WO2023142095A1 - Ue发现消息保护方法、装置、通信设备及存储介质 - Google Patents

Ue发现消息保护方法、装置、通信设备及存储介质 Download PDF

Info

Publication number
WO2023142095A1
WO2023142095A1 PCT/CN2022/075131 CN2022075131W WO2023142095A1 WO 2023142095 A1 WO2023142095 A1 WO 2023142095A1 CN 2022075131 W CN2022075131 W CN 2022075131W WO 2023142095 A1 WO2023142095 A1 WO 2023142095A1
Authority
WO
WIPO (PCT)
Prior art keywords
discovery
ltk
ranging
key
message
Prior art date
Application number
PCT/CN2022/075131
Other languages
English (en)
French (fr)
Inventor
梁浩然
陆伟
Original Assignee
北京小米移动软件有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京小米移动软件有限公司 filed Critical 北京小米移动软件有限公司
Priority to PCT/CN2022/075131 priority Critical patent/WO2023142095A1/zh
Priority to CN202280000267.3A priority patent/CN116897550A/zh
Publication of WO2023142095A1 publication Critical patent/WO2023142095A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity

Definitions

  • the present disclosure relates to but not limited to the technical field of communication, and in particular relates to a UE discovery message protection method, device, communication device and storage medium.
  • a wireless communication system for example, in a 5th generation mobile communication technology (5G) system, some user equipment (User Equipment, UE) is within the coverage of the 5G network, and some UEs are outside the coverage of the 5G network. Regardless of whether the UE is within the coverage of the 5G network, the ranging service can be supported.
  • 5G 5th generation mobile communication technology
  • UE User Equipment
  • the observer UE Before ranging the target UE, the observer UE (observer UE) needs to use the ranging discovery message to detect and identify nearby target UEs.
  • the discoverer UE announces a discovery message on the direct communication (PC5) interface, and the discovery message may contain the content about the discovery of interest.
  • the discoverer UE receiving the message may respond with some information related to the discoverer UE's sent discovery message.
  • the discovery message contains the privacy of the UE participating in the ranging process.
  • ranging-enabled UEs can be provided with a discovery key with an expiry date to help protect discovery messages when all ranging-enabled UEs are covered by the 5G network.
  • Embodiments of the present disclosure disclose a discovery message protection method, device, communication device, and storage medium.
  • a UE discovery message protection method performed by a first UE, including:
  • the first announcement message includes: a discovery message encrypted based on the discovery key, and LTK identification information indicating a long-term key (Long-Term Key, LTK) (ID);
  • the discovery key is determined; wherein, the LTK is received when the first UE is within the coverage of the network.
  • a UE discovery message protection method is provided, which is performed by a second UE, including:
  • the first announcement message includes: a discovery message encrypted based on the discovery key, and an LTK ID indicating the LTK;
  • the LTK ID is used to determine the LTK corresponding to the LTK ID for the first UE located outside the network coverage; the LTK is used for the first UE to determine the discovery key.
  • a UE discovery message protection method is provided, which is executed by a ranging key management function network element (Ranging Key Management Function, RKMF), including:
  • the LTK and LTK ID determined based on the LTK request to the first UE; wherein, the LTK and LTK ID are used for the first UE located outside the network coverage to listen to the first announcement message sent by the second UE, based on the first announcement
  • the LTK ID in the message determines the discovery key for encrypting the discovery message in the first announcement message.
  • an apparatus for protecting a UE discovery message is provided, which is applied to a first UE, including:
  • the first receiving module is configured to monitor the first announcement message when the first UE is outside the coverage of the network; wherein the first announcement message includes: a discovery message encrypted based on the discovery key, and an LTK ID indicating the LTK;
  • the first processing module is configured to determine the discovery key based on the LTK corresponding to the LTK ID; wherein, the LTK is received when the first UE is within the coverage of the network.
  • an apparatus for protecting a UE discovery message, which is applied to a second UE including:
  • the second sending module is configured to send a first announcement message when the second UE is located within the coverage of the network, where the first announcement message includes: a discovery message encrypted based on the discovery key, and an LTK ID indicating the LTK;
  • the LTK ID is used to determine the LTK corresponding to the LTK ID for the first UE located outside the network coverage; the LTK is used for the first UE to determine the discovery key.
  • a UE discovery message protection device applied to RKMF including:
  • the third receiving module is configured to receive the LTK request carrying the identity of the first UE
  • the third sending module is configured to send the LTK and LTK ID determined based on the LTK request to the first UE; wherein, the LTK and the LTK ID are used for the first UE located outside the network coverage to monitor the first UE sent by the second UE After the announcement of the message, the discovery key for encrypting the discovery message in the first announcement message is determined based on the LTK ID in the first announcement message.
  • a communication device including:
  • memory for storing processor-executable instructions
  • the processor is configured to implement the UE discovery message protection method in any embodiment of the present disclosure when running the executable instruction.
  • a computer storage medium stores a computer executable program, and when the executable program is executed by a processor, the UE discovery message protection method in any embodiment of the present disclosure is implemented.
  • the first UE may listen to the first announcement message when it is outside the coverage of the network; wherein, the first announcement message includes: a discovery message encrypted based on the discovery key, and an LTK ID indicating the LTK; based on The LTK corresponding to the LTK ID determines the discovery key; wherein, the LTK is received when the first UE is within the network coverage.
  • the first announcement message includes: a discovery message encrypted based on the discovery key, and an LTK ID indicating the LTK; based on The LTK corresponding to the LTK ID determines the discovery key; wherein, the LTK is received when the first UE is within the network coverage.
  • the embodiments of the present disclosure can enable the first UE outside the network coverage to obtain the encrypted discovery message sent by the UE within the network coverage, and can realize the protection of the discovery message, that is, can provide a partial network coverage scenario (such as In some 5G network coverage scenarios), the protection of discovery messages can also improve user experience.
  • FIG. 1 is a schematic structural diagram of a wireless communication system.
  • Fig. 2 is a schematic diagram showing location determination according to an exemplary embodiment.
  • Fig. 3 is a schematic diagram of network coverage according to an exemplary embodiment.
  • Fig. 4 is a schematic diagram of network coverage according to an exemplary embodiment.
  • Fig. 5 is a schematic diagram of network coverage according to an exemplary embodiment.
  • Fig. 6 is a flow chart showing a method for protecting a UE discovery message according to an exemplary embodiment.
  • Fig. 7 is a flow chart showing a method for protecting a UE discovery message according to an exemplary embodiment.
  • Fig. 8 is a flow chart showing a method for protecting a UE discovery message according to an exemplary embodiment.
  • Fig. 9 is a flow chart showing a method for protecting a UE discovery message according to an exemplary embodiment.
  • Fig. 10 is a flow chart showing a method for protecting a UE discovery message according to an exemplary embodiment.
  • Fig. 11 is a block diagram showing an apparatus for protecting a UE discovery message according to an exemplary embodiment.
  • Fig. 12 is a block diagram showing a device for protecting a UE discovery message according to an exemplary embodiment.
  • Fig. 13 is a block diagram showing an apparatus for protecting a UE discovery message according to an exemplary embodiment.
  • Fig. 14 is a block diagram of a UE according to an exemplary embodiment.
  • Fig. 15 is a block diagram of a base station according to an exemplary embodiment.
  • first, second, third, etc. may use the terms first, second, third, etc. to describe various information, the information should not be limited to these terms. These terms are only used to distinguish information of the same type from one another. For example, without departing from the scope of the embodiments of the present disclosure, first information may also be called second information, and similarly, second information may also be called first information. Depending on the context, the word “if” as used herein may be interpreted as “at” or "when” or "in response to a determination.”
  • FIG. 1 shows a schematic structural diagram of a wireless communication system provided by an embodiment of the present disclosure.
  • the wireless communication system is a communication system based on cellular mobile communication technology, and the wireless communication system may include: several user equipments 110 and several base stations 120 .
  • the user equipment 110 may be a device that provides voice and/or data connectivity to the user.
  • the user equipment 110 can communicate with one or more core networks via a radio access network (Radio Access Network, RAN), and the user equipment 110 can be an Internet of Things user equipment, such as a sensor device, a mobile phone (or called a "cellular" phone) ) and computers with IoT user equipment, for example, can be fixed, portable, pocket, hand-held, built-in computer or vehicle-mounted devices.
  • RAN Radio Access Network
  • Station For example, Station (Station, STA), subscriber unit (subscriber unit), subscriber station (subscriber station), mobile station (mobile station), mobile station (mobile), remote station (remote station), access point, remote user equipment (remote terminal), access user equipment (access terminal), user device (user terminal), user agent (user agent), user equipment (user device), or user equipment (user equipment).
  • the user equipment 110 may also be equipment of an unmanned aerial vehicle.
  • the user equipment 110 may also be a vehicle-mounted device, for example, a trip computer with a wireless communication function, or a wireless user device connected externally to the trip computer.
  • the user equipment 110 may also be a roadside device, for example, may be a street lamp, a signal lamp, or other roadside devices with a wireless communication function.
  • the base station 120 may be a network side device in a wireless communication system.
  • the wireless communication system may be a fourth generation mobile communication technology (the 4th generation mobile communication, 4G) system, also known as a Long Term Evolution (LTE) system; or, the wireless communication system may also be a 5G system, Also known as new air interface system or 5G NR system.
  • the wireless communication system may also be a next-generation system of the 5G system.
  • the access network in the 5G system can be called the New Generation-Radio Access Network (NG-RAN).
  • NG-RAN New Generation-Radio Access Network
  • the base station 120 may be an evolved base station (eNB) adopted in a 4G system.
  • the base station 120 may also be a base station (gNB) adopting a centralized distributed architecture in the 5G system.
  • eNB evolved base station
  • gNB base station
  • the base station 120 adopts a centralized distributed architecture it generally includes a centralized unit (central unit, CU) and at least two distributed units (distributed unit, DU).
  • the centralized unit is provided with a packet data convergence protocol (Packet Data Convergence Protocol, PDCP) layer, radio link layer control protocol (Radio Link Control, RLC) layer, media access control (Medium Access Control, MAC) layer protocol stack;
  • PDCP Packet Data Convergence Protocol
  • RLC Radio Link Control
  • MAC Media Access Control
  • a physical (Physical, PHY) layer protocol stack is set in the distribution unit, and the embodiment of the present disclosure does not limit the specific implementation manner of the base station 120 .
  • a wireless connection may be established between the base station 120 and the user equipment 110 through a wireless air interface.
  • the wireless air interface is a wireless air interface based on the fourth-generation mobile communication network technology (4G) standard; or, the wireless air interface is a wireless air interface based on the fifth-generation mobile communication network technology (5G) standard, such as
  • the wireless air interface is a new air interface; alternatively, the wireless air interface may also be a wireless air interface based on a technical standard of a next-generation mobile communication network based on 5G.
  • an E2E (End to End, end-to-end) connection may also be established between user equipment 110.
  • vehicle-to-vehicle (V2V) communication vehicle-to-roadside equipment (vehicle to Infrastructure, V2I) communication and vehicle-to-pedestrian (V2P) communication in vehicle to everything (V2X) communication Wait for the scene.
  • V2V vehicle-to-vehicle
  • V2I vehicle-to-roadside equipment
  • V2P vehicle-to-pedestrian
  • the above user equipment may be regarded as the terminal equipment in the following embodiments.
  • the foregoing wireless communication system may further include a network management device 130 .
  • the network management device 130 may be a core network device in a wireless communication system, for example, the network management device 130 may be a Mobility Management Entity (Mobility Management Entity) in an evolved packet core network (Evolved Packet Core, EPC), MME).
  • the network management device can also be other core network devices, such as Serving GateWay (SGW), Public Data Network Gateway (Public Data Network GateWay, PGW), policy and charging rule functional unit (Policy and Charging Rules Function, PCRF) or Home Subscriber Server (Home Subscriber Server, HSS), etc.
  • SGW Serving GateWay
  • PGW Public Data Network Gateway
  • PCRF Policy and Charging Rules Function
  • HSS Home Subscriber Server
  • the embodiments of the present disclosure list a plurality of implementation manners to clearly illustrate the technical solutions of the embodiments of the present disclosure.
  • those skilled in the art can understand that the multiple embodiments provided by the embodiments of the present disclosure can be executed independently, or combined with the methods of other embodiments in the embodiments of the present disclosure, and can also be executed alone or in combination It is then executed together with some methods in other related technologies; this is not limited in the embodiment of the present disclosure.
  • the ranging service refers to determining at least one of the following information through a direct communication connection: the distance between two UEs; and/or determining the direction from one UE to another UE.
  • the observer UE has a reference plane and a reference direction.
  • the direction from the target UE to the observer UE is: the angle between the line connecting the observer UE and the target UE and the reference direction.
  • the included angle is represented by an azimuth direction and/or an elevation direction.
  • the azimuth direction of the target UE is: the angular direction formed by the reference direction and the straight line projection from the observer UE to the target UE on the same plane as the reference direction perpendicular to the zenith.
  • the elevation angle direction of the target UE is the angle direction between the two in the vertical direction (above the horizontal plane).
  • the ranging service can be supported no matter whether it is within the coverage of the 5G network or not.
  • an illustration of 5G network coverage is provided; both UE1 and UE2 are within the coverage of the 5G network.
  • Figure 4 provides an illustration of partial 5G network coverage; UE1 is within 5G network coverage and UE2 is outside 5G network coverage.
  • Figure 5 provides an illustration without 5G network coverage; neither UE1 nor UE2 is within 5G network coverage. In one embodiment, if a licensed band is used for ranging, then full operator control is possible.
  • the first UE may be an announcing UE, which may be an observer UE or a discoverer UE; the second UE may be a listening UE, which may be an observer UE or a discoverer UE.
  • the first UE may be a listening UE, which may be an observer UE or a discoverer UE; the second UE may be an announcing UE, which may be an observer UE or a discoverer UE.
  • when the first UE sends the first announcement message the second UE monitors the first announcement message; when the second UE sends the second announcement message, the first UE monitors the second announcement message.
  • the first UE and the second UE may be listening UEs or sending UEs, and both the first UE and the second UE may be discoverer UEs or observer UEs.
  • the embodiment of the present disclosure discloses a UE discovery message protection method, which is executed by the first UE, including:
  • Step S61 Listening to the first announcement message when the first UE is outside the coverage of the network; wherein, the first announcement message includes: a discovery message encrypted based on the discovery key, and an LTK ID indicating the LTK;
  • Step S62 Determine the discovery key based on the LTK corresponding to the LTK ID; wherein, the LTK is received when the first UE is within the coverage of the network.
  • Monitoring the first announcement message in step S61 may include: monitoring the first announcement message sent by the second UE.
  • both the first UE and the second UE can be but not limited to various mobile terminals or fixed terminals; for example, both the first UE and the second UE can be but not limited to mobile phones, computers, servers, Wearable devices, game control platforms or multimedia devices, etc.
  • the first UE is located outside the network coverage, and the second UE is located within the network coverage. In another embodiment, the first UE is located outside the network coverage, the second UE is located within the network coverage; and the second UE is located in a nearby UE of the first UE.
  • network coverage may refer to coverage of various networks; for example, network coverage may be, but not limited to, 4G network coverage, 5G network coverage, or other evolved network coverage.
  • network coverage may be, but not limited to, 4G network coverage, 5G network coverage, or other evolved network coverage.
  • the first announcement message is sent.
  • the discovery key determined in step S62 may be a discovery key for decrypting the discovery message.
  • the first announcement message includes but is not limited to at least one of the following:
  • a security algorithm identifier used to identify the security algorithm used by the first announcement message
  • a random number used in conjunction with LTK, to determine the discovery key
  • the nonce can also be used together with the discovery key to decrypt the discovery message.
  • the discovery message includes at least one of the following:
  • Timestamp used to indicate the validity period of the discovery key
  • the ranging layer ID is used to indicate the target UE that needs ranging
  • the ranging requirement information is used to indicate the ranging requirement of the ranging.
  • the discovery message may also include: a target ranging layer ID, which is used to indicate a target UE that needs ranging and is out of network coverage.
  • the timestamp may be included in the discovery message of the first announcement message. As such, the discovery message needs to be decrypted to obtain the timestamp.
  • the timestamp is included in the first announcement message but not in the discovery message. In this way, the time stamp can be obtained only after the integrity verification of the first announcement message is required, which is conducive to the determination of the retransmission attack on the first announcement message without decrypting the discovery message.
  • the security algorithm may be any encryption algorithm, which is not limited here.
  • the ranging query code may be used to identify the target UE indicated in the first announcement message.
  • the ranging query codes corresponding to different first announcement messages are different; the ranging layer IDs in the different first announcement messages may be the same or different.
  • the ranging query code can be used to indicate the target UE that needs ranging; if the ranging query code is included in the first announcement message but not included in the encrypted discovery message, then the ranging query code may be used to indicate the first announcement message.
  • the discovery key includes at least one of the following:
  • Ranging Encryption Key used to encrypt discovery messages
  • a ranging integrity key (Ranging Integrity Key, RIK) is used to protect the integrity of the first announcement message.
  • the discovery message includes sensitive information.
  • the sensitive information is at least part of the discovery message.
  • the discovery message includes the ranging layer ID and ranging request information; the sensitive information may be the ranging time in the ranging request information.
  • REK may be used to encrypt sensitive information in discovery messages.
  • the sensitive information can be the ranging time in the ranging requirement information; then the REK can be used for the ranging time Encryption, and do not encrypt other information other than the ranging time and the ranging layer ID in the ranging request information.
  • the REK can be used to encrypt the entire discovery message.
  • the discovery message encrypted based on the discovery key in step S61 may be: the discovery message encrypted based on the REK in the discovery key.
  • Monitoring the first announcement message in step S61 includes: monitoring the first announcement message on the direct communication (PC5) interface.
  • An embodiment of the present disclosure provides a method for protecting a UE discovery message, executed by a first UE, including: when the first UE is outside a network coverage area, listening to a first announcement message on a PC5 interface.
  • the step S62 may be: based on the LTK ID, determine the LTK corresponding to the LTK ID; based on the LTK, determine the discovery key.
  • the correspondence between the LTK ID and the LTK may be stored in the first UE.
  • the first UE can obtain the corresponding relationship between the LTK ID and the LTK in advance; if the first UE obtains the LTK ID from the first announcement message, it can determine the corresponding relationship between the LTK ID and the LTK ID based on the corresponding relationship between the LTK ID and the LTK ID. Corresponding LTK.
  • the first UE may listen to the first announcement message when the first UE is outside the coverage of the network, wherein the first announcement message includes: a discovery message encrypted based on the discovery key, and an LTK indicating the LTK ID; and based on the LTK corresponding to the LTK ID, determine the discovery key.
  • the first announcement message includes: a discovery message encrypted based on the discovery key, and an LTK indicating the LTK ID; and based on the LTK corresponding to the LTK ID, determine the discovery key.
  • the embodiment of the present disclosure can enable the first UE outside the network coverage to obtain the encrypted discovery message sent by the UE within the network coverage, and can realize the protection of the discovery message, that is, can provide a partial network coverage scenario (for example, In some 5G network coverage scenarios), the protection of discovery messages can also improve user experience.
  • An embodiment of the present disclosure provides a UE discovery message protection method, executed by a first UE, which may include:
  • RKMF Ranging Key Management Function
  • the LTK request carries the identifier of the first UE; the LTK request is used to request the LTK of the first UE and/or the LTK ID corresponding to the LTK.
  • the first UE when the first UE is within the coverage of the network, it can obtain the LTK from the RKMF within the coverage of the network; this facilitates subsequent decryption of the discovery message based on the discovery key generated based on the LTK.
  • the method includes: determining whether the first UE has the right to monitor based on the configuration information received when it is within the coverage of the network; wherein, the configuration information includes: the monitoring rights of each UE;
  • Monitoring the first announcement message in step S61 includes: monitoring the first announcement message based on the first UE having the right to monitor.
  • An embodiment of the present disclosure provides a UE discovery message protection method, executed by a first UE, including:
  • the configuration information includes: the monitoring authority of each UE;
  • the first announcement message is listened to when the first UE is outside the coverage of the network.
  • the configuration information may be: a service configuration file.
  • the configuration information may be defined by the application layer.
  • the right of the first UE to listen may be: the right to listen to the announcement message of any UE; or the right to subscribe the announcement message of the UE; or the right to listen to the announcement message of the second UE.
  • the second UE is located within the network coverage.
  • the configuration information includes: the listening authority of each UE.
  • the configuration information includes: at least one first UE and the corresponding listening authority of the first UE.
  • the monitoring authority includes but not limited to at least one of the following: the first UE has the right to monitor; the first UE has no right to monitor; the first UE has the right to monitor the first UE; and the first UE has no right to monitor the first UE.
  • the first UE has the right to monitor, which may be: the first UE has the right to monitor all UEs or any UE within the coverage of the network.
  • the configuration information includes: an identifier of at least one first UE and a corresponding monitoring authority of the first UE.
  • the first UE exceeds the coverage of the network, based on the identity and configuration information of the first UE, determine whether the first UE has the right to monitor; if the first UE determines that the first UE has the right to monitor the second UE, it can The PC5 interface monitors the first announcement message sent by the second UE.
  • the first UE may only monitor the first announcement message sent by the second UE when it is determined that the first UE has the monitoring authority; in this way, protection of the discovery message may be further aimed at partial network coverage scenarios.
  • the discovery key is determined, including:
  • KD intermediate key
  • KD-SESS temporary key
  • An embodiment of the present disclosure provides a UE discovery message protection method, executed by the first UE, including: determining KD based on the LTK corresponding to the LTK ID; determining the KD-SESS based on the KD; determining the key in the discovery key based on the KD-SESS REK and/or RIK.
  • An embodiment of the present disclosure provides a UE discovery message protection method, which is executed by the first UE, including: determining the KD based on the LTK and the random number corresponding to the LTK ID; determining the KD-SESS based on the KD and the random number; determining the KD-SESS based on the KD-SESS and A random number identifying the REK and/or RIK in the Discovery Key.
  • the first UE may determine the discovery key for decrypting the discovery message through the LTK received within the coverage of the network, thereby facilitating the completion of the decryption of the discovery message.
  • An embodiment of the present disclosure provides a method for protecting a UE discovery message, executed by a first UE, including: decrypting a first announcement message based on a discovery key.
  • Decrypting the first announcement message based on the discovery key includes: performing integrity verification on the first announcement message based on the RIK in the discovery key; and/or decrypting the discovery message based on the REK in the discovery key.
  • decrypting the discovery message includes: decrypting sensitive information in the discovery message.
  • An embodiment of the present disclosure provides a UE discovery message protection method, executed by a first UE, including: decrypting a discovery message based on a REK in a discovery key.
  • an embodiment of the present disclosure provides a UE discovery message protection method, which is executed by the first UE, including:
  • Step S71 Determine that the first announcement message is complete based on the RIK, and decrypt the discovery message based on the REK.
  • the first UE After the first UE determines the RIK and REK in the discovery key, it can verify the integrity of the first announcement message based on the RIK; if the integrity verification is successful, it is determined that the first announcement message is Decrypt the discovery message.
  • An embodiment of the present disclosure provides a UE discovery message protection method, executed by a first UE, including:
  • the first announcement message Based on the fact that the first announcement message has not been attacked by replay, it is determined to send the second announcement message; or, based on the first announcement message being attacked by replay, it is determined not to send the second announcement message; Corresponding ranging response code.
  • decrypting the first announcement message includes: performing integrity verification on the first announcement message and/or decrypting the discovery message.
  • the timestamp can be obtained directly from the first announcement message; if the timestamp is included in the discovery message of the first announcement message, the discovery message needs to be decrypted to get the timestamp.
  • the first UE determines that the current time is not within the validity period indicated by the timestamp, and/or if it has previously received the same random number as the random number in the first announcement message, it determines that the first announcement message is replayed attack.
  • the first UE determines that the current time is within the validity period indicated by the timestamp, and/or if it has not received the same random number as the number of data in the first announcement message before, it determines that the first announcement message has not been repeated. release the attack.
  • the ranging response code may be used to indicate that the first UE has received the first announcement message.
  • the first UE can also obtain the timestamp and/or random number from the first announcement message, and determine whether the first announcement message is attacked by replay; thus, the protection of discovery messages can be improved .
  • the second announcement message can be sent to notify the second UE that the first UE has received the first announcement message; or, if the first announcement message has been attacked by replay , the second UE may be notified by not sending the second announcement message that the first UE has not successfully obtained the first announcement message.
  • the method further includes: after receiving the first announcement message, sending a second announcement message.
  • An embodiment of the present disclosure provides a UE discovery message protection method, executed by a first UE, including: sending a second announcement message, wherein the second announcement message carries a ranging response code corresponding to a ranging query code.
  • An embodiment of the present disclosure provides a UE discovery message protection method, executed by a first UE, including: sending first and second announcement messages on a PC5 interface.
  • the first announcement message includes: a ranging query code, used to identify the first announcement message;
  • the method includes: sending a second announcement message based on the matching of the ranging query code with a pre-configured ranging query filter; wherein, the second announcement message includes a ranging response code corresponding to the ranging query code.
  • An embodiment of the present disclosure provides a UE discovery message protection method, executed by the first UE, which may include: sending a second announcement message based on the matching of the ranging query code and the pre-configured ranging query filter; wherein, the second announcement message Include the ranging response code corresponding to the ranging query code.
  • the ranging query filter may be used to filter the first announcement message. If the ranging query filter preconfigured by the first UE matches the ranging query code in the first announcement message, determine that the first announcement message is the first announcement message that needs to be monitored.
  • the first UE may also filter out the first announcement message corresponding to the unmatched ranging query code through the ranging query filter, so that the first UE may receive the accurate first announcement message.
  • the sending of the second announcement message includes: sending the second announcement message protected by the REK and/or RIK.
  • An embodiment of the present disclosure provides a method for protecting a UE discovery message, executed by a first UE, which may include: sending a second announcement message protected by REK and/or RIK on a PC5 interface.
  • using the REK and/or RIK to protect the second announcement message includes: using the REK to encrypt sensitive information in the second announcement message, and/or using the RIK to perform integrity protection on the second announcement message.
  • the protection includes integrity protection and/or confidentiality protection; the confidentiality protection is customized by the first UE.
  • the discovery key for encrypting the second public message is the same as the discovery key for decrypting the first announcement message. In this way, after the second UE receives the second announcement message, it may also use the discovery key that encrypted the first announcement message to decrypt the second announcement message.
  • the first UE may also encrypt the second announcement message and then announce it, so that the confidentiality of the second announcement message may also be improved.
  • An embodiment of the present disclosure provides a UE discovery message protection method, executed by a first UE, which may include: sending a second announcement message; wherein the second announcement message includes a ranging response code corresponding to a ranging query code.
  • the second announcement message is: a second announcement message protected using REK and/or RIK.
  • REK REK
  • RIK RIK
  • the ranging query code may be obtained through the first announcement message.
  • the following UE discovery message protection method is performed by the second UE, which is similar to the description of the UE discovery message protection method performed by the first UE above; and an embodiment of the UE discovery message protection method performed by the second UE
  • an embodiment of the UE discovery message protection method performed by the second UE For technical details not disclosed in , please refer to the description of an example of the UE discovery message protection method performed by the first UE, and no detailed description will be given here.
  • an embodiment of the present disclosure provides a UE discovery message protection method, which is performed by a second UE, including:
  • Step S81 Sending a first announcement message when the second UE is within the coverage of the network, wherein the first announcement message includes: a discovery message encrypted based on the discovery key, and an LTK ID indicating the LTK;
  • the LTK ID is used to determine the LTK corresponding to the LTK ID for the first UE located outside the network coverage; the LTK is used for the first UE to determine the discovery key.
  • the first announcement message is the first announcement message in step S61; the discovery message and the discovery key are respectively the discovery message and the discovery key in step S61; the LTK ID is the LTK ID in step S61.
  • the first announcement message includes but is not limited to at least one of the following:
  • a security algorithm identifier used to identify the security algorithm used by the first announcement message
  • a random number used in conjunction with LTK, to determine the discovery key
  • the nonce is also used together with the discovery key to decrypt the discovery message.
  • the discovery message includes but is not limited to at least one of the following:
  • Timestamp used to indicate the validity period of the discovery key
  • the ranging layer ID is used to indicate the target UE that needs ranging
  • the ranging requirement information is used to indicate the ranging requirement of the ranging.
  • the discovery key includes at least one of the following:
  • RIK used to protect the integrity of the first announcement message.
  • the discovery key used by the second UE to encrypt the discovery message is obtained from the RKMF, or is generated from the KD obtained from the RKMF.
  • Sending the first announcement message in step S81 includes: sending the first announcement message through the PC5 interface.
  • An embodiment of the present disclosure provides a UE discovery message protection method, executed by a second UE, which may include: sending a first announcement message on a PC5 interface.
  • the first announcement message may be sent by the second UE located within the coverage of the network, so that the first UE located outside the coverage of the network can listen to the first announcement message, and based on the network Decryption of the LTK received while in coverage determines the discovery key to enable decryption of discovery messages and the like.
  • the embodiments of the present disclosure can enable the first UE outside the network coverage to obtain the encrypted discovery message sent by the UE within the network coverage, and can realize the protection of the discovery message, that is, can provide a partial network coverage scenario (such as In some 5G network coverage scenarios), the protection of discovery messages can also improve user experience.
  • Sending the first announcement message in step S81 may include: sending the first announcement message based on receiving the discovery response sent by the RKMF; wherein the discovery response is used to indicate that the second UE has the right to announce.
  • An embodiment of the present disclosure provides a method for discovering and unprotecting a UE, which is executed by a second UE, and may include: sending a first announcement message based on receiving a discovery response sent by RKMF; wherein, the discovery response is used to indicate that the second UE has the right to announce .
  • the method before receiving the discovery response, further includes: sending a discovery request carrying the identity of the second UE to the RKMF, where the discovery request is used to request whether the second UE has the right to announce.
  • An embodiment of the present disclosure provides a UE discovery message protection method, executed by the first UE, which may include: sending a discovery request carrying the identity of the second UE to the RKMF, where the discovery request is used to request whether the second UE has the right to announce.
  • the discovery request includes: a ranging layer ID, which is used to indicate a target UE requiring ranging, or a target UE for discovery.
  • the target UE that is, the second UE determines whether the targeted UE has the right to listen and/or announce.
  • the discovery response including at least one of the following:
  • a ranging query code used to identify the first announcement message
  • Ranging response filter used to match ranging response codes
  • Nonce used with LTK to determine the discovery key.
  • the discovery response including one of the following:
  • the second UE when the second UE needs to announce a message, it sends a discovery request carrying a second identifier to RKMF to request whether the second UE has the right to announce; if the RKMF determines that the second UE has the right to announce, it sends A discovery response; then the second UE may send a first announcement message on the PC5 interface based on the discovery response.
  • the second UE may request the RKMF for the right to announce the first announcement message, and only announce the first announcement message when it is determined that the second UE has the announcement authority; in this way, the first announcement message may also be improved. Announcement message confidentiality.
  • the discovery response indicating that the second UE has the right to announce can carry the discovery key or the KD or random number that generates the discovery key, etc.
  • a discovery response can be used to indicate that the second UE has the right to announce and send the discovery key, etc.
  • An embodiment of the present disclosure provides a UE discovery message protection method, executed by a second UE, which may include: determining KD-SESS based on KD; and determining a discovery key based on KD-SESS.
  • An embodiment of the present disclosure provides a UE discovery message protection method, executed by a second UE, which may include: determining a KD-SESS based on KD and a random number; and determining a discovery key based on the KD-SESS and a random number.
  • determining the discovery key may be: determining REK and/or RIK in the discovery key.
  • the discovery key can be generated based on the KD. In this way, the process of generating the discovery key by the KD can also be applied to the second UE, thereby reducing the workload of the RKMF.
  • An embodiment of the present disclosure provides a UE discovery message protection method, executed by a second UE, which may include: encrypting a discovery message based on REK; and/or performing integrity protection on a first announcement message based on RIK.
  • An embodiment of the present disclosure provides a UE discovery message protection method, which is executed by a second UE, and may include: monitoring a second announcement message based on a ranging response filter, wherein the second announcement message includes a distance measurement corresponding to a ranging query code. distance response code.
  • the second announcement message may also be an announcement message protected based on REK and/or RIK.
  • the sensitive information in the second announcement message is encrypted using the REK, and the second announcement message is integrity protected using the RIK.
  • An embodiment of the present disclosure provides a UE discovery message protection method, executed by a second UE, which may include: receiving a second announcement message; wherein the second announcement message includes a ranging response code corresponding to a ranging query code.
  • the second announcement message is: a second announcement message protected using REK and/or RIK.
  • the ranging query code may be obtained through the first announcement message.
  • the following UE discovery message protection method is performed by RKMF, which is similar to the description of the UE discovery message protection method performed by the first UE and/or the second UE above; and for the UE discovery message protection method performed by RKMF
  • RKMF UE discovery message protection method
  • an embodiment of the present disclosure provides a UE discovery message protection method, which is executed by RKMF, including:
  • Step S91 receiving the LTK request carrying the identity of the first UE
  • Step S92 Send the LTK and LTK ID determined based on the LTK request to the first UE; wherein, the LTK and LTK ID are used for the first UE located outside the network coverage to listen to the first announcement message sent by the second UE, based on The LTK ID in the first announcement message determines the discovery key for encrypting the discovery messages in the first announcement message.
  • the LTK request is the LTK request in the above embodiments;
  • the first announcement message is the first announcement message in step S61;
  • the discovery message and the discovery key are respectively the discovery message and the discovery key in step S61 ;
  • LTK ID is the LTK ID in step S61.
  • discovery keys include: REK and/or RIK.
  • An embodiment of the present disclosure provides a UE discovery message protection method, executed by RKMF, including:
  • the discovery request includes the identity of the second UE, and is used to request whether the second UE has the right to declare;
  • the RKMF may determine whether the second UE has the right to announce based on the identity and configuration information of the second UE in the discovery request.
  • the configuration information includes: an identifier of at least one UE and a corresponding announcement authority.
  • the configuration information includes: a service configuration file; the configuration information can be defined by the application layer.
  • An embodiment of the present disclosure provides a UE discovery message protection method, executed by RKMF, including: determining a discovery key or generating a KD of the discovery key based on the LTK.
  • the discovery response may be the discovery response in the foregoing embodiments.
  • the discovery response includes one of the following:
  • the discovery response includes at least one of the following:
  • a ranging query code used to identify the first announcement message
  • Ranging response filter used to match ranging response codes
  • Nonce used with LTK to determine the discovery key.
  • the RKMF can determine the target UE that the second UE has the right to announce based on the discovery request and the configuration information.
  • the target UE may be regarded as a target UE that needs ranging.
  • the discovery request includes: a ranging layer ID, used to indicate a target UE requiring ranging;
  • Methods include:
  • UDM Unified Data Management
  • a verification result returned by the UDM based on the verification information where the verification result includes: a target ranging layer ID; where the target ranging layer ID is used to indicate the target UE indicated in the ranging layer ID that is out of network coverage.
  • An embodiment of the present disclosure provides a UE discovery message protection method, executed by RKMF, including:
  • a verification result returned by the UDM based on the verification information where the verification result includes: a target ranging layer ID; where the target ranging layer ID is used to indicate the target UE indicated in the ranging layer ID that is out of network coverage.
  • the verification information is used to request to verify whether the target UE indicated in the ranging layer ID is within the coverage of the network.
  • the target UE may include the first UE; the ranging layer ID may include the identity of the first UE.
  • the target UE indicated in the ranging layer ID includes: a target ID located within the network coverage and/or a target UE located outside the network coverage.
  • the target UE indicated in the target ranging layer ID includes: a target UE located outside the coverage of the network.
  • the RKMF receives the discovery request sent by the second UE, acquires the ranging layer ID in the discovery request; and sends the ranging layer ID in the verification information to the UDM; wherein the ranging layer ID includes at least the first The identity of the UE.
  • the UDM can determine whether the target UE is within the network coverage based on checking the state of the target UE; if it is determined that at least part of the target UE is out of the network coverage, then determine to send a verification result to the RKMF; the verification result includes the target ranging layer ID , the target ranging layer ID, including the at least part of the target UEs located within the coverage of the network.
  • UDM can also be used to detect the state of the target UE, determine whether each target UE is within the coverage of the network; and send the verification result of whether each target UE is within the coverage of the network to the RKMF.
  • the RKMF can send verification information to the UDM to verify whether the target UE indicated in the discovery request is located outside the network coverage; if so, determine that the second UE can send
  • the first announcement message is used to enable UEs that have the right to monitor to monitor. In this way, the discovery message can be sent for UEs outside the coverage of the network.
  • the discovery key is determined based on the LTK or the KD of the discovery key is generated.
  • any manner of causing invalidation of the available key is acceptable; for example, the invalidation of the available key may be, but not limited to: expiration of the validity period of the available key.
  • An embodiment of the present disclosure provides a UE discovery message protection method, performed by RKMF, which may include: based on the identity of the first UE being included in the target ranging layer ID, and the available key of the first UE is invalid, determining the discovery based on LTK Key or the KD that generates the discovery key.
  • An embodiment of the present disclosure provides a method for protecting a UE discovery message, which is performed by RKMF, and may include: based on that the identity of the first UE is included in the target ranging layer ID, and the validity period of the available key of the first UE expires, based on The LTK determines the discovery key or the KD that generates the discovery key.
  • the identity of the first UE is included in the target ranging layer ID, that is, the first UE is one of the target UEs.
  • the available key of the first UE is: the discovery key received when the first UE is within the coverage of the network.
  • the discovery key may be the discovery key sent by the RKMF received by the first UE within the coverage of the network.
  • the RKMF may determine the discovery key based on the LTK or generate the discovery key when it is determined that the first UE is located outside the network coverage and the discovery key received when it is in the network coverage expires. intermediate key.
  • the encrypted discovery message sent by the second UE to the first UE is decrypted based on the new discovery key.
  • the following UE discovery message protection method is performed by UDM, which is similar to the description of the UE discovery message protection method performed by the first UE, the second UE and/or RKMF above; and for the UE discovery message performed by UDM
  • UDM For technical details not disclosed in the embodiment of the protection method, please refer to the description of an example of the UE discovery message protection method performed by the first UE, the second UE, and/or the RKMF, and no detailed description will be given here.
  • An embodiment of the present disclosure provides a UE discovery message protection method, executed by UDM, which may include:
  • the verification information includes the ranging layer ID; the verification information is used to request verification whether the target UE indicated in the ranging layer ID is within the network coverage;
  • the verification result includes: a target ranging layer ID; where the target ranging layer ID is used to indicate the target UE indicated in the ranging layer ID that is out of network coverage.
  • An embodiment of the present disclosure provides a UE discovery message protection method, executed by UDM, which may include:
  • the target ranging layer ID is determined based on the identity of the target UE that is out of network coverage.
  • the UDM may also determine whether the first UE is out of network coverage based on the identifier of the first UE and the target ranging layer ID. If the identifier of the first UE is included in the target ranging layer ID, it is determined that the first UE is out of network coverage.
  • the application scenario of the UE discovery message protection method is explained as follows: In the scenario of the secure ranging discovery process under the coverage of the 5G network, the UE discovery message protection method can be introduced; in the UE discovery message protection method, it can be in accordance with the 3GPP TS Set the security algorithm ID as described in 33.501.
  • the first UE leaving the coverage of the 5G network has been pre-configured or provided with information of discoverable target UEs by the network device.
  • UE and RKMF shall support the security conditions and steps in clause 5.2.5 of 3GPP TS 33.503.
  • the second UE supports the security algorithm used by the first UE.
  • an embodiment of the present disclosure provides a UE discovery message protection method, which is executed by a communication device, and the communication device includes: a first UE, a second UE, RKMF, and a UDM; the method includes:
  • Step S1001 When the first UE is within the coverage of the 5G network, send an LTK request;
  • the first UE sends an LTK request carrying the identity of the first UE within the coverage of the 5G network, so as to obtain the LTK from the RKMF.
  • Step S1002 when the first UE is within the coverage of the 5G network, receive an LTK response;
  • the RKMF before step S132, after receiving the LTK request, the RKMF generates and sends the LTK and LTK ID of the first UE.
  • the first UE when the first UE is within the coverage of the 5G network, it receives the LTK response sent by the RKMF; wherein the LTK response includes: the LTK and the LTK ID corresponding to the identity of the first UE.
  • Step S1003 Determine the right to monitor on the PC5 interface
  • the first UE when the first UE receives the LTK and the LTK ID, it determines that it has the right to monitor when it is outside the coverage of the 5G network based on the configuration information obtained when it is within the coverage of the 5G network.
  • Step S1004 sending a discovery request
  • the second UE is within the coverage of the 5G network; the second UE sends a discovery request carrying the identity of the second UE to the RKMF to request announcement on the PC5 interface.
  • Step S1005 discover authorization
  • the RKMF discovers the target UE based on the discovery request and the service profile; the service profile can be defined by the application layer.
  • Step S1006 sending a status request of 5G network coverage
  • the RKMF in order to verify whether all target UEs of the second UE are within the coverage of the 5G network, the RKMF sends the ranging layer ID to the UDM.
  • the ranging layer ID includes the identity of the target UE.
  • Step S1007 sending a status response of 5G network coverage
  • the UDM detects the states of all target UEs, and sends the verification results to the RKMF. If the first UE is one of the target UEs of the second UE, the UDM determines that the first UE is outside the coverage of the 5G network.
  • the verification result can be regarded as a status response; here, when the UDM determines that the target UE is located in the coverage area of the 5G network, it sends the verification result carrying the target ranging layer ID, and the target ranging layer ID indicates that the target UE in the ranging layer ID The indicated target UE is outside the coverage of the network.
  • Step S1008 generate KD
  • the RKMF determines that the discovery key allocated by the RKMF to the first UE is invalid, the RKMF generates a new discovery key for the first UE.
  • the RMKF generates the KD of the first UE based on the LTK of the first UE based on the key generation function (KDF) specified in Appendix B of TS 33.220.
  • KDF key generation function
  • Step S1009 receiving a discovery response
  • the RKMF sends a discovery response to the second UE, including: the LTK ID of the first UE, a ranging query code, a ranging response filter, KD, and a random number (nonce ) and security algorithm identification.
  • Step S1010 announce the first announcement message on the PC5 interface
  • the first announcement message includes: ranging query code, time stamp, ranging layer ID and ranging request information; the first announcement message also includes: LTK ID and random number used to derive the discovery key.
  • at least one of the ranging query code, time stamp, target ranging layer ID, and ranging request information is the information in the discovery message in the above embodiment.
  • the second UE first uses REK to encrypt sensitive information in the first announcement message; then uses RIK to use the RIK for deriving the discovery key from the discovery message including the encrypted sensitive information, the LTK ID of the first UE Integrity protection is performed on the random number to obtain the first announcement message; the second UE announces the first announcement message on the PC5 interface.
  • the sensitive information is at least part of the information in the discovery message.
  • Step S1011 generating a discovery key
  • the first UE when receiving the first announcement message from the second UE, calculates the REK and the RIK based on the random number and the LTK. Using the newly generated RIK, the first UE first verifies the integrity of the first announcement message. If the first announcement message is modified, the first UE will abort the second UE's first announcement message. The first UE then decrypts the first announcement message. Furthermore, the first UE may check the integrity protected timestamp and nonce; if the timestamp and/or nonce indicate a replay attack, the first UE aborts the second UE's first announcement message.
  • Step S1012 announce the second announcement message on the PC5 interface
  • the first UE determines that the ranging query code of the second UE matches the ranging query filter preconfigured by the first UE, it announces the second UE including the corresponding ranging response code on the PC5 interface. Announcement message.
  • the second bulletin message is also protected by REK and RIK.
  • Step S1013 Monitor on the PC5 interface.
  • the second UE uses the ranging response filter sent by the RKMF to monitor on the PC5 interface.
  • An embodiment of the present disclosure provides a key derivation method.
  • Step A To calculate KD based on LTK, the following parameters should be used to form the input of KDF:
  • L0 length of Nonce_1 (i.e. 0x00 0x03);
  • L1 length of Nonce_2 (i.e. 0x00 0x10)
  • L2 length of Nonce_3 (i.e. 0x00 0x10).
  • the input key should be 256-bit LTK.
  • Step B To calculate KD-SESS based on KD, the following parameters should be used to form the input of KDF:
  • L0 length of Nonce_4 (i.e. 0x00 0x10)
  • L1 length of Nonce_5 (i.e. 0x00 0x10).
  • the input key should be 256-bit KD.
  • Step C To calculate RIK or REK based on KD-SESS, the following parameters should be used to form the input of KDF:
  • L0 length of P0(i.e.0x00 0x01);
  • L1 length of algorithm identity (i.e. 0x00 0x01);
  • the input key should be 256-bit KD-SESS.
  • n bits where n is less than or equal to 256; the n least significant bits of the 256 bits output by the KDF should be used as the input key.
  • an embodiment of the present disclosure provides a device for protecting a UE discovery message, which is applied to a first UE, including:
  • the first receiving module 51 is configured to monitor a first announcement message when the first UE is outside the network coverage; wherein, the first announcement message includes: a discovery message encrypted based on the discovery key, and an LTK ID indicating the LTK;
  • the first processing module 52 is configured to determine the discovery key based on the LTK corresponding to the LTK ID; wherein, the LTK is received when the first UE is within the coverage of the network.
  • An embodiment of the present disclosure provides a device for protecting a UE discovery message, which is applied to a first UE and may include:
  • the first processing module 52 is configured to determine whether the first UE has the right to monitor based on the configuration information received when it is within the coverage of the network; wherein, the configuration information includes: the monitoring authority of each UE;
  • the first receiving module 51 is configured to monitor the first announcement message based on the first UE being entitled to monitor.
  • An embodiment of the present disclosure provides an apparatus for protecting a UE discovery message, which is applied to a first UE, and may include: a first receiving module 51 configured to monitor a first announcement message on a PC5 interface.
  • An embodiment of the present disclosure provides a device for protecting a UE discovery message, which is applied to a first UE and may include:
  • the first sending module is configured to send an LTK request carrying the identity of the first UE to the RKMF when within the coverage of the network;
  • the first receiving module 51 is configured to receive the LTK and LTK ID returned by the RKMF based on the LTK request when within the network coverage.
  • the discovery message includes at least one of the following:
  • the ranging layer ID is used to indicate the target UE that needs ranging
  • the ranging requirement information is used to indicate the ranging requirement of the ranging.
  • the discovery key includes at least one of the following:
  • RIK used to protect the integrity of the first announcement message.
  • An embodiment of the present disclosure provides an apparatus for protecting a UE discovery message, which is applied to a first UE and may include: a first processing module 52 configured to determine that the first announcement message is complete based on the RIK, and decrypt the discovery message based on the REK.
  • An embodiment of the present disclosure provides a device for protecting a UE discovery message, which is applied to a first UE, and may include: a first processing module 52 configured to determine the first announcement based on the timestamp and/or random number obtained from the first announcement message Whether the message is attacked by replay;
  • the first processing module 52 is configured to determine to send a second announcement message based on that the first announcement message is not subject to a replay attack; wherein the second announcement message includes a ranging response code corresponding to a ranging query code.
  • An embodiment of the present disclosure provides a device for protecting a UE discovery message, which is applied to a first UE, and may include: a first processing module 52 configured to determine the first announcement based on the timestamp and/or random number obtained from the first announcement message Whether the message is attacked by replay;
  • the first processing module 52 is configured to determine not to send the second announcement message based on the first announcement message being attacked by replay.
  • the first announcement message includes: a ranging query code, used to identify the first announcement message.
  • An embodiment of the present disclosure provides a UE discovery message protection device, which is applied to a first UE, and may include: a first sending module configured to send a second announcement based on a ranging query code matching a pre-configured ranging query filter message; wherein, the second announcement message includes a ranging response code corresponding to the ranging query code.
  • An embodiment of the present disclosure provides an apparatus for protecting a UE discovery message, which is applied to a first UE and may include: a first sending module configured to send a second announcement message protected by using REK and/or RIK.
  • An embodiment of the present disclosure provides a UE discovery message protection device, which is applied to a first UE, and may include: a first sending module configured to send a second announcement message; wherein, the second announcement message includes an The ranging response code.
  • the second announcement message is: a second announcement message protected using REK and/or RIK.
  • an embodiment of the present disclosure provides a device for protecting a UE discovery message, which is applied to a second UE, including:
  • the second sending module 61 is configured to send a first announcement message when the second UE is within the coverage of the network, where the first announcement message includes: a discovery message encrypted based on the discovery key, and an LTK ID indicating the LTK;
  • the LTK ID is used to determine the LTK corresponding to the LTK ID for the first UE located outside the network coverage; the LTK is used for the first UE to determine the discovery key.
  • An embodiment of the present disclosure provides an apparatus for protecting a UE discovery message, which is applied to a second UE, and may include: a second sending module 61 configured to send a first announcement message through a PC5 interface.
  • An embodiment of the present disclosure provides a UE discovery message protection device, which is applied to a second UE, and may include: a second sending module 61 configured to send a first announcement message based on receiving a discovery response sent by RKMF; wherein, the discovery response It is used to indicate that the second UE has the right to announce.
  • An embodiment of the present disclosure provides a device for protecting a UE discovery message, which is applied to a second UE, and may include: a second sending module 61 configured to send a discovery request carrying the identity of the second UE to the RKMF, where the discovery request is used to Request whether the second UE has the right to announce.
  • the discovery response includes one of the following:
  • An embodiment of the present disclosure provides an apparatus for protecting a UE discovery message, which is applied to a second UE and may include: a second processing module configured to determine a KD-SESS based on KD; and determine a discovery key based on KD-SESS.
  • An embodiment of the present disclosure provides a UE discovery message protection device, which is applied to a second UE, and may include: a second processing module configured to determine KD-SESS based on KD and a random number; determine KD-SESS based on KD-SESS and a random number Discover the key.
  • the discovery key includes: REK and/or RIK;
  • An embodiment of the present disclosure provides an apparatus for protecting a UE discovery message, which is applied to a second UE and may include: a second processing module configured to encrypt a discovery message based on REK; and perform integrity protection on a first announcement message based on RIK.
  • the discovery response includes at least one of the following:
  • a ranging query code used to identify the first announcement message
  • Ranging response filter used to match ranging response codes
  • Nonce used with LTK to determine the discovery key.
  • An embodiment of the present disclosure provides an apparatus for protecting a UE discovery message, which is applied to a second UE, and may include: a second receiving module configured to monitor a second announcement message based on a ranging response filter, wherein the second announcement message includes The ranging response code corresponding to the ranging query code.
  • the discovery message further includes at least one of the following:
  • the ranging layer ID is used to indicate the target UE that needs ranging
  • the ranging requirement information is used to indicate the ranging requirement of the ranging.
  • An embodiment of the present disclosure provides an apparatus for protecting a UE discovery message, which is applied to a second UE and may include: receiving a second announcement message; wherein the second announcement message includes a ranging response code corresponding to a ranging query code.
  • the second announcement message is: a second announcement message protected using REK and/or RIK.
  • the ranging query code may be obtained through the first announcement message.
  • an embodiment of the present disclosure provides a UE discovery message protection device applied to RKMF, including:
  • the third receiving module 71 is configured to receive the LTK request carrying the identity of the first UE;
  • the third sending module 72 is configured to send the LTK and LTK ID determined based on the LTK request to the first UE; wherein, the LTK and LTK ID are used for the first UE located outside the network coverage to monitor the first UE sent by the second UE After an announcement message, determine the discovery key for encrypting the discovery message in the first announcement message based on the LTK ID in the first announcement message.
  • An embodiment of the present disclosure provides a UE discovery message protection device, which is applied to RKMF, and may include:
  • the third receiving module 71 is configured to receive a discovery request sent by the second UE; wherein the discovery request includes the identity of the second UE, and is used to request whether the second UE has the right to declare;
  • the third processing module is configured to determine, based on the identity of the second UE, that the second UE has the right to announce, and send a discovery response to the second UE, where the discovery response is used to indicate that the second UE has the right to announce.
  • An embodiment of the present disclosure provides a device for protecting a UE discovery message, which is applied to RKMF, and may include: a third processing module configured to determine a discovery key or generate a KD of the discovery key based on the LTK;
  • the discovery response includes one of the following: LTK ID, and the discovery key corresponding to the LTK ID; the LTK ID, and a random number; and the LTK ID, and the KD that generated the discovery key, and the random number corresponding to the KD.
  • the discovery response includes at least one of the following:
  • a ranging query code used to identify the first announcement message
  • Ranging response filter used to match ranging response codes
  • Nonce used with LTK to determine the discovery key.
  • the discovery request includes: a ranging layer ID, used to indicate a target UE that needs ranging.
  • An embodiment of the present disclosure provides a UE discovery message protection device, which is applied to RKMF, and may include:
  • the third sending module 72 is configured to send verification information to the unified data management network element UDM, where the verification information includes a ranging layer ID;
  • the third receiving module 71 is configured to receive the verification result returned by the UDM based on the verification information; wherein, the verification result includes: the target ranging layer ID; wherein, the target ranging layer ID is used to indicate the range indicated in the ranging layer ID The target UE is outside the coverage of the network.
  • An embodiment of the present disclosure provides a UE discovery message protection device, which is applied to RKMF, and may include: a third processing module configured to be included in the target ranging layer ID based on the identity of the first UE, and the first UE's available When the validity period of the key expires, the discovery key is determined based on the LTK or the KD of the discovery key is generated.
  • An embodiment of the present disclosure provides a UE discovery message protection device, which is applied to RKMF, and may include: a third processing module configured to be included in the target ranging layer ID based on the identity of the first UE, and the first UE's available When the validity period of the key expires, the discovery key is determined based on the LTK or the KD of the discovery key is generated.
  • An embodiment of the present disclosure provides a discovery message protection device, which is applied in UDM, and may include:
  • the fourth receiving module is configured to receive verification information sent by RKMF, wherein the verification information includes a ranging layer ID; the verification information is used to request verification whether the target UE indicated in the ranging layer ID is within the network coverage;
  • the fourth sending module is configured to send a verification result to RKMF, wherein the verification result includes: the target ranging layer ID; wherein the target ranging layer ID is used to indicate the network coverage indicated in the ranging layer ID outside the target UE.
  • An embodiment of the present disclosure provides a UE discovery message protection device, which is applied in UDM, and may include:
  • the fourth processing module is configured to determine whether the target UE corresponding to the ranging layer ID is within the network coverage based on the ranging layer ID; and determine the target ranging layer ID based on the identity of the target UE outside the network coverage.
  • An embodiment of the present disclosure provides a communication device, including:
  • memory for storing processor-executable instructions
  • the processor is configured to implement the positioning method in any embodiment of the present disclosure when running the executable instruction.
  • the communication device may include but not limited to at least one of: a core network device, an access network device, and a UE.
  • the UE may be the first UE or the second UE in the above embodiment;
  • the core network device may be the RKMF in the above embodiment.
  • the processor may include various types of storage media, which are non-transitory computer storage media, and can continue to memorize and store information thereon after the user equipment is powered off.
  • the processor may be connected to the memory through a bus or the like, for reading the executable program stored on the memory, for example, at least one of the methods shown in FIG. 6 to FIG. 10 .
  • An embodiment of the present disclosure also provides a computer storage medium, the computer storage medium stores a computer executable program, and when the executable program is executed by a processor, the positioning method of any embodiment of the present disclosure is implemented. For example, at least one of the methods shown in FIG. 6 to FIG. 10 .
  • Fig. 14 is a block diagram showing a user equipment 800 according to an exemplary embodiment.
  • user equipment 800 may be a mobile phone, computer, digital broadcast user equipment, messaging device, game console, tablet device, medical device, fitness device, personal digital assistant, and the like.
  • user equipment 800 may include one or more of the following components: processing component 802, memory 804, power supply component 806, multimedia component 808, audio component 810, input/output (I/O) interface 812, sensor component 814 , and the communication component 816.
  • the processing component 802 generally controls the overall operations of the user device 800, such as those associated with display, telephone calls, data communications, camera operations, and recording operations.
  • the processing component 802 may include one or more processors 820 to execute instructions to complete all or part of the steps of the above method. Additionally, processing component 802 may include one or more modules that facilitate interaction between processing component 802 and other components. For example, processing component 802 may include a multimedia module to facilitate interaction between multimedia component 808 and processing component 802 .
  • the memory 804 is configured to store various types of data to support operations at the user equipment 800 . Examples of such data include instructions for any application or method operating on user device 800, contact data, phonebook data, messages, pictures, videos, and the like.
  • the memory 804 can be implemented by any type of volatile or non-volatile storage device or their combination, such as static random access memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable Programmable Read Only Memory (EPROM), Programmable Read Only Memory (PROM), Read Only Memory (ROM), Magnetic Memory, Flash Memory, Magnetic or Optical Disk.
  • SRAM static random access memory
  • EEPROM electrically erasable programmable read-only memory
  • EPROM erasable Programmable Read Only Memory
  • PROM Programmable Read Only Memory
  • ROM Read Only Memory
  • Magnetic Memory Flash Memory
  • Magnetic or Optical Disk Magnetic Disk
  • the power supply component 806 provides power to various components of the user equipment 800 .
  • Power components 806 may include a power management system, one or more power supplies, and other components associated with generating, managing, and distributing power for user device 800 .
  • the multimedia component 808 includes a screen providing an output interface between the user device 800 and the user.
  • the screen may include a liquid crystal display (LCD) and a touch panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive input signals from a user.
  • the touch panel includes one or more touch sensors to sense touches, swipes, and gestures on the touch panel. The touch sensor may not only sense a boundary of a touch or swipe action, but also detect duration and pressure associated with the touch or swipe action.
  • the multimedia component 808 includes a front camera and/or a rear camera. When the user equipment 800 is in an operation mode, such as a shooting mode or a video mode, the front camera and/or the rear camera can receive external multimedia data. Each front camera and rear camera can be a fixed optical lens system or have focal length and optical zoom capability.
  • the audio component 810 is configured to output and/or input audio signals.
  • the audio component 810 includes a microphone (MIC), which is configured to receive an external audio signal when the user equipment 800 is in an operation mode, such as a call mode, a recording mode, and a voice recognition mode. Received audio signals may be further stored in memory 804 or sent via communication component 816 .
  • the audio component 810 also includes a speaker for outputting audio signals.
  • the I/O interface 812 provides an interface between the processing component 802 and a peripheral interface module, which may be a keyboard, a click wheel, a button, and the like. These buttons may include, but are not limited to: a home button, volume buttons, start button, and lock button.
  • Sensor component 814 includes one or more sensors for providing user equipment 800 with status assessments of various aspects.
  • the sensor component 814 can detect the open/closed state of the device 800, the relative positioning of components, such as the display and keypad of the user device 800, the sensor component 814 can also detect the user device 800 or a component of the user device 800 The position change of the user device 800, the presence or absence of contact of the user with the user device 800, the orientation or acceleration/deceleration of the user device 800 and the temperature change of the user device 800.
  • Sensor assembly 814 may include a proximity sensor configured to detect the presence of nearby objects in the absence of any physical contact.
  • Sensor assembly 814 may also include an optical sensor, such as a CMOS or CCD image sensor, for use in imaging applications.
  • the sensor component 814 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor or a temperature sensor.
  • the communication component 816 is configured to facilitate wired or wireless communication between the user equipment 800 and other devices.
  • the user equipment 800 can access a wireless network based on a communication standard, such as WiFi, 4G or 5G, or a combination thereof.
  • the communication component 816 receives broadcast signals or broadcast related information from an external broadcast management system via a broadcast channel.
  • the communication component 816 also includes a near field communication (NFC) module to facilitate short-range communication.
  • the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, Infrared Data Association (IrDA) technology, Ultra Wideband (UWB) technology, Bluetooth (BT) technology and other technologies.
  • RFID Radio Frequency Identification
  • IrDA Infrared Data Association
  • UWB Ultra Wideband
  • Bluetooth Bluetooth
  • user equipment 800 may be powered by one or more application specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing devices (DSPDs), programmable logic devices (PLDs), field programmable A programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic component implementation for performing the methods described above.
  • ASICs application specific integrated circuits
  • DSPs digital signal processors
  • DSPDs digital signal processing devices
  • PLDs programmable logic devices
  • FPGA field programmable A programmable gate array
  • controller microcontroller, microprocessor or other electronic component implementation for performing the methods described above.
  • non-transitory computer-readable storage medium including instructions, such as the memory 804 including instructions, which can be executed by the processor 820 of the user equipment 800 to complete the above method.
  • the non-transitory computer readable storage medium may be ROM, random access memory (RAM), CD-ROM, magnetic tape, floppy disk, optical data storage device, and the like.
  • an embodiment of the present disclosure shows a structure of a base station.
  • the base station 900 may be provided as a network side device.
  • base station 900 includes processing component 922 , which further includes one or more processors, and a memory resource represented by memory 932 for storing instructions executable by processing component 922 , such as application programs.
  • the application program stored in memory 932 may include one or more modules each corresponding to a set of instructions.
  • the processing component 922 is configured to execute instructions, so as to execute any of the aforementioned methods applied to the base station, for example, the methods shown in FIG. 4 to FIG. 10 .
  • Base station 900 may also include a power component 926 configured to perform power management of base station 900, a wired or wireless network interface 950 configured to connect base station 900 to a network, and an input-output (I/O) interface 958.
  • the base station 900 can operate based on an operating system stored in the memory 932, such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM or the like.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本公开实施例提供了一种UE发现消息保护方法、装置、通信设备及存储介质;UE发现消息保护方法,包括:在第一UE位于网络覆盖范围外时监听第一公告消息;其中,第一公告消息包括:基于发现密钥加密的发现消息、及指示LTK的LTK ID;基于与LTK ID对应的LTK,确定发现密钥;其中,LTK为第一UE在网络覆盖范围内时接收的。

Description

UE发现消息保护方法、装置、通信设备及存储介质 技术领域
本公开涉及但不限于通信技术领域,尤其涉及一种UE发现消息保护方法、装置、通信设备及存储介质。
背景技术
在无线通信系统中,例如在第5代移动通信技术(5G)系统中,有些用户设备(User Equipment,UE)在5G网络覆盖范围内,有些UE在5G网络覆盖范围外。而无论UE是否在5G网络覆盖范围内,均可支持测距业务。
在测距目标UE之前,观察者UE(observer UE)需要利用测距的发现消息来检测和识别附近的目标UE。对于B类受限测距发现过程,发现者UE(discoverer UE)在直连通信(PC5)接口上宣告一条发现消息,该发现消息可包含关于感兴趣发现的内容。接收消息的发现者UE可以使用与发现者UE的发送的发现消息相关的一些信息进行响应。在没有隐私保护机制的B类受限测距发现过程中,发现消息包含参与测距过程的UE的隐私。在5G网络通信中,可通过向启用测距的UE提供具有有效期的发现密钥,从而在所有启用测距的UE被5G网络覆盖时帮助保护发现消息。
然而,在部分5G网络覆盖场景中,当启用测距的UE具有过期的发现密钥而其未被5G网络覆盖时,发现消息无法得到保护;如此会使得该发现密钥存在被泄露的风险以及降低用户的体验。
发明内容
本公开实施例公开提供一种发现消息保护方法、装置、通信设备及存储介质。
根据本公开的第一方面,提供一种UE发现消息保护方法,由第一UE执行,包括:
在第一UE位于网络覆盖范围外时监听第一公告消息;其中,第一公告消息包括:基于发现密钥加密的发现消息、及指示长期密钥(Long-Term Key,LTK)的LTK标识信息(ID);
基于与LTK ID对应的LTK,确定发现密钥;其中,LTK为第一UE在网络覆盖范围内时接收的。
根据本公开的第二方面,提供一种UE发现消息保护方法,由第二UE执行,包括:
在第二UE位于网络覆盖范围内时发送第一公告消息,其中,第一公告消息包括:基于发现密钥加密的发现消息,及指示LTK的LTK ID;
其中,LTK ID,用于位于网络覆盖范围外的第一UE确定与LTK ID对应的LTK;LTK用于第一UE确定发现密钥。
根据本公开的第三方面,提供一种UE发现消息保护方法,由测距密钥管理功能网元(Ranging  Key Management Function,RKMF)执行,包括:
接收携带第一UE的标识的LTK请求;
向第一UE发送基于LTK请求确定的LTK及LTK ID;其中,LTK及LTK ID,用于位于网络覆盖范围外的第一UE监听到第二UE发送的第一公告消息后,基于第一公告消息中的LTK ID确定加密第一公告消息中发现消息的发现密钥。
根据本公开的第四方面,提供一种UE发现消息保护装置,应用于第一UE,包括:
第一接收模块,被配置为在第一UE位于网络覆盖范围外时监听第一公告消息;其中,第一公告消息包括:基于发现密钥加密的发现消息、及指示LTK的LTK ID;
第一处理模块,被配置为基于与LTK ID对应的LTK,确定发现密钥;其中,LTK为第一UE在网络覆盖范围内时接收的。
根据本公开的第五方面,提供一种UE发现消息保护装置,应用于第二UE,包括:
第二发送模块,被配置为在第二UE位于网络覆盖范围内时发送第一公告消息,其中,第一公告消息包括:基于发现密钥加密的发现消息,及指示LTK的LTK ID;
其中,LTK ID,用于位于网络覆盖范围外的第一UE确定与LTK ID对应的LTK;LTK用于第一UE确定发现密钥。
根据本公开的第六方面,提供一种UE发现消息保护装置,应用于RKMF,包括:
第三接收模块,被配置为接收携带第一UE的标识的LTK请求;
第三发送模块,被配置为向第一UE发送基于LTK请求确定的LTK及LTK ID;其中,LTK及LTK ID,用于位于网络覆盖范围外的第一UE监听到第二UE发送的第一公告消息后,基于第一公告消息中的LTK ID确定加密第一公告消息中发现消息的发现密钥。
根据本公开的第七方面,提供一种通信设备,通信设备,包括:
处理器;
用于存储处理器可执行指令的存储器;
其中,处理器被配置为:用于运行可执行指令时,实现本公开任意实施例的UE发现消息保护方法。
根据本公开的第八方面,提供一种计算机存储介质,计算机存储介质存储有计算机可执行程序,可执行程序被处理器执行时实现本公开任意实施例的UE发现消息保护方法。
本公开实施例提供的技术方案可以包括以下有益效果:
在本公开实施例中,可以通过第一UE在位于网络覆盖范围外时监听第一公告消息;其中,第一公告消息包括:基于发现密钥加密的发现消息、及指示LTK的LTK ID;基于与LTK ID对应的LTK,确定发现密钥;其中,LTK为第一UE在网络覆盖范围内时接收的。如此可以使得第一UE位于网络覆盖范围外时,仍然能够监听到第一公告消息,并基于在网络覆盖范围内时接收的LTK解密确定发现密钥;从而可以实现对发现消息等的解密。如此本公开实施例可以使得在网络覆盖范围外的第一UE获取到网络覆盖范围内的UE发送加密的发现消息,能够实现对发现消息的保护,即能够提供 一种部分网络覆盖场景下(例如部分5G网络覆盖场景下)发现消息的保护;从而也可以提升用户体验。
应当理解的是,以上的一般描述和后文的细节描述仅是示例性和解释性的,并不能限制本公开实施例。
附图说明
图1是一种无线通信系统的结构示意图。
图2是根据一示例性实施例示出的一种位置确定的示意图。
图3是根据一示例性实施例示出的一种网络覆盖的示意图。
图4是根据一示例性实施例示出的一种网络覆盖的示意图。
图5是根据一示例性实施例示出的一种网络覆盖的示意图。
图6是根据一示例性实施例示出的一种UE发现消息保护方法的流程图。
图7是根据一示例性实施例示出的一种UE发现消息保护方法的流程图。
图8是根据一示例性实施例示出的一种UE发现消息保护方法的流程图。
图9是根据一示例性实施例示出的一种UE发现消息保护方法的流程图。
图10是根据一示例性实施例示出的一种UE发现消息保护方法的流程图。
图11是根据一示例性实施例示出的一种UE发现消息保护装置的框图。
图12是根据一示例性实施例示出的一种UE发现消息保护装置的框图。
图13是根据一示例性实施例示出的一种UE发现消息保护装置的框图。
图14是根据一示例性实施例示出的一种UE的框图。
图15是根据一示例性实施例示出的一种基站的框图。
具体实施方式
这里将详细地对示例性实施例进行说明,其示例表示在附图中。下面的描述涉及附图时,除非另有表示,不同附图中的相同数字表示相同或相似的要素。以下示例性实施例中所描述的实施方式并不代表与本公开实施例相一致的所有实施方式。相反,它们仅是与如所附权利要求书中所详述的、本公开实施例的一些方面相一致的装置和方法的例子。
在本公开实施例使用的术语是仅仅出于描述特定实施例的目的,而非旨在限制本公开实施例。在本公开实施例和所附权利要求书中所使用的单数形式的“一种”和“该”也旨在包括多数形式,除非上下文清楚地表示其他含义。还应当理解,本文中使用的术语“和/或”是指并包含一个或多个相关联的列出项目的任何或所有可能组合。
应当理解,尽管在本公开实施例可能采用术语第一、第二、第三等来描述各种信息,但这些信息不应限于这些术语。这些术语仅用来将同一类型的信息彼此区分开。例如,在不脱离本公开实施 例范围的情况下,第一信息也可以被称为第二信息,类似地,第二信息也可以被称为第一信息。取决于语境,如在此所使用的词语“如果”可以被解释成为“在……时”或“当……时”或“响应于确定”。
请参考图1,其示出了本公开实施例提供的一种无线通信系统的结构示意图。如图1所示,无线通信系统是基于蜂窝移动通信技术的通信系统,该无线通信系统可以包括:若干个用户设备110以及若干个基站120。
其中,用户设备110可以是指向用户提供语音和/或数据连通性的设备。用户设备110可以经无线接入网(Radio Access Network,RAN)与一个或多个核心网进行通信,用户设备110可以是物联网用户设备,如传感器设备、移动电话(或称为“蜂窝”电话)和具有物联网用户设备的计算机,例如,可以是固定式、便携式、袖珍式、手持式、计算机内置的或者车载的装置。例如,站(Station,STA)、订户单元(subscriber unit)、订户站(subscriber station),移动站(mobile station)、移动台(mobile)、远程站(remote station)、接入点、远程用户设备(remote terminal)、接入用户设备(access terminal)、用户装置(user terminal)、用户代理(user agent)、用户设备(user device)、或用户设备(user equipment)。或者,用户设备110也可以是无人飞行器的设备。或者,用户设备110也可以是车载设备,比如,可以是具有无线通信功能的行车电脑,或者是外接行车电脑的无线用户设备。或者,用户设备110也可以是路边设备,比如,可以是具有无线通信功能的路灯、信号灯或者其它路边设备等。
基站120可以是无线通信系统中的网络侧设备。其中,该无线通信系统可以是第四代移动通信技术(the 4th generation mobile communication,4G)系统,又称长期演进(Long Term Evolution,LTE)系统;或者,该无线通信系统也可以是5G系统,又称新空口系统或5G NR系统。或者,该无线通信系统也可以是5G系统的再下一代系统。其中,5G系统中的接入网可以称为新一代无线接入网(New Generation-Radio Access Network,NG-RAN)。
其中,基站120可以是4G系统中采用的演进型基站(eNB)。或者,基站120也可以是5G系统中采用集中分布式架构的基站(gNB)。当基站120采用集中分布式架构时,通常包括集中单元(central unit,CU)和至少两个分布单元(distributed unit,DU)。集中单元中设置有分组数据汇聚协议(Packet Data Convergence Protocol,PDCP)层、无线链路层控制协议(Radio Link Control,RLC)层、媒体接入控制(Medium Access Control,MAC)层的协议栈;分布单元中设置有物理(Physical,PHY)层协议栈,本公开实施例对基站120的具体实现方式不加以限定。
基站120和用户设备110之间可以通过无线空口建立无线连接。在不同的实施方式中,该无线空口是基于第四代移动通信网络技术(4G)标准的无线空口;或者,该无线空口是基于第五代移动通信网络技术(5G)标准的无线空口,比如该无线空口是新空口;或者,该无线空口也可以是基于5G的更下一代移动通信网络技术标准的无线空口。
在一些实施例中,用户设备110之间还可以建立E2E(End to End,端到端)连接。比如车联网通信(vehicle to everything,V2X)中的车对车(vehicle to vehicle,V2V)通信、车对路边设备(vehicle  to Infrastructure,V2I)通信和车对人(vehicle to pedestrian,V2P)通信等场景。
这里,上述用户设备可认为是下面实施例的终端设备。
在一些实施例中,上述无线通信系统还可以包含网络管理设备130。
若干个基站120分别与网络管理设备130相连。其中,网络管理设备130可以是无线通信系统中的核心网设备,比如,该网络管理设备130可以是演进的数据分组核心网(Evolved Packet Core,EPC)中的移动性管理实体(Mobility Management Entity,MME)。或者,该网络管理设备也可以是其它的核心网设备,比如服务网关(Serving GateWay,SGW)、公用数据网网关(Public Data Network GateWay,PGW)、策略与计费规则功能单元(Policy and Charging Rules Function,PCRF)或者归属签约用户服务器(Home Subscriber Server,HSS)等。对于网络管理设备130的实现形态,本公开实施例不做限定。
为了便于本领域内技术人员理解,本公开实施例列举了多个实施方式以对本公开实施例的技术方案进行清晰地说明。当然,本领域内技术人员可以理解,本公开实施例提供的多个实施例,可以被单独执行,也可以与本公开实施例中其他实施例的方法结合后一起被执行,还可以单独或结合后与其他相关技术中的一些方法一起被执行;本公开实施例并不对此作出限定。
为了更好地理解本公开任一个实施例所描述的技术方案,首先,对相关技术中定位进行说明:
在一个实施例中,测距业务是指通过直接通信连接确定以下的至少一种信息:两个UE之间的距离;和/或确定一个UE到另一个UE的方向。
在一个实施例中,如图2所示,观察者UE有一个参考平面和参考方向。目标UE到观察者UE的方向是:观察者UE和目标UE的连线与参考方向的夹角。该夹角由方位角方向和/或仰角方向表示。目标UE的方位角方向是:参考方向与从观察者UE到目标UE的直线投影在与垂直于天顶的参考方向相同的平面上形成的角度方向。目标UE的仰角方向为两者在竖直方向上(水平面上方)的角度方向。
在一个实施例中,无论是否在5G网络覆盖范围内,均可支持测距业务。如图3所示,提供了5G网络覆盖的图示;UE1和UE2均在5G网络覆盖范围内。图4提供了部分5G网络覆盖的图示;UE1在5G网络覆盖范围内及UE2在5G网络覆盖范围外。图5提供了不具有5G网络覆盖的图示;UE1和UE2均不在5G网络覆盖范围内。在一个实施例中,若使用许可波段进行测距,则可以完全由操作员控制。
在本公开的所有实施例中,第一UE可以为宣告UE,其可以为观察者UE或发现者UE;第二UE可以为监听UE,其可以为观察者UE或发现者UE。或,第一UE可以为监听UE,其可以为观察者UE或发现者UE;第二UE可以为宣告UE,其可以为观察者UE或发现者UE。在本公开的所有实施例中,第一UE发送第一宣告消息时,第二UE监听第一宣告消息;第二UE发送第二宣告消息时,第一UE监听第二宣告消息。第一UE、第二UE可以互为监听UE或发送UE,第一UE、第 二UE也可以均是发现者UE或观察者UE。
如图6所示,本公开实施例公开提供一种UE发现消息保护方法,由第一UE执行,包括:
步骤S61:在第一UE位于网络覆盖范围外时监听第一公告消息;其中,第一公告消息包括:基于发现密钥加密的发现消息、及指示LTK的LTK ID;
步骤S62:基于与LTK ID对应的LTK,确定发现密钥;其中,LTK为第一UE在网络覆盖范围内时接收的。
该步骤S61中监听第一公告消息,可包括:监听第二UE发送的第一公告消息。
在一个实施例中,第一UE、第二UE均可以是但不限于是各种移动终端或者固定终端;例如第一UE、第二UE均可以是但不限于是手机、计算机、服务器、可穿戴设备、游戏控制平台或多媒体设备等。
在一个实施例中,第一UE位于网络覆盖范围外,第二UE位于网络覆盖范围内。在另一个实施例中,第一UE位于网络覆盖范围外,第二UE位于网络覆盖范围内;且第二UE位于第一UE的附近的UE。
在一个实施例中,网络覆盖可以是指各种网络的覆盖;例如,网络覆盖可以是但不限于是4G网络覆盖、5G网络覆盖或者其它演进型网络覆盖等。示例性的,第一UE位于5G网络覆盖范围外时,发送第一公告消息。
该步骤S62中确定发现密钥,可以是确定解密发现消息的发现密钥。
该第一公告消息,包括但不限于以下至少之一:
基于发现密钥加密的发现消息;
指示LTK的LTK ID;
安全算法标识,用于标识第一公告消息所使用的安全算法;
用于标识第一公告消息的测距查询码;
随机数,用于与LTK一起,确定发现密钥;
时间戳,用于指示发现密钥的有效期。
这里,随机数,也可用于与发现密钥一起解密发现消息。
该发现消息,包括以下至少之一:
时间戳,用于指示发现密钥的有效期;
测距层ID,用于指示需要测距的目标UE;
测距要求信息,用于指示测距的测距要求。
该发现消息,也可包括:目标测距层ID,用于指示需要测距的在网络覆盖范围外的目标UE。
在一个实施例中,时间戳可以被包括在第一公告消息的发现消息中。如此,需要解密发现消息才能获取到时间戳。
在另一个实施例中,时间戳被包括在第一公告消息但不被包括在发现消息中。如此,可以仅需 要完整性验证第一公告消息后便可获取到时间戳,有利于在不解密发现消息的条件下对该第一公告消息进行重发攻击的判定。
在一个实施例中,安全算法可以是任意一种加密算法,在此不作限制。
在一个实施例中,该测距查询码可用于标识第一公告消息中指示的目标UE。例如,不同的第一公告消息对应的测距查询码不同;该不同的第一公告消息中测距层ID可以相同或者不同。
在一个实施例中,若测距查询码被包括在加密的发现消息中,则该测距查询码可用于指示需要测距的目标UE;若测距查询码被包括在第一公告消息中但不包括在加密的发现消息中,则该测距查询码可用于指示第一公告消息。
该发现密钥,包括以下至少之一:
测距机密性保护密钥(Ranging Encryption Key,REK),用于加密发现消息;
测距完整性保护密钥(Ranging Integrity Key,RIK),用于保护第一公告消息的完整性。
这里,该发现消息包括敏感信息。该敏感信息为发现消息中至少部分消息。例如该发现消息包括测距层ID及测距要求信息;该敏感信息可以是测距要求信息中测距时间。
在一个实施例中,REK,可用于加密发现消息中敏感信息。
例如,若敏感信息为发现消息中部分消息,如该发现消息包括测距层ID及测距要求信息,该敏感信息可以是测距要求信息中测距时间;则REK可用于对该测距时间加密,以及不对测距要求信息中测距时间以外的其它信息以及测距层ID加密。
又如,若敏感信息为发现消息中全部消息,该REK可用于加密整个发现消息。
该步骤S61中基于发现密钥加密的发现消息,可以是:基于发现密钥中REK加密的发现消息。
该步骤S61中监听第一公告消息,包括:在直接通信(PC5)接口监听第一公告消息。
本公开实施例提供一种UE发现消息保护方法,由第一UE执行,包括:在第一UE位于网络覆盖范围外时,在PC5接口监听第一公告消息。
该步骤S62,可以是:基于LTK ID,确定关于LTK ID对应的LTK;基于LTK,确定发现密钥。这里,该第一UE中可以保存LTK ID与LTK的对应关系。示例性的,第一UE可以预先获取到LTK ID与LTK的对应关系;若第一UE从第一公告消息中获取到LTK ID,则可以基于该LTK ID与该对应关系,确定与该LTK ID对应的LTK。
在本公开实施例中,可以通过第一UE在第一UE位于网络覆盖范围外时监听第一公告消息,其中,第一公告消息包括:基于发现密钥加密的发现消息、及指示LTK的LTK ID;并基于与LTK ID对应的LTK,确定发现密钥。如此可以使得第一UE位于网络覆盖范围外时,仍然能够监听到第一公告消息,并基于在网络覆盖范围内时接收的LTK解密确定发现密钥;从而可以实现对发现消息等的解密。如此本公开实施例可以使得在网络覆盖范围外的第一UE获取到网络覆盖范围内的UE发送加密的发现消息,能够实现对发现消息的保护,即能够提供一种部分网络覆盖场景下(例如部分5G网络覆盖场景下)发现消息的保护;从而也可以提升用户体验。
本公开实施例提供一种UE发现消息保护方法,由第一UE执行,可包括:
在网络覆盖范围内时,向测距密钥管理功能网元(Ranging Key Management Function,RKMF)发送携带第一UE的标识的LTK请求;
在网络覆盖范围内时,接收RKMF基于LTK请求返回的LTK及LTK ID。
该LTK请求携带第一UE的标识;该第LTK请求用于请求第一UE的LTK和/或与LTK对应的LTK ID。
如此,在本公开实施例中,第一UE在位于网络覆盖范围内时,可以从网络覆盖范围内的RKMF获取到LTK;如此便于后续基于LTK生成的发现密钥给发现消息解密。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
在一些实施例中,该方法包括:基于在网络覆盖范围内时接收的配置信息,确定第一UE是否有权监听;其中,配置信息,包括:各UE的监听权限;
该步骤S61中监听第一公告消息,包括:基于第一UE有权监听,监听第一公告消息。
本公开实施例提供一种UE发现消息保护方法,由第一UE执行,包括:
基于在网络覆盖范围内时接收的配置信息,确定第一UE是否有权监听;其中,配置信息,包括:各UE的监听权限;
基于第一UE有权监听,在第一UE位于网络覆盖范围外时监听第一公告消息。
该配置信息可以为:服务配置文件。该配置信息可由应用层定义。
在一个实施例中,第一UE有权监听可以是:有权监听任意UE的公告消息;或者有权预定UE的公告消息;或者,有权监听第二UE的公告消息。这里,第二UE位于网络覆盖范围内。
在一个实施例中,配置信息,包括:各UE的监听权限。例如,配置信息包括:至少一个第一UE及对应的第一UE的监听权限。该监听权限,包括但不限于以下至少之一:第一UE有权监听;第一UE无权监听;第一UE有权监听第一UE;及第一UE无权监听第一UE。这里,该第一UE有权监听,可以是:第一UE有权监听网络覆盖范围内的所有UE或者任意UE等。
示例性的,若配置信息包括:至少一个第一UE的标识及对应的第一UE的监听权限。第一UE在超出网络覆盖范围内时,基于第一UE的标识及配置信息,确定第一UE是否有监听权限;若第一UE确定出第一UE有监听第二UE的权限,则可以在PC5接口监听第二UE发送的第一公告消息。
如此,第一UE可以在确定出第一UE有监听权限时,才监听第二UE发送的第一公告消息;如此,可以进一步针对部分网络覆盖场景下发现消息的保护。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
该步骤S62中,基于LTK ID对应的LTK,确定发现密钥,包括:
基于LTK ID对应的LTK,确定中间密钥(KD);基于KD确定的临时密钥(KD-SESS);基于 KD-SESS,确定发现密钥中的REK和/或RIK。
本公开实施例提供一种UE发现消息保护方法,由第一UE执行,包括:基于LTK ID对应的LTK,确定KD;基于KD确定的KD-SESS;基于KD-SESS,确定发现密钥中的REK和/或RIK。
本公开实施例提供一种UE发现消息保护方法,由第一UE执行,包括:基于LTK ID对应的LTK及随机数,确定KD;基于KD及随机数,确定KD-SESS;基于KD-SESS及随机数,确定发现密钥中REK和/或RIK。
如此,在本公开实施例中,第一UE可以通过在位于网络覆盖范围内接收的LTK,确定出用于解密发现消息的发现密钥,从而有利于完成对发现消息的解密。
本公开实施例提供一种UE发现消息保护方法,由第一UE执行,包括:基于发现密钥,解密第一公告消息。
该基于发现密钥,解密第一公告消息,包括:基于发现密钥中RIK,对第一公告消息进行完整性验证;和/或,基于发现密钥中REK,解密发现消息。
这里,解密发现消息,包括:解密发现消息中敏感信息。
本公开实施例提供一种UE发现消息保护方法,由第一UE执行,包括:基于发现密钥中REK,解密发现消息。
如图7所示,本公开实施例提供一种UE发现消息保护方法,由第一UE执行,包括:
步骤S71:基于RIK确定第一公告消息为完整的,基于REK,解密发现消息。
这里,第一UE确定出发现密钥中RIK及REK后,可以基于RIK对第一公告消息进行完整性验证;若完整性验证成功,确定第一公告消息为完整的,则第一UE基于REK解密发现消息。
本公开实施例提供一种UE发现消息保护方法,由第一UE执行,包括:
基于从第一公告消息获取的时间戳和/随机数,确定第一公告消息是否被重放攻击;
基于第一公告消息未被重放攻击,确定发送第二公告消息;或者,基于第一公告消息被重放攻击,确定不发送第二公告消息;其中,第二公告消息包括与测距查询码对应的测距响应码。
这里,解密第一公告消息,包括:对第一公告消息进行完整性验证和/或对发现消息进行解密。
若时间戳包括在第一公告消息但未包括在发现消息中,则可以直接从第一公告消息中获取到时间戳;若时间戳包括在第一公告消息的发现消息时,则需要解密发现消息以获取到时间戳。
示例性的,第一UE若确定当前时间不在时间戳指示的有效期内,和/或若之前接收到过与第一公告消息中的随机数相同的随机数,则确定第一公告消息被重放攻击。
示例性的,第一UE若确定当前时间在时间戳指示的有效期内,和/或若之前未接收到与第一公告消息中的数据数相同的随机数,则确定第一公告消息未被重放攻击。
该测距响应码,可用于指示第一UE接收到第一公告消息。
如此,在本公开实施例中,第一UE还可以从第一公告消息中获取到时间戳和/或随机数,确定第一公告消息是否被重放攻击;从而可以提升对发现消息的保护力度。且若第一公告消息未被重放攻击时,可以通过发送第二公告消息以通知第二UE:第一UE已接收到第一公告消息;或者,若第 一供公告消息已被重放攻击时,可以通过不发送第二公告消息以告知第二UE:第一UE未成功获取到第一公告消息。
在一些实施例中,方法还包括:在接收到第一公告消息后,发送第二公告消息。
本公开实施例提供一种UE发现消息保护方法,由第一UE执行,包括:发送第二公告消息,其中,第二公告消息中携带与测距查询码对应的测距响应码。
本公开实施例提供一种UE发现消息保护方法,由第一UE执行,包括:在PC5接口发送第一二公告消息。
在一些实施例中,第一公告消息包括:测距查询码,用于标识第一公告消息;
方法包括:基于测距查询码与预先配置的测距查询过滤器匹配,发送第二公告消息;其中,第二公告消息包括与测距查询码对应的测距响应码。
本公开实施例提供一种UE发现消息保护方法,由第一UE执行,可包括:基于测距查询码与预先配置的测距查询过滤器匹配,发送第二公告消息;其中,第二公告消息包括与测距查询码对应的测距响应码。
这里,测距查询过滤器,可用于过滤第一公告消息。若第一UE预先配置的测距查询过滤器与第一公告消息中测距查询码匹配,确定第一公告消息为需要监听的第一公告消息。
如此,在本公开实施例中,第一UE还可以通过测距查询过滤器过滤掉不匹配的测距查询码对应的第一公告消息,使得第一UE可以接收准确的第一公告消息。
该发送第二公告消息,包括:发送使用REK和/或RIK保护后的第二公告消息。
本公开实施例提供一种UE发现消息保护方法,由第一UE执行,可包括:在PC5接口发送使用REK和/或RIK保护后的第二公告消息。
这里,使用REK和/或RIK保护后的第二公告消息,包括:使用REK对第二公告消息中敏感信息加密,和/或,使用RIK对第二公告消息进行完整性保护。
这里,可以理解的是,保护包括完整性保护和/或机密性保护;该机密性保护是第一UE自定义的。
这里,给第二公开消息加密的发现密钥,与给第一公告消息解密的发现密钥是一致的。如此,当第二UE接收到第二公告消息后,也可以用加密第一公告消息的发现密钥给第二公告消息进行解密。
在本公开实施例中,第一UE也可以对第二公告消息进行加密后公告,如此也可以提升第二公告消息的保密性。
本公开实施例提供一种UE发现消息保护方法,由第一UE执行,可包括:发送第二公告消息;其中,第二公告消息包括与测距查询码对应的测距响应码。
在一些实现方式中,第二公告消息为:使用REK和/或RIK保护的第二公告消息。该第二公告消息可以参考本公开其他实施例的表述,在此不再赘述。
在一些实现方式中,该测距查询码可以为通过第一公告消息获得的。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
以下一种UE发现消息保护方法,是由第二UE执行,与上述由第一UE执行的UE发现消息保护方法的描述是类似的;且对于由第二UE执行的UE发现消息保护方法实施例中未披露的技术细节,请参照由第一UE执行的UE发现消息保护方法示例的描述,在此不做详细描述说明。
如图8所示,本公开实施例提供一种UE发现消息保护方法,由第二UE执行,包括:
步骤S81:在第二UE位于网络覆盖范围内时发送第一公告消息,其中,第一公告消息包括:基于发现密钥加密的发现消息,及指示LTK的LTK ID;
其中,LTK ID,用于位于网络覆盖范围外的第一UE确定与LTK ID对应的LTK;LTK用于第一UE确定发现密钥。
在本公开的一些实施例中,第一公告消息为步骤S61中第一公告消息;发现消息、发现密钥分别为步骤S61中发现消息、发现密钥;LTK ID为步骤S61中LTK ID。
例如,该第一公告消息,包括但不限于以下至少之一:
基于发现密钥加密的发现消息;
指示LTK的LTK ID;
安全算法标识,用于标识第一公告消息所使用的安全算法;
用于标识第一公告消息的测距查询码;
随机数,用于与LTK一起,确定发现密钥;
时间戳,用于指示发现密钥的有效期。
这里,随机数,也用于与发现密钥一起解密发现消息。
例如,该发现消息,包括但不限于以下至少之一:
时间戳,用于指示发现密钥的有效期;
测距层ID,用于指示需要测距的目标UE;
测距要求信息,用于指示测距的测距要求。
例如,该发现密钥,包括以下至少之一:
REK,用于加密发现消息;
RIK,用于保护第一公告消息的完整性。
这里,第二UE用于加密发现消息的发现密钥是从RKMF中获取的,或者是从RKMF中获取的KD生成的。
该步骤S81中发送第一公告消息,包括:在PC5接口发送第一公告消息。
本公开实施例提供一种UE发现消息保护方法,由第二UE执行,可包括:在PC5接口发送第一公告消息。
如此,在本公开实施例中,可以通过位于网路覆盖范围内的第二UE发送第一公告消息,以使 得位于网络覆盖范围外的第一UE能够监听到第一公告消息、并基于在网络覆盖范围内时接收的LTK解密确定发现密钥而实现对发现消息等的解密。如此本公开实施例可以使得在网络覆盖范围外的第一UE获取到网络覆盖范围内的UE发送加密的发现消息,能够实现对发现消息的保护,即能够提供一种部分网络覆盖场景下(例如部分5G网络覆盖场景下)发现消息的保护;从而也可以提升用户体验。
该步骤S81中发送第一公告消息,可包括:基于接收到RKMF发送的发现响应,发送第一公告消息;其中,发现响应用于指示第二UE有权宣告。
本公开实施例提供一种UE发现消保护方法,由第二UE执行,可包括;基于接收到RKMF发送的发现响应,发送第一公告消息;其中,发现响应用于指示第二UE有权宣告。
在一些实施例中,在接收发现响应之前,还包括:向RKMF发送携带第二UE的标识的发现请求,其中,发现请求用于请求第二UE是否有权宣告。
本公开实施例提供一种UE发现消息保护方法,由第一UE执行,可包括:向RKMF发送携带第二UE的标识的发现请求,其中,发现请求用于请求第二UE是否有权宣告。
该发现请求包括:测距层ID,用于指示需要测距的目标UE,或者用于发现的目标UE。
在一个实施例中,该目标UE,也即第二UE确定是否有权监听和/或有权宣告针对的UE。
该发现响应,包括以下至少之一:
测距查询码,用于标识第一公告消息;
测距响应过滤器,用于匹配测距响应码;
随机数,用于与LTK一起,确定发现密钥。
该发现响应,包括以下之一:
LTK ID、及与LTK ID对应的发现密钥;
LTK ID、及随机数;
LTK ID、和生成发现密钥的KD、及与KD对应的随机数。
示例性的,第二UE需要公告消息时,向RKMF发送携带第二标识的发现请求,以请求第二UE是否有权宣告;若RKMF确定出第二UE有权宣告时,向第二UE发送发现响应;则第二UE可基于发现响应,在PC5接口发送第一公告消息。
如此,在本公开实施例中,第二UE可以向RKMF请求宣告第一公告消息的权限,且当确定第二UE有公告权限时才进行第一公告消息的公告;如此,也可以提高第一公告消息保密性。
且,若指示第二UE有权宣告的发现响应可以携带发现密钥或者生成发现密钥的KD或者随机数等,则可以通过一个发现响应实现指示第二UE有权宣告及发送发现密钥等的两个功能;如此可以提高信令的利用率及降低通信设备的功耗等。
本公开实施例提供一种UE发现消息保护方法,由第二UE执行,可包括:基于KD,确定KD-SESS;基于KD-SESS,确定发现密钥。
本公开实施例提供一种UE发现消息保护方法,由第二UE执行,可包括:基于KD及随机数, 确定KD-SESS;基于KD-SESS及随机数,确定发现密钥。这里,确定发现密钥,可以是:确定发现密钥中REK和/或RIK。
如此,在本实施例中,若从RKMF获取的是KD,则可以基于KD生成发现密钥。如此也可以将由KD生成发现密钥的过程应用到第二UE中,从而可以减轻RKMF的工作负担。
本公开实施例提供一种UE发现消息保护方法,由第二UE执行,可包括:基于REK,加密发现消息;和/或,基于RIK,对第一公告消息进行完整性保护。
本公开实施例提供一种UE发现消息保护方法,由第二UE执行,可包括:基于测距响应过滤器监听第二公告消息,其中,第二公告消息中包括与测距查询码对应的测距响应码。
这里,该第二公告消息也可以为基于REK和/或RIK进行保护后的公告消息。例如,第二公告消息中敏感信息使用REK加密,第二公告消息使用RIK进行完整性保护。
以上实施方式,具体可以第一UE侧的表述,在此不再赘述。
本公开实施例提供一种UE发现消息保护方法,由第二UE执行,可包括:接收第二公告消息;其中,第二公告消息包括与测距查询码对应的测距响应码。
在一些实现方式中,第二公告消息为:使用REK和/或RIK保护的第二公告消息。
在一些实现方式中,该测距查询码可以为通过第一公告消息获得的。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
以下一种UE发现消息保护方法,是由RKMF执行,与上述由第一UE和/或第二UE执行的UE发现消息保护方法的描述是类似的;且对于由RKMF执行的UE发现消息保护方法实施例中未披露的技术细节,请参照由第一UE和/或第二UE执行的UE发现消息保护方法示例的描述,在此不做详细描述说明。
如图9所示,本公开实施例提供一种UE发现消息保护方法,由RKMF执行,包括:
步骤S91:接收携带第一UE的标识的LTK请求;
步骤S92:向第一UE发送基于LTK请求确定的LTK及LTK ID;其中,LTK及LTK ID,用于位于网络覆盖范围外的第一UE监听到第二UE发送的第一公告消息后,基于第一公告消息中的LTK ID确定加密第一公告消息中发现消息的发现密钥。
在本公开的一些实施例中,LTK请求为上述实施例中的LTK请求;第一公告消息为步骤S61中第一公告消息;发现消息、发现密钥分别为步骤S61中发现消息、发现密钥;LTK ID为步骤S61中LTK ID。例如,发现密钥,包括:REK和/或RIK。
本公开实施例提供一种UE发现消息保护方法,由RKMF执行,包括:
接收第二UE发送的发现请求;其中,发现请求包括第二UE的标识,用于请求第二UE是否有权宣告;
基于第二UE的标识确定出第二UE有权宣告,向第二UE发送发现响应,其中,发现响应用于 指示第二UE有权宣告。
这里,RKMF可以基于发现请求中第二UE的标识及配置信息,确定第二UE是否有权宣告。该配置信息包括:至少一个UE的标识及对应的公告权限。该配置信息包括:服务配置文件;该配置信息可由应用层定义。
本公开实施例提供一种UE发现消息保护方法,由RKMF执行,包括:基于LTK,确定发现密钥或者生成发现密钥的KD。
在本公开的一些实施例中,发现响应可为上述实施例中发现响应。
例如,该发现响应包括以下之一:
LTK ID、及与LTK ID对应的发现密钥;
LTK ID、及随机数;
LTK ID、和生成发现密钥的KD、及与KD对应的随机数。
又如,该发现响应包括以下至少之一:
测距查询码,用于标识第一公告消息;
测距响应过滤器,用于匹配测距响应码;
随机数,用于与LTK一起,确定发现密钥。
在一个实施例中,RKMF可基于发现请求及配置信息,确定第二UE有权宣告的目标UE。该目标UE可认为是需要测距的目标UE。
在一些实施例中,发现请求包括:测距层ID,用于指示需要测距的目标UE;
方法包括:
向统一数据管理网元(Unified Data Management,UDM)发送验证信息,其中,验证信息中包括测距层ID;
接收UDM基于验证信息返回的验证结果,其中,验证结果,包括:目标测距层ID;其中,目标测距层ID,用于指示测距层ID中指示的在网络覆盖范围外的目标UE。
本公开实施例提供一种UE发现消息保护方法,由RKMF执行,包括:
向UDM发送验证信息,其中,验证信息中包括测距层ID;
接收UDM基于验证信息返回的验证结果,其中,验证结果,包括:目标测距层ID;其中,目标测距层ID,用于指示测距层ID中指示的在网络覆盖范围外的目标UE。
这里,验证信息,用于请求验证测距层ID中指示的目标UE是否在网络覆盖范围内。这里,目标UE可包括第一UE;测距层ID可包括第一UE的标识。
这里,测距层ID中指示的目标UE,包括:位于网络覆盖范围内的目标ID和/或位于网络覆盖范围外的目标ID。目标测距层ID中指示的目标UE,包括:位于网络覆盖范围外的目标UE。
示例性的,RKMF接收到第二UE发送的发现请求,获取发现请求中的测距层ID;并将测距层ID携带在验证信息中发送给UDM;其中,测距层ID至少包括第一UE的标识。这里,UDM可基于检查目标UE的状态,确定目标UE是否在网络覆盖范围内;若确定至少部分目标UE在网络覆盖 范围外,则确定向RKMF发送验证结果;该验证结果包括目标测距层ID,该目标测距层ID,包括位于网络覆盖范围内的该至少部分目标UE。
在上述示例中,UDM也可以用于检测目标UE的状态,确定各目标UE是否在网络覆盖范围内;并将各目标UE是否在网络覆盖范围内的验证结果发送给RKMF。
如此,在本公开实施例中,RKMF可以基于第二UE的发现请求,通过向UDM发送验证信息以验证发现请求中指示的目标UE是否位于网络覆盖范围外;若是,则确定第二UE可以发送第一公告消息以使得有权监听的UE进行监听。如此,可以针对网络覆盖范围外的UE进行发现消息的发送。
该基于LTK,确定发现密钥或者生成发现密钥的KD,包括:
基于第一UE的标识被包括在目标测距层ID中,且第一UE的可用密钥失效,基于LTK确定发现密钥或者生成发现密钥的KD。
在本公开实施例中,任意一种导致可用密钥失效的方式均可;例如,该可用密钥失效可以是但不限于是:可用密钥的有效期到期。
本公开实施例提供一种UE发现消息保护方法,由RKMF执行,可包括:基于第一UE的标识被包括在目标测距层ID中,且第一UE的可用密钥失效,基于LTK确定发现密钥或者生成发现密钥的KD。
本公开实施例提供一种UE发现消息保护方法,由RKMF执行,可包括:基于第一UE的标识被包括在目标测距层ID中,且第一UE的可用密钥的有效期到期,基于LTK确定发现密钥或者生成发现密钥的KD。
这里,第一UE的标识被包括在目标测距层ID中,即,第一UE是目标UE中其中之一的UE。
这里,第一UE的可用密钥是:第一UE在网络覆盖范围内时接收到的发现密钥。例如,可以是第一UE在网络覆盖范围内接收到的RKMF发送的发现密钥。
如此,在本公开实施例中,RKMF可以在确定第一UE位于网络覆盖范围外且在网络覆盖范围时接收到的发现密钥到期时,才基于LTK确定发现密钥或者生成发现密钥的中间密钥。如此才使得第二UE发送给第一UE的加密的发现消息,基于新的发现密钥解密。如此,可以降低由于第一UE仍在网络覆盖范围内和/或第一UE的可用密钥还未失效时无需更新发现密钥时,而更新发现密钥所带来的资源的浪费;可以节省网络资源及通信设备的功耗等。
以上实施方式,具体可以第一UE侧的表述,在此不再赘述。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
以下一种UE发现消息保护方法,是由UDM执行,与上述由第一UE、第二UE和/或RKMF执行的UE发现消息保护方法的描述是类似的;且对于由UDM执行的UE发现消息保护方法实施例中未披露的技术细节,请参照由第一UE、第二UE、和/或RKMF执行的UE发现消息保护方法示例的描述,在此不做详细描述说明。
本公开实施例提供一种UE发现消息保护方法,由UDM执行,可包括:
接收RKMF发送的验证信息,其中,验证信息中包括测距层ID;验证信息用于请求验证测距层ID中指示的目标UE是否在网络覆盖范围内;
向RKMF发送验证结果,其中,验证结果,包括:目标测距层ID;其中,目标测距层ID,用于指示测距层ID中指示的在网路覆盖范围外的目标UE。
本公开实施例提供一种UE发现消息保护方法,由UDM执行,可包括:
基于测距层ID,确定测距层ID对应目标UE是否在网络覆盖范围内;
基于在网络覆盖范围外的目标UE的标识,确定目标测距层ID。
这里,UDM也可以基于第一UE的标识及目标测距层ID,确定第一UE是否为网络覆盖范围外。若第一UE的标识包括在目标测距层ID中,确定第一UE在网络覆盖范围外。
以上实施方式,具体可以第一UE侧的表述,在此不再赘述。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
为了进一步解释本公开任意实施例,以下提供几个具体实施例。
示例一:
首先对UE发现消息保护方法的应用场景做以下说明:在5G网络覆盖下的安全测距发现过程的场景,可引入UE发现消息保护方法;该UE发现消息保护方法中,可按照应按照3GPP TS 33.501中所述设置安全算法标识。这里,离开5G网络覆盖范围的第一UE已经由网络设备预先配置或提供可发现的目标UE的信息。这里,为了保护UE和RKMF之间的通信,UE和RKMF应支持3GPP TS 33.503第5.2.5条中的安全条件和步骤。这里,第二UE支持第一UE使用的安全算法。
如图10所示,本公开实施例提供一种UE发现消息保护方法,由通信设备执行,通信设备包括:第一UE、第二UE、RKMF及UDM;方法包括:
步骤S1001:第一UE在5G网络覆盖范围内时,发送LTK请求;
在一个可选实施例中,第一UE在5G网络覆盖范围内,发送携带第一UE的标识的LTK请求,以从RKMF获取LTK。
步骤S1002:第一UE在5G网络覆盖范围内时,接收LTK响应;
在一个可选实施例中,在步骤S132之前,RKMF接收到LTK请求后,生成并发送第一UE的LTK及LTK ID。
在一个可选实施例中,第一UE在5G网络覆盖范围内时,接收RKMF发送的LTK响应;其中,LTK响应包括:与第一UE的标识对应的LTK及LTK ID。
步骤S1003:确定有权在PC5接口监听;
在一个可选实施例中,第一UE在接收到LTK及LTK ID时,基于在5G网络覆盖范围内时获得的配置信息,确定在5G网络覆盖范围外时有权监听。
步骤S1004:发送发现请求;
在一个可选实施例中,第二UE在5G网络覆盖范围内;第二UE通过向RKMF发送携带第二UE的标识的发现请求,以请求在PC5接口公告。
步骤S1005:发现授权;
在一个可选实施例中,RKMF基于发现请求及服务配置文件发现目标UE;服务配置文件可由应用层定义。
步骤S1006:发送5G网络覆盖范围的状态请求;
在一个可选实施例中,为了验证第二UE的所有目标UE是否在5G网络覆盖范围内,RKMF将测距层ID发送给UDM。这里,测距层ID,包括目标UE的标识。
步骤S1007:发送5G网络覆盖范围的状态响应;
在一个可选实施例中,UDM检测所有目标UE的状态,并将验证结果发送给RKMF。若第一UE是第二UE的目标UE中之一,UDM确定第一UE位于5G网络覆盖范围外。
这里,该验证结果,可认为是状态响应;这里,UDM确定目标UE是位于5G网络覆盖范围时,发送携带目标测距层ID的验证结果,该目标测距层ID,指示测距层ID中指示的在网络覆盖范围外的目标UE。
步骤S1008:生成KD;
在一个可选实施例中,RKMF根据UDM发送的状态响应,若确定RKMF分配给第一UE的发现密钥失效,RKMF为第一UE生成新的发现密钥。RMKF基于TS 33.220附录B中规定的密钥生成函数(KDF),基于第一UE的LTK生成第一UE的KD。
步骤S1009:接收发现响应;
在一个可选实施例中,RKMF向第二UE发送发现响应,包括:第一UE的LTK ID、测距查询码、测距响应过滤器、KD、用于派生发现密钥的随机数(nonce)及安全算法标识。
步骤S1010:在PC5接口宣告第一公告消息;
第一公告消息,包括:测距查询码、时间戳、测距层ID及测距要求信息;第一公告消息还包括:LTK ID和用于派生发现密钥的随机数。这里,该测距查询码、时间戳、目标测距层ID及测距要求信息的其中至少之一为上述实施例中发现消息中的信息。
在一个可选实施例中,第二UE首先利用REK加密第一公告消息中敏感信息;然后利用RIK对包括加密后的敏感信息的发现消息、第一UE的LTK ID、用于派生发现密钥的随机数进行完整性保护,以获得第一公告消息;第二UE在PC5接口宣告第一公告消息。该敏感信息为发现消息中至少部分信息。
步骤S1011:生成发现密钥;
在一个可选实施例中,第一UE在接收到来自第二UE的第一公告消息时,基于随机数和LTK,计算REK和RIK。第一UE使用新生成的RIK,首先验证第一公告消息的完整性。如果第一公告消息被修改,第一UE将中止第二UE的第一公告消息。然后第一UE解密第一公告消息。此外,第一 UE可检查完整性保护的时间戳和随机数;若时间戳和/或随机指示存在重放攻击,第一UE中止第二UE的第一公告消息。
步骤S1012:在PC5接口宣告第二公告消息;
在一个可选实施例中,第一UE若确定第二UE的测距查询码与第一UE预先配置的测距查询过滤器匹配,则在PC5接口公告包括相应的测距响应码的第二公告消息。第二公告消息也受REK和RIK保护。
步骤S1013:在PC5接口进行监听。
在一个可选实施例中,第二UE使用RKMF发送的测距响应过滤器在PC5接口上进行监听。
示例二:
本公开实施例提供一种密钥派生方法。
步骤A:基于LTK计算KD,应使用以下参数构成KDF的输入:
FC=0x58;
P0=Nonce_1;
L0=length of Nonce_1(i.e.0x00 0x03);
P1=Nonce_2;
L1=length of Nonce_2(i.e.0x00 0x10);
P2=Nonce_3;
L2=length of Nonce_3(i.e.0x00 0x10)。
这里,输入密钥应为256位LTK。
步骤B:基于KD计算KD-SESS,应使用以下参数构成KDF的输入:
FC=0x5E;
P0=Nonce_4;
L0=length of Nonce_4(i.e.0x00 0x10);
P1=Nonce_5;
L1=length of Nonce_5(i.e.0x00 0x10)。
这里,输入密钥应为256位KD。
步骤C:基于KD-SESS计算RIK或REK,应使用以下参数形成KDF的输入:
FC=0x5B;
P0=0x00 if REK is being derived or 0x01 if RIK is being derived;
L0=length of P0(i.e.0x00 0x01);
P1=algorithm identity;
L1=length of algorithm identity(i.e.0x00 0x01);
NOTE:Void。
这里,输入密钥应为256位KD-SESS。
这里,对于长度为n位的输入密钥,其中n小于或等于256;KDF输出的256位中的n个最低有效位应用作输入密钥。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图11所示,本公开实施例提供一种UE发现消息保护装置,应用于第一UE,包括:
第一接收模块51,被配置为在第一UE位于网络覆盖范围外时监听第一公告消息;其中,第一公告消息包括:基于发现密钥加密的发现消息、及指示LTK的LTK ID;
第一处理模块52,被配置为基于与LTK ID对应的LTK,确定发现密钥;其中,LTK为第一UE在网络覆盖范围内时接收的。
本公开实施例提供一种UE发现消息保护装置,应用于第一UE,可包括:
第一处理模块52,被配置为基于在网络覆盖范围内时接收的配置信息,确定第一UE是否有权监听;其中,配置信息,包括:各UE的监听权限;
第一接收模块51,被配置为基于第一UE有权监听,监听第一公告消息。
本公开实施例提供一种UE发现消息保护装置,应用于第一UE,可包括:第一接收模块51,被配置为在PC5接口监听第一公告消息。
本公开实施例提供一种UE发现消息保护装置,应用于第一UE,可包括:
第一发送模块,被配置为在网络覆盖范围内时,向RKMF发送携带第一UE的标识的LTK请求;
第一接收模块51,被配置为在网络覆盖范围内时,接收RKMF基于LTK请求返回的LTK及LTK ID。
在一些实施例中,发现消息,包括以下至少之一:
测距层ID,用于指示需要测距的目标UE;
测距要求信息,用于指示测距的测距要求。
在一些实施例中,发现密钥至少包括以下之一:
REK,用于加密发现消息;
RIK,用于保护第一公告消息的完整性。
本公开实施例提供一种UE发现消息保护装置,应用于第一UE,可包括:第一处理模块52,被配置为基于RIK确定第一公告消息为完整的,基于REK,解密发现消息。
本公开实施例提供一种UE发现消息保护装置,应用于第一UE,可包括:第一处理模块52,被配置为基于从第一公告消息获取的时间戳和/随机数,确定第一公告消息是否被重放攻击;
第一处理模块52,被配置为基于第一公告消息未被重放攻击,确定发送第二公告消息;其中,第二公告消息包括与测距查询码对应的测距响应码。
本公开实施例提供一种UE发现消息保护装置,应用于第一UE,可包括:第一处理模块52,被配置为基于从第一公告消息获取的时间戳和/随机数,确定第一公告消息是否被重放攻击;
第一处理模块52,被配置为基于第一公告消息被重放攻击,确定不发送第二公告消息。
在一些实施例中,第一公告消息包括:测距查询码,用于标识第一公告消息。
本公开实施例提供一种UE发现消息保护装置,应用于第一UE,可包括:第一发送模块,被配置为基于测距查询码与预先配置的测距查询过滤器匹配,发送第二公告消息;其中,第二公告消息包括与测距查询码对应的测距响应码。
本公开实施例提供一种UE发现消息保护装置,应用于第一UE,可包括:第一发送模块,被配置为发送使用REK和/或RIK保护后的第二公告消息。
本公开实施例中提供一种UE发现消息保护装置,应用于第一UE,可包括:第一发送模块,被配置为发送第二公告消息;其中,第二公告消息包括与测距查询码对应的测距响应码。
在一些实施例中,第二公告消息为:使用REK和/或RIK保护的第二公告消息。
如图12所示,本公开实施例提供一种UE发现消息保护装置,应用于第二UE,包括:
第二发送模块61,被配置为在第二UE位于网络覆盖范围内时发送第一公告消息,其中,第一公告消息包括:基于发现密钥加密的发现消息,及指示LTK的LTK ID;
其中,LTK ID,用于位于网络覆盖范围外的第一UE确定与LTK ID对应的LTK;LTK用于第一UE确定发现密钥。
本公开实施例提供一种UE发现消息保护装置,应用于第二UE,可包括:第二发送模块61,被配置为在PC5接口发送第一公告消息。
本公开实施例提供一种UE发现消息保护装置,应用于第二UE,可包括:第二发送模块61,被配置为基于接收到RKMF发送的发现响应,发送第一公告消息;其中,发现响应用于指示第二UE有权宣告。
本公开实施例提供一种UE发现消息保护装置,应用于第二UE,可包括:第二发送模块61,被配置为向RKMF发送携带第二UE的标识的发现请求,其中,发现请求用于请求第二UE是否有权宣告。
在一些实施例中,发现响应,包括以下之一:
LTK ID、及与LTK ID对应的发现密钥;
LTK ID、及随机数;
LTK ID、和生成发现密钥的KD、及与KD对应的随机数。
本公开实施例提供一种UE发现消息保护装置,应用于第二UE,可包括:第二处理模块,被配置为基于KD,确定KD-SESS;基于KD-SESS,确定发现密钥。
本公开实施例提供一种UE发现消息保护装置,应用于第二UE,可包括:第二处理模块,被配置为基于KD及随机数,确定KD-SESS;基于KD-SESS及随机数,确定发现密钥。
在一些实施例中,发现密钥包括:REK和/或RIK;
本公开实施例提供一种UE发现消息保护装置,应用于第二UE,可包括:第二处理模块,被配置为基于REK,加密发现消息;基于RIK,对第一公告消息进行完整性保护。
在一些实施例中,发现响应,包括以下至少之一:
测距查询码,用于标识第一公告消息;
测距响应过滤器,用于匹配测距响应码;
随机数,用于与LTK一起,确定发现密钥。
本公开实施例提供一种UE发现消息保护装置,应用于第二UE,可包括:第二接收模块,被配置为基于测距响应过滤器监听第二公告消息,其中,第二公告消息中包括与测距查询码对应的测距响应码。
在一些实施例中,发现消息,还包括以下至少之一:
测距层ID,用于指示需要测距的目标UE;
测距要求信息,用于指示测距的测距要求。
本公开实施例提供一种UE发现消息保护装置,应用于第二UE,可包括:接收第二公告消息;其中,第二公告消息包括与测距查询码对应的测距响应码。
在一些实施例中,第二公告消息为:使用REK和/或RIK保护的第二公告消息。
在一些实现方式中,该测距查询码可以为通过第一公告消息获得的。
如图13所示,本公开实施例提供一种UE发现消息保护装置,应用于RKMF,包括:
第三接收模块71,被配置为接收携带第一UE的标识的LTK请求;
第三发送模块72,被配置为向第一UE发送基于LTK请求确定的LTK及LTK ID;其中,LTK及LTK ID,用于位于网络覆盖范围外的第一UE监听到第二UE发送的第一公告消息后,基于第一公告消息中的LTK ID确定加密第一公告消息中发现消息的发现密钥。
本公开实施例提供一种UE发现消息保护装置,应用于RKMF,可包括:
第三接收模块71,被配置为接收第二UE发送的发现请求;其中,发现请求包括第二UE的标识,用于请求第二UE是否有权宣告;
第三处理模块,被配置为基于第二UE的标识确定出第二UE有权宣告,向第二UE发送发现响应,其中,发现响应用于指示第二UE有权宣告。
本公开实施例提供一种UE发现消息保护装置,应用于RKMF,可包括:第三处理模块,被配置为基于LTK,确定发现密钥或者生成发现密钥的KD;
其中,发现响应包括以下之一:LTK ID、及与LTK ID对应的发现密钥;LTK ID、及随机数;及LTK ID、和生成发现密钥的KD、及与KD对应的随机数。
在一些实施例中,发现响应,包括以下至少之一:
测距查询码,用于标识第一公告消息;
测距响应过滤器,用于匹配测距响应码;
随机数,用于与LTK一起,确定发现密钥。
在一些实施例中,发现请求包括:测距层ID,用于指示需要测距的目标UE。
本公开实施例提供一种UE发现消息保护装置,应用于RKMF,可包括:
第三发送模块72,被配置为向统一数据管理网元UDM发送验证信息,其中,验证信息中包括测距层ID;
第三接收模块71,被配置为接收UDM基于验证信息返回的验证结果;其中,验证结果,包括:目标测距层ID;其中,目标测距层ID,用于指示测距层ID中指示的在网络覆盖范围外的目标UE。
本公开实施例提供一种UE发现消息保护装置,应用于RKMF,可包括:第三处理模块,被配置为基于第一UE的标识被包括在目标测距层ID中,且第一UE的可用密钥的有效期到期,基于LTK确定发现密钥或者生成发现密钥的KD。
本公开实施例提供一种UE发现消息保护装置,应用于RKMF,可包括:第三处理模块,被配置为基于第一UE的标识被包括在目标测距层ID中,且第一UE的可用密钥的有效期到期,基于LTK确定发现密钥或者生成发现密钥的KD。
本公开实施例提供一种发现消息保护装置,应用于UDM中,可包括:
第四接收模块,被配置为接收RKMF发送的验证信息,其中,验证信息中包括测距层ID;验证信息用于请求验证测距层ID中指示的目标UE是否在网络覆盖范围内;
第四发送模块,被配置为向RKMF发送验证结果,其中,验证结果,包括:目标测距层ID;其中,目标测距层ID,用于指示测距层ID中指示的在网路覆盖范围外的目标UE。
本公开实施例提供一种UE发现消息保护装置,应用于UDM中,可包括:
第四处理模块,被配置为基于测距层ID,确定测距层ID对应目标UE是否在网络覆盖范围内;基于在网络覆盖范围外的目标UE的标识,确定目标测距层ID。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的装置,可以被单独执行,也可以与本公开实施例中一些装置或相关技术中的一些装置一起被执行。
关于上述实施例中的装置,其中各个模块执行操作的具体方式已经在有关该方法的实施例中进行了详细描述,此处将不做详细阐述说明。
本公开实施例提供一种通信设备,包括:
处理器;
用于存储处理器可执行指令的存储器;
其中,处理器被配置为:用于运行可执行指令时,实现本公开任意实施例的定位方法。
在一个实施例中,通信设备可以包括但不限于至少之一:核心网设备、接入网设备、及UE。该UE可以为上述实施例中第一UE或者第二UE;核心网设备可以为上述实施例中RKMF。
其中,处理器可包括各种类型的存储介质,该存储介质为非临时性计算机存储介质,在用户设备掉电之后能够继续记忆存储其上的信息。
处理器可以通过总线等与存储器连接,用于读取存储器上存储的可执行程序,例如,如图6至图10所示的方法的至少其中之一。
本公开实施例还提供一种计算机存储介质,计算机存储介质存储有计算机可执行程序,可执行 程序被处理器执行时实现本公开任意实施例的定位方法。例如,如图6至图10所示的方法的至少其中之一。
关于上述实施例中的装置或者存储介质,其中各个模块执行操作的具体方式已经在有关该方法的实施例中进行了详细描述,此处将不做详细阐述说明。
图14是根据一示例性实施例示出的一种用户设备800的框图。例如,用户设备800可以是移动电话,计算机,数字广播用户设备,消息收发设备,游戏控制台,平板设备,医疗设备,健身设备,个人数字助理等。
参照图14,用户设备800可以包括以下一个或多个组件:处理组件802,存储器804,电源组件806,多媒体组件808,音频组件810,输入/输出(I/O)的接口812,传感器组件814,以及通信组件816。
处理组件802通常控制用户设备800的整体操作,诸如与显示,电话呼叫,数据通信,相机操作和记录操作相关联的操作。处理组件802可以包括一个或多个处理器820来执行指令,以完成上述的方法的全部或部分步骤。此外,处理组件802可以包括一个或多个模块,便于处理组件802和其他组件之间的交互。例如,处理组件802可以包括多媒体模块,以方便多媒体组件808和处理组件802之间的交互。
存储器804被配置为存储各种类型的数据以支持在用户设备800的操作。这些数据的示例包括用于在用户设备800上操作的任何应用程序或方法的指令,联系人数据,电话簿数据,消息,图片,视频等。存储器804可以由任何类型的易失性或非易失性存储设备或者它们的组合实现,如静态随机存取存储器(SRAM),电可擦除可编程只读存储器(EEPROM),可擦除可编程只读存储器(EPROM),可编程只读存储器(PROM),只读存储器(ROM),磁存储器,快闪存储器,磁盘或光盘。
电源组件806为用户设备800的各种组件提供电力。电源组件806可以包括电源管理系统,一个或多个电源,及其他与为用户设备800生成、管理和分配电力相关联的组件。
多媒体组件808包括在所述用户设备800和用户之间的提供一个输出接口的屏幕。在一些实施例中,屏幕可以包括液晶显示器(LCD)和触摸面板(TP)。如果屏幕包括触摸面板,屏幕可以被实现为触摸屏,以接收来自用户的输入信号。触摸面板包括一个或多个触摸传感器以感测触摸、滑动和触摸面板上的手势。所述触摸传感器可以不仅感测触摸或滑动动作的边界,而且还检测与所述触摸或滑动操作相关的持续时间和压力。在一些实施例中,多媒体组件808包括一个前置摄像头和/或后置摄像头。当用户设备800处于操作模式,如拍摄模式或视频模式时,前置摄像头和/或后置摄像头可以接收外部的多媒体数据。每个前置摄像头和后置摄像头可以是一个固定的光学透镜系统或具有焦距和光学变焦能力。
音频组件810被配置为输出和/或输入音频信号。例如,音频组件810包括一个麦克风(MIC),当用户设备800处于操作模式,如呼叫模式、记录模式和语音识别模式时,麦克风被配置为接收外 部音频信号。所接收的音频信号可以被进一步存储在存储器804或经由通信组件816发送。在一些实施例中,音频组件810还包括一个扬声器,用于输出音频信号。
I/O接口812为处理组件802和外围接口模块之间提供接口,上述外围接口模块可以是键盘,点击轮,按钮等。这些按钮可包括但不限于:主页按钮、音量按钮、启动按钮和锁定按钮。
传感器组件814包括一个或多个传感器,用于为用户设备800提供各个方面的状态评估。例如,传感器组件814可以检测到设备800的打开/关闭状态,组件的相对定位,例如所述组件为用户设备800的显示器和小键盘,传感器组件814还可以检测用户设备800或用户设备800一个组件的位置改变,用户与用户设备800接触的存在或不存在,用户设备800方位或加速/减速和用户设备800的温度变化。传感器组件814可以包括接近传感器,被配置用来在没有任何的物理接触时检测附近物体的存在。传感器组件814还可以包括光传感器,如CMOS或CCD图像传感器,用于在成像应用中使用。在一些实施例中,该传感器组件814还可以包括加速度传感器,陀螺仪传感器,磁传感器,压力传感器或温度传感器。
通信组件816被配置为便于用户设备800和其他设备之间有线或无线方式的通信。用户设备800可以接入基于通信标准的无线网络,如WiFi,4G或5G,或它们的组合。在一个示例性实施例中,通信组件816经由广播信道接收来自外部广播管理系统的广播信号或广播相关信息。在一个示例性实施例中,所述通信组件816还包括近场通信(NFC)模块,以促进短程通信。例如,在NFC模块可基于射频识别(RFID)技术,红外数据协会(IrDA)技术,超宽带(UWB)技术,蓝牙(BT)技术和其他技术来实现。
在示例性实施例中,用户设备800可以被一个或多个应用专用集成电路(ASIC)、数字信号处理器(DSP)、数字信号处理设备(DSPD)、可编程逻辑器件(PLD)、现场可编程门阵列(FPGA)、控制器、微控制器、微处理器或其他电子元件实现,用于执行上述方法。
在示例性实施例中,还提供了一种包括指令的非临时性计算机可读存储介质,例如包括指令的存储器804,上述指令可由用户设备800的处理器820执行以完成上述方法。例如,所述非临时性计算机可读存储介质可以是ROM、随机存取存储器(RAM)、CD-ROM、磁带、软盘和光数据存储设备等。
如图15所示,本公开一实施例示出一种基站的结构。例如,基站900可以被提供为一网络侧设备。参照图15,基站900包括处理组件922,其进一步包括一个或多个处理器,以及由存储器932所代表的存储器资源,用于存储可由处理组件922的执行的指令,例如应用程序。存储器932中存储的应用程序可以包括一个或一个以上的每一个对应于一组指令的模块。此外,处理组件922被配置为执行指令,以执行上述方法前述应用在所述基站的任意方法,例如,如图4至图10所示方法。
基站900还可以包括一个电源组件926被配置为执行基站900的电源管理,一个有线或无线网络接口950被配置为将基站900连接到网络,和一个输入输出(I/O)接口958。基站900可以操作基于存储在存储器932的操作系统,例如Windows Server TM,Mac OS XTM,UnixTM,LinuxTM, FreeBSDTM或类似。
本领域技术人员在考虑说明书及实践这里公开的发明后,将容易想到本发明的其它实施方案。本公开旨在涵盖本发明的任何变型、用途或者适应性变化,这些变型、用途或者适应性变化遵循本发明的一般性原理并包括本公开未公开的本技术领域中的公知常识或惯用技术手段。说明书和实施例仅被视为示例性的,本发明的真正范围和精神由下面的权利要求指出。
应当理解的是,本发明并不局限于上面已经描述并在附图中示出的精确结构,并且可以在不脱离其范围进行各种修改和改变。本发明的范围仅由所附的权利要求来限制。

Claims (31)

  1. 一种UE发现消息保护方法,其中,由第一用户设备UE执行,包括:
    在所述第一UE位于网络覆盖范围外时监听第一公告消息;其中,所述第一公告消息包括:基于发现密钥加密的发现消息、及指示长期密钥LTK的LTK标识信息ID;
    基于与所述LTK ID对应的LTK,确定所述发现密钥;其中,所述LTK为所述第一UE在网络覆盖范围内时接收的。
  2. 根据权利要求1所述的方法,其中,所述方法包括:
    基于在网络覆盖范围内时接收的配置信息,确定所述第一UE是否有权监听;其中,所述配置信息,包括:各UE的监听权限;
    所述监听第一公告消息,包括:
    基于所述第一UE有权监听,监听所述第一公告消息。
  3. 根据权利要求1所述的方法,其中,所述监听第一公告消息,包括:
    在直接通信PC5接口监听所述第一公告消息。
  4. 根据权利要求1所述的方法,其中,所述方法包括:
    在网络覆盖范围内时,向测距密钥管理功能网元RKMF发送携带所述第一UE的标识的LTK请求;
    在网络覆盖范围内时,接收所述RKMF基于所述LTK请求返回的所述LTK及所述LTK ID。
  5. 根据权利要求1至4任一项所述的方法,其中,所述发现消息,包括以下至少之一:
    测距层ID,用于指示需要测距的目标UE;
    测距要求信息,用于指示测距的测距要求。
  6. 根据权利要求1至4任一项所述的方法,其中,所述发现密钥至少包括以下之一:
    测距机密性保护密钥REK,用于加密所述发现消息;
    测距完整性保护密钥RIK,用于保护第一公告消息的完整性。
  7. 根据权利要求6所述的方法,其中,所述方法包括:
    基于所述RIK确定所述第一公告消息为完整的,基于所述REK,解密所述发现消息。
  8. 根据权利要求7所述的方法,其中,所述方法还包括:
    基于从所述第一公告消息获取的时间戳和/随机数,确定所述第一公告消息是否被重放攻击;
    基于所述第一公告消息未被重放攻击,确定发送第二公告消息;或者,
    基于所述第一公告消息被重放攻击,确定不发送所述第二公告消息;
    其中,所述第二公告消息包括与所述测距查询码对应的测距响应码。
  9. 根据权利要求1所述的方法,其中,所述第一公告消息包括:测距查询码,用于标识所述第一公告消息;
    所述方法包括:
    基于所述测距查询码与预先配置的测距查询过滤器匹配,发送第二公告消息;其中,所述第二 公告消息包括与所述测距查询码对应的测距响应码。
  10. 根据权利要求8或9所述的方法,其中,所述发送第二公告消息,包括:
    发送使用所述REK和/或所述RIK保护后的所述第二公告消息。
  11. 一种UE发现消息保护方法,其中,由第二用户设备UE执行,包括:
    在所述第二UE位于网络覆盖范围内时发送第一公告消息,其中,所述第一公告消息包括:基于发现密钥加密的发现消息,及指示长期密钥LTK的LTK标识信息ID;
    其中,所述LTK ID,用于位于网络覆盖范围外的所述第一UE确定与所述LTK ID对应的LTK;所述LTK用于所述第一UE确定所述发现密钥。
  12. 根据权利要求11所述的方法,其中,所述发送所述第一公告消息,包括:
    在直连通信PC5接口发送所述第一公告消息。
  13. 根据权利要求11或12所述的方法,其中,所述发送第一公告消息,包括:
    基于接收到测距密钥管理功能网元RKMF发送的发现响应,发送所述第一公告消息;其中,所述发现响应用于指示所述第二UE有权宣告。
  14. 根据权利要求13所述的方法,其中,所述方法包括:
    向所述RKMF发送携带所述第二UE的标识的发现请求,其中,所述发现请求用于请求所述第二UE是否有权宣告。
  15. 根据权利要求13所述的方法,其中,所述发现响应,包括以下之一:
    所述LTK ID、及与所述LTK ID对应的所述发现密钥;
    所述LTK ID、及随机数;
    所述LTK ID、和生成所述发现密钥的所述KD、及与所述KD对应的随机数。
  16. 根据权利要求15所述的方法,其中,所述方法包括:
    基于所述KD,确定临时密钥KD-SESS;
    基于所述KD-SESS,确定所述发现密钥。
  17. 根据权利要求16所述的方法,其中,所述发现密钥包括:测距机密性保护密钥REK和/或测距完整性保护密钥RIK;
    所述方法包括以下至少之一:
    基于所述REK,加密所述发现消息;
    基于所述RIK,对所述第一公告消息进行完整性保护。
  18. 根据权利要求13所述的方法,其中,所述发现响应,包括以下至少之一:
    测距查询码,用于标识所述第一公告消息;
    测距响应过滤器,用于匹配测距响应码;
    随机数,用于与所述LTK一起,确定所述发现密钥。
  19. 根据权利要求18所述的方法,其中,所述方法还包括:
    基于所述测距响应过滤器监听第二公告消息,其中,所述第二公告消息中包括与所述测距查询 码对应的测距响应码。
  20. 根据权利要求11所述的方法,其中,所述发现消息,还包括以下至少之一:
    测距层ID,用于指示需要测距的目标UE;
    测距要求信息,用于指示测距的测距要求。
  21. 一种UE发现消息保护方法,其中,由测距密钥管理功能网元RKMF执行,包括:
    接收携带所述第一UE的标识的LTK请求;
    向所述第一UE发送基于所述LTK请求确定的LTK及LTK ID;其中,所述LTK及LTK ID,用于位于网络覆盖范围外的所述第一UE监听到所述第二UE发送的第一公告消息后,基于所述第一公告消息中的LTK ID确定加密所述第一公告消息中发现消息的发现密钥。
  22. 根据权利要求21所述的方法,其中,所述方法包括:
    接收所述第二UE发送的发现请求;其中,所述发现请求包括第二UE的标识,用于请求所述第二UE是否有权宣告;
    基于所述第二UE的标识确定出所述第二UE有权宣告,向所述第二UE发送发现响应,其中,所述发现响应用于指示所述第二UE有权宣告。
  23. 根据权利要求22所述的方法,其中,所述方法包括:
    基于所述LTK,确定所述发现密钥或者生成所述发现密钥的中间密钥KD;
    其中,所述发现响应包括以下之一:
    所述LTK ID、及与所述LTK ID对应的所述发现密钥;
    所述LTK ID、及随机数;
    所述LTK ID、和生成所述发现密钥的所述KD、及与所述KD对应的随机数。
  24. 根据权利要求23所述的方法,其中,所述发现响应,包括以下至少之一:
    测距查询码,用于标识所述第一公告消息;
    测距响应过滤器,用于匹配测距响应码;
    随机数,用于与所述KD一起,确定所述发现密钥。
  25. 根据权利要求22或23所述的方法,其中,所述发现请求包括:测距层ID,用于指示需要测距的目标UE;
    所述方法包括:
    向统一数据管理网元UDM发送验证信息,其中,所述验证信息中包括所述测距层ID;
    接收所述UDM基于所述验证信息返回的验证结果;其中,所述验证结果,包括:目标测距层ID;所述目标测距层ID,用于指示所述测距层ID中指示的网络覆盖范围外的所述目标UE。
  26. 根据权利要求25所述的方法,其中,所述基于所述LTK,确定所述发现密钥或者生成所述发现密钥的中间密钥KD,包括:
    基于所述第一UE的标识被包括在所述目标测距层ID中,且所述第一UE的可用密钥失效,基于所述LTK确定发现密钥或者生成所述发现密钥的中间密钥KD。
  27. 一种UE发现消息保护装置,其中,应用于第一用户设备UE,包括:
    第一接收模块,被配置为在所述第一UE位于网络覆盖范围外时监听第一公告消息;其中,所述第一公告消息包括:基于发现密钥加密的发现消息、及指示长期密钥LTK的LTK标识信息ID;
    第一处理模块,被配置为基于与所述LTK ID对应的LTK,确定所述发现密钥;其中,所述LTK为所述第一UE在网络覆盖范围内时接收的。
  28. 一种UE发现消息保护装置,其中,应用于第二用户设备UE,包括:
    第二发送模块,被配置为在所述第二UE位于网络覆盖范围内时发送第一公告消息,其中,所述第一公告消息包括:基于发现密钥加密的发现消息,及指示长期密钥LTK的LTK标识信息ID;
    其中,所述LTK ID,用于位于网络覆盖范围外的所述第一UE确定与所述LTK ID对应的LTK;所述LTK用于所述第一UE确定所述发现密钥。
  29. 一种UE发现消息保护装置,其中,应用于测距密钥管理功能网元RKMF,包括:
    第三接收模块,被配置为接收携带所述第一UE的标识的LTK请求;
    第三发送模块,被配置为向所述第一UE发送基于所述LTK请求确定的LTK及LTK ID;其中,所述LTK及LTK ID,用于位于网络覆盖范围外的所述第一UE监听到所述第二UE发送的第一公告消息后,基于所述第一公告消息中的LTK ID确定加密所述第一公告消息中发现消息的发现密钥。
  30. 一种通信设备,其中,所述通信设备,包括:
    处理器;
    用于存储所述处理器可执行指令的存储器;
    其中,所述处理器被配置为:用于运行所述可执行指令时,实现权利要求1至10、或者权利要求11至20、或者权利要求21至26任一项所述的UE发现消息保护方法。
  31. 一种计算机存储介质,其中,所述计算机存储介质存储有计算机可执行程序,所述可执行程序被处理器执行时实现权利要求1至10、或者权利要求11至20、或者权利要求21至26任一项所述的UE发现消息保护方法。
PCT/CN2022/075131 2022-01-29 2022-01-29 Ue发现消息保护方法、装置、通信设备及存储介质 WO2023142095A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2022/075131 WO2023142095A1 (zh) 2022-01-29 2022-01-29 Ue发现消息保护方法、装置、通信设备及存储介质
CN202280000267.3A CN116897550A (zh) 2022-01-29 2022-01-29 Ue发现消息保护方法、装置、通信设备及存储介质

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2022/075131 WO2023142095A1 (zh) 2022-01-29 2022-01-29 Ue发现消息保护方法、装置、通信设备及存储介质

Publications (1)

Publication Number Publication Date
WO2023142095A1 true WO2023142095A1 (zh) 2023-08-03

Family

ID=87470255

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/075131 WO2023142095A1 (zh) 2022-01-29 2022-01-29 Ue发现消息保护方法、装置、通信设备及存储介质

Country Status (2)

Country Link
CN (1) CN116897550A (zh)
WO (1) WO2023142095A1 (zh)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013118096A1 (en) * 2012-02-10 2013-08-15 Renesas Mobile Corporation Method, apparatus and computer program for facilitating secure d2d discovery information
CN106105140A (zh) * 2014-03-19 2016-11-09 高通股份有限公司 在长期演进设备到设备发现中防止重放攻击
CN106576241A (zh) * 2014-10-31 2017-04-19 宇龙计算机通信科技(深圳)有限公司 D2d通信中检验mic的方法和d2d通信系统
CN107113594A (zh) * 2015-01-16 2017-08-29 三星电子株式会社 设备到设备通信系统的安全发送和接收发现消息的方法
CN107852418A (zh) * 2015-08-11 2018-03-27 英特尔Ip公司 用户设备之间的安全直接发现

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013118096A1 (en) * 2012-02-10 2013-08-15 Renesas Mobile Corporation Method, apparatus and computer program for facilitating secure d2d discovery information
CN106105140A (zh) * 2014-03-19 2016-11-09 高通股份有限公司 在长期演进设备到设备发现中防止重放攻击
CN106576241A (zh) * 2014-10-31 2017-04-19 宇龙计算机通信科技(深圳)有限公司 D2d通信中检验mic的方法和d2d通信系统
CN107113594A (zh) * 2015-01-16 2017-08-29 三星电子株式会社 设备到设备通信系统的安全发送和接收发现消息的方法
CN107852418A (zh) * 2015-08-11 2018-03-27 英特尔Ip公司 用户设备之间的安全直接发现

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Study on architecture enhancements to support Proximity Services (ProSe) (Release 12)", 3GPP STANDARD; 3GPP TR 23.703, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. SA WG2, no. V0.4.0, 7 June 2013 (2013-06-07), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France , pages 1 - 87, XP050692546 *

Also Published As

Publication number Publication date
CN116897550A (zh) 2023-10-17

Similar Documents

Publication Publication Date Title
WO2023184561A1 (zh) 中继通信方法、装置、通信设备及存储介质
US10673611B2 (en) Data transmission method, device, and system
WO2023142095A1 (zh) Ue发现消息保护方法、装置、通信设备及存储介质
WO2023142093A1 (zh) Ue发现消息保护方法、装置、通信设备及存储介质
WO2022222005A1 (zh) 通信设备检测方法、装置、通信设备和存储介质
WO2023142089A1 (zh) 信息传输方法、装置、通信设备和存储介质
WO2023142090A1 (zh) 信息传输方法、装置、通信设备和存储介质
WO2023201454A1 (zh) 中继通信方法、装置、通信设备及存储介质
WO2022222006A1 (zh) 测距方法、装置、通信设备及存储介质
WO2023070685A1 (zh) 中继通信的方法、装置、通信设备及存储介质
WO2024145947A1 (zh) 信息处理方法及装置、通信设备及存储介质
WO2023070509A1 (zh) 信息处理方法及装置、通信设备及存储介质
WO2024031523A1 (zh) 信息处理方法及装置、通信设备及存储介质
WO2024031640A1 (zh) 一种信息传输方法、装置、通信设备及存储介质
US20230247541A1 (en) Service slice activation method and service slice activation apparatus, and storage medium
WO2024031549A1 (zh) 信息处理方法及装置、通信设备及存储介质
WO2023245354A1 (zh) 安全保护方法、装置、通信设备及存储介质
CN117256166A (zh) 信息处理方法及装置、通信设备及存储介质
WO2024031565A1 (zh) 信息处理方法以及装置、通信设备及存储介质
WO2024092573A1 (zh) 信息处理方法及装置、通信设备及存储介质
WO2024092735A1 (zh) 通信控制方法、系统及装置、通信设备及存储介质
WO2023092598A1 (zh) 信息处理方法、装置、通信设备及存储介质
WO2024087124A1 (zh) 通信方法、装置、用户设备、通信系统以及存储介质
CN116406509A (zh) 信息处理方法以及装置、通信设备及存储介质
CN116349267A (zh) 密钥分发方法、装置、通信设备及存储介质

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 202280000267.3

Country of ref document: CN

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22922924

Country of ref document: EP

Kind code of ref document: A1