WO2023151696A1 - 通信方法、通信装置和系统 - Google Patents

通信方法、通信装置和系统 Download PDF

Info

Publication number
WO2023151696A1
WO2023151696A1 PCT/CN2023/075963 CN2023075963W WO2023151696A1 WO 2023151696 A1 WO2023151696 A1 WO 2023151696A1 CN 2023075963 W CN2023075963 W CN 2023075963W WO 2023151696 A1 WO2023151696 A1 WO 2023151696A1
Authority
WO
WIPO (PCT)
Prior art keywords
signature
message
transmission resource
broadcast message
osi
Prior art date
Application number
PCT/CN2023/075963
Other languages
English (en)
French (fr)
Inventor
时代
熊晓春
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2023151696A1 publication Critical patent/WO2023151696A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys

Definitions

  • the present application relates to the technical field of wireless communication, and more specifically, to a communication method, communication device and system.
  • the message sent by the base station to the terminal may be stolen and counterfeited by the fake base station.
  • the fake base station may use this to interact with the terminal and steal private information, posing security risks.
  • the base station In some communication technologies, the base station generates protection information such as a signature for the message sent to the terminal. After receiving the message and the protection information of the message sent by the base station, the terminal verifies the legitimacy of the message through the protection information. However, there is no definite solution on how the terminal receives the protection information.
  • the present application proposes a communication method and a communication device, so that a terminal can accurately and flexibly receive protection information of a message sent by a base station.
  • a communication method which can be performed by a base station, and the method includes: receiving a first broadcast message; receiving information indicating a transmission resource of a first signature, and the first signature is used to verify the first broadcast message ; Receive the first signature according to the information indicating the transmission resource of the first signature; verify the first broadcast message according to the first signature.
  • the terminal receives the information indicating the transmission resource of the signature, so that the terminal can know the transmission resource of the signature, so that the signature sent by the base station can be accurately received on the transmission resource, and the signature and the message protected by the signature are transmitted separately. , improving the flexibility of transport signatures.
  • receiving the first signature according to the information indicating the transmission resource of the first signature includes: receiving a system message according to the information indicating the transmission resource of the first signature, where the system message includes the first signature.
  • the information indicating the transmission resource of the first signature includes: a system message type.
  • the information indicating the transmission resource of the first signature further includes: a sending period of the first signature.
  • the information indicating the transmission resource of the first signature includes: time domain resource information and/or frequency domain resource information.
  • the time-domain resource information is the time-domain location, and the terminal can directly know the time of signature transmission, so that the terminal can only wake up and receive the signature at the time corresponding to the time-domain location, which reduces the wake-up time of the terminal and is conducive to energy saving of the terminal.
  • receiving the first signature according to the information indicating the transmission resource of the first signature includes: performing blind detection within the range indicated by the time domain resource information and/or the frequency domain resource information to determine the transmission resource of the first signature , receiving the first signature on the determined transmission resource.
  • receiving the information indicating the transmission resource of the first signature includes: receiving a second broadcast message, the second broadcast message including the information indicating the transmission resource of the first signature.
  • the second broadcast message is System Information Block 1 .
  • the first broadcast message is a system information block 1, other system information OSI, or a paging message.
  • the second broadcast message is a broadcast message carrying a signature of the system information block 1 or the second broadcast message is an OSI.
  • the first broadcast message is an OSI, or a paging message.
  • the second broadcast message is a signed broadcast message carrying the OSI or the second broadcast message is a paging message.
  • the first broadcast message is a paging message.
  • verifying the first broadcast message according to the first signature includes: concatenating the OSI, and verifying the concatenated OSI according to the first signature.
  • a communication method which can be executed by a terminal, and the method includes: sending a first broadcast message to the terminal; sending information indicating a transmission resource of a first signature to the terminal, and the first signature is used for verification
  • the first broadcast message sending the first signature to the terminal on the transmission resource corresponding to the information indicating the transmission resource of the first signature.
  • the base station sends information indicating the transmission resource of the signature, so that the terminal can know the transmission resource of the signature, so that the terminal can accurately receive the signature sent by the base station on the transmission resource, and the signature and the message protected by the signature are realized.
  • Separate transmission improves the flexibility of transmission signature.
  • sending the first signature to the terminal on the transmission resource corresponding to the information indicating the transmission resource of the first signature includes: sending a system message to the terminal on the transmission resource, where the system message includes the first signature.
  • the information indicating the transmission resource of the first signature includes: a system message type.
  • the information indicating the transmission resource of the first signature further includes: a sending period of the first signature.
  • the information indicating the transmission resource of the first signature includes: time domain resource information and/or frequency domain resource information.
  • the time-domain resource information is the time-domain location, and the terminal can directly know the time of signature transmission, so that the terminal can only wake up and receive the signature at the time corresponding to the time-domain location, which reduces the wake-up time of the terminal and is conducive to energy saving of the terminal.
  • sending the information indicating the transmission resource of the first signature to the terminal includes: sending a second broadcast message to the terminal, where the second broadcast message includes the information indicating the transmission resource of the first signature.
  • the second broadcast message is System Information Block 1 .
  • the first broadcast message is a system information block 1, other system message OSI, or a paging message.
  • the second broadcast message is a broadcast message carrying a signature of the system information block 1 or the second broadcast message is an OSI.
  • the first broadcast message is an OSI, or a paging message.
  • the second broadcast message is a signed broadcast message carrying the OSI or the second broadcast message is a paging message.
  • the first broadcast message is a paging message.
  • the method when the first broadcast message is an OSI, the method further includes: concatenating the OSI, and generating the first signature according to the concatenated OSI.
  • a communication device in a third aspect, has a function of implementing the method in the first aspect or any possible implementation manner of the first aspect.
  • the functions described above may be implemented by hardware, or may be implemented by executing corresponding software on the hardware.
  • the hardware or software includes one or more units corresponding to the above functions.
  • a communication device in a fourth aspect, has a function of implementing the method in the second aspect or any possible implementation manner of the second aspect.
  • the functions described above may be implemented by hardware, or may be implemented by executing corresponding software on the hardware.
  • the hardware or software includes one or more units corresponding to the above functions.
  • a communication device including a processor and a memory.
  • a transceiver may also be included.
  • the memory is used to store computer programs
  • the processor is used to call and run the computer programs stored in the memory, and control the transceiver to send and receive signals, so that the communication device executes the first aspect, or any possible implementation of the first aspect methods in methods.
  • the communication device is the base station in the embodiment of this application.
  • a communication device including a processor and a memory.
  • a transceiver may also be included. That Among them, the memory is used to store computer programs, and the processor is used to call and run the computer programs stored in the memory, and control the transceiver to send and receive signals, so that the communication device performs the second aspect, or any possible implementation in the second aspect methods in methods.
  • the communication device is the terminal in the embodiment of this application.
  • a computer-readable storage medium is provided, and computer instructions are stored in the computer-readable storage medium.
  • the first aspect, or any one of the first aspects may The method in the implementation manner of the second aspect is executed; or the method in the second aspect, or any possible implementation manner of the second aspect is executed.
  • a computer program product includes computer program code, when the computer program code is run on a computer, the first aspect, or any possible implementation of the first aspect The method in the manner is executed; or the method in the second aspect, or any possible implementation manner of the second aspect is executed.
  • FIG. 1 is a schematic diagram of a transmission resource for an SI message provided in an embodiment of the present application
  • FIG. 2 is a schematic flowchart of a security protection method provided in an embodiment of the present application
  • FIG. 3 is a schematic flowchart of a communication method provided in an embodiment of the present application.
  • FIG. 4 is a schematic flowchart of a communication method provided by an embodiment of the present application.
  • FIG. 5 is a schematic structural diagram of a communication device provided by an embodiment of the present application.
  • FIG. 6 is a schematic structural diagram of another communication device provided by an embodiment of the present application.
  • FIG. 7 is a schematic structural diagram of another communication device provided by an embodiment of the present application.
  • FIG. 8 is a schematic structural diagram of another communication device provided by an embodiment of the present application.
  • the method of the embodiment of the present application can be applied to a long term evolution technology (long term evolution, LTE) system, a long term evolution advanced technology (long term evolution-advanced, LTE-A) system, an enhanced long term evolution technology (enhanced long term evolution-advanced , eLTE), the fifth generation (the 5th Generation, 5G) mobile communication system New Radio (NR) system, can also be extended to similar wireless communication systems, such as wireless-fidelity (wireless-fidelity, WiFi), Worldwide interoperability for microwave access (WIMAX), and cellular systems related to the 3rd generation partnership project (3gpp).
  • Terminal can also be called user equipment (user equipment, UE), access terminal, terminal equipment unit (subscriber unit), terminal equipment station, mobile station, mobile station (mobile station, MS), remote station, remote terminal, mobile A device, user terminal, terminal, wireless communication device, terminal agent, or terminal device.
  • user equipment user equipment
  • terminal equipment unit subscriber unit
  • terminal equipment station mobile station
  • mobile station mobile station
  • remote station remote terminal
  • mobile A device user terminal, terminal, wireless communication device, terminal agent, or terminal device.
  • Radio access network It is a device that provides wireless communication functions for terminal devices.
  • the radio access network can be a network composed of multiple 5G-RAN nodes, which can realize wireless physical layer functions, resource scheduling and radio resource management, radio access control and mobility management functions.
  • the radio access network device is referred to as a base station for short below.
  • the application of the solution to the 5G system is taken as an example to introduce the specific details of the solution. It can be understood that when the solution is used in an LTE system or a future communication system, the names of devices and messages in the solution can be replaced with other devices and messages with corresponding functions, which is not limited in this application.
  • FIG. 2 a schematic flowchart of a security protection method is provided to protect communication security between a base station and a terminal.
  • the key generator generates a public key, and pre-sets the public key on the terminal, or sends the public key to the terminal.
  • the key generator generates a key for the base station, and sends the key to the base station.
  • S203 The base station generates a signature of the system message according to the key.
  • This signature can also be called a digital signature.
  • the system message is sent by the base station to the terminal through broadcasting.
  • the system information may be a master information block (master information block, MIB), a system information block (system information block, SIB) 1 or other system information (other system information, OSI).
  • the MIB includes some important and frequently transmitted parameters that the terminal needs to obtain from the accessed cell, such as: downlink bandwidth configuration, system frame number, etc.
  • SIB1 includes public land mobile network identifier, tracking area number, cell identifier, cell selection information, etc.
  • SIB6 SIB7, and SIB8 There are various system messages other than MIB and SIB1, such as SIB6, SIB7, and SIB8 for public safety alarms.
  • OSI is a general term for other system messages other than MIB and SIB1.
  • the system messages used to carry OSI can be called system messages.
  • Information (system information, SI) message One SI message can carry multiple OSIs.
  • the base station may generate a system message signature according to the key and a time counter (time counter) parameter.
  • the time counter parameter is used to prevent replay attacks, and the value of this parameter can be increased after each use.
  • This parameter can be carried in the system message.
  • S204 The base station sends a system message and a signature of the system message to the terminal.
  • S205 The terminal verifies the system message according to the signature of the system message.
  • the terminal verifies the signature of the system message according to the public key, and determines the legitimacy of the received system message.
  • the above method of generating and verifying signatures based on public key and key can be replaced by a method of generating and verifying signatures based on certificates.
  • a method of generating and verifying signatures based on certificates please refer to the existing 3GPP standard TR 33.809. This application does not limit the method of generating and verifying signatures.
  • Method 1 The system message and the signature of the system message are carried in one message.
  • Mode 2 The system message and the signature of the system message are carried in different messages. That is, the terminal receives the system message and the signature of the system message respectively through different messages.
  • the security protection method shown in FIG. 2 above or the signature in FIG. 2 above can be used not only to protect system messages sent by the base station to the terminal, but also to protect other broadcast messages (such as paging messages) sent by the base station to the terminal. It can also be used to protect unicast messages sent by the base station to the terminal.
  • the signature-protected broadcast message sent by the base station to the terminal will be introduced as an example.
  • the broadcast message includes the above-mentioned system message, paging message, and the like.
  • the following describes how to enable the terminal to accurately and flexibly receive the signature of the broadcast message sent by the base station, as shown in FIG. 3 .
  • S301 The base station sends a first broadcast message, and the terminal receives the first broadcast message.
  • the first broadcast message may be a MIB, SIB1, OSI, or paging message.
  • the first broadcast message may also be other broadcast messages that need to be protected by a signature, which is not limited in this application.
  • the base station sends information indicating the transmission resource of the signature, and the terminal receives the information.
  • This signature is used to protect or verify the first broadcast message. That is, the base station transmits information indicating the transmission resource of the signature of the first broadcast message.
  • the signature transmission resource refers to the time-frequency resource used to transmit the signature.
  • the information indicating the transmission resources of the signature may specifically indicate the time-frequency position of the transmission signature, so that the terminal can receive the signature at the corresponding time-frequency position; it may also indicate the time domain range and/or frequency domain range of the transmission signature, so that the terminal The time domain location and/or the frequency domain location of the transmission signature can be determined by blind detection within the time domain and/or the frequency domain.
  • the information about the transmission resource indicating the signature will be introduced later in detail.
  • the information indicating the transmission resource of the signature may be carried in the second broadcast message sent by the base station to the terminal.
  • the second broadcast message may be the same as or different from the first broadcast message.
  • S301 and S302 may be replaced by the base station sending the first broadcast message, and the terminal receiving the first broadcast message, where the first broadcast message includes information indicating signed transmission resources.
  • the base station sends a signature on the transmission resource corresponding to the information.
  • the terminal receives the signature sent by the base station on the transmission resource corresponding to the information. That is, the terminal receives the signature based on this information.
  • the signature is the aforementioned signature used to protect or verify the first broadcast message.
  • S304 The terminal verifies the first broadcast message according to the signature.
  • the terminal can know the transmission resource of the signature, so that it can accurately receive the signature sent by the base station on the transmission resource, and realize the separate transmission of the signature and the message protected by the signature , improving the flexibility of transport signatures.
  • the signature in S303 can be sent in multiple ways.
  • Sending method 1 The signature is carried in the system message.
  • the base station sends a system message on the foregoing transmission resource, where the system message includes the signature.
  • the terminal receives the system message according to the above information, and the system message includes the signature.
  • the system message in sending mode 1 is scheduled by SIB1, which may be one of OSI.
  • SIB1 may be one of OSI.
  • the system message may be used to transmit the signature only, or the system message may be used to transmit the signature and other information.
  • the signature may use a standard idle or unused system message (for example, spare2 or spare3) to transmit the signature, and a corresponding system message type may be named for the system message.
  • Sending method two the signature is carried in other broadcast messages.
  • broadcast messages refer to broadcast messages other than system messages.
  • a broadcast message may be added, and the newly added broadcast message is only used to transmit the signature, or is used to transmit the signature and other information.
  • Indication mode one indicating the time domain resource and/or frequency domain resource for sending the signature. That is, the information indicating the transmission resource of the signature includes time domain resource information and/or frequency domain resource information.
  • the time-domain resource information may be a time-domain location or a time-domain range.
  • the frequency domain resource information may be a frequency domain position or a frequency domain range.
  • the terminal can directly know at which time-domain location the signature is received according to the information.
  • the frequency domain resource information is a frequency domain position
  • the terminal can directly know at which frequency domain position the signature is received according to the information.
  • the time-domain resource information is the time-domain location, and the terminal can directly know the time of signature transmission, so that the terminal can only wake up and receive the signature at the time corresponding to the time-domain location, which reduces the wake-up time of the terminal and is conducive to energy saving of the terminal.
  • the terminal may perform blind detection within the time domain range, determine the time domain position for sending the signature, and receive the signature at the determined time domain position.
  • the terminal may perform blind detection within the frequency domain range, determine the frequency domain position for sending the signature, and receive the signature at the determined frequency domain position.
  • time-domain resource information and frequency-domain resource information can be indicated in different ways, for example, time-domain resource information is a time-frequency position, while frequency-domain resource information is a frequency-domain range; time-domain resource information and frequency-domain resource information Phase can also be used the same instruction.
  • the terminal may use a system information-radio network temporary identifier (SI-RNTI) to perform blind detection in the time domain range and/or frequency domain range to obtain a physical downlink control channel (physical downlink control channel). channel, PDCCH) transmission of downlink control information (downlink control information, DCI), so as to learn that the signature is sent through the time-frequency resource indicated by the DCI.
  • SI-RNTI system information-radio network temporary identifier
  • PDCCH physical downlink control channel
  • DCI downlink control information
  • the terminal can also blindly detect the PDCCH through a public scrambling code identifier, for example, a paging-radio network temporary identifier (P-RNTI), so as to learn the signed transmission
  • the information indicating the transmission resource of the signature may be carried in a system message, or a paging message, or other broadcast messages.
  • the signature transmission resource can be indicated in the following manner.
  • Indication method 2 Indicate the type of the system message carrying the signature. That is, the above information indicating the transmission resource of the signature includes the system message type.
  • the terminal can learn the transmission resource of the system message used to transmit the signature through the scheduling information in the SIB1. It can be understood that, based on this indication manner, the information indicating the transmission resource of the signature is carried in SIB1. Based on this indication manner, the terminal learns the transmission resource of the system message carrying the signature from the scheduling information of SIB1 according to the above system message type. Since the transmission resource is known based on the scheduling information of SIB1, it can be ensured that the transmission resource of the SI message carrying the system message does not overlap with the transmission resource of other messages, so that the terminal can accurately receive the signature on the corresponding transmission resource.
  • the second indication method also includes indicating the sending period of the signature. That is, the above information indicating the transmission resource of the signature also includes the sending period of the signature. It can be understood that, in addition to this, the terminal can also locally configure the sending period of the signature, which can be understood as a default sending period.
  • SIB1 includes SI scheduling information (si-SchedulingInfo), where the SI scheduling information includes SI window information and an information list of SI messages scheduled by the SIB1.
  • the information list includes information of each SI message scheduled by SIB1, and the information of the SI message includes the system message type carried by the SI message and the sending period of the SI message.
  • the terminal determines the sending window of the SI message according to the SI window information and the sending period of the above-mentioned SI message.
  • the terminal uses the SI-RNTI to perform blind detection on the PDCCH in the corresponding window, and determines the time slot for transmitting the SI message in the corresponding window.
  • SIB1 can have the following structure:
  • SIB1 may include si-SchedulingInfo and cell access information cellAccessRelatedInfo.
  • si-SchedulingInfo can have the following structure:
  • schedulingInfoList is the information list of SI messages scheduled by SIB1
  • si-WindowLength is SI window length.
  • schedulingInfoList can have the following structure:
  • the schedulingInfoList includes the scheduling information of two SI messages.
  • si-BroadcastStatus broadcasting indicates that the corresponding SI message is sent by broadcasting.
  • si-Periodicity indicates the transmission period of the corresponding SI message.
  • the terminal can determine the transmission resource of the SI message according to the sending period and the length of the above-mentioned SI window. For details of this process, refer to section 5.2.2.3.2 of the 3GPP standard TS 38.311.
  • sib-MappingInfo contains the type of system information carried by this SI message. That is to say, in this example, sibType2 and sibType3 respectively included in the two sib-MappingInfos in the first SI message indicate that the first SI message carries system messages SIB2 and SIB3.
  • the sending period of the SI message is 8 radio frames.
  • the above-mentioned second SI message carries the system message SIB5 and a system message whose type is sibType#, wherein the system message whose type is sibType# is a system message used to transmit the signature.
  • the type of the system message named sibType# is just an example, and the type of the system message may specifically be a currently idle or unused system message type, or may be a newly defined system message type.
  • the sending period of the SI message is 16 radio frames.
  • the starting position of the SI window where the SI message is located can be known.
  • the starting position of the SI window corresponding to the above-mentioned first SI message (denoted as SI1) is time slot (slot) #0 of system frame 0, and the SI window corresponding to the second SI message (denoted as SI2)
  • the starting position is slot#5 of system frame 0.
  • the terminal learns which slot the corresponding SI message is transmitted on by blindly detecting the PDCCH within the corresponding time window.
  • SI1 includes SIB2 and SIB3 messages in sequence
  • SI1 includes SIB2 and SIB3 messages in sequence
  • the terminal receives the SI1 message, it also receives the SIB2 and SIB3 carried by the SI message through the SI1 message.
  • the terminal knows which slot the SI1 message is transmitted on, it also knows the SIB2 carried by the SI1 message. and on which slot SIB3 is transmitted.
  • the sending period is a default value.
  • Fig. 4 shows a schematic flowchart of a method in which SIB1 carries information indicating signed transmission resources for security protection.
  • S401 The base station sends SIB1, and the terminal receives SIB1.
  • the SIB1 includes information indicating the transmission resources signed by the SIB1.
  • the SIB1 signature is used to protect or verify SIB1.
  • the transmission resource of the signature may be indicated by using the above-mentioned indication mode 1 or indication mode 2.
  • the transmission period of the signature can be indicated as 160ms in SIB1, or the transmission period can be 160ms by default, or The sending period of the signature can be set shorter, so as to reduce the waiting time for the terminal to obtain the information and reduce the time delay for the terminal to verify the SIB1.
  • the terminal After receiving the SIB1, the terminal acquires the information indicating the transmission resource of the signature in the SIB1.
  • the base station sends the first signature on the corresponding transmission resource, and the terminal receives the first signature according to the information indicating the transmission resource of the SIB1 signature.
  • the first signature is the above-mentioned SIB1 signature, that is, the signature used to verify or protect SIB1.
  • the corresponding transmission resource is the transmission resource corresponding to the information indicating the transmission resource of the SIB1 signature.
  • the first signature may be carried in the SI message or other broadcast messages.
  • S403 The terminal verifies the SIB1 according to the first signature.
  • the terminal can obtain the information in SIB1 indicating the transmission resource of the SIB1 signature, so as to know the transmission resource of the SIB1 signature. Based on this, the terminal can accurately receive the SIB1 signature sent by the base station on the transmission resource, and realize the SIB1 It is transmitted separately from the signature of SIB1, which improves the flexibility of transmitting the signature.
  • SIB1 includes information indicating the transmission resource of the OSI signature.
  • the OSI signature is used to protect or verify the OSI.
  • the transmission resource of the OSI signature may also be indicated by using the above indication mode 1 or indication mode 2. For details, reference may also be made to the content of S401.
  • S404 The base station sends the OSI, and the terminal receives the OSI.
  • the OSI is scheduled by the SIB1, that is, the terminal knows the transmission resource of the OSI according to the scheduling information in the SIB1, and receives the OSI according to the transmission resource.
  • the terminal knows the transmission resource of the OSI according to the scheduling information in the SIB1, and receives the OSI according to the transmission resource.
  • the base station sends the second signature on the corresponding transmission resource, and the terminal receives the second signature according to the information indicating the transmission resource of the OSI signature.
  • the second signature is the aforementioned OSI signature, that is, a signature used to verify or protect the OSI.
  • the corresponding transmission resource is the transmission resource corresponding to the information indicating the transmission resource of the OSI signature.
  • the second signature may be carried in the SI message or other broadcast messages.
  • S406 The terminal verifies the OSI according to the second signature.
  • the base station may generate a second signature according to the concatenated OSI, and the terminal may concatenate the received OSI, and then verify the concatenated OSI according to the second signature.
  • the cascading can be understood as combining various system messages included in the above OSI into a whole in sequence, and using this information as an input parameter for generating a signature.
  • the base station may also generate multiple signatures for each system message, that is, the second signature includes the multiple signatures.
  • the length of the signature is often fixed, generating a signature according to the concatenated OSI can save the total signature length compared to generating a signature for each system message contained in the OSI, thereby reducing the required signaling overhead.
  • the length of the signature is often fixed, specifically due to the commonly used signature algorithm, for details, please refer to the 3GPP standard TR 33.809, which will not be described here.
  • the terminal can obtain the information indicating the transmission resource of the OSI signature in SIB1, so as to know the transmission resource of the OSI signature. Based on this, the terminal can accurately receive the OSI signature sent by the base station on the transmission resource, and implement the OSI signature. It is transmitted separately from the OSI signature, which improves the flexibility of transmission signature.
  • SIB1 includes information indicating the transmission resource of the paging signature.
  • the paging signature is used to protect or verify paging messages.
  • the transmission resource of the paging signature may also be indicated by using the above indication mode 1 or indication mode 2.
  • indication mode 1 For details, reference may also be made to the content of S401.
  • the base station sends a paging message, and the terminal receives the paging message.
  • the base station sends the third signature on the corresponding transmission resource, and the terminal receives the third signature according to the information indicating the transmission resource of the paging signature.
  • the third signature is the above-mentioned paging signature, that is, a signature for verifying or protecting paging.
  • the corresponding transmission resource is the transmission resource corresponding to the information indicating the transmission resource of the paging signature.
  • the third signature may be carried in the SI message or other broadcast messages.
  • S409 The terminal verifies the paging message according to the third signature.
  • the terminal can obtain the information indicating the transmission resource of the paging signature in SIB1, so as to know the transmission resource of the paging signature. Based on this, the terminal can accurately receive the paging signature sent by the base station on the transmission resource, and realize the paging It is transmitted separately from the signature of paging, which improves the flexibility of transmission signature.
  • the above SIB1 may also contain information indicating transmission resources of multiple signatures at the same time, or the above SIB1 may contain information indicating transmission resources of signatures, and the signatures are used to protect various broadcast messages.
  • the SIB1 includes both the information indicating the transmission resource of the SIB1 signature and the information indicating the transmission resource of the OSI signature
  • the above S401 to S403 and S404 to S406 are executed.
  • the SIB1 includes information indicating the transmission resource of the OSI signature and information indicating the transmission resource of the paging signature
  • the above S401, S404 to S406, and S407 to S409 are performed. Based on this, the terminal can learn the signed transmission resources of multiple broadcast messages through the SIB1, which improves the efficiency of the terminal learning the signed transmission resources.
  • the above describes the situation that the information indicating the transmission resource of the signature is carried in SIB1.
  • the following introduces the situation that the information indicating the transmission resource of the signature is carried in the OSI or carried in the SI message carrying the OSI based on the flow in FIG. 4 above.
  • the information indicating the transmission resource of the OSI signature may not be carried in the SIB1, but carried in the OSI, or carried in the SI message used to bear the OSI.
  • the OSI here is the OSI to be protected or verified by the OSI signature.
  • the OSI in S404 includes information indicating the transmission resource of the OSI signature; or the SI message used to carry the OSI in S404 includes information indicating the transmission resource of the OSI signature.
  • the base station does not need to send the information indicating the transmission resources of the OSI signature when the OSI is not transmitted, and the terminal does not need to receive the information, but only when the OSI is transmitted, the base station needs to send the transmission indicating the OSI signature together with the OSI Resource information, the terminal will learn the transmission resource information indicating the OSI signature when receiving the OSI, which reduces unnecessary signaling transmission.
  • the information indicating the transmission resource of the OSI signature may not be carried in the SIB1, but carried in the OSI, or carried in the SI message used to carry the OSI.
  • the OSI here is not the OSI to be protected or verified by the OSI signature.
  • the SIB2 or the SI message carrying the SIB2 includes the information indicating the transmission resource of the SIB3 signature. Based on this approach, the information indicating the transmission resource of the signature can be transmitted more flexibly.
  • the information indicating the transmission resource of the OSI signature can be carried in the same message as the signature of SIB1.
  • the information indicating the transmission resource of the paging signature may not be carried in the SIB1, but carried in the OSI, or carried in the broadcast message used to carry the OSI.
  • the OSI in S404 includes information indicating the transmission resource of the paging signature; or the SI message used to carry the OSI in S404 includes information indicating the transmission resource of the paging signature.
  • the above S407 to S409 are executed after the above S404.
  • the information indicating the transmission resources of the paging signature may be carried in the same message as the signature of SIB1.
  • the information indicating the transmission resource of the paging signature can be carried in the same message as the OSI signature.
  • the above-mentioned OSI or SI message carrying OSI may include information indicating transmission resources of multiple signatures, or the above-mentioned OSI or SI message carrying OSI may contain information indicating transmission resources of signatures, and the signatures are used to protect various broadcasting resources. information.
  • the OSI includes both the information indicating the transmission resource of the OSI signature and the information indicating the transmission resource of the paging signature, perform the above S401, S404 to S406 and S407 to S409
  • the SIB1 also includes information indicating the transmission resource of the SIB1 signature
  • S402 and S403 are also executed.
  • the signaling load of SIB1 is reduced, and the information indicating the transmission resource of the signature can be transmitted more flexibly.
  • the following introduces the situation that the information indicating the transmission resource of the signature is carried in the paging message based on the flow in FIG. 4 above.
  • the information indicating the transmission resource of the paging signature may not be carried in the SIB1, but carried in the paging message.
  • the paging message in S407 includes information indicating the transmission resource of the paging signature. That is, S407 to S409 are executed after the above S401.
  • SIB1 includes information indicating the transmission resource of the SIB1 signature
  • OSI includes information indicating the transmission resource of the paging signature
  • S402, S403, and S404 to S406 are also performed.
  • the base station does not need to send the information indicating the transmission resource of the paging signature when the paging is not transmitted, and the terminal does not need to receive the information, but only when the paging is transmitted, the base station needs to send the information indicating the transmission resource of the paging signature Information, the terminal will know the information when it receives the paging, which reduces unnecessary signaling transmission.
  • the above process also includes:
  • S410 The base station sends a notification of system information change, and the terminal receives the notification.
  • the base station may send a notification of system information change in the following manner.
  • Method 1 The base station sends a DCI with a format of 1_0 to the terminal, the DCI includes a short message (Short Message), and the short message includes a system information change (systemInfoModification) field and an earthquake and tsunami warning system and commercial mobile early warning system indication (etwsAndCmasIndication) field .
  • systemInfoModification is used to indicate that system information other than SIB6, SIB7, and SIB8 has changed.
  • the etwsAndCmasIndication field is used to indicate that SIB6, SIB7, and SIB8 have changed.
  • the terminal directly learns the changed OSI through the short message.
  • Method 2 The base station sends SIB1 to the terminal.
  • the sib-MappingInfo in the SIB1 includes a value tag (valueTag) field, and the valueTag field is used to indicate that the system message corresponding to the sib-MappingInfo has changed.
  • the terminal learns the changed OSI through the change of the valueTag value.
  • S411 The base station sends the changed OSI, and the terminal receives the changed OSI.
  • the terminal may only receive the changed OSI according to the changed OSI learned in S410.
  • S412 The base station sends the fourth signature, and the terminal receives the fourth signature.
  • This fourth signature is used to protect or verify the updated OSI.
  • the fourth signature is generated according to the changed OSI and the above other OSIs that have not changed.
  • the base station may not send information indicating the transmission resource of the fourth signature, and in this case, it may be considered that the fourth signature uses the same transmission resource as the second signature. Based on this method, the signaling overhead required for re-indicating the transmission resource of the signature can be reduced, and the terminal can avoid reconfirming the transmission resource of the signature, saving the processing resources of the terminal.
  • the base station may indicate the information of the transmission resource of the fourth signature.
  • the base station may indicate the information of the transmission resource of the fourth signature. For details, reference may be made to the above information indicating the transmission resource of the second signature, and details are not described here.
  • S413 The terminal verifies the OSI carried in the updated SI message according to the fourth signature.
  • the terminal may concatenate the changed OSI in the updated SI with the unchanged OSI stored in the terminal, and verify the concatenated OSI according to the fourth signature.
  • the terminal can obtain the fourth signature based on the above S412 and S413, and verify the changed OSI according to the fourth signature.
  • FIG. 5 is a communication device provided by an embodiment of the present application, which can be used to implement functions of the base station in FIGS. 2 to 4, for example.
  • FIG. 5 is a schematic structural diagram of a communication device 500 provided by an embodiment of the present application.
  • the communication device 500 includes one or more processors 501, communication lines 502, and at least one communication interface (in FIG. 5, it is only exemplary to include a communication interface 503 and a processor 501 for illustration), and optional can also include memory 504 .
  • the processor 501 can be a general-purpose central processing unit (central processing unit, CPU), a microprocessor, a specific application integrated circuit (application-specific integrated circuit, ASIC), or one or more for controlling the execution of the application program program integrated circuit.
  • CPU central processing unit
  • ASIC application-specific integrated circuit
  • Communication lines 502 are used to connect the various components.
  • the communication interface 503 may be a transceiver module for communicating with other devices or communication devices or communication networks, such as Ethernet.
  • the transceiver module may be a network card or an optical fiber switching device.
  • the communication interface 503 may also be a transceiver circuit located in the processor 501 to realize signal input and signal output of the processor.
  • the memory 504 may be a device having a storage function.
  • it can be a read-only memory (read-only memory, ROM) or other types of static storage devices that can store static information and instructions, random access memory (random access memory, RAM) or other types of dynamic storage devices that can store information and instructions, can also be electrically erasable and programmable Electrically erasable programmable read-only memory (EEPROM), compact disc read-only memory (CD-ROM) or other optical disc storage, optical disc storage (including compact disc, laser disc, optical disc, digital versatile disc , Blu-ray Disc, etc.), disk storage media or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer, without limitation.
  • the memory may exist independently and be connected to the processor through the communication line 502 . Memory can also be integrated with the processor.
  • the memory 504 is used to store computer-executed instructions for implementing the solutions of the present application, and the execution is controlled by the processor 501 .
  • the processor 501 is configured to execute the computer-executed instructions stored in the memory 504, so as to realize the function of the first network element in the first embodiment of the present application, or the function of the first network element in the second embodiment, or the first network element in the third embodiment.
  • the computer-executed instructions in the embodiments of the present application may also be referred to as application program codes, which is not specifically limited in the embodiments of the present application.
  • the processor 501 may include one or more CPUs, for example, CPU0 and CPU1 in FIG. 5 .
  • the communication device 500 may include multiple processors, for example, the processor 501 and the processor 505 in FIG. 5 .
  • Each of these processors may be a single-core (single-CPU) processor or a multi-core (multi-CPU) processor.
  • a processor herein may refer to one or more devices, circuits, and/or processing cores for processing data (eg, computer program instructions).
  • the aforementioned communication device 500 may be a general-purpose device or a dedicated device.
  • the communication device 500 may be a network server, an embedded device or a device having a structure similar to that shown in FIG. 5 .
  • the embodiment of the present application does not limit the type of the communication device 500 .
  • the methods and/or steps implemented by the base station may also be implemented by a chip system that implements the functions of the base station.
  • FIG. 6 is a communication device provided by an embodiment of the present application, which can be used to realize functions of terminals in FIGS. 2 to 4 , for example.
  • FIG. 6 is a schematic structural diagram of a communication device 600 provided by an embodiment of the present application.
  • the communication device 600 includes one or more processors 601, a communication line 602, and at least one communication interface (in FIG.
  • the memory 604 may also be included.
  • the processor 601 can be a general-purpose central processing unit (central processing unit, CPU), a microprocessor, a specific application integrated circuit (application-specific integrated circuit, ASIC), or one or more for controlling the execution of the application program program integrated circuit.
  • CPU central processing unit
  • ASIC application-specific integrated circuit
  • Communication lines 602 are used to connect the various components.
  • the communication interface 603 may be a transceiver module for communicating with other devices or communication devices or communication networks, such as Ethernet, RAN, wireless local area networks (wireless local area networks, WLAN) and the like.
  • the transceiver module may be a device such as a transceiver, a transceiver, or a network card or an optical fiber switching device.
  • the communication interface 603 may also be a transceiver circuit located in the processor 601 to realize signal input and signal output of the processor.
  • the memory 604 may be a device having a storage function.
  • it may be a read-only memory (ROM) or other type of static storage device that can store static information and instructions, a random access memory (random access memory, RAM) or other types of memory that can store information and instructions
  • Dynamic storage device also can be electrically erasable programmable read-only memory (electrically erasable programmable read-only memory, EEPROM), CD-ROM (compact disc read-only memory, CD-ROM) or other optical disc storage, optical disc storage (including compact discs, laser discs, optical discs, digital versatile discs, Blu-ray discs, etc.), magnetic disk storage media or other magnetic storage devices, or can be used Any other medium capable of carrying or storing desired program code in the form of instructions or data structures and capable of being accessed by a computer, but not limited thereto.
  • the memory may exist independently and be connected to the processor through the communication line 602 . Memory can also be integrated with the processor.
  • the memory 604 is used to store computer-executed instructions for implementing the solution of the present application, and the execution is controlled by the processor 601 .
  • the processor 601 is configured to execute computer-executed instructions stored in the memory 604, so as to implement the functions of the first terminal device in Embodiment 4 of the present application, or the functions of the first device in Embodiment 5 of the present application.
  • the computer-executed instructions in the embodiments of the present application may also be referred to as application program codes, which is not specifically limited in the embodiments of the present application.
  • the communication apparatus 600 may further include an output device 66 and an input device 607 .
  • Output device 606 is in communication with processor 601 and can display information in a variety of ways.
  • the processor 601 may include one or more CPUs, for example, CPU0 and CPU1 in FIG. 6 .
  • the communications apparatus 600 may include multiple processors, for example, the processor 601 and the processor 605 in FIG. 6 .
  • Each of these processors may be a single-core (single-CPU) processor or a multi-core (multi-CPU) processor.
  • a processor herein may refer to one or more devices, circuits, and/or processing cores for processing data (eg, computer program instructions).
  • the aforementioned communication device 600 may be a general-purpose device or a dedicated device.
  • the communication device 600 may be a network server, an embedded device, a desktop computer, a portable computer, a mobile phone, a tablet computer, a wireless terminal device or a device having a structure similar to that shown in FIG. 6 .
  • the embodiment of the present application does not limit the type of the communication device 600 .
  • the methods and/or steps implemented by the terminal may also be implemented by a chip system that implements the above terminal functions.
  • FIG. 7 is a communication device provided by an embodiment of the present application, which can be used to implement functions of the base station in FIGS. 2 to 4, for example.
  • the functional units of the communication device may be divided.
  • each functional unit may be divided corresponding to each function, or two or more units may be integrated into one processing module.
  • the above-mentioned integrated units can be implemented in the form of hardware or in the form of software function modules. It should be noted that the division of units in the embodiment of the present application is schematic, and is only a logical function division, and there may be another division manner in actual implementation.
  • FIG. 7 is a schematic structural diagram of a communication device 700 provided by an embodiment of the present application.
  • the communication device 700 includes a processing unit 701 and a transceiver unit 702 .
  • the processing unit 701 is specifically used for: S203, and the function of generating a signature in S303, S402, S405, and S408.
  • the transceiver unit 702 is specifically configured to: the base station in FIG. 2 to FIG. 4 sends a broadcast message, sends information indicating a sending resource of a signature, sends a signature, and other functions.
  • the functions/implementation process of the transceiver unit 702 and the processing unit 701 in FIG. 7 can be implemented by the processor 501 in the communication device 500 shown in FIG. 5 invoking computer-executed instructions stored in the memory 504 .
  • the function/implementation process of the processing unit 701 in FIG. 7 can be realized by the processor 501 in the communication device 500 shown in FIG. /The implementation process can be implemented through the communication interface 503 in the communication device 500 shown in FIG. 5 .
  • FIG. 8 is a communication device provided by an embodiment of the present application, which can be used to implement, for example, the functions of the terminal in FIGS. 2 to 4 .
  • the functional units of the communication device may be divided.
  • each functional unit may be divided corresponding to each function, or two or more units may be integrated into one processing module.
  • the above-mentioned integrated units can be implemented in the form of hardware or in the form of software function modules. It should be noted that the division of units in the embodiment of the present application is schematic, and is only a logical function division, and there may be another division manner in actual implementation.
  • FIG. 8 is a schematic structural diagram of a communication device 800 provided by an embodiment of the present application.
  • the communication device 800 includes a processing unit 801 and a transceiver unit 802 .
  • the processing unit 801 is specifically used for the function of verifying the broadcast message according to the signature in S205, S304, S403, S406, and S409, and may also be used for the function of obtaining the sending resource of the signature in S302 and FIG. 4 .
  • the transceiver unit 802 is specifically configured to: the terminal in FIGS. 2 to 4 receives broadcast messages, receives information indicating sending resources for signatures, receives signatures, and other functions.
  • the functions/implementation process of the transceiver unit 802 and the processing unit 801 in FIG. 8 can be implemented by the processor 601 in the communication device 600 shown in FIG. 6 invoking computer-executed instructions stored in the memory 604 .
  • the function/implementation process of the processing unit 801 in FIG. 8 can be realized by the processor 601 in the communication device 600 shown in FIG. /The implementation process can be implemented through the communication interface 603 in the communication device 600 shown in FIG. 6 .
  • all or part of them may be implemented by software, hardware, firmware or any combination thereof.
  • a software program it may be implemented in whole or in part in the form of a computer program product.
  • the computer program product includes one or more computer instructions.
  • the computer program instructions When the computer program instructions are loaded and executed on the computer, the processes or functions according to the embodiments of the present application will be generated in whole or in part.
  • the computer can be a general purpose computer, a special purpose computer, a computer network, or other programmable devices.
  • the computer instructions may be stored in or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transmitted from a website, computer, server, or data center Transmission to another website site, computer, server or data center by wired (such as coaxial cable, optical fiber, digital subscriber line (DSL)) or wireless (such as infrared, wireless, microwave, etc.).
  • the computer-readable storage medium may be any available medium that can be accessed by a computer, or may be a data storage device including one or more servers, data centers, etc. that can be integrated with the medium.
  • the available medium may be a magnetic medium (such as a floppy disk, a hard disk, or a magnetic tape), an optical medium (such as a DVD), or a semiconductor medium (such as a solid state disk (solid state disk, SSD)), etc.
  • the computer may include the aforementioned apparatus.

Abstract

本申请公开了一种通信方法、装置。本申请的方案中,基站向终端发送第一广播消息,基站向终端发送指示第一签名的传输资源的信息,该第一签名用于校验第一广播消息,终端根据该信息获知第一签名的传输资源,从而能够准确的接收第一签名,然后根据该第一签名对第一广播消息进行校验。

Description

通信方法、通信装置和系统 技术领域
本申请涉及无线通信技术领域,更具体地,涉及一种通信方法、通信装置和系统。
背景技术
当终端与基站之间还没有建立安全上下文时,基站发送给终端的消息可能被伪基站窃取和仿冒,伪基站可能借此与终端进行交互,窃取隐私信息,存在安全隐患。
在一些通信技术中,基站为发送给终端的消息生成签名等保护信息,终端接收到基站发送的消息和消息的保护信息后,通过保护信息验证该消息的合法性。然而,终端如何接收该保护信息,还没有明确的方案。
发明内容
本申请提出一种通信方法、通信装置,使终端能够准确灵活的接收基站发送的消息的保护信息。
第一方面,提供了一种通信方法,该方法可以由基站执行,该方法包括:接收第一广播消息;接收指示第一签名的传输资源的信息,第一签名用于校验第一广播消息;根据指示第一签名的传输资源的信息接收第一签名;根据第一签名校验第一广播消息。
在该方法中,终端接收指示签名的传输资源的信息,使得终端能够获知签名的传输资源,从而可以准确的在该传输资源上接收基站发送的签名,实现了签名与签名所保护的消息分开传输,提高了传输签名的灵活性。
在一些实现方式中,根据指示第一签名的传输资源的信息接收第一签名包括:根据指示第一签名的传输资源的信息接收系统消息,该系统消息包括第一签名。
在一些实现方式中,指示第一签名的传输资源的信息包括:系统消息的类型。
在一些实现方式中,指示第一签名的传输资源的信息还包括:第一签名的发送周期。
在一些实现方式中,指示第一签名的传输资源的信息包括:时域资源信息和/或频域资源信息。
当时域资源信息为时域位置,终端可以直接获知传输签名的时间,从而终端可以只在该时域位置对应的时刻唤醒并接收签名,减少了终端唤醒的时间,有利于终端的节能。
在一些实现方式中,根据指示第一签名的传输资源的信息接收第一签名包括:在时域资源信息和/或频域资源信息所指示的范围内进行盲检,确定第一签名的传输资源,在所确定的传输资源上接收第一签名。
在一些实现方式中,接收指示第一签名的传输资源的信息包括:接收第二广播消息,第二广播消息包括指示第一签名的传输资源的信息。
在一些实现方式中,第二广播消息为系统信息块1。
在一些实现方式中,第一广播消息为系统信息块1、其他系统信息OSI、或者寻呼消息。
在一些实现方式中,方法,第二广播消息为用于携带系统信息块1的签名的广播消息或者第二广播消息为OSI。
在一些实现方式中,第一广播消息为OSI、或寻呼消息。
在一些实现方式中,第二广播消息为用于携带OSI的签名的广播消息或者第二广播消息为寻呼消息。
在一些实现方式中,第一广播消息为寻呼消息。
在一些实现方式中,当第一广播消息为OSI时,根据第一签名校验第一广播消息包括:级联OSI,根据第一签名校验级联的OSI。
第二方面,提供了一种通信方法,该方法可以由终端执行,该方法包括:向终端发送第一广播消息;向终端发送指示第一签名的传输资源的信息,第一签名用于校验第一广播消息;在指示第一签名的传输资源的信息所对应的传输资源上向终端发送第一签名。
在该方法中,基站发送指示签名的传输资源的信息,使得终端能够获知签名的传输资源,从而使终端可以准确的在该传输资源上接收基站发送的签名,实现了签名与签名所保护的消息分开传输,提高了传输签名的灵活性。
在一些实现方式中,在指示第一签名的传输资源的信息所对应的传输资源上向终端发送第一签名包括:在传输资源上向终端发送系统消息,系统消息包括第一签名。
在一些实现方式中,指示第一签名的传输资源的信息包括:系统消息的类型。
在一些实现方式中,指示第一签名的传输资源的信息还包括:第一签名的发送周期。
在一些实现方式中,指示第一签名的传输资源的信息包括:时域资源信息和/或频域资源信息。
当时域资源信息为时域位置,终端可以直接获知传输签名的时间,从而终端可以只在该时域位置对应的时刻唤醒并接收签名,减少了终端唤醒的时间,有利于终端的节能。
在一些实现方式中,向终端发送指示第一签名的传输资源的信息包括:向终端发送第二广播消息,第二广播消息包括指示第一签名的传输资源的信息。
在一些实现方式中,第二广播消息为系统信息块1。
在一些实现方式中,第一广播消息为系统信息块1、其他系统消息OSI、或者寻呼消息。
在一些实现方式中,第二广播消息为用于携带系统信息块1的签名的广播消息或者第二广播消息为OSI。
在一些实现方式中,第一广播消息为OSI、或寻呼消息。
在一些实现方式中,第二广播消息为用于携带OSI的签名的广播消息或者第二广播消息为寻呼消息。
在一些实现方式中,第一广播消息为寻呼消息。
在一些实现方式中,当第一广播消息为OSI时,该方法还包括:级联OSI,根据级联的OSI生成第一签名。
第三方面,提供了一种通信装置,该通信装置具有实现第一方面,或第一方面的任一可能的实现方式中的方法的功能。所述功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。所述硬件或软件包括一个或多个与上述功能相对应的单元。
第四方面,提供一种通信装置,该通信装置具有实现第二方面,或第二方面中的任一可能的实现方式中的方法的功能。所述功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。所述硬件或软件包括一个或多个与上述功能相对应的单元。
第五方面,提供一种通信装置,包括处理器和存储器。可选地,还可以包括收发器。其中,存储器用于存储计算机程序,处理器用于调用并运行存储器中存储的计算机程序,并控制收发器收发信号,以使通信装置执行如第一方面,或第一方面中的任一可能的实现方式中的方法。
示例性地,该通信装置为本申请实施例中的基站。
第六方面,提供一种通信装置,包括处理器和存储器。可选地,还可以包括收发器。其 中,存储器用于存储计算机程序,处理器用于调用并运行存储器中存储的计算机程序,并控制收发器收发信号,以使通信装置执行如第二方面,或第二方面中的任一可能的实现方式中的方法。
示例性地,该通信装置为本申请实施例中的终端。
第七方面,提供一种计算机可读存储介质,所述计算机可读存储介质中存储有计算机指令,当计算机指令在计算机上运行时,使得如第一方面,或第一方面中的任一可能的实现方式中的方法被执行;或如第二方面,或第二方面中的任一可能的实现方式中的方法被执行。
第八方面,提供一种计算机程序产品,所述计算机程序产品包括计算机程序代码,当所述计算机程序代码在计算机上运行时,使得如第一方面,或第一方面中的任一可能的实现方式中的方法被执行;或如第二方面,或第二方面中的任一可能的实现方式中的方法被执行。
附图说明
图1为本申请实施例提供的一种用于SI消息的传输资源的示意图;
图2为本申请实施例提供的一种安全保护方法的流程示意图;
图3为本申请实施例提供的一种通信方法的流程示意图;
图4为本申请实施例提供的一种通信方法的流程示意图;
图5为本申请实施例提供的一种通信装置的结构示意图;
图6为本申请实施例提供的另一种通信装置的结构示意图;
图7为本申请实施例提供的又一种通信装置的结构示意图;
图8为本申请实施例提供的再一种通信装置的结构示意图。
具体实施方式
下面将结合附图,对本申请实施例进行详细描述。
本申请实施例的方法可以应用于长期演进技术(long term evolution,LTE)系统,长期演进高级技术(long term evolution-advanced,LTE-A)系统,增强的长期演进技术(enhanced long term evolution-advanced,eLTE),第五代(the 5th Generation,5G)移动通信系统新空口(New Radio,NR)系统,也可以扩展到类似的无线通信系统中,如无线保真(wireless-fidelity,WiFi),全球微波互联接入(worldwide interoperability for microwave access,WIMAX),以及第三代合作伙伴计划(3rd generation partnership project,3gpp)相关的蜂窝系统。
下面对本申请涉及的终端和无线接入网的功能进行如下面的说明。
终端:也可以称为用户设备(user equipment,UE)、接入终端、终端设备单元(subscriber unit)、终端设备站、移动站、移动台(mobile station,MS)、远方站、远程终端、移动设备、用户终端、终端(terminal)、无线通信设备、终端设备代理或终端设备装置。
无线接入网(radio access network,RAN):是一种为终端设备提供无线通信功能的设备。无线接入网在5G系统中可以是由多个5G-RAN节点组成的网络,实现无线物理层功能、资源调度和无线资源管理、无线接入控制以及移动性管理功能。下面将无线接入网设备简称为基站。
接下来以方案应用于5G系统为例介绍具体的方案细节。可以理解的是,当该方案用于LTE系统,或者未来通信系统,方案中的各设备以及消息名称可以替换为具有相应功能的其他设备和具有相应功能的消息,本申请对此不作限定。
基于上述网络架构,基站和终端建立安全上下文之前,基站与终端之间的通信存在安全风险,基站发送给终端的消息可能被伪基站劫持。如图2所示提供了一种安全保护方法的流程示意图,以保护基站和终端之间的通信安全。
S201:密钥生成器生成公钥,并将公钥预置在终端上,或者将公钥发送给终端。
S202:密钥生成器为基站生成密钥,并将密钥发送给基站。
S203:基站根据该密钥生成系统消息的签名。
该签名也可以称为数字签名。
系统消息由基站通过广播方式发送给终端。系统消息可以是主信息块(master information block,MIB)、系统信息块(system information block,SIB)1或者其他系统信息(other system information,OSI)。MIB包括终端需要从接入的小区中获得的部分重要和频繁传输的参数,例如:下行带宽配置、系统帧数字等。SIB1包括公用陆地移动网标识、跟踪区编号、小区标识、小区选择信息等。MIB和SIB1之外还有多种系统消息,例如用于公共安全告警的SIB6,SIB7,SIB8,OSI是MIB和SIB1之外的其他系统消息的统称,用于承载OSI的系统消息可以称为系统信息(system information,SI)消息。一个SI消息可以承载多个OSI。
可选的,基站可以根据该密钥和时间计数器(time counter)参数生成系统消息的签名。其中,time counter参数用于防止重放攻击,该参数的值可以在每次使用后增加。该参数可以携带在系统消息中。
S204:基站向终端发送系统消息和系统消息的签名。
S205:终端根据系统消息的签名校验系统消息。
具体的,终端根据公钥对系统消息的签名进行验证,确定所接收的系统消息的合法性。
可以理解的是,此处的合法性可以理解为该系统消息来自合法的基站,或者可以理解为该系统消息可信任。此处的合法性还可以理解为该系统消息完整。
上述基于公钥和密钥生成和验证签名的方式可以替换为基于证书生成和验证签名的方式,具体可参考现有3GPP标准TR 33.809,本申请对生成和验证签名的方式不作限定。
上述S204可以有两种实现方式:
方式一:系统消息和系统消息的签名携带在一条消息中。
方式二:系统消息和系统消息的签名携带在不同的消息中。也就是终端通过不同的消息分别接收系统消息和系统消息的签名。
上述图2所示的安全保护方法或者上述图2中的签名不仅可以用于保护基站向终端发送的系统消息,也可以用于保护基站向终端发送的其他广播消息(例如寻呼paging消息),也可以用于保护基站向终端发送的单播消息。下面以签名保护的是基站发送给终端的广播消息为例进行介绍,该广播消息包括上述系统消息、paging消息等。
基于上述方式二,下面介绍如何使终端能够准确灵活的接收基站发送的广播消息的签名,如图3所示。
S301:基站发送第一广播消息,终端接收第一广播消息。
该第一广播消息可以是MIB、SIB1、OSI、或寻呼消息。第一广播消息还可以是其他需要通过签名保护的广播消息,本申请对此不作限定。
S302:基站发送指示签名的传输资源的信息,终端接收该信息。
该签名用于保护或者校验第一广播消息。也就是说,基站发送指示第一广播消息的签名的传输资源的信息。
签名的传输资源指的是用于传输签名的时频资源。指示签名的传输资源的信息具体可以指示传输签名的时频位置,从而使终端可以在相应的时频位置上接收签名;也可以指示传输签名的时域范围和/或频域范围,从而使终端可以在时域范围和/或频域范围内通过盲检确定传输签名的时域位置和/或频域位置。关于指示签名的传输资源的信息,后文还将展开具体介绍。
可选的,指示签名的传输资源的信息可以携带在基站发送给终端的第二广播消息中。该第二广播消息可以与第一广播消息相同或者不同。当第二广播消息与第一广播消息相同时,S301和S302可以替换为基站发送第一广播消息,终端接收第一广播消息,该第一广播消息包括指示签名的传输资源的信息。
S303:基站在该信息所对应的传输资源上发送签名。相应的,终端接收基站在该信息所对应的传输资源上发送的签名。也就是说,终端根据该信息接收签名。
该签名即上述用于保护或者校验第一广播消息的签名。
S304:终端根据该签名校验第一广播消息。
通过上述S302中终端接收到的指示签名的传输资源的信息,终端能够获知签名的传输资源,从而可以准确的在该传输资源上接收基站发送的签名,实现了签名与签名所保护的消息分开传输,提高了传输签名的灵活性。
下面对图3的上述过程展开进一步介绍。
具体的,S303中的签名可以有多种发送方式。
发送方式一:该签名携带在系统消息中。
也就是说,基站在上述传输资源上发送系统消息,该系统消息包括该签名。终端根据上述信息接收系统消息,该系统消息包括该签名。
发送方式一中的系统消息由SIB1调度,可以是OSI中的一种。该系统消息可以只用于传输签名,或者该系统消息可以用于传输签名和其他信息。示例性的,该签名可以使用标准中空闲的或者未使用的系统消息(例如spare2或者spare3)来传输签名,且可以为该系统消息命名相应的系统消息类型。
发送方式二:该签名携带在其他广播消息中。
其他广播消息指的是系统消息以外的广播消息。例如可以新增一种广播消息,该新增的广播消息只用于传输签名,或者用于传输签名和其他信息。
具体的,上述S302中,签名的传输资源可以有多种指示方式。
指示方式一:指示发送签名的时域资源和/或频域资源。也就是指示签名的传输资源的信息包括时域资源信息和/或频域资源信息。
时域资源信息可以是时域位置或时域范围。频域资源信息可以是频域位置或频域范围。
当时域资源信息为时域位置时,终端可以根据该信息直接获知在哪个时域位置接收签名。类似的,当频域资源信息为频域位置时,终端可以根据该信息直接获知在哪个频域位置接收签名。当时域资源信息为时域位置,终端可以直接获知传输签名的时间,从而终端可以只在该时域位置对应的时刻唤醒并接收签名,减少了终端唤醒的时间,有利于终端的节能。
当时域资源信息为时域范围时,终端可以在该时域范围内进行盲检,确定发送签名的时域位置,在所确定的时域位置上接收签名。类似的,当频域资源信息为频域范围时,终端可以在该频域范围内进行盲检,确定发送签名的频域位置,在所确定的频域位置上接收签名。
可以理解的是,时域资源信息和频域资源信息可以采用不同的指示方式,例如时域资源信息为时频位置,而频域资源信息为频域范围;时域资源信息和频域资源信息也可以采用相 同的指示方式。示例性的,终端可以在该时域范围和/或频域范围内使用系统信息无线网络临时标识(system information-radio network temporary identifier,SI-RNTI)进行盲检获得物理下行控制信道(physical downlink control channel,PDCCH)传输的下行控制信息(downlink control information,DCI),从而获知签名是通过DCI所指示的时频资源发送的。类似的,终端还可以通过公共扰码标识,例如,寻呼无线网络临时标识(paging-radio network temporary identifier,P-RNTI),盲检PDCCH,从而通过DCI获知签名的传输资源。
基于这种指示方式,指示签名的传输资源的信息可以携带在系统消息、或者寻呼消息、或者其他广播消息中。
当签名的发送采用发送方式一时,签名的传输资源可以通过下面的方式来指示。
指示方式二:指示携带签名的系统消息类型。也就是上述指示签名的传输资源的信息包括系统消息类型。
由于系统消息由SIB1调度,终端可以通过SIB1中的调度信息获知用于传输签名的该系统消息的传输资源。可以理解的是,基于这种指示方式,指示签名的传输资源的信息携带在SIB1中。基于这种指示方式,终端根据上述系统消息类型从SIB1的调度信息中获知携带签名的该系统消息的传输资源。由于该传输资源基于SIB1的调度信息获知,可以保证承载了该系统消息的SI消息的传输资源不与其他消息的传输资源重叠,使终端能够准确的在相应的传输资源上接收到签名。
可选的,指示方式二还包括指示签名的发送周期。也就是上述指示签名的传输资源的信息还包括签名的发送周期。可以理解的是,除此之外,终端也可以本地配置签名的发送周期,该发送周期可以理解为默认的发送周期。
示例性的,SIB1包括SI调度信息(si-SchedulingInfo),该SI调度信息包括SI窗口信息和该SIB1所调度的SI消息的信息列表。该信息列表包括SIB1所调度的各SI消息的信息,SI消息的信息包括该SI消息所承载的系统消息类型、以及该SI消息的发送周期。终端根据SI窗口信息和上述SI消息的发送周期确定SI消息的发送窗口。终端在相应的窗口使用SI-RNTI对PDCCH进行盲检,确定相应窗口中传输SI消息的时隙。
下面,结合3GPP标准TS 38.331对上述指示方式二进行示例性说明。
SIB1可以具有如下的结构:
也就是说,SIB1可以包括si-SchedulingInfo,以及小区接入信息cellAccessRelatedInfo。
其中,si-SchedulingInfo可以具有如下结构:
其中,schedulingInfoList为SIB1所调度的SI消息的信息列表,si-WindowLength为 SI窗口长度。
其中,schedulingInfoList可以具有如下结构:
其中,该schedulingInfoList包含两个SI消息的调度信息。si-BroadcastStatus:broadcasting表示相应的SI消息通过广播方式发送。si-Periodicity指示相应的SI消息的发送周期。终端可以根据该发送周期以及上述SI窗口长度,确定SI消息的传输资源,该过程具体可参见3GPP标准TS 38.311的5.2.2.3.2章节。sib-MappingInfo包含该SI消息所承载的系统消息的类型。也就是说,在这个例子中,上述第一个SI消息中两个sib-MappingInfo中分别包括的sibType2和sibType3表示:上述第一个SI消息承载了系统消息SIB2和SIB3。此外,根据si-Periodicity的值为rf8可以获知:该SI消息的发送周期为8个无线帧。类似的,上述第二个SI消息承载了系统消息SIB5和一种类型为sibType#的系统消息,其中,类型为sibType#的系统消息为用于传输签名的系统消息。该系统消息的类型命名为sibType#仅为一种示例,该系统消息的类型具体可以是当前空闲的或者未使用的系统消息类型,或者可以是新定义的系统消息类型。此外,该SI消息的发送周期为16个无线帧。
基于上述例子,如图1所示,基于上述si-WindowLength字段和SI消息所对应的si-Periodicity字段的信息,可以获知SI消息所在的SI窗口的起始位置。示例性的,上述第一个SI消息(表示为SI1)对应的SI窗口的起始位置为系统帧0的时隙(slot)#0,第二个SI消息(表示为SI2)对应的SI窗口的起始位置为系统帧0的slot#5。终端通过在相应的时间窗内盲检PDCCH,获知相应的SI消息具体在哪个slot上传输。进一步,当终端获知SI消息在哪个slot上传输,或者说当终端接收到SI消息,由于SI消息顺序的或者说依次的包括该SI消息所承载的OSI,例如SI1依次包括SIB2和SIB3消息,因此终端在接收到SI1消息时,也就通过该SI1消息接收到了该SI消息所承载的SIB2和SIB3,或者说终端获知SI1消息在哪个slot上传输之后,也就获知了该SI1消息所承载的SIB2和SIB3在哪个slot上传输。
可选的,当上述SI消息的信息不包括该发送周期,可以理解为该发送周期为默认值。
下面结合图4对图3所示的过程展开进一步介绍。
图4示出了由SIB1携带指示签名的传输资源的信息以进行安全保护的方法流程示意图。
S401:基站发送SIB1,终端接收SIB1。
第一种实现方式中:SIB1包括指示SIB1签名的传输资源的信息。该SIB1签名用于保护或者校验SIB1。
该签名的传输资源可以采用上述指示方式一或者指示方式二来进行指示。当该签名的传输资源采用上述指示方式二时,由于SIB1的发送周期为20毫秒ms,改变周期为160ms,签名的发送周期可以在SIB1中指示为160ms,或者该发送周期可以默认为160ms,或者签名的发送周期可以设置的更短,以减少终端获取该信息的等待时间,减少终端校验SIB1的时延。
终端接收SIB1之后获取SIB1中指示签名的传输资源的信息。
S402:基站在相应的传输资源上发送第一签名,终端根据指示SIB1签名的传输资源的信息接收第一签名。
该第一签名即为上述SIB1签名,即用于校验或者保护SIB1的签名。
相应的传输资源为指示SIB1签名的传输资源的信息所对应的传输资源。
其中,第一签名可以携带在SI消息、或者其他广播消息中。
S403:终端根据第一签名校验SIB1。
通过上述S401,终端能够获取到SIB1中指示SIB1签名的传输资源的信息,从而能够获知SIB1签名的传输资源,基于此终端可以准确的在该传输资源上接收基站发送的SIB1的签名,实现了SIB1与SIB1的签名分开传输,提高了传输签名的灵活性。
第二种实现方式中,SIB1包括指示OSI签名的传输资源的信息。该OSI签名用于保护或者校验OSI。
该OSI签名的传输资源也可以采用上述指示方式一或者指示方式二来进行指示。具体也可以参考S401的内容。
此时,S401之后执行以下步骤:
S404:基站发送OSI,终端接收OSI。
其中,OSI由SIB1调度,即终端根据SIB1中的调度信息获知OSI的传输资源,并根据该传输资源接收OSI。该过程具体可参考3GPP标准TS 38.331和标准TS 38.311。
S405:基站在相应的传输资源上发送第二签名,终端根据指示OSI签名的传输资源的信息接收第二签名。
该第二签名即为上述OSI签名,即用于校验或者保护OSI的签名。
相应的传输资源为指示OSI签名的传输资源的信息所对应的传输资源。
其中,第二签名可以携带在SI消息、或者其他广播消息中。
S406:终端根据第二签名校验OSI。
其中,当上述OSI包含多种系统消息时,基站可以根据级联的OSI生成第二签名,终端可以将接收的OSI进行级联,然后根据第二签名校验级联的OSI。级联可以理解为将上述OSI包含的多种系统消息依次合并为一个整体的信息,将该信息作为生成签名的输入参数。当上述OSI包含多种系统消息时,基站也可以分别生成针对各系统消息的多个签名,也就是第二签名包括该多个签名。可以理解的是,由于签名的长度往往是固定的,因此根据级联的OSI生成签名相比于针对该OSI包含的各系统消息分别生成签名,能够节省总的签名长度,从而减少传输签名所需的信令开销。其中,签名的长度往往是固定的,具体由于普遍采用的签名算法,具体可参考3GPP标准TR 33.809,此处不作赘述。
通过上述S401,终端能够获取到SIB1中指示OSI签名的传输资源的信息,从而能够获知OSI签名的传输资源,基于此终端可以准确的在该传输资源上接收基站发送的OSI的签名,实现了OSI与OSI的签名分开传输,提高了传输签名的灵活性。
第三种实现方式中,SIB1包括指示paging签名的传输资源的信息。该paging签名用于保护或者校验paging消息。
该paging签名的传输资源也可以采用上述指示方式一或者指示方式二来进行指示。具体也可以参考S401的内容。
此时,S401之后执行以下步骤:
S407:基站发送paging消息,终端接收paging消息。
S408:基站在相应的传输资源上发送第三签名,终端根据指示paging签名的传输资源的信息接收第三签名。
该第三签名即为上述paging签名,即用于校验或者保护paging的签名。
相应的传输资源为指示paging签名的传输资源的信息所对应的传输资源。
其中,第三签名可以携带在SI消息、或者其他广播消息中。
S409:终端根据第三签名校验寻呼消息。
通过上述S401,终端能够获取到SIB1中指示paging签名的传输资源的信息,从而能够获知paging签名的传输资源,基于此终端可以准确的在该传输资源上接收基站发送的paging的签名,实现了paging与paging的签名分开传输,提高了传输签名的灵活性。
可选的,上述SIB1也可以同时包含指示多种签名的传输资源的信息,或者上述SIB1包含指示签名的传输资源的信息,该签名用于保护多种广播消息。示例性的,当SIB1同时包含指示SIB1签名的传输资源的信息和指示OSI签名的传输资源的信息,执行上述S401至S403和S404至S406。示例性的,当SIB1包含指示OSI签名的传输资源的信息和指示paging签名的传输资源的信息,执行上述S401,S404至S406,和S407至S409。基于此,终端可以通过SIB1获知多个广播消息的签名的传输资源,提高了终端获知签名的传输资源的效率。
上面介绍了指示签名的传输资源的信息携带在SIB1中的情况。下面对于指示签名的传输资源的信息携带在OSI或者携带在承载OSI的SI消息中的情况基于上面图4的流程展开介绍。
上述第二种实现方式中,指示OSI签名的传输资源的信息可以不携带在SIB1中,而是携带在OSI中,或者携带在用于承载OSI的SI消息中。此处的OSI为该OSI签名所要保护或校验的OSI。此时,上述S404的OSI中包括指示OSI签名的传输资源的信息;或者上述S404中用于承载OSI的SI消息中包括指示OSI签名的传输资源的信息。
基于这种方式,在不传输OSI时基站不需要发送指示OSI签名的传输资源的信息,终端也不需要接收该信息,而仅当传输OSI时基站才需要与OSI一并发送指示OSI签名的传输资源的信息,终端在接收到OSI时才会一并获知指示OSI签名的传输资源信息,减少了不必要的信令传输。
上述第二种实现方式中,指示OSI签名的传输资源的信息可以不携带在SIB1中,而是携带在OSI中,或者携带在用于承载OSI的SI消息中。此处的OSI不是该OSI签名所要保护或校验的OSI。示例性的,SIB2或者承载SIB2的SI消息中包括指示SIB3签名的传输资源的信息。基于这种方式,可以更灵活的传输指示签名的传输资源的信息。
可选的,基于上述两种方式中的任一种,当SIB1的签名通过SI消息或者其他广播消息传输时,指示OSI签名的传输资源的信息可以与SIB1的签名携带在同一条消息中。
上述第三种实现方式中,指示paging签名的传输资源的信息可以不携带在SIB1中,而是携带在OSI中,或者携带在用于承载OSI的广播消息中。此时,上述S404的OSI中包括指示paging签名的传输资源的信息;或者上述S404中用于承载OSI的SI消息中包括指示paging签名的传输资源的信息。上述S407至S409在上述S404之后执行。
可选的,当SIB1的签名通过SI消息或者其他广播消息传输时,指示paging签名的传输资源的信息可以与SIB1的签名携带在同一条消息中。
可选的,当OSI的签名通过SI消息或者其他广播消息传输时,指示paging签名的传输资源的信息可以与OSI的签名携带在同一条消息中。
可选的,上述OSI或者承载OSI的SI消息可以包含指示多种签名的传输资源的信息,或者上述OSI或者承载OSI的SI消息包含指示签名的传输资源的信息,该签名用于保护多种广播消息。示例性的,当OSI同时包含指示OSI签名的传输资源的信息和指示paging签名的传输资源的信息,执行上述S401,S404至S406和S407至S409,当SIB1还包括指示SIB1签名的传输资源的信息时,还执行S402和S403。
基于这种方式,减少了SIB1的信令负载,可以更灵活的传输指示签名的传输资源的信息。
下面对于指示签名的传输资源的信息携带在paging消息中的情况基于上面图4的流程展开介绍。
上述第三种实现方式中,指示paging签名的传输资源的信息可以不携带在SIB1中,而是携带在paging消息中。此时,上述S407的paging消息中包括指示paging签名的传输资源的信息。即上述S401之后执行S407至S409。可选的,当SIB1中包含指示SIB1签名的传输资源的信息,以及OSI中包含指示paging签名的传输资源的信息,还执行S402,S403和S404至S406。
基于这种方式,在不传输paging时基站不需要发送指示paging签名的传输资源的信息,终端也不需要接收该信息,而仅当传输paging时基站才需要一并发送指示paging签名的传输资源的信息,终端在接收到paging时才会获知该信息,减少了不必要的信令传输。
可选的,OSI发生改变时,上述流程还包括:
S410:基站发送系统消息改变的通知,终端接收该通知。
示例性的,基站可以通过以下方式发送系统消息改变的通知。
方式一:基站向终端发送格式为1_0的DCI,该DCI包括短消息(Short Message),该短消息中包括系统信息改变(systemInfoModification)字段和地震海啸警报系统和商用移动预警系统指示(etwsAndCmasIndication)字段。systemInfoModification字段用于指示SIB6,SIB7,SIB8以外的系统消息发生改变。etwsAndCmasIndication字段用于指示SIB6,SIB7,SIB8发生改变。终端通过该短消息直接获知发生变化的OSI。
方式二:基站向终端发送SIB1,该SIB1中的sib-MappingInfo包括取值标记(valueTag)字段,该valueTag字段用于指示该sib-MappingInfo对应的系统消息发生改变。终端通过valueTag值的变化获知发生变化的OSI。
S411:基站发送变化的OSI,终端接收变化的OSI。
可选的,S404中的OSI中,部分OSI发生变化,其他OSI没有发生变化。终端可以根据S410中获知的发生变化的OSI,仅接收变化的OSI。
S412:基站发送第四签名,终端接收第四签名。
该第四签名用于保护或者校验更新的OSI。
可选的,当S404中的OSI中仅有部分OSI发生变化,第四签名根据变化的OSI和上述其他没有发生变化的OSI生成。
可选的,基站可以不发送指示第四签名的传输资源的信息,此时可以认为该第四签名与上述第二签名使用相同的传输资源。基于这种方式,可以减少重新指示签名的传输资源所需的信令开销,且可以避免终端重新确认签名的传输资源,节省终端的处理资源。
可选的,基站可以指示第四签名的传输资源的信息,具体可以参考上述指示第二签名的传输资源的信息,此处不作赘述。
S413:终端根据第四签名校验更新的SI消息所承载的OSI。
其中,终端可以将更新的SI中发生变化的OSI与终端已存储的未发生变化的OSI级联,并根据第四签名校验级联的OSI。
基于该流程,在OSI发生改变时,终端可以基于上述S412和S413获取第四签名,并根据第四签名校验改变后的OSI。
图5为本申请实施例提供的一种通信装置,可用于实现例如图2至图4中基站的功能。图5所示为本申请实施例提供的通信装置500的结构示意图。该通信装置500包括一个或多个处理器501,通信线路502,以及至少一个通信接口(图5中仅是示例性的以包括通信接口503,以及一个处理器501为例进行说明),可选的还可以包括存储器504。
处理器501可以是一个通用中央处理器(central processing unit,CPU),微处理器,特定应用集成电路(application-specific integrated circuit,ASIC),或一个或多个用于控制本申请方案程序执行的集成电路。
通信线路502用于连接不同组件。
通信接口503,可以是收发模块用于与其他设备或通信装置或通信网络,如以太网等。例如,所述收发模块可以是网卡,光纤交换装置。可选的,通信接口503也可以是位于处理器501内的收发电路,用以实现处理器的信号输入和信号输出。
存储器504可以是具有存储功能的装置。例如可以是只读存储器(read-only memory, ROM)或可存储静态信息和指令的其他类型的静态存储设备,随机存取存储器(random access memory,RAM)或者可存储信息和指令的其他类型的动态存储设备,也可以是电可擦可编程只读存储器(electrically erasable programmable read-only memory,EEPROM)、只读光盘(compact disc read-only memory,CD-ROM)或其他光盘存储、光碟存储(包括压缩光碟、激光碟、光碟、数字通用光碟、蓝光光碟等)、磁盘存储介质或者其他磁存储设备、或者能够用于携带或存储具有指令或数据结构形式的期望的程序代码并能够由计算机存取的任何其他介质,但不限于此。存储器可以是独立存在,通过通信线路502与处理器相连接。存储器也可以和处理器集成在一起。
其中,存储器504用于存储执行本申请方案的计算机执行指令,并由处理器501来控制执行。处理器501用于执行存储器504中存储的计算机执行指令,从而实现本申请实施例一中第一网元的功能,或者实施例二中第一网元的功能,或者实施例三中第一网元的功能,或者实施例五中第一装置的功能。本申请实施例中的计算机执行指令也可以称之为应用程序代码,本申请实施例对此不作具体限定。
在具体实现中,作为一种实施例,处理器501可以包括一个或多个CPU,例如图5中的CPU0和CPU1。
在具体实现中,作为一种实施例,通信装置500可以包括多个处理器,例如图5中的处理器501和处理器505。这些处理器中的每一个可以是一个单核(single-CPU)处理器,也可以是一个多核(multi-CPU)处理器。这里的处理器可以指一个或多个设备、电路、和/或用于处理数据(例如计算机程序指令)的处理核。
上述的通信装置500可以是一个通用装置或者是一个专用装置。例如通信装置500可以是网络服务器、嵌入式设备或具有图5中类似结构的设备。本申请实施例不限定通信装置500的类型。
可以理解的是,以上各个实施例中,由基站实现的方法和/或步骤,也可以由实现上述基站功能的芯片系统实现。
图6为本申请实施例提供的一种通信装置,可用于实现例如图2至图4中终端的功能。图6所示为本申请实施例提供的通信装置600的结构示意图。该通信装置600包括一个或多个处理器601,通信线路602,以及至少一个通信接口(图6中仅是示例性的以包括通信接口603,以及一个处理器601为例进行说明),可选的还可以包括存储器604。
处理器601可以是一个通用中央处理器(central processing unit,CPU),微处理器,特定应用集成电路(application-specific integrated circuit,ASIC),或一个或多个用于控制本申请方案程序执行的集成电路。
通信线路602用于连接不同组件。
通信接口603,可以是收发模块用于与其他设备或通信装置或通信网络,如以太网,RAN,无线局域网(wireless local area networks,WLAN)等。例如,所述收发模块可以是收发器、收发机一类的装置,还可以是网卡,光纤交换装置。可选的,通信接口603也可以是位于处理器601内的收发电路,用以实现处理器的信号输入和信号输出。
存储器604可以是具有存储功能的装置。例如可以是只读存储器(read-only memory,ROM)或可存储静态信息和指令的其他类型的静态存储设备,随机存取存储器(random access memory,RAM)或者可存储信息和指令的其他类型的动态存储设备,也可以是电可擦可编程只读存储器(electrically erasable programmable read-only memory,EEPROM)、只读光盘 (compact disc read-only memory,CD-ROM)或其他光盘存储、光碟存储(包括压缩光碟、激光碟、光碟、数字通用光碟、蓝光光碟等)、磁盘存储介质或者其他磁存储设备、或者能够用于携带或存储具有指令或数据结构形式的期望的程序代码并能够由计算机存取的任何其他介质,但不限于此。存储器可以是独立存在,通过通信线路602与处理器相连接。存储器也可以和处理器集成在一起。
其中,存储器604用于存储执行本申请方案的计算机执行指令,并由处理器601来控制执行。处理器601用于执行存储器604中存储的计算机执行指令,从而实现本申请实施例四中第一终端设备的功能,或者实施例五中第一装置的功能。本申请实施例中的计算机执行指令也可以称之为应用程序代码,本申请实施例对此不作具体限定。
在具体实现中,作为一种实施例,通信装置600还可以包括输出设备66和输入设备607。输出设备606和处理器601通信,可以以多种方式来显示信息。
在具体实现中,作为一种实施例,处理器601可以包括一个或多个CPU,例如图6中的CPU0和CPU1。
在具体实现中,作为一种实施例,通信装置600可以包括多个处理器,例如图6中的处理器601和处理器605。这些处理器中的每一个可以是一个单核(single-CPU)处理器,也可以是一个多核(multi-CPU)处理器。这里的处理器可以指一个或多个设备、电路、和/或用于处理数据(例如计算机程序指令)的处理核。
上述的通信装置600可以是一个通用装置或者是一个专用装置。例如通信装置600可以是网络服务器、嵌入式设备、台式机、便携式电脑、移动手机、平板电脑、无线终端设备或具有图6中类似结构的设备。本申请实施例不限定通信装置600的类型。
可以理解的是,以上各个实施例中,由终端实现的方法和/或步骤,也可以由实现上述终端功能的芯片系统实现。
图7为本申请实施例提供的一种通信装置,可用于实现例如图2至图4中基站的功能。本申请实施例可以对通信装置进行功能单元的划分,例如,可以对应各个功能划分各个功能单元,也可以将两个或两个以上的单元集成在一个处理模块中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。需要说明的是,本申请实施例中对单元的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式。
图7所示为本申请实施例提供的通信装置700的结构示意图。该通信装置700包括处理单元701和收发单元702。
可选的,处理单元701具体用于:S203,以及S303,S402,S405,S408中生成签名的功能。
可选的,收发单元702具体用于:图2至图4中基站发送广播消息、发送指示签名的发送资源的信息、发送签名等功能。
具体的,图7中的收发单元702和处理单元701的功能/实现过程可以通过图5所示的通信设备500中的处理器501调用存储器504中存储的计算机执行指令来实现。或者,图7中的处理单元701的功能/实现过程可以通过图5所示的通信设备500中的处理器501调用存储器504中存储的计算机执行指令来实现,图7中的收发单元702的功能/实现过程可以通过图5中所示的通信设备500中的通信接口503来实现。
图8为本申请实施例提供的一种通信装置,可用于实现例如图2至图4中终端的功能。 本申请实施例可以对通信装置进行功能单元的划分,例如,可以对应各个功能划分各个功能单元,也可以将两个或两个以上的单元集成在一个处理模块中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。需要说明的是,本申请实施例中对单元的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式。
图8所示为本申请实施例提供的通信装置800的结构示意图。该通信装置800包括处理单元801和收发单元802。
可选的,处理单元801具体用于:S205,S304,S403,S406,S409中根据签名校验广播消息的功能,也可以用于S302以及图4中获知签名的发送资源的功能。
可选的,收发单元802具体用于:图2至图4中终端接收广播消息、接收指示签名的发送资源的信息、接收签名等功能。
具体的,图8中的收发单元802和处理单元801的功能/实现过程可以通过图6所示的通信设备600中的处理器601调用存储器604中存储的计算机执行指令来实现。或者,图8中的处理单元801的功能/实现过程可以通过图6所示的通信设备600中的处理器601调用存储器604中存储的计算机执行指令来实现,图8中的收发单元602的功能/实现过程可以通过图6中所示的通信设备600中的通信接口603来实现。
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件程序实现时,可以全部或部分地以计算机程序产品的形式来实现。该计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行计算机程序指令时,全部或部分地产生按照本申请实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或者数据中心通过有线(例如同轴电缆、光纤、数字用户线(digital subscriber line,DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可以用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质(例如,软盘、硬盘、磁带),光介质(例如,DVD)、或者半导体介质(例如固态硬盘(solid state disk,SSD))等。本申请实施例中,计算机可以包括前面所述的装置。
尽管在此结合各实施例对本申请进行了描述,然而,在实施所要求保护的本申请过程中,本领域技术人员通过查看所述附图、公开内容、以及所附权利要求书,可理解并实现所述公开实施例的其他变化。在权利要求中,“包括”(comprising)一词不排除其他组成部分或步骤,“一”或“一个”不排除多个的情况。单个处理器或其他单元可以实现权利要求中列举的若干项功能。相互不同的从属权利要求中记载了某些措施,但这并不表示这些措施不能组合起来产生良好的效果。
尽管结合具体特征及其实施例对本申请进行了描述,显而易见的,在不脱离本申请的精神和范围的情况下,可对其进行各种修改和组合。相应地,本说明书和附图仅仅是所附权利要求所界定的本申请的示例性说明,且视为已覆盖本申请范围内的任意和所有修改、变化、组合或等同物。显然,本领域的技术人员可以对本申请进行各种改动和变型而不脱离本申请的精神和范围。这样,倘若本申请的这些修改和变型属于本申请权利要求及其等同技术的范围之内,则本申请也意图包含这些改动和变型在内。

Claims (32)

  1. 一种通信方法,其特征在于,包括:
    接收第一广播消息;
    接收指示第一签名的传输资源的信息,所述第一签名用于校验所述第一广播消息;
    根据所述指示第一签名的传输资源的信息接收第一签名;
    根据所述第一签名校验所述第一广播消息。
  2. 根据权利要求1所述的方法,所述根据所述指示第一签名的传输资源的信息接收第一签名包括:根据所述指示第一签名的传输资源的信息接收系统消息,所述系统消息包括所述第一签名。
  3. 根据权利要求2所述的方法,所述指示第一签名的传输资源的信息包括:所述系统消息的类型。
  4. 根据权利要求3所述的方法,所述指示第一签名的传输资源的信息还包括:所述第一签名的发送周期。
  5. 根据权利要求1所述的方法,所述指示第一签名的传输资源的信息包括:时域资源信息和/或频域资源信息。
  6. 根据权利要求5所述的方法,所述根据所述指示第一签名的传输资源的信息接收第一签名包括:在所述时域资源信息和/或频域资源信息所指示的范围内进行盲检,确定所述第一签名的传输资源,在所确定的传输资源上接收所述第一签名。
  7. 根据权利要求1-6任一所述的方法,所述接收指示第一签名的传输资源的信息包括:接收第二广播消息,所述第二广播消息包括所述指示第一签名的传输资源的信息。
  8. 根据权利要求7所述的方法,所述第二广播消息为系统信息块1。
  9. 根据权利要求8所述的方法,所述第一广播消息为所述系统信息块1、其他系统信息OSI、或者寻呼消息。
  10. 根据权利要求7所述的方法,所述第二广播消息为用于携带系统信息块1的签名的广播消息或者所述第二广播消息为OSI。
  11. 根据权利要求10所述的方法,所述第一广播消息为所述OSI、或寻呼消息。
  12. 根据权利要求7所述的方法,所述第二广播消息为用于携带OSI的签名的广播消息或者所述第二广播消息为寻呼消息。
  13. 根据权利要求12所述的方法,所述第一广播消息为所述寻呼消息。
  14. 根据权利要求1-13任一所述的方法,当所述第一广播消息为OSI时,所述根据所述第一签名校验所述第一广播消息包括:级联所述OSI,根据所述第一签名校验所述级联的OSI。
  15. 一种通信方法,其特征在于,包括:
    向终端发送第一广播消息;
    向所述终端发送指示第一签名的传输资源的信息,所述第一签名用于校验所述第一广播消息;
    在所述指示第一签名的传输资源的信息所对应的传输资源上向所述终端发送第一签名。
  16. 根据求15所述的方法,所述在所述指示第一签名的传输资源的信息所对应的传输资源上向所述终端发送第一签名包括:在所述传输资源上向所述终端发送系统消息,所述系统消息包括所述第一签名。
  17. 根据权利要求15或16所述的方法,所述指示第一签名的传输资源的信息包括:所述系 统消息的类型。
  18. 根据权利要求17所述的方法,所述指示第一签名的传输资源的信息还包括:所述第一签名的发送周期。
  19. 根据权利要求15所述的方法,所述指示第一签名的传输资源的信息包括:时域资源信息和/或频域资源信息。
  20. 根据权利要求15-19任一所述的方法,所述向所述终端发送指示第一签名的传输资源的信息包括:向所述终端发送第二广播消息,所述第二广播消息包括所述指示第一签名的传输资源的信息。
  21. 根据权利要求20所述的方法,所述第二广播消息为系统信息块1。
  22. 根据权利要求21所述的方法,所述第一广播消息为所述系统信息块1、其他系统消息OSI、或者寻呼消息。
  23. 根据权利要求20所述的方法,所述第二广播消息为用于携带系统信息块1的签名的广播消息或者所述第二广播消息为OSI。
  24. 根据权利要求23所述的方法,所述第一广播消息为所述OSI、或寻呼消息。
  25. 根据权利要求20所述的方法,所述第二广播消息为用于携带OSI的签名的广播消息或者所述第二广播消息为寻呼消息。
  26. 根据权利要求25所述的方法,所述第一广播消息为所述寻呼消息。
  27. 根据权利要求15-26任一所述的方法,当所述第一广播消息为OSI时,所述方法还包括:级联所述OSI,根据所述级联的OSI生成所述第一签名。
  28. 一种通信装置,其特征在于,包括用于执行如权利要求1-14中任一项所述方法的单元。
  29. 一种通信装置,其特征在于,包括用于执行如权利要求15-27中任一项所述方法的单元。
  30. 一种通信装置,其特征在于,包括处理器,所述处理器与存储器耦合,所述存储器用于存储计算机程序或指令,所述处理器用于执行所述计算机程序或指令,使得权利要求1-14中任一所述的方法。
  31. 一种通信装置,其特征在于,包括处理器,所述处理器与存储器耦合,所述存储器用于存储计算机程序或指令,所述处理器用于执行所述计算机程序或指令,使得权利要求15-27中任一所述的方法。
  32. 一种可读存储介质,其特征在于,包括计算机程序,当所述计算机程序在计算机上运行时,使得所述计算机执行如权利要求1-14或15-27中任一项所述的方法。
PCT/CN2023/075963 2022-02-14 2023-02-14 通信方法、通信装置和系统 WO2023151696A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202210134912.2 2022-02-14
CN202210134912.2A CN116634418A (zh) 2022-02-14 2022-02-14 通信方法、通信装置和系统

Publications (1)

Publication Number Publication Date
WO2023151696A1 true WO2023151696A1 (zh) 2023-08-17

Family

ID=87563711

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/075963 WO2023151696A1 (zh) 2022-02-14 2023-02-14 通信方法、通信装置和系统

Country Status (2)

Country Link
CN (1) CN116634418A (zh)
WO (1) WO2023151696A1 (zh)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109845185A (zh) * 2016-10-31 2019-06-04 华为技术有限公司 一种数据传输方法、终端、节点设备以及系统
WO2020029266A1 (zh) * 2018-08-10 2020-02-13 北京小米移动软件有限公司 系统信息传输方法、装置和系统、及计算机可读存储介质
WO2021075854A1 (en) * 2019-10-14 2021-04-22 Samsung Electronics Co., Ltd. Method and user equipment for determining whether base station is genuine or rouge in wireless network
WO2021208802A1 (zh) * 2020-04-14 2021-10-21 华为技术有限公司 系统信息传输方法、设备及系统

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109845185A (zh) * 2016-10-31 2019-06-04 华为技术有限公司 一种数据传输方法、终端、节点设备以及系统
WO2020029266A1 (zh) * 2018-08-10 2020-02-13 北京小米移动软件有限公司 系统信息传输方法、装置和系统、及计算机可读存储介质
WO2021075854A1 (en) * 2019-10-14 2021-04-22 Samsung Electronics Co., Ltd. Method and user equipment for determining whether base station is genuine or rouge in wireless network
WO2021208802A1 (zh) * 2020-04-14 2021-10-21 华为技术有限公司 系统信息传输方法、设备及系统

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
LG ELECTRONICS INC.: "Other SI delivery in broadcast manner", 3GPP DRAFT; R2-167050 OTHER SI DELIVERY IN BROADCAST MANNER, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. RAN WG2, no. Kaohsiung, Taiwan; 20161010 - 20161014, 9 October 2016 (2016-10-09), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France , XP051151456 *

Also Published As

Publication number Publication date
CN116634418A (zh) 2023-08-22

Similar Documents

Publication Publication Date Title
WO2019154333A1 (zh) 资源选择的方法和终端设备
JP7405207B2 (ja) 無線アクセスネットワークノード、無線端末、及びこれらの方法
WO2019029427A1 (zh) 用于监听pdcch的方法、网络设备及终端
WO2019148401A1 (zh) 寻呼方法、网络设备和终端设备
WO2017166221A1 (zh) 无线接入控制方法、装置及系统
EP3281462B1 (en) Methods, wireless communication device and radio network node for managing paging
WO2017024998A1 (zh) 一种数据传输方法及装置
CN110932828B (zh) 消息接收方法、消息发送方法、终端设备和网络侧设备
CN113794784A (zh) 一种获取边缘服务的方法和装置
WO2018166421A1 (zh) 传输控制信息的方法、设备和系统
WO2019080815A1 (zh) 信道传输方法及装置、计算机存储介质
US20220394594A1 (en) Access Method and Apparatus
CN111586793B (zh) 一种通信方法、设备及计算机可读存储介质
WO2018137700A1 (zh) 一种通信方法,装置及系统
TW202017426A (zh) 於新無線電未授權頻譜之上行傳輸的通道存取優先權級別
WO2019134668A1 (zh) 信号接收方法、发送方法、用户设备和网络设备
WO2017121070A1 (zh) 激活类系统信息的传输方法、装置和设备
US20220159669A1 (en) PDCCH Enhancement for Group Paging
EP3064030B1 (en) Systems, methods and devices for modifying relay operation of a wireless device
TW201826747A (zh) 資源映射的方法和通訊設備
EP3661311B1 (en) Resource indication method, system, computer readable storage medium and computer program product
EP3860259B1 (en) Harq process id determination method, apparatus, and medium
WO2020258051A1 (zh) 小区接入的方法和设备
WO2023151696A1 (zh) 通信方法、通信装置和系统
WO2022022685A1 (zh) 接入控制方法、终端及网络侧设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23752473

Country of ref document: EP

Kind code of ref document: A1