技术人员可以理解,本公开实施例提供的多个实施例,可以被单独执行,也可以与本公开实施例中其他实施例的方法结合后一起被执行,还可以单独或结合后与其他相关技术中的一些方法一起被执行;本公开实施例并不对此作出限定。
为了更好地理解本公开任一个实施例所描述的技术方案,首先,对相关技术中的中继通信的应用场景进行说明:
在一个实施例中,为用户到网络中继提供控制面和用户面的解决方案。针对基于用户面的解决方案,5G邻近通信业务(ProSe,Proximity-based Service)密钥管理功能(PKMF,ProSe Key Management Function)用于支持ProSe间接或者中继通信的PC5连接的安全密钥管理。在LTE中,为了确保LTE ProSe安全,引入了PKMF,用于ProSe间接或者中继通信的安全密钥管理,依赖于核心网络用户面的参考点PC8被用于向终端传输安全参数。
在一个实施例中,策略控制功能(PCF,Policy Control Function)用于在服务授权期间为ProSe直接通信提供PC5策略以保护PC5连接。相关技术中,没有关于如何为ProSe间接或者中继通信提供PC5安全策略的解决方案。由于引入5G PKMF为终端提供5G中ProSe间接或者中继通信的安全参数,本公开可以是旨在由5G PKMF通过用户面向终端提供PC5安全策略,以保护ProSe中继通信的PC5用户面安全。通过引入PKMF为ProSe中继通信的PC5连接提供PC5安全策略的功能。5G PKMF可以为ProSe中继通信正确配置PC5安全策略。5G PKMF可以将配置的PC5安全策略安全地提供给远程UE和中继UE。远程UE和中继UE上的PC5安全策略可以为请求的ProSe中继服务正确激活安全保护。
在一个实施例中,对于通过U2N中继的ProSe间接通信,需要建立PC5连接来承载远程UE和中继UE之间的信令和用户数据。PC5控制平面安全可以通过直接安全模式命令过程在远程UE和中继UE之间的PC5直接通信建立期间建立。
在一个实施例中,当远端终端向网络请求间接通信时,PC5用户面安全仅用于保护对端终端之间交换的ProSe业务数据。同时,它用于保护由远程终端请求的中继终端提供的连接服务。进一步地,中继终端提供的连通性服务用于支持网络通过中继终端向远程终端提供的中继服务。因此,用于ProSe中继通信的PC5用户面安全需要与网络提供的特定中继服务的用户面安全要求保持一致,对于加密和完整性保护,可以有“REQUIRED”或“PREFERRED”或“NOT NEEDED”。
在一个实施例中,PC5控制面安全始终是必需的,无需为远程终端请求的特定中继服务配置PC5控制面安全策略。PC5用户面安全策略与网络为远程终端请求的特定中继服务设置的用户面安全策略相同。
如图2所示,本实施例中提供一种中继通信方法,其中,该方法由第一网络节点执行,该方法包括:
步骤21、向第一终端发送安全策略信息;
其中,安全策略信息,至少用于:第二终端通过第一终端与网络进行中继通信时,第一终端和第二终端之间基于PC5传输的中继服务数据的用户面安全性保护。
这里,本公开所涉及的网络节点可以是核心网网元。例如,第一网络节点可以是PKMF。第二网络节点可以是会话管理功能(SMF,Session Management Function)。
这里,本公开所涉及的终端可以是但不限于是手机、可穿戴设备、车载终端、路侧单元(RSU,Road Side Unit)、智能家居终端、工业用传感设备和/或医疗设备等。
本公开中涉及的基站可以是终端接入网络的接入设备。这里,基站可以为各种类型的基站,例如,第三代移动通信(3G)网络的基站、第四代移动通信(4G)网络的基站、第五代移动通信(5G)网络的基站或其它演进型基站。
在一个实施例中,用户面安全性保护,包括:用户面数据的完整性保护和/或加密。例如,第一终端与第二终端之间的传输数据需要进行用户面数据的完整性保护和加密。需要说明的是,第一终端和第二终端之间基于PC5协议进行通信。
在一个实施例中,第一网络节点向第一终端发送安全策略信息。第一终端在接收到安全策略信息后会将安全策略信息转发给第二终端。
在一个实施例中,第二终端向第一终端发送直接通信请求消息。第一终端在接收到该直接通信请求消息后,向第一网络节点发送密钥请求消息。第一网络节点在接收到该密钥请求消息后,会向第一终端发送携带安全策略信息的密钥响应消息。第一终端在接收到该密钥响应消息后,会向第二终端发送携带安全策略信息的直接安全模式命令消息。
这里,第一网络节点可以是根据中继服务代码(RSC,Relay Service Code)以及RSC和安全策略之间的映射关系,确定安全策略信息。这里,不同的RSC可以是对应不同的安全策略信息。可以是预先将不同的安全策略和RSC之间的对应关系以列表形式进行存储,第一网络节点在确定目标RSC后,就可以通过查询列表的形式从列表中获得目标RSC对应的安全策略信息。
在一个实施例中,第一网络节点接收第一终端发送的RSC。在接收到该RSC后,确定第一终端是否被授权中继服务。若确定第一终端被授权提供中继服务,基于该RSC以及RSC和安全策略之间的映射关系,确定安全策略信息。需要说明的是,安全策略信息的确定可以是但不限于是上述方式。
这里,第一终端和第二终端在获取到该安全策略信息后,在第一终端和第二终端之间进行中继服务的数据的传输时,就可以基于该安全策略信息执行安全性保护。
在一个实施例中,第一终端从邻近通信服务名称管理功能(DDNMF,Direct Discovery Name Management Function)获取发现参数、PKMF地址和发现安全参数。第二终端从DDNMF获取发现参数、PKMF地址和发现安全参数。第一终端和第二终端会基于发现参数和发现安全参数执行发现流程。需要说明的是,DDNMF可以是包含在第一网络节点中,也可以是单独部署。
在本公开实施例中,向第一终端发送安全策略信息;其中,安全策略信息,至少用于:第二终端通 过第一终端与网络进行中继通信时,第一终端和第二终端之间基于PC5传输的中继服务数据的用户面安全性保护。如此,在第二终端通过第一终端与网络进行中继通信时,就可以基于安全策略信息对第一终端和第二终端之间基于PC5传输的中继服务数据的用户面进行安全性保护,相较于在进行中继服务数据传输时不能执行安全保护的方式,可以使得第二终端与网络之间的中继数据的传输更加安全。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图3所示,本实施例中提供一种中继通信方法,其中,该方法由第一网络节点执行,该方法包括:
步骤31、接收第一终端发送的中继服务代码RSC;
步骤32、响应于确定第一终端被授权提供中继服务,基于RSC以及RSC和安全策略之间的映射关系,确定安全策略信息。
在一个实施例中,第一网络节点接收第一终端发送的携带RSC的密钥请求消息。确定第一终端是否被授权中继服务。若确定第一终端被授权提供中继服务,基于该RSC以及RSC和安全策略之间的映射关系,确定安全策略信息。需要说明的是,密钥请求消息中还可以携带邻近通信业务中继用户密钥PRUK标识和/或第一新鲜性参数。
在一个实施例中,当中继服务的服务类型不同时,第一终端发送的RSC不同。不同的RSC对应的安全策略信息不同。在一个实施例中,第一RSC对应第一安全策略信息,第二RSC对应第二安全策略信息。当中继服务的服务类型为第一服务类型时,第一终端发送的RSC为第一RSC,则第一网络节点在接收到第一RSC后,可以基于第一RSC确定安全策略信息为第一安全策略信息。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图4所示,本实施例中提供一种中继通信方法,其中,该方法由第一网络节点执行,该方法包括:
步骤41、接收第一终端发送的携带RSC的密钥请求消息。
在一个实施例中,第一终端在接收到第二终端发送的携带RSC的直接通信请求后,向第一网络节点发送携带RSC的密钥请求消息。其中,直接通信请求消息还可以携带PRUK标识和/或第一新鲜性参数。
在一个实施例中,接收第一终端发送的携带RSC的密钥请求消息。确定第一终端是否被授权中继服务。若确定第一终端被授权提供中继服务,基于该RSC以及RSC和安全策略之间的映射关系,确定安全策略信息。需要说明的是,密钥请求消息中还可以携带PRUK标识和/或第一新鲜性参数。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图5所示,本实施例中提供一种中继通信方法,其中,该方法由第一网络节点执行,该方法包括:
步骤51、针对密钥请求消息向第一终端发送携带安全策略信息的密钥响应消息。
在一个实施例中,第二终端向第一终端发送直接通信请求消息。第一终端在接收到该直接通信请求消息后,向第一网络节点发送密钥请求消息。第一网络节点在接收到该密钥请求消息后,会向第一终端发送携带安全策略信息的密钥响应消息。第一终端在接收到该密钥响应消息后,会向第二终端发送携带安全策略信息的直接安全模式命令消息。需要说明的是,所述密钥响应消息还携带K NRP和/或第二新鲜性参数,其中,所述K NRP用于生成会话密钥。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图6所示,本实施例中提供一种中继通信方法,其中,该方法由第一网络节点执行,该方法包括:
步骤61、接收第二终端发送的远端用户密钥请求消息。
这里,远端用户密钥请求消息用于请求获取PRUK和/或PRUK ID。
在第一网络节点接收到第二终端发送的远端用户密钥请求消息后,确定第二终端是否被授权中继服务,响应于确定第二终端被授权中继服务,向第二终端发送携带PRUK和PRUK ID的消息。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图7所示,本实施例中提供一种中继通信方法,其中,该方法由第一网络节点执行,该方法包括:
步骤71、确定第二终端是否获得接收中继服务的授权;
步骤72、响应于第二终端获得接收中继服务的授权,向第二终端发送邻近通信业务中继用户密钥PRUK和/或PRUK标识。
在一个实施例中,接收第二终端发送的远端用户密钥请求消息。确定第二终端是否获得接收中继服务的授权。响应于第二终端获得接收中继服务的授权,向第二终端发送邻近通信业务中继用户密钥PRUK和/或PRUK标识;或者,响应于第二终端未获得接收中继服务的授权,不向第二终端发送邻近通信业务中继用户密钥PRUK和/或PRUK标识。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图8所示,本实施例中提供一种中继通信方法,其中,该方法由第一终端执行,该方法包括:
步骤81、接收第一网络节点发送的安全策略信息;
其中,安全策略信息,至少用于:第二终端通过第一终端与网络进行中继通信时,第一终端和第二终端之间基于PC5传输的中继服务数据的用户面安全性保护。
这里,本公开所涉及的网络节点可以是核心网网元。例如,第一网络节点可以是PKMF。第二网络节点可以是会话管理功能(SMF,Session Management Function)。
这里,本公开所涉及的终端可以是但不限于是手机、可穿戴设备、车载终端、路侧单元(RSU,Road Side Unit)、智能家居终端、工业用传感设备和/或医疗设备等。
本公开中涉及的基站可以是终端接入网络的接入设备。这里,基站可以为各种类型的基站,例如,第三代移动通信(3G)网络的基站、第四代移动通信(4G)网络的基站、第五代移动通信(5G)网络的基站或其它演进型基站。
在一个实施例中,用户面安全性保护,包括:用户面数据的完整性保护和/或加密。例如,第一终端与第二终端之间的传输数据需要进行用户面数据的完整性保护和加密。需要说明的是,第一终端和第二终端之间基于PC5协议进行通信。
在一个实施例中,第一网络节点向第一终端发送安全策略信息。第一终端在接收到安全策略信息后会将安全策略信息转发给第二终端。
在一个实施例中,第二终端向第一终端发送直接通信请求消息。第一终端在接收到该直接通信请求消息后,向第一网络节点发送密钥请求消息。第一网络节点在接收到该密钥请求消息后,会向第一终端发送携带安全策略信息的密钥响应消息。第一终端在接收到该密钥响应消息后,会向第二终端发送携带安全策略信息的直接安全模式命令消息。
这里,第一网络节点可以是根据中继服务代码(RSC,Relay Service Code)以及RSC和安全策略之间的映射关系,确定安全策略信息。这里,不同的RSC可以是对应不同的安全策略信息。可以是预先将不同的安全策略和RSC之间的对应关系以列表形式进行存储,第一网络节点在确定目标RSC后,就可以通过查询列表的形式从列表中获得目标RSC对应的安全策略信息。
在一个实施例中,第一网络节点接收第一终端发送的RSC,其中,RSC是第二终端发送给第一终端的。在接收到该RSC后,确定第一终端是否被授权中继服务。若确定第一终端被授权提供中继服务,基于该RSC以及RSC和安全策略之间的映射关系,确定安全策略信息。需要说明的是,安全策略信息的确定可以是但不限于是上述方式。
这里,第一终端和第二终端在获取到该安全策略信息后,在第一终端和第二终端之间进行中继服务的数据的传输时,就可以基于该安全策略信息执行安全性保护。
在一个实施例中,第一终端从邻近通信服务名称管理功能(DDNMF,Direct Discovery Name Management Function)获取发现参数、PKMF地址和发现安全参数。第二终端从DDNMF获取发现参数、PKMF地址和发现安全参数。第一终端和第二终端会基于发现参数和发现安全参数执行发现流程。需要说明的是,DDNMF可以是包含在第一网络节点中,也可以是单独部署。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图9所示,本实施例中提供一种中继通信方法,其中,该方法由第一终端执行,该方法包括:
步骤91、接收第二终端发送的RSC;
其中,RSC,用于供第一网络节点确定安全策略信息。
在一个实施例中,第一终端接收第二终端发送的携带RSC的直接通信请求。第一终端在接收到该直接通信请求消息后,向第一网络节点发送携带RSC的密钥请求消息。第一网络节点在接收到该密钥请求消息后,会向第一终端发送携带安全策略信息的密钥响应消息。第一终端在接收到该密钥响应消息 后,会向第二终端发送携带安全策略信息的直接安全模式命令消息。需要说明的是,直接通信请求还可以携带PRUK标识和/或第一新鲜性参数。密钥响应消息还携带K NRP和/或第二新鲜性参数,其中,K NRP用于生成会话密钥。
这里,第一网络节点可以是根据RSC以及RSC和安全策略之间的映射关系,确定安全策略信息。这里,不同的RSC可以是对应不同的安全策略信息。可以是预先将不同的安全策略和RSC之间的对应关系以列表形式进行存储,在确定目标RSC后,就可以通过查询列表的形式从列表中获得所述目标RSC对应的安全策略信息。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图10所示,本实施例中提供一种中继通信方法,其中,该方法由第一终端执行,该方法包括:
步骤101、接收第二终端发送的携带RSC的直接通信请求消息。
在一个实施例中,接收第二终端发送的携带RSC的直接通信请求消息。第一终端在接收到该直接通信请求消息后,向第一网络节点发送携带RSC的密钥请求消息。第一网络节点在接收到该密钥请求消息后,会向第一终端发送携带安全策略信息的密钥响应消息。第一终端在接收到该密钥响应消息后,会向第二终端发送携带安全策略信息的直接安全模式命令消息。需要说明的是,直接通信请求还可以携带PRUK标识和/或第一新鲜性参数。密钥响应消息还携带K NRP和/或第二新鲜性参数,其中,K NRP用于生成会话密钥。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
本实施例中提供一种中继通信方法,其中,该方法由第一终端执行,该方法包括:向第一网络节点发送RSC。
这里,可以是向第一网络节点发送携带RSC的密钥请求消息。在一个实施例中,密钥请求消息,还携带PRUK标识和/或第一新鲜性参数。
如图11所示,本实施例中提供一种中继通信方法,其中,该方法由第一终端执行,该方法包括:
步骤111、接收第一网络节点发送的携带所述安全策略信息的密钥响应消息。
在一个实施例中,第一网络节点在接收到该密钥请求消息后,会向第一终端发送携带安全策略信息的密钥响应消息。第一终端在接收到该密钥响应消息后,会向第二终端发送携带安全策略信息的直接安全模式命令消息。需要说明的是,密钥响应消息还携带K NRP和/或第二新鲜性参数,其中,K NRP用于生成会话密钥。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图12所示,本实施例中提供一种中继通信方法,其中,该方法由第一终端执行,该方法包括:
步骤121、向第二终端发送安全策略信息。
在一个实施例中,第二终端向第一终端发送直接通信请求消息。第一终端在接收到该直接通信请求消息后,向第一网络节点发送密钥请求消息。第一网络节点在接收到该密钥请求消息后,会向第一终端发送携带安全策略信息的密钥响应消息。第一终端在接收到该密钥响应消息后,会向第二终端发送携带安全策略信息的直接安全模式命令消息。这里,第一终端和第二终端在获取到该安全策略信息后,在第一终端和第二终端之间进行中继服务的数据的传输时,就可以基于该安全策略信息执行安全性保护。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图13所示,本实施例中提供一种中继通信方法,其中,该方法由第一终端执行,该方法包括:
步骤131、向第二终端发送携带安全策略信息的直接安全模式命令消息。
在一个实施例中,第二终端向第一终端发送直接通信请求消息。第一终端在接收到该直接通信请求消息后,向第一网络节点发送密钥请求消息。第一网络节点在接收到该密钥请求消息后,会向第一终端发送携带安全策略信息的密钥响应消息。第一终端在接收到该密钥响应消息后,会向第二终端发送携带安全策略信息的直接安全模式命令消息。这里,第一终端和第二终端在获取到该安全策略信息后,在第一终端和第二终端之间进行中继服务的数据的传输时,就可以基于该安全策略信息执行安全性保护。
需要说明的是,直接安全模式命令消息还携带K NRP和/或第二新鲜性参数;K NRP用于生成会话密钥。在一个实施例中,安全模式命令消息通过基于K NRP生成的会话密钥进行完整性保护。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图14所示,本实施例中提供一种中继通信方法,其中,该方法由第一终端执行,该方法包括:
步骤141、接收第二终端发送的直接安全模式完成消息。
在一个实施例中,向第二终端发送携带安全策略信息的直接安全模式命令消息,其中,直接安全模式命令消息还携带K NRP和/或第二新鲜性参数;安全模式命令消息通过基于K NRP生成的会话密钥进行完整性保护。在第二终端接收到该直接安全模式命令消息后,会执行直接安全模式命令消息的完整性验证。响应于完整性验证成功,确定第一终端被授权提供中继服务,会向第一终端发送直接安全模式完成消息。
需要说明的是,直接安全模式命令消息还携带K NRP和/或第二新鲜性参数;K NRP用于生成会话密钥。在一个实施例中,安全模式命令消息通过基于K NRP生成的会话密钥进行完整性保护。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图15所示,本实施例中提供一种中继通信方法,其中,该方法由第一终端执行,该方法包括:
步骤151、接收基站发送的指示Uu接口的用户面安全激活状态的消息。
在一个实施例中,基站可以接收第二网络节点发送的安全策略信息并基于该安全策略信息激活Uu接口的用户面安全性保护。向第一终端发送指示Uu接口的用户面安全激活状态的消息。第一终端在接收基站发送的指示Uu接口的用户面安全激活状态的消息后,确定Uu接口的用户面安全激活状态与第一网络节点提供的安全策略信息指示的安全策略是否匹配。响应于Uu接口用户面安全激活状态与第一网络节点提供的安全策略信息指示的安全策略匹配,激活Uu接口和/或PC5接口上的用户面安全保护;或者,响应于Uu接口用户面安全激活状态与安全策略信息不匹配,向基站发送指示错误的响应消息。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图16所示,本实施例中提供一种中继通信方法,其中,该方法由第一终端执行,该方法包括:
步骤161、确定Uu接口的用户面安全激活状态与第一网络节点提供的安全策略信息指示的安全策略是否匹配;
步骤162、响应于Uu接口用户面安全激活状态与第一网络节点提供的安全策略信息指示的安全策略匹配,激活Uu接口和/或PC5接口上的用户面安全保护;或者,响应于Uu接口用户面安全激活状态与安全策略信息不匹配,向基站发送指示错误的响应消息。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图17所示,本实施例中提供一种中继通信方法,其中,该方法由第一终端执行,该方法包括:
步骤171、向第二终端发送直接通信接受消息,其中,直接通信接收消息携带PC5接口用户面安全激活状态。
在一个实施例中,第一终端向第二终端发送直接通信接受消息,其中,直接通信接收消息携带PC5接口的用户面安全激活状态。第二终端确定PC5接口用户面安全激活状态是否与安全策略信息指示的安全策略匹配;响应于PC5接口用户面安全激活状态与安全策略信息指示的安全策略匹配,第二终端激活PC5接口的用户面安全性保护;或者,响应于PC5接口用户面安全激活状态与安全策略信息指示的安全策略不匹配,第二终端向第一终端发送指示错误的响应消息。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图18所示,本实施例中提供一种中继通信方法,其中,该方法由第一终端执行,该方法包括:
步骤181、响应于接收到直接安全模式完成消息,向第二网络节点发送发起协议数据单元PDU会话建立流程的请求消息。
在一实施例中,响应于接收到直接安全模式完成消息,向第二网络节点发送发起协议数据单元PDU会话建立流程的请求消息。响应于接收到第一终端发送的发起协议数据单元PDU会话建立流程的请求消息,第二网络节点从第一网络节点获取安全策略信息。将安全策略信息指示的安全策略设置为第一终 端请求的PDU会话的用户面安全策略。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图19所示,本实施例中提供一种中继通信方法,其中,该方法由第一终端执行,该方法包括:
步骤191、从第一网络节点获取以下信息中的至少之一:发现参数、所述第一网络节点的地址和发现安全参数。
在一个实施例中,第一终端从邻近通信服务名称管理功能获取发现参数、PKMF地址和发现安全参数。第二终端从DDNMF获取发现参数、PKMF地址和发现安全参数。第一终端和第二终端会基于发现参数和发现安全参数执行发现流程。需要说明的是,DDNMF可以是包含在第一网络节点中,也可以是单独部署。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图20所示,本实施例中提供一种中继通信方法,其中,该方法由第二终端执行,该方法包括:
步骤201、接收第一终端发送的安全策略信息;
其中,安全策略信息,至少用于:第二终端通过第一终端与网络进行中继通信时,第一终端和第二终端之间基于PC5传输的中继服务数据的用户面安全性保护。
这里,本公开所涉及的网络节点可以是核心网网元。例如,第一网络节点可以是PKMF。第二网络节点可以是会话管理功能(SMF,Session Management Function)。
这里,本公开所涉及的终端可以是但不限于是手机、可穿戴设备、车载终端、路侧单元(RSU,Road Side Unit)、智能家居终端、工业用传感设备和/或医疗设备等。
本公开中涉及的基站可以是终端接入网络的接入设备。这里,基站可以为各种类型的基站,例如,第三代移动通信(3G)网络的基站、第四代移动通信(4G)网络的基站、第五代移动通信(5G)网络的基站或其它演进型基站。
在一个实施例中,用户面安全性保护,包括:用户面数据的完整性保护和/或加密。例如,第一终端与第二终端之间的传输数据需要进行用户面数据的完整性保护和加密。需要说明的是,第一终端和第二终端之间基于PC5协议进行通信。
在一个实施例中,第一网络节点向第一终端发送安全策略信息。第一终端在接收到安全策略信息后会将安全策略信息转发给第二终端。
在一个实施例中,第二终端向第一终端发送直接通信请求消息。第一终端在接收到该直接通信请求消息后,向第一网络节点发送密钥请求消息。第一网络节点在接收到该密钥请求消息后,会向第一终端发送携带安全策略信息的密钥响应消息。第一终端在接收到该密钥响应消息后,会向第二终端发送携带安全策略信息的直接安全模式命令消息。
这里,第一网络节点可以是根据中继服务代码(RSC,Relay Service Code)以及RSC和安全策略 之间的映射关系,确定安全策略信息。这里,不同的RSC可以是对应不同的安全策略信息。可以是预先将不同的安全策略和RSC之间的对应关系以列表形式进行存储,第一网络节点在确定目标RSC后,就可以通过查询列表的形式从列表中获得目标RSC对应的安全策略信息。
在一个实施例中,第一网络节点接收第一终端发送的RSC。在接收到该RSC后,确定第一终端是否被授权中继服务。若确定第一终端被授权提供中继服务,基于该RSC以及RSC和安全策略之间的映射关系,确定安全策略信息。需要说明的是,安全策略信息的确定可以是但不限于是上述方式。
这里,第一终端和第二终端在获取到该安全策略信息后,在第一终端和第二终端之间进行中继服务的数据的传输时,就可以基于该安全策略信息执行安全性保护。
在一个实施例中,第一终端从邻近通信服务名称管理功能(DDNMF,Direct Discovery Name Management Function)获取发现参数、PKMF地址和发现安全参数。第二终端从DDNMF获取发现参数、PKMF地址和发现安全参数。第一终端和第二终端会基于发现参数和发现安全参数执行发现流程。需要说明的是,DDNMF可以是包含在第一网络节点中,也可以是单独部署。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图21所示,本实施例中提供一种中继通信方法,其中,该方法由第二终端执行,该方法包括:
步骤211、向第一终端发送RSC;
其中,RSC,用于供第一网络节点确定安全策略信息。
在一个实施例中,第二终端向第一终端发送RSC。第一终端向第一网络节点发送携带RSC的密钥请求消息。确定第一终端是否被授权中继服务。若确定第一终端被授权提供中继服务,基于该RSC以及RSC和安全策略之间的映射关系,确定安全策略信息。需要说明的是,密钥请求消息中还可以携带邻近通信业务中继用户密钥PRUK标识和/或第一新鲜性参数。
在一个实施例中,当中继服务的服务类型不同时,第一终端发送的RSC不同。不同的RSC对应的安全策略信息不同。在一个实施例中,第一RSC对应第一安全策略信息,第二RSC对应第二安全策略信息。当中继服务的服务类型为第一服务类型时,第一终端发送的RSC为第一RSC,则第一网络节点在接收到第一RSC后,可以基于第一RSC确定安全策略信息为第一安全策略信息。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图22所示,本实施例中提供一种中继通信方法,其中,该方法由第二终端执行,该方法包括:
步骤221、向第一终端发送携带RSC的直接通信请求消息。
在一个实施例中,直接通信请求消息还携带PRUK标识和/或第一新鲜性参数。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图23所示,本实施例中提供一种中继通信方法,其中,该方法由第二终端执行,该方法包括:
步骤231、接收第一终端发送的携带安全策略信息的直接安全模式命令消息。
在一个实施例中,第二终端向第一终端发送直接通信请求消息。第一终端在接收到该直接通信请求消息后,向第一网络节点发送密钥请求消息。第一网络节点在接收到该密钥请求消息后,会向第一终端发送携带安全策略信息的密钥响应消息。第一终端在接收到该密钥响应消息后,会向第二终端发送携带安全策略信息的直接安全模式命令消息。这里,第一终端和第二终端在获取到该安全策略信息后,在第一终端和第二终端之间进行中继服务的数据的传输时,就可以基于该安全策略信息执行安全性保护。
需要说明的是,直接安全模式命令消息还携带K NRP和/或第二新鲜性参数;K NRP用于生成会话密钥。在一个实施例中,安全模式命令消息通过基于K NRP生成的会话密钥进行完整性保护。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图24所示,本实施例中提供一种中继通信方法,其中,该方法由第二终端执行,该方法包括:
步骤241、执行直接安全模式命令消息的完整性验证;
步骤242、响应于完整性验证成功,确定第一终端被授权提供中继服务;
步骤243、响应于完整性验证成功,向第一终端发送直接安全模式完成消息。
在一个实施例中,第一终端向第二终端发送携带安全策略信息的直接安全模式命令消息,其中,直接安全模式命令消息还携带K NRP和/或第二新鲜性参数;安全模式命令消息通过基于K NRP生成的会话密钥进行完整性保护。在第二终端接收到该直接安全模式命令消息后,会执行直接安全模式命令消息的完整性验证。响应于完整性验证成功,确定第一终端被授权提供中继服务,会向第一终端发送直接安全模式完成消息。
需要说明的是,直接安全模式命令消息还携带K NRP和/或第二新鲜性参数;K NRP用于生成会话密钥。在一个实施例中,安全模式命令消息通过基于K NRP生成的会话密钥进行完整性保护。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图25所示,本实施例中提供一种中继通信方法,其中,该方法由第二终端执行,该方法包括:
步骤251、接收第一终端发送的直接通信接受消息,其中,直接通信接受消息携带PC5接口的用户面安全激活状态。
在一个实施例中,基站可以接收第二网络节点发送的安全策略信息并基于该安全策略信息激活Uu接口的用户面安全性保护。向第一终端发送指示Uu接口的用户面安全激活状态的消息。第一终端在接收基站发送的指示Uu接口的用户面安全激活状态的消息后,确定Uu接口的用户面安全激活状态与第一网络节点提供的安全策略信息指示的安全策略是否匹配。响应于Uu接口用户面安全激活状态与第一网络节点提供的安全策略信息指示的安全策略匹配,激活Uu接口和/或PC5接口上的用户面安全保护;或者,响应于Uu接口用户面安全激活状态与安全策略信息不匹配,向基站发送指示错误的响应消息。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图26所示,本实施例中提供一种中继通信方法,其中,该方法由第二终端执行,该方法包括:
步骤261、确定PC5接口用户面安全激活状态是否与安全策略信息指示的安全策略匹配;
步骤262、响应于PC5接口用户面安全激活状态与安全策略信息指示的安全策略匹配,激活PC5接口的用户面安全性保护;或者,响应于PC5接口用户面安全激活状态与安全策略信息指示的安全策略不匹配,向第一终端发送指示错误的响应消息。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图27所示,本实施例中提供一种中继通信方法,其中,该方法由第二终端执行,该方法包括:
步骤271、向第一终端的第一网络节点发送远端用户密钥请求消息。
这里,远端用户密钥请求消息用于请求获取PRUK和/或PRUK ID。
在第一网络节点接收到第二终端发送的远端用户密钥请求消息后,确定第二终端是否被授权中继服务,响应于确定第二终端被授权中继服务,向第二终端发送携带PRUK和PRUK ID的消息。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图28所示,本实施例中提供一种中继通信方法,其中,该方法由第二终端执行,该方法包括:
步骤281、接收第一网络节点针对远端用户密钥请求消息发送的PRUK和/或PRUK标识。
在一个实施例中,接收第二终端发送的远端用户密钥请求消息。确定第二终端是否获得接收中继服务的授权。响应于第二终端获得接收中继服务的授权,向第二终端发送邻近通信业务中继用户密钥PRUK和/或PRUK标识;或者,响应于第二终端未获得接收中继服务的授权,不向第二终端发送邻近通信业务中继用户密钥PRUK和/或PRUK标识。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图29所示,本实施例中提供一种中继通信方法,其中,该方法由第二终端执行,该方法包括:
步骤291、从第一网络节点获取以下信息中的至少之一:发现参数、所述第一网络节点的地址和发现安全参数。
在一个实施例中,第一终端从邻近通信服务名称管理功能获取发现参数、PKMF地址和发现安全参数。第二终端从DDNMF获取发现参数、PKMF地址和发现安全参数。第一终端和第二终端会基于发现参数和发现安全参数执行发现流程。需要说明的是,DDNMF可以是包含在第一网络节点中,也可以是单独部署。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图30所示,本实施例中提供一种中继通信方法,其中,该方法由第二网络节点执行,该方法包括:
步骤301、从第一网络节点获取安全策略信息;
其中,安全策略信息,至少用于:第二终端通过第一终端与网络进行中继通信时,第一终端和第二终端之间基于PC5传输的中继服务数据的用户面安全性保护。
这里,本公开所涉及的网络节点可以是核心网网元。例如,第一网络节点可以是PKMF。第二网络节点可以是会话管理功能(SMF,Session Management Function)。
这里,本公开所涉及的终端可以是但不限于是手机、可穿戴设备、车载终端、路侧单元(RSU,Road Side Unit)、智能家居终端、工业用传感设备和/或医疗设备等。
本公开中涉及的基站可以是终端接入网络的接入设备。这里,基站可以为各种类型的基站,例如,第三代移动通信(3G)网络的基站、第四代移动通信(4G)网络的基站、第五代移动通信(5G)网络的基站或其它演进型基站。
在一个实施例中,用户面安全性保护,包括:用户面数据的完整性保护和/或加密。例如,第一终端与第二终端之间的传输数据需要进行用户面数据的完整性保护和加密。需要说明的是,第一终端和第二终端之间基于PC5协议进行通信。
在一个实施例中,第一网络节点向第一终端发送安全策略信息。第一终端在接收到安全策略信息后会将安全策略信息转发给第二终端。
在一个实施例中,第二终端向第一终端发送直接通信请求消息。第一终端在接收到该直接通信请求消息后,向第一网络节点发送密钥请求消息。第一网络节点在接收到该密钥请求消息后,会向第一终端发送携带安全策略信息的密钥响应消息。第一终端在接收到该密钥响应消息后,会向第二终端发送携带安全策略信息的直接安全模式命令消息。
这里,第一网路节点可以是根据中继服务代码(RSC,Relay Service Code)以及RSC和安全策略之间的映射关系,确定安全策略信息。这里,不同的RSC可以是对应不同的安全策略信息。可以是预先将不同的安全策略和RSC之间的对应关系以列表形式进行存储,第一网络节点在确定目标RSC后,就可以通过查询列表的形式从列表中获得目标RSC对应的安全策略信息。
在一个实施例中,第一网络节点接收第一终端发送的RSC。在接收到该RSC后,确定第一终端是否被授权中继服务。若确定第一终端被授权提供中继服务,基于该RSC以及RSC和安全策略之间的映射关系,确定安全策略信息。需要说明的是,安全策略信息的确定可以是但不限于是上述方式。
这里,第一终端和第二终端在获取到该安全策略信息后,在第一终端和第二终端之间进行中继服务的数据的传输时,就可以基于该安全策略信息执行安全性保护。
在一个实施例中,第一终端从邻近通信服务名称管理功能(DDNMF,Direct Discovery Name Management Function)获取发现参数、PKMF地址和发现安全参数。第二终端从 DDNMF获取发现参数、PKMF地址和发现安全参数。第一终端和第二终端会基于发现参数和发现安全参数执行发现流程。需要说明的是,DDNMF可以是包含在第一网络节点中,也可以是单独部署。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图31所示,本实施例中提供一种中继通信方法,其中,该方法由第二网络节点执行,该方法包括:
步骤311、响应于接收到第一终端发送的发起协议数据单元PDU会话建立流程的请求消息,从第一网络节点获取所述安全策略信息。
在一实施例中,响应于接收到直接安全模式完成消息,第一终端向第二网络节点发送发起协议数据单元PDU会话建立流程的请求消息。响应于接收到第一终端发送的发起协议数据单元PDU会话建立流程的请求消息,第二网络节点从第一网络节点获取安全策略信息。将安全策略信息指示的安全策略设置为第一终端请求的PDU会话的用户面安全策略。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图32所示,本实施例中提供一种中继通信方法,其中,该方法由第二网络节点执行,该方法包括:
步骤321、将安全策略信息指示的安全策略设置为第一终端请求的PDU会话的用户面安全策略。
步骤322、向基站发送安全策略信息。
在一个实施例中,响应于接收到直接安全模式完成消息,向第二网络节点发送发起协议数据单元PDU会话建立流程的请求消息。响应于接收到第一终端发送的发起协议数据单元PDU会话建立流程的请求消息,第二网络节点从第一网络节点获取安全策略信息。将安全策略信息指示的安全策略设置为第一终端请求的PDU会话的用户面安全策略。向基站发送安全策略信息。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图33所示,本实施例中提供一种中继通信方法,其中,该方法由基站执行,该方法包括:
步骤331、接收第二网络节点发送的安全策略信息;
其中,安全策略信息,至少用于:第二终端通过第一终端与网络进行中继通信时,第一终端和第二终端之间基于PC5传输的中继服务数据的用户面安全性保护。
在一实施例中,响应于接收到直接安全模式完成消息,向第二网络节点发送发起协议数据单元PDU会话建立流程的请求消息。响应于接收到第一终端发送的发起协议数据单元PDU会话建立流程的请求消息,第二网络节点从第一网络节点获取安全策略信息。将安全策略信息指示的安全策略设置为第一终 端请求的PDU会话的用户面安全策略。向基站发送安全策略信息。基站在接收到安全策略信息后,基于安全策略信息激活Uu接口的用户面安全性保护。
在一个实施例中,基站还会向第一终端发送指示Uu接口的用户面安全激活状态的消息。第一终端在接收基站发送的指示Uu接口的用户面安全激活状态的消息后,确定Uu接口的用户面安全激活状态与第一网络节点提供的安全策略信息指示的安全策略是否匹配。响应于Uu接口用户面安全激活状态与第一网络节点提供的安全策略信息指示的安全策略匹配,激活Uu接口和/或PC5接口上的用户面安全保护;或者,响应于Uu接口用户面安全激活状态与安全策略信息不匹配,向基站发送指示错误的响应消息。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图34所示,本实施例中提供一种中继通信方法,其中,该方法由基站执行,该方法包括:
步骤341、基于安全策略信息激活Uu接口的用户面安全性保护。
这里,用户面安全性保护包括完整性保护和加密。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图35所示,本实施例中提供一种中继通信方法,其中,该方法由基站执行,该方法包括:
步骤351、向第一终端发送指示Uu接口的用户面安全激活状态的消息。
在一个实施例中,基站可以接收第二网络节点发送的安全策略信息并基于该安全策略信息激活Uu接口的用户面安全性保护。向第一终端发送指示Uu接口的用户面安全激活状态的消息。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图36所示,本实施例中提供一种中继通信方法,其中,该方法由基站执行,该方法包括:
步骤361、接收第一终端发送的指示错误的响应消息,其中,所述指示错误的响应消息用于指示所述Uu接口用户面安全激活状态与所述安全策略信息指示的安全策略不匹配。
在一个实施例中,基站会向第一终端发送指示Uu接口的用户面安全激活状态的消息。第一终端在接收基站发送的指示Uu接口的用户面安全激活状态的消息后,确定Uu接口的用户面安全激活状态与第一网络节点提供的安全策略信息指示的安全策略是否匹配。响应于Uu接口用户面安全激活状态与第一网络节点提供的安全策略信息指示的安全策略匹配,激活Uu接口和/或PC5接口上的用户面安全保护;或者,响应于Uu接口用户面安全激活状态与安全策略信息不匹配,向基站发送指示错误的响应消息。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
为了更好地理解本公开实施例,以下通过2个示例性实施例对本公开技术方案进行进一步说明:
示例1:
请参见图37,本实施例中提供一种中继通信方法,该方法包括:
步骤1a、第二终端从邻近通信业务名称管理功能获取发现参数和第一网络节点的地址。
步骤2a、第二终端从邻近通信业务名称管理功能获取发现安全参数。
步骤3a、第一终端从邻近通信业务名称管理功能获取发现参数和第一网络节点的地址。
步骤4a、第一终端从邻近通信业务名称管理功能获取发现安全参数。
步骤5a、第二终端向第一终端的第一网络节点发送远端密钥请求消息。
步骤6a、第一网络节点针对密钥请求消息向第一终端发送携带安全策略信息的密钥响应消息。其中,密钥响应消息携带邻近通信业务中继用户密钥PRUK和PRUK标识。
步骤7a、执行发现过程。步骤8a、第二终端向第一终端发送直接通信请求消息,其中,直接通信请求消息携带PRUK标识、中继服务码RSC和第一新鲜性参数。
步骤9a、第一终端向第一网络节点发送密钥请求消息,其中,密钥请求消息携带PRUK标识、中继服务码RSC和第一新鲜性参数。
步骤10a、第一网络节点针对密钥请求消息向第一终端发送携带安全策略信息的密钥响应消息,其中,密钥响应消息携带K NRP和第二新鲜性参数。这里,可以是第一网络节点(可以是PKMF)收到密钥请求消息后,5G PKMF会检查U2N中继(可以是第一终端)是否被授权充当远程UE(可以是第二终端)的中继。如果U2N中继被授权提供中继服务,5G PKMF生成第二新鲜性参数并导出K NRP。同时,5G PKMF根据接收到的RSC及其支持的所有中继服务的PC5UP安全策略配置列表,为中继服务选择PC5UP安全策略。然后,PKMF向U2N中继发送包含K NRP、新鲜度参数2(第二新鲜性参数)和请求的中继服务的PC5UP安全策略的密钥响应消息。如此,U2N中继就配置了中继服务的PC5UP安全策略。
步骤11a、第一终端向第二终端发送携带安全策略信息的直接安全模式命令消息,其中,直接安全模式命令消息还携带K NRP和第二新鲜性参数。这里,可以是U2N中继向远端UE发送Direct Security Mode Command消息,消息中包含K NRP、K NRP新鲜度参数2和请求中继服务的PC5UP安全策略。直接安全模式命令消息使用源自KNRP的会话密钥KNRP-SESS进行完整性保护,因此所请求中继服务的PC5UP安全策略通过PC5链路受到保护。
步骤12a、修改第一终端授权。这里,可以是远程UE以与U2N中继相同的方式导出K NRP和会话密钥KNRP-SESS,并处理直接安全模式命令。然后,远程UE验证直接安全模式命令消息的完整性。如果成功,则向远端UE保证U2N中继被授权提供中继服务。然后,远程UE存储从U2N中继接收到的中继服务的PC5用户面UP安全策略。
步骤13a、第二终端向第一终端发送直接安全模式完成消息。这里,可以是远程UE以直接安全模式完成消息响应U2N中继。直接安全模式完成消息被加密并受到完整性保护。
步骤14a、修改第二终端授权。这里,可以是在接收和处理直接安全模式完成消息时,U2N中继 验证直接安全模式完成消息的完整性。如果成功,则U2N中继保证远程UE被授权获得中继服务。
步骤15a、完成其余的中继服务流程。这里,可以是远程UE和U2N中继通过安全PC5链路继续中继服务的其余过程。
示例2:
在U2N Relay(对应第一终端)确认Remote UE(对应第二终端)在成功验证来自Remote UE的Direct Security Mode Complete消息后,被授权获得Relay服务后,U2N Relay向SMF发起新的PDU会话建立流程。
请参见图38,本实施例中提供一种中继通信方法,该方法包括:
步骤1b、从第一网络节点获取安全策略信息。这里,可以是SMF(对应第二网络节点)从5G PKMF获取U2N Relay中继的服务的UP安全策略。
步骤2b、将所述安全策略信息指示的安全策略设置为第一终端请求的PDU会话的用户面安全策略。这里,可以是SMF将中继服务的UP安全策略设置为请求的PDU会话的UP安全策略,并将UP安全策略提供给NG-RAN。
步骤3b、基于安全策略信息激活Uu接口的用户面安全性保护。这里,可以是U2N中继检查接收到的Uu UP安全激活状态是否与5G PKMF提供的PC5UP安全策略匹配。如果它们匹配,则U2N中继激活其Uu接口和PC5接口上的UP安全。如果它们不匹配,则U2N中继向NG-RAN返回错误消息。
需要说明的是,该方法还可以包括:U2N中继向Remote UE发送Direct Communication Accept消息,接受PC5连接建立,包括其PC5UP安全激活状态。整个消息受PC5信令安全保护,因此从中继发送的PC5UP安全激活指示受到保护。同时,U2N中继向其SMF发送远程UE报告。
该方法还可以包括:远程UE检查接收到的PC5UP安全激活状态是否与5G PKMF提供的PC5UP安全策略匹配。如果它们匹配,则远程UE激活其PC5UP安全性。如果它们不匹配,则远程UE向U2N中继返回错误消息。
该方法还可以包括:通过PC5链路和Uu链路在远程UE和网络之间中继的服务数据现在根据中继服务的UP安全策略进行保护发送。
需要说明的是,示例1和示例2可以结合执行。
如图39所示,本公开实施例中提供一种中继通信装置,其中,装置包括:
发送模块391,用于向第一终端发送安全策略信息;
其中,安全策略信息,至少用于:第二终端通过第一终端与网络进行中继通信时,第一终端和第二终端之间基于PC5传输的中继服务数据的用户面安全性保护。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图40所示,本公开实施例中提供一种中继通信装置,其中,装置包括:
接收模块401,用于接收第一终端发送的安全策略信息;
其中,安全策略信息,至少用于:第二终端通过第一终端与网络进行中继通信时,第一终端和第二终端之间基于PC5传输的中继服务数据的用户面安全性保护。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图41所示,本公开实施例中提供一种中继通信装置,其中,装置包括:
接收模块411,用于接收第一终端发送的安全策略信息;
其中,安全策略信息,至少用于:第二终端通过第一终端与网络进行中继通信时,第一终端和第二终端之间基于PC5传输的中继服务数据的用户面安全性保护。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图42所示,本公开实施例中提供一种中继通信装置,其中,装置包括:
获取模块421,用于从第一网络节点获取安全策略信息;
其中,安全策略信息,至少用于:第二终端通过第一终端与网络进行中继通信时,第一终端和第二终端之间基于PC5传输的中继服务数据的用户面安全性保护。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图43所示,本公开实施例中提供一种中继通信装置,其中,装置包括:
接收模块431,用于接收第二网络节点发送的用安全策略信息;
其中,安全策略信息,至少用于:第二终端通过第一终端与网络进行中继通信时,第一终端和第二终端之间基于PC5传输的中继服务数据的用户面安全性保护。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
本公开实施例提供一种通信设备,通信设备,包括:
处理器;
用于存储处理器可执行指令的存储器;
其中,处理器被配置为:用于运行可执行指令时,实现应用于本公开任意实施例的方法。
其中,处理器可包括各种类型的存储介质,该存储介质为非临时性计算机存储介质,在通信设备掉电之后能够继续记忆存储其上的信息。
处理器可以通过总线等与存储器连接,用于读取存储器上存储的可执行程序。
本公开实施例还提供一种计算机存储介质,其中,计算机存储介质存储有计算机可执行程序,可执行程序被处理器执行时实现本公开任意实施例的方法。
关于上述实施例中的装置,其中各个模块执行操作的具体方式已经在有关该方法的实施例中进行了详细描述,此处将不做详细阐述说明。
如图44所示,本公开一个实施例提供一种终端的结构。
参照图44所示终端800本实施例提供一种终端800,该终端具体可是移动电话,计算机,数字广播终端,消息收发设备,游戏控制台,平板设备,医疗设备,健身设备,个人数字助理等。
参照图44,终端800可以包括以下一个或多个组件:处理组件802,存储器804,电源组件806,多媒体组件808,音频组件810,输入/输出(I/O)的接口812,传感器组件814,以及通信组件816。
处理组件802通常控制终端800的整体操作,诸如与显示,电话呼叫,数据通信,相机操作和记录操作相关联的操作。处理组件802可以包括一个或多个处理器820来执行指令,以完成上述的方法的全部或部分步骤。此外,处理组件802可以包括一个或多个模块,便于处理组件802和其他组件之间的交互。例如,处理组件802可以包括多媒体模块,以方便多媒体组件808和处理组件802之间的交互。
存储器804被配置为存储各种类型的数据以支持在设备800的操作。这些数据的示例包括用于在终端800上操作的任何应用程序或方法的指令,联系人数据,电话簿数据,消息,图片,视频等。存储器804可以由任何类型的易失性或非易失性存储设备或者它们的组合实现,如静态随机存取存储器(SRAM),电可擦除可编程只读存储器(EEPROM),可擦除可编程只读存储器(EPROM),可编程只读存储器(PROM),只读存储器(ROM),磁存储器,快闪存储器,磁盘或光盘。
电源组件806为终端800的各种组件提供电力。电源组件806可以包括电源管理系统,一个或多个电源,及其他与为终端800生成、管理和分配电力相关联的组件。
多媒体组件808包括在终端800和用户之间的提供一个输出接口的屏幕。在一些实施例中,屏幕可以包括液晶显示器(LCD)和触摸面板(TP)。如果屏幕包括触摸面板,屏幕可以被实现为触摸屏,以接收来自用户的输入信号。触摸面板包括一个或多个触摸传感器以感测触摸、滑动和触摸面板上的手势。触摸传感器可以不仅感测触摸或滑动动作的边界,而且还检测与触摸或滑动操作相关的持续时间和压力。在一些实施例中,多媒体组件808包括一个前置摄像头和/或后置摄像头。当设备800处于操作模式,如拍摄模式或视频模式时,前置摄像头和/或后置摄像头可以接收外部的多媒体数据。每个前置摄像头和后置摄像头可以是一个固定的光学透镜系统或具有焦距和光学变焦能力。
音频组件810被配置为输出和/或输入音频信号。例如,音频组件810包括一个麦克风(MIC),当终端800处于操作模式,如呼叫模式、记录模式和语音识别模式时,麦克风被配置为接收外部音频信号。所接收的音频信号可以被进一步存储在存储器804或经由通信组件816发送。在一些实施例中,音频组件810还包括一个扬声器,用于输出音频信号。
I/O接口812为处理组件802和外围接口模块之间提供接口,上述外围接口模块可以是键盘,点击轮,按钮等。这些按钮可包括但不限于:主页按钮、音量按钮、启动按钮和锁定按钮。
传感器组件814包括一个或多个传感器,用于为终端800提供各个方面的状态评估。例如,传感器组件814可以检测到设备800的打开/关闭状态,组件的相对定位,例如组件为终端800的显示器和小键盘,传感器组件814还可以检测终端800或终端800一个组件的位置改变,用户与终端800接触的存在或不存在,终端800方位或加速/减速和终端800的温度变化。传感器组件814可以包括接近传感器,被配置用来在没有任何的物理接触时检测附近物体的存在。传感器组件814还可以包括光传感器,如CMOS或CCD图像传感器,用于在成像应用中使用。在一些实施例中,该传感器组件814还可以包括加速度传感器,陀螺仪传感器,磁传感器,压力传感器或温度传感器。
通信组件816被配置为便于终端800和其他设备之间有线或无线方式的通信。终端800可以接入基于通信标准的无线网络,如Wi-Fi,2G或3G,或它们的组合。在一个示例性实施例中,通信组件816经由广播信道接收来自外部广播管理系统的广播信号或广播相关信息。在一个示例性实施例中,通信组件816还包括近场通信(NFC)模块,以促进短程通信。例如,在NFC模块可基于射频识别(RFID)技术,红外数据协会(IrDA)技术,超宽带(UWB)技术,蓝牙(BT)技术和其他技术来实现。
在示例性实施例中,终端800可以被一个或多个应用专用集成电路(ASIC)、数字信号处理器(DSP)、数字信号处理设备(DSPD)、可编程逻辑器件(PLD)、现场可编程门阵列(FPGA)、控制器、微控制器、微处理器或其他电子元件实现,用于执行上述方法。
在示例性实施例中,还提供了一种包括指令的非临时性计算机可读存储介质,例如包括指令的存储器804,上述指令可由终端800的处理器820执行以完成上述方法。例如,非临时性计算机可读存储介质可以是ROM、随机存取存储器(RAM)、CD-ROM、磁带、软盘和光数据存储设备等。
如图45所示,本公开一实施例示出一种基站的结构。例如,基站900可以被提供为一网络侧设备。参照图45,基站900包括处理组件922,其进一步包括一个或多个处理器,以及由存储器932所代表的存储器资源,用于存储可由处理组件922的执行的指令,例如应用程序。存储器932中存储的应用程序可以包括一个或一个以上的每一个对应于一组指令的模块。此外,处理组件922被配置为执行指令,以执行上述方法前述应用在所述基站的任意方法。
基站900还可以包括一个电源组件926被配置为执行基站900的电源管理,一个有线或无线网络接口950被配置为将基站900连接到网络,和一个输入输出(I/O)接口958。基站900可以操作基于存储在存储器932的操作系统,例如Windows Server TM,Mac OS XTM,UnixTM,LinuxTM,FreeBSDTM或类似。
本领域技术人员在考虑说明书及实践这里公开的发明后,将容易想到本发明的其它实施方案。本公开旨在涵盖本发明的任何变型、用途或者适应性变化,这些变型、用途或者适应性变化遵循本发明的一般性原理并包括本公开未公开的本技术领域中的公知常识或惯用技术手段。说明书和实施例仅被视为示例性的,本发明的真正范围和精神由下面的权利要求指出。
应当理解的是,本发明并不局限于上面已经描述并在附图中示出的精确结构,并且可以在不脱离其范围进行各种修改和改变。本发明的范围仅由所附的权利要求来限制。

Claims (57)

  1. 一种中继通信方法,其中,所述方法由第一网络节点执行,所述方法包括:
    向第一终端发送安全策略信息;
    其中,所述安全策略信息,至少用于:第二终端通过所述第一终端与网络进行中继通信时,第一终端和所述第二终端之间基于PC5传输的中继服务数据的用户面安全性保护。
  2. 根据权利要求1所述的方法,其中,所述方法还包括:
    接收第一终端发送的中继服务代码RSC;
    响应于确定所述第一终端被授权提供中继服务,基于所述RSC以及RSC和安全策略之间的映射关系,确定所述安全策略信息。
  3. 根据权利要求2所述的方法,其中,所述接收第一终端发送的中继服务代码RSC,包括:
    接收第一终端发送的携带所述RSC的密钥请求消息。
  4. 根据权利要求3所述的方法,其中,所述密钥请求消息,还携带PRUK标识和/或第一新鲜性参数。
  5. 根据权利要求3所述的方法,其中,所述向第一终端发送安全策略信息,包括:
    针对所述密钥请求消息向第一终端发送携带所述安全策略信息的密钥响应消息。
  6. 根据权利要求5所述的方法,其中,所述密钥响应消息还携带K NRP和/或第二新鲜性参数,其中,所述K NRP用于生成会话密钥。
  7. 根据权利要求1所述的方法,其中,所述方法还包括:
    接收第二终端发送的远端用户密钥请求消息。
  8. 根据权利要求7所述的方法,其中,所述方法还包括:
    确定所述第二终端是否获得接收中继服务的授权;
    响应于所述第二终端获得接收中继服务的授权,向所述第二终端发送邻近通信业务中继用户密钥PRUK和/或PRUK标识。
  9. 一种中继通信方法,其中,所述方法由第一终端执行,所述方法包括:
    接收第一网络节点发送的安全策略信息;
    其中,所述安全策略信息,至少用于:第二终端通过第一终端与网络进行中继通信时,第一终端和所述第二终端之间基于PC5传输的中继服务数据的用户面安全性保护。
  10. 根据权利要求9所述的方法,其中,所述方法还包括:
    接收所述第二终端发送的RSC;
    其中,所述RSC,用于供所述第一网络节点确定所述安全策略信息。
  11. 根据权利要求10所述的方法,其中,所述接收所述第二终端发送的RSC,包括:
    接收所述第二终端发送的携带所述RSC的直接通信请求消息。
  12. 根据权利要求11所述的方法,其中,所述直接通信请求消息还携带PRUK标识和/或第一新鲜性参数。
  13. 根据权利要求10所述的方法,其中,所述方法还包括:
    向第一网络节点发送所述RSC。
  14. 根据权利要求13所述的方法,其中,所述向第一网络节点发送所述RSC,包括:
    向第一网络节点发送携带所述RSC的密钥请求消息。
  15. 根据权利要求14所述的方法,其中,所述密钥请求消息,还携带PRUK标识和/或第一新鲜性参数。
  16. 根据权利要求15所述的方法,其中,所述接收第一网络节点发送的安全策略信息,包括:
    接收第一网络节点发送的携带所述安全策略信息的密钥响应消息。
  17. 根据权利要求16所述的方法,其中,所述密钥响应消息还携带K NRP和/或第二新鲜性参数,其中,所述K NRP用于生成会话密钥。
  18. 根据权利要求9所述的方法,其中,所述方法还包括:
    向第二终端发送所述安全策略信息。
  19. 根据权利要求18所述的方法,其中,所述向第二终端发送所述安全策略信息,包括:
    向所述第二终端发送携带所述安全策略信息的直接安全模式命令消息。
  20. 根据权利要求19所述的方法,其中,所述直接安全模式命令消息还携带K NRP和/或第二新鲜性参数;所述K NRP用于生成会话密钥。
  21. 根据权利要求19所述的方法,其中,所述安全模式命令消息通过基于K NRP生成的会话密钥进行完整性保护。
  22. 根据权利要求19所述的方法,其中,所述方法还包括:
    接收第二终端发送的直接安全模式完成消息。
  23. 根据权利要求9所述的方法,其中,所述方法还包括:
    接收基站发送的指示Uu接口的用户面安全激活状态的消息。
  24. 根据权利要求23所述的方法,其中,所述方法还包括:
    确定所述Uu接口的用户面安全激活状态与第一网络节点提供的安全策略信息指示的安全策略是否匹配;
    响应于所述Uu接口用户面安全激活状态与第一网络节点提供的所述安全策略信息指示的安全策略匹配,激活Uu接口和/或PC5接口上的用户面安全保护;或者,响应于所述Uu接口用户面安全激活状态与所述安全策略信息不匹配,向所述基站发送指示错误的响应消息。
  25. 根据权利要求9所述的方法,其中,所述方法还包括:
    向所述第二终端发送直接通信接受消息,其中,所述直接通信接收消息携带PC5接口用户面安全激活状态。
  26. 根据权利要求25所述的方法,其中,所述方法还包括:
    接收第二终端发送的指示错误的响应消息,其中,所述指示错误的响应消息用于指示所述PC5接口用户面安全激活状态与所述安全策略信息指示的安全策略不匹配。
  27. 根据权利要求9所述的方法,其中,所述方法还包括:
    响应于接收到直接安全模式完成消息,向第二网络节点发送发起协议数据单元PDU会话建立流程的请求消息。
  28. 根据权利要求9所述的方法,其中,所述方法还包括:
    从第一网络节点获取以下信息中的至少之一:发现参数、所述第一网络节点的地址和发现安全参数。
  29. 一种中继通信方法,其中,所述方法由第二终端执行,所述方法包括:
    接收第一终端发送的安全策略信息;
    其中,所述安全策略信息,至少用于:第二终端通过所述第一终端与网络进行中继通信时,第一终端和所述第二终端之间基于PC5传输的中继服务数据的用户面安全性保护。
  30. 根据权利要求29所述的方法,其中,所述方法还包括:
    向所述第一终端发送RSC;
    其中,所述RSC,用于供所述第一网络节点确定所述安全策略信息。
  31. 根据权利要求30所述的方法,其中,所述向第一终端发送RSC,包括:
    向所述第一终端发送携带所述RSC的直接通信请求消息。
  32. 根据权利要求31所述的方法,其中,所述直接通信请求消息还携带PRUK标识和/或第一新鲜性参数。
  33. 根据权利要求29所述的方法,其中,所述接收第一终端发送的安全策略信息,包括:
    接收所述第一终端发送的携带所述安全策略信息的直接安全模式命令消息。
  34. 根据权利要求33所述的方法,其中,所述直接安全模式命令消息还携带K NRP和/或第二新鲜性参数。
  35. 根据权利要求34所述的方法,其中,所述直接安全模式命令消息通过基于K NRP生成的会话密钥进行完整性保护。
  36. 根据权利要求35所述的方法,其中,所述方法还包括:
    执行所述直接安全模式命令消息的完整性验证;
    响应于完整性验证成功,确定所述第一终端被授权提供中继服务。
  37. 根据权利要求36所述的方法,其中,所述方法还包括:
    响应于完整性验证成功,向所述第一终端发送直接安全模式完成消息。
  38. 根据权利要求29所述的方法,其中,所述方法还包括:
    接收第一终端发送的直接通信接受消息,其中,所述直接通信接受消息携带PC5接口的用户面安全激活状态。
  39. 根据权利要求38所述的方法,其中,所述方法还包括:
    确定所述PC5接口用户面安全激活状态是否与所述安全策略信息指示的安全策略匹配;
    响应于所述PC5接口用户面安全激活状态与所述安全策略信息指示的安全策略匹配,激活PC5接口的用户面安全性保护;或者,响应于所述PC5接口用户面安全激活状态与所述安全策略信息指示的安全策略不匹配,向第一终端发送指示错误的响应消息。
  40. 根据权利要求29所述的方法,其中,所述方法还包括:
    向所述第一终端的第一网络节点发送远端用户密钥请求消息。
  41. 根据权利要求40所述的方法,其中,所述方法还包括:
    接收第一网络节点针对所述远端用户密钥请求消息发送的PRUK和/或PRUK标识。
  42. 根据权利要求29所述的方法,其中,所述方法还包括:
    从第一网络节点获取以下信息中的至少之一:发现参数、所述第一网络节点的地址和发现安全参数。
  43. 一种中继通信方法,其中,所述方法由第二网络节点执行,所述方法包括:
    从所述第一网络节点获取安全策略信息;
    其中,所述安全策略信息,至少用于:第二终端通过所述第一终端与网络进行中继通信时,第一终端和所述第二终端之间基于PC5传输的中继服务数据的用户面安全性保护。
  44. 根据权利要求43所述的方法,其中,所述从所述第一网络节点获取安全策略信息,包括:
    响应于接收到所述第一终端发送的发起协议数据单元PDU会话建立流程的请求消息,从所述第一网络节点获取所述安全策略信息。
  45. 根据权利要求43所述的方法,其中,所述方法还包括:
    将所述安全策略信息指示的安全策略设置为第一终端请求的PDU会话的用户面安全策略。
  46. 根据权利要求45所述的方法,其中,所述方法还包括:
    向基站发送所述安全策略信息。
  47. 一种中继通信方法,其中,所述方法由基站执行,所述方法包括:
    接收第二网络节点发送的安全策略信息;
    其中,所述安全策略信息,至少用于:第二终端通过所述第一终端与网络进行中继通信时,第一终端和所述第二终端之间基于PC5传输的中继服务数据的用户面安全性保护。
  48. 根据权利要求47所述的方法,其中,所述方法还包括:
    基于所述安全策略信息激活Uu接口的用户面安全性保护。
  49. 根据权利要求48所述的方法,其中,所述方法还包括:
    向第一终端发送指示Uu接口用户面安全激活状态的消息。
  50. 根据权利要求49所述的方法,其中,所述方法还包括:
    接收第一终端发送的指示错误的响应消息,其中,所述指示错误的响应消息用于指示所述Uu接口用户面安全激活状态与所述安全策略信息指示的安全策略不匹配。
  51. 一种中继通信装置,其中,装置包括:
    发送模块,用于向第一终端发送安全策略信息;
    其中,所述安全策略信息,至少用于:第二终端通过所述第一终端与网络进行中继通信时,第一终端和所述第二终端之间基于PC5传输的中继服务数据的用户面安全性保护。
  52. 一种中继通信装置,其中,所述装置包括:
    接收模块,用于接收第一网络节点发送的安全策略信息;
    其中,所述安全策略信息,至少用于:第二终端通过第一终端与网络进行中继通信时,第一终端和所述第二终端之间基于PC5传输的中继服务数据的用户面安全性保护。
  53. 一种中继通信装置,其中,所述装置包括:
    接收模块,用于接收第一终端发送的安全策略信息;
    其中,所述安全策略信息,至少用于:第二终端通过所述第一终端与网络进行中继通信时,第一终端和所述第二终端之间基于PC5传输的中继服务数据的用户面安全性保护。
  54. 一种中继通信装置,其中,所述装置包括:
    获取模块,用于从所述第一网络节点获取安全策略信息;
    其中,所述安全策略信息,至少用于:第二终端通过所述第一终端与网络进行中继通信时,第一终端和所述第二终端之间基于PC5传输的中继服务数据的用户面安全性保护。
  55. 一种中继通信装置,其中,所述装置包括:
    接收模块,用于接收第二网络节点发送的用安全策略信息;
    其中,所述安全策略信息,至少用于:第二终端通过所述第一终端与网络进行中继通信时,第一终端和所述第二终端之间基于PC5传输的中继服务数据的用户面安全性保护。
  56. 一种通信设备,其中,包括:
    存储器;
    处理器,与所述存储器连接,被配置为通过执行存储在所述存储器上的计算机可执行指令,并能够实现权利要求1至8、9至28、29至42、43至46或者47至50任一项所述的方法。
  57. 一种计算机存储介质,所述计算机存储介质存储有计算机可执行指令,所述计算机可执行指令被处理器执行后能够实现权利要求1至8、9至28、29至42、43至46或者47至50任一项所述的方法。
PCT/CN2021/128008 2021-11-01 2021-11-01 中继通信的方法、装置、通信设备及存储介质 WO2023070685A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202180003729.2A CN116391448A (zh) 2021-11-01 2021-11-01 中继通信的方法、装置、通信设备及存储介质
PCT/CN2021/128008 WO2023070685A1 (zh) 2021-11-01 2021-11-01 中继通信的方法、装置、通信设备及存储介质

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2021/128008 WO2023070685A1 (zh) 2021-11-01 2021-11-01 中继通信的方法、装置、通信设备及存储介质

Publications (1)

Publication Number Publication Date
WO2023070685A1 true WO2023070685A1 (zh) 2023-05-04

Family

ID=86159968

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/128008 WO2023070685A1 (zh) 2021-11-01 2021-11-01 中继通信的方法、装置、通信设备及存储介质

Country Status (2)

Country Link
CN (1) CN116391448A (zh)
WO (1) WO2023070685A1 (zh)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108199964A (zh) * 2017-12-27 2018-06-22 努比亚技术有限公司 一种传输方法、终端、服务器及计算机可读存储介质
CN112752240A (zh) * 2019-10-30 2021-05-04 大唐移动通信设备有限公司 直接通信的处理方法、装置、中继终端及远端终端
US20210258793A1 (en) * 2020-02-17 2021-08-19 Samsung Electronics Co., Ltd. Method and apparatus for handling security policies in v2x communication system
CN113518319A (zh) * 2020-04-09 2021-10-19 华为技术有限公司 一种临近服务的业务处理方法、设备及系统
CN113543135A (zh) * 2020-04-13 2021-10-22 华为技术有限公司 授权方法、策略控制功能设备和接入和移动管理功能设备

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108199964A (zh) * 2017-12-27 2018-06-22 努比亚技术有限公司 一种传输方法、终端、服务器及计算机可读存储介质
CN112752240A (zh) * 2019-10-30 2021-05-04 大唐移动通信设备有限公司 直接通信的处理方法、装置、中继终端及远端终端
US20210258793A1 (en) * 2020-02-17 2021-08-19 Samsung Electronics Co., Ltd. Method and apparatus for handling security policies in v2x communication system
CN113518319A (zh) * 2020-04-09 2021-10-19 华为技术有限公司 一种临近服务的业务处理方法、设备及系统
CN113543135A (zh) * 2020-04-13 2021-10-22 华为技术有限公司 授权方法、策略控制功能设备和接入和移动管理功能设备

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
XIAOMI: "ProSe: Adding a New Key Issue on Security Policy with UE-to-UE Relay", 3GPP DRAFT; S3-211107, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. SA WG3, no. e-meeting; 20210301 - 20210305, 22 February 2021 (2021-02-22), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France , XP051980495 *

Also Published As

Publication number Publication date
CN116391448A (zh) 2023-07-04

Similar Documents

Publication Publication Date Title
WO2023184561A1 (zh) 中继通信方法、装置、通信设备及存储介质
WO2023070685A1 (zh) 中继通信的方法、装置、通信设备及存储介质
WO2022110057A1 (zh) 无线传输的方法、装置、通信设备及存储介质
WO2023070560A1 (zh) 信息传输方法、装置、通信设备和存储介质
WO2023070509A1 (zh) 信息处理方法及装置、通信设备及存储介质
WO2023245354A1 (zh) 安全保护方法、装置、通信设备及存储介质
WO2024055329A1 (zh) 邻近服务ProSe的无线通信方法、装置、通信设备及存储介质
WO2023004655A1 (zh) 一种通信方法、装置、用户设备、基站、核心网设备及存储介质
WO2023000139A1 (zh) 传输凭证的方法、装置、通信设备及存储介质
WO2022236602A1 (zh) 能力指示信息的传输方法、装置、通信设备及存储介质
WO2024031640A1 (zh) 一种信息传输方法、装置、通信设备及存储介质
WO2024092801A1 (zh) 认证方法、装置、通信设备及存储介质
WO2023240575A1 (zh) 一种中继通信方法、通信装置及通信设备
WO2024031565A1 (zh) 信息处理方法以及装置、通信设备及存储介质
WO2023240574A1 (zh) 信息处理方法及装置、通信设备及存储介质
WO2024031391A1 (zh) 测距或侧行链路定位方法、装置、通信设备及存储介质
WO2022027484A1 (zh) 随机接入的方法、装置、通信设备及存储介质
WO2024031399A1 (zh) Ue加入pin的方法及装置、通信设备及存储介质
WO2024000123A1 (zh) 密钥生成方法及装置、通信设备及存储介质
WO2023004656A1 (zh) 一种直连通信方法、装置、用户设备及存储介质
WO2023240657A1 (zh) 认证与授权方法、装置、通信设备及存储介质
WO2024092735A1 (zh) 通信控制方法、系统及装置、通信设备及存储介质
WO2023087180A1 (zh) 连接恢复方法、装置、通信设备和存储介质
WO2022222006A1 (zh) 测距方法、装置、通信设备及存储介质
WO2023231018A1 (zh) 个人物联网pin基元凭证配置方法、装置、通信设备及存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21962035

Country of ref document: EP

Kind code of ref document: A1