WO2023220893A1 - 中继通信方法、装置、通信设备及存储介质 - Google Patents

中继通信方法、装置、通信设备及存储介质 Download PDF

Info

Publication number
WO2023220893A1
WO2023220893A1 PCT/CN2022/093147 CN2022093147W WO2023220893A1 WO 2023220893 A1 WO2023220893 A1 WO 2023220893A1 CN 2022093147 W CN2022093147 W CN 2022093147W WO 2023220893 A1 WO2023220893 A1 WO 2023220893A1
Authority
WO
WIPO (PCT)
Prior art keywords
establishment process
security establishment
terminal
security
network element
Prior art date
Application number
PCT/CN2022/093147
Other languages
English (en)
French (fr)
Inventor
陆伟
Original Assignee
北京小米移动软件有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京小米移动软件有限公司 filed Critical 北京小米移动软件有限公司
Priority to PCT/CN2022/093147 priority Critical patent/WO2023220893A1/zh
Priority to CN202280001775.3A priority patent/CN115552941A/zh
Publication of WO2023220893A1 publication Critical patent/WO2023220893A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities
    • H04W8/24Transfer of terminal data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W60/00Affiliation to network, e.g. registration; Terminating affiliation with the network, e.g. de-registration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup

Definitions

  • the present disclosure relates to the field of wireless communication technology but is not limited to the field of wireless communication technology, and in particular, to a relay communication method, device, communication equipment and storage medium.
  • the embodiments of the present disclosure disclose a relay communication method, device, communication equipment and storage medium.
  • a relay communication method is provided, wherein the method is performed by a first terminal, and the method includes:
  • capability information is used to indicate at least one of the following:
  • the sending capability information includes:
  • the capability information is sent.
  • the method further includes:
  • Receive indication information the indication information being used to indicate a method of the security establishment process selected by the first network element of the first terminal;
  • the safe establishment process includes one of the following:
  • a safe establishment process based on user plane UP A safe establishment process based on user plane UP.
  • the reception indication information includes:
  • the indication information is received.
  • the method further includes:
  • the method further includes:
  • the first terminal and the second terminal are terminals that perform a security establishment process.
  • Describe the security establishment process including:
  • the manner of determining the security establishment process selected by the first network element of the first terminal is the same as the manner of the security establishment process selected by the first network element of the second terminal, and determining the execution of the first terminal and the second The security establishment process between terminals;
  • the security establishment process selected by the first network element of the first terminal is different from the security establishment process selected by the first network element of the second terminal, and it is determined not to execute the first terminal and the third network element.
  • triggering the security establishment process includes:
  • the security establishment process between the first terminal and the second terminal is triggered, and the security establishment process selected by the first terminal is the same as the security establishment process selected by the first network element of the second terminal.
  • the first network element is a policy control function PCF.
  • a relay communication method is provided, wherein the method is executed by a first network element, and the method includes:
  • the capability information is used to indicate at least one of the following:
  • the receiving capability information includes:
  • the capability information is received.
  • the method further includes:
  • the method for establishing a safe process includes one of the following:
  • a safe establishment process based on user plane UP A safe establishment process based on user plane UP.
  • the method further includes:
  • Send instruction information where the instruction information is used to instruct the method of the security establishment process selected by the first network element of the first terminal.
  • the sending instruction information includes:
  • the instruction information is sent.
  • the first network element is PCF.
  • a relay communication device wherein the device includes:
  • a sending module configured to send capability information, where the capability information is used to indicate at least one of the following:
  • a relay communication device wherein the device includes:
  • a receiving module configured to receive capability information, where the capability information is used to indicate at least one of the following:
  • a communication device includes:
  • memory for storing instructions executable by the processor
  • the processor is configured to implement the method described in any embodiment of the present disclosure when running the executable instructions.
  • a computer storage medium stores a computer executable program.
  • the executable program is executed by a processor, the method described in any embodiment of the present disclosure is implemented.
  • capability information is sent, and the capability information is used to indicate at least one of the following: a way to support a security establishment process based on the control plane CP; a way to support a security establishment process based on the user plane UP; the security The establishment process includes relay discovery and/or secure establishment process for relay communications.
  • the capability information indicates the manner of supporting the security establishment process based on the control plane CP and/or the manner in which the first terminal supports the security establishment process based on the user plane UP
  • the network Based on the capability information, it can be determined whether to choose the security establishment process based on the control plane CP or the security establishment process based on the user plane UP.
  • the relay communication mechanism is improved. , making relay communication more reliable.
  • Figure 1 is a schematic structural diagram of a wireless communication system according to an exemplary embodiment.
  • Figure 2 is a schematic flowchart of a relay communication method according to an exemplary embodiment.
  • Figure 3 is a schematic flowchart of a relay communication method according to an exemplary embodiment.
  • Figure 4 is a schematic flowchart of a relay communication method according to an exemplary embodiment.
  • Figure 5 is a schematic flowchart of a relay communication method according to an exemplary embodiment.
  • Figure 6 is a schematic flowchart of a relay communication method according to an exemplary embodiment.
  • Figure 7 is a schematic flowchart of a relay communication method according to an exemplary embodiment.
  • Figure 8 is a schematic flowchart of a relay communication method according to an exemplary embodiment.
  • Figure 9 is a schematic flowchart of a relay communication method according to an exemplary embodiment.
  • Figure 10 is a schematic flowchart of a relay communication method according to an exemplary embodiment.
  • Figure 11 is a schematic flowchart of a relay communication method according to an exemplary embodiment.
  • Figure 12 is a schematic flowchart of a relay communication method according to an exemplary embodiment.
  • Figure 13 is a schematic flowchart of a relay communication method according to an exemplary embodiment.
  • Figure 14 is a schematic flowchart of a relay communication method according to an exemplary embodiment.
  • Figure 15 is a schematic flowchart of a relay communication method according to an exemplary embodiment.
  • Figure 16 is a schematic diagram of a relay communication device according to an exemplary embodiment.
  • Figure 17 is a schematic diagram of a relay communication device according to an exemplary embodiment.
  • Figure 18 is a schematic structural diagram of a terminal according to an exemplary embodiment.
  • Figure 19 is a block diagram of a base station according to an exemplary embodiment.
  • first, second, third, etc. may be used to describe various information in the embodiments of the present disclosure, the information should not be limited to these terms. These terms are only used to distinguish information of the same type from each other.
  • first information may also be called second information, and similarly, the second information may also be called first information.
  • word “if” as used herein may be interpreted as "when” or "when” or "in response to determining.”
  • this article uses the terms “greater than” or “less than” when characterizing the size relationship. However, those skilled in the art can understand that the term “greater than” also encompasses the meaning of “greater than or equal to”, and “less than” also encompasses the meaning of “less than or equal to”.
  • FIG. 1 shows a schematic structural diagram of a wireless communication system provided by an embodiment of the present disclosure.
  • the wireless communication system is a communication system based on mobile communication technology.
  • the wireless communication system may include several user equipments 110 and several base stations 120.
  • user equipment 110 may be a device that provides voice and/or data connectivity to a user.
  • the user equipment 110 may communicate with one or more core networks via a Radio Access Network (RAN).
  • RAN Radio Access Network
  • the user equipment 110 may be an Internet of Things user equipment, such as a sensor device, a mobile phone, and a computer with an Internet of Things user equipment. , for example, it can be a fixed, portable, pocket-sized, handheld, computer-built-in or vehicle-mounted device.
  • the user equipment 110 may also be equipment of an unmanned aerial vehicle.
  • the user equipment 110 may also be a vehicle-mounted device, for example, it may be an on-board computer with a wireless communication function, or a wireless user equipment connected to an external on-board computer.
  • the user equipment 110 may also be a roadside device, for example, it may be a streetlight, a signal light or other roadside device with a wireless communication function.
  • the base station 120 may be a network-side device in a wireless communication system.
  • the wireless communication system can be a 5G system, also known as a new air interface system or a 5G NR system.
  • the wireless communication system may also be a next-generation system of the 5G system.
  • the access network in the 5G system can be called NG-RAN (New Generation-Radio Access Network).
  • the base station 120 may also be a base station (gNB) that adopts a centralized distributed architecture in the 5G system.
  • gNB base station
  • the base station 120 adopts a centralized distributed architecture it usually includes a centralized unit (central unit, CU) and at least two distributed units (distributed unit, DU).
  • the centralized unit is equipped with a protocol stack including the Packet Data Convergence Protocol (PDCP) layer, the Radio Link Control protocol (Radio Link Control, RLC) layer, and the Media Access Control (Media Access Control, MAC) layer; distributed
  • PDCP Packet Data Convergence Protocol
  • RLC Radio Link Control protocol
  • MAC Media Access Control
  • the unit is provided with a physical (Physical, PHY) layer protocol stack, and the embodiment of the present disclosure does not limit the specific implementation of the base station 120.
  • a wireless connection may be established between the base station 120 and the user equipment 110 through a wireless air interface.
  • the wireless air interface is a wireless air interface based on the fifth generation mobile communication network technology (5G) standard.
  • the wireless air interface is a new air interface; or the wireless air interface can also be a next-generation mobile phone interface based on 5G.
  • Wireless air interface of communication network technology standard is a wireless air interface based on the fifth generation mobile communication network technology standard.
  • an E2E (End to End, end-to-end) connection can also be established between user equipments 110 .
  • V2V vehicle to vehicle, vehicle to vehicle
  • V2I vehicle to infrastructure, vehicle to roadside equipment
  • V2P vehicle to pedestrian, vehicle to person
  • the above user equipment can be considered as the terminal equipment of the following embodiments.
  • the above-mentioned wireless communication system may also include a network management device 130.
  • the network management device 130 may be a core network device in a wireless communication system.
  • the network management device 130 may be an access and mobility management entity (Access and Mobility Management Function) in a 5G core network (5G Core, 5GC). , AMF).
  • the network management device can also be other core network devices, such as Policy and Charging Rules Function (PCRF) or User Data Management Server (UDM).
  • PCRF Policy and Charging Rules Function
  • UDM User Data Management Server
  • the embodiments of the present disclosure enumerate multiple implementations to clearly describe the technical solutions of the embodiments of the present disclosure.
  • the multiple embodiments provided in the embodiments of the present disclosure can be executed alone or in combination with the methods of other embodiments in the embodiments of the present disclosure. They can also be executed alone or in combination. It is then executed together with some methods in other related technologies; the embodiments of the present disclosure do not limit this.
  • this embodiment provides a relay communication method, wherein the method is executed by the first terminal, and the method includes:
  • Step 21 Send capability information.
  • the capability information is used to indicate at least one of the following:
  • the security establishment process includes relay discovery and/or relay communication security establishment process.
  • the terminals involved in this disclosure may be, but are not limited to, mobile phones, wearable devices, vehicle-mounted terminals, roadside units (RSU, Road Side Unit), smart home terminals, industrial sensing equipment and/or medical equipment, etc.
  • the terminal may be a Redcap terminal or a predetermined version of a new air interface NR terminal (for example, an R17 NR terminal).
  • the first terminal in the present disclosure may be a relay terminal in relay communication, and the second terminal may be a remote terminal in relay communication.
  • the first terminal in the present disclosure may be a remote terminal in relay communication
  • the second terminal may be a relay terminal in relay communication.
  • the network element involved in this disclosure may be a Policy Control Function (PCF).
  • PCF Policy Control Function
  • a network element can be deployed as a communication node alone, or can be deployed uniformly within an existing network element.
  • a network element can be understood as a logical node that can be flexibly deployed in a network, and is not limited here.
  • the first network element may be a PCF.
  • the first terminal may send the capability information to the first network element (for example, PCF) through the base station.
  • the first network element for example, PCF
  • the base station involved in the present disclosure may be various types of base stations, for example, a base station of a fifth generation mobile communication (5G) network or other evolved base stations.
  • 5G fifth generation mobile communication
  • the first terminal sends capability information to the PCF of the first terminal through the base station, and the capability information is used to indicate at least one of the following: a method of supporting the security establishment process based on the control plane CP; supporting security based on the user plane UP The way to establish the process; the security establishment process includes the security establishment process of relay discovery and/or relay communication.
  • the first terminal when the first terminal performs a network registration process, the first terminal sends capability information to the PCF of the first terminal through the base station, and the capability information is used to indicate at least one of the following: supporting a security establishment process based on the control plane CP method; supports the method of security establishment process based on user plane UP; the security establishment process includes the security establishment process of relay discovery and/or relay communication.
  • capability information is sent, and the capability information is used to indicate at least one of the following: a way to support the security establishment process based on the control plane CP; a way to support the security establishment process based on the user plane UP; the security establishment process includes Security establishment process for subsequent discovery and/or relay communications.
  • Receive instruction information wherein the instruction information is used to indicate the method of the security establishment process selected by the first network element of the first terminal; the method of the security establishment process includes one of the following: security establishment based on the control plane CP The method of process; the method of establishing process based on the security of user plane UP.
  • the first terminal sends capability information to the first network element, and the capability information is used to indicate at least one of the following: a method of supporting a security establishment process based on the control plane CP; a method of supporting a security establishment process based on the user plane UP. ;
  • the security establishment process includes the security establishment process of relay discovery and/or relay communication.
  • the first network element determines that it has received the capability information and selects a security establishment process method; the security establishment process method includes one of the following: a security establishment process method based on the control plane CP; a security establishment process method based on the user plane UP .
  • the first network element sends indication information to the first terminal; wherein the indication information is used to instruct the first terminal in the method of the security establishment process selected by the first network element.
  • the first terminal receives the indication information.
  • capability information is sent, and the capability information is used to indicate at least one of the following: a way to support the security establishment process based on the control plane CP; a way to support the security establishment process based on the user plane UP; the security establishment process includes Security establishment process for subsequent discovery and/or relay communications.
  • instruction information is received; wherein the instruction information is used to indicate the method of the security establishment process selected by the first network element of the first terminal; the method of the security establishment process includes the following: 1: The security establishment process method based on the control plane CP; the security establishment process method based on the user plane UP.
  • capability information is sent, and the capability information is used to indicate at least one of the following: a way to support the security establishment process based on the control plane CP; a way to support the security establishment process based on the user plane UP; the security establishment process includes Security establishment process for subsequent discovery and/or relay communications.
  • Receive instruction information wherein the instruction information is used to indicate the method of the security establishment process selected by the first network element of the first terminal; the method of the security establishment process includes one of the following: security establishment based on the control plane CP The method of process; the method of establishing process based on the security of user plane UP. Confirm that the instruction information is received and trigger the security establishment process.
  • capability information is sent, and the capability information is used to indicate at least one of the following: a way to support the security establishment process based on the control plane CP; a way to support the security establishment process based on the user plane UP; the security establishment process includes Security establishment process for subsequent discovery and/or relay communications.
  • Receive instruction information wherein the instruction information is used to indicate the method of the security establishment process selected by the first network element of the first terminal; the method of the security establishment process includes one of the following: security establishment based on the control plane CP The method of process; the method of establishing process based on the security of user plane UP. Confirm that the instruction information is received and trigger the security establishment process.
  • the security establishment process selected by the first network element of the first terminal is the same as the security establishment process selected by the first network element of the second terminal, and the security establishment process between the first terminal and the second terminal is determined to be executed; Alternatively, it is determined that the security establishment process selected by the first network element of the first terminal is different from the security establishment process selected by the first network element of the second terminal, and it is determined not to execute the security establishment process between the first terminal and the second terminal.
  • capability information is sent, and the capability information is used to indicate at least one of the following: a way to support the security establishment process based on the control plane CP; a way to support the security establishment process based on the user plane UP; the security establishment process includes Security establishment process for subsequent discovery and/or relay communications.
  • Receive instruction information wherein the instruction information is used to indicate the method of the security establishment process selected by the first network element of the first terminal; the method of the security establishment process includes one of the following: security establishment based on the control plane CP The method of process; the method of establishing process based on the security of user plane UP. It is determined that the indication information is received, and a security establishment process between the first terminal and the second terminal is triggered; wherein the security establishment process selected by the first terminal is the same as the security establishment process selected by the first network element of the second terminal.
  • This embodiment provides a relay communication method, which method includes:
  • Step a1 When the relay terminal registers with the network, it sends capability information to the PCF through the base station.
  • the capability information is used to indicate at least one of the following: the relay terminal supports the control plane CP-based security establishment process; the relay terminal supports the user-based security establishment process.
  • the security establishment process includes the relay discovery and/or relay communication security establishment process.
  • Step a2 The PCF of the relay terminal selects a security establishment process method based on the capability information.
  • the security establishment process method includes one of the following: a security establishment process based on the control plane CP; a security establishment process based on the user plane UP. process approach.
  • Step a3 When the remote terminal registers with the network, it sends capability information to the PCF through the base station.
  • the capability information is used to indicate at least one of the following: the remote terminal supports the security establishment process based on the control plane CP; the remote terminal supports the user plane UP.
  • the security establishment process includes the security establishment process of relay discovery and/or relay communication.
  • Step a4 The PCF of the remote terminal selects a security establishment process based on the capability information, where the security establishment process method includes one of the following: a security establishment process method based on the control plane CP; a security establishment process method based on the user plane UP.
  • Step a5 During the service authorization and information configuration process of the relay terminal, the PCF of the relay terminal sends indication information to the relay terminal;
  • the instruction information is used to indicate the method of the security establishment process selected by the PCF of the relay terminal; the method of the security establishment process includes one of the following: the method of the security establishment process based on the control plane CP; the method based on the user plane UP's way of building a safe process.
  • Step a6 During the service authorization and information configuration process of the remote terminal, the PCF of the remote terminal sends instruction information to the remote terminal;
  • the instruction information is used to indicate the method of the security establishment process selected by the PCF of the remote terminal; the method of the security establishment process includes one of the following: a method of security establishment process based on the control plane CP; based on the user plane UP A safe way to build processes.
  • Step a7 The relay terminal determines that it has received the instruction information and triggers the security establishment process.
  • Step a8 The remote terminal determines that it has received the instruction information and triggers the security establishment process.
  • Step a9 If the security establishment process selected by the PCF of the relay terminal and the PCF of the remote terminal is consistent (both terminals use the CP-based security process or both terminals use the UP-based security process), then the relay terminal and the remote terminal The discovery process between terminals and subsequent relay communication process can continue. If the PCF of the relay terminal and the PCF of the remote terminal select different security establishment processes (one terminal uses the CP-based security establishment process, and the other terminal uses the UP-based security establishment process), the discovery between the relay terminal and the remote terminal The process cannot continue. The remote terminal needs to further discover the relay terminal using the same security establishment process. The relay terminal needs to further discover remote terminals using the same security establishment process.
  • capability information is sent, and the capability information is used to indicate at least one of the following: a way to support the security establishment process based on the control plane CP; a way to support the security establishment process based on the user plane UP; the security establishment process includes Secure establishment process for relay discovery and/or relay communications.
  • the security establishment process is based on the control plane CP or the security establishment process is based on the user plane UP. Compared with the situation where the network is not clear about the capabilities supported by the terminal, the relay communication mechanism is improved, making the relay communication reliable. Sex is higher.
  • this embodiment provides a relay communication method, wherein the method is executed by the first terminal, and the method includes:
  • Step 31 During the network registration process of the first terminal, the capability information is sent.
  • the capability information is used to indicate at least one of the following: a method that supports the security establishment process based on the control plane CP; a method that supports the security establishment process based on the user plane UP. Method; the security establishment process includes the security establishment process of relay discovery and/or relay communication.
  • the first terminal when the first terminal performs a network registration process, the first terminal sends capability information to the PCF of the first terminal through the base station, and the capability information is used to indicate at least one of the following: supporting a security establishment process based on the control plane CP method; supports the method of security establishment process based on user plane UP; the security establishment process includes the security establishment process of relay discovery and/or relay communication.
  • this embodiment provides a relay communication method, wherein the method is executed by the first terminal, and the method includes:
  • Step 41 Receive instruction information
  • the indication information is used to indicate the method of the security establishment process selected by the first network element of the first terminal; the method of the security establishment process includes one of the following:
  • a safe establishment process based on user plane UP A safe establishment process based on user plane UP.
  • capability information is sent, and the capability information is used to indicate at least one of the following: a way to support the security establishment process based on the control plane CP; a way to support the security establishment process based on the user plane UP; the security establishment process includes Security establishment process for subsequent discovery and/or relay communications.
  • Receive instruction information wherein the instruction information is used to indicate the method of the security establishment process selected by the first network element of the first terminal; the method of the security establishment process includes one of the following: a security establishment process based on the control plane CP Method; method based on the security establishment process of user plane UP.
  • this embodiment provides a relay communication method, wherein the method is executed by the first terminal, and the method includes:
  • Step 51 During the service authorization and information configuration process, receive instruction information, where the instruction information is used to indicate the method of the security establishment process selected by the first network element of the first terminal; the method of the security establishment process includes the following One: the method of establishing a secure process based on the control plane CP; the method of establishing a secure process based on the user plane UP.
  • capability information is sent, and the capability information is used to indicate at least one of the following: a way to support the security establishment process based on the control plane CP; a way to support the security establishment process based on the user plane UP; the security establishment process includes Security establishment process for subsequent discovery and/or relay communications.
  • indication information is received; wherein the indication information is used to indicate the method of the security establishment process selected by the first network element of the first terminal; the method of the security establishment process includes one of the following: The security establishment process is based on the control plane CP; the security establishment process is based on the user plane UP.
  • this embodiment provides a relay communication method, wherein the method is executed by the first terminal, and the method includes:
  • Step 61 Confirm that the instruction information is received and trigger the security establishment process.
  • capability information is sent, and the capability information is used to indicate at least one of the following: a way to support the security establishment process based on the control plane CP; a way to support the security establishment process based on the user plane UP; the security establishment process includes Security establishment process for subsequent discovery and/or relay communications.
  • Receive instruction information wherein the instruction information is used to indicate the method of the security establishment process selected by the first network element of the first terminal; the method of the security establishment process includes one of the following: a security establishment process based on the control plane CP Method; method based on the security establishment process of user plane UP. Confirm that the instruction information is received and trigger the security establishment process.
  • this embodiment provides a relay communication method, wherein the method is executed by a first terminal, and the first terminal and the second terminal are terminals that execute a security establishment process; the method includes:
  • Step 71 Determine whether to execute the security establishment process based on the comparison result between the security establishment process method selected by the first network element of the first terminal and the security establishment process method selected by the first network element of the second terminal.
  • capability information is sent, and the capability information is used to indicate at least one of the following: a way to support the security establishment process based on the control plane CP; a way to support the security establishment process based on the user plane UP; the security establishment process includes Security establishment process for subsequent discovery and/or relay communications.
  • Receive instruction information wherein the instruction information is used to indicate the method of the security establishment process selected by the first network element of the first terminal; the method of the security establishment process includes one of the following: a security establishment process based on the control plane CP Method; method based on the security establishment process of user plane UP. Confirm that the instruction information is received and trigger the security establishment process.
  • the method of determining the security establishment process selected by the first network element of the first terminal is the same as the method of determining the security establishment process selected by the first network element of the second terminal. It is determined to execute the first terminal and The security establishment process between the second terminals; or, the method of determining the security establishment process selected by the first network element of the first terminal and the security establishment process selected by the first network element of the second terminal The method is different, and it is determined not to execute the security establishment process between the first terminal and the second terminal.
  • this embodiment provides a relay communication method, wherein the method is executed by the first terminal, and the method includes:
  • Step 81 Determine that the security establishment process selected by the first network element of the first terminal is the same as the security establishment process selected by the first network element of the second terminal, and determine that the first terminal and the security establishment process are executed.
  • the security establishment process selected by the first network element of the first terminal is different from the security establishment process selected by the first network element of the second terminal, and it is determined not to execute the first terminal and the third network element.
  • step 81 please refer to the description of step 71, and will not be repeated here.
  • this embodiment provides a relay communication method, wherein the method is executed by the first terminal, and the method includes:
  • Step 91 Trigger the security establishment process between the first terminal and the second terminal;
  • the method of the security establishment process selected by the first terminal is the same as the method of the security establishment process selected by the first network element of the second terminal.
  • capability information is sent, and the capability information is used to indicate at least one of the following: a way to support the security establishment process based on the control plane CP; a way to support the security establishment process based on the user plane UP; the security establishment process includes Security establishment process for subsequent discovery and/or relay communications.
  • Receive instruction information wherein the instruction information is used to indicate the method of the security establishment process selected by the first network element of the first terminal; the method of the security establishment process includes one of the following: a security establishment process based on the control plane CP Method; method based on the security establishment process of user plane UP.
  • Confirm that the instruction information is received and trigger the security establishment process. Triggering a security establishment process between the first terminal and the second terminal; wherein the security establishment process selected by the first terminal is the same as the security establishment process selected by the first network element of the second terminal.
  • this embodiment provides a relay communication method, wherein the method is executed by the first network element, and the method includes:
  • Step 101 Receive capability information, where the capability information is used to indicate at least one of the following:
  • the terminals involved in this disclosure may be, but are not limited to, mobile phones, wearable devices, vehicle-mounted terminals, roadside units (RSU, Road Side Unit), smart home terminals, industrial sensing equipment and/or medical equipment, etc.
  • the terminal may be a Redcap terminal or a predetermined version of a new air interface NR terminal (for example, an R17 NR terminal).
  • the first terminal in the present disclosure may be a relay terminal in relay communication, and the second terminal may be a remote terminal in relay communication.
  • the first terminal in the present disclosure may be a remote terminal in relay communication
  • the second terminal may be a relay terminal in relay communication.
  • the network element involved in this disclosure may be a Policy Control Function (PCF).
  • PCF Policy Control Function
  • a network element can be deployed as a communication node alone, or can be deployed uniformly within an existing network element.
  • a network element can be understood as a logical node that can be flexibly deployed in a network, and is not limited here.
  • the first network element may be a PCF.
  • the first network element may receive the capability information sent by the first terminal through the base station.
  • the base station involved in the present disclosure may be various types of base stations, for example, a base station of a fifth generation mobile communication (5G) network or other evolved base stations.
  • 5G fifth generation mobile communication
  • the PCF of the first terminal receives the capability information sent by the first terminal through the base station, and the capability information is used to indicate at least one of the following: a method of supporting the security establishment process based on the control plane CP; supporting a method based on the user plane UP The method of the security establishment process; the security establishment process includes the security establishment process of relay discovery and/or relay communication.
  • the PCF of the first terminal when the first terminal performs network registration, receives capability information sent by the first terminal through the base station, and the capability information is used to indicate at least one of the following: supporting security establishment based on control plane CP The method of the process; the method of supporting the security establishment process based on user plane UP; the security establishment process includes the security establishment process of relay discovery and/or relay communication.
  • capability information is received, and the capability information is used to indicate at least one of the following: a way to support a security establishment process based on the control plane CP; a way to support a security establishment process based on the user plane UP; the security establishment process includes Secure establishment process for relay discovery and/or relay communications.
  • Send instruction information wherein the instruction information is used to indicate the method of the security establishment process selected by the first network element of the first terminal; the method of the security establishment process includes one of the following: a security establishment process based on the control plane CP Method; method based on the security establishment process of user plane UP.
  • the first terminal sends capability information to the first network element, and the capability information is used to indicate at least one of the following: a method of supporting a security establishment process based on the control plane CP; a method of supporting a security establishment process based on the user plane UP;
  • the security establishment process includes a relay discovery and/or a security establishment process for relay communication.
  • the first network element determines that it has received the capability information and selects a security establishment process method; the security establishment process method includes one of the following: a security establishment process method based on the control plane CP; a security establishment process method based on the user plane UP .
  • the first network element sends indication information to the first terminal; wherein the indication information is used to instruct the first terminal in the method of the security establishment process selected by the first network element.
  • the first terminal receives the indication information.
  • capability information is received, and the capability information is used to indicate at least one of the following: a way to support a security establishment process based on the control plane CP; a way to support a security establishment process based on the user plane UP; the security establishment process includes Secure establishment process for relay discovery and/or relay communications.
  • indication information is sent; wherein the indication information is used to indicate the method of the security establishment process selected by the first network element of the first terminal; the method of the security establishment process includes one of the following: The security establishment process is based on the control plane CP; the security establishment process is based on the user plane UP.
  • capability information is received, and the capability information is used to indicate at least one of the following: a way to support a security establishment process based on the control plane CP; a way to support a security establishment process based on the user plane UP; the security establishment process includes Secure establishment process for relay discovery and/or relay communications.
  • Send instruction information wherein the instruction information is used to indicate the method of the security establishment process selected by the first network element of the first terminal; the method of the security establishment process includes one of the following: a security establishment process based on the control plane CP Method; method based on the security establishment process of user plane UP.
  • the first terminal determines that it has received the instruction information and triggers the security establishment process.
  • capability information is received, and the capability information is used to indicate at least one of the following: a way to support a security establishment process based on the control plane CP; a way to support a security establishment process based on the user plane UP; the security establishment process includes Secure establishment process for relay discovery and/or relay communications. It is determined that the capability information is received, and a method of establishing a secure process is selected; the method of establishing a secure process includes one of the following: a secure establishment process based on the control plane CP; a secure establishment process based on the user plane UP. Send instruction information; wherein the instruction information is used to instruct the method of the security establishment process selected by the first network element of the first terminal.
  • the first terminal determines that it has received the instruction information and triggers the security establishment process.
  • the first terminal determines whether to execute the security establishment process based on a comparison result between the security establishment process method selected by the first network element of the first terminal and the security establishment process method selected by the first network element of the second terminal.
  • the first terminal determines the security establishment process selected by the first network element of the first terminal in the same manner as the security establishment process selected by the first network element of the second terminal, and determines to execute the security establishment process of the first network element selected by the second terminal.
  • the security establishment process between a terminal and the second terminal or, determine the security establishment process method selected by the first network element of the first terminal and the method selected by the first network element of the second terminal.
  • the methods of the security establishment process are different, and it is determined not to execute the security establishment process between the first terminal and the second terminal.
  • capability information is received, and the capability information is used to indicate at least one of the following: a way to support a security establishment process based on the control plane CP; a way to support a security establishment process based on the user plane UP; the security establishment The processes include relay discovery and/or secure establishment of relay communications.
  • Send instruction information wherein the instruction information is used to indicate the method of the security establishment process selected by the first network element of the first terminal; the method of the security establishment process includes one of the following: security establishment based on the control plane CP The method of process; the method of establishing process based on the security of user plane UP.
  • the first terminal determines that it has received the instruction information and triggers a security establishment process between the first terminal and the second terminal; wherein the security establishment process selected by the first terminal is the same as the security establishment process selected by the first network element of the second terminal.
  • this embodiment provides a relay communication method, wherein the method is executed by the first network element, and the method includes:
  • Step 111 During the network registration process of the first terminal, receive the capability information, the capability information is used to indicate at least one of the following: support the security establishment process based on the control plane CP; support the user plane UP-based method The method of the security establishment process; the security establishment process includes the security establishment process of relay discovery and/or relay communication.
  • the PCF of the first terminal receives capability information sent by the first terminal through the base station, and the capability information is used to indicate at least one of the following: supporting control plane CP-based The method of security establishment process; the method of supporting the security establishment process based on user plane UP; the security establishment process includes the security establishment process of relay discovery and/or relay communication.
  • this embodiment provides a relay communication method, wherein the method is executed by the first network element, and the method includes:
  • Step 121 Confirm that the capability information is received, and select a safe establishment process method; the safe establishment process method includes one of the following:
  • a safe establishment process based on user plane UP A safe establishment process based on user plane UP.
  • capability information is received, and the capability information is used to indicate at least one of the following: a way to support a security establishment process based on the control plane CP; a way to support a security establishment process based on the user plane UP; the security establishment
  • the processes include relay discovery and/or secure establishment of relay communications. It is determined that the capability information is received, and a method of establishing a secure process is selected; the method of establishing a secure process includes one of the following: a secure establishment process based on the control plane CP; a secure establishment process based on the user plane UP.
  • Send instruction information wherein the instruction information is used to instruct the first terminal to select a security establishment process of the first network element.
  • the first terminal determines that it has received the instruction information and triggers the security establishment process.
  • the first terminal determines whether to execute the security establishment process based on a comparison result between the security establishment process method selected by the first network element of the first terminal and the security establishment process method selected by the first network element of the second terminal.
  • the first terminal determines that the secure establishment flow process selected by the first network element of the first terminal is the same as the secure establishment flow process selected by the first network element of the second terminal, and determines to execute the secure establishment flow process.
  • the secure establishment flow process between the first terminal and the second terminal or, determine the secure establishment flow process selected by the first network element of the first terminal to be consistent with the first secure establishment flow process of the second terminal.
  • the network elements select different methods for establishing a secure flow process, and determine not to execute the secure flow establishment process between the first terminal and the second terminal.
  • this embodiment provides a relay communication method, wherein the method is executed by the first network element, and the method includes:
  • Step 131 Send instruction information
  • the indication information is used to indicate a method of the security establishment process selected by the first network element of the first terminal.
  • capability information is received, and the capability information is used to indicate at least one of the following: a way to support a security establishment process based on the control plane CP; a way to support a security establishment process based on the user plane UP; the security establishment Processes include relay discovery and/or secure establishment of relay communications.
  • instruction information is sent; wherein the instruction information is used to indicate the method of the security establishment process selected by the first network element of the first terminal; the method of the security establishment process includes the following: 1: The security establishment process method based on the control plane CP; the security establishment process method based on the user plane UP.
  • the first terminal determines that it has received the instruction information and triggers the security establishment process between the first terminal and the second terminal; wherein the method of the security establishment process selected by the first terminal is consistent with the first network element selection of the second terminal. security establishment process.
  • this embodiment provides a relay communication method, wherein the method is executed by the first network element, and the method includes:
  • Step 141 During the service authorization and information configuration process, send the instruction information.
  • step 141 please refer to the description of step 13, and will not be repeated here.
  • this embodiment provides a relay communication method, which includes:
  • Step 151 The relay terminal initiates the registration procedure.
  • capability information is sent, and the capability information is used to indicate at least one of the following:
  • the relay terminal supports the security establishment process based on the control plane CP;
  • the relay terminal supports a security establishment process based on the user plane UP.
  • the security establishment process includes a relay discovery and/or a security establishment process for relay communication.
  • Step 152 The PCF of the relay terminal determines that it has received the capability information, and selects a security establishment process method for the relay terminal.
  • the security establishment process method includes one of the following:
  • a safe establishment process based on user plane UP A safe establishment process based on user plane UP.
  • Step 153 The remote terminal initiates the registration procedure.
  • capability information is sent, and the capability information is used to indicate at least one of the following:
  • the remote terminal supports a secure establishment process based on the control plane CP;
  • the remote terminal supports a security establishment process based on user plane UP; the security establishment process includes a relay discovery and/or relay communication security establishment process.
  • Step 154 The PCF of the remote terminal determines that it has received the capability information, and selects a method for the security establishment process of the remote terminal.
  • the method for the security establishment process includes one of the following:
  • a safe establishment process based on user plane UP A safe establishment process based on user plane UP.
  • Step 155 The PCF of the relay terminal initiates the authorization and information configuration process of the relay terminal.
  • the PCF sends indication information, where the indication information is used to indicate the method of the security establishment process selected by the PCF of the relay terminal; the method of the security establishment process includes one of the following:
  • a safe establishment process based on user plane UP A safe establishment process based on user plane UP.
  • Step 156 The PCF of the remote terminal initiates the authorization and information configuration process of the remote terminal.
  • the PCF sends instruction information, where the instruction information is used to indicate the method of the security establishment process selected by the PCF of the remote terminal; the method of the security establishment process includes one of the following:
  • a safe establishment process based on user plane UP A safe establishment process based on user plane UP.
  • Step 157 The relay terminal performs relay discovery and/or relay communication based on the security establishment process indicated by the instruction information.
  • Step 158 The remote terminal performs relay discovery and/or relay communication based on the security establishment process indicated by the instruction information.
  • Step 159 If the security establishment processes selected by the relay terminal and the remote terminal are consistent, the remote terminal and the relay terminal can discover each other and communicate with each other. If the security establishment processes selected by the relay terminal and the remote terminal are different, the remote terminal and the relay terminal can Unable to discover and communicate with each other.
  • this embodiment provides a relay communication device, wherein the device includes:
  • the sending module 161 is used to send capability information, where the capability information is used to indicate at least one of the following:
  • this embodiment provides a relay communication device, wherein the device includes:
  • the receiving module 171 is used to receive capability information, where the capability information is used to indicate at least one of the following:
  • An embodiment of the present disclosure provides a communication device.
  • the communication device includes:
  • Memory used to store instructions executable by the processor
  • the processor is configured to: when executing executable instructions, implement the method applied to any embodiment of the present disclosure.
  • the processor may include various types of storage media, which are non-transitory computer storage media that can continue to memorize information stored on the communication device after the communication device is powered off.
  • the processor can be connected to the memory through a bus, etc., and is used to read the executable program stored in the memory.
  • An embodiment of the present disclosure also provides a computer storage medium, wherein the computer storage medium stores a computer executable program, and when the executable program is executed by a processor, the method of any embodiment of the present disclosure is implemented.
  • one embodiment of the present disclosure provides a structure of a terminal.
  • the terminal 800 may be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a game console, a tablet device, a medical device, a fitness device, a personal digital assistant, etc. .
  • the terminal 800 may include one or more of the following components: a processing component 802, a memory 804, a power supply component 806, a multimedia component 808, an audio component 810, an input/output (I/O) interface 812, a sensor component 814, and communications component 816.
  • Processing component 802 generally controls the overall operations of terminal 800, such as operations associated with display, phone calls, data communications, camera operations, and recording operations.
  • the processing component 802 may include one or more processors 820 to execute instructions to complete all or part of the steps of the above method.
  • processing component 802 may include one or more modules that facilitate interaction between processing component 802 and other components.
  • processing component 802 may include a multimedia module to facilitate interaction between multimedia component 808 and processing component 802.
  • Memory 804 is configured to store various types of data to support operations at device 800 . Examples of such data include instructions for any application or method operating on the terminal 800, contact data, phonebook data, messages, pictures, videos, etc.
  • Memory 804 may be implemented by any type of volatile or non-volatile storage device, or a combination thereof, such as static random access memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EEPROM), Programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disk.
  • SRAM static random access memory
  • EEPROM electrically erasable programmable read-only memory
  • EEPROM erasable programmable read-only memory
  • EPROM Programmable read-only memory
  • PROM programmable read-only memory
  • ROM read-only memory
  • magnetic memory flash memory, magnetic or optical disk.
  • Power supply component 806 provides power to various components of terminal 800.
  • Power component 806 may include a power management system, one or more power supplies, and other components associated with generating, managing, and distributing power to terminal 800.
  • Multimedia component 808 includes a screen that provides an output interface between terminal 800 and the user.
  • the screen may include a liquid crystal display (LCD) and a touch panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive input signals from the user.
  • the touch panel includes one or more touch sensors to sense touches, swipes, and gestures on the touch panel. A touch sensor can not only sense the boundaries of a touch or swipe action, but also detect the duration and pressure associated with the touch or swipe action.
  • multimedia component 808 includes a front-facing camera and/or a rear-facing camera.
  • the front camera and/or the rear camera may receive external multimedia data.
  • Each front-facing camera and rear-facing camera can be a fixed optical lens system or have a focal length and optical zoom capabilities.
  • Audio component 810 is configured to output and/or input audio signals.
  • audio component 810 includes a microphone (MIC) configured to receive external audio signals when terminal 800 is in operating modes, such as call mode, recording mode, and voice recognition mode. The received audio signal may be further stored in memory 804 or sent via communication component 816 .
  • audio component 810 also includes a speaker for outputting audio signals.
  • the I/O interface 812 provides an interface between the processing component 802 and a peripheral interface module, which may be a keyboard, a click wheel, a button, etc. These buttons may include, but are not limited to: Home button, Volume buttons, Start button, and Lock button.
  • Sensor component 814 includes one or more sensors that provide various aspects of status assessment for terminal 800 .
  • the sensor component 814 can detect the open/closed state of the device 800, the relative positioning of components, such as the display and keypad of the terminal 800, the sensor component 814 can also detect the position change of the terminal 800 or a component of the terminal 800, the user The presence or absence of contact with the terminal 800, the terminal 800 orientation or acceleration/deceleration and the temperature change of the terminal 800.
  • Sensor assembly 814 may include a proximity sensor configured to detect the presence of nearby objects without any physical contact.
  • Sensor assembly 814 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications.
  • the sensor component 814 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
  • the communication component 816 is configured to facilitate wired or wireless communication between the terminal 800 and other devices.
  • the terminal 800 can access a wireless network based on a communication standard, such as Wi-Fi, 2G or 3G, or a combination thereof.
  • the communication component 816 receives broadcast signals or broadcast related information from an external broadcast management system via a broadcast channel.
  • communications component 816 also includes a near field communications (NFC) module to facilitate short-range communications.
  • NFC near field communications
  • the NFC module can be implemented based on radio frequency identification (RFID) technology, infrared data association (IrDA) technology, ultra-wideband (UWB) technology, Bluetooth (BT) technology and other technologies.
  • RFID radio frequency identification
  • IrDA infrared data association
  • UWB ultra-wideband
  • Bluetooth Bluetooth
  • the terminal 800 may be configured by one or more application specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing devices (DSPDs), programmable logic devices (PLDs), field programmable Gate array (FPGA), controller, microcontroller, microprocessor or other electronic components are implemented for executing the above method.
  • ASICs application specific integrated circuits
  • DSPs digital signal processors
  • DSPDs digital signal processing devices
  • PLDs programmable logic devices
  • FPGA field programmable Gate array
  • controller microcontroller, microprocessor or other electronic components are implemented for executing the above method.
  • non-transitory computer-readable storage medium including instructions, such as a memory 804 including instructions, which can be executed by the processor 820 of the terminal 800 to complete the above method is also provided.
  • non-transitory computer-readable storage media may be ROM, random access memory (RAM), CD-ROM, magnetic tape, floppy disk, optical data storage device, etc.
  • an embodiment of the present disclosure shows the structure of a base station.
  • the base station 900 may be provided as a network side device.
  • base station 900 includes a processing component 922, which further includes one or more processors, and memory resources represented by memory 932 for storing instructions, such as application programs, executable by processing component 922.
  • the application program stored in memory 932 may include one or more modules, each corresponding to a set of instructions.
  • the processing component 922 is configured to execute instructions to perform any of the foregoing methods applied to the base station.
  • Base station 900 may also include a power supply component 926 configured to perform power management of base station 900, a wired or wireless network interface 950 configured to connect base station 900 to a network, and an input/output (I/O) interface 958.
  • Base station 900 may operate based on an operating system stored in memory 932, such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM or the like.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本公开实施例提供了一种中继通信方法,其中,所述方法由第一终端执行,所述方法包括:发送能力信息,所述能力信息用于指示以下至少之一:支持基于控制面CP的安全建立流程的方式;支持基于用户面UP的安全建立流程的方式,所述安全建立流程包括中继发现和/或中继通信的安全建立流程。

Description

中继通信方法、装置、通信设备及存储介质 技术领域
本公开涉及无线通信技术领域但不限于无线通信技术领域,尤其涉及一种中继通信方法、装置、通信设备及存储介质。
背景技术
在第五代移动通信技术的邻近通信服务(ProSe,Proximity Services)安全性应用中,存在基于控制面(CP,Control Plane)和基于用户面(UP,User Plane)的解决方案,用于为远程终端和终端到网络之间中继终端的PC5通信建立安全机制。在此之前,远程终端和中继终端需要相互发现。对于中继通信之前的中继发现,也有基于CP和基于UP的安全建立流程两种选择。
相关技术中,当终端发起发现过程或中继通信建立过程时,终端如何在基于CP的安全建立流程和基于UP的安全建立流程这两种方式之间进行选择,是需要考虑的问题。
发明内容
本公开实施例公开了一种中继通信方法、装置、通信设备及存储介质。
根据本公开实施例的第一方面,提供一种中继通信方法,其中,所述方法由第一终端执行,所述方法包括:
发送能力信息,所述能力信息用于指示以下至少之一:
支持基于控制面CP的安全建立流程的方式;
支持基于用户面UP的安全建立流程的方式,所述安全建立流程包括中继发现和/或中继通信的安全建立流程。
在一个实施例中,所述发送能力信息,包括:
在所述第一终端执行网络注册过程中,发送所述能力信息。
在一个实施例中,所述方法还包括:
接收指示信息,所述指示信息用于指示所述第一终端的第一网元选择的安全建立流程的方式;
所述安全建立流程的方式包括以下之一:
基于控制面CP的安全建立流程的方式;
基于用户面UP的安全建立流程的方式。
在一个实施例中,所述接收指示信息,包括:
在服务授权和信息配置过程中,接收所述指示信息。
在一个实施例中,所述方法还包括:
确定接收到所述指示信息,触发所述安全建立流程。
在一个实施例中,所述方法还包括:
根据所述第一终端的第一网元选择的安全建立流程的方式与第二终端的第一网元选择的安全建立流程的方式的比较结果,确定是否执行所述安全建立流程;
其中,所述第一终端与所述第二终端为执行安全建立流程的终端。
在一个实施例中,所述根据所述第一终端的第一网元选择的安全建立流程的方式与第二终端的第一网元选择的安全建立流程的方式的比较结果,确定是否执行所述安全建立流程,包括:
确定所述第一终端的第一网元选择的安全建立流程的方式与所述第二终端的第一网元选择的安全建立流程的方式相同,确定执行所述第一终端和所述第二终端之间的所述安全建立流程;
或者,
确定所述第一终端的第一网元选择的安全建立流程的方式与所述第二终端的第一网元选择的安全建立流程的方式不同,确定不执行所述第一终端和所述第二终端之间的所述安全建立流程。
在一个实施例中,所述触发所述安全建立流程,包括:
触发所述第一终端和第二终端之间的安全建立流程,所述第一终端选择的安全建立流程的方式与第二终端的第一网元选择的安全建立流程的方式相同。
在一个实施例中,所述第一网元为策略控制功能PCF。
根据本公开实施例的第二方面,提供一种中继通信方法,其中,所述方法由第一网元执行,所述方法包括:
接收能力信息,所述能力信息用于指示以下至少之一:
支持基于控制面CP的安全建立流程的方式;
支持基于用户面UP的安全建立流程的方式,所述安全建立流程包括中继发现和/或中继通信的安全建立流程。
在一个实施例中,所述接收能力信息,包括:
在所述第一终端执行网络注册过程中,接收所述能力信息。
在一个实施例中,所述方法还包括:
确定接收到所述能力信息,选择安全建立流程的方式,所述安全建立流程的方式包括以下之一:
基于控制面CP的安全建立流程的方式;
基于用户面UP的安全建立流程的方式。
在一个实施例中,所述方法还包括:
发送指示信息,所述指示信息用于指示所述第一终端的第一网元选择的安全建立流程的方式。
在一个实施例中,所述发送指示信息,包括:
在服务授权和信息配置过程中,发送所述指示信息。
在一个实施例中,所述第一网元为PCF。
根据本公开实施例的第三方面,提供一种中继通信装置,其中,所述装置包括:
发送模块,用于发送能力信息,所述能力信息用于指示以下至少之一:
支持基于控制面CP的安全建立流程的方式;
支持基于用户面UP的安全建立流程的方式;所述安全建立流程包括中继发现和/或中继通信的安全建立流程。
根据本公开实施例的第四方面,提供一种中继通信装置,其中,所述装置包括:
接收模块,用于接收能力信息,所述能力信息用于指示以下至少之一:
支持基于控制面CP的安全建立流程的方式;
支持基于用户面UP的安全建立流程的方式;所述安全建立流程包括中继发现和/或中继通信的安全建立流程。
根据本公开实施例的第五方面,提供一种通信设备,所述通信设备,包括:
处理器;
用于存储所述处理器可执行指令的存储器;
其中,所述处理器被配置为:用于运行所述可执行指令时,实现本公开任意实施例所述的方法。
根据本公开实施例的第六方面,提供一种计算机存储介质,所述计算机存储介质存储有计算机可执行程序,所述可执行程序被处理器执行时实现本公开任意实施例所述的方法。
在本公开实施例中,发送能力信息,所述能力信息用于指示以下至少之一:支持基于控制面CP的安全建立流程的方式;支持基于用户面UP的安全建立流程的方式;所述安全建立流程包括中继发现和/或中继通信的安全建立流程。这里,由于所述能力信息指示了支持基于控制面CP的安全建立流程的方式和/或所述第一终端支持基于用户面UP的安全建立流程的方式,网络在接收到所述能力信息后,就可以基于所述能力信息确定选择基于控制面CP的安全建立流程的方式还是基于用户面UP的安全建立流程,相较于网络不明确终端所支持的能力的情况,完善了中继通信的机制,使得中继通信的可靠性更高。
附图说明
图1是根据一示例性实施例示出的一种无线通信系统的结构示意图。
图2是根据一示例性实施例示出的一种中继通信方法的流程示意图。
图3是根据一示例性实施例示出的一种中继通信方法的流程示意图。
图4是根据一示例性实施例示出的一种中继通信方法的流程示意图。
图5是根据一示例性实施例示出的一种中继通信方法的流程示意图。
图6是根据一示例性实施例示出的一种中继通信方法的流程示意图。
图7是根据一示例性实施例示出的一种中继通信方法的流程示意图。
图8是根据一示例性实施例示出的一种中继通信方法的流程示意图。
图9是根据一示例性实施例示出的一种中继通信方法的流程示意图。
图10是根据一示例性实施例示出的一种中继通信方法的流程示意图。
图11是根据一示例性实施例示出的一种中继通信方法的流程示意图。
图12是根据一示例性实施例示出的一种中继通信方法的流程示意图。
图13是根据一示例性实施例示出的一种中继通信方法的流程示意图。
图14是根据一示例性实施例示出的一种中继通信方法的流程示意图。
图15是根据一示例性实施例示出的一种中继通信方法的流程示意图。
图16是根据一示例性实施例示出的一种中继通信装置的示意图。
图17是根据一示例性实施例示出的一种中继通信装置的示意图。
图18是根据一示例性实施例示出的一种终端的结构示意图。
图19是根据一示例性实施例示出的一种基站的框图。
具体实施方式
这里将详细地对示例性实施例进行说明,其示例表示在附图中。下面的描述涉及附图时,除非另有表示,不同附图中的相同数字表示相同或相似的要素。以下示例性实施例中所描述的实施方式并不代表与本公开实施例相一致的所有实施方式。相反,它们仅是与如所附权利要求书中所详述的、本公开实施例的一些方面相一致的装置和方法的例子。
在本公开实施例使用的术语是仅仅出于描述特定实施例的目的,而非旨在限制本公开实施例。在本公开实施例和所附权利要求书中所使用的单数形式的“一种”和“该”也旨在包括多数形式,除非上下文清楚地表示其他含义。还应当理解,本文中使用的术语“和/或”是指并包含一个或多个相关联的列出项目的任何或所有可能组合。
应当理解,尽管在本公开实施例可能采用术语第一、第二、第三等来描述各种信息,但这些信息不应限于这些术语。这些术语仅用来将同一类型的信息彼此区分开。例如,在不脱离本公开实施例范围的情况下,第一信息也可以被称为第二信息,类似地,第二信息也可以被称为第一信息。取决于语境,如在此所使用的词语“如果”可以被解释成为“在……时”或“当……时”或“响应于确定”。
出于简洁和便于理解的目的,本文在表征大小关系时,所使用的术语为“大于”或“小于”。但对于本领域技术人员来说,可以理解:术语“大于”也涵盖了“大于等于”的含义,“小于”也涵盖了“小于等于”的含义。
请参考图1,其示出了本公开实施例提供的一种无线通信系统的结构示意图。如图1所示,无线通信系统是基于移动通信技术的通信系统,该无线通信系统可以包括:若干个用户设备110以及若干个基站120。
其中,用户设备110可以是指向用户提供语音和/或数据连通性的设备。用户设备110可以经无线接入网(Radio Access Network,RAN)与一个或多个核心网进行通信,用户设备110可以是物联网用户设备,如传感器设备、移动电话和具有物联网用户设备的计算机,例如,可以是固定式、便携式、袖珍式、手持式、计算机内置的或者车载的装置。例如,站(Station,STA)、订户单元(subscriber unit)、订户站(subscriber station),移动站(mobile station)、移动台(mobile)、远程站(remote station)、接入点、远程用户设备(remote terminal)、接入用户设备(access terminal)、用户装置(user terminal)、用户代理(user agent)、用户设备(user device)、或用户设备(user equipment)。或者,用户设备110也可以是无人飞行器的设备。或者,用户设备110也可以是车载设备,比如,可以是具有无线通信功能的行车电脑,或者是外接行车电脑的无线用户设备。或者,用户设备110也可以是路边设备,比如,可 以是具有无线通信功能的路灯、信号灯或者其它路边设备等。
基站120可以是无线通信系统中的网络侧设备。其中,该无线通信系统可以是5G系统,又称新空口系统或5G NR系统。或者,该无线通信系统也可以是5G系统的再下一代系统。其中,5G系统中的接入网可以称为NG-RAN(New Generation-Radio Access Network,新一代无线接入网)。
其中,基站120也可以是5G系统中采用集中分布式架构的基站(gNB)。当基站120采用集中分布式架构时,通常包括集中单元(central unit,CU)和至少两个分布单元(distributed unit,DU)。集中单元中设置有分组数据汇聚协议(Packet Data Convergence Protocol,PDCP)层、无线链路层控制协议(Radio Link Control,RLC)层、媒体访问控制(Media Access Control,MAC)层的协议栈;分布单元中设置有物理(Physical,PHY)层协议栈,本公开实施例对基站120的具体实现方式不加以限定。
基站120和用户设备110之间可以通过无线空口建立无线连接。在不同的实施方式中,该无线空口是基于第五代移动通信网络技术(5G)标准的无线空口,比如该无线空口是新空口;或者,该无线空口也可以是基于5G的更下一代移动通信网络技术标准的无线空口。
在一些实施例中,用户设备110之间还可以建立E2E(End to End,端到端)连接。比如车联网通信(vehicle to everything,V2X)中的V2V(vehicle to vehicle,车对车)通信、V2I(vehicle to Infrastructure,车对路边设备)通信和V2P(vehicle to pedestrian,车对人)通信等场景。
这里,上述用户设备可认为是下面实施例的终端设备。
在一些实施例中,上述无线通信系统还可以包含网络管理设备130。
若干个基站120分别与网络管理设备130相连。其中,网络管理设备130可以是无线通信系统中的核心网设备,比如,该网络管理设备130可以是5G核心网(5G Core,5GC)中的接入与移动性管理实体(Access and Mobility Management Function,AMF)。或者,该网络管理设备也可以是其它的核心网设备,比如策略与计费规则功能单元(Policy and Charging Rules Function,PCRF)或者用户数据管理服务器(UDM)等。对于网络管理设备130的实现形态,本公开实施例不做限定。
为了便于本领域内技术人员理解,本公开实施例列举了多个实施方式以对本公开实施例的技术方案进行清晰地说明。当然,本领域内技术人员可以理解,本公开实施例提供的多个实施例,可以被单独执行,也可以与本公开实施例中其他实施例的方法结合后一起被执行,还可以单独或结合后与其他相关技术中的一些方法一起被执行;本公开实施例并不对此作出限定。
如图2所示,本实施例中提供一种中继通信方法,其中,该方法由第一终端执行,该方法包括:
步骤21、发送能力信息,能力信息用于指示以下至少之一:
支持基于控制面CP的安全建立流程的方式;
支持基于用户面UP的安全建立过流程的方式,安全建立流程包括中继发现和/或中继通信的安全建立流程。
这里,本公开所涉及的终端可以是但不限于是手机、可穿戴设备、车载终端、路侧单元(RSU,Road Side Unit)、智能家居终端、工业用传感设备和/或医疗设备等。在一些实施例中,该终端可以是Redcap终端或者预定版本的新空口NR终端(例如,R17的NR终端)。本公开中的第一终端可以是中 继通信中的中继终端,第二终端可以是中继通信中的远程终端。或者,本公开中的第一终端可以是中继通信中的远程终端,第二终端可以是中继通信中的中继终端。
本公开中涉及的网元可以是策略控制功能(PCF,Policy Control Function)。需要说明的是,具有实现本公开中相关技术方案的网元并不限于上述例举。在本公开的一些实施方式中,网元可以单独作为一个通信节点部署,也可以统一部署在已有网元内。总之,可以将网元理解为一个网络中可以灵活部署的逻辑节点,在此不做限定。
在一个实施例中,所述第一网元可以为PCF。
在一个实施例中,第一终端可以是通过基站向第一网元(例如,PCF)发送能力信息。
本公开中涉及的基站可以为各种类型的基站,例如,第五代移动通信(5G)网络的基站或其它演进型基站。
在一个实施例中,第一终端通过基站向第一终端的PCF发送能力信息,能力信息用于指示以下至少之一:支持基于控制面CP的安全建立流程的方式;支持基于用户面UP的安全建立过流程的方式;安全建立流程包括中继发现和/或中继通信的安全建立流程。
在一个实施例中,在第一终端执行网络注册过程中,第一终端通过基站向第一终端的PCF发送能力信息,能力信息用于指示以下至少之一:支持基于控制面CP的安全建立流程的方式;支持基于用户面UP的安全建立过流程的方式;安全建立流程包括中继发现和/或中继通信的安全建立流程。
在一个实施例中,发送能力信息,能力信息用于指示以下至少之一:支持基于控制面CP的安全建立流程的方式;支持基于用户面UP的安全建立过流程的方式;安全建立流程包括中继发现和/或中继通信的安全建立流程。接收指示信息;其中,所述指示信息用于指示所述第一终端的第一网元选择的安全建立流程的方式;所述安全建立流程的方式包括以下之一:基于控制面CP的安全建立流程的方式;基于用户面UP的安全建立流程的方式。
示例性地,第一终端向第一网元发送能力信息,能力信息用于指示以下至少之一:支持基于控制面CP的安全建立流程的方式;支持基于用户面UP的安全建立过流程的方式;安全建立流程包括中继发现和/或中继通信的安全建立流程。第一网元确定接收到能力信息,选择安全建立流程的方式;所述安全建立流程的方式包括以下之一:基于控制面CP的安全建立流程的方式;基于用户面UP的安全建立流程的方式。第一网元向第一终端发送指示信息;其中,指示信息用于指示第一终端的第一网元选择的安全建立流程的方式。第一终端接收指示信息。
在一个实施例中,发送能力信息,能力信息用于指示以下至少之一:支持基于控制面CP的安全建立流程的方式;支持基于用户面UP的安全建立过流程的方式;安全建立流程包括中继发现和/或中继通信的安全建立流程。在服务授权和信息配置过程中,接收指示信息;其中,所述指示信息用于指示所述第一终端的第一网元选择的安全建立流程的方式;所述安全建立流程的方式包括以下之一:基于控制面CP的安全建立流程的方式;基于用户面UP的安全建立流程的方式。
在一个实施例中,发送能力信息,能力信息用于指示以下至少之一:支持基于控制面CP的安全建立流程的方式;支持基于用户面UP的安全建立过流程的方式;安全建立流程包括中继发现和/或中继通信的安全建立流程。接收指示信息;其中,所述指示信息用于指示所述第一终端的第一网元选择的安 全建立流程的方式;所述安全建立流程的方式包括以下之一:基于控制面CP的安全建立流程的方式;基于用户面UP的安全建立流程的方式。确定接收到指示信息,触发安全建立流程。
在一个实施例中,发送能力信息,能力信息用于指示以下至少之一:支持基于控制面CP的安全建立流程的方式;支持基于用户面UP的安全建立过流程的方式;安全建立流程包括中继发现和/或中继通信的安全建立流程。接收指示信息;其中,所述指示信息用于指示所述第一终端的第一网元选择的安全建立流程的方式;所述安全建立流程的方式包括以下之一:基于控制面CP的安全建立流程的方式;基于用户面UP的安全建立流程的方式。确定接收到指示信息,触发安全建立流程。根据第一终端的第一网元选择的安全建立流程与第二终端的第一网元选择的安全建立流程的比较结果,确定是否执行安全建立流程。示例性地,确定第一终端的第一网元选择的安全建立流程与第二终端的第一网元选择的安全建立流程相同,确定执行第一终端和第二终端之间的安全建立流程;或者,确定第一终端的第一网元选择的安全建立流程与第二终端的第一网元选择的安全建立流程不同,确定不执行第一终端和第二终端之间的安全建立流程。
在一个实施例中,发送能力信息,能力信息用于指示以下至少之一:支持基于控制面CP的安全建立流程的方式;支持基于用户面UP的安全建立过流程的方式;安全建立流程包括中继发现和/或中继通信的安全建立流程。接收指示信息;其中,所述指示信息用于指示所述第一终端的第一网元选择的安全建立流程的方式;所述安全建立流程的方式包括以下之一:基于控制面CP的安全建立流程的方式;基于用户面UP的安全建立流程的方式。确定接收到指示信息,触发第一终端和第二终端之间的安全建立流程;其中,第一终端选择的安全建立流程与第二终端的第一网元选择的安全建立流程相同。
为了更好地理解本公开实施例,以下通过一个示例性实施例对本公开技术方案做进一步说明:
示例1:
本实施例中提供一种中继通信方法,该方法包括:
步骤a1、当中继终端向网络注册时,通过基站向PCF发送能力信息,能力信息用于指示以下至少之一:中继终端支持基于控制面CP的安全建立流程的方式;中继终端支持基于用户面UP的安全建立过流程的方式;安全建立流程包括中继发现和/或中继通信的安全建立流程。
步骤a2、中继终端的PCF根据能力信息选择安全建立流程的方式,其中,所述安全建立流程的方式包括以下之一:基于控制面CP的安全建立流程的方式;基于用户面UP的安全建立流程的方式。
步骤a3、当远程终端向网络注册时,通过基站向PCF发送能力信息,能力信息用于指示以下至少之一:远程终端支持基于控制面CP的安全建立流程的方式;远程终端支持基于用户面UP的安全建立过流程的方式;安全建立流程包括中继发现和/或中继通信的安全建立流程。
步骤a4、远程终端的PCF根据能力信息选择安全建立流程,其中,所述安全建立流程的方式包括以下之一:基于控制面CP的安全建立流程方式;基于用户面UP的安全建立流程方式。
步骤a5、在中继终端的服务授权和信息配置过程中,中继终端的PCF向中继终端发送指示信息;
其中,所述指示信息用于指示所述中继终端的PCF选择的安全建立流程的方式;所述安全建立流程的方式包括以下之一:基于控制面CP的安全建立流程的方式;基于用户面UP的安全建立流程的方式。
步骤a6、在远程终端的服务授权和信息配置过程中,远程终端的PCF向远程终端发送指示信息;
其中,所述指示信息用于指示所述远程终端的PCF选择的安全建立流程的方式;所述安全建立流程的方式包括以下之一:基于控制面CP的安全建立流程的方式;基于用户面UP的安全建立流程的方式。
步骤a7、中继终端确定接收到指示信息,触发安全建立流程。
步骤a8、远程终端确定接收到指示信息,触发安全建立流程。
步骤a9、如果中继终端的PCF和远程终端的PCF选择的安全建立流程一致(两个终端都使用基于CP的安全过程或两个终端都使用基于UP的安全过程),则中继终端和远程终端之间的发现过程以及随后的中继通信过程可以继续进行。如果中继终端的PCF和远程终端的PCF选择的安全建立流程不同(一个终端使用基于CP的安全建立流程,另一个终端使用基于UP的安全建立流程),中继终端和远程终端之间的发现过程无法继续。远程终端需要进一步发现使用相同安全建立流程的中继终端。中继终端需要进一步发现使用相同安全建立流程的远程终端。
在本公开实施例中,发送能力信息,能力信息用于指示以下至少之一:支持基于控制面CP的安全建立流程的方式;支持基于用户面UP的安全建立过流程的方式;安全建立流程包括中继发现和/或中继通信的安全建立流程。这里,由于能力信息指示了终端支持基于控制面CP的安全建立流程的方式和/或支持基于用户面UP的安全建立过流程的方式,网络在接收到能力信息后,就可以基于能力信息确定选择基于控制面CP的安全建立流程的方式还是基于用户面UP的安全建立流程的方式,相较于网络不明确终端所支持的能力的情况,完善了中继通信的机制,使得中继通信的可靠性更高。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图3所示,本实施例中提供一种中继通信方法,其中,该方法由第一终端执行,该方法包括:
步骤31、在第一终端执行网络注册过程中,发送能力信息,能力信息用于指示以下至少之一:支持基于控制面CP的安全建立流程的方式;支持基于用户面UP的安全建立过流程的方式;安全建立流程包括中继发现和/或中继通信的安全建立流程。
在一个实施例中,在第一终端执行网络注册过程中,第一终端通过基站向第一终端的PCF发送能力信息,能力信息用于指示以下至少之一:支持基于控制面CP的安全建立流程的方式;支持基于用户面UP的安全建立过流程的方式;安全建立流程包括中继发现和/或中继通信的安全建立流程。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图4所示,本实施例中提供一种中继通信方法,其中,该方法由第一终端执行,该方法包括:
步骤41、接收指示信息;
其中,所述指示信息用于指示所述第一终端的第一网元选择的安全建立流程的方式;所述安全建立流程的方式包括以下之一:
基于控制面CP的安全建立流程的方式;
基于用户面UP的安全建立流程的方式。
在一个实施例中,发送能力信息,能力信息用于指示以下至少之一:支持基于控制面CP的安全建立流程的方式;支持基于用户面UP的安全建立过流程的方式;安全建立流程包括中继发现和/或中继通信的安全建立流程。接收指示信息;其中,指示信息用于指示所述第一终端的第一网元选择的安全建立流程的方式;所述安全建立流程的方式包括以下之一:基于控制面CP的安全建立流程的方式;基于用户面UP的安全建立流程的方式。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图5所示,本实施例中提供一种中继通信方法,其中,该方法由第一终端执行,该方法包括:
步骤51、在服务授权和信息配置过程中,接收指示信息,其中,指示信息用于指示所述第一终端的第一网元选择的安全建立流程的方式;所述安全建立流程的方式包括以下之一:基于控制面CP的安全建立流程的方式;基于用户面UP的安全建立流程的方式。
在一个实施例中,发送能力信息,能力信息用于指示以下至少之一:支持基于控制面CP的安全建立流程的方式;支持基于用户面UP的安全建立过流程的方式;安全建立流程包括中继发现和/或中继通信的安全建立流程。在服务授权和信息配置过程中,接收指示信息;其中,指示信息用于指示所述第一终端的第一网元选择的安全建立流程的方式;所述安全建立流程的方式包括以下之一:基于控制面CP的安全建立流程的方式;基于用户面UP的安全建立流程的方式。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图6所示,本实施例中提供一种中继通信方法,其中,该方法由第一终端执行,该方法包括:
步骤61、确定接收到指示信息,触发安全建立流程。
在一个实施例中,发送能力信息,能力信息用于指示以下至少之一:支持基于控制面CP的安全建立流程的方式;支持基于用户面UP的安全建立过流程的方式;安全建立流程包括中继发现和/或中继通信的安全建立流程。接收指示信息;其中,指示信息用于指示所述第一终端的第一网元选择的安全建立流程的方式;所述安全建立流程的方式包括以下之一:基于控制面CP的安全建立流程的方式;基于用户面UP的安全建立流程的方式。确定接收到指示信息,触发安全建立流程。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图7所示,本实施例中提供一种中继通信方法,其中,该方法由第一终端执行,所述第一终端与第二终端为执行安全建立流程的终端;该方法包括:
步骤71、根据第一终端的第一网元选择的安全建立流程的方式与第二终端的第一网元选择的安全 建立流程的方式的比较结果,确定是否执行所述安全建立流程。
在一个实施例中,发送能力信息,能力信息用于指示以下至少之一:支持基于控制面CP的安全建立流程的方式;支持基于用户面UP的安全建立过流程的方式;安全建立流程包括中继发现和/或中继通信的安全建立流程。接收指示信息;其中,指示信息用于指示所述第一终端的第一网元选择的安全建立流程的方式;所述安全建立流程的方式包括以下之一:基于控制面CP的安全建立流程的方式;基于用户面UP的安全建立流程的方式。确定接收到指示信息,触发安全建立流程。根据第一终端的第一网元选择的安全建立流程的方式与第二终端的第一网元选择的安全建立流程的方式的比较结果,确定是否执行所述安全建立流程。示例性地,确定所述第一终端的第一网元选择的安全建立流程的方式与所述第二终端的第一网元选择的安全建立流程的方式相同,确定执行所述第一终端和所述第二终端之间的所述安全建立流程;或者,确定所述第一终端的第一网元选择的安全建立流程的方式与所述第二终端的第一网元选择的安全建立流程的方式不同,确定不执行所述第一终端和所述第二终端之间的所述安全建立流程。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图8所示,本实施例中提供一种中继通信方法,其中,该方法由第一终端执行,该方法包括:
步骤81、确定所述第一终端的第一网元选择的安全建立流程的方式与所述第二终端的第一网元选择的安全建立流程的方式相同,确定执行所述第一终端和所述第二终端之间的所述安全建立流程;
或者,
确定所述第一终端的第一网元选择的安全建立流程的方式与所述第二终端的第一网元选择的安全建立流程的方式不同,确定不执行所述第一终端和所述第二终端之间的所述安全建立流程。
步骤81部分的描述请具体参见步骤71部分的说明,在此不再赘述。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图9所示,本实施例中提供一种中继通信方法,其中,该方法由第一终端执行,该方法包括:
步骤91、触发所述第一终端和第二终端之间的安全建立流程;
其中,所述第一终端选择的安全建立流程的方式与第二终端的第一网元选择的安全建立流程的方式相同。
在一个实施例中,发送能力信息,能力信息用于指示以下至少之一:支持基于控制面CP的安全建立流程的方式;支持基于用户面UP的安全建立过流程的方式;安全建立流程包括中继发现和/或中继通信的安全建立流程。接收指示信息;其中,指示信息用于指示所述第一终端的第一网元选择的安全建立流程的方式;所述安全建立流程的方式包括以下之一:基于控制面CP的安全建立流程的方式;基于用户面UP的安全建立流程的方式。确定接收到指示信息,触发安全建立流程。触发所述第一终端和第二终端之间的安全建立流程;其中,所述第一终端选择的安全建立流程的方式与第二终端的第一网元选 择的安全建立流程的方式相同。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图10所示,本实施例中提供一种中继通信方法,其中,该方法由第一网元执行,该方法包括:
步骤101、接收能力信息,所述能力信息用于指示以下至少之一:
支持基于控制面CP的安全建立流程的方式;
支持基于用户面UP的安全建立流程的方式,所述安全建立流程包括中继发现和/或中继通信的安全建立流程。
这里,本公开所涉及的终端可以是但不限于是手机、可穿戴设备、车载终端、路侧单元(RSU,Road Side Unit)、智能家居终端、工业用传感设备和/或医疗设备等。在一些实施例中,该终端可以是Redcap终端或者预定版本的新空口NR终端(例如,R17的NR终端)。本公开中的第一终端可以是中继通信中的中继终端,第二终端可以是中继通信中的远程终端。或者,本公开中的第一终端可以是中继通信中的远程终端,第二终端可以是中继通信中的中继终端。
本公开中涉及的网元可以是策略控制功能(PCF,Policy Control Function)。需要说明的是,具有实现本公开中相关技术方案的网元并不限于上述例举。在本公开的一些实施方式中,网元可以单独作为一个通信节点部署,也可以统一部署在已有网元内。总之,可以将网元理解为一个网络中可以灵活部署的逻辑节点,在此不做限定。
在一个实施例中,所述第一网元可以为PCF。
在一个实施例中,第一网元(例如,PCF)可以是通过基站接收第一终端发送的能力信息。
本公开中涉及的基站可以为各种类型的基站,例如,第五代移动通信(5G)网络的基站或其它演进型基站。
在一个实施例中,第一终端的PCF通过基站接收第一终端发送的能力信息,能力信息用于指示以下至少之一:支持基于控制面CP的安全建立流程的方式;支持基于用户面UP的安全建立流程的方式;所述安全建立流程包括中继发现和/或中继通信的安全建立流程。
在一个实施例中,在第一终端执行网络注册过程中,第一终端的PCF通过基站接收第一终端发送的能力信息,能力信息用于指示以下至少之一:支持基于控制面CP的安全建立流程的方式;支持基于用户面UP的安全建立流程的方式;所述安全建立流程包括中继发现和/或中继通信的安全建立流程。
在一个实施例中,接收能力信息,能力信息用于指示以下至少之一:支持基于控制面CP的安全建立流程的方式;支持基于用户面UP的安全建立流程的方式;所述安全建立流程包括中继发现和/或中继通信的安全建立流程。发送指示信息;其中,指示信息用于指示所述第一终端的第一网元选择的安全建立流程的方式;所述安全建立流程的方式包括以下之一:基于控制面CP的安全建立流程的方式;基于用户面UP的安全建立流程的方式。
示例性地,第一终端向第一网元发送能力信息,能力信息用于指示以下至少之一:支持基于控制面CP的安全建立流程的方式;支持基于用户面UP的安全建立流程的方式;所述安全建立流程包括中继 发现和/或中继通信的安全建立流程。第一网元确定接收到能力信息,选择安全建立流程的方式;所述安全建立流程的方式包括以下之一:基于控制面CP的安全建立流程的方式;基于用户面UP的安全建立流程的方式。第一网元向第一终端发送指示信息;其中,指示信息用于指示第一终端的第一网元选择的安全建立流程的方式。第一终端接收指示信息。
在一个实施例中,接收能力信息,能力信息用于指示以下至少之一:支持基于控制面CP的安全建立流程的方式;支持基于用户面UP的安全建立流程的方式;所述安全建立流程包括中继发现和/或中继通信的安全建立流程。在服务授权和信息配置过程中,发送指示信息;其中,指示信息用于指示所述第一终端的第一网元选择的安全建立流程的方式;所述安全建立流程的方式包括以下之一:基于控制面CP的安全建立流程的方式;基于用户面UP的安全建立流程的方式。
在一个实施例中,接收能力信息,能力信息用于指示以下至少之一:支持基于控制面CP的安全建立流程的方式;支持基于用户面UP的安全建立流程的方式;所述安全建立流程包括中继发现和/或中继通信的安全建立流程。发送指示信息;其中,指示信息用于指示所述第一终端的第一网元选择的安全建立流程的方式;所述安全建立流程的方式包括以下之一:基于控制面CP的安全建立流程的方式;基于用户面UP的安全建立流程的方式。第一终端确定接收到指示信息,触发安全建立流程。
在一个实施例中,接收能力信息,能力信息用于指示以下至少之一:支持基于控制面CP的安全建立流程的方式;支持基于用户面UP的安全建立流程的方式;所述安全建立流程包括中继发现和/或中继通信的安全建立流程。确定接收到所述能力信息,选择安全建立流程的方式;所述安全建立流程的方式包括以下之一:基于控制面CP的安全建立流程的方式;基于用户面UP的安全建立流程的方式。发送指示信息;其中,指示信息用于指示所述第一终端的第一网元选择的安全建立流程的方式。第一终端确定接收到指示信息,触发安全建立流程。第一终端根据所述第一终端的第一网元选择的安全建立流程的方式与第二终端的第一网元选择的安全建立流程的方式的比较结果,确定是否执行所述安全建立流程。示例性地,第一终端确定所述第一终端的第一网元选择的安全建立流程的方式与所述第二终端的第一网元选择的安全建立流程的方式相同,确定执行所述第一终端和所述第二终端之间的所述安全建立流程;或者,确定所述第一终端的第一网元选择的安全建立流程的方式与所述第二终端的第一网元选择的安全建立流程的方式不同,确定不执行所述第一终端和所述第二终端之间的所述安全建立流程。
在一个实施例中,接收能力信息,所述能力信息用于指示以下至少之一:支持基于控制面CP的安全建立流程的方式;支持基于用户面UP的安全建立流程的方式;所述安全建立流程包括中继发现和/或中继通信的安全建立流程。发送指示信息;其中,所述指示信息用于指示所述第一终端的第一网元选择的安全建立流程的方式;所述安全建立流程的方式包括以下之一:基于控制面CP的安全建立流程的方式;基于用户面UP的安全建立流程的方式。第一终端确定接收到指示信息,触发第一终端和第二终端之间的安全建立流程;其中,第一终端选择的安全建立流程与第二终端的第一网元选择的安全建立流程相同。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图11所示,本实施例中提供一种中继通信方法,其中,该方法由第一网元执行,该方法包括:
步骤111、在所述第一终端执行网络注册过程中,接收所述能力信息,所述能力信息用于指示以下至少之一:支持基于控制面CP的安全建立流程的方式;支持基于用户面UP的安全建立流程的方式;所述安全建立流程包括中继发现和/或中继通信的安全建立流程。
在一个实施例中,在第一终端执行网络注册过程中,第一终端的PCF通过基站接收第一终端发送的能力信息,所述能力信息用于指示以下至少之一:支持基于控制面CP的安全建立流程的方式;支持基于用户面UP的安全建立流程的方式;所述安全建立流程包括中继发现和/或中继通信的安全建立流程。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图12所示,本实施例中提供一种中继通信方法,其中,该方法由第一网元执行,该方法包括:
步骤121、确定接收到所述能力信息,选择安全建立流程的方式;所述安全建立流程的方式包括以下之一:
基于控制面CP的安全建立流程的方式;
基于用户面UP的安全建立流程的方式。
在一个实施例中,接收能力信息,所述能力信息用于指示以下至少之一:支持基于控制面CP的安全建立流程的方式;支持基于用户面UP的安全建立流程的方式;所述安全建立流程包括中继发现和/或中继通信的安全建立流程。确定接收到所述能力信息,选择安全建立流程的方式;所述安全建立流程的方式包括以下之一:基于控制面CP的安全建立流程的方式;基于用户面UP的安全建立流程的方式。发送指示信息;其中,指示信息用于指示第一终端的第一网元选择的安全建立流程。第一终端确定接收到指示信息,触发安全建立流程。第一终端根据所述第一终端的第一网元选择的安全建立流程的方式与第二终端的第一网元选择的安全建立流程的方式的比较结果,确定是否执行所述安全建立流程。示例性地,第一终端确定所述第一终端的第一网元选择的安全建立流过程的方式与所述第二终端的第一网元选择的安全建立流过程的方式相同,确定执行所述第一终端和所述第二终端之间的所述安全建立流过程;或者,确定所述第一终端的第一网元选择的安全建立流过程的方式与所述第二终端的第一网元选择的安全建立流过程的方式不同,确定不执行所述第一终端和所述第二终端之间的所述安全建立流过程。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图13所示,本实施例中提供一种中继通信方法,其中,该方法由第一网元执行,该方法包括:
步骤131、发送指示信息;
其中,其中,所述指示信息用于指示所述第一终端的第一网元选择的安全建立流程的方式。
在一个实施例中,接收能力信息,所述能力信息用于指示以下至少之一:支持基于控制面CP的安全建立流程的方式;支持基于用户面UP的安全建立流程的方式;所述安全建立流程包括中继发现和/ 或中继通信的安全建立流程。在服务授权和信息配置过程中,发送指示信息;其中,所述指示信息用于指示所述第一终端的第一网元选择的安全建立流程的方式;所述安全建立流程的方式包括以下之一:基于控制面CP的安全建立流程的方式;基于用户面UP的安全建立流程的方式。第一终端确定接收到指示信息,触发所述第一终端和第二终端之间的安全建立流程;其中,所述第一终端选择的安全建立流程的方式与第二终端的第一网元选择的安全建立流程的方式相同。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图14所示,本实施例中提供一种中继通信方法,其中,该方法由第一网元执行,该方法包括:
步骤141、在服务授权和信息配置过程中,发送所述指示信息。
步骤141部分的描述请具体参见步骤13部分的说明,在此不再赘述。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
为了更好地理解本公开实施例,以下通过一个示例性实施例对本公开技术方案做进一步说明:
示例2:
如图15所示,本实施例中提供一种中继通信方法,该方法包括:
步骤151、中继终端发起注册程序。在注册程序中,发送能力信息,能力信息用于指示以下至少之一:
中继终端支持基于控制面CP的安全建立流程的方式;
中继终端支持基于用户面UP的安全建立流程的方式,所述安全建立流程包括中继发现和/或中继通信的安全建立流程。
步骤152、中继终端的PCF确定接收到能力信息,选择中继终端的安全建立流程的方式,其中,安全建立流程的方式包括以下之一:
基于控制面CP的安全建立流程的方式;
基于用户面UP的安全建立流程的方式。
步骤153、远程终端发起注册程序。在注册程序中,发送能力信息,能力信息用于指示以下至少之一:
远程终端支持基于控制面CP的安全建立流程的方式;
远程终端支持基于用户面UP的安全建立流程的方式;所述安全建立流程包括中继发现和/或中继通信的安全建立流程。
步骤154、远程终端的PCF确定接收到能力信息,选择远程终端的安全建立流程的方式,其中,安全建立流程的方式包括以下之一:
基于控制面CP的安全建立流程的方式;
基于用户面UP的安全建立流程的方式。
步骤155、中继终端的PCF发起中继终端的授权和信息配置过程。在授权和信息配置过程中,PCF发送指示信息,其中,指示信息用于指示中继终端的PCF选择的安全建立流程的方式;所述安全建立流程的方式包括以下之一:
基于控制面CP的安全建立流程的方式;
基于用户面UP的安全建立流程的方式。
步骤156、远程终端的PCF发起远程终端的授权和信息配置过程。在授权和信息配置过程中,PCF发送指示信息,其中,指示信息用于指示远程终端的PCF选择的安全建立流程的方式;所述安全建立流程的方式包括以下之一:
基于控制面CP的安全建立流程的方式;
基于用户面UP的安全建立流程的方式。
步骤157、中继终端基于指示信息指示的安全建立流程的方式执行中继发现和/或中继通信。
步骤158、远程终端基于指示信息指示的安全建立流程的方式执行中继发现和/或中继通信。
步骤159、如果中继终端和远程终端选择的安全建立流程一致,远程终端和中继终端可以发现彼此并相互通信如果中继终端和远程终端选择的安全建立流程不同,远程终端和中继终端就无法发现彼此并相互通信。
如图16所示,本实施例中提供一种中继通信装置,其中,所述装置包括:
发送模块161,用于发送能力信息,所述能力信息用于指示以下至少之一:
支持基于控制面CP的安全建立流程的方式;
支持基于用户面UP的安全建立流程的方式,所述安全建立流程包括中继发现和/或中继通信的安全建立流程。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
如图17所示,本实施例中提供一种中继通信装置,其中,所述装置包括:
接收模块171,用于接收能力信息,所述能力信息用于指示以下至少之一:
支持基于控制面CP的安全建立流程的方式;
支持基于用户面UP的安全建立流程的方式,所述安全建立流程包括中继发现和/或中继通信的安全建立流程。
需要说明的是,本领域内技术人员可以理解,本公开实施例提供的方法,可以被单独执行,也可以与本公开实施例中一些方法或相关技术中的一些方法一起被执行。
本公开实施例提供一种通信设备,通信设备,包括:
处理器;
用于存储处理器可执行指令的存储器;
其中,处理器被配置为:用于运行可执行指令时,实现应用于本公开任意实施例的方法。
其中,处理器可包括各种类型的存储介质,该存储介质为非临时性计算机存储介质,在通信设备掉电之后能够继续记忆存储其上的信息。
处理器可以通过总线等与存储器连接,用于读取存储器上存储的可执行程序。
本公开实施例还提供一种计算机存储介质,其中,计算机存储介质存储有计算机可执行程序,可执行程序被处理器执行时实现本公开任意实施例的方法。
关于上述实施例中的装置,其中各个模块执行操作的具体方式已经在有关该方法的实施例中进行了详细描述,此处将不做详细阐述说明。
如图18所示,本公开一个实施例提供一种终端的结构。
参照图18所示终端800本实施例提供一种终端800,该终端具体可是移动电话,计算机,数字广播终端,消息收发设备,游戏控制台,平板设备,医疗设备,健身设备,个人数字助理等。
参照图18,终端800可以包括以下一个或多个组件:处理组件802,存储器804,电源组件806,多媒体组件808,音频组件810,输入/输出(I/O)的接口812,传感器组件814,以及通信组件816。
处理组件802通常控制终端800的整体操作,诸如与显示,电话呼叫,数据通信,相机操作和记录操作相关联的操作。处理组件802可以包括一个或多个处理器820来执行指令,以完成上述的方法的全部或部分步骤。此外,处理组件802可以包括一个或多个模块,便于处理组件802和其他组件之间的交互。例如,处理组件802可以包括多媒体模块,以方便多媒体组件808和处理组件802之间的交互。
存储器804被配置为存储各种类型的数据以支持在设备800的操作。这些数据的示例包括用于在终端800上操作的任何应用程序或方法的指令,联系人数据,电话簿数据,消息,图片,视频等。存储器804可以由任何类型的易失性或非易失性存储设备或者它们的组合实现,如静态随机存取存储器(SRAM),电可擦除可编程只读存储器(EEPROM),可擦除可编程只读存储器(EPROM),可编程只读存储器(PROM),只读存储器(ROM),磁存储器,快闪存储器,磁盘或光盘。
电源组件806为终端800的各种组件提供电力。电源组件806可以包括电源管理系统,一个或多个电源,及其他与为终端800生成、管理和分配电力相关联的组件。
多媒体组件808包括在终端800和用户之间的提供一个输出接口的屏幕。在一些实施例中,屏幕可以包括液晶显示器(LCD)和触摸面板(TP)。如果屏幕包括触摸面板,屏幕可以被实现为触摸屏,以接收来自用户的输入信号。触摸面板包括一个或多个触摸传感器以感测触摸、滑动和触摸面板上的手势。触摸传感器可以不仅感测触摸或滑动动作的边界,而且还检测与触摸或滑动操作相关的持续时间和压力。在一些实施例中,多媒体组件808包括一个前置摄像头和/或后置摄像头。当设备800处于操作模式,如拍摄模式或视频模式时,前置摄像头和/或后置摄像头可以接收外部的多媒体数据。每个前置摄像头和后置摄像头可以是一个固定的光学透镜系统或具有焦距和光学变焦能力。
音频组件810被配置为输出和/或输入音频信号。例如,音频组件810包括一个麦克风(MIC),当终端800处于操作模式,如呼叫模式、记录模式和语音识别模式时,麦克风被配置为接收外部音频信号。 所接收的音频信号可以被进一步存储在存储器804或经由通信组件816发送。在一些实施例中,音频组件810还包括一个扬声器,用于输出音频信号。
I/O接口812为处理组件802和外围接口模块之间提供接口,上述外围接口模块可以是键盘,点击轮,按钮等。这些按钮可包括但不限于:主页按钮、音量按钮、启动按钮和锁定按钮。
传感器组件814包括一个或多个传感器,用于为终端800提供各个方面的状态评估。例如,传感器组件814可以检测到设备800的打开/关闭状态,组件的相对定位,例如组件为终端800的显示器和小键盘,传感器组件814还可以检测终端800或终端800一个组件的位置改变,用户与终端800接触的存在或不存在,终端800方位或加速/减速和终端800的温度变化。传感器组件814可以包括接近传感器,被配置用来在没有任何的物理接触时检测附近物体的存在。传感器组件814还可以包括光传感器,如CMOS或CCD图像传感器,用于在成像应用中使用。在一些实施例中,该传感器组件814还可以包括加速度传感器,陀螺仪传感器,磁传感器,压力传感器或温度传感器。
通信组件816被配置为便于终端800和其他设备之间有线或无线方式的通信。终端800可以接入基于通信标准的无线网络,如Wi-Fi,2G或3G,或它们的组合。在一个示例性实施例中,通信组件816经由广播信道接收来自外部广播管理系统的广播信号或广播相关信息。在一个示例性实施例中,通信组件816还包括近场通信(NFC)模块,以促进短程通信。例如,在NFC模块可基于射频识别(RFID)技术,红外数据协会(IrDA)技术,超宽带(UWB)技术,蓝牙(BT)技术和其他技术来实现。
在示例性实施例中,终端800可以被一个或多个应用专用集成电路(ASIC)、数字信号处理器(DSP)、数字信号处理设备(DSPD)、可编程逻辑器件(PLD)、现场可编程门阵列(FPGA)、控制器、微控制器、微处理器或其他电子元件实现,用于执行上述方法。
在示例性实施例中,还提供了一种包括指令的非临时性计算机可读存储介质,例如包括指令的存储器804,上述指令可由终端800的处理器820执行以完成上述方法。例如,非临时性计算机可读存储介质可以是ROM、随机存取存储器(RAM)、CD-ROM、磁带、软盘和光数据存储设备等。
如图19所示,本公开一实施例示出一种基站的结构。例如,基站900可以被提供为一网络侧设备。参照图19,基站900包括处理组件922,其进一步包括一个或多个处理器,以及由存储器932所代表的存储器资源,用于存储可由处理组件922的执行的指令,例如应用程序。存储器932中存储的应用程序可以包括一个或一个以上的每一个对应于一组指令的模块。此外,处理组件922被配置为执行指令,以执行上述方法前述应用在所述基站的任意方法。
基站900还可以包括一个电源组件926被配置为执行基站900的电源管理,一个有线或无线网络接口950被配置为将基站900连接到网络,和一个输入输出(I/O)接口958。基站900可以操作基于存储在存储器932的操作系统,例如Windows Server TM,Mac OS XTM,UnixTM,LinuxTM,FreeBSDTM或类似。
本领域技术人员在考虑说明书及实践这里公开的发明后,将容易想到本发明的其它实施方案。本公开旨在涵盖本发明的任何变型、用途或者适应性变化,这些变型、用途或者适应性变化遵循本发明的一般性原理并包括本公开未公开的本技术领域中的公知常识或惯用技术手段。说明书和实施例仅被视为示 例性的,本发明的真正范围和精神由下面的权利要求指出。
应当理解的是,本发明并不局限于上面已经描述并在附图中示出的精确结构,并且可以在不脱离其范围进行各种修改和改变。本发明的范围仅由所附的权利要求来限制。

Claims (18)

  1. 一种中继通信方法,其中,所述方法由第一终端执行,所述方法包括:
    发送能力信息,所述能力信息用于指示以下至少之一:
    支持基于控制面CP的安全建立流程的方式;
    支持基于用户面UP的安全建立流程的方式,所述安全建立流程包括中继发现和/或中继通信的安全建立流程。
  2. 根据权利要求1所述的方法,其中,所述发送能力信息,包括:
    在所述第一终端执行网络注册过程中,发送所述能力信息。
  3. 根据权利要求1所述的方法,其中,所述方法还包括:
    接收指示信息,所述指示信息用于指示所述第一终端的第一网元选择的安全建立流程的方式;
    所述安全建立流程的方式包括以下之一:
    基于控制面CP的安全建立流程的方式;
    基于用户面UP的安全建立流程的方式。
  4. 根据权利要求3所述的方法,其中,所述接收指示信息,包括:
    在服务授权和信息配置过程中,接收所述指示信息。
  5. 根据权利要求1所述的方法,其中,所述方法还包括:
    确定接收到所述指示信息,触发所述安全建立流程。
  6. 根据权利要求5所述的方法,所述方法还包括:
    根据所述第一终端的第一网元选择的安全建立流程的方式与第二终端的第一网元选择的安全建立流程的方式的比较结果,确定是否执行所述安全建立流程;
    其中,所述第一终端与所述第二终端为执行安全建立流程的终端。
  7. 根据权利要求6所述的方法,其中,所述根据所述第一终端的第一网元选择的安全建立流程的方式与第二终端的第一网元选择的安全建立流程的方式的比较结果,确定是否执行所述安全建立流程,包括:
    确定所述第一终端的第一网元选择的安全建立流程的方式与所述第二终端的第一网元选择的安全建立流程的方式相同,确定执行所述第一终端和所述第二终端之间的所述安全建立流程;或者,
    确定所述第一终端的第一网元选择的安全建立流程的方式与所述第二终端的第一网元选择的安全建立流程的方式不同,确定不执行所述第一终端和所述第二终端之间的所述安全建立流程。
  8. 根据权利要求5所述的方法,其中,所述触发所述安全建立流程,包括:
    触发所述第一终端和第二终端之间的安全建立流程,所述第一终端选择的安全建立流程的方式与第二终端的第一网元选择的安全建立流程的方式相同。
  9. 一种中继通信方法,其中,所述方法由第一网元执行,所述方法包括:
    接收能力信息,所述能力信息用于指示以下至少之一:
    支持基于控制面CP的安全建立流程的方式;
    支持基于用户面UP的安全建立流程的方式,所述安全建立流程包括中继发现和/或中继通信的安全建立流程。
  10. 根据权利要求9所述的方法,其中,所述接收能力信息,包括:
    在第一终端执行网络注册过程中,接收所述能力信息。
  11. 根据权利要求9所述的方法,其中,所述方法还包括:
    确定接收到所述能力信息,选择安全建立流程的方式,所述安全建立流程的方式包括以下之一:
    基于控制面CP的安全建立流程的方式;
    基于用户面UP的安全建立流程的方式。
  12. 根据权利要求11所述的方法,其中,所述方法还包括:
    发送指示信息,所述指示信息用于指示所述第一网元选择的安全建立流程的方式。
  13. 根据权利要求12所述的方法,其中,所述发送指示信息,包括:
    在服务授权和信息配置过程中,发送所述指示信息。
  14. 根据权利要求9至13中任一项所述的方法,其中,所述第一网元为策略控制功能PCF。
  15. 一种中继通信装置,其中,所述装置包括:
    发送模块,用于发送能力信息,所述能力信息用于指示以下至少之一:
    支持基于控制面CP的安全建立流程的方式;
    支持基于用户面UP的安全建立流程的方式,所述安全建立流程包括中继发现和/或中继通信的安全建立流程。
  16. 一种中继通信装置,其中,所述装置包括:
    接收模块,用于接收能力信息,所述能力信息用于指示以下至少之一:
    支持基于控制面CP的安全建立流程的方式;
    支持基于用户面UP的安全建立流程的方式,所述安全建立流程包括中继发现和/或中继通信的安全建立流程。
  17. 一种通信设备,其中,包括:
    存储器;
    处理器,与所述存储器连接,被配置为通过执行存储在所述存储器上的计算机可执行指令,并能够实现权利要求1至8或者9至14任一项所述的方法。
  18. 一种计算机存储介质,所述计算机存储介质存储有计算机可执行指令,所述计算机可执行指令被处理器执行后能够实现权利要求1至8或者9至14任一项所述的方法。
PCT/CN2022/093147 2022-05-16 2022-05-16 中继通信方法、装置、通信设备及存储介质 WO2023220893A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2022/093147 WO2023220893A1 (zh) 2022-05-16 2022-05-16 中继通信方法、装置、通信设备及存储介质
CN202280001775.3A CN115552941A (zh) 2022-05-16 2022-05-16 中继通信方法、装置、通信设备及存储介质

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2022/093147 WO2023220893A1 (zh) 2022-05-16 2022-05-16 中继通信方法、装置、通信设备及存储介质

Publications (1)

Publication Number Publication Date
WO2023220893A1 true WO2023220893A1 (zh) 2023-11-23

Family

ID=84722326

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/093147 WO2023220893A1 (zh) 2022-05-16 2022-05-16 中继通信方法、装置、通信设备及存储介质

Country Status (2)

Country Link
CN (1) CN115552941A (zh)
WO (1) WO2023220893A1 (zh)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107040999A (zh) * 2016-02-04 2017-08-11 中兴通讯股份有限公司 信息上报的方法及装置
CN107889080A (zh) * 2016-09-29 2018-04-06 中兴通讯股份有限公司 一种支持远端用户设备移动性的方法及装置
CN114071466A (zh) * 2018-08-10 2022-02-18 华为技术有限公司 用户面完整性保护方法、装置及设备
CN114079915A (zh) * 2020-08-06 2022-02-22 华为技术有限公司 确定用户面安全算法的方法、系统及装置
CN114173333A (zh) * 2020-08-19 2022-03-11 维沃移动通信有限公司 接入网络、网络选择的方法、装置及通信设备

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107040999A (zh) * 2016-02-04 2017-08-11 中兴通讯股份有限公司 信息上报的方法及装置
CN107889080A (zh) * 2016-09-29 2018-04-06 中兴通讯股份有限公司 一种支持远端用户设备移动性的方法及装置
CN114071466A (zh) * 2018-08-10 2022-02-18 华为技术有限公司 用户面完整性保护方法、装置及设备
CN114079915A (zh) * 2020-08-06 2022-02-22 华为技术有限公司 确定用户面安全算法的方法、系统及装置
CN114173333A (zh) * 2020-08-19 2022-03-11 维沃移动通信有限公司 接入网络、网络选择的方法、装置及通信设备

Also Published As

Publication number Publication date
CN115552941A (zh) 2022-12-30

Similar Documents

Publication Publication Date Title
WO2023028782A1 (zh) 上报信息的方法、装置、通信设备及存储介质
WO2023201641A1 (zh) 发送网络能力信息的方法、装置、通信设备及存储介质
WO2022120735A1 (zh) 无线通信的方法、装置、通信设备及存储介质
WO2023130472A1 (zh) 提早识别的方法、装置、通信设备及存储介质
WO2023060490A1 (zh) 能力信息的上报方法、装置、通信设备及存储介质
WO2023065091A1 (zh) 寻呼过滤规则确定方法及装置、通信设备及存储介质
WO2023220893A1 (zh) 中继通信方法、装置、通信设备及存储介质
WO2022110057A1 (zh) 无线传输的方法、装置、通信设备及存储介质
WO2022120540A1 (zh) 连接建立方法和装置
WO2024055329A1 (zh) 邻近服务ProSe的无线通信方法、装置、通信设备及存储介质
WO2024031400A1 (zh) 确定激活或去激活辅小区的方法、装置及存储介质
WO2024031390A1 (zh) 个人物联网信息更新方法、装置、通信设备及存储介质
WO2023065080A1 (zh) 测距能力开放的方法、装置、通信设备及存储介质
WO2024016349A1 (zh) 提供感知服务的方法、装置、通信设备及存储介质
WO2024031391A1 (zh) 测距或侧行链路定位方法、装置、通信设备及存储介质
WO2023245354A1 (zh) 安全保护方法、装置、通信设备及存储介质
WO2024031392A1 (zh) 个人物联网信息更新方法、装置、通信设备及存储介质
WO2023184172A1 (zh) 创建pin的方法、装置、通信设备及存储介质
WO2023070509A1 (zh) 信息处理方法及装置、通信设备及存储介质
WO2023070560A1 (zh) 信息传输方法、装置、通信设备和存储介质
WO2024000124A1 (zh) 寻呼协商方法、装置、通信设备及存储介质
WO2023178703A1 (zh) 个人物联网网络建立方法及装置、网元、ue及存储介质
WO2024044916A1 (zh) 上报bsr的方法、装置、通信设备及存储介质
WO2024031640A1 (zh) 一种信息传输方法、装置、通信设备及存储介质
WO2023178488A1 (zh) 测量方法、装置、通信设备及存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22941939

Country of ref document: EP

Kind code of ref document: A1