WO2023197992A1 - 密钥确定方法、装置、终端、网络侧设备和存储介质 - Google Patents

密钥确定方法、装置、终端、网络侧设备和存储介质 Download PDF

Info

Publication number
WO2023197992A1
WO2023197992A1 PCT/CN2023/087283 CN2023087283W WO2023197992A1 WO 2023197992 A1 WO2023197992 A1 WO 2023197992A1 CN 2023087283 W CN2023087283 W CN 2023087283W WO 2023197992 A1 WO2023197992 A1 WO 2023197992A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
key
cell
configuration
target
Prior art date
Application number
PCT/CN2023/087283
Other languages
English (en)
French (fr)
Inventor
梁敬
鲍炜
陈力
刘选兵
Original Assignee
维沃移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from CN202211204227.9A external-priority patent/CN116963210A/zh
Application filed by 维沃移动通信有限公司 filed Critical 维沃移动通信有限公司
Publication of WO2023197992A1 publication Critical patent/WO2023197992A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/08Reselecting an access point

Definitions

  • This application belongs to the field of communication technology, and specifically relates to a cell change processing method, a key determination method, a device, a terminal, a network side device and a storage medium.
  • CPAC Conditional PSCell Addition or Change
  • Embodiments of the present application provide a cell change processing method, a key determination method, a device, a terminal, a network side device, and a storage medium to solve the problem of excessive configuration overhead.
  • a cell change processing method is provided.
  • the terminal stores a first configuration.
  • the method includes:
  • the terminal evaluates the first cell based on the first configuration
  • the terminal uses the first cell as the target primary secondary cell (PSCell) of the terminal;
  • the terminal determines a target key for accessing the target PSCell according to the first configuration
  • the first configuration is associated with a candidate PSCell
  • the candidate PSCell includes the first cell
  • the first configuration includes a conditional primary and secondary cell change (Conditional PSCell Change, CPC) configuration and a conditional primary and secondary cell addition (Conditional primary and secondary cell addition).
  • CPC conditional primary and secondary cell change
  • CPA conditional primary and secondary cell addition
  • the second aspect provides a key determination method, including:
  • the secondary node determines the target key currently used and/or to be used for the first cell based on the target information, and the first cell is the PSCell of the terminal;
  • the target information includes at least one of the following:
  • a key determination method including:
  • the master node MN determines the target key currently used and/or to be used for the first cell, which is the primary and secondary cell PSCell of the terminal;
  • the MN sends the target key to the secondary node SN.
  • a cell change processing device stores a first configuration, and the device includes:
  • An evaluation module configured to evaluate the first cell based on the first configuration
  • a first determination module configured to use the first cell as the target PSCell of the terminal if the first cell meets the first condition
  • a second determination module configured to determine the target key for accessing the target PSCell according to the first configuration
  • the first configuration is associated with a candidate PSCell
  • the candidate PSCell includes the first cell
  • the first configuration includes at least one of a conditional primary and secondary cell changing CPC configuration and a conditional primary and secondary cell adding CPA configuration.
  • a key determination device including:
  • a determination module configured to determine the target key currently used and/or to be used for the first cell based on the target information, and the first cell is the primary and secondary cell PSCell of the terminal;
  • the target information includes at least one of the following:
  • a key determination device including:
  • a determination module configured to determine the target key currently used and/or to be used for the first cell, which is the primary and secondary cell PSCell of the terminal;
  • the first sending module is used to send the target key to the secondary node SN.
  • a terminal including a processor and a memory.
  • the memory stores programs or instructions that can be run on the processor.
  • the embodiments of the present application are implemented. Provides steps for processing cell changes.
  • a terminal including a processor and a communication interface, wherein the processor is configured to evaluate a first cell based on the first configuration; when the first cell meets the first condition, Use the first cell as the target PSCell of the terminal; determine the target key for accessing the target PSCell according to the first configuration; wherein the first configuration is associated with a candidate PSCell, and the candidate PSCell includes the The first cell, the first configuration includes at least one of a conditional primary and secondary cell changing CPC configuration and a conditional primary and secondary cell adding CPA configuration.
  • a network node is provided.
  • the network node is an SN and includes a processor and a memory.
  • the memory stores programs or instructions that can be run on the processor, and the programs or instructions are processed by the processor.
  • the server is executed, the steps of the key determination method on the SN side provided by the embodiment of the present application are implemented.
  • a network node is provided.
  • the network node is an SN and includes a processor and a communication interface.
  • the processor is configured to determine the target currently used and/or to be used for the first cell based on the target information.
  • the first cell is the primary and secondary cell PSCell of the terminal; wherein the target information includes at least one of the following: indication information of the MN; information carried by the terminal when performing random access.
  • a network node is provided.
  • the network node is a main node MN and includes a processor and a memory.
  • the memory stores programs or instructions that can be run on the processor.
  • the program or instructions are When executed by the processor, the steps of the key determination method on the MN side provided by the embodiment of the present application are implemented.
  • a network node is provided.
  • the network node is an MN and includes a processor and a communication interface, wherein the processor is used to determine the target key currently used and/or to be used for the first cell,
  • the first cell is the primary and secondary cell PSCell of the terminal; the communication interface is used to send the target key to the secondary node SN.
  • a resource determination system including: a terminal, an SN and an MN.
  • the terminal can be used to perform the steps of the cell change processing method described in the first aspect
  • the SN can be used to perform the steps of the cell change processing method as described in the second aspect.
  • the MN may be configured to perform the steps of the key determination method described in the third aspect.
  • a readable storage medium is provided.
  • Programs or instructions are stored on the readable storage medium.
  • the steps of the cell change processing method provided by the embodiments of the present application are implemented. Either implement the steps of the key determination method on the SN side provided by the embodiments of this application, or implement the steps of the key determination method on the MN side provided by the embodiments of this application.
  • a chip in a fifteenth aspect, includes a processor and a communication interface.
  • the communication interface is coupled to the processor.
  • the processor is used to run programs or instructions to implement the method described in the first aspect. method, or implement the method as described in the second aspect, or implement the method as described in the third aspect.
  • a computer program/program product is provided, the computer program/program product is stored in a storage medium, and the computer program/program product is executed by at least one processor to implement the methods provided by the embodiments of the present application.
  • the steps of the cell change processing method, or the computer program/program product is executed by at least one processor to implement the steps of the key determination method on the SN side provided by the embodiment of the present application, or the computer program/program product is executed by at least one processor The steps executed by the processor to implement the key determination method on the MN side provided by the embodiment of the present application.
  • the terminal stores a first configuration, and the terminal evaluates the first cell based on the first configuration; when the first cell meets the first condition, the terminal uses the first cell as The target PSCell of the terminal; the terminal determines the target key for accessing the target PSCell according to the first configuration; wherein the first configuration is associated with a candidate PSCell, and the candidate PSCell includes the first cell,
  • the first configuration includes at least one of a conditional primary and secondary cell changing CPC configuration and a conditional primary and secondary cell adding CPA configuration.
  • the terminal can select the first cell as the terminal's target PSCell based on the stored first configuration, and determine the target key for accessing the target PSCell, so that it does not need to obtain the CPAC configuration reconfigured by the network side every time CPAC is executed. Save configuration overhead.
  • Figure 1 is a block diagram of a wireless communication system applicable to the embodiment of the present application.
  • Figure 2 is a schematic diagram of a cell change processing method provided by an embodiment of the present application.
  • Figure 3 is a flow chart of a key determination method provided by an embodiment of the present application.
  • Figure 4 is a flow chart of another key determination method provided by an embodiment of the present application.
  • Figure 5 is a structural diagram of a cell change processing device provided by an embodiment of the present application.
  • Figure 6 is a structural diagram of a key determination device provided by an embodiment of the present application.
  • Figure 7 is a structural diagram of another key determination device provided by an embodiment of the present application.
  • Figure 8 is a structural diagram of a communication device provided by an embodiment of the present application.
  • Figure 9 is a structural diagram of a terminal provided by an embodiment of the present application.
  • Figure 10 is a structural diagram of a network node provided by an embodiment of the present application.
  • first, second, etc. in the description and claims of this application are used to distinguish similar objects and are not used to describe a specific order or sequence. It is to be understood that the terms so used are interchangeable under appropriate circumstances so that the embodiments of the present application can be practiced in sequences other than those illustrated or described herein, and that "first" and “second” are distinguished objects It is usually one type, and the number of objects is not limited.
  • the first object can be one or multiple.
  • “and/or” in the description and claims indicates at least one of the connected objects, and the character “/" generally indicates that the related objects are in an "or” relationship.
  • LTE Long Term Evolution
  • LTE-Advanced, LTE-A Long Term Evolution
  • LTE-A Long Term Evolution
  • CDMA Code Division Multiple Access
  • TDMA Time Division Multiple Access
  • FDMA Frequency Division Multiple Access
  • OFDMA Orthogonal Frequency Division Multiple Access
  • SC-FDMA Single-carrier Frequency Division Multiple Access
  • NR New Radio
  • FIG. 1 shows a block diagram of a wireless communication system to which embodiments of the present application are applicable.
  • the wireless communication system includes terminal 11, MN12 and SN13.
  • the terminal 11 may be a mobile phone, a tablet computer (Tablet Personal Computer), a laptop computer (Laptop Computer), or a notebook computer, a personal digital assistant (Personal Digital Assistant, PDA), a palmtop computer, a netbook, or a super mobile personal computer.
  • Tablet Personal Computer Tablet Personal Computer
  • laptop computer laptop computer
  • PDA Personal Digital Assistant
  • PDA Personal Digital Assistant
  • MN12 and SN13 may include access network equipment and core network equipment.
  • the access network equipment may also be called radio access network equipment, radio access network (Radio Access Network, RAN), radio access network function or radio access network equipment.
  • Access network equipment can include base stations, Wireless Local Area Network (WLAN) access points or WiFi nodes, etc.
  • WLAN Wireless Local Area Network
  • the base station can be called Node B, Evolved Node B (eNB), access point, base transceiver station ( Base Transceiver Station (BTS), radio base station, radio transceiver, Basic Service Set (BSS), Extended Service Set (ESS), home B-node, home evolved B-node, sending and receiving point ( Transmitting Receiving Point (TRP) or some other suitable term in the field, as long as the same technical effect is achieved, the base station is not limited to specific technical terms. It should be noted that in the embodiment of this application, only the NR system is used The base station is introduced as an example, and the specific type of base station is not limited.
  • MN12 and SN13 can provide MN and SN for the terminal in a dual connectivity (Dual Connectivity, DC) scenario.
  • Each network node uses Carrier Aggregation (CA) technology, which configures the terminal with a series of service cells controlled by the node, also called a cell group.
  • the MN controls the primary cell group (MCG, Master Cell Group), and the SN controls the secondary cell group (SCG, Secondary Cell Group).
  • MCG primary Cell group
  • SCG Secondary Cell Group
  • Each cell group contains a special cell (Special Cell, SpCell) and a series of secondary cells (Scell, Secondary Cell).
  • MCG the special cell
  • SCG Secondary Cell
  • the special cell is called Primary Cell (PCell)
  • PSCell Primary Secondary Cell
  • SpCell uses the primary carrier, while other secondary cells use secondary carriers. Resource scheduling within a cell group is performed by SpCell.
  • the CPAC process may include: CPA and CPC;
  • CPA is the addition of primary and secondary cells that the terminal evaluates execution conditions and executes after the execution conditions are met.
  • the CPA configuration may include the configuration and execution conditions of the CPA candidate cells. Execution conditions can contain one or more trigger conditions.
  • CPC is a change of the primary and secondary cells that the terminal evaluates and executes after the execution conditions are met. After receiving the CPC configuration, the terminal starts to evaluate the execution conditions and stops evaluating the execution conditions after the primary and secondary cell changes are triggered.
  • CPC configuration may include configuration and execution conditions of CPC candidate cells. Execution conditions may contain one or more trigger conditions.
  • CPC includes a variety of scenarios that can include at least one of the following:
  • Figure 2 is a flow chart of a cell change processing method provided by an embodiment of the present application. As shown in Figure 2, it includes the following steps, including:
  • Step 201 The terminal evaluates the first cell based on the first configuration.
  • the terminal stores the first configuration.
  • the first configuration is associated with a candidate PSCell, the candidate PSCell includes the first cell, and the first configuration includes at least one of a CPC configuration and a CPA configuration.
  • the fact that the terminal stores the first configuration can be understood to mean that after the terminal releases the first cell, the terminal stores the first configuration, or that the terminal camps in the first cell and then releases the first cell, and the terminal stores the first configuration. . Or it may be that the terminal stores the first configuration before performing step 201, for example, the terminal has used the configuration to perform CPC or CPA before performing step 201.
  • step 201 may be to evaluate the first cell based on the first configuration after the terminal releases the first cell, or the terminal camps on the first cell and then releases the first cell; or, step 201 may be the first evaluation of the above-mentioned first cell using the above-mentioned first configuration.
  • the above-mentioned first configuration may be to receive a CPA or CPC configuration message sent by the network side, and the configuration includes security-related configurations of multiple candidate PSCells.
  • the above first configuration may also be called a CPAC configuration.
  • the above-mentioned first configuration includes at least one of the following:
  • conditional reconfiguration includes at least one of the following:
  • One or more counter values are One or more counter values.
  • each PSCell may be associated with one or more counter values, and these counter values are used to determine the key.
  • the counter value may be a counter (sk-counter) value or an SN counter value used to calculate the key.
  • the counter value may also be called counter.
  • the above-mentioned first configuration may be a configuration indicated by a Radio Resource Control (RRC) reconfiguration message.
  • RRC Radio Resource Control
  • Step 202 When the first cell meets the first condition, the terminal uses the first cell as the target PSCell of the terminal.
  • the above-mentioned first condition is a condition associated with the above-mentioned first configuration, for example: an execution condition (execution condition) included in the first configuration, such as the execution condition of CPC or the execution condition of CPA.
  • execution condition execution condition
  • the terminal using the first cell as the target PSCell of the terminal may perform a CPC or CPA process for the first cell. For example, it may be the first time that the first cell is used as the target PSCell of the terminal, or before step 202, the terminal uses the first cell as the target PSCell of the terminal, but is subsequently changed or released.
  • Step 203 The terminal determines the target key for accessing the target PSCell according to the first configuration.
  • determining the target key for accessing the target PSCell may be determining the primary key or secondary key corresponding to the first configuration.
  • the terminal can select the first cell as the terminal's target PSCell based on the stored first configuration, and determine the target key for accessing the target PSCell, thereby eliminating the need to obtain the network every time CPAC is executed. Side-reconfigured CPAC configuration, thereby saving configuration overhead.
  • the first cell is a cell that has been released by the terminal, or the first cell is a cell that the terminal once camped on or a cell that the terminal has accessed.
  • the terminal can select the first cell again as the target PSCell of the terminal based on the stored first configuration, so that it only needs to provide Configure a first configuration to save configuration overhead. For example: after the terminal uses the first cell as the PScell based on the first configuration, the PScell is changed from the first cell to the second cell, and then the terminal changes the PScell from the first cell based on the first configuration.
  • the PSCell of the terminal is changed from the first cell to another cell; or,
  • the terminal Before the terminal uses the first cell as the terminal's target PSCell, the terminal releases the first cell as the terminal's PSCell.
  • the PSCell of the terminal is changed from the first cell to another cell.
  • the PSCell of the terminal is changed once or multiple times from the first cell. For example, the PSCell of the terminal is changed from the first cell to the second cell, and then from the first cell to the second cell.
  • the second cell is changed to another cell, and then the other cell is changed to the first cell; or the PSCell of the terminal is changed from the first cell to the second cell, and then the second cell is changed to the first cell.
  • the terminal releasing the first cell as the terminal's PSCell may be that the terminal uses CPA or CPC to use the first cell as the terminal's PSCell, and then the terminal releases the first cell.
  • the terminal uses the first cell as the target PSCell of the terminal, including:
  • the terminal When the terminal's PSCell is changed from the first cell to another cell, the terminal changes the terminal's target PSCell to the first cell; or
  • the terminal adds the first cell as a target PSCell of the terminal.
  • the terminal may add the first cell as the terminal's target PSCell by: when the terminal's PSCell is changed from the first cell to another cell, or when the terminal releases the first cell, the terminal may add the first cell to the terminal's target PSCell. A cell is added as the target PSCell of the terminal.
  • the target key is a first key
  • the first key is different from the second key
  • the second key is a key used by the terminal for the first cell before the terminal uses the first cell as the terminal's target PSCell.
  • the second key is the key used by the terminal for the first cell before the terminal uses the first cell as the terminal's target PSCell, this can realize that the terminal uses a different key each time it accesses the first cell. keys, thereby improving security.
  • the first key is a first auxiliary key
  • the second key is a second auxiliary key
  • the first key is the primary key
  • the second key is the secondary key
  • the first key is a secondary key
  • the second key is a primary key
  • the above-mentioned first auxiliary key and the second auxiliary key are two different auxiliary keys. Specifically, they may be auxiliary keys calculated based on different counter values.
  • the above master key may be a key corresponding to the MCG bearer.
  • the master key can also be used to access the PSCell to further improve the security of accessing the PSCell.
  • the first configuration includes a plurality of counter values associated with the first cell
  • the first auxiliary key is a auxiliary key calculated based on a counter value among the plurality of counter values
  • the second auxiliary key is an auxiliary key calculated based on another counter value among the plurality of counter values.
  • different counter values can be used to calculate different auxiliary keys to ensure that the terminal uses different keys each time it accesses the first cell, thereby improving security.
  • the first auxiliary key is an auxiliary key calculated based on a first counter value among the plurality of counter values
  • the second auxiliary key is calculated based on a second counter value among the plurality of counter values.
  • a secondary key for counter value calculation wherein the first counter value is located after the second counter value in a target sequence, and the target sequence is the sequence of the multiple counter values.
  • the fact that the first counter value is located after the second counter value in the target sequence can be understood to mean that the terminal uses the counter values among the multiple counter values in sequence according to the target sequence.
  • the above target sequence is: counter value A-counter value B-counter value C-counter value D, then when the above-mentioned second counter value is counter value A, the first counter value is counter value B, and when the above-mentioned second counter value is counter value When the value is counter value B, the first counter value is counter value C. When the second counter value is counter value C, the first counter value is counter value D.
  • the terminal sequentially uses the counter values among the multiple counter values to calculate the auxiliary key according to the above target order, it is easy for the terminal and the network side to determine the auxiliary key used each time directly and accurately, and Consistent understanding.
  • the target order is the order from small to large of the multiple counter values; or,
  • the target order is the order from large to small of the multiple counter values; or,
  • the target order is the order of the multiple counter values indicated by the first configuration.
  • the terminal when the terminal changes the target PSCell to the first cell, it can be used in order from small to large or from large to small.
  • the counter value x is used.
  • the counter value y is used.
  • the counter value z is used
  • the counter value y is used
  • the counter value x is used for the third time, where counter value x ⁇ counter value y ⁇ counter value z, and the counter value z used first needs to be the largest value among multiple counter values.
  • the order of the multiple counter values indicated by the first configuration may be the order of the multiple counter values explicitly or implicitly indicated by the first configuration. For example: When the target order is the order of the multiple counter values indicated by the first configuration:
  • the first configuration carries sequence indication information, and the sequence indication information is used to indicate the target sequence;
  • the target sequence is the carrying sequence of the multiple counter values in the first configuration.
  • multiple counter values in the first configuration will additionally carry the usage sequence configuration of these multiple counter values in the configuration, a series of sequence instructions that can identify different counter values.
  • the above target order is based on the order in which counter values are carried in the configuration. For example, the counter value at the first entry (entry) of the first configuration is used first, and the counter value at the second entry is used first. The second one is used, and so on.
  • the method also includes at least one of the following:
  • the terminal deletes the first configuration
  • the terminal deletes the first cell from the candidate PSCell, or the terminal does not perform the first condition on the first cell. evaluation of.
  • the above deletion configuration and the first cell may be deleted when the terminal's PSCell is changed to the first cell, or deleted when the terminal's PSCell is changed from the first cell to another cell, or deleted when the first cell is released.
  • the first configuration is deleted. This can avoid the failure to change or add PSCell due to no available counter value when the first configuration is subsequently used to evaluate the cell. The problem.
  • the first cell is deleted from the candidate PSCell, or the first condition is not evaluated on the first cell, so that subsequent use can be avoided.
  • the first configuration evaluates the first cell, there is no counter value available, causing the problem of failure to change or add PSCell.
  • the first configuration also includes a second cell-associated configuration
  • the method further includes:
  • the terminal deletes the configuration associated with the second cell in the first configuration.
  • the above-mentioned first configuration may also include configurations associated with a second cell.
  • the above-mentioned first configuration may include configurations associated with multiple cells, and the above-mentioned second cell may be any cell, so that the counter value associated with any cell can be realized. If all have been used, delete the configuration associated with the cell in the first configuration to avoid the problem of failure to change or add PSCell due to subsequent use of the first configuration to evaluate the cell.
  • the method also includes at least one of the following:
  • the terminal deletes the counter value that has been used in the first configuration
  • the terminal deletes the auxiliary key that has been used.
  • the terminal may delete the counter value that has been used in the first configuration by deleting the counter value after calculating the auxiliary key based on a certain counter value.
  • the above-mentioned deletion of the auxiliary key that has been used may be to delete the auxiliary key after a certain auxiliary key is connected to the PSCell after use, or it may be to use a certain auxiliary key to connect to the PSCell and the PSCell changes or When the PSCell is released, the secondary key is deleted.
  • the auxiliary key that has been used is deleted, which can avoid calculating the same auxiliary key again in the future and ensure that a new key is used every time. Improve security.
  • the terminal deletes the auxiliary keys that have been used, including:
  • the terminal removes the used auxiliary key from the local variable, and the local variable is a local variable corresponding to the first configuration.
  • the used auxiliary key is deleted every time it is used to ensure that the latest key is used every time to improve security.
  • the terminal receives a reconfiguration message sent by the network side, which contains N counter values.
  • the terminal maintains a variable locally, with a variable name such as VarCondReconfigKeyList, and uses the N counter values or the auxiliary keys calculated based on them.
  • the terminal can generate a variable for each PSCell or use a variable for all PSCells.
  • the terminal executes CPC for the first time, it is assumed that the auxiliary key 1 derived from the counter1 value is used.
  • the variable is The counter value 1 or the auxiliary key 1 calculated based on the counter value 1 is deleted, and the new auxiliary key is used when subsequently executing CPC.
  • the first configuration includes a first counter value associated with the first cell
  • the first auxiliary key is a auxiliary key calculated based on a second counter value
  • the second counter value is the The counter value obtained by adding M to the counter value corresponding to the second auxiliary key
  • the counter value corresponding to the second auxiliary key includes:
  • the first counter value or, the counter value obtained by adding N to the first counter value
  • M is an integer greater than or equal to 0
  • N is an integer greater than or equal to 1.
  • the above-mentioned first counter value is a counter value.
  • N and M may be defined by the agreement or configured on the network side. In some implementations, the above The values of N and M may also be determined by the terminal.
  • the first auxiliary key may be calculated when accessing the first cell, or may be calculated after using the second auxiliary key, which is not limited.
  • the counter value corresponding to the second auxiliary key includes the first counter value. It can be understood that the above-mentioned second auxiliary key is the key used by the terminal to access the first cell for the first time; the above-mentioned second auxiliary key The corresponding counter value includes the counter value obtained by adding N to the first counter value. It can be understood that the above-mentioned second auxiliary key can be the key used by the terminal to access the first cell for the second, third or more times. .
  • a different value can be used to calculate the secondary key each time the first cell is accessed, so as to save the cost of the first configuration because multiple counter values do not need to be configured.
  • the terminal performs evaluation based on the first configuration.
  • the first time is through the counter value in the first configuration, after calculating the new secondary key or before calculating the new key next time. , increase the counter value by N.
  • a new auxiliary key is calculated based on the new counter value, and the new counter value is reported to the MN, or the MN learns the terminal switching situation and obtains the information based on the uplink information (UL information) reported by the UE.
  • the latest value of the counter value and continues to increase the counter value by N.
  • the above-mentioned first configuration also includes a maximum number of times to change the PSCell based on the first configuration, or a maximum number of times or a maximum value using the above-mentioned first counter value.
  • the method further includes:
  • the terminal reports at least one of the following to the network node:
  • the second counter value or an auxiliary key calculated based on the second counter value
  • the above-mentioned number of times the first cell is used as a PSCell based on the first configuration can be used by the network node to calculate the key currently used by the terminal, and the above-mentioned number of times the CPAC process is executed based on the first configuration can also be used by the network node to calculate Get the key currently used by the terminal. For example: Based on the number of times the CPAC process is executed, the network node can increase the counter value by the corresponding value to obtain the counter value currently used by the terminal, and then calculate the corresponding key.
  • the above-mentioned network node may be an MN. Of course, this is not limited.
  • the above-mentioned network node may also be an SN.
  • the network node can obtain the prepared key to communicate with the terminal and avoid communication errors.
  • the method further includes:
  • the terminal reports notification information to the network node, and the notification information includes at least one of the following:
  • the duration for executing the CPAC process based on the first configuration is the duration for executing the CPAC process based on the first configuration.
  • the above-mentioned number of times and duration of executing the CPAC process may be the number and duration of the terminal executing the CPAC processes corresponding to all cells based on the first configuration.
  • the above terminal reports notification information to the network node, which may include:
  • the terminal reports notification information to the network node in a random access message or a Radio Resource Control (Radio Resource Control, RRC) message.
  • RRC Radio Resource Control
  • the notification information may also be reported to the network node through a random access message.
  • the above-mentioned network node may be an SN.
  • the above-mentioned network node may also be an MN.
  • the above notification information is used by the network node to decide whether to initiate a key change. For example, when the number of the above CPAC processes reaches the threshold number, or the above time length reaches the threshold length, the network node decides to initiate the key change, so that the SN sends a key change instruction to the MN. , to update the key to improve security.
  • the terminal stores a first configuration, and the terminal evaluates the first cell based on the first configuration; when the first cell meets the first condition, the terminal uses the first cell as The target PSCell of the terminal; the terminal determines the target key for accessing the target PSCell according to the first configuration; wherein the first configuration is associated with a candidate PSCell, and the candidate PSCell includes the first cell,
  • the first configuration includes at least one of a conditional primary and secondary cell changing CPC configuration and a conditional primary and secondary cell adding CPA configuration.
  • the terminal can select the first cell as the terminal's target PSCell based on the stored first configuration, and determine the target key for accessing the target PSCell, so that it does not need to obtain the CPAC configuration reconfigured by the network side every time CPAC is executed. Save configuration overhead.
  • Figure 3 is a flow chart of a key determination method provided by an embodiment of the present application. As shown in Figure 3, it includes the following steps:
  • Step 301 Based on the target information, the SN determines the target key currently used and/or to be used for the first cell, which is the PSCell of the terminal;
  • the target information includes at least one of the following:
  • the target key currently used for the first cell may be a key used for current access.
  • the indication information of the MN may be indication information for indicating the target key, or the indication information may be the target key.
  • the information carried by the above-mentioned terminal when performing random access may include at least one of the following:
  • the above-mentioned CPAC times may be the number of times the CPAC process is executed by the terminal for the first cell, and/or the number of times the CPAC process is executed based on the first configuration;
  • the above-mentioned CPAC duration may be the duration of the CPAC process executed by the terminal for the first cell, and/or, the duration of performing the CPAC process based on the first configuration.
  • the target key currently used and/or to be used for the first cell can be accurately determined, thereby supporting the terminal to access the first cell multiple times based on one configuration, thus saving configuration overhead.
  • the method also includes:
  • the SN releases at least one of the following:
  • the SN maintains at least one of the following:
  • the fact that all the above target keys have been used means that terminal access is completed based on the target key and communication with the terminal is performed based on the target key.
  • the MN initially sends the counter value to the terminal, it also sends one or more auxiliary keys (such as auxiliary keys 1 and 2) to the SN.
  • the terminal calculates the auxiliary key 1 based on the counter value and uses it for access.
  • the auxiliary key 2 based on the new counter value and use it for access.
  • the terminal is connected to the SN and both the terminal and the SN communicate based on the auxiliary keys 1 and 2, that is, the auxiliary keys 1 and 2 have been used, then the auxiliary keys 1 and 2 here have been used.
  • the SN since the target key associated with the terminal has been used, the SN releases the context of the terminal, the connection with the MN of the terminal, and the connection with the terminal, thereby saving resource overhead. ; In the case where there is an unused target key among the keys associated with the terminal, the SN maintains the context of the terminal, the connection with the MN of the terminal, and the connection with the terminal, thereby supporting the terminal again Access the first cell based on the first configuration to save configuration overhead.
  • the indication information of the MN includes:
  • the target key wherein the target key is a key calculated by the MN based on the information reported by the terminal; or,
  • the information reported by the terminal includes at least one of the following:
  • the second counter value or the auxiliary key calculated based on the second counter value, the second counter value is the counter value calculated by the terminal on the basis of the first counter value included in the first configuration, wherein,
  • the first configuration is associated with the candidate PSCell, and the first configuration includes at least one of conditional primary and secondary cell change CPC configuration and conditional primary and secondary cell addition CPA configuration;
  • the MN calculates the currently used target key based on the information reported by the terminal.
  • the method also includes:
  • the network node receives the notification information reported by the terminal
  • the network node sends a key change instruction to the MN of the terminal based on the notification information
  • the notification information includes at least one of the following:
  • the duration for which the terminal performs the CPAC process based on the first configuration is the duration for which the terminal performs the CPAC process based on the first configuration.
  • the above notification information is used by the network node to decide whether to initiate a key change. For example, when the number of the above CPAC processes reaches the threshold number, or the above time length reaches the threshold length, the network node decides to initiate the key change, so that the SN sends a key change instruction to the MN. , to update the key to improve security.
  • the target key is a first key
  • the first key is different from the second key
  • the second key is: at the terminal
  • the first cell is used as the terminal
  • the second key is a key used by the SN to communicate with the terminal in the first cell before the terminal uses the first cell as the terminal's target PSCell.
  • the first key is a first auxiliary key
  • the second key is a second auxiliary key
  • the first key is the primary key
  • the second key is the secondary key
  • the first key is a secondary key
  • the second key is a primary key
  • the method also includes:
  • the SN receives a configuration sent by the MN including multiple counter values or multiple keys associated with the first cell.
  • the MN calculates multiple keys based on multiple counter values and sends them to the SN; when the above configuration includes the above multiple counter values, it may be Refers to SN calculating multiple keys based on these multiple counter values.
  • the above configuration can be a CG configuration.
  • the first auxiliary key and the second auxiliary key are keys among the plurality of keys
  • the first auxiliary key is located after the second auxiliary key in a target order, which is the order of the plurality of keys.
  • the SN after the SN receives the configuration associated with the target cell including multiple keys from the MN, when the terminal switches to/selects the target cell as the serving PSCell for the Xth time, the SN sequentially uses the Xth key to communicate with the terminal.
  • the target order is the order from small to large of the plurality of keys.
  • the target order is the order from large to small of the plurality of keys.
  • the target order is the order of the plurality of keys indicated by the configuration.
  • the target order is the order of the multiple keys indicated by the configuration:
  • the configuration carries sequence indication information, and the sequence indication information is used to indicate the target sequence;
  • the target order is the order in which the multiple keys are carried in the configuration.
  • the order of these keys may be indicated according to multiple counter values.
  • the MN indicates the above multiple keys in order from small to large counter values. , that is, the smaller the counter value corresponding to the key, the earlier the key is, and the larger the counter value corresponding to the key is, the later the key is; another example: MN is indicated in order from large to small counter values.
  • MN is indicated in order from large to small counter values.
  • the order of the multiple keys may be determined by the MN.
  • this embodiment is an implementation of SN corresponding to the embodiment shown in Figure 2.
  • Figure 4 is a flow chart of another key determination method provided by an embodiment of the present application. As shown in Figure 4, it includes the following steps:
  • Step 401 The MN determines the target key currently used and/or to be used for the first cell, which is the PSCell of the terminal;
  • Step 402 The MN sends the target key to the secondary node SN.
  • the target key currently used and/or to be used by the first cell determined by the MN may be a target key determined based on the information reported by the terminal, or may be a target key currently used by the first cell determined based on the protocol agreement. , there is no specific limitation on this.
  • the target key currently used by the first cell can be sent to the SN, thereby supporting the terminal to access the first cell multiple times based on one configuration, thereby saving configuration overhead.
  • the method also includes:
  • the MN sends a first configuration to the terminal, where the first configuration includes at least one of the following:
  • the first counter value corresponding to one or more target keys
  • the plurality of target keys are a plurality of target keys used by the terminal for the first cell determined by the MN;
  • the first configuration is associated with the candidate PSCell, and the first configuration includes at least one of conditional primary and secondary cell change CPC configuration and conditional primary and secondary cell addition CPA configuration.
  • the MN determines the target key currently used and/or to be used for the first cell, including:
  • the MN calculates the target key currently used in the first cell based on the information reported by the terminal;
  • the information reported by the terminal includes at least one of the following:
  • the second counter value or the auxiliary key calculated based on the second counter value, the second counter value is the terminal
  • this embodiment is an implementation of the MN corresponding to the embodiment shown in Figure 2.
  • the relevant description of the embodiment shown in Figure 2. In order to avoid repeated explanation, this implementation The examples will not be repeated again.
  • This embodiment mainly uses counter values in sequence for illustration, which may include the following steps:
  • Step 1 The base station sends a CPA or CPC configuration message to the terminal.
  • the base station For each candidate PSCell (candidate PSCell), the base station can obtain security-related configurations in advance.
  • the CPAC configuration in the above message contains one or more counter values, and each PSCell can be associated with one or more counter values.
  • the above CPAC configuration can be configured through an RRC reconfiguration message, where the CPAC configuration can include at least one of the following:
  • conditional reconfiguration includes at least one of the following:
  • One or more counter values are One or more counter values.
  • Step 2 The terminal performs evaluation based on the CPAC configuration (for example, CPC configuration). It is assumed that the current service PSCell of the terminal is Cell-1 at this time. Assume that Candidate PSCell may include Cell2, Cell3, and Cell4. When Cell-2 meets the corresponding conditions, CPC is executed.
  • CPAC configuration for example, CPC configuration
  • Step 3 If the CPC configuration associated with the Cell-2 includes the counter value 1, the terminal deletes the secondary key in use (including S-KgNB or S-KeNB) and calculates it based on the counter value. New secondary key.
  • Step 3.1 If the CPC configuration associated with this Cell-2 does not include the counter value, the UE continues to use the current secondary key.
  • Step 4 For the wireless bearer of the terminal, if it is configured to use a secondary key, the terminal uses the secondary key calculated in step 3 or 3.1 and/or the RRC key further derived based on the secondary key and/ or User Plane (UP) key to encrypt and/or integrity protect the bearer.
  • the terminal uses the secondary key calculated in step 3 or 3.1 and/or the RRC key further derived based on the secondary key and/ or User Plane (UP) key to encrypt and/or integrity protect the bearer.
  • UP User Plane
  • Step 5 The terminal does not delete the CPC configuration and continues evaluation based on the CPC configuration, and the PSCell is changed to Cell-3. Similar to step 3, the secondary key may be updated.
  • Step 6 The terminal evaluates and finds that Cell-2 meets the CPC conditions again.
  • the terminal performs the PSCell change process and changes the PSCell to Cell-2.
  • Step 7 At this point, when the terminal evaluates the change of PSCell to Cell-2, there are several possibilities:
  • Method 1 Assume that in the CPC configuration (for example: condRRCReconfig) saved by the terminal associated with Cell-2, multiple counter values are associated with Cell-2, then the terminal uses a new counter value that is different from the one in step 3, and based on the counter value Calculate the secondary key (including S-KgNB or S-KeNB).
  • CPC configuration for example: condRRCReconfig
  • Method 2 The bearer of this PSCell-2 all uses the primary key instead of the secondary key, that is, it is changed to MN-terminated SCG bearer.
  • Step 8 Optional, for Cell-2, the security activation time can only be after receiving the terminal’s random access request, and Cell-2 needs to determine the use of the terminal based on the number of times it has accessed the cell. Several keys are used to communicate with the terminal. The number of times the terminal accesses the cell can be derived by the SN based on the ID of the UE or based on instructions from additional UEs or MNs.
  • Step 9 Assume that for this Cell-2, all associated counter values have been used, then the terminal deletes the CPC configuration related to the PSCell or deletes the PSCell from the candidate cell, that is, the Cell does not participate in the evaluation. Deletion of configuration may occur when changing from other PSCell to this PSCell-2 or from this PSCell-2 to other PSCell, or when releasing this PSCell-2.
  • Step 9-1 (Network side behavior)
  • the SN if all secondary keys associated with the terminal have been used, the SN releases the terminal context and releases the connection with the MN and/or UE. Otherwise, the SN needs to maintain the terminal context and maintain the connection with the MN.
  • CPC is executed, and the counter value is used and deleted in sequence for illustration:
  • Step 5 During the execution of the PSCell change and for a period of time after completion, the terminal retains at least the CPC configuration associated with Cell-2, but deletes the counter values 1 and 1 from the multiple counter values of the CPC configuration associated with Cell-2. / Or a secondary key derived based on counter value 1 and continue evaluation based on the retained CPC configuration.
  • the terminal changes PSCell to Cell-3. Similar to step 3, the secondary key can be updated.
  • the terminal retains at least the CPC configuration associated with Cell-2 and continues evaluation based on the retained CPC configuration.
  • the terminal can delete the auxiliary key based on local variables, delete the used key every time it is used, and use the latest key every time.
  • the specific deletion-related process can be as follows:
  • the terminal receives the base station reconfiguration message, which contains N counter values.
  • the terminal maintains a variable locally, with a variable name such as VarCondReconfigKeyList, and saves the N counter values or the auxiliary keys calculated based on them.
  • the terminal can for each Each PSCell generates a variable or all PSCells use one variable.
  • Zhang Jiang executes CPC for the first time, it is assumed that the auxiliary key 1 derived from the counter value 1 is used. After use, the counter value in the variable is used. 1 or delete it based on the auxiliary key 1 they calculated, and use it when executing CPC later. New secondary key.
  • the terminal can delete it after executing CPAC; or after initiating random access to the target PSCell, even if the key has been used, and then delete it, regardless of whether the random access succeeds or fails; or it can execute CPAC and succeed. After accessing, delete and so on.
  • Step 9 Assuming that there is no associated counter value for the PSCell-2, the terminal deletes the CPC configuration related to the PSCell or deletes the PSCell from the candidate cell, that is, the Cell does not participate in the evaluation. Deletion of configuration may occur when changing from other PSCell to this PSCell-2, or from this PSCell-2 to other PSCell, or when releasing this PSCell-2.
  • Step 9-1 (Network side behavior)
  • the SN if all secondary keys associated with the terminal have been used, the SN releases the terminal context and releases the connection with the MN and/or the terminal. Otherwise, the SN needs to maintain the terminal context and maintain the connection with the MN and/or UE.
  • the SN releasing the connection with the MN and/or the terminal UE may be instructed by the MN, such as through the SN_RELEAE_REQUEST message.
  • the MN can also instruct the SN to add the CPAC candidate cell again, and then the MN sends the corresponding configuration to the UE, mainly to supplement the counter value.
  • CPA+CPC is used as an example:
  • Step 2 If the current terminal does not have a PSCell, the terminal may perform CPA. When PSCell-1 meets the conditions, add PSCell-1 and use the corresponding value counter to calculate the auxiliary key. The terminal then proceeds to evaluate the CPC. For PSCell-1, both CPA and CPC may be configured. After adding PSCell-1, it may be changed to PSCell-2 and then changed back to PSCell-1.
  • Step 3-5 After changing back to PSCell-1, follow the same steps as steps 7 to 9 in Embodiment 1 or Embodiment 2.
  • Embodiment 4 is a diagrammatic representation of Embodiment 4:
  • This embodiment uses CPA+CPA as an example:
  • Step 2 If the current terminal does not have a PSCell, the terminal may perform CPA. When Cell-1 meets the conditions, the corresponding counter value is used to calculate the secondary key, and the PSCell is changed to Cell-1. Assume that cell-1 is subsequently released, such as SN is released, and the terminal continues to evaluate CPA. Cell-1 may meet the conditions again, and then PSCell-1 needs to be added.
  • Step 3-5 When adding PSCell-1 again, follow the same steps as steps 7 to 9 in Embodiment 1 or 2.
  • the terminal side maintains a set of counter values and the terminal reports key-related parameters as an example:
  • Step 1 The base station sends a CPC configuration message to the terminal.
  • the MN For each candidate PSCell, the MN has communicated the security-related configuration with the SN in advance.
  • the CPC configuration contains a counter value.
  • the MN can indicate the maximum number of times to change the PSCell in the configuration, or use the maximum number or value of the counter value.
  • Step 2 The terminal performs evaluation based on the CPC configuration.
  • the first time is through the counter value in the MN's CPC configuration.
  • the counter value was increased by 1 or N (also called increasing counter by 1 or N).
  • a new auxiliary key is calculated based on the new counter value, and the new counter value is reported to the MN, or the MN learns the terminal switching situation and the latest value of counter based on the UL information reported by the terminal. , and continue to increase the counter value by 1 or N.
  • Step 3 Based on the counter value reported by the terminal and the PSCell of the target change, the MN interacts with the SN and sends the new secondary key to the SN.
  • Step 4 The terminal changes to the target PSCell.
  • Embodiment 6 is a diagrammatic representation of Embodiment 6
  • the terminal side maintains a set of counter values, and the MN sends a handover command to the terminal for illustration:
  • Step 4 The base station sends a confirmation message to the terminal, and the terminal changes to the target PSCell.
  • Embodiment 7 is a diagrammatic representation of Embodiment 7:
  • the terminal side maintains a set of counter values, and the terminal does not need to report the counter value as an example:
  • Step 2 The terminal performs evaluation based on the CPC configuration.
  • the UE wants to change to a new PSCell, if it needs to update the secondary key, the first time is through the counter value in the CPC configuration on the network side.
  • a new auxiliary key is calculated based on the new counter value, and the execution continues to increase the counter value by N.
  • the counter currently used by the terminal can also be known through at least one of various methods such as protocol agreement or notification from the MN or reporting by the terminal (such as random access message message-1 or message-A). value or secondary key to communicate with the terminal.
  • Embodiment 8 is a diagrammatic representation of Embodiment 8
  • the new triggering condition of the secondary key update process initiated by the SN is used as an example:
  • Step 1 The base station sends the CPC configuration message to the UE.
  • Step 2 The terminal evaluates based on the CPC configuration and executes CPC after the new PSCell meets the conditions.
  • Step 3 In the random access message to the PSCell, or in other RRC messages after successful access, the terminal notifies the new PSCell of the number and/or duration of consecutive CPCs it has performed.
  • Step 4 Based on the terminal's report, the SN sends a key change instruction to the MN, requesting to update the SN secret key.
  • Each candidate PSCell is associated with multiple counter values. If the terminal accesses the same PSCell repeatedly, it will be Use the associated counter value to derive the secondary key (for example: Ksn). If all the counter values associated with the cell have been used, delete the configuration of the cell in the CPC;
  • the terminal side maintains a set of counter values, and uses the counter value to calculate a new auxiliary key every time the cell is changed.
  • the SN can initiate a secondary key update request to the MN based on the duration or number of continuous CPACs performed by the current access terminal.
  • the key can be updated in real time, and the key can be applied normally when repeatedly switching to a certain PSCell, so that the communication between the terminal and the base station can perform operations such as encryption and integrity protection normally.
  • Figure 5 is a structural diagram of a cell change processing device provided by an embodiment of the present application.
  • the device stores a first configuration.
  • the cell change processing device 500 includes:
  • Evaluation module 501 configured to evaluate the first cell based on the first configuration
  • the first determination module 502 is configured to use the first cell as the target PSCell of the terminal if the first cell meets the first condition;
  • the second determination module 503 is configured to determine the target key for accessing the target PSCell according to the first configuration
  • the first configuration is associated with a candidate PSCell
  • the candidate PSCell includes the first cell
  • the first configuration includes at least one of a conditional primary and secondary cell changing CPC configuration and a conditional primary and secondary cell adding CPA configuration.
  • the first cell is a cell that has been released by the terminal, or the first cell is a cell that the terminal once camped on or a cell that the terminal has accessed.
  • the terminal's PSCell is changed from the first cell to another cell; or,
  • the terminal Before the terminal uses the first cell as the terminal's target PSCell, the terminal releases the first cell as the terminal's PSCell.
  • the terminal uses the first cell as the target PSCell of the terminal, including:
  • the terminal When the terminal's PSCell is changed from the first cell to another cell, the terminal changes the terminal's target PSCell to the first cell; or
  • the terminal adds the first cell as a target PSCell of the terminal.
  • the target key is a first key
  • the first key is different from the second key
  • the second key is: at the terminal
  • the first cell is used as the terminal
  • the first key is a first auxiliary key
  • the second key is a second auxiliary key
  • the first key is the primary key
  • the second key is the secondary key
  • the first key is a secondary key
  • the second key is a primary key
  • the first configuration includes a plurality of counter values associated with the first cell
  • the first auxiliary key is a auxiliary key calculated based on a counter value among the plurality of counter values
  • the second auxiliary key is an auxiliary key calculated based on another counter value among the plurality of counter values.
  • the first auxiliary key is an auxiliary key calculated based on the first counter value among the plurality of counter values
  • the second auxiliary key is an auxiliary key calculated based on a second counter value among the plurality of counter values, wherein the first counter value is located after the second counter value in the target sequence, and the The target order is the order of the multiple counter values.
  • the target order is the order from small to large of the multiple counter values.
  • the target order is the order from large to small of the multiple counter values; or,
  • the target order is the order of the multiple counter values indicated by the first configuration.
  • the target order is the order of the multiple counter values indicated by the first configuration:
  • the first configuration carries sequence indication information, and the sequence indication information is used to indicate the target sequence;
  • the target sequence is the carrying sequence of the multiple counter values in the first configuration.
  • the device also includes at least one of the following:
  • a first deletion module configured to delete the first configuration when all counter values in the first configuration have been used
  • the second deletion module is configured to delete the first cell from the candidate PSCell when all counter values in the first configuration have been used, or the terminal does not perform any operations on the first cell. Evaluation of the first condition.
  • the first configuration also includes a second cell-associated configuration
  • the device further includes:
  • the third deletion module is configured to delete the configuration associated with the second cell in the first configuration when all the counter values associated with the second cell included in the first configuration have been used.
  • the device also includes at least one of the following:
  • the fourth deletion module is used to delete the counter value that has been used in the first configuration
  • the fifth deletion module is used to delete the auxiliary key that has been used.
  • the fifth deletion module is used to remove the auxiliary key that has been used in the local variable from the local variable, and the local variable is the local variable corresponding to the first configuration.
  • the first configuration includes a first counter value associated with the first cell
  • the first auxiliary key is a auxiliary key calculated based on a second counter value
  • the second counter value is the The counter value obtained by adding M to the counter value corresponding to the second auxiliary key
  • the counter value corresponding to the second auxiliary key includes:
  • the first counter value or, the counter value obtained by adding N to the first counter value
  • M is an integer greater than or equal to 0
  • N is an integer greater than or equal to 1.
  • the device further includes:
  • the first reporting module is used to report at least one of the following to the network node:
  • the second counter value or an auxiliary key calculated based on the second counter value
  • the device also includes:
  • the second reporting module is used to report notification information to the network node, where the notification information includes at least one of the following:
  • the duration for executing the CPAC process based on the first configuration is the duration for executing the CPAC process based on the first configuration.
  • the second reporting module is configured to report the notification information to the network node in a random access message or a radio resource control RRC message.
  • the above cell change processing device can reduce configuration overhead.
  • the cell change processing device in the embodiment of the present application may be an electronic device, such as an electronic device with an operating system, or may be a component in the electronic device, such as an integrated circuit or chip.
  • the electronic device may be a terminal or other devices other than the terminal.
  • the terminal may include but is not limited to the types of terminals listed in the embodiments of this application, and other devices may be servers, network attached storage (Network Attached Storage, NAS), etc., which are not specifically limited in the embodiments of this application.
  • NAS Network Attached Storage
  • the cell change processing device provided by the embodiment of the present application can implement each process implemented by the method embodiment shown in Figure 2 and achieve the same technical effect. To avoid duplication, the details will not be described here.
  • Figure 6 is a structural diagram of a key determination device provided by an embodiment of the present application.
  • the key determination device 600 includes:
  • Determination module 601 configured to determine the target key currently used and/or to be used for the first cell based on the target information, and the first cell is the primary and secondary cell PSCell of the terminal;
  • the target information includes at least one of the following:
  • the device also includes:
  • a release module configured to release at least one of the following when all target keys associated with the terminal have been used:
  • a maintenance module configured to maintain at least one of the following when there is an unused target key among the keys associated with the terminal:
  • the indication information of the MN includes:
  • the target key wherein the target key is a key calculated by the MN based on the information reported by the terminal; or
  • the information reported by the terminal includes at least one of the following:
  • the second counter value or the auxiliary key calculated based on the second counter value, the second counter value is the counter value calculated by the terminal on the basis of the first counter value included in the first configuration, wherein,
  • the first configuration is associated with the candidate PSCell, and the first configuration includes at least one of conditional primary and secondary cell change CPC configuration and conditional primary and secondary cell addition CPA configuration;
  • the device also includes:
  • a first receiving module configured to receive notification information reported by the terminal
  • a sending module configured to send a key change instruction to the MN of the terminal based on the notification information
  • the notification information includes at least one of the following:
  • the duration for which the terminal performs the CPAC process based on the first configuration is the duration for which the terminal performs the CPAC process based on the first configuration.
  • the target key is a first key
  • the first key is different from the second key
  • the second key is: at the terminal
  • the first cell is used as the terminal
  • the first key is a first auxiliary key
  • the second key is a second auxiliary key
  • the first key is the primary key
  • the second key is the secondary key
  • the first key is a secondary key
  • the second key is a primary key
  • the device also includes:
  • the second receiving module is configured to receive a configuration sent by the MN including multiple counter values or multiple keys associated with the first cell.
  • the first auxiliary key and the second auxiliary key are keys among the plurality of keys
  • the first auxiliary key is located after the second auxiliary key in a target order, which is the order of the plurality of keys.
  • the target order is the order from small to large of the plurality of keys.
  • the target order is the order from large to small of the plurality of keys.
  • the target order is the order of the plurality of keys indicated by the configuration.
  • the target order is the order of the multiple keys indicated by the configuration:
  • the configuration carries sequence indication information, and the sequence indication information is used to indicate the target sequence;
  • the target order is the order in which the multiple keys are carried in the configuration.
  • the above key determination device can save configuration overhead.
  • the key determination device in the embodiment of the present application may be an electronic device, such as an electronic device with an operating system, or may be a component in the electronic device, such as an integrated circuit or chip.
  • the electronic device may be a network-side device or other devices other than the terminal.
  • network-side devices may include but are not limited to the types of network-side devices listed in the embodiments of this application.
  • Other devices may be servers, network attached storage (Network Attached Storage, NAS), etc., which are not specifically limited in the embodiments of this application. .
  • the key determination device provided by the embodiment of the present application can implement each process implemented by the method embodiment shown in Figure 3 and achieve the same technical effect. To avoid duplication, details will not be described here.
  • the key determination device 700 includes:
  • Determining module 701 configured to determine the target key currently used and/or to be used for the first cell, which is the primary and secondary cell PSCell of the terminal;
  • the first sending module 702 is used to send the target key to the secondary node SN.
  • the device also includes:
  • the second sending module is configured to send the first configuration to the terminal, where the first configuration includes at least one of the following:
  • the first counter value corresponding to one or more target keys
  • the plurality of target keys are a plurality of target keys used by the terminal for the first cell determined by the MN;
  • the first configuration is associated with the candidate PSCell, and the first configuration includes at least one of a conditional primary and secondary cell changing CPC configuration and a conditional primary and secondary cell adding CPA configuration.
  • the determination module 701 is configured to calculate the target key currently used in the first cell based on the reported information of the terminal; or
  • the information reported by the terminal includes at least one of the following:
  • the second counter value or the auxiliary key calculated based on the second counter value is the counter value calculated by the terminal on the basis of the first counter value included in the first configuration, wherein the second counter value is A configuration is associated with the candidate PSCell, and the first configuration includes at least one of conditional primary and secondary cell change CPC configuration and conditional primary and secondary cell addition CPA configuration;
  • the above key determination device can save configuration overhead.
  • the key determination device in the embodiment of the present application may be an electronic device, such as an electronic device with an operating system, or may be a component in the electronic device, such as an integrated circuit or chip.
  • the electronic device may be a network-side device or other devices other than the terminal.
  • network-side devices may include, but are not limited to, those listed in the embodiments of this application.
  • the type of network side device, other devices may be servers, network attached storage (Network Attached Storage, NAS), etc., which are not specifically limited in the embodiment of this application.
  • the key determination device provided by the embodiment of the present application can implement each process implemented by the method embodiment shown in Figure 4 and achieve the same technical effect. To avoid duplication, details will not be described here.
  • this embodiment of the present application also provides a communication device 800, which includes a processor 801 and a memory 802.
  • the memory 802 stores programs or instructions that can be run on the processor 801, for example.
  • the communication device 800 is a terminal
  • the program or instruction is executed by the processor 801
  • each step of the above embodiment of the cell change processing method on the terminal side is implemented, and the same technical effect can be achieved.
  • the communication device 800 is an SN
  • the program or instruction is executed by the processor 801
  • each step of the key determination method embodiment on the SN side is implemented, and the same technical effect can be achieved.
  • the communication device 800 is an MN
  • the program or instruction is executed by the processor 801
  • each step of the key determination method embodiment on the MN side is implemented, and the same technical effect can be achieved. To avoid duplication, the details are not repeated here.
  • An embodiment of the present application also provides a terminal, including a processor and a communication interface.
  • the processor is configured to evaluate the first cell based on the first configuration; when the first cell meets the first condition, the One cell serves as the target PSCell of the terminal; according to the first configuration, the target key for accessing the target PSCell is determined; wherein the first configuration is associated with a candidate PSCell, and the candidate PSCell includes the first cell,
  • the first configuration includes at least one of a conditional primary and secondary cell changing CPC configuration and a conditional primary and secondary cell adding CPA configuration.
  • This terminal embodiment corresponds to the above-mentioned terminal-side method embodiment. Each implementation process and implementation manner of the above-mentioned method embodiment can be applied to this terminal embodiment, and can achieve the same technical effect.
  • FIG. 9 is a schematic diagram of the hardware structure of a terminal that implements an embodiment of the present application.
  • the terminal 900 includes but is not limited to: a radio frequency unit 901, a network module 902, an audio output unit 903, an input unit 904, a sensor 905, a display unit 906, a user input unit 907, an interface unit 908, a memory 909, a processor 910, etc. At least some parts.
  • the terminal 900 may also include a power supply (such as a battery) that supplies power to various components.
  • the power supply may be logically connected to the processor 910 through a power management system, thereby managing charging, discharging, and power consumption through the power management system. Management and other functions.
  • the terminal structure shown in FIG. 9 does not constitute a limitation on the terminal.
  • the terminal may include more or fewer components than shown in the figure, or may combine certain components, or arrange different components, which will not be described again here.
  • the input unit 904 may include a graphics processing unit (GPU) 9041 and a microphone 9042.
  • the graphics processing unit 9041 is responsible for the image capture device (GPU) in the video capture mode or the image capture mode. Process the image data of still pictures or videos obtained by cameras (such as cameras).
  • the display unit 906 may include a display panel 9061, which may be configured in the form of a liquid crystal display, an organic light emitting diode, or the like.
  • the user input unit 907 includes a touch panel 9071 and at least one of other input devices 9072 .
  • Touch panel 9071 also known as touch screen.
  • the touch panel 9071 may include two parts: a touch detection device and a touch controller.
  • Other input devices 9072 may include but are not limited to physical keyboards, function keys (such as volume control keys, switch keys, etc.), trackballs, mice, and joysticks, which will not be described again here.
  • the radio frequency unit 901 after receiving downlink data from the network side device, can transmit it to the processor 910 for processing; in addition, the radio frequency unit 901 can send uplink data to the network side device.
  • the radio frequency unit 901 includes, but is not limited to, an antenna, an amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, etc.
  • Memory 909 may be used to store software programs or instructions as well as various data.
  • the memory 909 may mainly include a first storage area for storing programs or instructions and a second storage area for storing data, wherein the first storage area may store an operating system, an application program or instructions required for at least one function (such as a sound playback function, Image playback function, etc.) etc.
  • memory 909 may include volatile memory or nonvolatile memory, or memory 909 may include both volatile and nonvolatile memory.
  • non-volatile memory can be read-only memory (Read-Only Memory, ROM), programmable read-only memory (Programmable ROM, PROM), erasable programmable read-only memory (Erasable PROM, EPROM), electrically removable memory.
  • Volatile memory can be random access memory (Random Access Memory, RAM), static random access memory (Static RAM, SRAM), dynamic random access memory (Dynamic RAM, DRAM), synchronous dynamic random access memory (Synchronous DRAM, SDRAM), double data rate synchronous dynamic random access memory (Double Data Rate SDRAM, DDRSDRAM), enhanced synchronous dynamic random access memory (Enhanced SDRAM, ESDRAM), synchronous link dynamic random access memory (Synch link DRAM) , SLDRAM) and direct memory bus random access memory (Direct Rambus RAM, DRRAM).
  • RAM Random Access Memory
  • SRAM static random access memory
  • DRAM dynamic random access memory
  • synchronous dynamic random access memory Synchronous DRAM, SDRAM
  • Double data rate synchronous dynamic random access memory Double Data Rate SDRAM, DDRSDRAM
  • Enhanced SDRAM, ESDRAM synchronous link dynamic random access memory
  • Synch link DRAM synchronous link dynamic random access memory
  • SLDRAM direct memory bus random access memory
  • the processor 910 may include one or more processing units; optionally, the processor 910 integrates an application processor and a modem processor, where the application processor mainly handles operations related to the operating system, user interface, application programs, etc., Modem processors mainly process wireless communication signals, such as baseband processors. It can be understood that the above modem processor may not be integrated into the processor 910.
  • the processor 910 is configured to evaluate the first cell based on the first configuration; when the first cell meets the first condition, use the first cell as the target PSCell of the terminal; according to the The first configuration determines the target key for accessing the target PSCell; wherein the first configuration is associated with a candidate PSCell, the candidate PSCell includes the first cell, and the first configuration includes a conditional primary and secondary cell change CPC Configuration and Conditions The primary and secondary cells add at least one item in the CPA configuration.
  • the first cell is a cell that has been released by the terminal, or the first cell is a cell that the terminal once camped on or a cell that the terminal has accessed.
  • the terminal's PSCell is changed from the first cell to another cell; or,
  • the terminal Before the terminal uses the first cell as the terminal's target PSCell, the terminal releases the first cell as the terminal's PSCell.
  • the terminal uses the first cell as the target PSCell of the terminal, including:
  • the terminal When the terminal's PSCell is changed from the first cell to another cell, the terminal changes the terminal's target PSCell to the first cell; or
  • the terminal adds the first cell as a target PSCell of the terminal.
  • the target key is a first key
  • the first key is different from the second key
  • the second key is: at the terminal
  • the first cell is used as the terminal
  • the first key is a first auxiliary key
  • the second key is a second auxiliary key
  • the first key is the primary key
  • the second key is the secondary key
  • the first key is a secondary key
  • the second key is a primary key
  • the first configuration includes a plurality of counter values associated with the first cell
  • the first auxiliary key is a auxiliary key calculated based on a counter value among the plurality of counter values
  • the second auxiliary key is an auxiliary key calculated based on another counter value among the plurality of counter values.
  • the first auxiliary key is an auxiliary key calculated based on a first counter value among the plurality of counter values
  • the second auxiliary key is calculated based on a second counter value among the plurality of counter values.
  • a secondary key for counter value calculation wherein the first counter value is located after the second counter value in a target sequence, and the target sequence is the sequence of the multiple counter values.
  • the target order is the order from small to large of the multiple counter values.
  • the target order is the order from large to small of the multiple counter values; or,
  • the target order is the order of the multiple counter values indicated by the first configuration.
  • the target order is the order of the multiple counter values indicated by the first configuration:
  • the first configuration carries sequence indication information, and the sequence indication information is used to indicate the target sequence;
  • the target sequence is the carrying sequence of the multiple counter values in the first configuration.
  • processor 910 is also used for at least one of the following:
  • the first cell is deleted from the candidate PSCell, or the terminal does not evaluate the first condition on the first cell.
  • the first configuration also includes a second cell-associated configuration
  • the processor 910 is further configured to:
  • processor 910 is also used for at least one of the following:
  • deleting auxiliary keys that have been used includes:
  • the first configuration includes a first counter value associated with the first cell, and the first auxiliary key is A secondary key calculated based on a second counter value, where the second counter value is a counter value obtained by adding M to the counter value corresponding to the second secondary key, where the counter value corresponding to the second secondary key includes :
  • the first counter value or, the counter value obtained by adding N to the first counter value
  • M is an integer greater than or equal to 0
  • N is an integer greater than or equal to 1.
  • the radio frequency unit 901 is used to:
  • the second counter value or an auxiliary key calculated based on the second counter value
  • the radio frequency unit 901 is used for:
  • the duration for executing the CPAC process based on the first configuration is the duration for executing the CPAC process based on the first configuration.
  • the second reporting module is configured to report the notification information to the network node in a random access message or a radio resource control RRC message.
  • the above terminal can reduce configuration overhead.
  • An embodiment of the present application also provides a network node, including a processor and a communication interface.
  • the processor is configured to determine the target currently used and/or to be used for the first cell based on the target information.
  • the first cell is the primary and secondary cell PSCell of the terminal; wherein the target information includes at least one of the following: indication information of the primary node MN; information carried by the terminal when performing random access.
  • the processor is used to determine the target key currently used and/or to be used for the first cell, which is the primary and secondary cell PSCell of the terminal; the communication interface is used to Send the target key to the secondary node SN.
  • This network node embodiment corresponds to the above-mentioned SN and MN method embodiments. Each implementation process and implementation manner of the above-mentioned method embodiments can be applied to this network side device embodiment, and can achieve the same technical effect.
  • the embodiment of the present application also provides a network node.
  • the network node 1000 includes: an antenna 1001, a radio frequency device 1002, a baseband device 1003, a processor 1004 and a memory 1005.
  • Antenna 1001 is connected to radio frequency device 1002.
  • the radio frequency device 1002 receives information through the antenna 1001 and sends the received information to the baseband device 1003 for processing.
  • the baseband device 1003 processes the information to be sent and sends it to the radio frequency device 1002.
  • the radio frequency device 1002 processes the received information and sends it out through the antenna 1001.
  • the method performed by the network node in the above embodiment can be implemented in the baseband device 1003, which includes a baseband processor.
  • the baseband device 1003 may include, for example, at least one baseband board on which multiple chips are disposed, as shown in FIG. Program to perform the network device operations shown in the above method embodiments.
  • the network node may also include a network interface 1006, which is, for example, a common public radio interface (CPRI).
  • a network interface 1006 which is, for example, a common public radio interface (CPRI).
  • CPRI common public radio interface
  • the network node 1000 in the embodiment of the present invention also includes: instructions or programs stored in the memory 1005 and executable on the processor 1004.
  • the processor 1004 calls the instructions or programs in the memory 1005 to execute the modules shown in Figure 3 The implementation method and achieve the same technical effect will not be repeated here to avoid repetition.
  • the processor 1004 is configured to determine, based on the target information, the target key currently used and/or to be used for the first cell, which is the primary and secondary cell PSCell of the terminal. ;
  • the target information includes at least one of the following:
  • processor 1004 is also used for:
  • the indication information of the MN includes:
  • the target key wherein the target key is a key calculated by the MN based on the information reported by the terminal; or
  • the information reported by the terminal includes at least one of the following:
  • the second counter value or the auxiliary key calculated based on the second counter value, the second counter value is the counter value calculated by the terminal on the basis of the first counter value included in the first configuration, wherein,
  • the first configuration is associated with the candidate PSCell, and the first configuration includes at least one of conditional primary and secondary cell change CPC configuration and conditional primary and secondary cell addition CPA configuration;
  • the radio frequency device 1002 is used for:
  • the notification information includes at least one of the following:
  • the duration for which the terminal performs the CPAC process based on the first configuration is the duration for which the terminal performs the CPAC process based on the first configuration.
  • the target key is a first key
  • the first key is different from the second key
  • the second key is: at the terminal
  • the first cell is used as the terminal
  • the first key is a first auxiliary key
  • the second key is a second auxiliary key
  • the first key is the primary key
  • the second key is the secondary key
  • the first key is a secondary key
  • the second key is a primary key
  • the radio frequency device 1002 is also used for:
  • the first auxiliary key and the second auxiliary key are keys among the plurality of keys
  • the first auxiliary key is located after the second auxiliary key in a target order, which is the order of the plurality of keys.
  • the target order is the order from small to large of the plurality of keys.
  • the target order is the order from large to small of the plurality of keys.
  • the target order is the order of the plurality of keys indicated by the configuration.
  • the target order is the order of the multiple keys indicated by the configuration:
  • the configuration carries sequence indication information, and the sequence indication information is used to indicate the target sequence;
  • the target order is the order in which the multiple keys are carried in the configuration.
  • the above SN can save configuration overhead.
  • the processor 1004 is used to determine the target key currently used and/or to be used for the first cell, which is the primary and secondary cell PSCell of the terminal;
  • the radio frequency device 1002 is configured to send the target key to the secondary node SN.
  • the radio frequency device 1002 is also used for:
  • the first counter value corresponding to one or more target keys
  • the plurality of target keys are a plurality of target keys used by the terminal for the first cell determined by the MN;
  • the first configuration is associated with the candidate PSCell, and the first configuration includes at least one of a conditional primary and secondary cell changing CPC configuration and a conditional primary and secondary cell adding CPA configuration.
  • determining the target key currently used and/or to be used for the first cell includes:
  • the information reported by the terminal includes at least one of the following:
  • the second counter value or the auxiliary key calculated based on the second counter value is the counter value calculated by the terminal on the basis of the first counter value included in the first configuration, wherein the second counter value is A configuration is associated with the candidate PSCell, and the first configuration includes at least one of conditional primary and secondary cell change CPC configuration and conditional primary and secondary cell addition CPA configuration;
  • the above MN can save configuration overhead.
  • Embodiments of the present application also provide a readable storage medium, with a program or instructions stored on the readable storage medium.
  • a program or instructions stored on the readable storage medium.
  • the processor is the processor in the terminal described in the above embodiment.
  • the readable storage medium includes computer readable storage media, such as computer read-only memory ROM, random access memory RAM, magnetic disk or optical disk, etc.
  • An embodiment of the present application further provides a chip.
  • the chip includes a processor and a communication interface.
  • the communication interface is coupled to the processor.
  • the processor is used to run programs or instructions to implement the above-mentioned cell change processing method and password.
  • Each process of the key determination method embodiment can achieve the same technical effect. To avoid repetition, it will not be described again here.
  • chips mentioned in the embodiments of this application may also be called system-on-chip, system-on-a-chip, system-on-chip or system-on-chip, etc.
  • Embodiments of the present application further provide a computer program/program product.
  • the computer program/program product is stored in a storage medium, and the computer program/program product is executed by at least one processor to implement the above cell change processing method.
  • Each process of the key determination method embodiment can achieve the same technical effect. To avoid duplication, it will not be described again here.
  • the embodiment of the present application also provides a transmission determination system, including: a terminal, an SN and an MN.
  • the terminal can be used to perform the steps of the above cell change processing method, and the SN can be used to perform the above key determination method on the SN side.
  • the step key determination method, the MN may be used to perform the step key determination method of the key determination method on the MN side as described above in the third aspect.
  • the methods of the above embodiments can be implemented by means of software plus the necessary general hardware platform. Of course, it can also be implemented by hardware, but in many cases the former is better. implementation.
  • the technical solution of the present application can be embodied in the form of a computer software product that is essentially or contributes to the existing technology.
  • the computer software product is stored in a storage medium (such as ROM/RAM, disk , CD), including several instructions to cause a terminal (which can be a mobile phone, computer, server, air conditioner, or network device, etc.) to execute the methods described in various embodiments of this application.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请提供一种小区变更处理方法、密钥确定方法、装置和设备,该小区变更处理方法包括:在所述第一小区满足第一条件的情况下,所述终端将所述第一小区作为所述终端的目标PSCell;所述终端根据所述第一配置,确定接入目标PSCell的目标密钥;其中,所述第一配置与候选PSCell关联,所述候选PSCell包括所述第一小区,所述第一配置包括CPC配置和CPA配置中的至少一项。

Description

密钥确定方法、装置、终端、网络侧设备和存储介质
相关申请的交叉引用
本申请主张在2022年4月12日在中国提交的中国专利申请No.202210383928.7以及在2022年9月29日在中国提交的中国专利申请No.202211204227.9的优先权,其全部内容通过引用包含于此。
技术领域
本申请属于通信技术领域,具体涉及一种小区变更处理方法、密钥确定方法、装置、终端、网络侧设备和存储介质。
背景技术
目前终端在完成一次条件主辅小区组添加或变更(Conditional PSCell Addition or Change,CPAC)过程后,终端需要将删除CPAC配置,如果后续需要继续进行CPAC,则需要网络侧为终端重新配置CPAC配置,这样导致配置开销过大。
发明内容
本申请实施例提供一种小区变更处理方法、密钥确定方法、装置、终端、网络侧设备和存储介质,以解决配置开销过大的问题。
第一方面,提供了一种小区变更处理方法,终端存储有第一配置,所述方法包括:
终端基于所述第一配置对第一小区评估;
在所述第一小区满足第一条件的情况下,所述终端将所述第一小区作为所述终端的目标主辅小区(Primary Secondary Cell,PSCell);
所述终端根据所述第一配置,确定接入目标PSCell的目标密钥;
其中,所述第一配置与候选PSCell关联,所述候选PSCell包括所述第一小区,所述第一配置包括条件主辅小区变更(Conditional PSCell Change,CPC)配置和条件主辅小区添加(Conditional PSCell Addition,CPA)配置中的至少一项。
第二方面,提供了一种密钥确定方法,包括:
辅节点(Secondary node,SN)基于目标信息,确定针对第一小区当前使用和/或待使用的目标密钥,所述第一小区为所述终端的PSCell;
其中,所述目标信息包括如下至少一项:
主节点(Master node,MN)的指示信息;
终端进行随机接入时携带的信息。
第三方面,提供了一种密钥确定方法,包括:
主节点MN确定针对第一小区当前使用和/或待使用的目标密钥,所述第一小区为所述终端的主辅小区PSCell;
所述MN向辅节点SN发送所述目标密钥。
第四方面,提供了一种小区变更处理装置,所述装置存储有第一配置,所述装置包括:
评估模块,用于基于所述第一配置对第一小区评估;
第一确定模块,用于在所述第一小区满足第一条件的情况下,将所述第一小区作为所述终端的目标PSCell;
第二确定模块,用于根据所述第一配置,确定接入目标PSCell的目标密钥;
其中,所述第一配置与候选PSCell关联,所述候选PSCell包括所述第一小区,所述第一配置包括条件主辅小区变更CPC配置和条件主辅小区添加CPA配置中的至少一项。
第五方面,提供了一种密钥确定装置,包括:
确定模块,用于基于目标信息,确定针对第一小区当前使用和/或待使用的目标密钥,所述第一小区为所述终端的主辅小区PSCell;
其中,所述目标信息包括如下至少一项:
主节点MN的指示信息;
终端进行随机接入时携带的信息。
第六方面,提供了一种密钥确定装置,包括:
确定模块,用于确定针对第一小区当前使用和/或待使用的目标密钥,所述第一小区为所述终端的主辅小区PSCell;
第一发送模块,用于向辅节点SN发送所述目标密钥。
第七方面,提供了一种终端,包括处理器和存储器,所述存储器存储可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现本申请实施例提供的小区变更处理方法的步骤。
第八方面,提供了一种终端,包括处理器及通信接口,其中,所述处理器用于基于所述第一配置对第一小区评估;在所述第一小区满足第一条件的情况下,将所述第一小区作为所述终端的目标PSCell;根据所述第一配置,确定接入目标PSCell的目标密钥;其中,所述第一配置与候选PSCell关联,所述候选PSCell包括所述第一小区,所述第一配置包括条件主辅小区变更CPC配置和条件主辅小区添加CPA配置中的至少一项。
第九方面,提供了一种网络节点,所述网络节点为SN,包括处理器和存储器,所述存储器存储可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现本申请实施例提供的SN侧的密钥确定方法的步骤。
第十方面,提供了一种网络节点,所述网络节点为SN,包括处理器及通信接口,其中,所述处理器用于基于目标信息,确定针对第一小区当前使用和/或待使用的目标密钥, 所述第一小区为所述终端的主辅小区PSCell;其中,所述目标信息包括如下至少一项:MN的指示信息;终端进行随机接入时携带的信息。
第十一方面,提供了一种网络节点,所述网络节点为主节点MN,包括处理器和存储器,所述存储器存储可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现本申请实施例提供的MN侧的密钥确定方法的步骤。
第十二方面,提供了一种网络节点,所述网络节点为MN,包括处理器及通信接口,其中,所述处理器用于确定针对第一小区当前使用和/或待使用的目标密钥,所述第一小区为所述终端的主辅小区PSCell;通信接口用于向辅节点SN发送所述目标密钥。
第十三方面,提供了一种资源确定系统,包括:终端、SN和MN,所述终端可用于执行如第一方面所述的小区变更处理方法的步骤,所述SN可用于执行如第二方面所述的密钥确定方法的步骤,所述MN可用于执行如第三方面所述的密钥确定方法的步骤。
第十四方面,提供了一种可读存储介质,所述可读存储介质上存储程序或指令,所述程序或指令被处理器执行时实现本申请实施例提供的小区变更处理方法的步骤,或者实现本申请实施例提供的SN侧的密钥确定方法的步骤,或者实现本申请实施例提供的MN侧的密钥确定方法的步骤。
第十五方面,提供了一种芯片,所述芯片包括处理器和通信接口,所述通信接口和所述处理器耦合,所述处理器用于运行程序或指令,实现如第一方面所述的方法,或实现如第二方面所述的方法,或实现如第三方面所述的方法。
第十六方面,提供了一种计算机程序/程序产品,所述计算机程序/程序产品被存储在存储介质中,所述计算机程序/程序产品被至少一个处理器执行以实现本申请实施例提供的小区变更处理方法的步骤,或所述计算机程序/程序产品被至少一个处理器执行以实现本申请实施例提供的SN侧的密钥确定方法的步骤,或所述计算机程序/程序产品被至少一个处理器执行以实现本申请实施例提供的MN侧的密钥确定方法的步骤。
本申请实施例中,终端存储有第一配置,终端基于所述第一配置对第一小区评估;在所述第一小区满足第一条件的情况下,所述终端将所述第一小区作为所述终端的目标PSCell;所述终端根据所述第一配置,确定接入目标PSCell的目标密钥;其中,所述第一配置与候选PSCell关联,所述候选PSCell包括所述第一小区,所述第一配置包括条件主辅小区变更CPC配置和条件主辅小区添加CPA配置中的至少一项。这样可以实现终端基于存储的第一配置选择第一小区作为终端的目标PSCell,以及确定接入目标PSCell的目标密钥,从而不需要每次执行CPAC都需要获取网络侧重新配置的CPAC配置,进而节约配置开销。
附图说明
图1是本申请实施例可应用的一种无线通信系统的框图;
图2是本申请实施例提供的一种小区变更处理方法的示意图;
图3是本申请实施例提供的一种密钥确定方法的流程图;
图4是本申请实施例提供的另一种密钥确定方法的流程图;
图5是本申请实施例提供的一种小区变更处理装置的结构图;
图6是本申请实施例提供的一种密钥确定装置的结构图;
图7是本申请实施例提供的另一种密钥确定装置的结构图;
图8是本申请实施例提供的一种通信设备的结构图;
图9是本申请实施例提供的一种终端的结构图;
图10是本申请实施例提供的一种网络节点的结构图。
具体实施方式
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员所获得的所有其他实施例,都属于本申请保护的范围。
本申请的说明书和权利要求书中的术语“第一”、“第二”等是用于区别类似的对象,而不用于描述特定的顺序或先后次序。应该理解这样使用的术语在适当情况下可以互换,以便本申请的实施例能够以除了在这里图示或描述的那些以外的顺序实施,且“第一”、“第二”所区别的对象通常为一类,并不限定对象的个数,例如第一对象可以是一个,也可以是多个。此外,说明书以及权利要求中“和/或”表示所连接对象的至少其中之一,字符“/”一般表示前后关联对象是一种“或”的关系。
值得指出的是,本申请实施例所描述的技术不限于长期演进型(Long Term Evolution,LTE)/LTE的演进(LTE-Advanced,LTE-A)系统,还可用于其他无线通信系统,诸如码分多址(Code Division Multiple Access,CDMA)、时分多址(Time Division Multiple Access,TDMA)、频分多址(Frequency Division Multiple Access,FDMA)、正交频分多址(Orthogonal Frequency Division Multiple Access,OFDMA)、单载波频分多址(Single-carrier Frequency Division Multiple Access,SC-FDMA)和其他系统。本申请实施例中的术语“系统”和“网络”常被可互换地使用,所描述的技术既可用于以上提及的系统和无线电技术,也可用于其他系统和无线电技术。以下描述出于示例目的描述了新空口(New Radio,NR)系统,并且在以下大部分描述中使用NR术语,但是这些技术也可应用于NR系统应用以外的应用,如第6代(6th Generation,6G)通信系统。
图1示出本申请实施例可应用的一种无线通信系统的框图。无线通信系统包括终端11、MN12和SN13。其中,终端11可以是手机、平板电脑(Tablet Personal Computer)、膝上型电脑(Laptop Computer)或称为笔记本电脑、个人数字助理(Personal Digital Assistant,PDA)、掌上电脑、上网本、超级移动个人计算机(ultra-mobile personal computer,UMPC)、移动上网装置(Mobile Internet Device,MID)、增强现实(augmented reality,AR)/虚拟现实(virtual reality,VR)设备、机器人、可穿戴式设备(Wearable Device)、车载设备(Vehicle  User Equipment,VUE)、行人终端(Pedestrian User Equipment,PUE)、智能家居(具有无线通信功能的家居设备,如冰箱、电视、洗衣机或者家具等)、游戏机、个人计算机(personal computer,PC)、柜员机或者自助机等终端侧设备,可穿戴式设备包括:智能手表、智能手环、智能耳机、智能眼镜、智能首饰(智能手镯、智能手链、智能戒指、智能项链、智能脚镯、智能脚链、智能头盔、智能操纵杆等)、智能腕带、智能服装等。需要说明的是,在本申请实施例并不限定终端11的具体类型。
MN12和SN13可以包括接入网设备和核心网设备,其中,接入网设备也可以称为无线接入网设备、无线接入网(Radio Access Network,RAN)、无线接入网功能或无线接入网单元。接入网设备可以包括基站、无线局域网(Wireless Local Area Network,WLAN)接入点或WiFi节点等,基站可被称为节点B、演进节点B(eNB)、接入点、基收发机站(Base Transceiver Station,BTS)、无线电基站、无线电收发机、基本服务集(Basic Service Set,BSS)、扩展服务集(Extended Service Set,ESS)、家用B节点、家用演进型B节点、发送接收点(Transmitting Receiving Point,TRP)或所述领域中其他某个合适的术语,只要达到相同的技术效果,所述基站不限于特定技术词汇,需要说明的是,在本申请实施例中仅以NR系统中的基站为例进行介绍,并不限定基站的具体类型。
另外,本申请实施例中,MN12和SN13可以为双连接(Dual Connectivity,DC)场景中,为终端提供MN和SN。每个网络节点使用载波聚合(Carrier Aggregation,CA)技术,即为终端配置由该节点控制的一系列服务小区,也称小区组(cell group)。MN控制的为主小区组(MCG,Master Cell Group),SN控制的为辅小区组(SCG,Secondary Cell Group)。每个小区组都包含一个特殊小区(Special Cell,SpCell)和一系列辅小区(Scell,Secondary Cell)。在MCG中特殊小区称为主小区(Primary Cell,PCell),在SCG中特殊小区称为主辅小区(Primary Secondary Cell,PSCell)。在一个小区组中SpCell使用主载波,而其他辅小区使用辅载波,一个小区组内的资源调度由SpCell进行。
本申请实施例中,CPAC过程可以包括:CPA和CPC;
其中,CPA是终端评估执行条件并在执行条件满足后执行的主辅小区添加。
CPA配置可以包含CPA候选小区的配置和执行条件。执行条件可以包含一个或者多个触发条件。
CPC是终端评估执行条件并在执行条件满足后执行的主辅小区变更,终端接收到CPC配置后开始评估执行条件,终端在主辅小区变更触发后停止评估执行条件。
CPC配置可以包含CPC候选小区的配置和执行条件。执行条件可能包含一个或者多个触发条件。
CPC包括多种场景可以包括如下至少一项:
辅节点内主辅小区条件变更(Intra-SN CPC);
主节点发起的辅节点间主辅小区条件变更(MN initiated Inter-SN CPC);
辅节点发起的辅节点间主辅小区条件变更(SN initiated Inter-SN CPC)。
下面结合附图,通过一些实施例及其应用场景对本申请实施例提供的一种小区变更处理方法、密钥确定方法、装置和设备进行详细地说明。
请参见图2,图2是本申请实施例提供的一种小区变更处理方法的流程图,如图2所示,包括以下步骤,包括:
步骤201、终端基于所述第一配置对第一小区评估。
其中,终端存储有第一配置。
所述第一配置与候选PSCell关联,所述候选PSCell包括所述第一小区,所述第一配置包括CPC配置和CPA配置中的至少一项。
上述终端存储有第一配置可以理解为,在终端释放上述第一小区后,终端存储上述第一配置,或者,终端驻留上述第一小区,再释放第一小区后,终端存储上述第一配置。或者可以是,在执行步骤201之前终端存储有第一配置,如在执行步骤201之前终端已经使用过该配置进行CPC或者CPA。
在一些实施方式中,步骤201可以是在终端释放上述第一小区后,或者,终端驻留上述第一小区,再释放第一小区后,基于上述第一配置对第一小区评估;或者,步骤201可以是使用上述第一配置首次对上述第一小区进行评估。
在一些实施方式中,上述第一配置可以是接收网络侧发送的CPA或CPC配置消息,该配置中包括多个候选PSCell的安全相关的配置。本申请实施例中,上述第一配置也可以称作CPAC配置。
在一些实施方式中,上述第一配置包括如下至少一项:
条件重配置;
执行条件(execution condition)。
其中,条件重配置包括如下至少一项:
候选SCG,用于CPAC;
一个或多个计数(counter)值。
在一些实施方式中,每个PSCell可以和一个或多个counter值进行关联,这些counter值用于确定密钥。
本申请实施例中,counter值可以是用于计算密钥的计数器(sk-counter)值或者SN counter值。
需要说明的是,本申请实施例中,counter值也可以称作counter。
在一些实施方式中,上述第一配置可以是无线资源控制(Radio Resource Control,RRC)重配置消息指示的配置
步骤202、在所述第一小区满足第一条件的情况下,所述终端将所述第一小区作为所述终端的目标PSCell。
上述第一条件为上述第一配置关联的条件,例如:第一配置包括的执行条件(execution condition),如CPC的执行条件或者CPA的执行条件。
上述终端将所述第一小区作为所述终端的目标PSCell可以是,针对上述第一小区执行CPC或者CPA过程。例如:可以是首次做第一小区作为终端的目标PSCell,或者,在步骤202之前,终端将第一小区作为终端的目标PSCell,但后续进行了变更或者释放。
步骤203、所述终端根据所述第一配置,确定接入目标PSCell的目标密钥。
上述根据所述第一配置,确定接入目标PSCell的目标密钥可以是,确定第一配置对应的主密钥或者辅密钥。
本申请实施例中,通过上述步骤可以实现终端基于存储的第一配置选择第一小区作为终端的目标PSCell,以及确定接入目标PSCell的目标密钥,从而不需要每次执行CPAC都需要获取网络侧重新配置的CPAC配置,进而节约配置开销。
作为一种可选的实施方式,所述第一小区为所述终端已经释放过的小区,或者,所述第一小区为所述终端曾经驻留的小区或者所述终端接入过的小区。
该实施方式中,可以实现在已经释放过的第一小区或终端曾经驻留的小区的情况下,终端可以基于存储的第一配置再次选择第一小区作为终端的目标PSCell,从而只需要为终端配置一个第一配置,进而节约配置开销。例如:终端基于第一配置将第一小区作为PScell后,PScell由第一小区变更为第二小区,之后,终端又基于第一配置从将第一小区变更PScell。
作为一种可选的实施方式,在终端将所述第一小区作为所述终端的目标PSCell之前,所述终端的PSCell从所述第一小区变更到其他小区;或者,
在终端将所述第一小区作为终端的目标PSCell之前,所述终端将作为所述终端的PSCell的所述第一小区释放。
上述终端的PSCell从所述第一小区变更到其他小区可以是,终端的PSCell从第一小区进行一次或者多次变更,例如:终端的PSCell从所述第一小区变更到第二小区,再由第二小区变更到其他小区,再从其他小区变更为第一小区;或者,终端的PSCell从所述第一小区变更到第二小区,再由第二小区变更到第一小区。
上述终端将作为所述终端的PSCell的所述第一小区释放可以是,终端通过CPA或者CPC将第一小区作为终端的PSCell,之后终端释放第一小区。
可选的,所述终端将所述第一小区作为所述终端的目标PSCell,包括:
在所述终端的PSCell从所述第一小区变更到其他小区的情况下,所述终端将所述终端的目标PSCell变更为所述第一小区;或者
所述终端将所述第一小区添加为所述终端的目标PSCell。
上述终端将所述第一小区添加为所述终端的目标PSCell可以是,在终端的PSCell从所述第一小区变更到其他小区,或者,终端将第一小区释放的情况下,将所述第一小区添加为所述终端的目标PSCell。
该实施方式中,可以实现通过CPA或者CPC将第一小区作为终端的目标PSCell。
作为一种可选的实施方式,所述目标密钥为第一密钥,所述第一密钥与第二密钥不同, 所述第二密钥为:在所述终端将所述第一小区作为所述终端的目标PSCell之前,所述终端针对所述第一小区使用的密钥。
该实施方式中,由于第二密钥为在终端将第一小区作为所述终端的目标PSCell之前,终端针对第一小区使用的密钥,这样可以实现终端每次接入第一小区时使用不同的密钥,从而提高安全性。
可选的,所述第一密钥为第一辅密钥,所述第二密钥为第二辅密钥;或者
所述第一密钥为主密钥,所述第二密钥为辅密钥;或者
所述第一密钥为辅密钥,所述第二密钥为主密钥。
其中,上述第一辅密钥和第二辅密钥为两个不同的辅密钥,具体可以是基于不同的counter值计算的辅密钥。
上述主密钥可以是MCG承载对应的密钥。
该实施方式中,由于第一密钥为主密钥,第二密钥为辅密钥,或者,第一密钥为辅密钥,第二密钥为主密钥,这样可以实现保证每次接入第一小区时使用不同的密钥时,还可以实现使用主密钥接入PSCell,以进一步提高接入PSCell的安全性。
可选的,所述第一配置包括所述第一小区关联的多个计数counter值,所述第一辅密钥为基于所述多个counter值中的一个counter值计算的辅密钥,所述第二辅密钥为基于所述多个counter值中的另一个counter值计算的辅密钥。
该实施方式中,可以实现使用不同的counter值计算不同的辅密钥,以保证终端每次接入第一小区时使用不同的密钥,从而提高安全性。
可选的,所述第一辅密钥为基于所述多个counter值中的第一counter值计算的辅密钥,所述第二辅密钥为基于所述多个counter值中的第二counter值计算的辅密钥,其中,所述第一counter值在目标顺序中位于所述第二counter值之后,所述目标顺序为所述多个counter值的顺序。
上述第一counter值在目标顺序中位于所述第二counter值之后可以理解为,终端按照上述目标顺序依次使用上述多个counter值中的counter值。
例如:上述目标顺序为:counter值A-counter值B-counter值C-counter值D,则在上述第二counter值为counter值A时,第一counter值为counter值B,在上述第二counter值为counter值B时,第一counter值为counter值C,在上述第二counter值为counter值C时,第一counter值为counter值D。
该实施方式中,由于终端按照上述目标顺序依次使用上述多个counter值中的counter值计算辅密钥,从而使得终端和网络侧对每次使用的辅密钥容易直接、且准确地确定,且理解一致。
可选的,所述目标顺序为所述多个counter值的从小到大的顺序;或者,
所述目标顺序为所述多个counter值的从大到小的顺序;或者,
所述目标顺序为所述第一配置指示的所述多个counter值的顺序。
该实施方式中,可以实现终端将目标PSCell变更为第一小区时,按照从小到大的顺序或从大到小的顺序,依次使用。
例如:对于从小到大的情况,终端第一次接入第一小区时(如将第一小区添加为PSCell或从其他小区变更到第一小区),使用counter值x,第二次接入第一小区时,使用counter值y,第三次使用counter值z,其中counter值x<counter值y<counter值z,且首先被使用的counter值x需要为多个counter值中最小的值。
例如:对于从大到小的情况,终端第一次接入第一小区时,使用counter值z,第二次接入第一小区时,使用counter值y,第三次使用counter值x,其中counter值x<counter值y<counter值z,且首先被使用的counter值z需要为多个counter值中最大的值。
上述第一配置指示的所述多个counter值的顺序可以是,第一配置显式或者隐式指示的所述多个counter值的顺序。例如:在所述目标顺序为所述第一配置指示的所述多个counter值的顺序的情况下:
所述第一配置中携带有顺序指示信息,所述顺序指示信息用于指示所述目标顺序;或者
所述目标顺序为所述多个counter值在所述第一配置中的携带顺序。
例如:第一配置中的多个counter值,会在配置中额外携带这多个counter值的使用顺序配置,一串可以标识不同counter值的顺序指示。
例如:在隐式指示的情况下,上述目标顺序通过counter值在配置中的携带顺序,如第一配置第一个条目(entry)处的counter值最先使用,第二个entry处的counter值第二个使用,以此类推。
需要说明的是,本申请实施例中并不限定按照上述目标顺序使用上述多个counter值,例如:在一些实施方式中,也可以采用其他顺序,或者随机使用。
可选的,所述方法还包括如下至少一项:
在所述第一配置中的counter值都已经被使用过的情况下,所述终端删除所述第一配置;
在所述第一配置中的counter值都已经被使用过的情况下,所述终端从候选PSCell中删除所述第一小区,或,所述终端不对所述第一小区进行所述第一条件的评估。
上述删除配置和第一小区可以是,在终端的PSCell变更到第一小区时删除,或从终端的PSCell从而第一小区变更到其他小区时删除,或释放第一小区时删除。
该实施方式中,由于在第一配置中的counter值都已经被使用过的情况下,删除第一配置,这样可以避免后续使用第一配置评估小区时,没有可用counter值导致变更或者添加PSCell失败的问题。
该实施方式中,由于在第一配置中的counter值都已经被使用过的情况下,从候选PSCell中删除第一小区,或,不对第一小区进行第一条件的评估,这样可以避免后续使用第一配置评估第一小区时,没有可用counter值导致变更或者添加PSCell失败的问题。
可选的,所述第一配置还包括第二小区关联的配置,所述方法还包括:
在所述第一配置中包括的所述第二小区关联的counter值都已经被使用过的情况下,所述终端删除所述第一配置中所述第二小区关联的配置。
上述第一配置还包括第二小区关联的配置可以是,上述第一配置中可以包括多个小区关联的配置,而上述第二小区可以是任一小区,这样可以实现在任一小区关联的counter值都已经被使用过的情况下,删除第一配置中该小区关联的配置,以避免后续还使用第一配置对该小区进行评估,导致变更或者添加PSCell失败的问题。
可选的,所述方法还包括如下至少一项:
所述终端在所述第一配置中删除已经被使用过的counter值;
所述终端删除已经被使用过的辅密钥。
上述终端在所述第一配置中删除已经被使用过的counter值可以是,在基于某一个counter值计算辅密钥后,就删除该counter值。
上述删除已经被使用过的辅密钥可以是,使用完在某一个辅密钥接入PSCell后,删除该辅密钥,或者可以是使用某一个辅密钥接入PSCell后,PSCell发生变更或者释放PSCell时,删除该辅密钥。
该实施方式中,由于删除已经被使用过的counter值,删除已经被使用过的辅密钥,这样可以避免后续再次计算出相同的辅密钥,保证每次都是使用新的密钥,以提高安全性。
可选的,所述终端删除已经被使用过的辅密钥,包括:
所述终端将本地变量中已经被使用过的辅密钥从本地变量中移除,所述本地变量为所述第一配置对应的本地变量。
该实施方式中,可以实现基于本地变量来实现,每使用一次就删除用过的辅密钥,以保证每次都使用最新的密钥,以提高安全性。
例如:终端收到网络侧发送的重配置消息,该消息中包含了N个counter值,终端在本地维护一个变量,变量名如VarCondReconfigKeyList,将N个counter值或基于他们计算出来的辅密钥进行保存,终端可以对于每个PSCell都生成一个该变量或所有PSCell用一个变量,然后当终端第一次执行CPC的时候假设用了counter1值推导出的辅密钥1,用完之后,将变量中的该counter值1或基于该counter值1计算出来的辅密钥1进行删除,后续执行CPC的时候就用新的辅密钥。
可选的,所述第一配置包括所述第一小区关联的第一counter值,所述第一辅密钥为基于第二counter值计算的辅密钥,所述第二counter值为所述第二辅密钥对应的counter值加M得到的counter值,其中,所述第二辅密钥对应的counter值包括:
所述第一counter值;或者,将所述第一counter值加N得到的counter值;
其中,M为大于或者等于0的整数,N为大于或者等于1的整数。
其中,上述第一counter值为一个counter值。
上述N和M的取值可以是协定定义的,或者网络侧配置的,在一些实施方式中,上 述N和M的取值也可以是由终端决定的。
上述第一辅密钥可以是在接入上述第一小区时计算的,也可以是在使用完上述第二辅密钥后计算的,对此不作限定。
所述第二辅密钥对应的counter值包括所述第一counter值可以理解为,上述第二辅密钥是终端第一次接入第一小区所使用的密钥;上述第二辅密钥对应的counter值包括将第一counter值加N得到的counter值可以理解为,上述第二辅密钥可以是终端第二次、第三次或者更多次接入第一小区所使用的密钥。
该实施方式中,可以基于第一counter值,实现每次接入第一小区都使用不同的值计算辅密钥,以节约第一配置的开销,因为,不需要配置多个counter值。
例如:终端基于第一配置进行评估,当终端要变更到新的PSCell时,第一次是通过第一配置中的counter值,在计算出新的辅密钥后或在下次计算新密钥之前,将counter值增加N。后面每次则是根据新的counter值,来计算出新的辅密钥,并将新的counter值上报给MN,或MN根据UE上报的上行信息(UL information)来得知终端切换的情况并获得counter值的最新取值,并继续执行将counter值增加N。
可选的,上述第一配置还包括基于第一配置变更PSCell的最大次数,或者是使用上述第一counter值的最大次数或最大值。
这样可以避免终端使用上述第一配置变更PSCell的次数过多导致安全性降低的问题。
可选的,在所述第一辅密钥为基于所述第二counter值计算的辅密钥的情况下,所述方法还包括:
所述终端向网络节点上报如下至少一项:
所述第二counter值,或,基于所述第二counter值计算的辅密钥;
基于所述第一配置将所述第一小区作为PSCell的次数;
基于所述第一配置执行条件主辅小区组添加或变更CPAC过程的次数。
上述基于所述第一配置将所述第一小区作为PSCell的次数可以用于网络节点计算出终端当前使用的密钥,上述基于所述第一配置执行CPAC过程的次数也可以用于网络节点计算出终端当前使用的密钥。例如:基于执行CPAC过程的次数,网络节点可以自行将counter值进行增加相应的值来得到终端当前使用的counter值,进而计算出相应的密钥。
该实施方式中,上述网络节点可以是MN,当然,对此不作限定,例如:在一些实施方式中,上述网络节点也可以是SN。
该实施方式中,通过上报上述至少一项可以使得网络节点获取准备的密钥,以与终端进行通信,避免通信错误发生。
作为一种可选的实施方式,所述方法还包括:
所述终端向网络节点上报通知信息,所述通知信息包括如下至少一项:
所述终端针对所述第一小区执行的CPAC过程的次数;
所述终端针对所述第一小区执行的CPAC过程的时长;
基于所述第一配置执行CPAC过程的次数;
基于所述第一配置执行CPAC过程的时长。
上述执行CPAC过程的次数和执行CPAC过程的时长可以是,终端基于第一配置执行所有小区对应的CPAC过程的次数和时长。
上述终端向网络节点上报通知信息,可以包括:
所述终端在随机接入消息或者无线资源控制(Radio Resource Control,RRC)消息向网络节点上报通知信息。
在一些实施方式中,也可以通过随机接入消息向网络节点上报通知信息。
上述网络节点可以是SN,当然,在一些实施方式中,上述网络节点也可以是MN。
上述通知信息用于网络节点决定是否发起密钥变更,例如:在上述CPAC过程次数达到阈值次数,或者上述时长达到阈值时长的情况下,决定发起密钥变更,从而SN向MN发送密钥变更指示,以更新密钥,达到提高安全性的效果。
本申请实施例中,终端存储有第一配置,终端基于所述第一配置对第一小区评估;在所述第一小区满足第一条件的情况下,所述终端将所述第一小区作为所述终端的目标PSCell;所述终端根据所述第一配置,确定接入目标PSCell的目标密钥;其中,所述第一配置与候选PSCell关联,所述候选PSCell包括所述第一小区,所述第一配置包括条件主辅小区变更CPC配置和条件主辅小区添加CPA配置中的至少一项。这样可以实现终端基于存储的第一配置选择第一小区作为终端的目标PSCell,以及确定接入目标PSCell的目标密钥,从而不需要每次执行CPAC都需要获取网络侧重新配置的CPAC配置,进而节约配置开销。
请参见图3,图3是本申请实施例提供的一种密钥确定方法的流程图,如图3所示,包括以下步骤:
步骤301、SN基于目标信息,确定针对第一小区当前使用和/或待使用的目标密钥,所述第一小区为所述终端的PSCell;
其中,所述目标信息包括如下至少一项:
主节点MN的指示信息;
终端进行随机接入时携带的信息。
上述针对第一小区当前使用的目标密钥可以是,针对当前接入使用的密钥。
上述MN的指示信息可以是用于指示上述目标密钥的指示信息,或者,上述指示信息为上述目标密钥。
上述终端进行随机接入时携带的信息可以包括如下至少一项:
CPAC次数、CPAC时长、counter值、
上述CPAC次数可以是,终端针对第一小区执行的CPAC过程的次数,和/或,基于第一配置执行CPAC过程的次数;上述CPAC时长可以是,终端针对第一小区执行的CPAC过程的时长,和/或,基于第一配置执行CPAC过程的时长。
本实施例中,可以准确地确定针对第一小区当前使用和/或待使用的目标密钥,从而支持终端基于一个配置多次接入第一小区,进而节约配置开销。
可选的,所述方法还包括:
在与所述终端关联的目标密钥都已经被使用过的情况下,所述SN释放如下至少一项:
所述终端的上下文;
与所述终端的主节点MN的连接;
与所述终端的连接;
其中,在与所述终端关联的密钥中还存在未被使用过的目标密钥的情况下,所述SN维持如下至少一项:
所述终端的上下文;
与所述终端的MN的连接;
与所述终端的连接。
上述目标密钥都已经被使用过是指,基于目标密钥完成终端接入,以及基于目标密钥与终端进行通信。例如:一开始MN在发送counter值给终端时,也给SN发送一个或多个辅密钥(如辅密钥1和2),终端基于counter值计算出辅密钥1,并使用其接入,稍后又基于新的counter值计算出辅密钥2,并使用其接入。当终端接入了SN并且终端和SN都基于辅密钥1和2进行通信,即辅密钥1和2都使用过了,那么就是这里的辅密钥1和2就是都被使用过的。
该实施方式中,由于在与终端关联的目标密钥都已经被使用过的情况下,SN释放所述终端的上下文,与所述终端的MN的连接,与终端的连接,从而可以节约资源开销;而在在与终端关联的密钥中还存在未被使用过的目标密钥的情况下,SN维持终端的上下文,与终端的MN的连接,与所述终端的连接,从而可以支持终端再次基于第一配置接入第一小区,以节约配置开销。
作为一种可选的实施方式,所述MN的指示信息,包括:
所述目标密钥;其中,所述目标密钥为所述MN基于终端的上报信息计算的密钥;或,
在所述终端的上报信息中携带的密钥。
可选的,所述终端的上报信息包括如下至少一项:
第二counter值或基于所述第二counter值计算的辅密钥,所述第二counter值为所述终端在第一配置包括的第一counter值的基础上计算得到的counter值,其中,所述第一配置与候选PSCell关联,所述第一配置包括条件主辅小区变更CPC配置和条件主辅小区添加CPA配置中的至少一项;
所述终端基于所述第一配置将所述第一小区作为PSCell的次数;
所述终端基于所述第一配置执行条件主辅小区组添加或变更CPAC过程的次数。
该实施方式中,可以是在第一配置包括一个counter值的情况下,MN基于终端上报的信息计算当前使用的目标密钥。
可选的,所述方法还包括:
所述网络节点接收所述终端上报的通知信息;
所述网络节点基于所述通知信息向所述终端的MN发送密钥变更指示;
其中,所述通知信息包括如下至少一项:
所述终端针对所述第一小区执行的CPAC过程的次数;
所述终端针对所述第一小区执行的CPAC过程的时长;
所述终端基于所述第一配置执行CPAC过程的次数;
所述终端基于所述第一配置执行CPAC过程的时长。
上述通知信息用于网络节点决定是否发起密钥变更,例如:在上述CPAC过程次数达到阈值次数,或者上述时长达到阈值时长的情况下,决定发起密钥变更,从而SN向MN发送密钥变更指示,以更新密钥,达到提高安全性的效果。
可选的,所述目标密钥为第一密钥,所述第一密钥与第二密钥不同,所述第二密钥为:在所述终端将所述第一小区作为所述终端的目标PSCell之前,所述SN针对所述第一小区使用的密钥。
例如:上述第二密钥为:在终端将第一小区作为所述终端的目标PSCell之前,SN在第一小区中与上述终端进行通信使用的密钥。
可选的,所述第一密钥为第一辅密钥,所述第二密钥为第二辅密钥;或者
所述第一密钥为主密钥,所述第二密钥为辅密钥;或者
所述第一密钥为辅密钥,所述第二密钥为主密钥。
可选的,所述方法还包括:
所述SN接收所述MN发送的包括所述第一小区关联的多个counter值或多个密钥的配置。
在上述配置中包括上述多个密钥的情况下,可以是指MN基于多个counter值计算多个密钥,并发送给SN;在上述配置中包括上述多个counter值的情况下,可以是指SN基于这多个counter值计算多个密钥。
上述配置可以是CG配置。
可选的,所述第一辅密钥和所述第二辅密钥为所述多个密钥中的密钥;
所述第一辅密钥在目标顺序中位于所述第二辅密钥之后,所述目标顺序为所述多个密钥的顺序。
上述实施方式中,可以实现SN从MN接收包含多个秘钥的目标小区关联的配置后,终端第X次切入/选择目标小区作为服务PSCell时,SN依次使用第X个秘钥与终端通信。
可选的,所述目标顺序为所述多个密钥的从小到大的顺序;或者
所述目标顺序为所述多个密钥的从大到小的顺序;或者
所述目标顺序为所述配置指示的所述多个密钥的顺序。
可选的,在所述目标顺序为所述配置指示的所述多个密钥的顺序的情况下:
所述配置中携带有顺序指示信息,所述顺序指示信息用于指示所述目标顺序;或者
所述目标顺序为所述多个密钥在所述配置中的携带顺序。
其中,在上述配置中指示多个密钥的顺序的情况下,这些密钥的顺序可以是按照多个counter值进行指示的,例如:MN按照counter值从小到大的顺序指示上述多个密钥,即密钥对应的counter值越小,该密钥就越靠前,密钥对应的counter值越大,该密钥就越靠后;又例如:MN按照counter值从大到小的顺序指示上述多个密钥,即密钥对应的counter值越大,该密钥就越靠前,密钥对应的counter值越小,该密钥就越靠后。
或者,上述配置中指示多个密钥的顺序的情况下,这多个密钥的顺序可以是MN自行决定的。
需要说明的是,本实施例作为与图2所示的实施例中对应的SN的实施方式,其具体的实施方式可以参见图2所示的实施例的相关说明,以为避免重复说明,本实施例不再赘述。
请参见图4,图4是本申请实施例提供的另一种密钥确定方法的流程图,如图4所示,包括以下步骤:
步骤401、MN确定针对第一小区当前使用和/或待使用的目标密钥,所述第一小区为所述终端的PSCell;
步骤402、所述MN向辅节点SN发送所述目标密钥。
上述MN确定针对第一小区当前使用和/或待使用的目标密钥可以是,基于终端的上报信息确定的目标密钥,也可以是基于协议约定确定的针对第一小区当前使用的目标密钥,具体对此不作限定。
本实施例中,可以向SN发送针对第一小区当前使用的目标密钥,从而支持终端基于一个配置多次接入第一小区,进而节约配置开销。
可选的,所述方法还包括:
所述MN向终端发送第一配置,所述第一配置包括如下至少一项:
多个目标密钥对应的多个计数counter值;
一个或多个目标密钥对应的第一counter值;
其中,所述多个目标密钥为所述MN确定的所述终端针对所述第一小区使用的多个目标密钥;
所述第一配置与候选PSCell关联,所述第一配置包括条件主辅小区变更CPC配置和条件主辅小区添加CPA配置中的至少一项。
可选的,所述MN确定针对第一小区当前使用和/或待使用的目标密钥,包括:
所述MN基于终端的上报信息,计算针对第一小区当前使用的目标密钥;或
在所述终端的上报信息中获取目标密钥。
可选的,所述终端的上报信息包括如下至少一项:
第二counter值或基于第二counter值计算的辅密钥,所述第二counter值为所述终端 在第一配置包括的第一counter值的基础上计算得到的counter值,其中,所述第一配置与候选PSCell关联,所述第一配置包括条件主辅小区变更CPC配置和条件主辅小区添加CPA配置中的至少一项;
所述终端基于所述第一配置将所述第一小区作为PSCell的次数;
所述终端基于所述第一配置执行条件主辅小区组添加或变更CPAC过程的次数。
需要说明的是,本实施例作为与图2所示的实施例中对应的MN的实施方式,其具体的实施方式可以参见图2所示的实施例的相关说明,以为避免重复说明,本实施例不再赘述。
下面通过多个实施例对本申请实施例提供的方法进行举例说明:
实施例一:
该实施例主要以counter值依次使用进行举例说明,可以包括如下步骤:
步骤1:基站发送CPA或CPC配置消息给终端,其中对于每个候选PSCell(candidate PSCell),基站都可以提前获取安全相关的配置。
可选的,上述消息中的CPAC配置中包含了一个或多个counter值,每个PSCell可以和一个或多个counter值进行关联。
其中,上述CPAC配置可以通过RRC重配消息配置,其中,CPAC配置可以包括如下至少一项:
条件重配置;
执行条件(execution condition)。
其中,条件重配置包括如下至少一项:
候选SCG,用于CPAC;
一个或多个计数(counter)值。
步骤2:终端基于CPAC配置(例如:CPC配置)进行评估,假设此时终端当前的服务PSCell为Cell-1。假设Candidate PSCell可能包括Cell2、Cell3、Cell4。当Cell-2满足相应条件,执行CPC。
步骤3:如果与该Cell-2关联的CPC配置中包括了counter值1,则终端删除正在使用的辅密钥(secondary key,包括S-KgNB or S-KeNB),并基于该counter值计算出新的辅密钥。
步骤3.1:如果与该Cell-2关联的CPC配置中不包括counter值,则UE继续使用当前的辅密钥。
步骤4:对于终端的无线承载,如果配置了其使用辅密钥,则终端使用步骤3或3.1中计算出的辅密钥和/或基于所述辅密钥进一步推导出的RRC密钥和/或用户面(User Plane,UP)密钥,对该承载进行加密和/或完整性保护。
步骤5:终端不删除CPC配置,并基于CPC配置继续评估,且PSCell变更到Cell-3。与步骤3类似的,可能进行了辅密钥的更新。
步骤6:终端评估发现Cell-2又满足了CPC条件,终端执行PSCell变更过程,将PSCell变更到Cell-2。
步骤7:此时,当终端评估PSCell变更到Cell-2后,可以有以下几种可能:
方法1:假设Cell-2关联的终端保存的CPC配置(例如:condRRCReconfig)中,Cell-2关联了多个counter值,则终端使用与步骤3中不同的新的counter值,并基于该counter值计算出辅密钥(secondary key,包括S-KgNB or S-KeNB)。
方法2:该PSCell-2的承载全部使用主密钥,而不是辅密钥,即变更为MN-terminated SCG bearer。
步骤8:可选的,对于Cell-2,安全激活的时间只能在收到终端的随机接入请求后,并且,Cell-2需要基于终端是第几次接入该小区,来判断使用第几个密钥来与终端通信,终端第几次接入该小区可以由SN基于UE的ID来得出或者基于额外的UE或MN的指示得出。
步骤9:假设对于该Cell-2,所有关联的counter值都已经被使用过,那么终端删除该PSCell相关的CPC配置或从候选小区中删除该PSCell,即该Cell不参与评估。删除配置可能发生在从其他PSCell变更到该PSCell-2时或从该PSCell-2变更到其他PSCell时,或释放该PSCell-2时。
步骤9-1:(网络侧行为)可选的,对于SN,如果所有与终端关联的辅密钥都被使用过,则SN释放终端上下文,以及释放与MN和/或UE的连接。否则,SN需要维持终端上下文以及保持与MN的连接。
实施例二:
该实施例,以执行CPC,counter值依次使用并删除进行举例说明:
步骤1-4:同实施例一;
步骤5:在PSCell变更执行过程中和完成后的一段时间内,终端保留至少与Cell-2关联的CPC配置,但从Cell-2关联的CPC配置的多个counter值中,删除counter值1和/或基于counter值1推导出的辅密钥,并基于保留的CPC配置继续评估。当Cell-3满足CPC执行条件,终端将PSCell变更到Cell-3。与步骤3类似的,可以进行了辅密钥的更新。类似的,终端保留至少与Cell-2关联的CPC配置,并基于保留的CPC配置继续评估。
进一步的,本实施例中删除辅密钥,终端可以基于本地变量来进行,每使用一次就删除用过的,每次都使用最新的密钥。
一个例子中,具体的删除相关流程可以如下:
终端收到基站重配置消息,消息中包含了N个counter值,终端在本地维护一个变量,变量名如VarCondReconfigKeyList,将N个counter值或基于他们计算出来的辅密钥进行保存,终端可以对于每个PSCell都生成一个该变量或所有PSCell用一个变量,然后当张江,第一次执行CPC的时候假设用了counter值1推导出的辅密钥1,用完之后,将变量中的该counter值1或基于他们计算出来的辅密钥1进行删除,后续执行CPC的时候就用 新的辅密钥。
具体的,终端可以在执行CPAC后就进行删除;或者在对目标PSCell发起随机接入后就算使用过该密钥,继而进行删除,不论随机接入成功失败与否;或者是在执行CPAC并成功接入之后再删除等等。
步骤6-8:同实施例一。
步骤9:假设对于该PSCell-2,没有关联的counter值,那么终端删除该PSCell相关的CPC配置或从候选小区中删除该PSCell,即该Cell不参与评估。删除配置可能发生在从其他PSCell变更到该PSCell-2时,或从该PSCell-2变更到其他PSCell时,或释放该PSCell-2时。
步骤9-1:(网络侧行为)可选的,对于SN,如果所有与终端关联的辅密钥都被使用过,则SN释放终端上下文,以及释放与MN和/或终端的连接。否则,SN需要维持终端上下文,以及保持与MN和/或UE的连接。
其中,SN释放与MN和/或终端UE的连接,可以是由MN指示的,如通过SN_RELEAE_REQUEST消息。MN也可以指示SN再次添加CPAC候选小区,然后MN将相应的配置发送给UE,主要是补充counter值。
实施例三:
该实施例中,以CPA+CPC进行举例说明:
步骤1:同实施例一。
步骤2:如果当前终端没有PSCell,那么终端可能会执行CPA,当PSCell-1满足条件后,添加PSCell-1,并使用对应的值counter来计算出辅密钥。然后,终端会继续评估CPC。对于PSCell-1,可能既配置了CPA又配置了CPC,那么在添加完PSCell-1后,可能会变更到PSCell-2,然后后续又变更回PSCell-1。
步骤3-5:变更回PSCell-1后,同实施例一或实施例二步骤7-步骤9。
实施例四:
该实施例以CPA+CPA进行举例说明:
步骤1:同实施例一。
步骤2:如果当前终端没有PSCell,那么终端可能会执行CPA,当Cell-1满足条件后,使用对应的counter值来计算出辅密钥,PSCell变更为Cell-1。假设cell-1后续被释放(release)了,如SN释放,终端继续评估CPA,可能又会出现Cell-1满足条件,然后又需要添加PSCell-1。
步骤3-5:再一次添加PSCell-1时,同实施例一或实施例二的步骤7-步骤9。
实施例五:
该实施例中,以终端侧维护一套counter值,且终端上报密钥相关参数进行举例说明:
步骤1:基站发送CPC配置消息给终端,其中对于每个候选PSCell,MN都提前和SN沟通了安全相关的配置,可选的,所述CPC配置中包含了一个counter值。
可选的,MN可以在配置中指示变更PSCell的最大次数,或者是使用counter值的最大次数或值。
步骤2:终端基于CPC配置进行评估,当终端要变更到新的PSCell时,第一次是通过MN的CPC配置中的counter值,在计算出新的辅密钥后或在下次计算新密钥之前,将counter值增加1或N(也可以称作将counter增加1或N)。后面每次则是根据新的counter值,来计算出新的辅密钥,并将新的counter值上报给MN,或MN根据终端上报的ULinformation来得知终端切换的情况并得知counter的最新值,并继续执行将counter值增加1或N。可选的,也可以只上报终端执行CPC的次数,则MN可以自行将counter值进行增加相应的值来得到终端当前使用的counter值。
步骤3:MN基于终端上报的counter值和目标变更的PSCell,与该SN进行交互,将新的辅密钥发给该SN
步骤4:终端变更到所述目标PSCell。
实施例六:
该实施例中,以终端侧维护一套counter值,且MN发送切换(handover)命令给终端进行举例说明:
步骤1-3:同实施例五。
步骤4:基站发送确认消息给终端,终端变更到所述目标PSCell。
实施例七:
该实施例中,以终端侧维护一套counter值,且终端不需要上报counter值进行举例:
步骤1:同实施例五。
步骤2:终端基于CPC配置进行评估,当UE要变更到新的PSCell时,如果需要更新辅密钥,第一次是通过网络侧CPC配置中的counter值,在计算出新的辅密钥后就将counter值增加N(N>=1)(也可能称作将counter增加N)。后面每次则是根据新的counter值,来计算出新的辅密钥,并继续执行将counter值增加N。而待变更的SN,则是通过协议约定或MN的通知或终端的上报(如随机接入消息message-1或message-A)等多种方式至少之一,也能得知目前终端使用的counter值或辅密钥,从而与终端进行通信。
实施例八:
本实施例中以SN发起的辅密钥更新过程新的触发条件进行举例说明:
步骤1:基站发送CPC配置消息给UE。
步骤2:终端基于CPC配置进行评估,在新的PSCell满足条件后执行CPC。
步骤3:终端在给PSCell的随机接入消息中,或成功接入后的其他RRC消息中,通知新的PSCell自己已经进行了连续的CPC的次数和/或时长。
步骤4:SN基于终端的上报,发送密钥变更指示给MN,请求更新SN秘钥。
本申请实施例可以实现如下:
每个候选PSCell关联多个counter值,终端对于同一个PSCell,如果重复接入,则依 次使用关联的counter值来推导出辅密钥(例如:Ksn),如果该小区关联的counter值都被使用过,则删除该小区在CPC中的配置;
终端侧维护一套counter值,每次变更小区就利用counter值来计算新的辅密钥即可。
连续的CPAC过程中,SN可以基于当前接入终端进行的连续CPAC时长或次数,发起辅密钥更新请求给MN。
在本申请实施例中,密钥可以实时更新,以及在重复切换到某个PSCell时也可以正常应用密钥,使终端和基站之间的通信可以正常进行加密和完整性保护等操作。
请参见图5,图5是本申请实施例提供的一种小区变更处理装置的结构图,该装置存储有第一配置,如图5所示,小区变更处理装置500包括:
评估模块501,用于基于所述第一配置对第一小区评估;
第一确定模块502,用于在所述第一小区满足第一条件的情况下,将所述第一小区作为所述终端的目标PSCell;
第二确定模块503,用于根据所述第一配置,确定接入目标PSCell的目标密钥;
其中,所述第一配置与候选PSCell关联,所述候选PSCell包括所述第一小区,所述第一配置包括条件主辅小区变更CPC配置和条件主辅小区添加CPA配置中的至少一项。
可选的,所述第一小区为所述终端已经释放过的小区,或者,所述第一小区为所述终端曾经驻留的小区或者所述终端接入过的小区。
可选的,在终端将所述第一小区作为所述终端的目标PSCell之前,所述终端的PSCell从所述第一小区变更到其他小区;或者,
在终端将所述第一小区作为终端的目标PSCell之前,所述终端将作为所述终端的PSCell的所述第一小区释放。
可选的,所述终端将所述第一小区作为所述终端的目标PSCell,包括:
在所述终端的PSCell从所述第一小区变更到其他小区的情况下,所述终端将所述终端的目标PSCell变更为所述第一小区;或者
所述终端将所述第一小区添加为所述终端的目标PSCell。
可选的,所述目标密钥为第一密钥,所述第一密钥与第二密钥不同,所述第二密钥为:在所述终端将所述第一小区作为所述终端的目标PSCell之前,所述终端针对所述第一小区使用的密钥。
可选的,所述第一密钥为第一辅密钥,所述第二密钥为第二辅密钥;或者
所述第一密钥为主密钥,所述第二密钥为辅密钥;或者
所述第一密钥为辅密钥,所述第二密钥为主密钥。
可选的,所述第一配置包括所述第一小区关联的多个计数counter值,所述第一辅密钥为基于所述多个counter值中的一个counter值计算的辅密钥,所述第二辅密钥为基于所述多个counter值中的另一个counter值计算的辅密钥。
可选的,所述第一辅密钥为基于所述多个counter值中的第一counter值计算的辅密钥, 所述第二辅密钥为基于所述多个counter值中的第二counter值计算的辅密钥,其中,所述第一counter值在目标顺序中位于所述第二counter值之后,所述目标顺序为所述多个counter值的顺序。
可选的,所述目标顺序为所述多个counter值的从小到大的顺序;或者
所述目标顺序为所述多个counter值的从大到小的顺序;或者,
所述目标顺序为所述第一配置指示的所述多个counter值的顺序。
可选的,在所述目标顺序为所述第一配置指示的所述多个counter值的顺序的情况下:
所述第一配置中携带有顺序指示信息,所述顺序指示信息用于指示所述目标顺序;或者
所述目标顺序为所述多个counter值在所述第一配置中的携带顺序。
可选的,所述装置还包括如下至少一项:
第一删除模块,用于在所述第一配置中的counter值都已经被使用过的情况下,删除所述第一配置;
第二删除模块,用于在所述第一配置中的counter值都已经被使用过的情况下,从候选PSCell中删除所述第一小区,或,所述终端不对所述第一小区进行所述第一条件的评估。
可选的,所述第一配置还包括第二小区关联的配置,所述装置还包括:
第三删除模块,用于在所述第一配置中包括的所述第二小区关联的counter值都已经被使用过的情况下,删除所述第一配置中所述第二小区关联的配置。
可选的,所述装置还包括如下至少一项:
第四删除模块,用于在所述第一配置中删除已经被使用过的counter值;
第五删除模块,用于删除已经被使用过的辅密钥。
可选的,所述第五删除模块用于将本地变量中已经被使用过的辅密钥从本地变量中移除,所述本地变量为所述第一配置对应的本地变量。
可选的,所述第一配置包括所述第一小区关联的第一counter值,所述第一辅密钥为基于第二counter值计算的辅密钥,所述第二counter值为所述第二辅密钥对应的counter值加M得到的counter值,其中,所述第二辅密钥对应的counter值包括:
所述第一counter值;或者,将所述第一counter值加N得到的counter值;
其中,M为大于或者等于0的整数,N为大于或者等于1的整数。
可选的,在所述第一辅密钥为基于所述第二counter值计算的辅密钥的情况下,所述装置还包括:
第一上报模块,用于向网络节点上报如下至少一项:
所述第二counter值,或,基于所述第二counter值计算的辅密钥;
基于所述第一配置将所述第一小区作为PSCell的次数;
基于所述第一配置执行条件主辅小区组添加或变更CPAC过程的次数。
可选的,所述装置还包括:
第二上报模块,用于向网络节点上报通知信息,所述通知信息包括如下至少一项:
所述终端针对所述第一小区执行的CPAC过程的次数;
所述终端针对所述第一小区执行的CPAC过程的时长;
基于所述第一配置执行CPAC过程的次数;
基于所述第一配置执行CPAC过程的时长。
可选的,第二上报模块用于在随机接入消息或者无线资源控制RRC消息向网络节点上报通知信息。
上述小区变更处理装置可以降低配置开销。
本申请实施例中的小区变更处理装置可以是电子设备,例如具有操作系统的电子设备,也可以是电子设备中的部件,例如集成电路或芯片。该电子设备可以是终端,也可以为除终端之外的其他设备。示例性的,终端可以包括但不限于本申请实施例所列举的终端的类型,其他设备可以为服务器、网络附属存储器(Network Attached Storage,NAS)等,本申请实施例不作具体限定。
本申请实施例提供的小区变更处理装置能够实现图2所示的方法实施例实现的各个过程,并达到相同的技术效果,为避免重复,这里不再赘述。
请参见图6,图6是本申请实施例提供的一种密钥确定装置的结构图,如图6所示,密钥确定装置600包括:
确定模块601,用于基于目标信息,确定针对第一小区当前使用和/或待使用的目标密钥,所述第一小区为所述终端的主辅小区PSCell;
其中,所述目标信息包括如下至少一项:
主节点MN的指示信息;
终端进行随机接入时携带的信息。
可选的,所述装置还包括:
释放模块,用于在与所述终端关联的目标密钥都已经被使用过的情况下,释放如下至少一项:
所述终端的上下文;
与所述终端的主节点MN的连接;
与所述终端的连接;
维持模块,用于在与所述终端关联的密钥中还存在未被使用过的目标密钥的情况下,维持如下至少一项:
所述终端的上下文;
与所述终端的MN的连接;
与所述终端的连接。
可选的,所述MN的指示信息,包括:
所述目标密钥;其中,所述目标密钥为所述MN基于终端的上报信息计算的密钥;或
在所述终端的上报信息中携带的密钥。
可选的,所述终端的上报信息包括如下至少一项:
第二counter值或基于所述第二counter值计算的辅密钥,所述第二counter值为所述终端在第一配置包括的第一counter值的基础上计算得到的counter值,其中,所述第一配置与候选PSCell关联,所述第一配置包括条件主辅小区变更CPC配置和条件主辅小区添加CPA配置中的至少一项;
所述终端基于所述第一配置将所述第一小区作为PSCell的次数;
所述终端基于所述第一配置执行条件主辅小区组添加或变更CPAC过程的次数。
可选的,所述装置还包括:
第一接收模块,用于接收所述终端上报的通知信息;
发送模块,用于基于所述通知信息向所述终端的MN发送密钥变更指示;
其中,所述通知信息包括如下至少一项:
所述终端针对所述第一小区执行的CPAC过程的次数;
所述终端针对所述第一小区执行的CPAC过程的时长;
所述终端基于所述第一配置执行CPAC过程的次数;
所述终端基于所述第一配置执行CPAC过程的时长。
可选的,所述目标密钥为第一密钥,所述第一密钥与第二密钥不同,所述第二密钥为:在所述终端将所述第一小区作为所述终端的目标PSCell之前,所述SN针对所述第一小区使用的密钥。
可选的,所述第一密钥为第一辅密钥,所述第二密钥为第二辅密钥;或者
所述第一密钥为主密钥,所述第二密钥为辅密钥;或者
所述第一密钥为辅密钥,所述第二密钥为主密钥。
可选的,所述装置还包括:
第二接收模块,用于接收所述MN发送的包括所述第一小区关联的多个计数counter值或多个密钥的配置。
可选的,所述第一辅密钥和所述第二辅密钥为所述多个密钥中的密钥;
所述第一辅密钥在目标顺序中位于所述第二辅密钥之后,所述目标顺序为所述多个密钥的顺序。
可选的,所述目标顺序为所述多个密钥的从小到大的顺序;或者
所述目标顺序为所述多个密钥的从大到小的顺序;或者
所述目标顺序为所述配置指示的所述多个密钥的顺序。
可选的,在所述目标顺序为所述配置指示的所述多个密钥的顺序的情况下:
所述配置中携带有顺序指示信息,所述顺序指示信息用于指示所述目标顺序;或者
所述目标顺序为所述多个密钥在所述配置中的携带顺序。
上述密钥确定装置可以节约配置开销。
本申请实施例中的密钥确定装置可以是电子设备,例如具有操作系统的电子设备,也可以是电子设备中的部件,例如集成电路或芯片。该电子设备可以是网络侧设备,也可以为除终端之外的其他设备。示例性的,网络侧设备可以包括但不限于本申请实施例所列举的网络侧设备的类型,其他设备可以为服务器、网络附属存储器(Network Attached Storage,NAS)等,本申请实施例不作具体限定。
本申请实施例提供的密钥确定装置能够实现图3所示的方法实施例实现的各个过程,并达到相同的技术效果,为避免重复,这里不再赘述。
请参见图7,图7是本申请实施例提供的另一种密钥确定装置的结构图,如图7所示,密钥确定装置700包括:
确定模块701,用于确定针对第一小区当前使用和/或待使用的目标密钥,所述第一小区为所述终端的主辅小区PSCell;
第一发送模块702,用于向辅节点SN发送所述目标密钥。
可选的,所述装置还包括:
第二发送模块,用于向终端发送第一配置,所述第一配置包括如下至少一项:
多个目标密钥对应的多个计数counter值;
一个或多个目标密钥对应的第一counter值;
其中,所述多个目标密钥为所述MN确定的所述终端针对所述第一小区使用的多个目标密钥;
所述第一配置与候选PSCell关联,所述第一配置包括条件主辅小区变更CPC配置和条件主辅小区添加CPA配置中的至少一项。
可选的,确定模块701用于基于终端的上报信息,计算针对第一小区当前使用的目标密钥;或
在所述终端的上报信息中获取目标密钥。
可选的,所述终端的上报信息包括如下至少一项:
第二counter值或基于第二counter值计算的辅密钥,所述第二counter值为所述终端在第一配置包括的第一counter值的基础上计算得到的counter值,其中,所述第一配置与候选PSCell关联,所述第一配置包括条件主辅小区变更CPC配置和条件主辅小区添加CPA配置中的至少一项;
所述终端基于所述第一配置将所述第一小区作为PSCell的次数;
所述终端基于所述第一配置执行条件主辅小区组添加或变更CPAC过程的次数。
上述密钥确定装置可以节约配置开销。
本申请实施例中的密钥确定装置可以是电子设备,例如具有操作系统的电子设备,也可以是电子设备中的部件,例如集成电路或芯片。该电子设备可以是网络侧设备,也可以为除终端之外的其他设备。示例性的,网络侧设备可以包括但不限于本申请实施例所列举 的网络侧设备的类型,其他设备可以为服务器、网络附属存储器(Network Attached Storage,NAS)等,本申请实施例不作具体限定。
本申请实施例提供的密钥确定装置能够实现图4所示的方法实施例实现的各个过程,并达到相同的技术效果,为避免重复,这里不再赘述。
可选的,如图8所示,本申请实施例还提供一种通信设备800,包括处理器801和存储器802,存储器802上存储有可在所述处理器801上运行的程序或指令,例如,该通信设备800为终端时,该程序或指令被处理器801执行时实现上述终端侧的小区变更处理方法实施例的各个步骤,且能达到相同的技术效果。该通信设备800为SN时,该程序或指令被处理器801执行时实现上述SN侧的密钥确定方法实施例的各个步骤,且能达到相同的技术效果。该通信设备800为MN时,该程序或指令被处理器801执行时实现上述MN侧的密钥确定方法实施例的各个步骤,且能达到相同的技术效果,为避免重复,这里不再赘述。
本申请实施例还提供一种终端,包括处理器和通信接口,处理器用于基于所述第一配置对第一小区评估;在所述第一小区满足第一条件的情况下,将所述第一小区作为所述终端的目标PSCell;根据所述第一配置,确定接入目标PSCell的目标密钥;其中,所述第一配置与候选PSCell关联,所述候选PSCell包括所述第一小区,所述第一配置包括条件主辅小区变更CPC配置和条件主辅小区添加CPA配置中的至少一项。该终端实施例与上述终端侧方法实施例对应,上述方法实施例的各个实施过程和实现方式均可适用于该终端实施例中,且能达到相同的技术效果。具体地,图9为实现本申请实施例的一种终端的硬件结构示意图。
该终端900包括但不限于:射频单元901、网络模块902、音频输出单元903、输入单元904、传感器905、显示单元906、用户输入单元907、接口单元908、存储器909以及处理器910等中的至少部分部件。
本领域技术人员可以理解,终端900还可以包括给各个部件供电的电源(比如电池),电源可以通过电源管理系统与处理器910逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。图9中示出的终端结构并不构成对终端的限定,终端可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置,在此不再赘述。
应理解的是,本申请实施例中,输入单元904可以包括图形处理单元(Graphics Processing Unit,GPU)9041和麦克风9042,图形处理单元9041对在视频捕获模式或图像捕获模式中由图像捕获装置(如摄像头)获得的静态图片或视频的图像数据进行处理。显示单元906可包括显示面板9061,可以采用液晶显示器、有机发光二极管等形式来配置显示面板9061。用户输入单元907包括触控面板9071以及其他输入设备9072中的至少一种。触控面板9071,也称为触摸屏。触控面板9071可包括触摸检测装置和触摸控制器两个部分。其他输入设备9072可以包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆,在此不再赘述。
本申请实施例中,射频单元901接收来自网络侧设备的下行数据后,可以传输给处理器910进行处理;另外,射频单元901可以向网络侧设备发送上行数据。通常,射频单元901包括但不限于天线、放大器、收发信机、耦合器、低噪声放大器、双工器等。
存储器909可用于存储软件程序或指令以及各种数据。存储器909可主要包括存储程序或指令的第一存储区和存储数据的第二存储区,其中,第一存储区可存储操作系统、至少一个功能所需的应用程序或指令(比如声音播放功能、图像播放功能等)等。此外,存储器909可以包括易失性存储器或非易失性存储器,或者,存储器909可以包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(Read-Only Memory,ROM)、可编程只读存储器(Programmable ROM,PROM)、可擦除可编程只读存储器(Erasable PROM,EPROM)、电可擦除可编程只读存储器(Electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(Random Access Memory,RAM),静态随机存取存储器(Static RAM,SRAM)、动态随机存取存储器(Dynamic RAM,DRAM)、同步动态随机存取存储器(Synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(Double Data Rate SDRAM,DDRSDRAM)、增强型同步动态随机存取存储器(Enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(Synch link DRAM,SLDRAM)和直接内存总线随机存取存储器(Direct Rambus RAM,DRRAM)。本申请实施例中的存储器909包括但不限于这些和任意其它适合类型的存储器。
处理器910可包括一个或多个处理单元;可选的,处理器910集成应用处理器和调制解调处理器,其中,应用处理器主要处理涉及操作系统、用户界面和应用程序等的操作,调制解调处理器主要处理无线通信信号,如基带处理器。可以理解的是,上述调制解调处理器也可以不集成到处理器910中。
其中,处理器910,用于基于所述第一配置对第一小区评估;在所述第一小区满足第一条件的情况下,将所述第一小区作为所述终端的目标PSCell;根据所述第一配置,确定接入目标PSCell的目标密钥;其中,所述第一配置与候选PSCell关联,所述候选PSCell包括所述第一小区,所述第一配置包括条件主辅小区变更CPC配置和条件主辅小区添加CPA配置中的至少一项。
可选的,所述第一小区为所述终端已经释放过的小区,或者,所述第一小区为所述终端曾经驻留的小区或者所述终端接入过的小区。
可选的,在终端将所述第一小区作为所述终端的目标PSCell之前,所述终端的PSCell从所述第一小区变更到其他小区;或者,
在终端将所述第一小区作为终端的目标PSCell之前,所述终端将作为所述终端的PSCell的所述第一小区释放。
可选的,所述终端将所述第一小区作为所述终端的目标PSCell,包括:
在所述终端的PSCell从所述第一小区变更到其他小区的情况下,所述终端将所述终端的目标PSCell变更为所述第一小区;或者
所述终端将所述第一小区添加为所述终端的目标PSCell。
可选的,所述目标密钥为第一密钥,所述第一密钥与第二密钥不同,所述第二密钥为:在所述终端将所述第一小区作为所述终端的目标PSCell之前,所述终端针对所述第一小区使用的密钥。
可选的,所述第一密钥为第一辅密钥,所述第二密钥为第二辅密钥;或者
所述第一密钥为主密钥,所述第二密钥为辅密钥;或者
所述第一密钥为辅密钥,所述第二密钥为主密钥。
可选的,所述第一配置包括所述第一小区关联的多个计数counter值,所述第一辅密钥为基于所述多个counter值中的一个counter值计算的辅密钥,所述第二辅密钥为基于所述多个counter值中的另一个counter值计算的辅密钥。
可选的,所述第一辅密钥为基于所述多个counter值中的第一counter值计算的辅密钥,所述第二辅密钥为基于所述多个counter值中的第二counter值计算的辅密钥,其中,所述第一counter值在目标顺序中位于所述第二counter值之后,所述目标顺序为所述多个counter值的顺序。
可选的,所述目标顺序为所述多个counter值的从小到大的顺序;或者
所述目标顺序为所述多个counter值的从大到小的顺序;或者,
所述目标顺序为所述第一配置指示的所述多个counter值的顺序。
可选的,在所述目标顺序为所述第一配置指示的所述多个counter值的顺序的情况下:
所述第一配置中携带有顺序指示信息,所述顺序指示信息用于指示所述目标顺序;或者
所述目标顺序为所述多个counter值在所述第一配置中的携带顺序。
可选的,所述处理器910还用于如下至少一项:
在所述第一配置中的counter值都已经被使用过的情况下,删除所述第一配置;
在所述第一配置中的counter值都已经被使用过的情况下,从候选PSCell中删除所述第一小区,或,所述终端不对所述第一小区进行所述第一条件的评估。
可选的,所述第一配置还包括第二小区关联的配置,所述处理器910还用于:
在所述第一配置中包括的所述第二小区关联的counter值都已经被使用过的情况下,删除所述第一配置中所述第二小区关联的配置。
可选的,所述处理器910还用于如下至少一项:
在所述第一配置中删除已经被使用过的counter值;
删除已经被使用过的辅密钥。
可选的,所述删除已经被使用过的辅密钥,包括:
将本地变量中已经被使用过的辅密钥从本地变量中移除,所述本地变量为所述第一配置对应的本地变量。
可选的,所述第一配置包括所述第一小区关联的第一counter值,所述第一辅密钥为 基于第二counter值计算的辅密钥,所述第二counter值为所述第二辅密钥对应的counter值加M得到的counter值,其中,所述第二辅密钥对应的counter值包括:
所述第一counter值;或者,将所述第一counter值加N得到的counter值;
其中,M为大于或者等于0的整数,N为大于或者等于1的整数。
可选的,在所述第一辅密钥为基于所述第二counter值计算的辅密钥的情况下,射频单元901用于:
向网络节点上报如下至少一项:
所述第二counter值,或,基于所述第二counter值计算的辅密钥;
基于所述第一配置将所述第一小区作为PSCell的次数;
基于所述第一配置执行条件主辅小区组添加或变更CPAC过程的次数。
可选的,射频单元901用于:
向网络节点上报通知信息,所述通知信息包括如下至少一项:
所述终端针对所述第一小区执行的CPAC过程的次数;
所述终端针对所述第一小区执行的CPAC过程的时长;
基于所述第一配置执行CPAC过程的次数;
基于所述第一配置执行CPAC过程的时长。
可选的,第二上报模块用于在随机接入消息或者无线资源控制RRC消息向网络节点上报通知信息。
上述终端可以降低配置开销。
本申请实施例还提供一种网络节点,包括处理器和通信接口,该网络节点为SN的情况下,所述处理器用于基于目标信息,确定针对第一小区当前使用和/或待使用的目标密钥,所述第一小区为所述终端的主辅小区PSCell;其中,所述目标信息包括如下至少一项:主节点MN的指示信息;终端进行随机接入时携带的信息。该网络节点为MN的情况下,所述处理器用于确定针对第一小区当前使用和/或待使用的目标密钥,所述第一小区为所述终端的主辅小区PSCell;通信接口用于向辅节点SN发送所述目标密钥。该网络节点实施例与上述SN和MN方法实施例对应,上述方法实施例的各个实施过程和实现方式均可适用于该网络侧设备实施例中,且能达到相同的技术效果。
具体地,本申请实施例还提供了一种网络节点。如图10所示,该网络节点1000包括:天线1001、射频装置1002、基带装置1003、处理器1004和存储器1005。天线1001与射频装置1002连接。在上行方向上,射频装置1002通过天线1001接收信息,将接收的信息发送给基带装置1003进行处理。在下行方向上,基带装置1003对要发送的信息进行处理,并发送给射频装置1002,射频装置1002对收到的信息进行处理后经过天线1001发送出去。
以上实施例中网络节点执行的方法可以在基带装置1003中实现,该基带装置1003包括基带处理器。
基带装置1003例如可以包括至少一个基带板,该基带板上设置有多个芯片,如图10所示,其中一个芯片例如为基带处理器,通过总线接口与存储器1005连接,以调用存储器1005中的程序,执行以上方法实施例中所示的网络设备操作。
该网络节点还可以包括网络接口1006,该接口例如为通用公共无线接口(common public radio interface,CPRI)。
具体地,本发明实施例的网络节点1000还包括:存储在存储器1005上并可在处理器1004上运行的指令或程序,处理器1004调用存储器1005中的指令或程序执行图3所示各模块执行的方法,并达到相同的技术效果,为避免重复,故不在此赘述。
在上述网络节点为SN的情况下,处理器1004用于基于目标信息,确定针对第一小区当前使用和/或待使用的目标密钥,所述第一小区为所述终端的主辅小区PSCell;
其中,所述目标信息包括如下至少一项:
主节点MN的指示信息;
终端进行随机接入时携带的信息。
可选的,处理器1004还用于:
在与所述终端关联的目标密钥都已经被使用过的情况下,释放如下至少一项:
所述终端的上下文;
与所述终端的主节点MN的连接;
与所述终端的连接;
在与所述终端关联的密钥中还存在未被使用过的目标密钥的情况下,维持如下至少一项:
所述终端的上下文;
与所述终端的MN的连接;
与所述终端的连接。
可选的,所述MN的指示信息,包括:
所述目标密钥;其中,所述目标密钥为所述MN基于终端的上报信息计算的密钥;或
在所述终端的上报信息中携带的密钥。
可选的,所述终端的上报信息包括如下至少一项:
第二counter值或基于所述第二counter值计算的辅密钥,所述第二counter值为所述终端在第一配置包括的第一counter值的基础上计算得到的counter值,其中,所述第一配置与候选PSCell关联,所述第一配置包括条件主辅小区变更CPC配置和条件主辅小区添加CPA配置中的至少一项;
所述终端基于所述第一配置将所述第一小区作为PSCell的次数;
所述终端基于所述第一配置执行条件主辅小区组添加或变更CPAC过程的次数。
可选的,所述射频装置1002用于:
接收所述终端上报的通知信息;
基于所述通知信息向所述终端的MN发送密钥变更指示;
其中,所述通知信息包括如下至少一项:
所述终端针对所述第一小区执行的CPAC过程的次数;
所述终端针对所述第一小区执行的CPAC过程的时长;
所述终端基于所述第一配置执行CPAC过程的次数;
所述终端基于所述第一配置执行CPAC过程的时长。
可选的,所述目标密钥为第一密钥,所述第一密钥与第二密钥不同,所述第二密钥为:在所述终端将所述第一小区作为所述终端的目标PSCell之前,所述SN针对所述第一小区使用的密钥。
可选的,所述第一密钥为第一辅密钥,所述第二密钥为第二辅密钥;或者
所述第一密钥为主密钥,所述第二密钥为辅密钥;或者
所述第一密钥为辅密钥,所述第二密钥为主密钥。
可选的,射频装置1002还用于:
接收所述MN发送的包括所述第一小区关联的多个计数counter值或多个密钥的配置。
可选的,所述第一辅密钥和所述第二辅密钥为所述多个密钥中的密钥;
所述第一辅密钥在目标顺序中位于所述第二辅密钥之后,所述目标顺序为所述多个密钥的顺序。
可选的,所述目标顺序为所述多个密钥的从小到大的顺序;或者
所述目标顺序为所述多个密钥的从大到小的顺序;或者
所述目标顺序为所述配置指示的所述多个密钥的顺序。
可选的,在所述目标顺序为所述配置指示的所述多个密钥的顺序的情况下:
所述配置中携带有顺序指示信息,所述顺序指示信息用于指示所述目标顺序;或者
所述目标顺序为所述多个密钥在所述配置中的携带顺序。
上述SN可以节约配置开销。
在上述网络节点为MN的情况下,处理器1004用于确定针对第一小区当前使用和/或待使用的目标密钥,所述第一小区为所述终端的主辅小区PSCell;
射频装置1002,用于向辅节点SN发送所述目标密钥。
可选的,射频装置1002还用于:
向终端发送第一配置,所述第一配置包括如下至少一项:
多个目标密钥对应的多个计数counter值;
一个或多个目标密钥对应的第一counter值;
其中,所述多个目标密钥为所述MN确定的所述终端针对所述第一小区使用的多个目标密钥;
所述第一配置与候选PSCell关联,所述第一配置包括条件主辅小区变更CPC配置和条件主辅小区添加CPA配置中的至少一项。
可选的,确定针对第一小区当前使用和/或待使用的目标密钥,包括:
基于终端的上报信息,计算针对第一小区当前使用的目标密钥;或
在所述终端的上报信息中获取目标密钥。
可选的,所述终端的上报信息包括如下至少一项:
第二counter值或基于第二counter值计算的辅密钥,所述第二counter值为所述终端在第一配置包括的第一counter值的基础上计算得到的counter值,其中,所述第一配置与候选PSCell关联,所述第一配置包括条件主辅小区变更CPC配置和条件主辅小区添加CPA配置中的至少一项;
所述终端基于所述第一配置将所述第一小区作为PSCell的次数;
所述终端基于所述第一配置执行条件主辅小区组添加或变更CPAC过程的次数。
上述MN可以节约配置开销。
本申请实施例还提供一种可读存储介质,所述可读存储介质上存储有程序或指令,该程序或指令被处理器执行时实现上述小区变更处理方法、密钥确定方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。
其中,所述处理器为上述实施例中所述的终端中的处理器。所述可读存储介质,包括计算机可读存储介质,如计算机只读存储器ROM、随机存取存储器RAM、磁碟或者光盘等。
本申请实施例另提供了一种芯片,所述芯片包括处理器和通信接口,所述通信接口和所述处理器耦合,所述处理器用于运行程序或指令,实现上述小区变更处理方法、密钥确定方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。
应理解,本申请实施例提到的芯片还可以称为系统级芯片,系统芯片,芯片系统或片上系统芯片等。
本申请实施例另提供了一种计算机程序/程序产品,所述计算机程序/程序产品被存储在存储介质中,所述计算机程序/程序产品被至少一个处理器执行以实现上述小区变更处理方法、密钥确定方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。
本申请实施例还提供了一种传输确定系统,包括:终端、SN和MN,所述终端可用于执行上述小区变更处理方法的步骤,所述SN可用于执行上述SN侧的密钥确定方法的步骤密钥确定方法,所述MN可用于执行如第三方面上述MN侧的密钥确定方法的步骤密钥确定方法。
需要说明的是,在本文中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者装置不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者装置所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的过程、方法、物品或者装置中还存在另外的相同要素。此外,需要指出的 是,本申请实施方式中的方法和装置的范围不限按示出或讨论的顺序来执行功能,还可包括根据所涉及的功能按基本同时的方式或按相反的顺序来执行功能,例如,可以按不同于所描述的次序来执行所描述的方法,并且还可以添加、省去、或组合各种步骤。另外,参照某些示例所描述的特征可在其他示例中被组合。
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到上述实施例方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分可以以计算机软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端(可以是手机,计算机,服务器,空调器,或者网络设备等)执行本申请各个实施例所述的方法。
上面结合附图对本申请的实施例进行了描述,但是本申请并不局限于上述的具体实施方式,上述的具体实施方式仅仅是示意性的,而不是限制性的,本领域的普通技术人员在本申请的启示下,在不脱离本申请宗旨和权利要求所保护的范围情况下,还可做出很多形式,均属于本申请的保护之内。

Claims (40)

  1. 一种小区变更处理方法,终端存储有第一配置,所述方法包括:
    终端基于所述第一配置对第一小区评估;
    在所述第一小区满足第一条件的情况下,所述终端将所述第一小区作为所述终端的目标主辅小区PSCell;
    所述终端根据所述第一配置,确定接入目标PSCell的目标密钥;
    其中,所述第一配置与候选PSCell关联,所述候选PSCell包括所述第一小区,所述第一配置包括条件主辅小区变更CPC配置和条件主辅小区添加CPA配置中的至少一项。
  2. 如权利要求1所述的方法,其中,所述第一小区为所述终端已经释放过的小区,或者,所述第一小区为所述终端曾经驻留的小区或者所述终端接入过的小区。
  3. 如权利要求1所述的方法,其中,在终端将所述第一小区作为所述终端的目标PSCell之前,所述终端的PSCell从所述第一小区变更到其他小区;或者,
    在终端将所述第一小区作为终端的目标PSCell之前,所述终端将作为所述终端的PSCell的所述第一小区释放。
  4. 如权利要求3所述的方法,其中,所述终端将所述第一小区作为所述终端的目标PSCell,包括:
    在所述终端的PSCell从所述第一小区变更到其他小区的情况下,所述终端将所述终端的目标PSCell变更为所述第一小区;或者
    所述终端将所述第一小区添加为所述终端的目标PSCell。
  5. 如权利要求1所述的方法,其中,所述目标密钥为第一密钥,所述第一密钥与第二密钥不同,所述第二密钥为:在所述终端将所述第一小区作为所述终端的目标PSCell之前,所述终端针对所述第一小区使用的密钥。
  6. 如权利要求5所述的方法,其中,所述第一密钥为第一辅密钥,所述第二密钥为第二辅密钥;或者
    所述第一密钥为主密钥,所述第二密钥为辅密钥;或者
    所述第一密钥为辅密钥,所述第二密钥为主密钥。
  7. 如权利要求6所述的方法,其中,所述第一配置包括所述第一小区关联的多个计数counter值,所述第一辅密钥为基于所述多个counter值中的一个counter值计算的辅密钥,所述第二辅密钥为基于所述多个counter值中的另一个counter值计算的辅密钥。
  8. 如权利要求7所述的方法,其中,所述第一辅密钥为基于所述多个counter值中的第一counter值计算的辅密钥,所述第二辅密钥为基于所述多个counter值中的第二counter值计算的辅密钥,其中,所述第一counter值在目标顺序中位于所述第二counter值之后,所述目标顺序为所述多个counter值的顺序。
  9. 如权利要求8所述的方法,其中,所述目标顺序为所述多个counter值的从小到大 的顺序;或者
    所述目标顺序为所述多个counter值的从大到小的顺序;或者,
    所述目标顺序为所述第一配置指示的所述多个counter值的顺序。
  10. 如权利要求9所述的方法,其中,在所述目标顺序为所述第一配置指示的所述多个counter值的顺序的情况下:
    所述第一配置中携带有顺序指示信息,所述顺序指示信息用于指示所述目标顺序;或者
    所述目标顺序为所述多个counter值在所述第一配置中的携带顺序。
  11. 如权利要求7所述的方法,其中,所述方法还包括如下至少一项:
    在所述第一配置中的counter值都已经被使用过的情况下,所述终端删除所述第一配置;
    在所述第一配置中的counter值都已经被使用过的情况下,所述终端从候选PSCell中删除所述第一小区,或,所述终端不对所述第一小区进行所述第一条件的评估。
  12. 如权利要求7所述的方法,其中,所述第一配置还包括第二小区关联的配置,所述方法还包括:
    在所述第一配置中包括的所述第二小区关联的counter值都已经被使用过的情况下,所述终端删除所述第一配置中所述第二小区关联的配置。
  13. 如权利要求7至10中任一项所述的方法,其中,所述方法还包括如下至少一项:
    所述终端在所述第一配置中删除已经被使用过的counter值;
    所述终端删除已经被使用过的辅密钥。
  14. 如权利要求13所述的方法,其中,所述终端删除已经被使用过的辅密钥,包括:
    所述终端将本地变量中已经被使用过的辅密钥从本地变量中移除,所述本地变量为所述第一配置对应的本地变量。
  15. 如权利要求6所述的方法,其中,所述第一配置包括所述第一小区关联的第一counter值,所述第一辅密钥为基于第二counter值计算的辅密钥,所述第二counter值为所述第二辅密钥对应的counter值加M得到的counter值,其中,所述第二辅密钥对应的counter值包括:
    所述第一counter值;或者,将所述第一counter值加N得到的counter值;
    其中,M为大于或者等于0的整数,N为大于或者等于1的整数。
  16. 如权利要求15所述的方法,其中,在所述第一辅密钥为基于所述第二counter值计算的辅密钥的情况下,所述方法还包括:
    所述终端向网络节点上报如下至少一项:
    所述第二counter值,或,基于所述第二counter值计算的辅密钥;
    基于所述第一配置将所述第一小区作为PSCell的次数;
    基于所述第一配置执行条件主辅小区组添加或变更CPAC过程的次数。
  17. 如权利要求1至16中任一项所述的方法,其中,所述方法还包括:
    所述终端向网络节点上报通知信息,所述通知信息包括如下至少一项:
    所述终端针对所述第一小区执行的CPAC过程的次数;
    所述终端针对所述第一小区执行的CPAC过程的时长;
    基于所述第一配置执行CPAC过程的次数;
    基于所述第一配置执行CPAC过程的时长。
  18. 如权利要求17所述的方法,其中,所述终端向网络节点上报通知信息,包括:
    所述终端在随机接入消息或者无线资源控制RRC消息向网络节点上报通知信息。
  19. 一种密钥确定方法,包括:
    辅节点SN基于目标信息,确定针对第一小区当前使用和/或待使用的目标密钥,所述第一小区为终端的主辅小区PSCell;
    其中,所述目标信息包括如下至少一项:
    主节点MN的指示信息;
    终端进行随机接入时携带的信息。
  20. 如权利要求19所述的方法,其中,所述方法还包括:
    在与所述终端关联的目标密钥都已经被使用过的情况下,所述SN释放如下至少一项:
    所述终端的上下文;
    与所述终端的主节点MN的连接;
    与所述终端的连接;
    其中,在与所述终端关联的密钥中还存在未被使用过的目标密钥的情况下,所述SN维持如下至少一项:
    所述终端的上下文;
    与所述终端的MN的连接;
    与所述终端的连接。
  21. 如权利要求19所述的方法,其中,所述MN的指示信息,包括:
    所述目标密钥;其中,所述目标密钥为所述MN基于终端的上报信息计算的密钥;或
    在所述终端的上报信息中携带的密钥;或MN自己计算的密钥。
  22. 如权利要求21所述的方法,其中,所述终端的上报信息包括如下至少一项:
    第二counter值或基于所述第二counter值计算的辅密钥,所述第二counter值为所述终端在第一配置包括的第一counter值的基础上计算得到的counter值,其中,所述第一配置与候选PSCell关联,所述第一配置包括条件主辅小区变更CPC配置和条件主辅小区添加CPA配置中的至少一项;
    所述终端基于所述第一配置将所述第一小区作为PSCell的次数;
    所述终端基于所述第一配置执行条件主辅小区组添加或变更CPAC过程的次数。
  23. 如权利要求19至22中任一项所述的方法,其中,所述方法还包括:
    所述SN接收所述终端上报的通知信息;
    所述SN基于所述通知信息向所述终端的MN发送密钥变更指示;
    其中,所述通知信息包括如下至少一项:
    所述终端针对所述第一小区执行的CPAC过程的次数;
    所述终端针对所述第一小区执行的CPAC过程的时长;
    所述终端基于第一配置执行CPAC过程的次数;
    所述终端基于第一配置执行CPAC过程的时长。
  24. 如权利要求19至22中任一项所述的方法,其中,所述目标密钥为第一密钥,所述第一密钥与第二密钥不同,所述第二密钥为:在所述终端将所述第一小区作为所述终端的目标PSCell之前,所述SN针对所述第一小区使用的密钥。
  25. 如权利要求24所述的方法,其中,所述第一密钥为第一辅密钥,所述第二密钥为第二辅密钥;或者
    所述第一密钥为主密钥,所述第二密钥为辅密钥;或者
    所述第一密钥为辅密钥,所述第二密钥为主密钥。
  26. 如权利要求25所述的方法,其中,所述方法还包括:
    所述SN接收所述MN发送的包括所述第一小区关联的多个计数counter值或多个密钥的配置。
  27. 如权利要求26所述的方法,其中,所述第一辅密钥和所述第二辅密钥为所述多个密钥中的密钥;
    所述第一辅密钥在目标顺序中位于所述第二辅密钥之后,所述目标顺序为所述多个密钥的顺序。
  28. 如权利要求27所述的方法,其中,所述目标顺序为所述多个密钥的从小到大的顺序;或者
    所述目标顺序为所述多个密钥的从大到小的顺序;或者
    所述目标顺序为所述配置指示的所述多个密钥的顺序。
  29. 如权利要求28所述的方法,其中,在所述目标顺序为所述配置指示的所述多个密钥的顺序的情况下:
    所述配置中携带有顺序指示信息,所述顺序指示信息用于指示所述目标顺序;或者
    所述目标顺序为所述多个密钥在所述配置中的携带顺序。
  30. 一种密钥确定方法,包括:
    主节点MN确定针对第一小区当前使用和/或待使用的目标密钥,所述第一小区为终端的主辅小区PSCell;
    所述MN向辅节点SN发送所述目标密钥。
  31. 如权利要求30所述的方法,其中,所述方法还包括:
    所述MN向终端发送第一配置,所述第一配置包括如下至少一项:
    多个目标密钥对应的多个计数counter值;
    一个或多个目标密钥对应的第一counter值;
    其中,所述多个目标密钥为所述MN确定的所述终端针对所述第一小区使用的多个目标密钥;
    所述第一配置与候选PSCell关联,所述第一配置包括条件主辅小区变更CPC配置和条件主辅小区添加CPA配置中的至少一项。
  32. 如权利要求30或31所述的方法,其中,所述MN确定针对第一小区当前使用和/或待使用的目标密钥,包括:
    所述MN基于终端的上报信息,计算针对第一小区当前使用和/或待使用的目标密钥;或
    在所述终端的上报信息中获取目标密钥。
  33. 如权利要求32所述的方法,其中,所述终端的上报信息包括如下至少一项:
    第二counter值或基于第二counter值计算的辅密钥,所述第二counter值为所述终端在第一配置包括的第一counter值的基础上计算得到的counter值,其中,所述第一配置与候选PSCell关联,所述第一配置包括条件主辅小区变更CPC配置和条件主辅小区添加CPA配置中的至少一项;
    所述终端基于所述第一配置将所述第一小区作为PSCell的次数;
    所述终端基于所述第一配置执行条件主辅小区组添加或变更CPAC过程的次数。
  34. 一种小区变更处理装置,所述装置存储有第一配置,所述装置包括:
    评估模块,用于基于所述第一配置对第一小区评估;
    第一确定模块,用于在所述第一小区满足第一条件的情况下,将所述第一小区作为终端的目标PSCell;
    第二确定模块,用于根据所述第一配置,确定接入目标PSCell的目标密钥;
    其中,所述第一配置与候选PSCell关联,所述候选PSCell包括所述第一小区,所述第一配置包括条件主辅小区变更CPC配置和条件主辅小区添加CPA配置中的至少一项。
  35. 一种密钥确定装置,包括:
    确定模块,用于基于目标信息,确定针对第一小区当前使用和/或待使用的目标密钥,所述第一小区为终端的主辅小区PSCell;
    其中,所述目标信息包括如下至少一项:
    主节点MN的指示信息;
    终端进行随机接入时携带的信息。
  36. 一种密钥确定装置,包括:
    确定模块,用于确定针对第一小区当前使用和/或待使用的目标密钥,所述第一小区为终端的主辅小区PSCell;
    第一发送模块,用于向辅节点SN发送所述目标密钥。
  37. 一种终端,包括处理器和存储器,所述存储器存储可在所述处理器上运行的程序或指令,其中,所述程序或指令被所述处理器执行时实现如权利要求1至18任一项所述的小区变更处理方法的步骤。
  38. 一种网络节点,所述网络节点为辅节点SN,包括处理器和存储器,所述存储器存储可在所述处理器上运行的程序或指令,其中,所述程序或指令被所述处理器执行时实现如权利要求19至29任一项所述的密钥确定方法的步骤。
  39. 一种网络节点,所述网络节点为主节点MN,包括处理器和存储器,所述存储器存储可在所述处理器上运行的程序或指令,其中,所述程序或指令被所述处理器执行时实现如权利要求30至33任一项所述的密钥确定方法的步骤。
  40. 一种可读存储介质,所述可读存储介质上存储程序或指令,其中,所述程序或指令被处理器执行时实现如权利要求1至18任一项所述的小区变更处理方法的步骤,或者实现如权利要求19至23任一项所述的密钥确定方法的步骤,或者实现如权利要求30至33任一项所述的密钥确定方法的步骤。
PCT/CN2023/087283 2022-04-12 2023-04-10 密钥确定方法、装置、终端、网络侧设备和存储介质 WO2023197992A1 (zh)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
CN202210383928.7 2022-04-12
CN202210383928 2022-04-12
CN202211204227.9 2022-09-29
CN202211204227.9A CN116963210A (zh) 2022-04-12 2022-09-29 密钥确定方法、装置、终端、网络侧设备和存储介质

Publications (1)

Publication Number Publication Date
WO2023197992A1 true WO2023197992A1 (zh) 2023-10-19

Family

ID=88329024

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/087283 WO2023197992A1 (zh) 2022-04-12 2023-04-10 密钥确定方法、装置、终端、网络侧设备和存储介质

Country Status (1)

Country Link
WO (1) WO2023197992A1 (zh)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021064032A1 (en) * 2019-09-30 2021-04-08 Telefonaktiebolaget Lm Ericsson (Publ) Determining security keys
CN113068183A (zh) * 2019-12-26 2021-07-02 大唐移动通信设备有限公司 一种安全密钥的更新方法及装置
WO2022021247A1 (zh) * 2020-07-30 2022-02-03 Oppo广东移动通信有限公司 基于条件的辅节点或主辅小区变更方法及设备

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021064032A1 (en) * 2019-09-30 2021-04-08 Telefonaktiebolaget Lm Ericsson (Publ) Determining security keys
CN113068183A (zh) * 2019-12-26 2021-07-02 大唐移动通信设备有限公司 一种安全密钥的更新方法及装置
WO2022021247A1 (zh) * 2020-07-30 2022-02-03 Oppo广东移动通信有限公司 基于条件的辅节点或主辅小区变更方法及设备

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
INTEL CORPORATION: "Running CR for the introduction of NR mobility enhancement", 3GPP DRAFT; R2-1909571 RUNNING STAGE 2 CR, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. RAN WG2, no. Prague, Czech Republic; 20190826 - 20190830, 16 August 2019 (2019-08-16), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France , XP051767366 *
SHARP: "Security Configuration for Conditional Handover", 3GPP DRAFT; R2-1910807, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. RAN WG2, no. Prague, Czech Republic; 20190826 - 20190830, 15 August 2019 (2019-08-15), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France , pages 1 - 4, XP051768574 *

Similar Documents

Publication Publication Date Title
WO2022089565A1 (zh) 辅小区组信息的配置、获取方法及通信设备
WO2024012239A1 (zh) 条件配置的处理方法、条件配置的处理装置和终端
CN114339811A (zh) 执行目标操作的方法、装置和终端设备
WO2023186161A1 (zh) 候选小区处理方法及装置、终端及网络侧设备
WO2023197992A1 (zh) 密钥确定方法、装置、终端、网络侧设备和存储介质
JP2023552905A (ja) セル切り替え方法、端末機器及びネットワーク機器
WO2024027677A1 (zh) 处理方法、装置、终端、网络侧设备及可读存储介质
WO2024055906A1 (zh) 条件重配置方法、装置及通信设备
WO2023155764A1 (zh) Cpac的评估方法、cpac配置的处理方法及设备
CN116963210A (zh) 密钥确定方法、装置、终端、网络侧设备和存储介质
WO2023155807A1 (zh) 候选小区的维护方法及设备
WO2023216959A1 (zh) 条件重配置信息的处理方法、装置及通信设备
WO2023193677A1 (zh) 测量处理方法、装置、终端及网络侧设备
WO2024093955A1 (zh) Ue辅助信息的上报方法、装置及用户设备
WO2023207968A1 (zh) 连接恢复方法、小区切换方法、及装置
WO2024027638A1 (zh) Ue能力控制方法、装置、终端及网络侧设备
WO2024017005A1 (zh) 条件配置信息的处理方法、装置及通信设备
WO2023193676A1 (zh) 测量上报处理方法、装置、终端及网络侧设备
WO2024093775A1 (zh) 条件配置的控制方法、控制装置、终端及网络侧设备
WO2024017244A1 (zh) 信息发送方法、信息接收方法、装置及相关设备
WO2023207947A1 (zh) 小区重配置方法、装置、终端及网络侧设备
WO2024027681A1 (zh) Ue能力控制方法、装置、终端及网络侧设备
WO2023207978A1 (zh) 配置信息的处理方法、装置及通信设备
WO2023131172A1 (zh) 条件切换方法、终端及网络侧设备
WO2023207842A1 (zh) 波束信息确定方法、终端及网络侧设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23787636

Country of ref document: EP

Kind code of ref document: A1