WO2023102751A1 - 一种系统信息验证方法、装置及存储介质 - Google Patents

一种系统信息验证方法、装置及存储介质 Download PDF

Info

Publication number
WO2023102751A1
WO2023102751A1 PCT/CN2021/136199 CN2021136199W WO2023102751A1 WO 2023102751 A1 WO2023102751 A1 WO 2023102751A1 CN 2021136199 W CN2021136199 W CN 2021136199W WO 2023102751 A1 WO2023102751 A1 WO 2023102751A1
Authority
WO
WIPO (PCT)
Prior art keywords
system information
information
verification
indication
side device
Prior art date
Application number
PCT/CN2021/136199
Other languages
English (en)
French (fr)
Inventor
吴昱民
施饶
Original Assignee
北京小米移动软件有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京小米移动软件有限公司 filed Critical 北京小米移动软件有限公司
Priority to PCT/CN2021/136199 priority Critical patent/WO2023102751A1/zh
Priority to CN202180004487.9A priority patent/CN116803133A/zh
Publication of WO2023102751A1 publication Critical patent/WO2023102751A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information

Definitions

  • the present disclosure relates to the field of communication technologies, and in particular to a system information verification method and equipment/storage medium/device.
  • the system information correctness verification process mainly includes: UE (User Equipment, user equipment) calculates the received system information through a verification algorithm to obtain a value 1, and the network side device calculates the transmitted system information through a verification algorithm to obtain Value 2, the network side device can send the value 2 to the UE, and the UE can verify the system information by comparing whether the value 1 and the value 2 match; or the UE can send the value 1 to the network side device, and the network side device can pass the comparison Check whether the value 1 and the value 2 match to verify the system information.
  • UE User Equipment, user equipment
  • the types of verification algorithms supported by the UE and the network side device may be different. At this time, the value 1 and the value 2 will not match, which will reduce the accuracy of system information verification.
  • differentiated control cannot be performed on UEs that fail system information verification according to different security requirements of UEs.
  • the system information verification method and equipment/storage medium/device proposed in the present disclosure solve the technical problems of low accuracy of system information verification and inability to perform differentiated control on UEs that fail system information verification in related technologies.
  • the system information verification method proposed in an embodiment of the present disclosure is applied to the UE, including:
  • the auxiliary information includes the authentication mode supported by the UE, the information of the authentication algorithm supported by the UE, the identification of the system information that the UE expects to verify, and the information of the system information received by the UE At least one of an identifier, system information that the UE is interested in, and first indication information used to indicate that the UE expects to verify system information;
  • the system information verification method proposed by the embodiment is applied to the network side device, including:
  • the auxiliary information includes the authentication mode supported by the UE, the information of the authentication algorithm supported by the UE, the identifier of the system information that the UE expects to authenticate, and the identifier of the system information received by the UE , at least one of system information that the UE is interested in, and first indication information used to indicate that the UE expects to verify the system information;
  • a process of verifying the correctness of system information is triggered based on the auxiliary information.
  • a sending module configured to send auxiliary information to network-side equipment, where the auxiliary information includes authentication methods supported by the UE, information about authentication algorithms supported by the UE, identifiers of system information that the UE expects to authenticate, and information about the authentication methods that the UE expects to authenticate. At least one of the identifier of the received system information, the system information that the UE is interested in, and the first indication information used to indicate that the UE expects to verify the system information;
  • a verification module configured to acquire information sent by the network side device based on the auxiliary information, and trigger a process of verifying the correctness of system information based on the information sent by the network side device.
  • An acquisition module configured to acquire auxiliary information sent by the UE, where the auxiliary information includes authentication methods supported by the UE, information on authentication algorithms supported by the UE, identifiers of system information that the UE expects to authenticate, and information received by the UE At least one of the identifier of the system information, the system information that the UE is interested in, and the first indication information used to indicate that the UE expects to verify the system information;
  • a verification module configured to trigger a process of verifying the correctness of system information based on the auxiliary information.
  • an embodiment provides a communication device, the device includes a processor and a memory, a computer program is stored in the memory, and the processor executes the computer program stored in the memory, so that the The device executes the method provided in the embodiment of the foregoing aspect.
  • an embodiment provides a communication device, the device includes a processor and a memory, a computer program is stored in the memory, and the processor executes the computer program stored in the memory, so that the The device executes the method provided in the above embodiment of another aspect.
  • a communication device provided by an embodiment of another aspect of the present disclosure includes: a processor and an interface circuit;
  • the interface circuit is used to receive code instructions and transmit them to the processor
  • the processor is configured to run the code instructions to execute the method provided in one embodiment.
  • a communication device provided by an embodiment of another aspect of the present disclosure includes: a processor and an interface circuit;
  • the interface circuit is used to receive code instructions and transmit them to the processor
  • the processor is configured to run the code instructions to execute the method provided in another embodiment.
  • the computer-readable storage medium provided by another embodiment of the present disclosure is used to store instructions, and when the instructions are executed, the method provided by the first embodiment is implemented.
  • the computer-readable storage medium provided by another embodiment of the present disclosure is used to store instructions, and when the instructions are executed, the method provided by another embodiment is implemented.
  • the UE will send auxiliary information to the network-side device, and will obtain information sent by the network-side device based on the auxiliary information, and The process of verifying the correctness of system information is triggered based on the information sent by the network side device.
  • the auxiliary information includes authentication methods supported by the UE, information on authentication algorithms supported by the UE, identifiers of system information that the UE expects to authenticate, identifiers of system information received by the UE, system information that the UE is interested in, and used to indicate that the UE expects to authenticate At least one of the first indication information for system information verification.
  • the UE will first report the verification algorithm supported by the UE to the network side device, so that the network side device can determine the verification algorithm used in the subsequent verification process of the correctness of the system information based on the verification algorithm supported by the UE. And indicate to the UE, so that when verifying the correctness of the system information subsequently, it can be ensured that the network side device and the UE use the same verification algorithm, which improves the accuracy of the system information verification.
  • the UE after verifying the correctness of the system information, it is also determined whether there is a security problem in the system information, and if there is, the UE performs the corresponding operation (that is, triggers the process of releasing the connection, and/or , triggering the connection re-establishment process, and/or reporting the fifth indication information to the network side device), thereby achieving the purpose of "differentiated control of UEs that fail system information verification according to different security requirements of UEs".
  • FIG. 1 is a schematic flowchart of a system information verification method provided by an embodiment of the present disclosure
  • FIG. 2 is a schematic flowchart of a system information verification method provided by another embodiment of the present disclosure.
  • FIG. 3 is a schematic flowchart of a system information verification method provided by another embodiment of the present disclosure.
  • Fig. 4a is a schematic flowchart of a system information verification method provided by another embodiment of the present disclosure.
  • Fig. 4b is a schematic flowchart of a system information verification method provided by another embodiment of the present disclosure.
  • FIG. 5 is a schematic flowchart of a method for verifying system information provided by another embodiment of the present disclosure.
  • FIG. 6 is a schematic flowchart of a method for verifying system information provided by another embodiment of the present disclosure.
  • FIG. 7 is a schematic flowchart of a method for verifying system information provided by another embodiment of the present disclosure.
  • FIG. 8 is a schematic flowchart of a method for verifying system information provided by another embodiment of the present disclosure.
  • FIG. 9 is a schematic flowchart of a method for verifying system information provided by another embodiment of the present disclosure.
  • Fig. 10a is a schematic flowchart of a system information verification method provided by another embodiment of the present disclosure.
  • Fig. 10b is a schematic flowchart of a method for verifying system information provided by another embodiment of the present disclosure.
  • FIG. 11 is a schematic flowchart of a system information verification method provided by another embodiment of the present disclosure.
  • FIG. 12 is a schematic flowchart of a method for verifying system information provided by another embodiment of the present disclosure.
  • FIG. 13 is a schematic structural diagram of a system information verification device provided by an embodiment of the present disclosure.
  • FIG. 14 is a schematic structural diagram of a system information verification device provided by another embodiment of the present disclosure.
  • Fig. 15 is a block diagram of a user equipment provided by an embodiment of the present disclosure.
  • Fig. 16 is a block diagram of a network side device provided by an embodiment of the present disclosure.
  • first, second, third, etc. may use the terms first, second, third, etc. to describe various information, the information should not be limited to these terms. These terms are only used to distinguish information of the same type from one another. For example, without departing from the scope of the embodiments of the present disclosure, first information may also be called second information, and similarly, second information may also be called first information.
  • first information may also be called second information
  • second information may also be called first information.
  • the words "if” and "if” as used herein may be interpreted as “at” or "when” or "in response to a determination.”
  • FIG. 1 is a schematic flowchart of a method for verifying system information provided by an embodiment of the present disclosure. The method is executed by a UE. As shown in FIG. 1 , the method for verifying system information may include the following steps:
  • Step 101 sending auxiliary information to the network side device.
  • the UE may be a device that provides voice and/or data connectivity to a user.
  • Terminal equipment can communicate with one or more core networks via RAN (Radio Access Network, wireless access network), and UE can be an IoT terminal, such as a sensor device, a mobile phone (or called a "cellular" phone) and a
  • the computer of the networked terminal may be a fixed, portable, pocket, hand-held, built-in computer or vehicle-mounted device.
  • station Station, STA
  • subscriber unit subscriber unit
  • subscriber station subscriber station
  • mobile station mobile station
  • mobile station mobile station
  • remote station remote station
  • access terminal remote terminal
  • user terminal or user agent.
  • the UE may also be a device of an unmanned aerial vehicle.
  • the UE may also be a vehicle-mounted device, for example, it may be a trip computer with a wireless communication function, or a wireless terminal connected externally to the trip computer.
  • the UE may also be a roadside device, for example, it may be a street lamp, a signal lamp, or other roadside devices with a wireless communication function.
  • the auxiliary information may include authentication methods supported by the UE, information about authentication algorithms supported by the UE, identifiers of the system information that the UE expects to authenticate, identifiers of the system information received by the UE, and information that the UE is interested in. At least one of the system information, and the first indication information used to indicate that the UE expects to verify the system information.
  • the above-mentioned verification method may include:
  • the correctness of the system information is verified by the UE; that is, the UE performs the step of "verifying whether the value calculated by the network side device for the system information matches the value calculated by the UE for the system information".
  • the network-side device verifies the correctness of the system information; that is, the network-side device performs the step of "verifying whether the value calculated by the network-side device for the system information matches the value calculated by the UE for the system information".
  • the above information about the authentication algorithm supported by the UE may include at least one of the following:
  • the algorithm type identification of the verification algorithm supported by the UE may include checksum method, XOR check method, CRC (Cyclic Redundancy Check, cyclic redundancy check ) verification method, hash verification method, and identification of at least one algorithm type in hash verification method.
  • the algorithm identification of the verification algorithm supported by the UE may include MD3 (Message-Digest Algorithm, information digest algorithm), MD4, MD5, SHA-1 (Secure Hash Algorithm, The algorithm identification of at least one algorithm in the secure hash algorithm).
  • MD3 Message-Digest Algorithm, information digest algorithm
  • MD4 MD5
  • SHA-1 Secure Hash Algorithm
  • the aforementioned system information that the UE expects to verify may be one or more types of system information received by the UE.
  • the system information that the UE expects to verify may be SIB (System Information Block, system information block) x, where x is an integer.
  • the UE when the UE wishes to obtain higher system information security protection, it can directly send the above auxiliary information to the network side device, so that the network side device can trigger subsequent system information based on the auxiliary information. Information verification process to achieve higher system information security protection.
  • Step 102 triggering a process of verifying the correctness of system information based on the information sent by the network side device.
  • the verification methods when the verification methods are different, the information sent by the network side device will be different, and the process of triggering the correctness verification of the system information will also be different.
  • the process of triggering the correctness verification of the system information will also be different.
  • the above system information may be broadcast by the network side device to the UE.
  • the above system information may be sent by the network side device to the UE through dedicated signaling.
  • the UE will send auxiliary information to the network side device, and will obtain the information sent by the network side device based on the auxiliary information, and the information based on the information sent by the network side device Trigger the process of verifying the correctness of system information.
  • the auxiliary information includes authentication methods supported by the UE, information on authentication algorithms supported by the UE, identifiers of system information that the UE expects to authenticate, identifiers of system information received by the UE, system information that the UE is interested in, information used to indicate to the UE At least one of the first indications that verification of system information is desired.
  • the UE will first report the verification algorithm supported by the UE to the network side device, so that the network side device can determine the verification algorithm used in the subsequent verification process of the correctness of the system information based on the verification algorithm supported by the UE. And indicate to the UE, so that when verifying the correctness of the system information subsequently, it can be ensured that the network side device and the UE use the same verification algorithm, which improves the accuracy of the system information verification.
  • FIG. 2 is a schematic flowchart of a method for verifying system information provided by an embodiment of the present disclosure. The method is executed by a UE. As shown in FIG. 2 , the method for verifying system information may include the following steps:
  • Step 201 acquiring configuration information sent by a network side device.
  • configuration information may include at least one of the following:
  • a first request message where the first request message is used to request the UE to report whether the UE supports the ability to verify system information, and/or, to request information about the verification algorithm supported by the UE;
  • a second request message where the second request message is used to request the UE to report the identity of the system information that the UE expects to verify;
  • a third request message where the third request message is used to request the UE to report the identifier of the system information received by the UE.
  • a fourth request message where the fourth request message is used to request the UE to report the identifier of the system information that the UE is interested in.
  • the area identification corresponding to the above-mentioned system information supporting verification may include at least one of the following:
  • the cell ID corresponding to the system information that supports verification can be cell-1;
  • the cell type identifier corresponding to the system information that supports verification can be PCell (Primary Cell, primary cell) identifier, PSCell (Primary Secondary Cell, primary and secondary cell) identifier, SCell (Secondary Cell, secondary cell) identifier at least one of
  • the cell group type identifier corresponding to the system information that supports verification can be at least one of the MCG (Master Cell Group, primary cell group) identifier and the SCG (Secondary Cell Group, secondary cell group) identifier;
  • the tracking area identification corresponding to the system information that supports verification can be TAC-1 (Tracking Area Code, tracking area code) identification;
  • RNA-1 RAN-based Notification Area, access network indication area
  • the method for the UE to obtain the configuration information sent by the network side device includes at least one of the following:
  • the UE acquires the configuration information sent by the network side device through a broadcast message, where the broadcast message can be, for example, SIBx, and x is a positive integer;
  • the UE acquires the configuration information sent by the network side device through a dedicated configuration message, where the dedicated configuration message may be, for example, a radio resource control reconfiguration (RRC Reconfiguration) message.
  • RRC Reconfiguration radio resource control reconfiguration
  • Step 202 sending auxiliary information to the network side device based on the configuration information.
  • Step 203 triggering a process of verifying the correctness of the system information based on the information sent by the network side device.
  • the verification methods in the subsequent verification when the verification methods in the subsequent verification are different, the information sent by the network side device will be different, and the process of triggering the verification of the correctness of the system information will also be different .
  • the process of triggering the verification of the correctness of the system information will also be different .
  • the UE will send auxiliary information to the network side device, and will obtain the information sent by the network side device based on the auxiliary information, and the information based on the information sent by the network side device Trigger the process of verifying the correctness of system information.
  • the auxiliary information includes authentication methods supported by the UE, information on authentication algorithms supported by the UE, identifiers of system information that the UE expects to authenticate, identifiers of system information received by the UE, system information that the UE is interested in, information used to indicate to the UE At least one of the first indications that verification of system information is expected.
  • the UE will first report the verification algorithm supported by the UE to the network side device, so that the network side device can determine the verification algorithm used in the subsequent verification process of the correctness of the system information based on the verification algorithm supported by the UE. And indicate to the UE, so that when verifying the correctness of the system information subsequently, it can be ensured that the network side device and the UE use the same verification algorithm, which improves the accuracy of the system information verification.
  • Fig. 3 is a schematic flowchart of a system information verification method provided by an embodiment of the present disclosure, the method is executed by a UE, and the verification method in this embodiment is: the UE verifies the correctness of the system information.
  • the system information verification method may include the following steps:
  • Step 301 sending auxiliary information to the network side device.
  • the auxiliary information may include authentication methods supported by the UE, information on authentication algorithms supported by the UE, identifiers of the system information that the UE expects to authenticate, identifiers of the system information received by the UE, UE sense At least one of an identifier of the system information of interest and first indication information used to indicate that the UE expects to verify the system information.
  • step 301 reference may be made to the description of the foregoing embodiments, and the embodiments of the present disclosure are not described in detail here.
  • Step 302. Acquire information about the first value and the first verification algorithm.
  • the first verification algorithm may be any verification algorithm supported by the UE.
  • the first verification algorithm may be a checksum method, or, a hash verification method, or, MD3, and the like.
  • the way for the UE to obtain the information of the first verification algorithm may include at least one of the following:
  • the method for the network side device to indicate the information of the first verification algorithm may include at least one of the following:
  • the other dedicated signaling may include, for example: RRCReconfiguration information, and/or downlink information transfer (DLInformationTransfer) information.
  • the above-mentioned first value may be obtained by the network side device calculating the system information to be verified by using a first verification algorithm.
  • the system information to be verified may be at least one of system information that the UE expects to verify, system information received by the UE, and system information that the UE is interested in.
  • the method for the network-side device to determine the first verification algorithm may be: the network-side device autonomously determines the first verification algorithm from the verification algorithms supported by the UE, and/or, the network-side device determines the first verification algorithm based on the protocol The convention determines the first authentication algorithm.
  • the way for the UE to obtain the first value may include: obtaining the first value sent by the network side device.
  • the method for the network side device to send the first value may include at least one of the following:
  • the other dedicated signaling may include, for example: RRC Reconfiguration information, and/or DL Information Transfer information.
  • Step 303 Use the first verification algorithm to calculate the information of the system to be verified to obtain a second value.
  • Step 304 Determine whether the first numerical value matches the second numerical value. If they match, determine the verification result as: verification success; if they do not match, determine the verification result as: verification failure.
  • the verification result in response to determining that the verification result is: verification successful, it means that the transmission of the system information to be verified is successful, and in response to determining that the verification result is: verification failure, it means that the transmission of the system information to be verified fails.
  • Step 305 in response to the verification result being verification failure, sending the verification result to the network side device.
  • the method for the UE to send the verification result to the network side device may include at least one of the following:
  • the verification result is sent to the UE through other dedicated signaling except the security mode command; wherein, the other dedicated signaling may include, for example: radio resource control connection reconfiguration complete (RRC Reconfiguration Complete) information or uplink information transfer (UL Information Transfer )information.
  • RRC Reconfiguration Complete radio resource control connection reconfiguration complete
  • UL Information Transfer uplink information transfer
  • the UE when the UE determines that the verification result is a verification failure, it means that the system information to be verified has not been successfully transmitted. At this time, the UE can send the verification result to the network side device, so that the network side The device resends system information to the UE based on the verification result.
  • the UE will send auxiliary information to the network side device, and will obtain the information sent by the network side device based on the auxiliary information, and the information based on the information sent by the network side device Trigger the process of verifying the correctness of system information.
  • the auxiliary information includes authentication methods supported by the UE, information on authentication algorithms supported by the UE, identifiers of the system information that the UE expects to authenticate, identifiers of the system information received by the UE, identifiers of the system information that the UE is interested in, and used to indicate to the UE At least one of the first indications that verification of system information is desired.
  • the UE will first report to the network side device that the UE supports the verification algorithm, so that the network side device can determine the verification algorithm used in the subsequent verification process of the correctness of the system information based on the verification algorithm supported by the UE. And indicate to the UE, so that when verifying the correctness of the system information subsequently, it can be ensured that the network side device and the UE use the same verification algorithm, which improves the accuracy of the system information verification.
  • Fig. 4a is a schematic flowchart of a method for verifying system information provided by an embodiment of the present disclosure, the method is executed by a UE, and the verification method in this embodiment is: the network side device verifies the correctness of the system information.
  • the system information verification method may include the following steps:
  • Step 401a sending auxiliary information to the network side device.
  • the auxiliary information may include authentication methods supported by the UE, information on authentication algorithms supported by the UE, identifiers of the system information that the UE expects to authenticate, identifiers of the system information received by the UE, UE sense At least one of an identifier of the system information of interest and first indication information used to indicate that the UE expects to verify the system information.
  • step 401 for other introductions about step 401, reference may be made to the description of the foregoing embodiments, and the embodiments of the present disclosure are not repeated here.
  • Step 402a acquire the information of the first verification algorithm and the second indication information.
  • the second indication information is used to instruct the UE to verify the correctness of the system information.
  • the way for the UE to acquire the second indication information may include at least one of the following:
  • the second indication information indicated by the network side device is acquired.
  • the method for the network side device to indicate the second indication information may include at least one of the following:
  • the other dedicated signaling may include, for example: RRC Reconfiguration information, and/or DL Information Transfer information.
  • Step 403a use the first verification algorithm to calculate the information of the system to be verified to obtain the second value.
  • Step 404a sending the second value to the network side device, so that the network side device verifies the correctness of the system information based on the second value.
  • the method for the UE to send the second value to the network side device may include at least one of the following:
  • the other dedicated signaling may include, for example: RRC Reconfiguration Complete information or UL Information Transfer information.
  • the method for the network side device to verify the correctness of the system information based on the second value may include: the network side device calculates the system information to be verified based on the first verification algorithm to obtain the first value , determine whether the first numerical value matches the second numerical value, and if they match, determine the verification result as: verification success; when they do not match, determine the verification result as: verification failure.
  • the network side device calculates the system information to be verified based on the first verification algorithm to obtain the first value , determine whether the first numerical value matches the second numerical value, and if they match, determine the verification result as: verification success; when they do not match, determine the verification result as: verification failure.
  • the UE will send auxiliary information to the network side device, and will obtain the information sent by the network side device based on the auxiliary information, and the information based on the information sent by the network side device Trigger the process of verifying the correctness of system information.
  • the auxiliary information includes authentication methods supported by the UE, information on authentication algorithms supported by the UE, identifiers of the system information that the UE expects to authenticate, identifiers of the system information received by the UE, identifiers of the system information that the UE is interested in, and used to indicate to the UE At least one of the first indications that verification of system information is desired.
  • the UE will first report the verification algorithm supported by the UE to the network side device, so that the network side device can determine the verification algorithm used in the subsequent verification process of the correctness of the system information based on the verification algorithm supported by the UE. And indicate to the UE, so that when verifying the correctness of the system information subsequently, it can be ensured that the network side device and the UE use the same verification algorithm, which improves the accuracy of the system information verification.
  • Fig. 4b is a schematic flowchart of a method for verifying system information provided by an embodiment of the present disclosure, the method is executed by a UE, and the verification method in this embodiment is: the network side device verifies the correctness of the system information.
  • the system information verification method may include the following steps:
  • Step 401b sending auxiliary information to the network side device.
  • Step 402b acquiring the information of the first verification algorithm and the second indication information.
  • Step 403b Use the first verification algorithm to calculate the information of the system to be verified to obtain a second value.
  • Step 404b Send the second value to the network side device, so that the network side device can verify the correctness of the system information based on the second value.
  • Step 405b acquiring the verification result information sent by the network side device.
  • the verification result information may include at least one of the following:
  • the verification result of the correctness verification of the system information includes verification success or verification failure;
  • third indication information where the third indication information is used to indicate whether there is a security problem in the system information
  • the fourth indication information includes an indication of a type of security problem existing in the system information, and the type indication includes an indication of a failure to verify the correctness of the system information, and/or an indication of tampering of the system information.
  • the area identifier corresponding to the verified system information may include at least one of the following:
  • the access network indication area identifier corresponding to the verified system information is a registered trademark of Cisco Systems, Inc.
  • the network-side device may further determine whether there is a security problem in the system information.
  • the method for the network side device to determine whether there is a security problem in the system information may include at least one of the following:
  • Method 1 Based on the verification result, determine whether there is a security problem in the system information.
  • the method for the network side device to determine whether there is a security problem in the system information based on the verification result mainly includes: determining the number of failed verifications of the system information, and responding to the number of failures exceeding the first threshold (for example, can be a positive integer), it is determined that there is a security problem in the system information, otherwise, it is determined that there is no security problem in the system information.
  • the first threshold may be indicated by the base station, and in another embodiment of the present disclosure, the first threshold may also be determined by the UE based on agreement.
  • the number of failures may be the number of failures of verification failures of the same system information, further, in one embodiment of the present disclosure, the number of failures may be the number of verification failures of the same system information Number of consecutive failures to fail.
  • the network side device first determines that the SIB3 verification fails for 2 consecutive times, then determines that the SIB2 verification fails for 3 consecutive times, and finally determines that the SIB2 verification fails for 3 consecutive times It is determined that SIB3 authentication failed.
  • SIB3 is determined to fail the verification 5 times, since the 5 times of SIB3 verification failures are not consecutive, the network side device judges that there is no "system information security problem" in SIB3.
  • Method 2 Determine whether the system information has a security problem based on the number of times the network side device sends the system information.
  • the method for the network side device to determine whether the system information has a security problem based on the number of times the network side device sends the system information may include: determining the number of times the system information is sent, and responding
  • the threshold (for example, may be a positive integer), determines that there is a security problem in the system information, otherwise, determines that there is no security problem in the system information.
  • the second threshold may be indicated by the base station, and in another embodiment of the present disclosure, the second threshold may also be determined by the UE based on agreement.
  • the sending times may be the sending times of the same system information, further, in an embodiment of the present disclosure, the sending times may be the consecutive sending times of the same system information.
  • the network side device when it is determined that the verification result of the system information is a verification failure, the network side device will resend the system information to the UE, thus, by determining that the network side device continuously sends The number of times of the same system information can determine the number of failed verifications of the system information, and then determine whether a security problem occurs in the system information.
  • the first threshold is 5, and the network side device first sends SIB3 consecutively 2 times, then sends SIB2 consecutively 3 times, and finally sends SIB2 consecutively 3 times SIB3.
  • the network side device judges that there is no "system information security problem" in SIB3.
  • the network side device may also use the third indication information to indicate the determination result of "whether the system information has a security problem".
  • the third indication information may be an N-bit (bit) number, where N is a positive integer.
  • the third indication information may be 1 bit, and when the content contained in the 1 bit is "0", it indicates that there is no security problem in the system information; when the content contained in the 1 bit When the content is "1", it means that there is a security problem in the system information.
  • the UE will send auxiliary information to the network side device, and will obtain the information sent by the network side device based on the auxiliary information, and the information based on the information sent by the network side device Trigger the process of verifying the correctness of system information.
  • the auxiliary information includes authentication methods supported by the UE, information on authentication algorithms supported by the UE, identifiers of the system information that the UE expects to authenticate, identifiers of the system information received by the UE, identifiers of the system information that the UE is interested in, and used to indicate to the UE At least one of the first indications that verification of system information is desired.
  • the UE will first report the verification algorithm supported by the UE to the network side device, so that the network side device can determine the verification algorithm used in the subsequent verification process of the correctness of the system information based on the verification algorithm supported by the UE. And indicate to the UE, so that when verifying the correctness of the system information subsequently, it can be ensured that the network side device and the UE use the same verification algorithm, which improves the accuracy of the system information verification.
  • FIG. 5 is a schematic flowchart of a method for verifying system information provided by an embodiment of the present disclosure. The method is executed by a UE. As shown in FIG. 5 , the method for verifying system information may include the following steps:
  • Step 501 sending auxiliary information to the network side device.
  • the auxiliary information includes authentication methods supported by the UE, information on authentication algorithms supported by the UE, identifiers of system information that the UE expects to authenticate, identifiers of system information received by the UE, systems that the UE is interested in At least one of an information identifier and first indication information used to indicate that the UE expects to verify system information.
  • Step 502 Obtain the information sent by the network-side device, and trigger a process of verifying the correctness of the system information based on the information sent by the network-side device.
  • the steps 501-502 may be the steps of the above-mentioned steps 301-305. In another embodiment of the present disclosure, the steps 501-502 may be the steps of the above-mentioned steps 401a-404b. In another embodiment of the present disclosure, the steps 501-502 may be the steps of the above-mentioned steps 401a-405b. step. And, for related introductions about steps 501-502, reference may be made to the description of the above-mentioned embodiments, and the embodiments of the present disclosure will not be repeated here.
  • Step 503. In response to the verification result being: verification failure, acquire system information resent by the network side device.
  • the verification result is: verification failure
  • the network side device may need to resend the system information.
  • the UE will send auxiliary information to the network side device, and will obtain the information sent by the network side device based on the auxiliary information, and the information based on the information sent by the network side device Trigger the process of verifying the correctness of system information.
  • the auxiliary information includes authentication methods supported by the UE, information on authentication algorithms supported by the UE, identifiers of the system information that the UE expects to authenticate, identifiers of the system information received by the UE, identifiers of the system information that the UE is interested in, and used to indicate to the UE At least one of the first indications that verification of system information is desired.
  • the UE will first report the verification algorithm supported by the UE to the network side device, so that the network side device can determine the verification algorithm used in the subsequent verification process of the correctness of the system information based on the verification algorithm supported by the UE. And indicate to the UE, so that when verifying the correctness of the system information subsequently, it can be ensured that the network side device and the UE use the same verification algorithm, which improves the accuracy of the system information verification.
  • FIG. 6 is a schematic flowchart of a method for verifying system information provided by an embodiment of the present disclosure. The method is executed by a UE. As shown in FIG. 6 , the method for verifying system information may include the following steps:
  • Step 601 sending auxiliary information to the network side device.
  • the auxiliary information may include authentication methods supported by the UE, information on authentication algorithms supported by the UE, identifiers of the system information that the UE expects to authenticate, identifiers of the system information received by the UE, and information that the UE is interested in. At least one of an identifier of the system information, and first indication information used to indicate that the UE expects to verify the system information.
  • Step 602 Obtain the information sent by the network-side device, and trigger a process of verifying the correctness of the system information based on the information sent by the network-side device.
  • Step 603. In response to the verification result being: verification failure, acquire system information resent by the network side device.
  • Step 604 determine whether there is a security problem in the system information.
  • the method for the UE to determine whether there is a security problem in the system information includes at least one of the following:
  • Method 1 Based on the verification result, determine whether there is a security problem in the system information.
  • the method for the UE to determine whether there is a security problem in the system information based on the verification result mainly includes: determining the number of failed verifications of the system information, and responding to the number of failures exceeding the first threshold (for example, it may be positive integer), it is determined that there is a security problem in the system information, otherwise, it is determined that there is no security problem in the system information.
  • the first threshold may be indicated by the base station, and in another embodiment of the present disclosure, the first threshold may also be determined by the UE based on agreement.
  • the number of failures may be the number of failures of verification failures of the same system information, further, in one embodiment of the present disclosure, the number of failures may be the number of verification failures of the same system information Number of consecutive failures to fail.
  • the first threshold is 5, and the UE first determines that SIB (System Information Block, system information block) 3 verification fails for 2 consecutive times, and then determines SIB2 verification for 3 consecutive times Failed, and finally, it was determined that the SIB3 verification failed 3 times in a row.
  • SIB System Information Block, system information block
  • Method 2 Determine whether there is a security problem in the system information based on the number of times the UE receives the system information.
  • the method for the UE to determine whether the system information has a security problem based on the number of times the UE receives the system information may include: determining the number of times the system information is received, and in response to the number of receptions exceeding the second threshold (for example, is a positive integer), it is determined that there is a security problem in the system information, otherwise, it is determined that there is no security problem in the system information.
  • the second threshold may be indicated by the base station, and in another embodiment of the present disclosure, the second threshold may also be determined by the UE based on agreement.
  • the receiving times may be the receiving times of the same system information, further, in an embodiment of the present disclosure, the receiving times may be the consecutive receiving times of the same system information.
  • the network side device when it is determined that the verification result of the system information is a verification failure, the network side device will resend the system information to the UE, thus, by determining that the UE receives the same system information continuously The number of times of the information can be used to determine the number of times the system information fails to be verified, and then it can be determined whether the system information has a security problem.
  • the first threshold is 5, and the UE first receives SIB3 consecutively for 2 times, then receives SIB2 consecutively for 3 times, and finally receives SIB3 consecutively for 3 times.
  • the UE judges that there is no "system information security problem" in SIB3.
  • step 602 in the process of triggering system information correctness verification by the UE based on the information sent by the network-side device, even if the UE receives the verification result information sent by the network-side device, and the verification result information includes With the third indication information and/or the fourth indication information (that is, corresponding to the above-mentioned embodiment in FIG. 4b ), in this step 604, the UE will still perform the step of "determining whether there is a security problem in the system information". That is, in an embodiment of the present disclosure, the step of the network side device determining whether the system information has a security problem is independent from the step of the UE determining whether the system information has a security problem.
  • Step 605 in response to determining that there is a security problem in the system information, the UE performs a corresponding operation.
  • the corresponding operations performed by the UE may include at least one of the following:
  • Operation 1 In response to determining that there is a security problem in the system information, trigger a connection release process, and perform cell selection or reselection.
  • triggering the process of releasing the connection may include:
  • the fifth indication information is used to indicate a specific situation that the system information has a security problem
  • the fifth indication information may include at least one of the following:
  • the fourth indication information includes an indication of the type of security problem existing in the system information, and the type indication includes an indication of failure to verify the correctness of the system information, and/or an indication that the system information has been tampered with;
  • the area identification corresponding to the above-mentioned system information with security issues may include at least one of the following:
  • the cell ID corresponding to the system information with security issues
  • the cell type identifier corresponding to the system information with security issues
  • the cell group type identifier corresponding to the system information with security issues
  • the tracking area identification corresponding to the system information with security issues
  • the identifier of the access network indication area corresponding to the system information with the security problem is the identifier of the access network indication area corresponding to the system information with the security problem.
  • the UE cell reselection method may include at least one of the following:
  • Cells with system information security problems are ignored, for example, "cells or frequency points with system information security problems" may not be determined as candidate cells or frequency points.
  • Operation 2 In response to determining that there is a security problem in the system information, trigger a connection reestablishment process, and perform cell selection or reselection.
  • triggering the connection reestablishment process may include:
  • the method for the UE to send the fifth indication information to the network side device may include:
  • the UE first sends the sixth indication information to the network side device through the connection re-establishment request message, the sixth indication information is used to indicate that the UE currently has a system information security problem, the sixth indication information can be N bit number, N is a positive integer, For example, the sixth indication information may be 1 bit, and when the content contained in 1 bit is 1, the sixth indication information indicates that the UE currently has a system information security problem, and after the UE is reestablished, the network side device may send The UE sends a request message for requesting the fifth indication information, and then the UE may send the fifth indication information to the network side device based on the request message sent by the network side device.
  • Operation 3 In response to determining that there is a security problem in the system information, report fifth indication information to the network side device.
  • the UE will send auxiliary information to the network side device, and will obtain the information sent by the network side device based on the auxiliary information, and the information based on the information sent by the network side device Trigger the process of verifying the correctness of system information.
  • the auxiliary information includes authentication methods supported by the UE, information on authentication algorithms supported by the UE, identifiers of the system information that the UE expects to authenticate, identifiers of the system information received by the UE, identifiers of the system information that the UE is interested in, and used to indicate to the UE At least one of the first indications that verification of system information is desired.
  • the UE will first report the verification algorithm supported by the UE to the network side device, so that the network side device can determine the verification algorithm used in the subsequent verification process of the correctness of the system information based on the verification algorithm supported by the UE. And indicate to the UE, so that when verifying the correctness of the system information subsequently, it can be ensured that the network side device and the UE use the same verification algorithm, which improves the accuracy of the system information verification.
  • the UE after verifying the correctness of the system information, it is also determined whether there is a security problem in the system information, and if there is, the UE performs the corresponding operation (that is, triggers the process of releasing the connection, and/or , triggering the connection re-establishment process, and/or reporting the fifth indication information to the network side device), thereby achieving the purpose of "differentiated control of UEs that fail system information verification according to different security requirements of UEs".
  • FIG. 7 is a schematic flowchart of a method for verifying system information provided by an embodiment of the present disclosure. The method is executed by a network-side device. As shown in FIG. 7 , the method for verifying system information may include the following steps:
  • Step 701. Acquire auxiliary information sent by the UE.
  • the auxiliary information may include authentication methods supported by the UE, information on authentication algorithms supported by the UE, identifiers of the system information that the UE expects to authenticate, identifiers of the system information received by the UE, and information that the UE is interested in. At least one of an identifier of the system information, and first indication information used to indicate that the UE expects to verify the system information.
  • Step 702 triggering a process of verifying the correctness of the system information based on the auxiliary information.
  • the UE will send auxiliary information to the network side device, and will obtain the information sent by the network side device based on the auxiliary information, and the information based on the information sent by the network side device Trigger the process of verifying the correctness of system information.
  • the auxiliary information includes authentication methods supported by the UE, information on authentication algorithms supported by the UE, identifiers of the system information that the UE expects to authenticate, identifiers of the system information received by the UE, identifiers of the system information that the UE is interested in, and used to indicate to the UE At least one of the first indications that verification of system information is desired.
  • the UE will first report the verification algorithm supported by the UE to the network side device, so that the network side device can determine the verification algorithm used in the subsequent verification process of the correctness of the system information based on the verification algorithm supported by the UE. And indicate to the UE, so that when verifying the correctness of the system information subsequently, it can be ensured that the network side device and the UE use the same verification algorithm, which improves the accuracy of the system information verification.
  • FIG. 8 is a schematic flowchart of a method for verifying system information provided by an embodiment of the present disclosure. The method is executed by a network-side device. As shown in FIG. 8 , the method for verifying system information may include the following steps:
  • Step 801 sending configuration information to UE.
  • Step 802 acquiring auxiliary information sent by the UE based on the configuration information.
  • Step 803 triggering a process of verifying the correctness of the system information based on the auxiliary information.
  • the UE will send auxiliary information to the network side device, and will obtain the information sent by the network side device based on the auxiliary information, and the information based on the information sent by the network side device Trigger the process of verifying the correctness of system information.
  • the auxiliary information includes authentication methods supported by the UE, information on authentication algorithms supported by the UE, identifiers of the system information that the UE expects to authenticate, identifiers of the system information received by the UE, identifiers of the system information that the UE is interested in, and used to indicate to the UE At least one of the first indications that verification of system information is desired.
  • the UE will first report the verification algorithm supported by the UE to the network side device, so that the network side device can determine the verification algorithm used in the subsequent verification process of the correctness of the system information based on the verification algorithm supported by the UE. And indicate to the UE, so that when verifying the correctness of the system information subsequently, it can be ensured that the network side device and the UE use the same verification algorithm, which improves the accuracy of the system information verification.
  • FIG. 9 is a schematic flowchart of a method for verifying system information provided by an embodiment of the present disclosure. The method is executed by a network-side device. As shown in FIG. 9 , the method for verifying system information may include the following steps:
  • Step 901 acquire auxiliary information sent by the UE.
  • Step 902. Determine a first authentication algorithm, where the first authentication algorithm is any authentication algorithm among the authentication algorithms supported by the UE.
  • Step 903 Use the first verification algorithm to calculate the system information to be verified to obtain a first value.
  • Step 904 Send the first value to the UE.
  • the information of the first verification algorithm can be sent to the UE, so that the UE can determine the first verification algorithm based on the information of the first verification algorithm, and based on The first verification algorithm calculates the system information to be verified to obtain a second value, and verifies the system information to be verified by matching the first value and the second value.
  • the network side device may not send the information of the first verification algorithm to the UE, at this time, the UE may directly determine the information of the first verification algorithm based on the agreement.
  • Step 905 Obtain the verification result sent by the UE, where the verification result includes verification failure.
  • the UE will send auxiliary information to the network side device, and will obtain the information sent by the network side device based on the auxiliary information, and the information based on the information sent by the network side device Trigger the process of verifying the correctness of system information.
  • the auxiliary information includes authentication methods supported by the UE, information on authentication algorithms supported by the UE, identifiers of the system information that the UE expects to authenticate, identifiers of the system information received by the UE, identifiers of the system information that the UE is interested in, and used to indicate to the UE At least one of the first indications that verification of system information is desired.
  • the UE will first report the verification algorithm supported by the UE to the network side device, so that the network side device can determine the verification algorithm used in the subsequent verification process of the correctness of the system information based on the verification algorithm supported by the UE. And indicate to the UE, so that when verifying the correctness of the system information subsequently, it can be ensured that the network side device and the UE use the same verification algorithm, which improves the accuracy of the system information verification.
  • Fig. 10a is a schematic flowchart of a method for verifying system information provided by an embodiment of the present disclosure. The method is executed by a network side device. As shown in Fig. 10a, the method for verifying system information may include the following steps:
  • Step 1001a acquire auxiliary information sent by the UE.
  • Step 1002a Determine a first authentication algorithm, where the first authentication algorithm is any authentication algorithm among the authentication algorithms supported by the UE.
  • Step 1003a use the first verification algorithm to calculate the system information to be verified to obtain the first value.
  • Step 1004a sending second indication information to the UE, where the second indication information is used to instruct the UE to verify the correctness of the system information.
  • the network side device when the network side device sends the second indication information to the UE, it may send the first verification algorithm information to the UE, so that the UE can determine the first verification algorithm based on the first verification algorithm information, and The system information to be verified is calculated based on the first verification algorithm to obtain a second value, and the system information to be verified is verified by matching the first value and the second value.
  • the network side device may not send the information of the first verification algorithm to the UE, at this time, the UE may directly determine the information of the first verification algorithm based on the agreement.
  • Step 1005a acquire the second value sent by the UE.
  • Step 1006a Determine whether the first value matches the second value. If they match, determine the verification result as: verification success; if they do not match, determine the verification result as: verification failure.
  • the UE will send auxiliary information to the network side device, and will obtain the information sent by the network side device based on the auxiliary information, and the information based on the information sent by the network side device Trigger the process of verifying the correctness of system information.
  • the auxiliary information includes authentication methods supported by the UE, information on authentication algorithms supported by the UE, identifiers of the system information that the UE expects to authenticate, identifiers of the system information received by the UE, identifiers of the system information that the UE is interested in, and used to indicate to the UE At least one of the first indications that verification of system information is desired.
  • the UE will first report the verification algorithm supported by the UE to the network side device, so that the network side device can determine the verification algorithm used in the subsequent verification process of the correctness of the system information based on the verification algorithm supported by the UE. And indicate to the UE, so that when verifying the correctness of the system information subsequently, it can be ensured that the network side device and the UE use the same verification algorithm, which improves the accuracy of the system information verification.
  • Fig. 10b is a schematic flowchart of a method for verifying system information provided by an embodiment of the present disclosure. The method is executed by a network side device. As shown in Fig. 10b, the method for verifying system information may include the following steps:
  • Step 1001b acquire auxiliary information sent by the UE.
  • Step 1002b Determine a first authentication algorithm, where the first authentication algorithm is any authentication algorithm supported by the UE.
  • Step 1003b Use the first verification algorithm to calculate the system information to be verified to obtain a first value.
  • Step 1004b Send second indication information to the UE, where the second indication information is used to instruct the UE to verify the correctness of the system information.
  • Step 1005b acquire the second value sent by the UE.
  • Step 1006b Determine whether the first value matches the second value. If they match, determine the verification result as: verification success; if they do not match, determine the verification result as: verification failure.
  • Step 1007b sending verification result information to the UE.
  • the UE will send auxiliary information to the network side device, and will obtain the information sent by the network side device based on the auxiliary information, and the information based on the information sent by the network side device Trigger the process of verifying the correctness of system information.
  • the auxiliary information includes authentication methods supported by the UE, information on authentication algorithms supported by the UE, identifiers of the system information that the UE expects to authenticate, identifiers of the system information received by the UE, identifiers of the system information that the UE is interested in, and used to indicate to the UE At least one of the first indications that verification of system information is expected.
  • the UE will first report the verification algorithm supported by the UE to the network side device, so that the network side device can determine the verification algorithm used in the subsequent verification process of the correctness of the system information based on the verification algorithm supported by the UE. And indicate to the UE, so that when verifying the correctness of the system information subsequently, it can be ensured that the network side device and the UE use the same verification algorithm, which improves the accuracy of the system information verification.
  • FIG. 11 is a schematic flowchart of a method for verifying system information provided by an embodiment of the present disclosure. The method is executed by a network-side device. As shown in FIG. 11 , the method for verifying system information may include the following steps:
  • Step 1101 acquire auxiliary information sent by the UE.
  • Step 1102 trigger the process of verifying the correctness of the system information based on the auxiliary information.
  • the above steps 1101-1102 may be the steps 901-905 in the above embodiment.
  • the above-mentioned steps 1101-1102 may be the steps 1001a-1006a in the above-mentioned embodiment.
  • the above-mentioned steps 1101-1102 may be the steps 1001b-1007b in the above-mentioned embodiment.
  • Step 1103 in response to the verification result being: verification failure, resend the system information to the UE.
  • the UE will send auxiliary information to the network side device, and will obtain the information sent by the network side device based on the auxiliary information, and the information based on the information sent by the network side device Trigger the process of verifying the correctness of system information.
  • the auxiliary information includes authentication methods supported by the UE, information on authentication algorithms supported by the UE, identifiers of the system information that the UE expects to authenticate, identifiers of the system information received by the UE, identifiers of the system information that the UE is interested in, and used to indicate to the UE At least one of the first indications that verification of system information is desired.
  • the UE will first report the verification algorithm supported by the UE to the network side device, so that the network side device can determine the verification algorithm used in the subsequent verification process of the correctness of the system information based on the verification algorithm supported by the UE. And indicate to the UE, so that when verifying the correctness of the system information subsequently, it can be ensured that the network side device and the UE use the same verification algorithm, which improves the accuracy of the system information verification.
  • FIG. 12 is a schematic flowchart of a method for verifying system information provided by an embodiment of the present disclosure. The method is executed by a network-side device. As shown in FIG. 12 , the method for verifying system information may include the following steps:
  • Step 1201 acquire auxiliary information sent by the UE.
  • Step 1202 trigger the process of verifying the correctness of the system information based on the auxiliary information.
  • Step 1203 in response to the verification result being: verification failure, resend the system information to the UE.
  • Step 1204 perform corresponding operations based on the information sent by the UE.
  • performing the corresponding operation method may include at least one of the following:
  • entering the release connection process may include:
  • entering the connection reestablishment process may include:
  • the method for performing cell reselection includes at least one of the following:
  • the fifth indication information includes at least one of the following:
  • the fourth indication information includes an indication of the type of security problem existing in the system information, and the type indication includes an indication of failure to verify the correctness of the system information, and/or an indication that the system information has been tampered with;
  • the area identification corresponding to the system information with security issues includes at least one of the following:
  • the cell ID corresponding to the system information with security issues
  • the cell type identifier corresponding to the system information with security issues
  • the cell group type identifier corresponding to the system information with security issues
  • the tracking area identification corresponding to the system information with security issues
  • the identifier of the access network indication area corresponding to the system information with the security problem is the identifier of the access network indication area corresponding to the system information with the security problem.
  • step 1204 reference may be made to the descriptions of the foregoing embodiments, and details are not described in this embodiment of the present disclosure.
  • the UE will send auxiliary information to the network side device, and will obtain the information sent by the network side device based on the auxiliary information, and the information based on the information sent by the network side device Trigger the process of verifying the correctness of system information.
  • the auxiliary information includes authentication methods supported by the UE, information on authentication algorithms supported by the UE, identifiers of the system information that the UE expects to authenticate, identifiers of the system information received by the UE, identifiers of the system information that the UE is interested in, and used to indicate to the UE At least one of the first indications that verification of system information is desired.
  • the UE will first report the verification algorithm supported by the UE to the network side device, so that the network side device can determine the verification algorithm used in the subsequent verification process of the correctness of the system information based on the verification algorithm supported by the UE. And indicate to the UE, so that when verifying the correctness of the system information subsequently, it can be ensured that the network side device and the UE use the same verification algorithm, which improves the accuracy of the system information verification.
  • FIG. 13 is a schematic flowchart of a method for verifying system information provided by an embodiment of the present disclosure. The method is executed by a UE. As shown in FIG. 13 , the device for verifying system information may include:
  • the sending module 1301 is configured to send auxiliary information to the network-side device.
  • the auxiliary information includes authentication methods supported by the UE, information about the authentication algorithm supported by the UE, identifiers of system information that the UE expects to authenticate, identifiers of system information received by the UE, UE sense At least one of an identifier of the system information of interest and first indication information used to indicate that the UE expects to verify the system information;
  • a verification module 1302 configured to trigger a process of verifying the correctness of system information based on the information sent by the network side device.
  • the UE will send auxiliary information to the network side equipment, and will obtain the information sent by the network side equipment based on the auxiliary information, and the information based on the information sent by the network side equipment Trigger the process of verifying the correctness of system information.
  • the auxiliary information includes authentication methods supported by the UE, information on authentication algorithms supported by the UE, identifiers of the system information that the UE expects to authenticate, identifiers of the system information received by the UE, identifiers of the system information that the UE is interested in, and used to indicate to the UE At least one of the first indications that verification of system information is expected.
  • the UE will first report the verification algorithm supported by the UE to the network side device, so that the network side device can determine the verification algorithm used in the subsequent verification process of the correctness of the system information based on the verification algorithm supported by the UE. And indicate to the UE, so that when verifying the correctness of the system information subsequently, it can be ensured that the network side device and the UE use the same verification algorithm, which improves the accuracy of the system information verification.
  • the device is also used for:
  • configuration information sent by the network side device where the configuration information includes at least one of the following:
  • a first request message where the first request message is used to request the UE to report whether the UE supports the ability to verify system information, and/or to request information about the verification algorithm supported by the UE;
  • a second request message where the second request message is used to request the UE to report the identifier of the system information that the UE expects to verify;
  • a third request message where the third request message is used to request the UE to report the identifier of the system information received by the UE.
  • a fourth request message where the fourth request message is used to request the UE to report the identifier of the system information that the UE is interested in.
  • the sending module is configured to:
  • the information about the verification algorithm supported by the UE includes at least one of the following:
  • the correctness of the system information is verified by the network side device.
  • the information about the verification algorithm supported by the UE includes at least one of the following:
  • Algorithm type identification of the verification algorithm supported by the UE Algorithm type identification of the verification algorithm supported by the UE
  • Algorithm identification of the authentication algorithm supported by the UE Algorithm identification of the authentication algorithm supported by the UE.
  • the area identifier corresponding to the system information supporting verification includes at least one of the following:
  • the cell identity corresponding to the system information that supports verification
  • the cell type identifier corresponding to the system information that supports verification
  • the tracking area identifier corresponding to the system information that supports verification
  • the identifier of the access network indication area corresponding to the system information that supports verification.
  • the device is also used for:
  • the verification module is also used for:
  • the system information to be verified includes at least one of system information that the UE expects to verify, system information received by the UE, and system information that the UE is interested in ;
  • the verification module is also used for:
  • the first verification algorithm is selected by the network side device from the verification algorithms supported by the UE, and the second indication information is used to indicate that the UE is Verify the correctness of system information;
  • the system information to be verified includes at least one of system information that the UE expects to verify, system information received by the UE, and system information that the UE is interested in ;
  • the device is also used for:
  • the verification result information sent by the network side device includes at least one of the following:
  • a verification result of verifying the correctness of the system information including verification success or verification failure
  • third indication information where the third indication information is used to indicate whether the system information has a security problem
  • Fourth indication information where the fourth indication information includes a type indication of a security problem existing in the system information, and the type indication includes an indication that the system information correctness verification fails, and/or an indication that the system information has been tampered with.
  • the device is also used for:
  • the system information resent by the network side device is acquired.
  • the device is also used for:
  • the device is also used for:
  • the method for determining whether the system information has a security problem includes at least one of the following:
  • the device is also used for:
  • the failure times are failure times of verification failures of the same system information.
  • the number of failures is the number of consecutive failures of verification failures of the same system information.
  • the device is also used for:
  • the receiving times of the system information are determined, and in response to the receiving times exceeding a second threshold, it is determined that the system information has a security problem.
  • the receiving times are receiving times of the same system information.
  • the receiving times are consecutive times of receiving the same system information.
  • the device is also used for:
  • the device is also used for:
  • the device is also used for:
  • the device is also used for:
  • the device is also used for:
  • the fifth indication information includes at least one of the following:
  • Fourth indication information where the fourth indication information includes a type indication of a security problem existing in the system information, and the type indication includes an indication that the system information correctness verification fails, and/or an indication that the system information has been tampered with;
  • the device is also used for:
  • the area identification corresponding to the system information with security problems includes at least one of the following:
  • the cell ID corresponding to the system information with security issues
  • the cell type identifier corresponding to the system information with security issues
  • the cell group type identifier corresponding to the system information with security issues
  • the tracking area identification corresponding to the system information with security issues
  • the identifier of the access network indication area corresponding to the system information with the security problem is the identifier of the access network indication area corresponding to the system information with the security problem.
  • Fig. 14 is a schematic flowchart of a system information verification method provided by an embodiment of the present disclosure. The method is executed by a network side device. As shown in Fig. 14, the system information verification device may include:
  • the obtaining module 1401 is configured to obtain auxiliary information sent by the UE.
  • the auxiliary information includes authentication methods supported by the UE, information on authentication algorithms supported by the UE, identification of system information that the UE expects to verify, identification of system information received by the UE, and identification of the system information received by the UE. At least one of an identifier of system information, system information that the UE is interested in, and first indication information used to indicate that the UE expects to verify the system information;
  • the verification module 1402 is configured to trigger a process of verifying the correctness of the system information based on the auxiliary information.
  • the UE will send auxiliary information to the network side equipment, and will obtain the information sent by the network side equipment based on the auxiliary information, and the information based on the information sent by the network side equipment Trigger the process of verifying the correctness of system information.
  • the auxiliary information includes authentication methods supported by the UE, information on authentication algorithms supported by the UE, identifiers of system information that the UE expects to authenticate, identifiers of system information received by the UE, identifiers of system information received by the UE, and information that the UE is interested in. At least one of the system information, and the first indication information used to indicate that the UE expects to verify the system information.
  • the UE will first report the verification algorithm supported by the UE to the network side device, so that the network side device can determine the verification algorithm used in the subsequent verification process of the correctness of the system information based on the verification algorithm supported by the UE. And indicate to the UE, so that when verifying the correctness of the system information subsequently, it can be ensured that the network side device and the UE use the same verification algorithm, which improves the accuracy of the system information verification.
  • the device is also used for:
  • configuration information includes at least one of the following:
  • a first request message where the first request message is used to request the UE to report whether the UE supports the ability to verify system information, and/or to request information about the verification algorithm supported by the UE;
  • a second request message where the second request message is used to request the UE to report the identifier of the system information that the UE expects to verify;
  • a third request message where the third request message is used to request the UE to report the identifier of the system information received by the UE.
  • a fourth request message where the fourth request message is used to request the UE to report the identifier of the system information that the UE is interested in.
  • the acquiring module is further configured to:
  • the verification method includes at least one of the following:
  • the system information is verified by the UE;
  • the system information is verified by the network side device.
  • the information about the verification algorithm supported by the UE includes at least one of the following:
  • Algorithm type identification of the verification algorithm supported by the UE Algorithm type identification of the verification algorithm supported by the UE
  • Algorithm identification of the authentication algorithm supported by the UE Algorithm identification of the authentication algorithm supported by the UE.
  • the area identifier corresponding to the system information supporting verification includes at least one of the following:
  • the cell identity corresponding to the system information that supports verification
  • the cell type identifier corresponding to the system information that supports verification
  • the tracking area identifier corresponding to the system information that supports verification
  • the identifier of the access network indication area corresponding to the system information that supports verification.
  • the device is also used for:
  • the verification module is also used for:
  • the first verification algorithm is any verification algorithm among the verification algorithms supported by the UE;
  • the system information to be verified includes at least one of system information that the UE expects to verify, system information received by the UE, and system information that the UE is interested in ;
  • the verification module is also used for:
  • the first verification algorithm is any verification algorithm among the verification algorithms supported by the UE;
  • the system information to be verified includes at least one of system information that the UE expects to verify, system information received by the UE, and system information that the UE is interested in ;
  • the device is also used for:
  • the verification result information includes at least one of the following:
  • a verification result of verifying the correctness of the system information including verification success or verification failure
  • third indication information where the third indication information is used to indicate whether the system information has a security problem
  • Fourth indication information where the fourth indication information includes a type indication of a security problem existing in the system information, and the type indication includes an indication that the system information correctness verification fails, and/or an indication that the system information has been tampered with.
  • the device is also used for:
  • the device is also used for:
  • the device is also used for:
  • the device is also used for:
  • the number of failed verifications of the system information is determined, and in response to the number of failures exceeding a first threshold, it is determined that there is a security problem in the system information.
  • the failure times are failure times of verification failures of the same system information.
  • the number of failures is the number of consecutive failures of verification failures of the same system information.
  • the device is also used for:
  • the number of sending times of the system information is determined, and in response to the number of sending times exceeding a second threshold, it is determined that there is a security problem in the system information.
  • the sending times are receiving times of the same system information.
  • the number of sending times is the number of consecutive sending times of the same system information.
  • the device is also used for:
  • the device is also used for:
  • the device is also used for:
  • the device is also used for:
  • the fifth indication information includes at least one of the following:
  • Fourth indication information where the fourth indication information includes a type indication of a security problem existing in the system information, and the type indication includes an indication that the system information correctness verification fails, and/or an indication that the system information has been tampered with;
  • the device is also used for:
  • the area identification corresponding to the system information with security problems includes at least one of the following:
  • the cell ID corresponding to the system information with security issues
  • the cell type identifier corresponding to the system information with security issues
  • the cell group type identifier corresponding to the system information with security issues
  • the tracking area identification corresponding to the system information with security issues
  • the identifier of the access network indication area corresponding to the system information with the security problem is the identifier of the access network indication area corresponding to the system information with the security problem.
  • Fig. 15 is a block diagram of a user equipment UE1500 provided by an embodiment of the present disclosure.
  • the UE 1500 may be a mobile phone, a computer, a digital broadcasting terminal device, a messaging device, a game console, a tablet device, a medical device, a fitness device, a personal digital assistant, and the like.
  • UE1500 may include at least one of the following components: a processing component 1502, a memory 1504, a power supply component 1506, a multimedia component 1508, an audio component 1510, an input/output (I/O) interface 1512, a sensor component 1513, and a communication component 1516.
  • a processing component 1502 may include at least one of the following components: a memory 1504, a power supply component 1506, a multimedia component 1508, an audio component 1510, an input/output (I/O) interface 1512, a sensor component 1513, and a communication component 1516.
  • a processing component 1502 may include at least one of the following components: a processing component 1502, a memory 1504, a power supply component 1506, a multimedia component 1508, an audio component 1510, an input/output (I/O) interface 1512, a sensor component 1513, and a communication component 1516.
  • I/O input/output
  • Processing component 1502 generally controls the overall operations of UE 1500, such as those associated with display, phone calls, data communications, camera operations, and recording operations.
  • the processing component 1502 may include at least one processor 1520 to execute instructions, so as to complete all or part of the steps of the above method.
  • processing component 1502 can include at least one module to facilitate interaction between processing component 1502 and other components.
  • processing component 1502 may include a multimedia module to facilitate interaction between multimedia component 1508 and processing component 1502 .
  • the memory 1504 is configured to store various types of data to support operations at the UE 1500 . Examples of such data include instructions for any application or method operating on UE1500, contact data, phonebook data, messages, pictures, videos, etc.
  • the memory 1504 can be implemented by any type of volatile or non-volatile storage device or their combination, such as static random access memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable Programmable Read Only Memory (EPROM), Programmable Read Only Memory (PROM), Read Only Memory (ROM), Magnetic Memory, Flash Memory, Magnetic or Optical Disk.
  • SRAM static random access memory
  • EEPROM electrically erasable programmable read-only memory
  • EPROM erasable Programmable Read Only Memory
  • PROM Programmable Read Only Memory
  • ROM Read Only Memory
  • Magnetic Memory Flash Memory
  • Magnetic or Optical Disk Magnetic Disk
  • the power supply component 1506 provides power to various components of the UE 1500.
  • Power component 1506 may include a power management system, at least one power supply, and other components associated with generating, managing, and distributing power for UE 1500 .
  • the multimedia component 1508 includes a screen providing an output interface between the UE 1500 and the user.
  • the screen may include a liquid crystal display (LCD) and a touch panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive input signals from a user.
  • the touch panel includes at least one touch sensor to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense a boundary of a touch or slide action, but also detect a wake-up time and pressure related to the touch or slide operation.
  • the multimedia component 1508 includes a front camera and/or a rear camera. When UE1500 is in operation mode, such as shooting mode or video mode, the front camera and/or rear camera can receive external multimedia data. Each front camera and rear camera can be a fixed optical lens system or have focal length and optical zoom capability.
  • the audio component 1510 is configured to output and/or input audio signals.
  • the audio component 1510 includes a microphone (MIC), which is configured to receive an external audio signal when the UE 1500 is in an operation mode, such as a call mode, a recording mode, and a voice recognition mode. Received audio signals may be further stored in memory 1504 or sent via communication component 1516 .
  • the audio component 1510 also includes a speaker for outputting audio signals.
  • the I/O interface 1512 provides an interface between the processing component 1502 and a peripheral interface module, which may be a keyboard, a click wheel, a button, and the like. These buttons may include, but are not limited to: a home button, volume buttons, start button, and lock button.
  • the sensor component 1513 includes at least one sensor for providing various aspects of status assessment for the UE 1500 .
  • the sensor component 1513 can detect the open/close state of the device 1500, the relative positioning of components, such as the display and the keypad of the UE1500, the sensor component 1513 can also detect the position change of the UE1500 or a component of the UE1500, and the user and Presence or absence of UE1500 contact, UE1500 orientation or acceleration/deceleration and temperature change of UE1500.
  • Sensor assembly 1513 may include a proximity sensor configured to detect the presence of nearby objects in the absence of any physical contact.
  • the sensor assembly 1513 may also include an optical sensor, such as a CMOS or CCD image sensor, for use in imaging applications.
  • the sensor component 1513 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor or a temperature sensor.
  • Communication component 1516 is configured to facilitate wired or wireless communications between UE 1500 and other devices.
  • UE1500 can access wireless networks based on communication standards, such as WiFi, 2G or 3G, or their combination.
  • the communication component 1516 receives broadcast signals or broadcast related information from an external broadcast management system via a broadcast channel.
  • the communication component 1516 also includes a near field communication (NFC) module to facilitate short-range communication.
  • NFC near field communication
  • the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, Infrared Data Association (IrDA) technology, Ultra Wideband (UWB) technology, Bluetooth (BT) technology and other technologies.
  • RFID Radio Frequency Identification
  • IrDA Infrared Data Association
  • UWB Ultra Wideband
  • Bluetooth Bluetooth
  • UE 1500 may be powered by at least one Application Specific Integrated Circuit (ASIC), Digital Signal Processor (DSP), Digital Signal Processing Device (DSPD), Programmable Logic Device (PLD), Field Programmable Gate Array ( FPGA), controller, microcontroller, microprocessor or other electronic components for implementing the above method.
  • ASIC Application Specific Integrated Circuit
  • DSP Digital Signal Processor
  • DSPD Digital Signal Processing Device
  • PLD Programmable Logic Device
  • FPGA Field Programmable Gate Array
  • controller microcontroller, microprocessor or other electronic components for implementing the above method.
  • Fig. 16 is a block diagram of a network side device 1600 provided by an embodiment of the present disclosure.
  • the network side device 1600 may be provided as a network side device.
  • the network side device 1600 includes a processing component 1611, which further includes at least one processor, and a memory resource represented by a memory 1632 for storing instructions executable by the processing component 1622, such as application programs.
  • the application programs stored in memory 1632 may include one or more modules each corresponding to a set of instructions.
  • the processing component 1610 is configured to execute instructions, so as to execute any method of the foregoing method applied to the network side device, for example, the method shown in FIG. 1 .
  • the network side device 1600 may also include a power supply component 1626 configured to perform power management of the network side device 1600, a wired or wireless network interface 1650 configured to connect the network side device 1600 to the network, and an input/output (I/O ) interface 1658.
  • the network side device 1600 can operate based on the operating system stored in the memory 1632, such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, Free BSDTM or similar.
  • the methods provided in the embodiments of the present disclosure are introduced from the perspectives of the network side device and the UE respectively.
  • the network side device and the UE may include a hardware structure and a software module, and implement the above functions in the form of a hardware structure, a software module, or a hardware structure plus a software module.
  • a certain function among the above-mentioned functions may be implemented in the form of a hardware structure, a software module, or a hardware structure plus a software module.
  • the methods provided in the embodiments of the present disclosure are introduced from the perspectives of the network side device and the UE respectively.
  • the network side device and the UE may include a hardware structure and a software module, and implement the above functions in the form of a hardware structure, a software module, or a hardware structure plus a software module.
  • a certain function among the above-mentioned functions may be implemented in the form of a hardware structure, a software module, or a hardware structure plus a software module.
  • the communication device may include a transceiver module and a processing module.
  • the transceiver module may include a sending module and/or a receiving module, the sending module is used to realize the sending function, the receiving module is used to realize the receiving function, and the sending and receiving module can realize the sending function and/or the receiving function.
  • the communication device may be a terminal device (such as the terminal device in the foregoing method embodiments), may also be a device in the terminal device, and may also be a device that can be matched and used with the terminal device.
  • the communication device may be a network device, or a device in the network device, or a device that can be matched with the network device.
  • the communication device may be a network device, or a terminal device (such as the terminal device in the foregoing method embodiments), or a chip, a chip system, or a processor that supports the network device to implement the above method, or it may be a terminal device that supports A chip, a chip system, or a processor for realizing the above method.
  • the device can be used to implement the methods described in the above method embodiments, and for details, refer to the descriptions in the above method embodiments.
  • a communications device may include one or more processors.
  • the processor may be a general purpose processor or a special purpose processor or the like.
  • it can be a baseband processor or a central processing unit.
  • the baseband processor can be used to process communication protocols and communication data
  • the central processor can be used to control communication devices (such as network side equipment, baseband chips, terminal equipment, terminal equipment chips, DU or CU, etc.)
  • a computer program that processes data for a computer program.
  • the communication device may further include one or more memories, on which computer programs may be stored, and the processor executes the computer programs, so that the communication device executes the methods described in the foregoing method embodiments.
  • data may also be stored in the memory.
  • the communication device and the memory can be set separately or integrated together.
  • the communication device may further include a transceiver and an antenna.
  • the transceiver may be referred to as a transceiver unit, a transceiver, or a transceiver circuit, etc., and is used to implement a transceiver function.
  • the transceiver may include a receiver and a transmitter, and the receiver may be called a receiver or a receiving circuit for realizing a receiving function; the transmitter may be called a transmitter or a sending circuit for realizing a sending function.
  • the communication device may further include one or more interface circuits.
  • the interface circuit is used to receive code instructions and transmit them to the processor.
  • the processor executes the code instructions to enable the communication device to execute the methods described in the foregoing method embodiments.
  • the communication device is a terminal device (such as the terminal device in the foregoing method embodiments): the processor is configured to execute any of the methods shown in FIGS. 1-4 .
  • the communication device is a network device: the transceiver is used to execute the method shown in any one of Fig. 5-Fig. 7 .
  • the processor may include a transceiver for implementing receiving and transmitting functions.
  • the transceiver may be a transceiver circuit, or an interface, or an interface circuit.
  • the transceiver circuits, interfaces or interface circuits for realizing the functions of receiving and sending can be separated or integrated together.
  • the above-mentioned transceiver circuit, interface or interface circuit may be used for reading and writing code/data, or the above-mentioned transceiver circuit, interface or interface circuit may be used for signal transmission or transfer.
  • the processor may store a computer program, and the computer program runs on the processor to enable the communication device to execute the methods described in the foregoing method embodiments.
  • a computer program may be embedded in a processor, in which case the processor may be implemented by hardware.
  • the communication device may include a circuit, and the circuit may implement the function of sending or receiving or communicating in the foregoing method embodiments.
  • the processors and transceivers described in this disclosure can be implemented on integrated circuits (integrated circuits, ICs), analog ICs, radio frequency integrated circuits (RFICs), mixed signal ICs, application specific integrated circuits (ASICs), printed circuit boards ( printed circuit board, PCB), electronic equipment, etc.
  • the processor and transceiver can also be fabricated using various IC process technologies such as complementary metal oxide semiconductor (CMOS), nMetal-oxide-semiconductor (NMOS), P-type Metal oxide semiconductor (positive channel metal oxide semiconductor, PMOS), bipolar junction transistor (bipolar junction transistor, BJT), bipolar CMOS (BiCMOS), silicon germanium (SiGe), gallium arsenide (GaAs), etc.
  • CMOS complementary metal oxide semiconductor
  • NMOS nMetal-oxide-semiconductor
  • PMOS P-type Metal oxide semiconductor
  • BJT bipolar junction transistor
  • BiCMOS bipolar CMOS
  • SiGe silicon germanium
  • GaAs gallium arsenide
  • the communication device described in the above embodiments may be a network device or a terminal device (such as the terminal device in the foregoing method embodiments), but the scope of the communication device described in this disclosure is not limited thereto, and the structure of the communication device may not be limited limits.
  • a communication device may be a stand-alone device or may be part of a larger device.
  • the communication device may be:
  • a set of one or more ICs may also include storage components for storing data and computer programs;
  • ASIC such as modem (Modem);
  • the communications device may be a chip or system-on-a-chip
  • the chip includes a processor and an interface.
  • the number of processors may be one or more, and the number of interfaces may be more than one.
  • the chip also includes a memory, which is used to store necessary computer programs and data.
  • An embodiment of the present disclosure also provides a system for determining the duration of a side link, the system includes a communication device as a terminal device (such as the first terminal device in the method embodiment above) in the foregoing embodiments and a communication device as a network device, Alternatively, the system includes the communication device as the terminal device in the foregoing embodiments (such as the first terminal device in the foregoing method embodiment) and the communication device as a network device.
  • the present disclosure also provides a readable storage medium on which instructions are stored, and when the instructions are executed by a computer, the functions of any one of the above method embodiments are realized.
  • the present disclosure also provides a computer program product, which implements the functions of any one of the above method embodiments when executed by a computer.
  • all or part of them may be implemented by software, hardware, firmware or any combination thereof.
  • software When implemented using software, it may be implemented in whole or in part in the form of a computer program product.
  • the computer program product comprises one or more computer programs. When the computer program is loaded and executed on the computer, all or part of the processes or functions according to the embodiments of the present disclosure will be generated.
  • the computer can be a general purpose computer, a special purpose computer, a computer network, or other programmable devices.
  • the computer program can be stored in or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer program can be downloaded from a website, computer, server or data center Transmission to another website site, computer, server or data center by wired (such as coaxial cable, optical fiber, digital subscriber line (DSL)) or wireless (such as infrared, wireless, microwave, etc.).
  • the computer-readable storage medium may be any available medium that can be accessed by a computer, or a data storage device such as a server or a data center integrated with one or more available media.
  • the available medium may be a magnetic medium (for example, a floppy disk, a hard disk, a magnetic tape), an optical medium (for example, a high-density digital video disc (digital video disc, DVD)), or a semiconductor medium (for example, a solid state disk (solid state disk, SSD)) etc.
  • a magnetic medium for example, a floppy disk, a hard disk, a magnetic tape
  • an optical medium for example, a high-density digital video disc (digital video disc, DVD)
  • a semiconductor medium for example, a solid state disk (solid state disk, SSD)
  • At least one in the present disclosure can also be described as one or more, and a plurality can be two, three, four or more, and the present disclosure is not limited.
  • the technical feature is distinguished by "first”, “second”, “third”, “A”, “B”, “C” and “D”, etc.
  • the technical features described in the “first”, “second”, “third”, “A”, “B”, “C” and “D” have no sequence or order of magnitude among the technical features described.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

一种系统信息验证方法、装置及存储介质,属于通信技术领域。其中,该方法包括:向网络侧设备发送辅助信息,辅助信息包括UE支持的验证方式、UE支持的验证算法的信息、UE期望验证的系统信息的标识、UE接收的系统信息的标识、UE接收的系统信息的标识、UE感兴趣的系统信息、用于指示UE期望对系统信息进行验证的第一指示信息中的至少一种;获取网络侧设备基于辅助信息发送的信息,并基于网络侧设备发送的信息触发系统信息正确性验证的过程。该方法可以确保系统信息验证的准确性,且可以对系统信息验证失败的UE进行差异化的控制。

Description

一种系统信息验证方法及设备/存储介质/装置 技术领域
本公开涉及通信技术领域,尤其涉及一种系统信息验证方法及设备/存储介质/装置。
背景技术
在通信系统中,通常会对系统信息进行正确性验证。相关技术中,系统信息正确性验证过程主要为:UE(User Equipment,用户设备)通过验证算法对接收到的系统信息进行计算得到数值一,网络侧设备通过验证算法对发送的系统信息进行计算得到数值二,网络侧设备可以将数值二发送给UE,由UE通过比较数值一和数值二是否匹配来对系统信息进行验证;或者UE可以将数值一发送给网络侧设备,由网络侧设备通过比较数值一和数值二是否匹配来对系统信息进行验证。
但是,相关技术中,UE和网络侧设备支持的验证算法的类型可能会不同,此时,也会使得数值一与数值二不匹配,则会降低系统信息验证的准确性。此外,相关技术中,当确定系统信息验证失败时,无法根据UE的不同安全需求,对系统信息验证失败的UE进行差异化的控制。
发明内容
本公开提出的系统信息验证方法及设备/存储介质/装置,以解决相关技术中系统信息验证的准确性较低,以及无法对系统信息验证失败的UE进行差异化的控制的技术问题。
本公开一方面实施例提出的系统信息验证方法,应用于UE,包括:
向网络侧设备发送辅助信息,所述辅助信息包括所述UE支持的验证方式、所述UE支持的验证算法的信息、所述UE期望验证的系统信息的标识、所述UE接收的系统信息的标识、所述UE感兴趣的系统信息、用于指示所述UE期望对系统信息进行验证的第一指示信息中的至少一种;
获取所述网络侧设备基于辅助信息发送的信息,并基于所述网络侧设备发送的信息触发系统信息正确性验证的过程。
本公开另一方面实施例提出的系统信息验证方法,应用于网络侧设备,包括:
获取UE发送的辅助信息,所述辅助信息包括所述UE支持的验证方式、所述UE支持的验证算法的信息、所述UE期望验证的系统信息的标识、所述UE接收的系统信息的标识、所述UE感兴趣的系统信息、用于指示所述UE期望对系统信息进行验证的第一指示信息中的至少一种;
基于所述辅助信息触发系统信息正确性验证的过程。
本公开又一方面实施例提出的一种系统信息验证装置,包括:
发送模块,用于向网络侧设备发送辅助信息,所述辅助信息包括所述UE支持的验证方式、所述UE支持的验证算法的信息、所述UE期望验证的系统信息的标识、所述UE接收的系统信息的标识、所述UE感兴趣的系统信息、用于指示所述UE期望对系统信息进行验证的第一指示信息中的至少一种;
验证模块,用于获取所述网络侧设备基于辅助信息发送的信息,并基于所述网络侧设备发送的信息触发系统信息正确性验证的过程。
本公开又一方面实施例提出的一种系统信息验证装置,包括:
获取模块,用于获取UE发送的辅助信息,所述辅助信息包括所述UE支持的验证方式、所述UE支持的验证算法的信息、所述UE期望验证的系统信息的标识、所述UE接收的系统信息的标识、所述UE感兴趣的系统信息、用于指示所述UE期望对系统信息进行验证的第一指示信息中的至少一种;
验证模块,用于基于所述辅助信息触发系统信息正确性验证的过程。
本公开又一方面实施例提出的一种通信装置,所述装置包括处理器和存储器,所述存储器中存储有计算机程序,所述处理器执行所述存储器中存储的计算机程序,以使所述装置执行如上一方面实施例提出的方法。
本公开又一方面实施例提出的一种通信装置,所述装置包括处理器和存储器,所述存储器中存储有计算机程序,所述处理器执行所述存储器中存储的计算机程序,以使所述装置执行如上另一方面实施例 提出的方法。
本公开又一方面实施例提出的通信装置,包括:处理器和接口电路;
所述接口电路,用于接收代码指令并传输至所述处理器;
所述处理器,用于运行所述代码指令以执行如一方面实施例提出的方法。
本公开又一方面实施例提出的通信装置,包括:处理器和接口电路;
所述接口电路,用于接收代码指令并传输至所述处理器;
所述处理器,用于运行所述代码指令以执行如另一方面实施例提出的方法。
本公开又一方面实施例提出的计算机可读存储介质,用于存储有指令,当所述指令被执行时,使如一方面实施例提出的方法被实现。
本公开又一方面实施例提出的计算机可读存储介质,用于存储有指令,当所述指令被执行时,使如另一方面实施例提出的方法被实现。
综上所述,在本公开实施例提供的系统信息验证方法及设备/存储介质/装置之中,UE会向网络侧设备发送辅助信息,并会获取网络侧设备基于辅助信息发送的信息,以及基于网络侧设备发送的信息触发系统信息正确性验证的过程。其中,该辅助信息包括UE支持的验证方式、UE支持的验证算法的信息、UE期望验证的系统信息的标识、UE接收的系统信息的标识、UE感兴趣的系统信息、用于指示UE期望对系统信息进行验证的第一指示信息中的至少一种。由此,本公开实施例中,UE会先向网络侧设备上报UE支持验证算法,以便网络侧设备可以基于UE支持的验证算法确定出后续系统信息正确性验证的过程中所使用的验证算法,并指示给UE,由此在后续执行系统信息正确性验证时,可以确保网络侧设备和UE使用相同的验证算法,则提高了系统信息验证的准确性。
此外,在本公开的实施例中,在对系统信息进行正确性验证之后,还会确定系统信息是否存在安全问题,当存在时,UE执行对应的操作(即:触发释放连接过程,和/或,触发连接重建过程,和/或,向网络侧设备上报第五指示信息),由此可以实现“根据UE的不同安全需求,对系统信息验证失败的UE进行差异化的控制”这一目的。
附图说明
本公开上述的和/或附加的方面和优点从下面结合附图对实施例的描述中将变得明显和容易理解,其中:
图1为本公开一个实施例所提供的系统信息验证方法的流程示意图;
图2为本公开另一个实施例所提供的系统信息验证方法的流程示意图;
图3为本公开再一个实施例所提供的系统信息验证方法的流程示意图;
图4a为本公开又一个实施例所提供的系统信息验证方法的流程示意图;
图4b为本公开又一个实施例所提供的系统信息验证方法的流程示意图;
图5为本公开又一个实施例所提供的系统信息验证方法的流程示意图;
图6为本公开又一个实施例所提供的系统信息验证方法的流程示意图;
图7为本公开又一个实施例所提供的系统信息验证方法的流程示意图;
图8为本公开又一个实施例所提供的系统信息验证方法的流程示意图;
图9为本公开又一个实施例所提供的系统信息验证方法的流程示意图;
图10a为本公开又一个实施例所提供的系统信息验证方法的流程示意图;
图10b为本公开又一个实施例所提供的系统信息验证方法的流程示意图;
图11为本公开又一个实施例所提供的系统信息验证方法的流程示意图;
图12为本公开又一个实施例所提供的系统信息验证方法的流程示意图;
图13为本公开一个实施例所提供的系统信息验证装置的结构示意图;
图14为本公开另一个实施例所提供的系统信息验证装置的结构示意图;
图15是本公开一个实施例所提供的一种用户设备的框图;
图16为本公开一个实施例所提供的一种网络侧设备的框图。
具体实施方式
这里将详细地对示例性实施例进行说明,其示例表示在附图中。下面的描述涉及附图时,除非另有表示,不同附图中的相同数字表示相同或相似的要素。以下示例性实施例中所描述的实施方式并不代表与本公开实施例相一致的所有实施方式。相反,它们仅是与如所附权利要求书中所详述的、本公开实施例的一些方面相一致的装置和方法的例子。
在本公开实施例使用的术语是仅仅出于描述特定实施例的目的,而非旨在限制本公开实施例。在本公开实施例和所附权利要求书中所使用的单数形式的“一种”和“该”也旨在包括多数形式,除非上下文清楚地表示其他含义。还应当理解,本文中使用的术语“和/或”是指并包含一个或多个相关联的列出项目的任何或所有可能组合。
应当理解,尽管在本公开实施例可能采用术语第一、第二、第三等来描述各种信息,但这些信息不应限于这些术语。这些术语仅用来将同一类型的信息彼此区分开。例如,在不脱离本公开实施例范围的情况下,第一信息也可以被称为第二信息,类似地,第二信息也可以被称为第一信息。取决于语境,如在此所使用的词语“如果”及“若”可以被解释成为“在……时”或“当……时”或“响应于确定”。
下面参考附图对本公开实施例所提供的测量方法、装置、用户设备、网络侧设备及存储介质进行详细描述。
图1为本公开实施例所提供的一种系统信息验证方法的流程示意图,该方法由UE执行,如图1所示,该系统信息验证方法可以包括以下步骤:
步骤101、向网络侧设备发送辅助信息。
其中,在本公开的一个实施例之中,该UE可以是指向用户提供语音和/或数据连通性的设备。终端设备可以经RAN(Radio Access Network,无线接入网)与一个或多个核心网进行通信,UE可以是物联网终端,如传感器设备、移动电话(或称为“蜂窝”电话)和具有物联网终端的计算机,例如,可以是固定式、便携式、袖珍式、手持式、计算机内置的或者车载的装置。例如,站(Station,STA)、订户单元(subscriber unit)、订户站(subscriber station),移动站(mobile station)、移动台(mobile)、远程站(remote station)、接入点、远程终端(remoteterminal)、接入终端(access terminal)、用户装置(user terminal)或用户代理(useragent)。或者,UE也可以是无人飞行器的设备。或者,UE也可以是车载设备,比如,可以是具有无线通信功能的行车电脑,或者是外接行车电脑的无线终端。或者,UE也可以是路边设备,比如,可以是具有无线通信功能的路灯、信号灯或者其它路边设备等。
以及,在本公开的一个实施例之中,辅助信息可以包括UE支持的验证方式、UE支持的验证算法的信息、UE期望验证的系统信息的标识、UE接收的系统信息的标识、UE感兴趣的系统信息、用于指示UE期望对系统信息进行验证的第一指示信息中的至少一种。
其中,在本公开的一个实施例之中,上述的验证方式可以包括:
由UE对系统信息进行正确性验证;即:由UE来执行“验证网络侧设备对系统信息计算得到的数值和UE对系统信息计算得到的数值是否匹配”这一步骤。
由网络侧设备对系统信息进行正确性验证;即:由网络侧设备来执行“验证网络侧设备对系统信息计算得到的数值和UE对系统信息计算得到的数值是否匹配”这一步骤。
在本公开的一个实施例之中,上述的UE支持的验证算法的信息可以包括以下至少一种:
UE支持的验证算法的算法类型标识;示例的,在本公开的一个实施例之中,算法类型标识可以包括校验和法、异或校验法、CRC(Cyclic Redundancy Check,循环冗余校验)校验法、哈希校验法、散列校验法中的至少一种算法类型的标识。
UE支持的验证算法的算法标识;示例的,在本公开的一个实施例之中,算法标识可以包括MD3(Message-Digest Algorithm,信息摘要算法)、MD4、MD5、SHA-1(Secure Hash Algorithm,安全散列算法)中至少一种算法的算法标识。
进一步地,在本公开的一个实施例之中,上述的UE期望验证的系统信息可以为UE接收到的系统信息中的一种或多种。例如,UE期望验证的系统信息可以为SIB(System Information Block,系统信息 块)x,x为整数。
需要说明的是,在本公开的一个实施例之中,UE希望获取更高的系统信息安全保护时,可以直接向网络侧设备发送上述辅助信息,以便网络侧设备可以基于该辅助信息触发后续系统信息的验证流程,实现更高的系统信息安全保护。
步骤102、基于网络侧设备发送的信息触发系统信息正确性验证的过程。
其中,在本公开的一个实施例之中,当验证时的验证方式不同时,网络侧设备所发送的信息会有所不同,并且,触发的系统信息正确性验证的过程也会有所不同。其中,关于该部分的详细介绍可以参考后续实施例描述。
以及,在本公开的一个实施例之中,上述的系统信息可以是网络侧设备广播至UE的。在本公开的另一个实施例之中,上述的系统信息可以是网络侧设备通过专属信令发送至UE的。
综上所述,在本公开实施例提供的系统信息验证方法之中,UE会向网络侧设备发送辅助信息,并会获取网络侧设备基于辅助信息发送的信息,以及基于网络侧设备发送的信息触发系统信息正确性验证的过程。其中,该辅助信息包括UE支持的验证方式、UE支持的验证算法的信息、UE期望验证的系统信息的标识、UE接收的系统信息的标识、所述UE感兴趣的系统信息、用于指示UE期望对系统信息进行验证的第一指示信息中的至少一种。由此,本公开实施例中,UE会先向网络侧设备上报UE支持验证算法,以便网络侧设备可以基于UE支持的验证算法确定出后续系统信息正确性验证的过程中所使用的验证算法,并指示给UE,由此在后续执行系统信息正确性验证时,可以确保网络侧设备和UE使用相同的验证算法,则提高了系统信息验证的准确性。
图2为本公开实施例所提供的一种系统信息验证方法的流程示意图,该方法由UE执行,如图2所示,该系统信息验证方法可以包括以下步骤:
步骤201、获取网络侧设备发送配置信息。
在本公开的一个实施例之中,配置信息可以包括以下至少一种:
网络侧设备支持的验证方式;
支持验证的系统信息对应的区域标识;
第一请求消息,第一请求消息用于请求UE上报UE是否支持验证系统信息的能力,和/或,用于请求UE支持的验证算法的信息;
第二请求消息,第二请求消息用于请求UE上报UE期望验证的系统信息的标识;
第三请求消息,第三请求消息用于请求UE上报UE接收的系统信息的标识。
第四请求消息,所述第四请求消息用于请求UE上报所述UE感兴趣的系统信息的标识。
其中,关于上述的验证方式以及UE支持的验证算法的相关介绍可以参考上述实施例描述,本公开实施例在此不做赘述。
进一步地,在本公开的一个实施例之中,上述的支持验证的系统信息对应的区域标识可以包括以下至少一种:
支持验证的系统信息对应的小区标识;例如,小区标识可以为小区-1;
支持验证的系统信息对应的小区类型标识;例如,小区类型标识可以为PCell(Primary Cell,主小区)标识、PSCell(Primary Secondary Cell,主辅小区)标识、SCell(Secondary Cell,辅小区)标识中的至少一种;
支持验证的系统信息对应的小区组类型标识;例如,小区组类型标识可以为MCG(Master Cell Group,主小区组)标识、SCG(Secondary Cell Group,辅小区组)标识中的至少一种;
支持验证的系统信息对应的跟踪区域标识;例如,跟踪区域标识可以为TAC-1(Tracking Area Code,跟踪区域码)标识;
支持验证的系统信息对应的接入网指示区域标识;例如,接入网指示区域标识可以为RNA-1(RAN-based Notification Area,接入网指示区域)标识。
以及,在本公开的一个实施例之中,UE获取网络侧设备发送配置信息的方法包括以下至少一种:
UE获取网络侧设备通过广播消息发送的配置信息,其中,该广播消息例如可以为SIBx,x为正整 数;
UE获取网络侧设备通过专属配置消息发送的配置信息,其中,该专属配置消息例如可以为无线资源控制重新配置(RRC Reconfiguration)消息。
步骤202、基于配置信息向网络侧设备发送辅助信息。
步骤203、基于网络侧设备发送的信息触发系统信息正确性验证的过程。
其中,在本公开的一个实施例之中,当后续验证时的验证方式不同时,网络侧设备所发送的信息会有所不同,并且,触发的系统信息正确性验证的过程也会有所不同。其中,关于该部分的详细介绍可以参考后续实施例描述,本公开说实施例在此不做赘述。
综上所述,在本公开实施例提供的系统信息验证方法之中,UE会向网络侧设备发送辅助信息,并会获取网络侧设备基于辅助信息发送的信息,以及基于网络侧设备发送的信息触发系统信息正确性验证的过程。其中,该辅助信息包括UE支持的验证方式、UE支持的验证算法的信息、UE期望验证的系统信息的标识、UE接收的系统信息的标识、所述UE感兴趣的系统信息、用于指示UE期望对系统信息进行验证的第一指示信息中的至少一种。由此,本公开实施例中,UE会先向网络侧设备上报UE支持验证算法,以便网络侧设备可以基于UE支持的验证算法确定出后续系统信息正确性验证的过程中所使用的验证算法,并指示给UE,由此在后续执行系统信息正确性验证时,可以确保网络侧设备和UE使用相同的验证算法,则提高了系统信息验证的准确性。
图3为本公开实施例所提供的一种系统信息验证方法的流程示意图,该方法由UE执行,且本实施例中的验证方式为:由UE对系统信息进行正确性验证。如图3所示,该系统信息验证方法可以包括以下步骤:
步骤301、向网络侧设备发送辅助信息。
其中,在本公开的一个实施例之中,该辅助信息可以包括UE支持的验证方式、UE支持的验证算法的信息、UE期望验证的系统信息的标识、UE接收的系统信息的标识、UE感兴趣的系统信息的标识、用于指示UE期望对系统信息进行验证的第一指示信息中的至少一种。
以及,关于步骤301的相关介绍可以参考上述实施例描述,本公开实施例在此不做赘述。
步骤302、获取第一数值和第一验证算法的信息。
其中,在本公开的一个实施例之中,该第一验证算法可以是UE支持的验证算法中任一验证算法。例如该第一验证算法可以为校验和法、或者、哈希校验法、或者、MD3等。
以及,在本公开的一个实施例之中,UE获取第一验证算法的信息的方式可以包括以下至少一种:
基于协议约定确定第一验证算法的信息;
获取网络侧设备指示的第一验证算法的信息。
其中,在本公开的一个实施例之中,网络侧设备指示第一验证算法的信息的方法可以包括以下至少一种:
通过安全模式命令向UE指示该第一验证算法的信息;
通过除安全模式命令以外的其他专属信令向UE指示该第一验证算法的信息;其中,该其他专属信令例如可以包括:RRCReconfiguration信息,和/或下行信息传输(DLInformationTransfer)信息。
进一步地,在本公开的一个实施例之中,上述的第一数值可以是网络侧设备利用第一验证算法对待验证的系统信息进行计算得到。其中,在本公开的一个实施例之中,该待验证的系统信息可以为UE期望验证的系统信息、UE接收到的系统信息、UE感兴趣的系统信息中的至少一种。以及,在本公开的一个实施例之中,网络侧设备确定第一验证算法的方法可以为:网络侧设备自主从UE支持的验证算法确定第一验证算法,和/或,网络侧设备基于协议约定确定第一验证算法。
进一步地,在本公开的一个实施例之中,UE获取第一数值的方式可以包括为:获取网络侧设备发送的第一数值。
其中,在本公开的一个实施例之中,网络侧设备发送第一数值的方法可以包括以下至少一种:
通过安全模式命令向UE发送该第一数值;
通过除安全模式命令以外的其他专属信令向UE发送该第一数值;其中,该其他专属信令例如可以 包括:RRC Reconfiguration信息,和/或DL Information Transfer信息。
步骤303、利用第一验证算法对待验证系统信息进行计算得到第二数值。
步骤304、确定第一数值与第二数值是否匹配,当匹配时,确定验证结果为:验证成功,当不匹配时,确定验证结果为:验证失败。
其中,在本公开的一个实施例之中,响应于确定验证结果为:验证成功,说明待验证系统信息传输成功,响应于确定验证结果为:验证失败,说明待验证系统信息传输失败。
步骤305、响应于验证结果为验证失败,向网络侧设备发送验证结果。
其中,在本公开的一个实施例之中,UE向网络侧设备发送验证结果的方法可以包括以下至少一种:
通过安全模式命令向网络侧设备发送该验证结果;
通过除安全模式命令以外的其他专属信令向UE发送该验证结果;其中,该其他专属信令例如可以包括:无线资源控制连接重配置完成(RRC Reconfiguration Complete)信息或上行信息传输(UL Information Transfer)信息。
以及,在本公开的一个实施例之中,当UE确定验证结果为验证失败时,则说明待验证系统信息未传输成功,此时,UE可以向网络侧设备发送该验证结果,以便使得网络侧设备基于该验证结果重新向UE发送系统信息。
综上所述,在本公开实施例提供的系统信息验证方法之中,UE会向网络侧设备发送辅助信息,并会获取网络侧设备基于辅助信息发送的信息,以及基于网络侧设备发送的信息触发系统信息正确性验证的过程。其中,该辅助信息包括UE支持的验证方式、UE支持的验证算法的信息、UE期望验证的系统信息的标识、UE接收的系统信息的标识、UE感兴趣的系统信息的标识、用于指示UE期望对系统信息进行验证的第一指示信息中的至少一种。由此,本公开实施例中,UE会先向网络侧设备上报UE支持验证算法,以便网络侧设备可以基于UE支持的验证算法确定出后续系统信息正确性验证的过程中所使用的验证算法,并指示给UE,由此在后续执行系统信息正确性验证时,可以确保网络侧设备和UE使用相同的验证算法,则提高了系统信息验证的准确性。
图4a为本公开实施例所提供的一种系统信息验证方法的流程示意图,该方法由UE执行,且本实施例中的验证方式为:由网络侧设备对系统信息进行正确性验证。如图4所示,该系统信息验证方法可以包括以下步骤:
步骤401a、向网络侧设备发送辅助信息。
其中,在本公开的一个实施例之中,该辅助信息可以包括UE支持的验证方式、UE支持的验证算法的信息、UE期望验证的系统信息的标识、UE接收的系统信息的标识、UE感兴趣的系统信息的标识、用于指示UE期望对系统信息进行验证的第一指示信息中的至少一种。
以及,关于步骤401的其他介绍可以参考上述实施例描述,本公开实施例在此不做赘述。
步骤402a、获取第一验证算法的信息和第二指示信息。
其中,关于第一验证算的信息以及该第一验证算的信息的获取方式可以参考上述实施例描述,本公开实施例在此不做赘述。
以及,在本公开的一个实施例之中,该第二指示信息用于指示UE对系统信息进行正确性验证。
以及,在本公开的一个实施例之中,UE获取第二指示信息的方式可以包括以下至少一种:
基于协议约定确定第二指示信息;
获取网络侧设备指示的第二指示信息。
其中,在本公开的一个实施例之中,网络侧设备指示第二指示信息的方法可以包括以下至少一种:
通过安全模式命令向UE指示该第二指示信息;
通过除安全模式命令以外的其他专属信令向UE指示该第二指示信息;其中,该其他专属信令例如可以包括:RRC Reconfiguration信息,和/或DL Information Transfer信息。
步骤403a、利用第一验证算法对待验证系统信息进行计算得到第二数值。
步骤404a、向网络侧设备发送第二数值,以由网络侧设备基于第二数值对系统信息进行正确性验证。
其中,在本公开的一个实施例之中,UE向网络侧设备发送第二数值的方法可以包括以下至少一种:
通过安全模式命令向网络侧设备发送该第二数值;
通过除安全模式命令以外的其他专属信令向UE发送该第二数值;其中,该其他专属信令例如可以包括:RRC Reconfiguration Complete信息或UL Information Transfer信息。
进一步地,在本公开的一个实施例之中,网络侧设备基于第二数值对系统信息进行正确性验证的方法可以包括:网络侧设备基于第一验证算法对待验证系统信息进行计算得到第一数值,确定第一数值和第二数值是否匹配,当匹配时,确定验证结果为:验证成功;当不匹配时,确定验证结果为:验证失败。其中,关于网络侧设备确定第一验证算法的发生可以参考上述实施例描述,本公开实施例在此不做赘述。
综上所述,在本公开实施例提供的系统信息验证方法之中,UE会向网络侧设备发送辅助信息,并会获取网络侧设备基于辅助信息发送的信息,以及基于网络侧设备发送的信息触发系统信息正确性验证的过程。其中,该辅助信息包括UE支持的验证方式、UE支持的验证算法的信息、UE期望验证的系统信息的标识、UE接收的系统信息的标识、UE感兴趣的系统信息的标识、用于指示UE期望对系统信息进行验证的第一指示信息中的至少一种。由此,本公开实施例中,UE会先向网络侧设备上报UE支持验证算法,以便网络侧设备可以基于UE支持的验证算法确定出后续系统信息正确性验证的过程中所使用的验证算法,并指示给UE,由此在后续执行系统信息正确性验证时,可以确保网络侧设备和UE使用相同的验证算法,则提高了系统信息验证的准确性。
图4b为本公开实施例所提供的一种系统信息验证方法的流程示意图,该方法由UE执行,且本实施例中的验证方式为:由网络侧设备对系统信息进行正确性验证。如图4所示,该系统信息验证方法可以包括以下步骤:
步骤401b、向网络侧设备发送辅助信息。
步骤402b、获取第一验证算法的信息和第二指示信息。
步骤403b、利用第一验证算法对待验证系统信息进行计算得到第二数值。
步骤404b、向网络侧设备发送第二数值,以由网络侧设备基于第二数值对系统信息进行正确性验证。
其中,关于步骤401b-404b的相关介绍可以参考上述实施例描述,本公开实施例在此不做赘述。
步骤405b、获取网络侧设备发送的验证结果信息。
在本公开的一个实施例之中,验证结果信息可以包括以下的至少一种:
对系统信息进行正确性验证的验证结果,验证结果包括验证成功或验证失败;
被验证的系统信息对应的区域标识;
第三指示信息,第三指示信息用于指示系统信息是否存在安全问题;
第四指示信息,第四指示信息包括系统信息存在的安全问题的类型指示,类型指示包括系统信息正确性验证失败指示,和/或系统信息被篡改指示。
其中,在本公开的一个实施例之中,上述被验证的系统信息对应的区域标识可以包括以下至少一种:
被验证的系统信息对应的小区标识;
被验证的系统信息对应的小区类型标识;
被验证的系统信息对应的小区组类型标识;
被验证的系统信息对应的跟踪区域标识;
被验证的系统信息对应的接入网指示区域标识。
其中,关于小区标识、小区类型标识、小区组类型标识、跟踪区域标识以及接入网指示区域标识的举例介绍可以参考上述实施例,本公开实施例在此不做赘述。
以及,需要说明的是,在本公开的一个实施例之中,当网络侧设备基于第二数值对系统信息进行正确性验证之后,该网络侧设备还可以进一步确定系统信息是否存在安全问题。
具体而言,在本公开的一个实施例之中,网络侧设备确定系统信息是否存在安全问题的方法可以包括以下至少一种:
方法一:基于验证结果确定系统信息是否存在安全问题。
其中,在本公开的一个实施例之中,网络侧设备基于验证结果确定系统信息是否存在安全问题的方法主要为:确定系统信息的验证失败的失败次数,响应于失败次数超过第一阈值(例如可以为正整数),确定系统信息存在安全问题,否则,确定系统信息不存在安全问题。其中,在本公开的一个实施例之中,该第一阈值可以是基站指示的,在本公开的另一个实施例之中,该第一阈值也可以是UE基于协议约定确定的。以及,在本公开的一个实施例之中,该失败次数可以为相同系统信息的验证失败的失败次数,进一步地,在本公开的一个实施例之中,该失败次数可以为相同系统信息的验证失败的连续失败次数。
示例的,在本公开的一个实施例之中,假设第一阈值为5,以及,网络侧设备先连续2次确定SIB3验证失败,之后,连续3次确定SIB2验证失败,最后,又连续3次确定SIB3验证失败。其中,虽然有5次确定SIB3验证失败,但是由于SIB3验证失败的5次并不是连续的,因此网络侧设备判断SIB3不存在“系统信息安全问题”。
方法二:基于网络侧设备发送系统信息的次数确定系统信息是否存在安全问题。
其中,在本公开的一个实施例之中,网络侧设备基于网络侧设备发送系统信息的次数确定系统信息是否存在安全问题的方法可以包括:确定系统信息的发送次数,响应于发送次数超过第二阈值(例如可以为正整数),确定系统信息存在安全问题,否则,确定系统信息不存在安全问题。其中,在本公开的一个实施例之中,该第二阈值可以是基站指示的,在本公开的另一个实施例之中,该第二阈值也可以是UE基于协议约定确定的。以及,在本公开的一个实施例之中,该发送次数可以为相同系统信息的发送次数,进一步地,在本公开的一个实施例之中,该发送次数可以为相同系统信息的连续发送次数。
需要说明的是,在本公开的一个实施例之中,当确定出系统信息的验证结果为验证失败时,则网络侧设备会重新向UE发送系统信息,由此,通过判定网络侧设备连续发送同一系统信息的次数,即可确定出该系统信息验证失败的次数,进而可以判定该系统信息是否发生安全问题。
示例的,在本公开的一个实施例之中,假设第一阈值为5,以及,网络侧设备先连续发送了2次SIB3,之后,连续发送了3次SIB2,最后,又连续发送了3次SIB3。其中,网路侧设备虽然发送了5次SIB3,但是由于发送SIB3的5次并不是连续的,因此网络侧设备判断SIB3不存在“系统信息安全问题”。
进一步地,在本公开的一个实施例之中,网络侧设备在确定了系统信息是否存在安全问题后,还可以利用上述第三指示信息来指示对于“系统信息是否存在安全问题”的确定结果。其中,在本公开的一个实施例之中,该第三指示信息可以为一N比特(bit)数,N为正整数。示例的,在本公开的一个实施例之中,该第三指示信息可以为1bit,以及,当该1bit包含的内容为“0”时,则表示系统信息不存在安全问题;当该1bit包含的内容为“1”时,则表示系统信息存在安全问题。
综上所述,在本公开实施例提供的系统信息验证方法之中,UE会向网络侧设备发送辅助信息,并会获取网络侧设备基于辅助信息发送的信息,以及基于网络侧设备发送的信息触发系统信息正确性验证的过程。其中,该辅助信息包括UE支持的验证方式、UE支持的验证算法的信息、UE期望验证的系统信息的标识、UE接收的系统信息的标识、UE感兴趣的系统信息的标识、用于指示UE期望对系统信息进行验证的第一指示信息中的至少一种。由此,本公开实施例中,UE会先向网络侧设备上报UE支持验证算法,以便网络侧设备可以基于UE支持的验证算法确定出后续系统信息正确性验证的过程中所使用的验证算法,并指示给UE,由此在后续执行系统信息正确性验证时,可以确保网络侧设备和UE使用相同的验证算法,则提高了系统信息验证的准确性。
图5为本公开实施例所提供的一种系统信息验证方法的流程示意图,该方法由UE执行,如图5所示,该系统信息验证方法可以包括以下步骤:
步骤501、向网络侧设备发送辅助信息。
在本公开的一个实施例之中,该辅助信息包括UE支持的验证方式、UE支持的验证算法的信息、UE期望验证的系统信息的标识、UE接收的系统信息的标识、UE感兴趣的系统信息的标识、用于指示UE期望对系统信息进行验证的第一指示信息中的至少一种。
步骤502、获取网络侧设备发送的信息,并基于网络侧设备发送的信息触发系统信息正确性验证的过程。
以及,在本公开的一个实施例之中,该步骤501-502可以为上述步骤301-305的步骤。在本公开的另一个实施例之中,该步骤501-502可以为上述步骤401a-404b的步骤,在本公开的又一个实施例之中,该步骤501-502可以为上述步骤401a-405b的步骤。以及,关于步骤501-502的相关介绍可以参考上述实施例描述,本公开说实施例在此不做赘述。
步骤503、响应于验证结果为:验证失败,获取网络侧设备重新发送的系统信息。
其中,在本公开的一个实施例之中,当验证结果为:验证失败时,则说明被验证的系统信息未成功传输,此时,可网络侧设备需要重新发送一次该系统信息。
综上所述,在本公开实施例提供的系统信息验证方法之中,UE会向网络侧设备发送辅助信息,并会获取网络侧设备基于辅助信息发送的信息,以及基于网络侧设备发送的信息触发系统信息正确性验证的过程。其中,该辅助信息包括UE支持的验证方式、UE支持的验证算法的信息、UE期望验证的系统信息的标识、UE接收的系统信息的标识、UE感兴趣的系统信息的标识、用于指示UE期望对系统信息进行验证的第一指示信息中的至少一种。由此,本公开实施例中,UE会先向网络侧设备上报UE支持验证算法,以便网络侧设备可以基于UE支持的验证算法确定出后续系统信息正确性验证的过程中所使用的验证算法,并指示给UE,由此在后续执行系统信息正确性验证时,可以确保网络侧设备和UE使用相同的验证算法,则提高了系统信息验证的准确性。
图6为本公开实施例所提供的一种系统信息验证方法的流程示意图,该方法由UE执行,如图6所示,该系统信息验证方法可以包括以下步骤:
步骤601、向网络侧设备发送辅助信息。
其中,在本公开的一个实施例之中,辅助信息可以包括UE支持的验证方式、UE支持的验证算法的信息、UE期望验证的系统信息的标识、UE接收的系统信息的标识、UE感兴趣的系统信息的标识、用于指示UE期望对系统信息进行验证的第一指示信息中的至少一种。
步骤602、获取网络侧设备发送的信息,并基于网络侧设备发送的信息触发系统信息正确性验证的过程。
步骤603、响应于验证结果为:验证失败,获取网络侧设备重新发送的系统信息。
其中,关于步骤601-603的详细介绍可以参考上述实施例描述,本公开实施例在此不做赘述。
步骤604、确定系统信息是否存在安全问题。
在本公开的一个实施例之中,UE确定系统信息是否存在安全问题的方法包括以下至少一种:
方法一:基于验证结果确定系统信息是否存在安全问题。
其中,在本公开的一个实施例之中,UE基于验证结果确定系统信息是否存在安全问题的方法主要为:确定系统信息的验证失败的失败次数,响应于失败次数超过第一阈值(例如可以为正整数),确定系统信息存在安全问题,否则,确定系统信息不存在安全问题。其中,在本公开的一个实施例之中,该第一阈值可以是基站指示的,在本公开的另一个实施例之中,该第一阈值也可以是UE基于协议约定确定的。以及,在本公开的一个实施例之中,该失败次数可以为相同系统信息的验证失败的失败次数,进一步地,在本公开的一个实施例之中,该失败次数可以为相同系统信息的验证失败的连续失败次数。
示例的,在本公开的一个实施例之中,假设第一阈值为5,以及,UE先连续2次确定SIB(System Information Block,系统信息块)3验证失败,之后,连续3次确定SIB2验证失败,最后,又连续3次确定SIB3验证失败。其中,虽然有5次确定SIB3验证失败,但是由于SIB3验证失败的5次并不是连续的,因此UE判断SIB3不存在“系统信息安全问题”。
方法二:基于UE接收系统信息的次数确定系统信息是否存在安全问题。
其中,在本公开的一个实施例之中,UE基于UE接收系统信息的次数确定系统信息是否存在安全问题的方法可以包括:确定系统信息的接收次数,响应于接收次数超过第二阈值(例如可以为正整数),确定系统信息存在安全问题,否则,确定系统信息不存在安全问题。其中,在本公开的一个实施例之中,该第二阈值可以是基站指示的,在本公开的另一个实施例之中,该第二阈值也可以是UE基于协议约定确定的。以及,在本公开的一个实施例之中,该接收次数可以为相同系统信息的接收次数,进一步地,在本公开的一个实施例之中,该接收次数可以为相同系统信息的连续接收次数。
需要说明的是,在本公开的一个实施例之中,当确定出系统信息的验证结果为验证失败时,则网络侧设备会重新向UE发送系统信息,由此,通过判定UE连续接收同一系统信息的次数,即可确定出该系统信息验证失败的次数,进而可以判定该系统信息是否发生安全问题。
示例的,在本公开的一个实施例之中,假设第一阈值为5,以及,UE先连续接收了2次SIB3,之后,连续接收了3次SIB2,最后,又连续接收了3次SIB3。其中,UE虽然接收了5次SIB3,但是由于接收SIB3的5次并不是连续的,因此UE判断SIB3不存在“系统信息安全问题”。
此外,需要说明的是,在上述步骤602中UE基于网络侧设备发送的信息触发系统信息正确性验证的过程中,即使UE接收到了网络侧设备发送的验证结果信息,且该验证结果信息中包括有第三指示信息和/或第四指示信息(也即是对应于上述图4b的实施例),本步骤604中UE仍然会执行“确定系统信息是否存在安全问题”的步骤。也即是,在本公开的一个实施例之中,网络侧设备确定系统信息是否存在安全问题的步骤与UE确定系统信息是否存在安全问题的步骤是相互独立的。
步骤605、响应于确定系统信息存在安全问题,UE执行对应的操作。
在本公开的一个实施例之中,响应于确定系统信息存在安全问题,UE所执行的对应的操作可以包括以下至少一种:
操作一、响应于确定系统信息存在安全问题,触发释放连接过程,并进行小区选择或重选。
其中,在本公开的一个实施例之中,触发释放连接过程可以包括:
向网络侧设备发送第五指示信息和/或连接释放指示。
在本公开的一个实施例之中,第五指示信息用于指示系统信息存在安全问题的具体情况,以及,第五指示信息可以包括以下的至少一种:
存在安全问题的系统信息的标识;
第四指示信息,第四指示信息包括系统信息存在的安全问题的类型指示,类型指示包括系统信息正确性验证失败指示,和/或系统信息被篡改指示;
存在安全问题的系统信息对应的区域标识。
以及,在本公开的一个实施例之中,上述的存在安全问题的系统信息对应的区域标识可以包括以下的至少一种:
存在安全问题的系统信息对应的小区标识;
存在安全问题的系统信息对应的小区类型标识;
存在安全问题的系统信息对应的小区组类型标识;
存在安全问题的系统信息对应的跟踪区域标识;
存在安全问题的系统信息对应的接入网指示区域标识。
其中,关于小区标识、小区类型标识、小区组类型标识、跟踪区域标识以及接入网指示区域标识的举例介绍可以参考上述实施例描述,本公开实施例在此不做赘述。
进一步地,在本公开的一个实施例之中,UE进行小区重选的方法可以包括以下至少一种:
降低存在系统信息安全问题的小区或频点的选择优先级,例如,可以将“存在系统信息安全问题的小区或频点”的重选优先级设置为最低。
忽略存在系统信息安全问题的小区,例如,可以不将“存在系统信息安全问题的小区或频点”确定为候选小区或频点。
操作二、响应于确定系统信息存在安全问题,触发连接重建过程,并进行小区选择或重选。
其中,在本公开的一个实施例之中,触发连接重建过程可以包括:
向网络侧设备发送第五指示信息和/或连接重建请求消息。
其中,在本公开的一个实施例之中,UE向网络侧设备发送第五指示信息的方法可以包括:
UE先通过连接重建请求消息向网络侧设备发送该第六指示信息,该第六指示信息用于指示UE当前存在系统信息安全问题,该第六指示信息可以为N bit数,N为正整数,例如,该第六指示信息可以为1bit,以及,当1bit包含的内容为1时,则该第六指示信息指示UE当前存在系统信息安全问题,之后,UE在连接重建后,网络侧设备可以向UE发送用于请求上述第五指示信息的请求消息,则UE可 以基于网络侧设备发送的请求消息向网络侧设备发送该第五指示信息。
操作三、响应于确定系统信息存在安全问题,向网络侧设备上报第五指示信息。
综上所述,在本公开实施例提供的系统信息验证方法之中,UE会向网络侧设备发送辅助信息,并会获取网络侧设备基于辅助信息发送的信息,以及基于网络侧设备发送的信息触发系统信息正确性验证的过程。其中,该辅助信息包括UE支持的验证方式、UE支持的验证算法的信息、UE期望验证的系统信息的标识、UE接收的系统信息的标识、UE感兴趣的系统信息的标识、用于指示UE期望对系统信息进行验证的第一指示信息中的至少一种。由此,本公开实施例中,UE会先向网络侧设备上报UE支持验证算法,以便网络侧设备可以基于UE支持的验证算法确定出后续系统信息正确性验证的过程中所使用的验证算法,并指示给UE,由此在后续执行系统信息正确性验证时,可以确保网络侧设备和UE使用相同的验证算法,则提高了系统信息验证的准确性。
此外,在本公开的实施例中,在对系统信息进行正确性验证之后,还会确定系统信息是否存在安全问题,当存在时,UE执行对应的操作(即:触发释放连接过程,和/或,触发连接重建过程,和/或,向网络侧设备上报第五指示信息),由此可以实现“根据UE的不同安全需求,对系统信息验证失败的UE进行差异化的控制”这一目的。
图7为本公开实施例所提供的一种系统信息验证方法的流程示意图,该方法由网络侧设备执行,如图7所示,该系统信息验证方法可以包括以下步骤:
步骤701、获取UE发送的辅助信息。
其中,在本公开的一个实施例之中,辅助信息可以包括UE支持的验证方式、UE支持的验证算法的信息、UE期望验证的系统信息的标识、UE接收的系统信息的标识、UE感兴趣的系统信息的标识、用于指示UE期望对系统信息进行验证的第一指示信息中的至少一种。
步骤702、基于辅助信息触发系统信息正确性验证的过程。
其中,关于步骤701-702的详细介绍可以参考上述实施例描述,本公开实施例在此不做赘述。
综上所述,在本公开实施例提供的系统信息验证方法之中,UE会向网络侧设备发送辅助信息,并会获取网络侧设备基于辅助信息发送的信息,以及基于网络侧设备发送的信息触发系统信息正确性验证的过程。其中,该辅助信息包括UE支持的验证方式、UE支持的验证算法的信息、UE期望验证的系统信息的标识、UE接收的系统信息的标识、UE感兴趣的系统信息的标识、用于指示UE期望对系统信息进行验证的第一指示信息中的至少一种。由此,本公开实施例中,UE会先向网络侧设备上报UE支持验证算法,以便网络侧设备可以基于UE支持的验证算法确定出后续系统信息正确性验证的过程中所使用的验证算法,并指示给UE,由此在后续执行系统信息正确性验证时,可以确保网络侧设备和UE使用相同的验证算法,则提高了系统信息验证的准确性。
图8为本公开实施例所提供的一种系统信息验证方法的流程示意图,该方法由网络侧设备执行,如图8所示,该系统信息验证方法可以包括以下步骤:
步骤801、向UE发送配置信息。
步骤802、获取UE基于配置信息发送的辅助信息。
步骤803、基于辅助信息触发系统信息正确性验证的过程。
其中,关于步骤801-802的相关介绍可以参考上述实施例描述,本公开实施例在此不做赘述。
综上所述,在本公开实施例提供的系统信息验证方法之中,UE会向网络侧设备发送辅助信息,并会获取网络侧设备基于辅助信息发送的信息,以及基于网络侧设备发送的信息触发系统信息正确性验证的过程。其中,该辅助信息包括UE支持的验证方式、UE支持的验证算法的信息、UE期望验证的系统信息的标识、UE接收的系统信息的标识、UE感兴趣的系统信息的标识、用于指示UE期望对系统信息进行验证的第一指示信息中的至少一种。由此,本公开实施例中,UE会先向网络侧设备上报UE支持验证算法,以便网络侧设备可以基于UE支持的验证算法确定出后续系统信息正确性验证的过程中所使用的验证算法,并指示给UE,由此在后续执行系统信息正确性验证时,可以确保网络侧设备和UE使用相同的验证算法,则提高了系统信息验证的准确性。
图9为本公开实施例所提供的一种系统信息验证方法的流程示意图,该方法由网络侧设备执行,如图9所示,该系统信息验证方法可以包括以下步骤:
步骤901、获取UE发送的辅助信息。
步骤902、确定第一验证算法,该第一验证算法为所述UE支持的验证算法中任一验证算法。
步骤903、利用第一验证算法对待验证系统信息进行计算得到第一数值。
步骤904、将第一数值发送至UE。
在本公开的一个实施例中,网络侧设备向UE发送第一数值时可以将第一验证算法的信息发送给UE,以便UE可以基于该第一验证算法信息确定出第一验证算法,并基于该第一验证算法对待验证系统信息进行计算得到第二数值,并通过匹配该第一数值和第二数值以对待验证系统信息进行验证。
进一步地,在本公开的一个实施例之中,网络侧设备也可以不将第一验证算法的信息发送至UE,此时,UE可以直接基于协议约定确定第一验证算法的信息。
步骤905、获取UE发送的验证结果,验证结果包括验证失败。
其中,关于步骤901-905的相关介绍可以参考上述实施例描述,本公开实施例在此不做赘述。
综上所述,在本公开实施例提供的系统信息验证方法之中,UE会向网络侧设备发送辅助信息,并会获取网络侧设备基于辅助信息发送的信息,以及基于网络侧设备发送的信息触发系统信息正确性验证的过程。其中,该辅助信息包括UE支持的验证方式、UE支持的验证算法的信息、UE期望验证的系统信息的标识、UE接收的系统信息的标识、UE感兴趣的系统信息的标识、用于指示UE期望对系统信息进行验证的第一指示信息中的至少一种。由此,本公开实施例中,UE会先向网络侧设备上报UE支持验证算法,以便网络侧设备可以基于UE支持的验证算法确定出后续系统信息正确性验证的过程中所使用的验证算法,并指示给UE,由此在后续执行系统信息正确性验证时,可以确保网络侧设备和UE使用相同的验证算法,则提高了系统信息验证的准确性。
图10a为本公开实施例所提供的一种系统信息验证方法的流程示意图,该方法由网络侧设备执行,如图10a所示,该系统信息验证方法可以包括以下步骤:
步骤1001a、获取UE发送的辅助信息。
步骤1002a、确定第一验证算法,该第一验证算法为所述UE支持的验证算法中任一验证算法。
步骤1003a、利用第一验证算法对待验证系统信息进行计算得到第一数值。
步骤1004a、向UE发送第二指示信息,第二指示信息用于指示UE对系统信息进行正确性验证。
在本公开的一个实施例中,网络侧设备向UE发送第二指示信息时可以将第一验证算法的信息发送给UE,以便UE可以基于该第一验证算法信息确定出第一验证算法,并基于该第一验证算法对待验证系统信息进行计算得到第二数值,并通过匹配该第一数值和第二数值以对待验证系统信息进行验证。
进一步地,在本公开的一个实施例之中,网络侧设备也可以不将第一验证算法的信息发送至UE,此时,UE可以直接基于协议约定确定第一验证算法的信息。
步骤1005a、获取UE发送的第二数值。
步骤1006a、确定第一数值与第二数值是否匹配,当匹配时,确定验证结果为:验证成功,当不匹配时,确定验证结果为:验证失败。
其中,关于步骤1001a-1006a的相关介绍可以参考上述实施例描述,本公开实施例在此不做赘述。
综上所述,在本公开实施例提供的系统信息验证方法之中,UE会向网络侧设备发送辅助信息,并会获取网络侧设备基于辅助信息发送的信息,以及基于网络侧设备发送的信息触发系统信息正确性验证的过程。其中,该辅助信息包括UE支持的验证方式、UE支持的验证算法的信息、UE期望验证的系统信息的标识、UE接收的系统信息的标识、UE感兴趣的系统信息的标识、用于指示UE期望对系统信息进行验证的第一指示信息中的至少一种。由此,本公开实施例中,UE会先向网络侧设备上报UE支持验证算法,以便网络侧设备可以基于UE支持的验证算法确定出后续系统信息正确性验证的过程中所使用的验证算法,并指示给UE,由此在后续执行系统信息正确性验证时,可以确保网络侧设备和UE使用相同的验证算法,则提高了系统信息验证的准确性。
图10b为本公开实施例所提供的一种系统信息验证方法的流程示意图,该方法由网络侧设备执行, 如图10b所示,该系统信息验证方法可以包括以下步骤:
步骤1001b、获取UE发送的辅助信息。
步骤1002b、确定第一验证算法,该第一验证算法为所述UE支持的验证算法中任一验证算法。
步骤1003b、利用第一验证算法对待验证系统信息进行计算得到第一数值。
步骤1004b、向UE发送第二指示信息,第二指示信息用于指示UE对系统信息进行正确性验证。
步骤1005b、获取UE发送的第二数值。
步骤1006b、确定第一数值与第二数值是否匹配,当匹配时,确定验证结果为:验证成功,当不匹配时,确定验证结果为:验证失败。
步骤1007b、向UE发送验证结果信息。
其中,关于步骤1001b-1007b的相关介绍可以参考上述实施例描述,本公开实施例在此不做赘述。
综上所述,在本公开实施例提供的系统信息验证方法之中,UE会向网络侧设备发送辅助信息,并会获取网络侧设备基于辅助信息发送的信息,以及基于网络侧设备发送的信息触发系统信息正确性验证的过程。其中,该辅助信息包括UE支持的验证方式、UE支持的验证算法的信息、UE期望验证的系统信息的标识、UE接收的系统信息的标识、UE感兴趣的系统信息的标识、用于指示UE期望对系统信息进行验证的第一指示信息中的至少一种。由此,本公开实施例中,UE会先向网络侧设备上报UE支持验证算法,以便网络侧设备可以基于UE支持的验证算法确定出后续系统信息正确性验证的过程中所使用的验证算法,并指示给UE,由此在后续执行系统信息正确性验证时,可以确保网络侧设备和UE使用相同的验证算法,则提高了系统信息验证的准确性。
图11为本公开实施例所提供的一种系统信息验证方法的流程示意图,该方法由网络侧设备执行,如图11所示,该系统信息验证方法可以包括以下步骤:
步骤1101、获取UE发送的辅助信息。
步骤1102、基于辅助信息触发系统信息正确性验证的过程。
其中,在本公开的一个实施例之中,上述步骤1101-1102可以为上述实施例中的步骤901-905。在本公开的另一个实施例之中,上述步骤1101-1102可以为上述实施例中的步骤1001a-1006a。在本公开的又一个实施例之中,上述步骤1101-1102可以为上述实施例中的步骤1001b-1007b。
步骤1103、响应于验证结果为:验证失败,向UE重新发送系统信息。
综上所述,在本公开实施例提供的系统信息验证方法之中,UE会向网络侧设备发送辅助信息,并会获取网络侧设备基于辅助信息发送的信息,以及基于网络侧设备发送的信息触发系统信息正确性验证的过程。其中,该辅助信息包括UE支持的验证方式、UE支持的验证算法的信息、UE期望验证的系统信息的标识、UE接收的系统信息的标识、UE感兴趣的系统信息的标识、用于指示UE期望对系统信息进行验证的第一指示信息中的至少一种。由此,本公开实施例中,UE会先向网络侧设备上报UE支持验证算法,以便网络侧设备可以基于UE支持的验证算法确定出后续系统信息正确性验证的过程中所使用的验证算法,并指示给UE,由此在后续执行系统信息正确性验证时,可以确保网络侧设备和UE使用相同的验证算法,则提高了系统信息验证的准确性。
图12为本公开实施例所提供的一种系统信息验证方法的流程示意图,该方法由网络侧设备执行,如图12所示,该系统信息验证方法可以包括以下步骤:
步骤1201、获取UE发送的辅助信息。
步骤1202、基于辅助信息触发系统信息正确性验证的过程。
步骤1203、响应于验证结果为:验证失败,向UE重新发送系统信息。
其中,关于步骤1201-1203的相关介绍可以参考上述实施例描述,本公开实施例在此不做赘述。
步骤1204、基于UE发送的信息,执行对应操作。
在本公开的一个实施例之中,执行对应操作方法可以包括以下至少一种:
进入释放连接过程,并进行小区选择或重选;
进入连接重建过程,并进行小区选择或重选;
获取UE发送的第五指示信息,第五指示信息用于指示系统信息存在安全问题。
在本公开的一个实施例之中,进入释放连接过程可以包括:
接收UE发送的第五指示信息和/或连接释放指示。
在本公开的一个实施例之中,进入连接重建过程可以包括:
接收UE发送的第五指示信息和/或连接重建请求消息。
在本公开的一个实施例之中,进行小区重选的方法包括以下至少一种:
降低存在系统信息安全问题的小区或频点的选择优先级;
忽略存在系统信息安全问题的小区或频点。
在本公开的一个实施例之中,第五指示信息包括以下至少一种:
存在安全问题的系统信息的标识;
第四指示信息,第四指示信息包括系统信息存在的安全问题的类型指示,类型指示包括系统信息正确性验证失败指示,和/或系统信息被篡改指示;
存在安全问题的系统信息对应的区域标识。
在本公开的一个实施例之中,存在安全问题的系统信息对应的区域标识包括以下至少一种:
存在安全问题的系统信息对应的小区标识;
存在安全问题的系统信息对应的小区类型标识;
存在安全问题的系统信息对应的小区组类型标识;
存在安全问题的系统信息对应的跟踪区域标识;
存在安全问题的系统信息对应的接入网指示区域标识。
其中,关于步骤1204的其他介绍可以参考上述实施例描述,本公开实施例在此不做赘述。
综上所述,在本公开实施例提供的系统信息验证方法之中,UE会向网络侧设备发送辅助信息,并会获取网络侧设备基于辅助信息发送的信息,以及基于网络侧设备发送的信息触发系统信息正确性验证的过程。其中,该辅助信息包括UE支持的验证方式、UE支持的验证算法的信息、UE期望验证的系统信息的标识、UE接收的系统信息的标识、UE感兴趣的系统信息的标识、用于指示UE期望对系统信息进行验证的第一指示信息中的至少一种。由此,本公开实施例中,UE会先向网络侧设备上报UE支持验证算法,以便网络侧设备可以基于UE支持的验证算法确定出后续系统信息正确性验证的过程中所使用的验证算法,并指示给UE,由此在后续执行系统信息正确性验证时,可以确保网络侧设备和UE使用相同的验证算法,则提高了系统信息验证的准确性。
图13为本公开实施例所提供的一种系统信息验证方法的流程示意图,该方法由UE执行,如图13所示,该系统信息验证装置可以包括:
发送模块1301,用于向网络侧设备发送辅助信息,辅助信息包括UE支持的验证方式、UE支持的验证算法的信息、UE期望验证的系统信息的标识、UE接收的系统信息的标识、UE感兴趣的系统信息的标识、用于指示UE期望对系统信息进行验证的第一指示信息中的至少一种;
验证模块1302,用于基于网络侧设备发送的信息触发系统信息正确性验证的过程。
综上所述,在本公开实施例提供的系统信息验证装置之中,UE会向网络侧设备发送辅助信息,并会获取网络侧设备基于辅助信息发送的信息,以及基于网络侧设备发送的信息触发系统信息正确性验证的过程。其中,该辅助信息包括UE支持的验证方式、UE支持的验证算法的信息、UE期望验证的系统信息的标识、UE接收的系统信息的标识、UE感兴趣的系统信息的标识、用于指示UE期望对系统信息进行验证的第一指示信息中的至少一种。由此,本公开实施例中,UE会先向网络侧设备上报UE支持验证算法,以便网络侧设备可以基于UE支持的验证算法确定出后续系统信息正确性验证的过程中所使用的验证算法,并指示给UE,由此在后续执行系统信息正确性验证时,可以确保网络侧设备和UE使用相同的验证算法,则提高了系统信息验证的准确性。
可选地,在本公开的一个实施例之中,所述装置,还用于:
获取所述网络侧设备发送的配置信息,所述配置信息包括以下至少一种:
所述网络侧设备支持的验证方式;
支持验证的系统信息对应的区域标识;
第一请求消息,所述第一请求消息用于请求UE上报所述UE是否支持验证系统信息的能力,和/或,用于请求所述UE支持的验证算法的信息;
第二请求消息,所述第二请求消息用于请求UE上报所述UE期望验证的系统信息的标识;
第三请求消息,所述第三请求消息用于请求UE上报所述UE接收的系统信息的标识。
第四请求消息,所述第四请求消息用于请求UE上报所述UE感兴趣的系统信息的标识。
可选地,在本公开的一个实施例之中,所述发送模块,用于:
基于所述配置信息向所述网络侧设备发送所述辅助信息。
可选地,在本公开的一个实施例之中,所述UE支持的验证算法的信息包括以下至少一种:
由所述UE对系统信息进行正确性验证;
由所述网络侧设备对系统信息进行正确性验证。
可选地,在本公开的一个实施例之中,所述UE支持的验证算法的信息包括以下至少一种:
所述UE支持的验证算法的算法类型标识;
所述UE支持的验证算法的算法标识。
可选地,在本公开的一个实施例之中,所述支持验证的系统信息对应的区域标识包括以下至少一种:
支持验证的系统信息对应的小区标识;
支持验证的系统信息对应的小区类型标识;
支持验证的系统信息对应的小区组类型标识;
支持验证的系统信息对应的跟踪区域标识;
支持验证的系统信息对应的接入网指示区域标识。
可选地,在本公开的一个实施例之中,所述装置,还用于:
获取所述网络侧设备通过广播消息发送的所述配置信息;
获取所述网络侧设备通过专属配置消息发送的所述配置信息。
可选地,在本公开的一个实施例之中,所述验证模块,还用于:
获取所述第一数值和第一验证算法的信息;
利用所述第一验证算法对待验证系统信息进行计算得到第二数值,所述待验证系统信息包括UE期望验证的系统信息、UE接收到的系统信息、UE感兴趣的系统信息中的至少一种;
确定所述第一数值与所述第二数值是否匹配,当匹配时,确定验证结果为:验证成功,当不匹配时,确定验证结果为:验证失败;
响应于所述验证结果为验证失败,向所述网络侧设备发送所述验证结果。
可选地,在本公开的一个实施例之中,所述验证模块,还用于:
获取第一验证算法的信息和第二指示信息,所述第一验证算法为所述网络侧设备从所述UE支持的验证算法中选择的,所述第二指示信息用于指示所述UE对系统信息进行正确性验证;
利用所述第一验证算法对待验证系统信息进行计算得到第二数值,所述待验证系统信息包括UE期望验证的系统信息、UE接收到的系统信息、UE感兴趣的系统信息中的至少一种;
向所述网络侧设备发送所述第二数值,以由所述网络侧设备基于第二数值对所述系统信息进行正确性验证。
可选地,在本公开的一个实施例之中,所述装置,还用于:
获取所述网络侧设备发送的验证结果信息;所述验证结果信息包括以下的至少一种:
对所述系统信息进行正确性验证的验证结果,所述验证结果包括验证成功或验证失败;
被验证的所述系统信息对应的区域标识;
第三指示信息,所述第三指示信息用于指示所述系统信息是否存在安全问题;
第四指示信息,所述第四指示信息包括系统信息存在的安全问题的类型指示,所述类型指示包括系统信息正确性验证失败指示,和/或系统信息被篡改指示。
可选地,在本公开的一个实施例之中,所述装置,还用于:
响应于验证结果为:验证失败,获取所述网络侧设备重新发送的系统信息。
可选地,在本公开的一个实施例之中,所述装置,还用于:
确定所述系统信息是否存在安全问题。
可选地,在本公开的一个实施例之中,所述装置,还用于:
确定所述系统信息是否存在安全问题的方法包括以下至少一种:
基于所述验证结果确定所述系统信息是否存在安全问题;
基于所述UE接收系统信息的次数确定所述系统信息是否存在安全问题。
可选地,在本公开的一个实施例之中,所述装置,还用于:
确定系统信息的验证失败的失败次数,响应于所述失败次数超过第一阈值,确定所述系统信息存在安全问题。
可选地,在本公开的一个实施例之中,所述失败次数为相同系统信息的验证失败的失败次数。
可选地,在本公开的一个实施例之中,所述失败次数为相同系统信息的验证失败的连续失败次数。
可选地,在本公开的一个实施例之中,所述装置,还用于:
确定系统信息的接收次数,响应于所述接收次数超过第二阈值,确定所述系统信息存在安全问题。
可选地,在本公开的一个实施例之中,所述接收次数为相同系统信息的接收次数。
可选地,在本公开的一个实施例之中,所述接收次数为相同系统信息的连续接收次数。
可选地,在本公开的一个实施例之中,所述装置,还用于:
响应于确定所述系统信息存在安全问题,触发释放连接过程,并进行小区选择或重选;
响应于确定所述系统信息存在安全问题,触发连接重建过程,并进行小区选择或重选;
响应于确定所述系统信息存在安全问题,向所述网络侧设备上报第五指示信息,所述第五指示信息用于指示所述系统信息所存在的安全问题的情况。
可选地,在本公开的一个实施例之中,所述装置,还用于:
向所述网络侧设备发送所述第五指示信息和/或连接释放指示。
可选地,在本公开的一个实施例之中,所述装置,还用于:
向所述网络侧设备发送所述第五指示信息和/或连接重建请求消息。
可选地,在本公开的一个实施例之中,所述装置,还用于:
降低存在系统信息安全问题的小区或频点的选择优先级;
忽略存在系统信息安全问题的小区或频点。
可选地,在本公开的一个实施例之中,所述装置,还用于:
所述第五指示信息包括以下至少一种:
存在安全问题的系统信息的标识;
第四指示信息,所述第四指示信息包括系统信息存在的安全问题的类型指示,所述类型指示包括系统信息正确性验证失败指示,和/或系统信息被篡改指示;
存在安全问题的系统信息对应的区域标识。
可选地,在本公开的一个实施例之中,所述装置,还用于:
所述存在安全问题的系统信息对应的区域标识包括以下至少一种:
存在安全问题的系统信息对应的小区标识;
存在安全问题的系统信息对应的小区类型标识;
存在安全问题的系统信息对应的小区组类型标识;
存在安全问题的系统信息对应的跟踪区域标识;
存在安全问题的系统信息对应的接入网指示区域标识。
图14为本公开实施例所提供的一种系统信息验证方法的流程示意图,该方法由网络侧设备执行,如图14所示,该系统信息验证装置可以包括:
获取模块1401,用于获取UE发送的辅助信息,辅助信息包括UE支持的验证方式、UE支持的验证算法的信息、UE期望验证的系统信息的标识、UE接收的系统信息的标识、UE接收的系统信息的标识、所述UE感兴趣的系统信息、用于指示UE期望对系统信息进行验证的第一指示信息中的至少一种;
验证模块1402,用于基于辅助信息触发系统信息正确性验证的过程。
综上所述,在本公开实施例提供的系统信息验证装置之中,UE会向网络侧设备发送辅助信息,并会获取网络侧设备基于辅助信息发送的信息,以及基于网络侧设备发送的信息触发系统信息正确性验证的过程。其中,该辅助信息包括UE支持的验证方式、UE支持的验证算法的信息、UE期望验证的系统信息的标识、UE接收的系统信息的标识、UE接收的系统信息的标识、所述UE感兴趣的系统信息、用于指示UE期望对系统信息进行验证的第一指示信息中的至少一种。由此,本公开实施例中,UE会先向网络侧设备上报UE支持验证算法,以便网络侧设备可以基于UE支持的验证算法确定出后续系统信息正确性验证的过程中所使用的验证算法,并指示给UE,由此在后续执行系统信息正确性验证时,可以确保网络侧设备和UE使用相同的验证算法,则提高了系统信息验证的准确性。
可选地,在本公开的一个实施例之中,所述装置,还用于:
向所述UE发送配置信息,所述配置信息包括以下至少一种:
所述网络侧设备支持的验证方式;
支持验证的系统信息对应的区域标识;
第一请求消息,所述第一请求消息用于请求UE上报所述UE是否支持验证系统信息的能力,和/或,用于请求所述UE支持的验证算法的信息;
第二请求消息,所述第二请求消息用于请求UE上报所述UE期望验证的系统信息的标识;
第三请求消息,所述第三请求消息用于请求UE上报所述UE接收的系统信息的标识。
第四请求消息,所述第四请求消息用于请求UE上报所述UE感兴趣的系统信息的标识。
可选地,在本公开的一个实施例之中,所述获取模块,还用于:
获取所述UE基于所述配置信息发送的辅助信息。
可选地,在本公开的一个实施例之中,所述验证方式包括以下至少一种:
由UE对系统信息进行验证;
由网络侧设备对系统信息进行验证。
可选地,在本公开的一个实施例之中,所述UE支持的验证算法的信息包括以下至少一种:
所述UE支持的验证算法的算法类型标识;
所述UE支持的验证算法的算法标识。
可选地,在本公开的一个实施例之中,所述支持验证的系统信息对应的区域标识包括以下至少一种:
支持验证的系统信息对应的小区标识;
支持验证的系统信息对应的小区类型标识;
支持验证的系统信息对应的小区组类型标识;
支持验证的系统信息对应的跟踪区域标识;
支持验证的系统信息对应的接入网指示区域标识。
可选地,在本公开的一个实施例之中,所述装置,还用于:
通过广播消息向所述UE发送所述配置信息;
通过专属配置消息向所述UE发送所述配置信息。
可选地,在本公开的一个实施例之中,所述验证模块,还用于:
确定第一验证算法,所述第一验证算法为所述UE支持的验证算法中任一验证算法;
利用所述第一验证算法对待验证系统信息进行计算得到第一数值,所述待验证系统信息包括UE期望验证的系统信息、UE接收到的系统信息、UE感兴趣的系统信息中的至少一种;
将所述第一数值发送至所述UE;
获取所述UE发送的验证结果,所述验证结果包括验证失败。
可选地,在本公开的一个实施例之中,所述验证模块,还用于:
确定第一验证算法,所述第一验证算法为所述UE支持的验证算法中任一验证算法;
利用所述第一验证算法对待验证系统信息进行计算得到第一数值,所述待验证系统信息包括UE期望验证的系统信息、UE接收到的系统信息、UE感兴趣的系统信息中的至少一种;
向所述UE发送所述第一验证算法的信息和第二指示信息,所述第二指示信息用于指示所述UE对系统信息进行正确性验证;
获取所述UE发送的第二数值;
确定所述第一数值与所述第二数值是否匹配,当匹配时,确定验证结果为:验证成功,当不匹配时,确定验证结果为:验证失败。
可选地,在本公开的一个实施例之中,所述装置,还用于:
向所述UE发送验证结果信息;所述验证结果信息包括以下的至少一种:
对所述系统信息进行正确性验证的验证结果,所述验证结果包括验证成功或验证失败;
被验证的所述系统信息对应的区域标识;
第三指示信息,所述第三指示信息用于指示所述系统信息是否存在安全问题;
第四指示信息,所述第四指示信息包括系统信息存在的安全问题的类型指示,所述类型指示包括系统信息正确性验证失败指示,和/或系统信息被篡改指示。
可选地,在本公开的一个实施例之中,所述装置,还用于:
响应于验证结果为:验证失败,向所述UE重新发送系统信息。
可选地,在本公开的一个实施例之中,所述装置,还用于:
确定所述系统信息是否存在安全问题。
可选地,在本公开的一个实施例之中,所述装置,还用于:
基于所述验证结果确定所述系统信息是否存在安全问题;
基于所述网络侧设备发送系统信息的次数确定所述系统信息是否存在安全问题。
可选地,在本公开的一个实施例之中,所述装置,还用于:
确定系统信息的验证失败的失败次数,响应于所述失败次数超过第一阈值,确定系统信息存在安全问题。
可选地,在本公开的一个实施例之中,所述失败次数为相同系统信息的验证失败的失败次数。
可选地,在本公开的一个实施例之中,所述失败次数为相同系统信息的验证失败的连续失败次数。
可选地,在本公开的一个实施例之中,所述装置,还用于:
确定系统信息的发送次数,响应于所述发送次数超过第二阈值,确定系统信息存在安全问题。
可选地,在本公开的一个实施例之中,所述发送次数为相同系统信息的接收次数。
可选地,在本公开的一个实施例之中,所述发送次数为相同系统信息的连续发送次数。
可选地,在本公开的一个实施例之中,所述装置,还用于:
进入释放连接过程,并进行小区选择或重选;
进入连接重建过程,并进行小区选择或重选;
获取所述UE发送的第五指示信息,所述第五指示信息用于指示所述系统信息所存在的安全问题的情况。
可选地,在本公开的一个实施例之中,所述装置,还用于:
接收所述UE发送的所述第五指示信息和/或连接释放指示。
可选地,在本公开的一个实施例之中,所述装置,还用于:
接收所述UE发送的所述第五指示信息和/或连接重建请求消息。
可选地,在本公开的一个实施例之中,所述装置,还用于:
降低存在系统信息安全问题的小区或频点的选择优先级;和/或
忽略存在系统信息安全问题的小区或频点。
可选地,在本公开的一个实施例之中,所述第五指示信息包括以下至少一种:
存在安全问题的系统信息的标识;
第四指示信息,所述第四指示信息包括系统信息存在的安全问题的类型指示,所述类型指示包括系统信息正确性验证失败指示,和/或系统信息被篡改指示;
存在安全问题的系统信息对应的区域标识。
可选地,在本公开的一个实施例之中,所述装置,还用于:
所述存在安全问题的系统信息对应的区域标识包括以下至少一种:
存在安全问题的系统信息对应的小区标识;
存在安全问题的系统信息对应的小区类型标识;
存在安全问题的系统信息对应的小区组类型标识;
存在安全问题的系统信息对应的跟踪区域标识;
存在安全问题的系统信息对应的接入网指示区域标识。
图15是本公开一个实施例所提供的一种用户设备UE1500的框图。例如,UE1500可以是移动电话,计算机,数字广播终端设备,消息收发设备,游戏控制台,平板设备,医疗设备,健身设备,个人数字助理等。
参照图15,UE1500可以包括以下至少一个组件:处理组件1502,存储器1504,电源组件1506,多媒体组件1508,音频组件1510,输入/输出(I/O)的接口1512,传感器组件1513,以及通信组件1516。
处理组件1502通常控制UE1500的整体操作,诸如与显示,电话呼叫,数据通信,相机操作和记录操作相关联的操作。处理组件1502可以包括至少一个处理器1520来执行指令,以完成上述的方法的全部或部分步骤。此外,处理组件1502可以包括至少一个模块,便于处理组件1502和其他组件之间的交互。例如,处理组件1502可以包括多媒体模块,以方便多媒体组件1508和处理组件1502之间的交互。
存储器1504被配置为存储各种类型的数据以支持在UE1500的操作。这些数据的示例包括用于在UE1500上操作的任何应用程序或方法的指令,联系人数据,电话簿数据,消息,图片,视频等。存储器1504可以由任何类型的易失性或非易失性存储设备或者它们的组合实现,如静态随机存取存储器(SRAM),电可擦除可编程只读存储器(EEPROM),可擦除可编程只读存储器(EPROM),可编程只读存储器(PROM),只读存储器(ROM),磁存储器,快闪存储器,磁盘或光盘。
电源组件1506为UE1500的各种组件提供电力。电源组件1506可以包括电源管理系统,至少一个电源,及其他与为UE1500生成、管理和分配电力相关联的组件。
多媒体组件1508包括在所述UE1500和用户之间的提供一个输出接口的屏幕。在一些实施例中,屏幕可以包括液晶显示器(LCD)和触摸面板(TP)。如果屏幕包括触摸面板,屏幕可以被实现为触摸屏,以接收来自用户的输入信号。触摸面板包括至少一个触摸传感器以感测触摸、滑动和触摸面板上的手势。所述触摸传感器可以不仅感测触摸或滑动动作的边界,而且还检测与所述触摸或滑动操作相关的唤醒时间和压力。在一些实施例中,多媒体组件1508包括一个前置摄像头和/或后置摄像头。当UE1500处于操作模式,如拍摄模式或视频模式时,前置摄像头和/或后置摄像头可以接收外部的多媒体数据。每个前置摄像头和后置摄像头可以是一个固定的光学透镜系统或具有焦距和光学变焦能力。
音频组件1510被配置为输出和/或输入音频信号。例如,音频组件1510包括一个麦克风(MIC),当UE1500处于操作模式,如呼叫模式、记录模式和语音识别模式时,麦克风被配置为接收外部音频信号。所接收的音频信号可以被进一步存储在存储器1504或经由通信组件1516发送。在一些实施例中,音频组件1510还包括一个扬声器,用于输出音频信号。
I/O接口1512为处理组件1502和外围接口模块之间提供接口,上述外围接口模块可以是键盘,点击轮,按钮等。这些按钮可包括但不限于:主页按钮、音量按钮、启动按钮和锁定按钮。
传感器组件1513包括至少一个传感器,用于为UE1500提供各个方面的状态评估。例如,传感器组件1513可以检测到设备1500的打开/关闭状态,组件的相对定位,例如所述组件为UE1500的显示器和小键盘,传感器组件1513还可以检测UE1500或UE1500一个组件的位置改变,用户与UE1500接触的存在或不存在,UE1500方位或加速/减速和UE1500的温度变化。传感器组件1513可以包括接近传感器,被配置用来在没有任何的物理接触时检测附近物体的存在。传感器组件1513还可以包括光传感器,如CMOS或CCD图像传感器,用于在成像应用中使用。在一些实施例中,该传感器组件1513还可以包括加速度传感器,陀螺仪传感器,磁传感器,压力传感器或温度传感器。
通信组件1516被配置为便于UE1500和其他设备之间有线或无线方式的通信。UE1500可以接入基 于通信标准的无线网络,如WiFi,2G或3G,或它们的组合。在一个示例性实施例中,通信组件1516经由广播信道接收来自外部广播管理系统的广播信号或广播相关信息。在一个示例性实施例中,所述通信组件1516还包括近场通信(NFC)模块,以促进短程通信。例如,在NFC模块可基于射频识别(RFID)技术,红外数据协会(IrDA)技术,超宽带(UWB)技术,蓝牙(BT)技术和其他技术来实现。
在示例性实施例中,UE1500可以被至少一个应用专用集成电路(ASIC)、数字信号处理器(DSP)、数字信号处理设备(DSPD)、可编程逻辑器件(PLD)、现场可编程门阵列(FPGA)、控制器、微控制器、微处理器或其他电子元件实现,用于执行上述方法。
图16是本公开实施例所提供的一种网络侧设备1600的框图。例如,网络侧设备1600可以被提供为一网络侧设备。参照图16,网络侧设备1600包括处理组件1611,其进一步包括至少一个处理器,以及由存储器1632所代表的存储器资源,用于存储可由处理组件1622的执行的指令,例如应用程序。存储器1632中存储的应用程序可以包括一个或一个以上的每一个对应于一组指令的模块。此外,处理组件1610被配置为执行指令,以执行上述方法前述应用在所述网络侧设备的任意方法,例如,如图1所示方法。
网络侧设备1600还可以包括一个电源组件1626被配置为执行网络侧设备1600的电源管理,一个有线或无线网络接口1650被配置为将网络侧设备1600连接到网络,和一个输入输出(I/O)接口1658。网络侧设备1600可以操作基于存储在存储器1632的操作系统,例如Windows Server TM,Mac OS XTM,Unix TM,Linux TM,Free BSDTM或类似。
上述本公开提供的实施例中,分别从网络侧设备、UE的角度对本公开实施例提供的方法进行了介绍。为了实现上述本公开实施例提供的方法中的各功能,网络侧设备和UE可以包括硬件结构、软件模块,以硬件结构、软件模块、或硬件结构加软件模块的形式来实现上述各功能。上述各功能中的某个功能可以以硬件结构、软件模块、或者硬件结构加软件模块的方式来执行。
上述本公开提供的实施例中,分别从网络侧设备、UE的角度对本公开实施例提供的方法进行了介绍。为了实现上述本公开实施例提供的方法中的各功能,网络侧设备和UE可以包括硬件结构、软件模块,以硬件结构、软件模块、或硬件结构加软件模块的形式来实现上述各功能。上述各功能中的某个功能可以以硬件结构、软件模块、或者硬件结构加软件模块的方式来执行。
本公开实施例提供的一种通信装置。通信装置可包括收发模块和处理模块。收发模块可包括发送模块和/或接收模块,发送模块用于实现发送功能,接收模块用于实现接收功能,收发模块可以实现发送功能和/或接收功能。
通信装置可以是终端设备(如前述方法实施例中的终端设备),也可以是终端设备中的装置,还可以是能够与终端设备匹配使用的装置。或者,通信装置可以是网络设备,也可以是网络设备中的装置,还可以是能够与网络设备匹配使用的装置。
本公开实施例提供的另一种通信装置。通信装置可以是网络设备,也可以是终端设备(如前述方法实施例中的终端设备),也可以是支持网络设备实现上述方法的芯片、芯片系统、或处理器等,还可以是支持终端设备实现上述方法的芯片、芯片系统、或处理器等。该装置可用于实现上述方法实施例中描述的方法,具体可以参见上述方法实施例中的说明。
通信装置可以包括一个或多个处理器。处理器可以是通用处理器或者专用处理器等。例如可以是基带处理器或中央处理器。基带处理器可以用于对通信协议以及通信数据进行处理,中央处理器可以用于对通信装置(如,网络侧设备、基带芯片,终端设备、终端设备芯片,DU或CU等)进行控制,执行计算机程序,处理计算机程序的数据。
可选的,通信装置中还可以包括一个或多个存储器,其上可以存有计算机程序,处理器执行所述计算机程序,以使得通信装置执行上述方法实施例中描述的方法。可选的,所述存储器中还可以存储有数据。通信装置和存储器可以单独设置,也可以集成在一起。
可选的,通信装置还可以包括收发器、天线。收发器可以称为收发单元、收发机、或收发电路等,用于实现收发功能。收发器可以包括接收器和发送器,接收器可以称为接收机或接收电路等,用于实现接收功能;发送器可以称为发送机或发送电路等,用于实现发送功能。
可选的,通信装置中还可以包括一个或多个接口电路。接口电路用于接收代码指令并传输至处理器。处理器运行所述代码指令以使通信装置执行上述方法实施例中描述的方法。
通信装置为终端设备(如前述方法实施例中的终端设备):处理器用于执行图1-图4任一所示的方法。
通信装置为网络设备:收发器用于执行图5-图7任一所示的方法。
在一种实现方式中,处理器中可以包括用于实现接收和发送功能的收发器。例如该收发器可以是收发电路,或者是接口,或者是接口电路。用于实现接收和发送功能的收发电路、接口或接口电路可以是分开的,也可以集成在一起。上述收发电路、接口或接口电路可以用于代码/数据的读写,或者,上述收发电路、接口或接口电路可以用于信号的传输或传递。
在一种实现方式中,处理器可以存有计算机程序,计算机程序在处理器上运行,可使得通信装置执行上述方法实施例中描述的方法。计算机程序可能固化在处理器中,该种情况下,处理器可能由硬件实现。
在一种实现方式中,通信装置可以包括电路,所述电路可以实现前述方法实施例中发送或接收或者通信的功能。本公开中描述的处理器和收发器可实现在集成电路(integrated circuit,IC)、模拟IC、射频集成电路RFIC、混合信号IC、专用集成电路(application specific integrated circuit,ASIC)、印刷电路板(printed circuit board,PCB)、电子设备等上。该处理器和收发器也可以用各种IC工艺技术来制造,例如互补金属氧化物半导体(complementary metal oxide semiconductor,CMOS)、N型金属氧化物半导体(nMetal-oxide-semiconductor,NMOS)、P型金属氧化物半导体(positive channel metal oxide semiconductor,PMOS)、双极结型晶体管(bipolar junction transistor,BJT)、双极CMOS(BiCMOS)、硅锗(SiGe)、砷化镓(GaAs)等。
以上实施例描述中的通信装置可以是网络设备或者终端设备(如前述方法实施例中的终端设备),但本公开中描述的通信装置的范围并不限于此,而且通信装置的结构可以不受的限制。通信装置可以是独立的设备或者可以是较大设备的一部分。例如所述通信装置可以是:
(1)独立的集成电路IC,或芯片,或,芯片系统或子系统;
(2)具有一个或多个IC的集合,可选的,该IC集合也可以包括用于存储数据,计算机程序的存储部件;
(3)ASIC,例如调制解调器(Modem);
(4)可嵌入在其他设备内的模块;
(5)接收机、终端设备、智能终端设备、蜂窝电话、无线设备、手持机、移动单元、车载设备、网络设备、云设备、人工智能设备等等;
(6)其他等等。
对于通信装置可以是芯片或芯片系统的情况,芯片包括处理器和接口。其中,处理器的数量可以是一个或多个,接口的数量可以是多个。
可选的,芯片还包括存储器,存储器用于存储必要的计算机程序和数据。
本领域技术人员还可以了解到本公开实施例列出的各种说明性逻辑块(illustrative logical block)和步骤(step)可以通过电子硬件、电脑软件,或两者的结合进行实现。这样的功能是通过硬件还是软件来实现取决于特定的应用和整个系统的设计要求。本领域技术人员可以对于每种特定的应用,可以使用各种方法实现所述的功能,但这种实现不应被理解为超出本公开实施例保护的范围。
本公开实施例还提供一种确定侧链路时长的系统,该系统包括前述实施例中作为终端设备(如前述方法实施例中的第一终端设备)的通信装置和作为网络设备的通信装置,或者,该系统包括前述实施例中作为终端设备(如前述方法实施例中的第一终端设备)的通信装置和作为网络设备的通信装置。
本公开还提供一种可读存储介质,其上存储有指令,该指令被计算机执行时实现上述任一方法实施例的功能。
本公开还提供一种计算机程序产品,该计算机程序产品被计算机执行时实现上述任一方法实施例的功能。
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机程序。在计算机上加载和执行所述计算机程序时,全部或部分地产生按照本公开实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机程序可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机程序可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(digital subscriber line,DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质(例如,软盘、硬盘、磁带)、光介质(例如,高密度数字视频光盘(digital video disc,DVD))、或者半导体介质(例如,固态硬盘(solid state disk,SSD))等。
本领域普通技术人员可以理解:本公开中涉及的第一、第二等各种数字编号仅为描述方便进行的区分,并不用来限制本公开实施例的范围,也表示先后顺序。
本公开中的至少一个还可以描述为一个或多个,多个可以是两个、三个、四个或者更多个,本公开不做限制。在本公开实施例中,对于一种技术特征,通过“第一”、“第二”、“第三”、“A”、“B”、“C”和“D”等区分该种技术特征中的技术特征,该“第一”、“第二”、“第三”、“A”、“B”、“C”和“D”描述的技术特征间无先后顺序或者大小顺序。
本领域技术人员在考虑说明书及实践这里公开的发明后,将容易想到本发明的其它实施方案。本公开旨在涵盖本发明的任何变型、用途或者适应性变化,这些变型、用途或者适应性变化遵循本发明的一般性原理并包括本公开未公开的本技术领域中的公知常识或惯用技术手段。说明书和实施例仅被视为示例性的,本公开的真正范围和精神由下面的权利要求指出。
应当理解的是,本公开并不局限于上面已经描述并在附图中示出的精确结构,并且可以在不脱离其范围进行各种修改和改变。本公开的范围仅由所附的权利要求来限制。

Claims (58)

  1. 一种系统信息验证方法,其特征在于,应用于用户设备UE,包括:
    向网络侧设备发送辅助信息,所述辅助信息包括所述UE支持的验证方式、所述UE支持的验证算法的信息、所述UE期望验证的系统信息的标识、所述UE接收的系统信息的标识、所述UE感兴趣的系统信息的标识、用于指示所述UE期望对系统信息进行验证的第一指示信息中的至少一种;
    基于所述网络侧设备发送的信息触发系统信息正确性验证的过程。
  2. 如权利要求1所述的方法,其特征在于,所述方法还包括:
    获取所述网络侧设备发送的配置信息,所述配置信息包括以下至少一种:
    所述网络侧设备支持的验证方式;
    支持验证的系统信息对应的区域标识;
    第一请求消息,所述第一请求消息用于请求UE上报所述UE是否支持验证系统信息的能力,和/或,用于请求所述UE支持的验证算法的信息;
    第二请求消息,所述第二请求消息用于请求UE上报所述UE期望验证的系统信息的标识;
    第三请求消息,所述第三请求消息用于请求UE上报所述UE接收的系统信息的标识;
    第四请求消息,所述第四请求消息用于请求UE上报所述UE感兴趣的系统信息的标识。
  3. 如权利要求2所述的方法,其特征在于,所述向网络侧设备发送辅助信息,包括:
    基于所述配置信息向所述网络侧设备发送所述辅助信息。
  4. 如权利要求1或2所述的方法,其特征在于,所述验证方式包括以下至少一种:
    由所述UE对系统信息进行正确性验证;
    由所述网络侧设备对系统信息进行正确性验证。
  5. 如权利要求1或2所述的方法,其特征在于,所述UE支持的验证算法的信息包括以下至少一种:
    所述UE支持的验证算法的算法类型标识;
    所述UE支持的验证算法的算法标识。
  6. 如权利要求2所述的方法,其特征在于,所述支持验证的系统信息对应的区域标识包括以下至少一种:
    支持验证的系统信息对应的小区标识;
    支持验证的系统信息对应的小区类型标识;
    支持验证的系统信息对应的小区组类型标识;
    支持验证的系统信息对应的跟踪区域标识;
    支持验证的系统信息对应的接入网指示区域标识。
  7. 如权利要求2所述的方法,其特征在于,所述获取所述网络侧设备发送配置信息的方法包括以下至少一种:
    获取所述网络侧设备通过广播消息发送的所述配置信息;
    获取所述网络侧设备通过专属配置消息发送的所述配置信息。
  8. 如权利要求1所述的方法,其特征在于,所述基于所述网络侧设备发送的信息触发系统信息正确性验证的过程,包括:
    获取所述第一数值和第一验证算法的信息;
    利用所述第一验证算法对待验证系统信息进行计算得到第二数值,所述待验证系统信息包括UE期望验证的系统信息、UE接收到的系统信息、UE感兴趣的系统信息中的至少一种;
    确定所述第一数值与所述第二数值是否匹配,当匹配时,确定验证结果为:验证成功,当不匹配时,确定验证结果为:验证失败;
    响应于所述验证结果为验证失败,向所述网络侧设备发送所述验证结果。
  9. 如权利要求1所述的方法,其特征在于,所述基于所述网络侧设备发送的信息触发系统信息正确性验证的过程,包括:
    获取第一验证算法的信息和第二指示信息,所述第一验证算法为所述网络侧设备从所述UE支持的验证算法中选择的,所述第二指示信息用于指示所述UE对系统信息进行正确性验证;
    利用所述第一验证算法对待验证系统信息进行计算得到第二数值,所述待验证系统信息包括UE期望验证的系统信息、UE接收到的系统信息、UE感兴趣的系统信息中的至少一种;
    向所述网络侧设备发送所述第二数值。
  10. 如权利要求9所述的方法,其特征在于,所述方法还包括:
    获取所述网络侧设备发送的验证结果信息;所述验证结果信息包括以下的至少一种:
    对所述系统信息进行正确性验证的验证结果,所述验证结果包括验证成功或验证失败;
    被验证的所述系统信息对应的区域标识;
    第三指示信息,所述第三指示信息用于指示所述系统信息是否存在安全问题;
    第四指示信息,所述第四指示信息包括系统信息存在的安全问题的类型指示,所述类型指示包括系统信息正确性验证失败指示,和/或系统信息被篡改指示。
  11. 如权利要求8或10所述的方法,其特征在于,所述方法还包括:
    响应于验证结果为:验证失败,获取所述网络侧设备重新发送的系统信息。
  12. 如权利要求8或10所述的方法,其特征在于,所述方法还包括:
    确定所述系统信息是否存在安全问题。
  13. 如权利要求12所述的方法,其特征在于,所述确定所述系统信息是否存在安全问题的方法包括以下至少一种:
    基于所述验证结果确定所述系统信息是否存在安全问题;
    基于所述UE接收系统信息的次数确定所述系统信息是否存在安全问题。
  14. 如权利要求13所述的方法,其特征在于,所述基于所述验证结果确定所述系统信息是否存在安全问题,包括:
    确定系统信息的验证失败的失败次数,响应于所述失败次数超过第一阈值,确定所述系统信息存在安全问题。
  15. 如权利要求14所述的方法,其特征在于,所述失败次数为相同系统信息的验证失败的失败次数。
  16. 如权利要求15所述的方法,其特征在于,所述失败次数为相同系统信息的验证失败的连续失败次数。
  17. 如权利要求13所述的方法,其特征在于,所述基于所述UE接收系统信息的次数确定所述系统信息是否存在安全问题,包括:
    确定系统信息的接收次数,响应于所述接收次数超过第二阈值,确定所述系统信息存在安全问题。
  18. 如权利要求17所述的方法,其特征在于,所述接收次数为相同系统信息的接收次数。
  19. 如权利要求18所述的方法,其特征在于,所述接收次数为相同系统信息的连续接收次数。
  20. 如权利要求12所述的方法,其特征在于,所述方法还包括以下至少一种:
    响应于确定所述系统信息存在安全问题,触发释放连接过程,并进行小区选择或重选;
    响应于确定所述系统信息存在安全问题,触发连接重建过程,并进行小区选择或重选;
    响应于确定所述系统信息存在安全问题,向所述网络侧设备上报第五指示信息,所述第五指示信息用于指示所述系统信息所存在的安全问题的情况。
  21. 如权利要求20所述的方法,其特征在于,所述触发释放连接过程,包括:
    向所述网络侧设备发送所述第五指示信息和/或连接释放指示。
  22. 如权利要求20所述的方法,其特征在于,所述触发连接重建过程,包括:
    向所述网络侧设备发送所述第五指示信息和/或连接重建请求消息。
  23. 如权利要求20所述的方法,其特征在于,所述进行小区选择或重选的方法包括以下至少一种:
    降低存在系统信息安全问题的小区或频点的选择优先级;
    忽略存在系统信息安全问题的小区或频点。
  24. 如权利要求20-22任一所述的方法,其特征在于,所述第五指示信息包括以下至少一种:
    存在安全问题的系统信息的标识;
    第四指示信息,所述第四指示信息包括系统信息存在的安全问题的类型指示,所述类型指示包括系统信息正确性验证失败指示,和/或系统信息被篡改指示;
    存在安全问题的系统信息对应的区域标识。
  25. 如权利要求24所述的方法,其特征在于,所述存在安全问题的系统信息对应的区域标识包括以下至少一种:
    存在安全问题的系统信息对应的小区标识;
    存在安全问题的系统信息对应的小区类型标识;
    存在安全问题的系统信息对应的小区组类型标识;
    存在安全问题的系统信息对应的跟踪区域标识;
    存在安全问题的系统信息对应的接入网指示区域标识。
  26. 一种系统信息验证方法,其特征在于,应用于网络侧设备,包括:
    获取UE发送的辅助信息,所述辅助信息包括所述UE支持的验证方式、所述UE支持的验证算法的信息、所述UE期望验证的系统信息的标识、所述UE接收的系统信息的标识、UE感兴趣的系统信息、用于指示所述UE期望对系统信息进行验证的第一指示信息中的至少一种;
    基于所述辅助信息触发系统信息正确性验证的过程。
  27. 如权利要求26所述的方法,其特征在于,所述方法还包括:
    向所述UE发送配置信息,所述配置信息包括以下至少一种:
    所述网络侧设备支持的验证方式;
    支持验证的系统信息对应的区域标识;
    第一请求消息,所述第一请求消息用于请求UE上报所述UE是否支持验证系统信息的能力,和/或,用于请求所述UE支持的验证算法的信息;
    第二请求消息,所述第二请求消息用于请求UE上报所述UE期望验证的系统信息的标识;
    第三请求消息,所述第三请求消息用于请求UE上报所述UE接收的系统信息的标识;
    第四请求消息,所述第四请求消息用于请求UE上报所述UE感兴趣的系统信息的标识。
  28. 如权利要求27所述的方法,其特征在于,所述获取UE发送的辅助信息,包括:
    获取所述UE基于所述配置信息发送的辅助信息。
  29. 如权利要求26或29所述的方法,其特征在于,所述验证方式包括以下至少一种:
    由UE对系统信息进行验证;
    由网络侧设备对系统信息进行验证。
  30. 如权利要求26所述的方法,其特征在于,所述UE支持的验证算法的信息包括以下至少一种:
    所述UE支持的验证算法的算法类型标识;
    所述UE支持的验证算法的算法标识。
  31. 如权利要求27所述的方法,其特征在于,所述支持验证的系统信息对应的区域标识包括以下至少一种:
    支持验证的系统信息对应的小区标识;
    支持验证的系统信息对应的小区类型标识;
    支持验证的系统信息对应的小区组类型标识;
    支持验证的系统信息对应的跟踪区域标识;
    支持验证的系统信息对应的接入网指示区域标识。
  32. 如权利要求27所述的方法,其特征在于,所述向所述UE发送配置信息的方法包括以下至少一种:
    通过广播消息向所述UE发送所述配置信息;
    通过专属配置消息向所述UE发送所述配置信息。
  33. 如权利要求26所述的方法,其特征在于,所述基于所述辅助信息触发系统信息正确性验证的过程,包括:
    确定第一验证算法,所述第一验证算法为所述UE支持的验证算法中任一验证算法;
    利用所述第一验证算法对待验证系统信息进行计算得到第一数值,所述待验证系统信息包括UE期望验证的系统信息、UE接收到的系统信息、UE感兴趣的系统信息中的至少一种;
    将所述第一数值发送至所述UE;
    获取所述UE发送的验证结果,所述验证结果包括验证失败。
  34. 如权利要求26所述的方法,其特征在于,所述基于所述辅助信息触发系统信息正确性验证的过程,包括:
    确定第一验证算法,所述第一验证算法为所述UE支持的验证算法中任一验证算法;
    利用所述第一验证算法对待验证系统信息进行计算得到第一数值,所述待验证系统信息包括UE期望验证的系统信息、UE接收到的系统信息、UE感兴趣的系统信息中的至少一种;
    向所述UE发送所述第二指示信息,所述第二指示信息用于指示所述UE对系统信息进行正确性验证;
    获取所述UE发送的第二数值;
    确定所述第一数值与所述第二数值是否匹配,当匹配时,确定验证结果为:验证成功,当不匹配时,确定验证结果为:验证失败。
  35. 如权利要求34所述的方法,其特征在于,所述方法还包括:
    向所述UE发送验证结果信息;所述验证结果信息包括以下的至少一种:
    对所述系统信息进行正确性验证的验证结果,所述验证结果包括验证成功或验证失败;
    被验证的所述系统信息对应的区域标识;
    第三指示信息,所述第三指示信息用于指示所述系统信息是否存在安全问题;
    第四指示信息,所述第四指示信息包括系统信息存在的安全问题的类型指示,所述类型指示包括系统信息正确性验证失败指示,和/或系统信息被篡改指示。
  36. 如权利要求31或34所述的方法,其特征在于,所述方法还包括:
    响应于验证结果为:验证失败,向所述UE重新发送系统信息。
  37. 如权利要求34所述的方法,其特征在于,所述方法还包括:
    确定所述系统信息是否存在安全问题。
  38. 如权利要求37所述的方法,其特征在于,所述确定所述系统信息是否存在安全问题,包括:
    基于所述验证结果确定所述系统信息是否存在安全问题;
    基于所述网络侧设备发送系统信息的次数确定所述系统信息是否存在安全问题。
  39. 如权利要求38所述的方法,其特征在于,所述基于所述验证结果确定所述系统信息是否存在安全问题,包括:
    确定系统信息的验证失败的失败次数,响应于所述失败次数超过第一阈值,确定系统信息存在安全问题。
  40. 如权利要求39所述的方法,其特征在于,所述失败次数为相同系统信息的验证失败的失败次数。
  41. 如权利要求40所述的方法,其特征在于,所述失败次数为相同系统信息的验证失败的连续失败次数。
  42. 如权利要求38所述的方法,其特征在于,所述基于所述网络侧设备发送系统信息的次数确定所述系统信息是否存在安全问题,包括:
    确定系统信息的发送次数,响应于所述发送次数超过第二阈值,确定系统信息存在安全问题。
  43. 如权利要求42所述的方法,其特征在于,所述发送次数为相同系统信息的接收次数。
  44. 如权利要求43所述的方法,其特征在于,所述发送次数为相同系统信息的连续发送次数。
  45. 如权利要求34所述的方法,其特征在于,所述方法还包括以下至少一种:
    进入释放连接过程,并进行小区选择或重选;
    进入连接重建过程,并进行小区选择或重选;
    获取所述UE发送的第五指示信息,所述第五指示信息用于指示所述系统信息所存在的安全问题的情况。
  46. 如权利要求45所述的方法,其特征在于,所述进入释放连接过程,包括:
    接收所述UE发送的所述第五指示信息和/或连接释放指示。
  47. 如权利要求45所述的方法,其特征在于,所述进入连接重建过程,包括:
    接收所述UE发送的所述第五指示信息和/或连接重建请求消息。
  48. 如权利要求45所述的方法,其特征在于,所述进行小区选择或重选的方法包括以下至少一种:
    降低存在系统信息安全问题的小区或频点的选择优先级;
    忽略存在系统信息安全问题的小区或频点。
  49. 如权利要求45-47任一所述的方法,其特征在于,所述第五指示信息包括以下至少一种:
    存在安全问题的系统信息的标识;
    第四指示信息,所述第四指示信息包括系统信息存在的安全问题的类型指示,所述类型指示包括系统信息正确性验证失败指示,和/或系统信息被篡改指示;
    存在安全问题的系统信息对应的区域标识。
  50. 如权利要求49所述的方法,其特征在于,所述存在安全问题的系统信息对应的区域标识包括以下至少一种:
    存在安全问题的系统信息对应的小区标识;
    存在安全问题的系统信息对应的小区类型标识;
    存在安全问题的系统信息对应的小区组类型标识;
    存在安全问题的系统信息对应的跟踪区域标识;
    存在安全问题的系统信息对应的接入网指示区域标识。
  51. 一种系统信息验证装置,其特征在于,包括:
    发送模块,用于向网络侧设备发送辅助信息,所述辅助信息包括所述UE支持的验证方式、所述UE支持的验证算法的信息、所述UE期望验证的系统信息的标识、所述UE接收的系统信息的标识、所述UE感兴趣的系统信息、用于指示所述UE期望对系统信息进行验证的第一指示信息中的至少一种;
    验证模块,用于获取所述网络侧设备基于辅助信息发送的信息,并基于所述网络侧设备发送的信息触发系统信息正确性验证的过程。
  52. 一种系统信息验证装置,其特征在于,包括:
    获取UE发送的辅助信息,所述辅助信息包括所述UE支持的验证方式、所述UE支持的验证算法的信息、所述UE期望验证的系统信息的标识、所述UE接收的系统信息的标识、UE感兴趣的系统信息、用于指示所述UE期望对系统信息进行验证的第一指示信息中的至少一种;
    基于所述辅助信息触发系统信息正确性验证的过程。
  53. 一种通信装置,其特征在于,所述装置包括处理器和存储器,所述存储器中存储有计算机程序,所述处理器执行所述存储器中存储的计算机程序,以使所述装置执行如权利要求1至25中任一项所述的方法。
  54. 一种通信装置,其特征在于,所述装置包括处理器和存储器,所述存储器中存储有计算机程序,所述处理器执行所述存储器中存储的计算机程序,以使所述装置执行如权利要求26至50中任一项所述的方法。
  55. 一种通信装置,其特征在于,包括:处理器和接口电路;
    所述接口电路,用于接收代码指令并传输至所述处理器;
    所述处理器,用于运行所述代码指令以执行如权利要求1至25中任一项所述的方法。
  56. 一种通信装置,其特征在于,包括:处理器和接口电路;
    所述接口电路,用于接收代码指令并传输至所述处理器;
    所述处理器,用于运行所述代码指令以执行如权利要求26至50任一所述的方法。
  57. 一种计算机可读存储介质,用于存储有指令,当所述指令被执行时,使如权利要求1至25中任一项所述的方法被实现。
  58. 一种计算机可读存储介质,用于存储有指令,当所述指令被执行时,使如权利要求26至50中任一项所述的方法被实现。
PCT/CN2021/136199 2021-12-07 2021-12-07 一种系统信息验证方法、装置及存储介质 WO2023102751A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2021/136199 WO2023102751A1 (zh) 2021-12-07 2021-12-07 一种系统信息验证方法、装置及存储介质
CN202180004487.9A CN116803133A (zh) 2021-12-07 2021-12-07 一种系统信息验证方法、装置及存储介质

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2021/136199 WO2023102751A1 (zh) 2021-12-07 2021-12-07 一种系统信息验证方法、装置及存储介质

Publications (1)

Publication Number Publication Date
WO2023102751A1 true WO2023102751A1 (zh) 2023-06-15

Family

ID=86729477

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/136199 WO2023102751A1 (zh) 2021-12-07 2021-12-07 一种系统信息验证方法、装置及存储介质

Country Status (2)

Country Link
CN (1) CN116803133A (zh)
WO (1) WO2023102751A1 (zh)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017091959A1 (zh) * 2015-11-30 2017-06-08 华为技术有限公司 一种数据传输方法、用户设备和网络侧设备
US20180013568A1 (en) * 2016-03-10 2018-01-11 Futurewei Technologies, Inc. Authentication Mechanism for 5G Technologies
CN110351791A (zh) * 2018-04-04 2019-10-18 电信科学技术研究院有限公司 一种系统信息的接收处理方法、装置及用户终端
CN110771210A (zh) * 2017-06-15 2020-02-07 Lg电子株式会社 用于处置系统信息请求的失败的方法和设备
CN113711565A (zh) * 2019-04-25 2021-11-26 高通股份有限公司 系统信息安全容器

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017091959A1 (zh) * 2015-11-30 2017-06-08 华为技术有限公司 一种数据传输方法、用户设备和网络侧设备
US20180013568A1 (en) * 2016-03-10 2018-01-11 Futurewei Technologies, Inc. Authentication Mechanism for 5G Technologies
CN110771210A (zh) * 2017-06-15 2020-02-07 Lg电子株式会社 用于处置系统信息请求的失败的方法和设备
CN110351791A (zh) * 2018-04-04 2019-10-18 电信科学技术研究院有限公司 一种系统信息的接收处理方法、装置及用户终端
CN113711565A (zh) * 2019-04-25 2021-11-26 高通股份有限公司 系统信息安全容器

Also Published As

Publication number Publication date
CN116803133A (zh) 2023-09-22

Similar Documents

Publication Publication Date Title
CN110389738B (zh) 一种投屏方法、装置、终端及存储介质
WO2023201760A1 (zh) PScell添加或改变的成功报告的记录方法、装置
CN115004775B (zh) 成功PScell添加或更换报告的相关信息记录方法、装置
CN115004776B (zh) 成功PScell添加或更换报告的位置信息记录方法、装置
WO2023220901A1 (zh) 上报方法、装置
WO2023102751A1 (zh) 一种系统信息验证方法、装置及存储介质
WO2023133686A1 (zh) 一种测量放松方法、设备、存储介质及装置
WO2023000178A1 (zh) 一种信号接收方法、装置、用户设备、基站及存储介质
WO2023028849A1 (zh) 参考信号测量方法、装置、用户设备、网络侧设备及存储介质
WO2023102943A1 (zh) 一种随机接入资源配置的确定方法及设备/存储介质/装置
WO2023108574A1 (zh) 一种定位方法及设备/存储介质/装置
WO2023102944A1 (zh) 一种非竞争随机接入cfra中阈值确定方法及设备/存储介质/装置
WO2023108374A1 (zh) 一种测量方法/装置/用户设备/网络侧设备及存储介质
WO2023225827A1 (zh) 多prach传输配置方法、装置
WO2023226053A1 (zh) 无线连接的保持方法、装置
WO2023133694A1 (zh) 一种测量放松方法、设备、存储介质及装置
WO2023122987A1 (zh) 一种重复传输方法及设备/存储介质/装置
WO2023150989A1 (zh) 一种定位方法及设备/存储介质/装置
WO2023065339A1 (zh) 一种按需定位参考信号prs请求方法、装置、用户设备、网络侧设备及存储介质
WO2023225829A1 (zh) 多prach传输配置方法、装置
WO2024065856A1 (zh) 定位方法及装置
WO2023065075A1 (zh) 一种上报方法、装置、用户设备、网络侧设备及存储介质
WO2024016290A1 (zh) Sl prs资源激活方法、装置
WO2023197331A1 (zh) 数据传输方法/装置/设备及存储介质
WO2024092663A1 (zh) 定位方式确定方法、装置

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 202180004487.9

Country of ref document: CN

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21966675

Country of ref document: EP

Kind code of ref document: A1