WO2024031549A1 - 信息处理方法及装置、通信设备及存储介质 - Google Patents

信息处理方法及装置、通信设备及存储介质 Download PDF

Info

Publication number
WO2024031549A1
WO2024031549A1 PCT/CN2022/111826 CN2022111826W WO2024031549A1 WO 2024031549 A1 WO2024031549 A1 WO 2024031549A1 CN 2022111826 W CN2022111826 W CN 2022111826W WO 2024031549 A1 WO2024031549 A1 WO 2024031549A1
Authority
WO
WIPO (PCT)
Prior art keywords
relay
request message
response message
rsc
message
Prior art date
Application number
PCT/CN2022/111826
Other languages
English (en)
French (fr)
Inventor
商正仪
陆伟
Original Assignee
北京小米移动软件有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京小米移动软件有限公司 filed Critical 北京小米移动软件有限公司
Priority to PCT/CN2022/111826 priority Critical patent/WO2024031549A1/zh
Publication of WO2024031549A1 publication Critical patent/WO2024031549A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • H04W12/084Access security using delegated authorisation, e.g. open authorisation [OAuth] protocol
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/14Direct-mode setup

Definitions

  • the present disclosure relates to the field of wireless communication technology but is not limited to the field of wireless communication technology, and in particular, to an information processing method and device, communication equipment and storage medium.
  • Proximity services allow user equipment (User Equipment, UE) to discover the peer through a UE to UE (UE to UE, U2U) relay (i.e., a relay device). That is, if the source UE cannot directly communicate with the target UE, it may communicate with the target UE through the discovery of U2U relays. This process may trigger a discovery process between UEs. However, the U2U relay actually acts as an untrusted communication node, which may lead to man-in-the-middle-attacks (MIMT).
  • MIMT man-in-the-middle-attacks
  • Embodiments of the present disclosure provide an information processing method and device, communication equipment, and storage media.
  • a first aspect of the embodiments of the present disclosure provides an information processing method, which is executed by a relay UE.
  • the method includes: sending a first request message to a network device, wherein the request message at least includes: a relay service code (Relay Service). Code, RSC); receiving the first response message returned by the network device based on the first request message, wherein the relay UE has the authority to provide the relay service indicated by the RSC, and the first response message It includes: security parameters for relay discovery from UE to UE; after receiving the first response message, monitoring the second request message of the source UE; when the relay UE supports the second request message including the RSC When the indicated relay service is provided, the third request message is broadcast according to the second request message and the relay information.
  • a relay service code Relay Service). Code
  • a second aspect of the embodiment of the present disclosure provides an information processing method, executed by a source UE.
  • the method includes: sending a first request message to a network device, wherein the request message at least includes: RSC; receiving the network device based on The first response message returned by the first request message, wherein the source UE has the authority to obtain the relay service indicated by the RSC, the first response message includes: security parameters for UE-to-UE relay discovery ; After receiving the first response message, broadcast a second request message; wherein the second request message is used to discover the target UE through the relay UE.
  • the third aspect of the embodiment of the present disclosure provides an information processing method, which is executed by a target UE.
  • the method includes: sending a first request message to a network device, wherein the request message at least includes: RSC; receiving the network device The first response message returned by the device based on the first request message, wherein the target UE has the authority to obtain the relay service indicated by the RSC, the first response message includes: UE-to-UE relay discovery Security parameters; after receiving the first response message, monitor the third request message; when the target UE supports the relay service indicated by the RSC carried in the third request message, return the third response message, wherein, The third response message is used for the relay UE to return the second response message to the source UE.
  • a fourth aspect of the embodiments of the present disclosure provides an information processing apparatus.
  • the method includes: a first sending module configured to send a first request message to a network device, wherein the request message at least includes: relay service code RSC ;
  • the first receiving module is configured to receive the first response message returned by the network device based on the first request message, wherein the relay UE has the authority to provide the relay service indicated by the RSC, and the The first response message includes: security parameters for UE-to-UE relay discovery; a first monitoring module configured to monitor the second request message of the source UE after receiving the first response message; the first sending A module configured to broadcast a third request message according to the second request message and relay information when the relay UE supports the relay service indicated by the second request message including the RSC.
  • a fifth aspect of the embodiment of the present disclosure provides an information processing device, the device including: a second sending module configured to send a first request message to a network device, wherein the request message at least includes: relay service code RSC ;
  • the second receiving module is configured to receive the first response message returned by the network device based on the first request message, wherein the source UE has the authority to obtain the relay service indicated by the RSC, and the third A response message includes: security parameters for UE-to-UE relay discovery; the second sending module is also configured to broadcast a second request message after receiving the first response message; wherein the second Request message, used to discover the target UE through the relay UE.
  • a sixth aspect of the embodiment of the present disclosure provides an information processing device, wherein the device includes: a third sending module configured to send a first request message to a network device, wherein the request message at least includes: relay service code RSC; the third receiving module is configured to receive the first response message returned by the network device based on the first request message, wherein the target UE has the authority to obtain the relay service indicated by the RSC, so
  • the first response message includes: security parameters for UE-to-UE relay discovery; a second monitoring module configured to monitor a third request message after receiving the first response message; and the third sending module is It is configured to return a third response message when the target UE supports the relay service indicated by the RSC carried in the third request message, wherein the third response message is used for the relay UE to return the third response message to the source UE.
  • the first response message includes: security parameters for UE-to-UE relay discovery; a second monitoring module configured to monitor a third request message after receiving the first response message; and the third sending module is It is configured to
  • a seventh aspect of the embodiment of the present disclosure provides a communication device, including a processor, a transceiver, a memory, and an executable program stored in the memory and capable of being run by the processor, wherein the processor runs the executable program.
  • the program executes the information processing method provided in any one of the foregoing first to third aspects.
  • a tenth aspect of the embodiment of the present disclosure provides a computer storage medium that stores an executable program; after the executable program is executed by a processor, it can realize the provision of any one of the foregoing first to third aspects. information processing methods.
  • the relay UE needs to discover each other with the source UE and the target UE, it needs to pass the authentication issued by the network device through security parameters, thereby reducing the relay UE's risk of not being used by other UEs and/or Or MITM attacks caused by communication nodes trusted by network devices, thereby improving the security of relay communications.
  • Figure 1 is a schematic structural diagram of a wireless communication system according to an exemplary embodiment
  • Figure 2 is a schematic flowchart of an information processing method according to an exemplary embodiment
  • Figure 3 is a schematic flowchart of an information processing method according to an exemplary embodiment
  • Figure 4 is a schematic flowchart of an information processing method according to an exemplary embodiment
  • Figure 5 is a schematic flowchart of an information processing method according to an exemplary embodiment
  • Figure 6 is a schematic flowchart of an information processing method according to an exemplary embodiment
  • Figure 7 is a schematic flowchart of an information processing method according to an exemplary embodiment
  • Figure 8 is a schematic flowchart of an information processing method according to an exemplary embodiment
  • Figure 9 is a schematic flowchart of an information processing method according to an exemplary embodiment
  • Figure 10 is a schematic structural diagram of an information processing device according to an exemplary embodiment
  • Figure 11 is a schematic structural diagram of an information processing device according to an exemplary embodiment
  • Figure 12 is a schematic structural diagram of an information processing device according to an exemplary embodiment
  • Figure 13 is a schematic structural diagram of a UE according to an exemplary embodiment
  • Figure 14 is a schematic structural diagram of a network device according to an exemplary embodiment.
  • first, second, third, etc. may be used to describe various information in the embodiments of the present disclosure, the information should not be limited to these terms. These terms are only used to distinguish information of the same type from each other.
  • first information may also be called second information, and similarly, the second information may also be called first information.
  • words as used herein may be interpreted as being at or in response to or in response to determining.
  • FIG. 1 shows a schematic structural diagram of a wireless communication system provided by an embodiment of the present disclosure.
  • the wireless communication system is a communication system based on cellular mobile communication technology.
  • the wireless communication system may include: several UEs 11 and several access devices 12.
  • UE 11 may be a device that provides voice and/or data connectivity to users.
  • the UE 11 can communicate with one or more core networks via a Radio Access Network (RAN).
  • RAN Radio Access Network
  • the UE 11 can be an Internet of Things UE, such as a sensor device, a mobile phone (or a cellular phone) and a device with the Internet of Things
  • the computer of the UE may, for example, be a fixed, portable, pocket-sized, handheld, computer-built-in or vehicle-mounted device.
  • station STA
  • subscriber unit subscriber unit
  • subscriber station mobile station
  • mobile station mobile station
  • remote station remote station
  • access point remote UE ( remote terminal)
  • access UE access terminal
  • user terminal user terminal
  • user agent user agent
  • user equipment user device
  • user UE user equipment
  • UE 11 can also be a device for an unmanned aerial vehicle.
  • the UE 11 may also be a vehicle-mounted device, for example, it may be a driving computer with a wireless communication function, or a wireless communication device connected to an external driving computer.
  • the UE 11 can also be a roadside device, for example, it can be a street light, a signal light or other roadside equipment with wireless communication functions.
  • the access device 12 may be a network-side device in the wireless communication system.
  • the wireless communication system can be the 4th generation mobile communication technology (the 4th generation mobile communication, 4G) system, also known as the Long Term Evolution (LTE) system; or the wireless communication system can also be a 5G system, Also called new radio (NR) system or 5G NR system.
  • the wireless communication system may also be a next-generation system of the 5G system.
  • the access network in the 5G system can be called NG-RAN (New Generation-Radio Access Network). Or, MTC system.
  • the access device 12 may be an evolved access device (eNB) used in the 4G system.
  • the access device 12 may also be an access device (gNB) using a centralized distributed architecture in the 5G system.
  • eNB evolved access device
  • gNB access device
  • the access device 12 adopts a centralized distributed architecture it usually includes a centralized unit (central unit, CU) and at least two distributed units (distributed unit, DU).
  • the centralized unit is equipped with a protocol stack including the Packet Data Convergence Protocol (PDCP) layer, the Radio Link Control protocol (Radio Link Control, RLC) layer, and the Media Access Control (Media Access Control, MAC) layer; distributed
  • PDCP Packet Data Convergence Protocol
  • RLC Radio Link Control
  • MAC Media Access Control
  • the unit is provided with a physical (Physical, PHY) layer protocol stack, and the embodiment of the present disclosure does not limit the specific implementation of the access device 12.
  • a wireless connection can be established between the access device 12 and the UE 11 through the wireless air interface.
  • the wireless air interface is a wireless air interface based on the fourth generation mobile communication network technology (4G) standard; or the wireless air interface is a wireless air interface based on the fifth generation mobile communication network technology (5G) standard, such as
  • the wireless air interface is a new air interface; alternatively, the wireless air interface may also be a wireless air interface based on the next generation mobile communication network technology standard of 5G.
  • an embodiment of the present disclosure provides an information processing method, which is executed by a relay UE.
  • the method includes:
  • S1110 Send a first request message to the network device, where the first request message at least includes: relay service code RSC.
  • the RSC can be used to identify the relay service;
  • the first request message can be used by the network device to verify whether the relay UE has the authority to provide the relay service indicated by the RSC, and/or request to provide the relay service indicated by the RSC.
  • Security parameters of relay services
  • S1120 Receive the first response message returned by the network device based on the first request message.
  • the relay UE has the authority to provide relay services indicated by the RSC, and the first response message includes: security parameters for UE-to-UE relay discovery.
  • the first response message may be used for the relay UE to determine whether the relay UE has the authority to provide the relay service indicated by the RSC, and/or to provide the relay UE to provide the relay service.
  • S1130 After receiving the first response message, monitor the second request message of the source UE.
  • the second request message is used to request the relay UE to discover the target UE;
  • S1140 When the relay UE supports the relay service indicated by the second request message including the RSC, according to the first The second request message and the relay information broadcast the third request message.
  • the third request message is used to notify the target UE and the relay UE to establish a relay connection.
  • the relay UE is a U2U relay device and may also be called a U2U relay.
  • the relay UE can establish connections with the source UE and the target UE respectively to serve as a relay to implement UE-to-UE relay communication between the source UE and the target UE.
  • the relay UE may be a UE that performs relay communication based on the PC5 interface or the SR5 interface.
  • the relay UE here is: a relay device for UE-to-UE (U2U) communication between the source UE and the target UE.
  • U2U UE-to-UE
  • the network device may be any network device that can configure security parameters for the relay UE.
  • the network device may be a core network device.
  • the core network equipment includes but is not limited to at least one of the following: Direct Discovery Name Management Function (DDNMF) and/or ProSe Key Management Function (PKMF), etc. That is, core network equipment such as DDNMF and/or PKMF will provide security parameters for U2U relay communication, thereby reducing the security risks of U2U relay communication and improving the security of U2U relay communication.
  • DDNMF Direct Discovery Name Management Function
  • PKMF ProSe Key Management Function
  • the first request message includes the identity of the relay UE.
  • the network device Upon receiving the first request message, the network device queries the subscription data, the control policy of the relay UE, and/or the service configuration of the ProSe application server, etc. Determine whether the relay UE has the authority for the relay service indicated by the RSC contained in the first request message.
  • the RSCs of different trunk services are different.
  • Security parameters are related to RSC. Therefore, for UEs that support relay services indicated by the same RSC, the security parameters returned by the network device can be the same.
  • the first response message may include: a rejection message.
  • the network device determines that the relay UE does not have the authority to provide the relay service indicated by the RSC included in the first request message, then the The first response message may be a rejection message.
  • the first response message may include: an acceptance message.
  • the network device determines that the relay UE has the authority to provide the relay service indicated by the RSC included in the first request message, then the The first response message may be an acceptance message, and the acceptance message may include the security parameter.
  • the security parameters may include: authorization and/or key parameters used for U2U relay communication, etc. In short, these parameters may be used for authority and/or security verification of subsequent U2U relay communication.
  • the security parameter After the security parameter is returned to the relay UE, it can be used by the relay UE to complete relay discovery between the source UE and the target UE based on mode A and/or mode B.
  • the first request message includes but is not limited to: but is not limited to a relay discovery key request message (Relay Discovery key Request message).
  • the first response message at this time may include: Relay Discovery key response message (Relay Discovery key response message).
  • Both the second request message and the third request message may include but are not limited to solicitation messages.
  • the S1140 may include at least one of the following:
  • a third request message is generated and broadcast.
  • the third request message may include both the second request message and the relay information, or the third request message may be generated based on the second request message and the relay information;
  • a third request message is generated and broadcast.
  • the third request message may include both the second request message and the relay information, or the third request message may be generated based on the second request message and the relay information.
  • the relay information may be any information of the relay UE, which may specifically include but is not limited to: an identifier (Identifier, ID) of the relay UE.
  • ID identifier
  • the relay information may include: the identity of the relay UE and a ProSe direct discovery forwarding indication (ProSe direct discovery forwarding indication), etc.
  • the message content of the second request message may include:
  • the ID of the target UE The ID of the target UE
  • Both the ID of the target UE and the ID of the source UE may include but are not limited to: Restricted Proximity Service Application User Identity (Restricted Prose Application User, RPAUID).
  • the discovery type indicated by the discovery type information may include: U2U discovery or U2N discovery.
  • the discovery type information carried in the announcement message indicates U2U discovery.
  • the mode B requires a broadcast request message and a response message corresponding to the request message to realize mutual discovery between UEs.
  • the relay UE needs to discover each other with the source UE and the target UE, authentication issued by the network device through security parameters is required, thereby reducing the risk of the relay UE not being used by other UEs and/or Or MITM attacks caused by communication nodes trusted by network devices, thereby improving the security of relay communications.
  • an embodiment of the present disclosure provides an information processing method, which is executed by a relay UE.
  • the method includes:
  • S1210 Send a first request message to the network device, where the request message at least includes: RSC;
  • S1220 Receive the first response message returned by the network device based on the first request message, wherein the relay UE has the authority to provide the relay service indicated by the RSC, and the first response message includes: UE Security parameters discovered by the relay to the UE;
  • S1250 Receive the third response message returned based on the third request message.
  • the third response message is used to notify the relay UE that the relay connection between the target UE and the relay UE can be established;
  • S1260 When receiving the third response message, return a second response to the source UE. information.
  • the second response message is used to notify the source UE that the relay UE can establish a relay connection between the source UE and the target UE.
  • the relay UE After the relay UE broadcasts the third request message, it may receive a third response message replied by the target UE, or it may not receive the third response message. Therefore, in the embodiment of the present disclosure, if the relay UE receives the third response message, it will return the second response message to the source UE.
  • the source UE can start the process of establishing a relay connection with the relay UE. Further, if the relay UE receives a relay connection establishment request from the source UE, the relay UE may initiate establishment of the relay connection with the target UE.
  • the direct connection between the source UE and the target UE can be further established through the relay UE.
  • the third response message may also be a response message (response message) of the request message (solicitation message).
  • the method also includes:
  • Obtaining a security policy wherein the security policy is pre-configured on the relay UE, the security policy is determined according to a protocol, and the security policy is received from a network device in advance;
  • the received security parameters are used to securely process the third request message, and the third request message after security processing is broadcast.
  • the security policy may be used by the relay UE to determine whether the security parameters need to be used for security protection when establishing relay connections with the source UE and the target UE respectively.
  • the security processing includes at least one of the following:
  • the security parameters are used to perform confidentiality protection and integrity protection on the third request message, and a third request message with confidentiality and integrity protection is obtained.
  • broadcasting a third request message according to the second request message and the relay information includes: :
  • a third request message is broadcast according to the second request message and the relay information.
  • the security verification of the second request message using the security parameters may include:
  • the second request message further includes at least one of the following:
  • the device information of the source UE is the device information of the source UE.
  • the discovery type indicated by the discovery type information may include: U2U discovery or user equipment to network (UE to Network, U2N) discovery.
  • the discovery type information may indicate U2U discovery.
  • the device information of the source UE includes but is not limited to the ID and/or device type of the source UE.
  • the device information of the target UE includes but is not limited to the ID and/or device type of the target UE.
  • the relay information includes at least one of the following:
  • the device information of the relay UE is the same as the device information of the relay UE.
  • the device information of the relay UE includes but is not limited to the ID of the relay UE.
  • the device information of the relay UE may also include device type information.
  • the relay indication may indicate that the currently broadcast request message is forwarded by the relay UE.
  • the receiving target UE needs to further extract the device information of the relay UE from the response message.
  • an embodiment of the present disclosure provides an information processing method, which is executed by a source UE.
  • the method includes:
  • S2110 Send a first request message to the network device, where the request message at least includes: RSC.
  • the RSC can be used to identify the relay service; the first request message can be used by the network device to verify whether the source UE has the authority to obtain the relay service indicated by the RSC, and/or request to provide the relay service indicated by the RSC.
  • Security parameters of the following business are included in the request message.
  • S2120 Receive the first response message returned by the network device based on the first request message, wherein the source UE has the authority to obtain the relay service indicated by the RSC, and the first response message includes: UE to Security parameters for relay discovery by UE.
  • the first response message may be used for the source UE to determine whether the relay UE has the authority to provide the relay service indicated by the RSC, and/or to provide the source UE with the information required by the RSC. Indicates the security parameters of the trunk service.
  • the source UE may be an initiating UE of a direct link-based service.
  • the first request message includes the identity of the source UE.
  • the network device determines by querying the subscription data, the control policy of the source UE and/or the service configuration of the ProSe application server, etc. Whether the source UE has the authority to obtain the RSC indication relay service contained in the first request message.
  • the RSCs of different trunk services are different.
  • Security parameters are related to RSC. Therefore, for UEs that support relay services indicated by the same RSC, the security parameters returned by the network device can be the same.
  • the first response message may include: a rejection message.
  • the third A response message may be a rejection message.
  • the first response message may include: an acceptance message.
  • the network device determines that the source UE has the authority to obtain the relay service indicated by the RSC included in the first request message, then the The first response message may be an accept message, which may include the security parameters.
  • the security parameters may include: authorization and/or key parameters used for U2U relay communication, etc. In short, these parameters may be used for authority and/or security verification of subsequent U2U relay communication.
  • the security parameter After the security parameter is returned to the source UE, it can be used by the source UE to complete relay discovery between the relay UE and the target UE based on mode A and/or mode B.
  • the first request message includes but is not limited to: but is not limited to a Discovery key request message (Discovery key Request message).
  • the first response message at this time may include: Relay Discovery key response message (Relay Discovery key response message).
  • an embodiment of the present disclosure provides an information processing method, which is executed by a source UE.
  • the method includes:
  • S2210 Send a first request message to the network device, where the request message at least includes: RSC;
  • S2220 Receive the first response message returned by the network device based on the first request message, wherein the source UE has the authority to obtain the relay service indicated by the RSC, and the first response message includes: UE to Security parameters discovered by the UE’s relay;
  • S2230 After receiving the first response message, broadcast a second request message; wherein the second request message is used to discover the target UE through the relay UE.
  • S2240 Receive a second response message, where the second response message is sent by the relay UE after receiving a third response message, where the third response message is received by the target UE The third request message broadcast based on the second request message and the relay information is then returned to the relay UE.
  • the information processing method is executed by the source UE.
  • the message of the first request message may be but is not limited to a relay discovery key request message (Relay Discovery key Request message).
  • the first response message at this time may include: Relay Discovery key response message (Relay Discovery key response message).
  • the first request message may include: IDs of candidate relay UEs and/or candidate target UEs that have been discovered at historical times. This ID includes but is not limited to RPAUID.
  • the source UE After the source UE receives the security parameter, the source UE has the authority to use the relay service indicated by the RSC carried in the first request message. When it is necessary to obtain the relay service indicated by the RSC, it will broadcast the second request message.
  • the second response message will be received.
  • the second response message may be returned after the relay UE discovers the target UE with which the source UE requests relay communication.
  • the second response message may be an acceptance message.
  • the source UE may not receive the second response message that is the accept message.
  • the method further includes:
  • a relay connection is established with the relay UE, where the relay connection is used for relay communication between the source UE and the target UE.
  • the source UE If the source UE receives the second response message, it enters the step of establishing a relay connection with the relay UE.
  • establishing a relay connection with a relay UE may include:
  • the relay connection is a SL connection.
  • the security policy corresponding to the RSC indicates that mutual discovery between UEs and integrity verification and/or confidentiality verification are not required, then the second request message broadcast by the source UE does not need to be a clear text request message.
  • an embodiment of the present disclosure provides an information processing method, which is executed by the source UE.
  • the method includes:
  • S2310 Send a first request message to the network device, where the request message at least includes: RSC;
  • S2320 Receive the first response message returned by the network device based on the first request message, wherein the source UE has the authority to obtain the relay service indicated by the RSC, and the first response message includes: UE to Security parameters discovered by the UE’s relay;
  • S2330 After receiving the first response message, use the security parameters to perform security processing on the second request message;
  • S2340 Broadcast the second request message after security processing using the security parameter.
  • security parameters to securely process the second request message may include but is not limited to at least one of the following:
  • the security parameter is used to perform integrity protection and/or confidentiality protection on the second request message, thereby obtaining a second request message that is integrity protected and confidentiality protected.
  • an embodiment of the present disclosure provides an information processing method, which is executed by a target UE.
  • the method includes:
  • S3110 Send a first request message to the network device, where the request message at least includes: RSC; the RSC can be used to identify the relay service; the first request message can be used by the network device to verify whether the target UE has the ability to obtain The authority of the relay service indicated by the RSC, and/or the request to provide the security parameters of the relay service indicated by the RSC.
  • S3120 Receive the first response message returned by the network device based on the first request message, wherein the target UE has the authority to obtain the relay service indicated by the RSC, and the first response message includes: UE to Security parameters for relay discovery by UE.
  • the first response message may be used for the relay UE to determine whether the target UE has the authority to provide the relay service indicated by the RSC, and/or to provide the target UE with the information required by the RSC. Indicates the security parameters of the trunk service.
  • S3130 After receiving the first response message, listen for a third request message; the third request message is used to notify the target UE and the relay UE to establish a relay connection.
  • the information processing method can be executed by the target UE, and the target UE can also communicate with its corresponding DDNMF or PKMF to obtain the above security parameters.
  • returning a third response message includes:
  • a third response message is returned.
  • the method further includes:
  • a relay connection is established with the relay UE, where the relay connection is used for relay communication between the target UE and the source UE.
  • connection establishment request includes but is not limited to a Direct Communication Request (DCR) message.
  • DCR Direct Communication Request
  • the target UE determines to establish a relay connection with the relay UE, it will return a direct communication response to the relay UE according to the direct communication request, thereby negotiating the key through the direct communication request and the direct communication response, and completing the security Establishment of relay connection.
  • returning a third response message includes:
  • a third response message is returned, where the third response message is used for The subsequent UE returns a second response message to the source UE.
  • the target UE If the target UE supports the relay service indicated by the RSC carried in the third request message but does not select the relay UE to obtain the relay service, the third request message indicating acceptance of the communication request will not be returned, or a rejection message will be returned.
  • the UE When an application client in a UE intends to discover other UEs, for example, a UE that discovers the friend account of the application, the UE will obtain the RPAUID list (target RPAUID list) of these users from the ProSe application server or/and can provide relay services
  • the relay user ID list (relay RPAUID list)
  • the UE can monitor the target UE or relay UE in the list.
  • the target RPAUID list or/and the relay RPAUID list are passed to the UE in an application layer container.
  • the RSC When using UE relay, the RSC needs to be obtained before performing U2U relay discovery. RSC can also be pre-configured on the UE, or it can be issued by the network device to the relay UE during the UE's service authorization process.
  • an embodiment of the present disclosure provides an information processing method, which is executed by a network device.
  • the method includes:
  • S4110 Receive the first request message from the UE, where the first request message at least includes: RSC;
  • S4220 Send a first response message to the UE according to the RSC, where the UE has the relay service authority indicated by the RSC, and the first response message includes security parameters for UE-to-UE relay discovery.
  • the network device can be any network device that can configure security parameters for the UE.
  • the network device may be a core network device.
  • the core network equipment includes but is not limited to at least one of the following: Direct Discovery Name Management Function (DDNMF) and/or 5G ProSe Key Management Function (PKMF), etc. That is, core network equipment such as DDNMF and/or PKMF will provide security parameters for U2U relay discovery, thereby reducing the security risks of U2U relay communications and improving the security of U2U relay communications.
  • DDNMF Direct Discovery Name Management Function
  • PKMF 5G ProSe Key Management Function
  • the UE may be a source UE, a target UE or a relay UE that communicates based on the PC5 interface or the SR5 interface.
  • the relay UE here is: a UE-to-UE relay device between the source UE and the target UE.
  • the first request message can be various messages that can be sent by the UE to the network device.
  • the first request message includes but is not limited to a relay discovery key first request message (Relay Discovery key Request message).
  • the first response message at this time may include: Relay Discovery key first response message (Relay Discovery key response message).
  • the RSCs of different trunk services are different.
  • Security parameters are related to RSC. Therefore, for UEs that support relay services indicated by the same RSC, the security parameters returned by the network device can be the same.
  • the security parameters may include any parameters such as authorization and/or key parameters used for U2U relay discovery.
  • the security parameter After the security parameter is returned to the UE, it can be used by the UE to complete relay discovery between the source UE and the target UE and the relay UE respectively based on mode A and/or mode B.
  • the first request message further includes: the ID of the UE;
  • the method also includes:
  • the sending a first response message to the UE according to the RSC includes:
  • a first response message is sent to the UE according to the RSC.
  • the ID of the UE may include but is not limited to the Restricted Proximity Service Application User Identity (RPAUID) of the UE.
  • RPAUID Restricted Proximity Service Application User Identity
  • determining whether the UE has the authority for relay communication from UE to UE according to the ID of the UE may include: if the UE is a relay UE, determining according to the ID of the relay UE Determine whether the relay UE can provide relay services.
  • the relay UE's PKMF and/or DDNMF sends authorization requests to other network devices such as application servers, and receives authorization responses from other network elements.
  • Other network devices here may include but are not limited to: Prose application server, Policy Control Function (PCF) or Unified Data Management (UDM).
  • PCF Policy Control Function
  • UDM Unified Data Management
  • determining whether the UE has the authority to relay communications from UE to UE according to the ID of the UE may include:
  • the UE is a source UE or a target UE, it is determined according to the ID of the source UE or the target UE whether the source UE or the target UE can use the relay service carrying the RSC indication in the first request message.
  • the PKMF and/or DDNMF of the source UE or target UE sends authorization requests to other network devices such as application servers, and receives authorization responses from other network elements.
  • Other network devices here may include but are not limited to: Prose application server, Policy Control Function (PCF) or Unified Data Management (UDM).
  • PCF Policy Control Function
  • UDM Unified Data Management
  • the embodiment of the present disclosure provides an information processing method that may include:
  • the first stage is a first stage
  • the U2U relay sends a relay discovery key request message containing RPAUID and relay service code (RSC) to 5G DDNMF or PKMF to obtain relevant security materials.
  • RSC relay service code
  • the relay discovery key request message also contains a list of encryption algorithms supported by the UE.
  • 5G PKMF will be used in the U2U relay discovery security process based on the user plane.
  • 5G DDNMF will be used in the U2U relay discovery security process based on the control plane.
  • 2.5G DDNMF/PKMF can check authorization from ProSe Application Server/PCF/UDM.
  • the DDNMF in the Home Public Land Mobile Network (HPLMN) of the U2U relay and the Visited Public Land Mobile Network (Visited Public Land Mobile Network, V The DDNMF in PLMN will exchange the authorization of U2U relay.
  • the 5G DDNMF/PKMF of U2U relay returns the security parameters corresponding to RSC, as well as CURRENT_TIME and MAX_OFFSET, etc.
  • CURRENT_TIME is the current timestamp
  • MAX_OFFSET is the time offset. The timestamp and MAX_OFFSET can ensure that the UE resists the attacker's replay attack.
  • the security parameters of the RSC may be: Code-SecParams.
  • the security parameters are generated based on RSC and are necessary security materials in the U2U relay discovery process.
  • the 5G DDNMF/PKMF of the U2U relay should include the selected PC5 security algorithm in the relay discovery key response message.
  • 5G DDNMF/PKMF determines the selected PC5 security algorithm based on the RSC and the received PC5UE security capabilities in step 1.
  • the U2U relay stores the RSC together with the selected PC5 security algorithm.
  • the selected PC5 security algorithm may include the selected PC5 encryption algorithm and/or the selected PC5 integrity algorithm.
  • the PC5 encryption algorithm is used for confidentiality protection.
  • the selected PC5 integrity algorithm used for PC5 integrity protection.
  • U2U relay that supports multiple RSCs can use multiple U2U relay discovery messages to obtain corresponding security parameters.
  • Each U2U relay discovery message only carries one RSC.
  • Code security parameters are associated with RSC.
  • U2U relays should use corresponding code-secParams to protect/verify all discovery messages under a specific U2U relay service.
  • the code security parameters (Code-secParams) here are the aforementioned security parameters of the U2U relay.
  • the source UE/target UE sends a relay key discovery request message to 5G DDNMF/PKMF, which contains its own RPAUID, RSC, PC5UE security capabilities of the source UE/target UE and the RPAUID of the optional relay UE.
  • the PC5UE security capabilities of the source UE/target UE may represent the PC5 security algorithm supported by the source UE and/or the target UE.
  • a source UE/target UE that supports multiple RSCs can use multiple relay discovery key messages to obtain security parameters, and each relay discovery key message carries one RSC. That is, for obtaining security parameters of services indicated by different RSCs, different relay discovery key messages and other request messages will be used.
  • the 5G DDNMF/PKMF of the source/target UE sends an authorization request to the ProSe Application Server/PCF/UDM. If the source UE/target UE is allowed to use this specific U2U relay service, the ProSe Application Server/PCF/UDM will return an authorization response.
  • the 5G DDNMF/PKMF of the source UE/target UE contacts the specified one by sending a monitoring request containing the PC5UE security capabilities received in step 4.
  • PLMN's 5G DDNMF/PKMF is the 5G DDNMF of U2U relay.
  • the 5G DDNMF/PKMF of the source/target UE selects a PLMN and sends a discovery message (Discovery Request) to obtain the code security parameters (Code-SecParams) ). Code security parameters are consistent with the security parameters described previously.
  • the 5G DDNMF/PKMF of the U2U relay exchanges authorization messages with the ProSe application server (Application Server)/PCF/UDM.
  • the ProSe application server checks whether the source UE/target UE and the UE-to-UE relay are authorized to perform U2U discovery under the specified U2U relay service, or checks whether the U2U relay is authorized to provide U2U relay services for the source UE/target UE.
  • the UE-to-UE relay's 5G DDNMF/PKMF responds to the source UE/target UE's 5G DDNMF/PKMF and returns a discovery Response message, including corresponding code security parameters and selected PC5 security algorithm (based on the information/key stored in step 3).
  • Code security parameters provide the information required by the source UE/target UE to protect and de-protect the U2U relay discovery message.
  • RSC and code reception security parameters are saved in the 5G DDNMF/PKMF of the source/target UE.
  • the source UE/target UE stores code security parameters (Code-SecParams), selected PC5 security algorithm and RSC.
  • the third phase is the third phase
  • the source UE broadcasts the solicitation (Solicitation) message and uses the corresponding code security parameters for protection.
  • the request message may contain discovery type (i.e., U2U relay), RSC, source UE information (i.e., RPAUID of the source UE), and target UE information (i.e., RPAUID of the target UE).
  • the relay UE Based on the timing of the Universal Time Coordinated (UTC)-based timer associated with the discovery slot, if within the time range corresponding to CURRENT-TIME and MAX_OFFSET, the relay UE listens to the request message of the specified RSC . When receiving a request message, the U2U relay processes it using the code security parameters corresponding to the RSC. If the integrity check/confidentiality check of the request message passes, the U2U relay adds the relay information to the request message and broadcasts a new request message, which is protected by the corresponding code security parameters.
  • UTC Universal Time Coordinated
  • the new request information may include discovery information type, relay information (ie, RPAUID of UE-to-UE Relay), RSC, relay indication (instruction to be forwarded by U2U relay), original discoverer information (ie, RPAUID of source UE) and target discoverer information (ie, the RPAUID of the target UE).
  • relay information ie, RPAUID of UE-to-UE Relay
  • RSC relay indication (instruction to be forwarded by U2U relay)
  • original discoverer information ie, RPAUID of source UE
  • target discoverer information ie, the RPAUID of the target UE.
  • the target UE listens to the request message of the specified RSC. If the integrity check/confidentiality check passes or the RPAUID of the U2U relay is in the optional relay RPAUID and the integrity check/confidentiality check passes, the target UE responds to the request message with a response message.
  • the U2U relay Upon receiving the response message, the U2U relay checks its integrity and confidentiality according to the security policy. If the check passes, the U2U relay forwarding contains the discovery message type, relay information (i.e., the RPAUID of the relay), RSC, relay indication (indicating that it is forwarded by the U2U relay), target discoverer information (i.e., the RPAUID of the target UE), and The response message of the original discoverer information (that is, the RPAUID of the source UE).
  • relay information i.e., the RPAUID of the relay
  • RSC relay indication
  • target discoverer information i.e., the RPAUID of the target UE
  • the response message of the original discoverer information that is, the RPAUID of the source UE.
  • the source UE Upon receiving the U2U relay's response message, the source UE checks its integrity and confidentiality and determines whether this U2U relay can be used. If the source UE wishes to communicate with the target UE through the relay, the source UE may initiate the U2U relay link establishment procedure.
  • an embodiment of the present disclosure provides an information processing device, and the method includes:
  • the first sending module 110 is configured to send a first request message to the network device, where the request message at least includes: relay service code RSC;
  • the first receiving module 120 is configured to receive the first response message returned by the network device based on the first request message, wherein the relay UE has the authority to provide the relay service indicated by the RSC, and the The first response message includes: security parameters for UE-to-UE relay discovery;
  • the first monitoring module 130 is configured to monitor the second request message of the source UE after receiving the first response message;
  • the first sending module is configured to broadcast a third request message according to the second request message and relay information when the relay UE supports the relay service indicated by the second request message containing the RSC. .
  • the information processing device may include the aforementioned relay UE.
  • the first sending module 110, the first receiving module 120 and the first listening module 130 may all be program modules; after the program modules are executed by the processor, the above operations can be implemented.
  • the first sending module 110, the first receiving module 120 and the first listening module 130 may all be software-hardware combination modules; the software-hardware combination modules include but are not limited to programmable arrays;
  • the programmable array includes, but is not limited to: field programmable array and/or complex programmable array.
  • the first sending module 110, the first receiving module 120 and the first listening module 130 may all be pure hardware modules; the pure hardware modules include but are not limited to: application specific integrated circuits.
  • the first receiving module is configured to receive a third response message returned based on the third request message
  • the first sending module is further configured to return a second response message to the source UE when receiving the third response message.
  • broadcasting a third request message according to the second request message and the relay information includes: :
  • a third request message is broadcast according to the second request message and the relay information.
  • the second request message further includes at least one of the following:
  • the device information of the source UE is the device information of the source UE.
  • the relay information includes at least one of the following:
  • the device information of the relay UE is the same as the device information of the relay UE.
  • an embodiment of the present disclosure provides an information processing device, which includes:
  • the second sending module 210 is configured to send a first request message to the network device, where the request message at least includes: relay service code RSC;
  • the second receiving module 220 is configured to receive the first response message returned by the network device based on the first request message, wherein the source UE has the authority to obtain the relay service indicated by the RSC, and the third A response message includes: security parameters for UE-to-UE relay discovery;
  • the second sending module 210 is further configured to broadcast a second request message after receiving the first response message; wherein the second request message is used to discover the target UE through the relay UE.
  • the information processing device may include the aforementioned source UE.
  • the second sending module 210 and the second receiving module 220 may both be program modules; after the program modules are executed by the processor, the above operations can be implemented.
  • the second sending module 210 and the second receiving module 220 may both be software-hardware combination modules; the software-hardware combination modules include but are not limited to programmable arrays; the programmable arrays include but are not limited to Limited to: field programmable arrays and/or complex programmable arrays.
  • the second sending module 210 and the second receiving module 220 may both be pure hardware modules; the pure hardware modules include but are not limited to: application specific integrated circuits.
  • the second receiving module 220 is further configured to receive a second response message, where the second response message is: sent by the relay UE after receiving the third response message, Wherein, the third response message is returned to the relay UE after the target UE receives the third request message broadcast based on the second request message and the relay information.
  • the device further includes:
  • the first connection module is further configured to establish a relay connection with the relay UE after receiving the second response message, wherein the relay connection is used for the intermediate connection between the source UE and the target UE. Following communication.
  • the device further includes:
  • a first processing module configured to use the security parameters to perform security processing on the second request message after receiving the first response message
  • the second sending module 210 is also configured to broadcast the second request message after security processing using the security parameter.
  • an embodiment of the present disclosure provides an information processing device, wherein the device includes:
  • the third sending module 310 is configured to send a first request message to the network device, where the request message at least includes: RSC;
  • the third receiving module 320 is configured to receive the first response message returned by the network device based on the first request message, wherein the target UE has the authority to obtain the relay service indicated by the RSC, and the third A response message includes: security parameters for UE-to-UE relay discovery;
  • the second monitoring module 330 is configured to monitor the third request message after receiving the first response message
  • the third sending module 310 is configured to return a third response message when the target UE supports the relay service indicated by the RSC carried in the third request message, wherein the third response message is used for The relay UE returns a second response message to the source UE.
  • the information processing device may include the aforementioned target UE.
  • the third sending module 310, the third receiving module 320 and the second listening module 330 may all be program modules; after the program modules are executed by the processor, the above operations can be implemented.
  • the third sending module 310, the third receiving module 320 and the second listening module 330 may all be software-hardware combination modules; the software-hardware combination modules include but are not limited to programmable arrays; Programmable arrays include, but are not limited to: field programmable arrays and/or complex programmable arrays.
  • the third sending module 310, the third receiving module 320 and the second listening module 330 may all be pure hardware modules; the pure hardware modules include but are not limited to: application specific integrated circuits.
  • the third sending module 310 is further configured to: when the target UE supports the relay service indicated by the RSC carried in the third request message and the third request message passes based on the security After security verification of the parameters, a third response message is returned.
  • the third receiving module 320 is further configured to receive a connection establishment request from the relay UE after sending the third response message;
  • the device also includes:
  • the second connection module is configured to establish a relay connection with the relay UE based on the connection establishment request, where the relay connection is used for relay communication between the target UE and the source UE.
  • the third sending module 310 is also configured to return when the target UE supports the relay service indicated by the RSC carried in the third request message and selects the relay UE to obtain the relay service.
  • a third response message wherein the third response message is used for the relay UE to return a second response message to the source UE.
  • An embodiment of the present disclosure provides a communication device, including:
  • Memory used to store instructions executable by the processor
  • the processor is configured to execute the information processing method provided by any of the foregoing technical solutions.
  • the processor may include various types of storage media, which are non-transitory computer storage media that can continue to store information stored thereon after the communication device is powered off.
  • the communication device includes: a UE or a network device, and the UE may be the aforementioned source UE, relay UE and/or target UE.
  • the processor may be connected to the memory through a bus or the like, and be used to read the executable program stored on the memory, for example, at least one of the methods shown in FIGS. 2 to 9 .
  • FIG. 13 is a block diagram of a UE 800 according to an exemplary embodiment.
  • UE 800 may be a mobile phone, computer, digital broadcast user equipment, messaging device, game console, tablet device, medical device, fitness device, personal digital assistant, etc.
  • UE 800 may include one or more of the following components: a processing component 802, a memory 804, a power supply component 806, a multimedia component 808, an audio component 810, an input/output (I/O) interface 812, a sensor component 814, and communications component 816.
  • Processing component 802 generally controls the overall operations of UE 800, such as operations associated with display, phone calls, data communications, camera operations, and recording operations.
  • the processing component 802 may include one or more processors 820 to execute instructions to generate all or part of the steps of the methods described above.
  • processing component 802 may include one or more modules that facilitate interaction between processing component 802 and other components.
  • processing component 802 may include a multimedia module to facilitate interaction between multimedia component 808 and processing component 802.
  • Memory 804 is configured to store various types of data to support operations at UE 800. Examples of this data include instructions for any application or method operating on the UE 800, contact data, phonebook data, messages, pictures, videos, etc.
  • Memory 804 may be implemented by any type of volatile or non-volatile storage device, or a combination thereof, such as static random access memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EEPROM), Programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disk.
  • SRAM static random access memory
  • EEPROM electrically erasable programmable read-only memory
  • EEPROM erasable programmable read-only memory
  • EPROM Programmable read-only memory
  • PROM programmable read-only memory
  • ROM read-only memory
  • magnetic memory flash memory, magnetic or optical disk.
  • Power supply component 806 provides power to various components of UE 800.
  • Power component 806 may include a power management system, one or more power supplies, and other components associated with generating, managing, and distributing power to UE 800.
  • Multimedia component 808 includes a screen that provides an output interface between the UE 800 and the user.
  • the screen may include a liquid crystal display (LCD) and a touch panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive input signals from the user.
  • the touch panel includes one or more touch sensors to sense touches, swipes, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide action.
  • multimedia component 808 includes a front-facing camera and/or a rear-facing camera. When the UE 800 is in an operating mode, such as shooting mode or video mode, the front camera and/or rear camera can receive external multimedia data.
  • Each front-facing camera and rear-facing camera can be a fixed optical lens system or have a focal length and optical zoom capabilities.
  • Audio component 810 is configured to output and/or input audio signals.
  • audio component 810 includes a microphone (MIC) configured to receive external audio signals when UE 800 is in operating modes, such as call mode, recording mode, and voice recognition mode. The received audio signal may be further stored in memory 804 or sent via communication component 816 .
  • audio component 810 also includes a speaker for outputting audio signals.
  • the I/O interface 812 provides an interface between the processing component 802 and a peripheral interface module, which may be a keyboard, a click wheel, a button, etc. These buttons may include, but are not limited to: Home button, Volume buttons, Start button, and Lock button.
  • Sensor component 814 includes one or more sensors for providing various aspects of status assessment for UE 800.
  • the sensor component 814 can detect the open/closed state of the device 800, the relative positioning of components, such as the display and keypad of the UE 800, and the sensor component 814 can also detect the position change of the UE 800 or a component of the UE 800. , the presence or absence of user contact with the UE 800, the orientation or acceleration/deceleration of the UE 800 and the temperature change of the UE 800.
  • Sensor assembly 814 may include a proximity sensor configured to detect the presence of nearby objects without any physical contact.
  • Sensor assembly 814 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications.
  • the sensor component 814 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
  • Communication component 816 is configured to facilitate wired or wireless communication between UE 800 and other devices.
  • UE 800 can access wireless networks based on communication standards, such as WiFi, 2G or 3G, or a combination thereof.
  • the communication component 816 receives broadcast signals or broadcast related information from an external broadcast management system via a broadcast channel.
  • the communications component 816 also includes a near field communications (NFC) module to facilitate short-range communications.
  • NFC near field communications
  • the NFC module can be implemented based on radio frequency identification (RFID) technology, infrared data association (IrDA) technology, ultra-wideband (UWB) technology, Bluetooth (BT) technology and other technologies.
  • RFID radio frequency identification
  • IrDA infrared data association
  • UWB ultra-wideband
  • Bluetooth Bluetooth
  • UE 800 may be configured by one or more application specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing devices (DSPDs), programmable logic devices (PLDs), field programmable Gate array (FPGA), controller, microcontroller, microprocessor or other electronic components are implemented for executing the above method.
  • ASICs application specific integrated circuits
  • DSPs digital signal processors
  • DSPDs digital signal processing devices
  • PLDs programmable logic devices
  • FPGA field programmable Gate array
  • controller microcontroller, microprocessor or other electronic components are implemented for executing the above method.
  • a non-transitory computer-readable storage medium including instructions such as a memory 804 including instructions, executable by the processor 820 of the UE 800 to generate the above method is also provided.
  • the non-transitory computer-readable storage medium may be ROM, random access memory (RAM), CD-ROM, magnetic tape, floppy disk, optical data storage device, etc.
  • an embodiment of the present disclosure shows the structure of a network device.
  • the network device 900 may be provided as a network side device.
  • the communication device may be various network elements such as the aforementioned access network element and/or network function.
  • network device 900 includes a processing component 922, which further includes one or more processors, and memory resources represented by memory 932 for storing instructions, such as application programs, executable by processing component 922.
  • the application program stored in memory 932 may include one or more modules, each corresponding to a set of instructions.
  • the processing component 922 is configured to execute instructions to perform any of the foregoing methods applied to the access device, for example, the methods shown in any one of Figures 2 to 9.
  • Network device 900 may also include a power supply component 926 configured to perform power management of network device 900, a wired or wireless network interface 950 configured to connect network device 900 to a network, and an input-output (I/O) interface 958 .
  • Network device 900 may operate based on an operating system stored in memory 932, such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM or the like.
  • Embodiments of the present disclosure provide a computer storage medium that stores an executable program; after the executable program is executed by a processor, the information processing method provided by any of the foregoing technical solutions can be used, for example, Figures 2 to 9 One or more of the methods shown.
  • the computer storage media may include, but is not limited to, non-transitory computer-readable storage media.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本公开实施例提供一种信息处理方法及装置、通信设备及存储介质。由中继UE执行的信息处理方法可包括:向网络设备发送第一请求消息,所述第一请求消息至少包括:中继业务码RSC;接收所述网络设备基于所述第一请求消息返回的第一响应消息,所述中继UE具有提供所述RSC所指示中继业务的权限,所述第一响应消息包括:UE到UE的中继发现的安全参数;在接收到所述第一响应消息之后,监听源UE的第二请求消息;当所述中继UE支持所述第二请求消息包含所述RSC指示的中继业务时,根据所述第二请求消息和中继信息广播第三请求消息;所述中继UE能够分别与源UE和目标UE建立连接以作为中继实现源UE和目标UE之间的UE到UE中继通信。

Description

信息处理方法及装置、通信设备及存储介质 技术领域
本公开涉及无线通信技术领域但不限于无线通信技术领域,尤其涉及一种信息处理方法及装置、通信设备及存储介质。
背景技术
邻近业务(proximity services,ProSe)允许用户设备(User Equipment,UE)之间通过UE到UE(UE to UE,U2U)中继(即中继设备)发现对端。即,如果源UE不能直接与目标UE通信,则可以通过发现U2U中继与目标UE通信。这个过程可能触发UE之间的发现过程。但是U2U中继实际作为一个不信任的通信节点,可能会导致中间者攻击(Man-In-the-middle-attacks,MIMT)。
发明内容
本公开实施例提供一种信息处理方法及装置、通信设备及存储介质。
本公开实施例第一方面提供一种信息处理方法,由中继UE执行,所述方法包括:向网络设备发送第一请求消息,其中,所述请求消息至少包括:中继业务码(Relay Service Code,RSC);接收所述网络设备基于所述第一请求消息返回的第一响应消息,其中,所述中继UE具有提供所述RSC所指示中继业务的权限,所述第一响应消息包括:UE到UE的中继发现的安全参数;在接收到所述第一响应消息之后,监听源UE的第二请求消息;当所述中继UE支持所述第二请求消息包含所述RSC指示的中继业务时,根据所述第二请求消息和中继信息广播第三请求消息。
本公开实施例第二方面提供一种信息处理方法,由源UE执行,所述方法包括:向网络设备发送第一请求消息,其中,所述请求消息至少包括:RSC;接收所述网络设备基于所述第一请求消息返回的第一响应消息,其中,所述源UE具有获取所述RSC所指示中继业务的权限,所述第一响应消息包括:UE到UE的中继发现的安全参数;在接收到所述第一响应消息之后,广播第二请求消息;其中,所述第二请求消息,用于通过中继UE发现目标UE。
本公开实施例第三方面提供一种信息处理方法,其中,由目标UE执行,所述方法包括:向网络设备发送第一请求消息,其中,所述请求消息至少包括:RSC;接收所述网络设备基于所述第一请求消息返回的第一响应消息,其中,所述目标UE具有获取所述RSC所指示中继业务的权限,所述第一响应消息包括:UE到UE的中继发现的安全参数;在接收到所述第一响应消息之后监听第三请求消息;当所述目标UE支持所述第三请求消息携带的RSC指示的中继业务时,返回第三响应消息,其中,所述第三响应消息,用于供中继UE向源UE返回第二响应消息。
本公开实施例第四方面提供一种信息处理装置,所述方法包括:第一发送模块,被配置为向网络设备发送第一请求消息,其中,所述请求消息至少包括:中继业务码RSC;第一接收模块,被配置为接收所述网络设备基于所述第一请求消息返回的第一响应消息,其中,所述中继UE具有提供所述RSC所指示中继业务的权限,所述第一响应消息包括:UE到UE的中继发现的安全参数;第一监听模块,被配置为在接收到所述第一响应消息之后,监听源UE的第二请求消息;所述第一发送模块,被配置为当所述中继UE支持所述第二请求消息包含所述RSC指示的中继业务时,根据所述第二请求消息和中继信息广播第三请求消息。
本公开实施例第五方面提供一种信息处理装置,所述装置包括:第二发送模块,被配置为向网络设备发送第一请求消息,其中,所述请求消息至少包括:中继业务码RSC;第二接收模块,被配置为接收所述网络设备基于所述第一请求消息返回的第一响应消息,其中,所述源UE具有获取所述RSC所指示中继业务的权限,所述第一响应消息包括:UE到UE的中继发现的安全参数;所述第二发送模块,还被配置为在接收到所述第一响应消息之后,广播第二请求消息;其中,所述第二请求消息,用于通过中继UE发现目标UE。
本公开实施例第六方面提供一种信息处理装置,其中,所述装置包括:第三发送模块,被配置为向网络设备发送第一请求消息,其中,所述请求消息至少包括:中继业务码RSC;第三接收模块,被配置为接收所述网络设备基于所述第一请求消息返回的第一响应消息,其中,所述目标UE具有获取所述RSC所指示中继业务的权限,所述第一响应消息包括:UE到UE的中继发现的安全参数;第二监听模块,被配置为在接收到所述第一响应消息之后监听第三请求消息;所述第三发送模块,被配置为当所述目标UE支持所述第三请求消息携带的RSC指示的中继业务时,返回第三响应消息,其中,所述第三响应消息,用于供中继UE向源UE返回第二响应消息。
本公开实施例第七方面提供一种通信设备,包括处理器、收发器、存储器及存储在存储器上并能够有所述处理器运行的可执行程序,其中,所述处理器运行所述可执行程序时执行如前述第一方面至第三方面任一方面提供的信息处理方法。
本公开实施例第十方面提供一种计算机存储介质,所述计算机存储介质存储有可执行程序;所述可执行程序被处理器执行后,能够实现前述第一方面至第三方面任一方面提供的信息处理方法。
本公开实施例提供的技术方案,若中继UE需要与源UE和目标UE之间相互发现,则需要通过网络设备通过安全参数发放的认证,从而减少了中继UE作为不被其他UE和/或网络设备信任的通信节点导致的MITM攻击,从而提升中继通信的安全性。
应当理解的是,以上的一般描述和后文的细节描述仅是示例性和解释性的,并不能限制本公开实施例。
附图说明
此处的附图被并入说明书中并构成本说明书的一部分,示出了符合本发明实施例,并与说明书一起用于解释本发明实施例的原理。
图1是根据一示例性实施例示出的一种无线通信系统的结构示意图;
图2是根据一示例性实施例示出的一种信息处理方法的流程示意图;
图3是根据一示例性实施例示出的一种信息处理方法的流程示意图;
图4是根据一示例性实施例示出的一种信息处理方法的流程示意图;
图5是根据一示例性实施例示出的一种信息处理方法的流程示意图;
图6是根据一示例性实施例示出的一种信息处理方法的流程示意图;
图7是根据一示例性实施例示出的一种信息处理方法的流程示意图;
图8是根据一示例性实施例示出的一种信息处理方法的流程示意图;
图9是根据一示例性实施例示出的一种信息处理方法的流程示意图;
图10是根据一示例性实施例示出的一种信息处理装置的结构示意图;
图11是根据一示例性实施例示出的一种信息处理装置的结构示意图;
图12是根据一示例性实施例示出的一种信息处理装置的结构示意图;
图13是根据一示例性实施例示出的一种UE的结构示意图;
图14是根据一示例性实施例示出的一种网络设备的结构示意图。
具体实施方式
这里将详细地对示例性实施例进行说明,其示例表示在附图中。下面的描述涉及附图时,除非另有表示,不同附图中的相同数字表示相同或相似的要素。以下示例性实施例中所描述的实施方式并不代表与本发明实施例相一致的所有实施方式。相反,它们仅是本发明实施例的一些方面相一致的装置和方法的例子。
在本公开实施例使用的术语是仅仅出于描述特定实施例的目的,而非旨在限制本公开实施例。在本公开所使用的单数形式的一种、所述和该也旨在包括多数形式,除非上下文清楚地表示其他含义。还应当理解,本文中使用的术语和/或是指并包含一个或多个相关联的列出项目的任何或所有可能组合。
应当理解,尽管在本公开实施例可能采用术语第一、第二、第三等来描述各种信息,但这些信息不应限于这些术语。这些术语仅用来将同一类型的信息彼此区分开。例如,在不脱离本公开实施例范围的情况下,第一信息也可以被称为第二信息,类似地,第二信息也可以被称为第一信息。取决于语境,如在此所使用的词语如果可以被解释成为在……时或当……时或响应于确定。
需要说明的是,对于相同的参数/名词,除非另行声明,否则在不同的实施例中的含义相同,因此不在每个实施例中都单独赘述了。
请参考图1,其示出了本公开实施例提供的一种无线通信系统的结构示意图。如图1所示,无线通信系统是基于蜂窝移动通信技术的通信系统,该无线通信系统可以包括:若干个UE 11以及若干个接入设备12。
其中,UE 11可以是指向用户提供语音和/或数据连通性的设备。UE 11可以经无线接入网(Radio  Access Network,RAN)与一个或多个核心网进行通信,UE 11可以是物联网UE,如传感器设备、移动电话(或称为蜂窝电话)和具有物联网UE的计算机,例如,可以是固定式、便携式、袖珍式、手持式、计算机内置的或者车载的装置。例如,站(Station,STA)、订户单元(subscriber unit)、订户站(subscriber station)、移动站(mobile station)、移动台(mobile)、远程站(remote station)、接入点、远程UE(remote terminal)、接入UE(access terminal)、用户装置(user terminal)、用户代理(user agent)、用户设备(user device)、或用户UE(user equipment,UE)。或者,UE 11也可以是无人飞行器的设备。或者,UE 11也可以是车载设备,比如,可以是具有无线通信功能的行车电脑,或者是外接行车电脑的无线通信设备。或者,UE 11也可以是路边设备,比如,可以是具有无线通信功能的路灯、信号灯或者其它路边设备等。
接入设备12可以是无线通信系统中的网络侧设备。其中,该无线通信系统可以是第四代移动通信技术(the 4th generation mobile communication,4G)系统,又称长期演进(Long Term Evolution,LTE)系统;或者,该无线通信系统也可以是5G系统,又称新空口(new radio,NR)系统或5G NR系统。或者,该无线通信系统也可以是5G系统的再下一代系统。其中,5G系统中的接入网可以称为NG-RAN(New Generation-Radio Access Network,新一代无线接入网)。或者,MTC系统。
其中,接入设备12可以是4G系统中采用的演进型接入设备(eNB)。或者,接入设备12也可以是5G系统中采用集中分布式架构的接入设备(gNB)。当接入设备12采用集中分布式架构时,通常包括集中单元(central unit,CU)和至少两个分布单元(distributed unit,DU)。集中单元中设置有分组数据汇聚协议(Packet Data Convergence Protocol,PDCP)层、无线链路层控制协议(Radio Link Control,RLC)层、媒体访问控制(Media Access Control,MAC)层的协议栈;分布单元中设置有物理(Physical,PHY)层协议栈,本公开实施例对接入设备12的具体实现方式不加以限定。
接入设备12和UE 11之间可以通过无线空口建立无线连接。在不同的实施方式中,该无线空口是基于第四代移动通信网络技术(4G)标准的无线空口;或者,该无线空口是基于第五代移动通信网络技术(5G)标准的无线空口,比如该无线空口是新空口;或者,该无线空口也可以是基于5G的更下一代移动通信网络技术标准的无线空口。
如图2所示,本公开实施例提供一种信息处理方法,由中继UE执行,所述方法包括:
S1110:向网络设备发送第一请求消息,其中,所述第一请求消息至少包括:中继业务码RSC。
所述RSC可用于标识中继业务;所述第一请求消息可用于网络设备验证所述中继UE是否具有提供所述RSC所指示中继业务的权限,和/或请求提供所述RSC所指示中继业务的安全参数;
S1120:接收所述网络设备基于所述第一请求消息返回的第一响应消息。所述中继UE具有提供所述RSC所指示中继业务的权限,所述第一响应消息包括:UE到UE的中继发现的安全参数。示例性地,所述第一响应消息可用于供所述中继UE确定所述中继UE是否具有提供所述RSC所指示中继业务的权限,和/或提供所述中继UE提供所述RSC所指示中继业务的安全参数。
S1130:在接收到所述第一响应消息之后,监听源UE的第二请求消息。示例性地,所述第二请求消息用于请求中继UE发现目标UE;S1140:当所述中继UE支持所述第二请求消息包含所述RSC 指示的中继业务时,根据所述第二请求消息和中继信息广播第三请求消息。示例性地,所述第三请求消息用于通知目标UE和中继UE建立中继连接。
该中继UE为U2U的中继设备,也可以称之为U2U中继。所述中继UE能够分别与源UE和目标UE建立连接以作为中继实现源UE和目标UE之间的UE到UE中继通信。
该中继UE可为基于PC5接口或者基于SR5接口进行中继通信的UE。此处的中继UE为:源UE和目标UE之间的UE到UE(U2U)之间通信的中继设备。
该网络设备可为任意可以为所述中继UE配置安全参数的网络设备。示例性地,该网络设备可为核心网设备。该核心网设备包括但不限于以下至少之一:直连发现名称管理功能(Direct Discovery Name Management Function,DDNMF)和/或邻近服务密钥管理功能(ProSe Key Management Function,PKMF)等。即DDNMF和/或PKMF等核心网设备会提供安全参数用于U2U的中继通信,从而减少U2U的中继通信的安全隐患,提升U2U中继通信的安全性。
例如,所述第一请求消息包括所述中继UE的标识,网络设备接收到所述第一请求消息,通过查询签约数据、中继UE的控制策略和/或ProSe应用服务器的业务配置等,确定所述中继UE是否具有所述第一请求消息包含的RSC指示的中继业务的权限。
不同中继业务的RSC不同。安全参数是与RSC相关的,因此,支持相同RSC指示的中继业务的UE,则网络设备返回的安全参数可是相同的。
在一个实施例中,所述第一响应消息可包括:拒绝消息,例如,网络设备确定所述中继UE不具有提供所述第一请求消息包含的RSC指示的中继业务的权限,则所述第一响应消息可为拒绝消息。
在另一个实施例中,所述第一响应消息可包括:接受消息,例如,网络设备确定所述中继UE具有提供所述第一请求消息包含的RSC指示的中继业务的权限,则所述第一响应消息可为接受消息,该接受消息可包括所述安全参数。
示例性地,所述安全参数可包括:用于U2U中继通信的授权和/或密钥参数等,总之这些参数可以用于后续U2U中继通信的权限和/或安全验证。
该安全参数返回给中继UE之后,可以用于中继UE基于模式A和/或模式B,完成源UE和目标UE之间的中继发现。
所述第一请求消息包括但不限于:不限于中继发现密钥请求消息(Relay Discovery key Request message)。对应地,此时所述第一响应消息可包括:中继发现密钥响应消息(Relay Discovery key response message)。
所述第二请求消息和所述第三请求消息均可包括但不限于请求消息(solicitation message)。
示例性地,所述S1140可包括以下至少之一:
当接收到在广播信道上的第二请求消息,且所述中继UE支持所述第二请求消息携带的RSC指示的中继业务,生成并广播第三请求消息。示例性地,该第三请求消息可以同时包含所述第二请求消息和所述中继信息,或是第三请求消息为根据第二请求消息和所述中继信息生成的;
或者,
当接收到在广播信道上的第二请求消息,且所述中继UE支持所述第二请求消息携带的RSC指示的中继业务,生成并广播第三请求消息。示例性地,该第三请求消息可以同时包含所述第二请求消息和所述中继信息,或是第三请求消息为根据第二请求消息和所述中继信息生成的。
在一个实施例中,所述中继信息可为所述中继UE的任意信息,具体可包括但不限于:中继UE的标识(Identifier,ID)。
在另一个实施例中,所述中继信息可包括:所述中继UE的标识以及ProSe直连发现转发指示(ProSe direct discovery forwarding indication)等。
当然以上仅仅是对中继信息的举例,具体实现时不局限于上述举例。
所述第二请求消息的消息内容可包括:
源UE的ID;
目标UE的ID;
发现类型信息。
所述目标UE的ID和源UE的ID均可包括但不限于:受限邻近业务应用用户标识(Restricted Prose Application User,RPAUID)。
所述发现类型信息指示的发现类型,示例性地,所述发现类型可包括:U2U发现或者U2N发现。
在本公开实施例中,所述宣告消息携带的发现类信息指示的U2U发现。所述模式B为需要通过广播的请求消息和与所述请求消息对应地响应消息,实现UE之间的相互发现。
总之,在本公开实施例中,若中继UE需要与源UE和目标UE之间相互发现,则需要通过网络设备通过安全参数发放的认证,从而减少了中继UE作为不被其他UE和/或网络设备信任的通信节点导致的MITM攻击,从而提升中继通信的安全性。
如图3所示,本公开实施例提供一种信息处理方法,由中继UE执行,所述方法包括:
S1210:向网络设备发送第一请求消息,其中,所述请求消息至少包括:RSC;
S1220:接收所述网络设备基于所述第一请求消息返回的第一响应消息,其中,所述中继UE具有提供所述RSC所指示中继业务的权限,所述第一响应消息包括:UE到UE的中继发现的安全参数;
S1230:在接收到所述第一响应消息之后,监听源UE的第二请求消息;
S1240:当所述中继UE支持所述第二请求消息包含所述RSC指示的中继业务时,根据所述第二请求消息和中继信息广播第三请求消息;
S1250:接收基于所述第三请求消息返回的第三响应消息。示例性地,第三响应消息用于通知中继UE能够建立目标UE与中继UE之间的中继连接;S1260:当接收到所述第三响应消息,向所述源UE返回第二响应消息。示例性地,第二响应消息用于通知源UE,中继UE能够建立源UE与目标UE之间的中继连接。
中继UE广播第三请求消息之后可能接收到目标UE回复的第三响应消息,也有可能接收不到第三响应消息。因此,在本公开实施例中,若中继UE接收到第三响应消息,会向源UE返回第二响应 消息。
如此,源UE接收到第二响应消息之后,就可以启动和中继UE之间的中继连接建立的过程。进一步地,若中继UE接收到源UE的中继连接的建立请求,则中继UE可以启动与目标UE之间中继连接的建立。
在中继UE和源UE之间的中继连接以及目标UE和中继UE之间中继连接的建立之后,可进一步通过中继UE实现源UE和目标UE之间的直连连接的建立。
同样地,所述第三响应消息同样可为请求消息(solicitation message)的响应消息(response message)。
所述方法还包括:
获取安全策略,其中,所述安全策略预先配置在所述中继UE上、根据协议确定所述安全策略,预先从网络设备接收所述安全策略;
若根据安全策略无需对第三请求消息进行安全保护,则会直接广播明文的第三请求消息;
或者,
若根据安全策略需要对第三请求消息进行安全保护,则使用接收的安全参数对第三请求消息进行安全处理,广播完成安全处理后的第三请求消息。
所述安全策略可用于所述中继UE确定分别与源UE和目标UE之间建立中继连接是否需要使用所述安全参数进行安全保护。
所述安全处理包括以下至少之一:
使用所述安全参数对第三请求消息进行完整性保护,得到进行了完整性保护的第三请求消息;
或者,
使用所述安全参数对第三请求消息进行机密性保护,得到进行了机密性保护的第三请求消息;
或者,
使用所述安全参数对第三请求消息进行机密性保护和完整性保护,得到进行了机密性和完整性保护的第三请求消息。
在一些实施例中,所述当所述中继UE支持所述第二请求消息包含所述RSC指示的中继业务时,根据所述第二请求消息和中继信息广播第三请求消息,包括:
当监听到所述第二请求消息包含所述RSC且使用所述安全参数对所述第二请求消息的安全验证通过之后,根据所述第二请求消息和中继信息广播第三请求消息。
使用所述安全参数对所述第二请求消息的安全验证通过可包括:
使用安全参数对所述第二请求消息进行完整性校验,若所述第二请求消息通过完整性校验,可认为所述第二请求消息的安全验证通过;
或者,
使用安全参数对所述第二请求消息进行机密性校验,若所述第二请求消息通过机密性校验,可认为所述第二请求消息的安全验证通过;
或者,
使用安全参数对所述第二请求消息进行完整性校验和机密性保护的验证,若所述第二请求消息通过完整性验证且使用所述安全参数成功解密所述第二请求消息,可认为所述第二请求消息的安全验证通过。
在一些实施例中,所述第二请求消息还包括以下至少之一:
发现类型信息;
所述源UE的设备信息;
目标UE的设备信息。
所述发现类型信息指示的发现类型,示例性地,所述发现类型可包括:U2U发现或者用户设备到网络(UE to Network,U2N)发现。在本公开实施例中所述发现类型信息可指示U2U发现。
所述源UE的设备信息包括但不限于源UE的ID和/或设备类型。
所述目标UE的设备信息包括但不限于目标UE的ID和/或设备类型等。
在一些实施例中,所述中继信息包括以下至少之一:
所述中继UE的设备信息;
中继指示。
所述中继UE的设备信息包括但不限于中继UE的ID,示例性地,所述中继UE的设备信息还可包括设备类型信息。
所述中继指示可表明当前广播的请求消息为中继UE转发的,如此,接收到目标UE需要进一步从响应消息中提取出中继UE的设备信息。
如图4所示,本公开实施例提供一种信息处理方法,由源UE执行,所述方法包括:
S2110:向网络设备发送第一请求消息,其中,所述请求消息至少包括:RSC。所述RSC可用于标识中继业务;所述第一请求消息可用于网络设备验证所述源UE是否具有获取所述RSC所指示中继业务的权限,和/或请求提供所述RSC所指示中继业务的安全参数。
S2120:接收所述网络设备基于所述第一请求消息返回的第一响应消息,其中,所述源UE具有获取所述RSC所指示中继业务的权限,所述第一响应消息包括:UE到UE的中继发现的安全参数。示例性地,所述第一响应消息可用于供所述源UE确定所述中继UE是否具有提供所述RSC所指示中继业务的权限,和/或提供所述源UE提供所述RSC所指示中继业务的安全参数。
S2130:在接收到所述第一响应消息之后,广播第二请求消息;其中,所述第二请求消息,用于通过中继UE发现目标UE。示例性地的,源UE可为基于直连链路的业务的发起UE。
同样地,所述第一请求消息包括所述源UE的标识,网络设备接收到所述第一请求消息,通过查询签约数据、源UE的控制策略和/或ProSe应用服务器的业务配置等,确定所述源UE是否具有获取所述第一请求消息包含的RSC指示中继业务的权限。
不同中继业务的RSC不同。安全参数是与RSC相关的,因此,支持相同RSC指示的中继业务的UE,则网络设备返回的安全参数可是相同的。
在一个实施例中,所述第一响应消息可包括:拒绝消息,例如,网络设备确定所述源UE不具获取所述第一请求消息包含的RSC指示的中继业务的权限,则所述第一响应消息可为拒绝消息。
在另一个实施例中,所述第一响应消息可包括:接受消息,例如,网络设备确定所述源UE具获取所述第一请求消息包含的RSC指示的中继业务的权限,则所述第一响应消息可为接受消息,该接受消息可包括所述安全参数。
示例性地,所述安全参数可包括:用于U2U中继通信的授权和/或密钥参数等,总之这些参数可以用于后续U2U的中继通信的权限和/或安全验证。
该安全参数返回给源UE之后,可以用于源UE基于模式A和/或模式B,完成中继UE和目标UE之间的中继发现。
所述第一请求消息包括但不限于:不限于发现密钥请求消息(Discovery key Request message)。对应地,此时所述第一响应消息可包括:中继密钥响应消息(Relay Discovery key response message)。
如图5所示,本公开实施例提供一种信息处理方法,由源UE执行,所述方法包括:
S2210:向网络设备发送第一请求消息,其中,所述请求消息至少包括:RSC;
S2220:接收所述网络设备基于所述第一请求消息返回的第一响应消息,其中,所述源UE具有获取所述RSC所指示中继业务的权限,所述第一响应消息包括:UE到UE的中继发现的安全参数;
S2230:在接收到所述第一响应消息之后,广播第二请求消息;其中,所述第二请求消息,用于通过中继UE发现目标UE。
S2240:接收第二响应消息,其中,所述第二响应消息为:所述中继UE在接收到第三响应消息之后发送的,其中,所述第三响应消息是:所述目标UE接收到基于所述第二请求消息和中继信息广播的第三请求消息后返回给所述中继UE的。
该信息处理方法由源UE执行,同样地,所述第一请求消息的消息可为但不限于中继发现密钥请求消息(Relay Discovery key Request message)。对应地,此时所述第一响应消息可包括:中继密钥响应消息(Relay Discovery key response message)。在一些实施例中,所述第一请求消息可包括:历史时刻已经发现的备选中继UE和/或备选目标UE的ID。该ID包括但不限于RPAUID。
所述源UE接收到所述安全参数之后,源UE有权限使用第一请求消息携带的RSC指示的中继业务,在有需要获取RSC指示的中继业务时,会广播第二请求消息。
若第二请求消息被中继UE成功监听到,会收到第二响应消息。所述第二响应消息可以是中继UE发现了源UE请求中继通信的目标UE之后返回的,此时,该第二响应消息可为接受消息。当然若中继UE未发现源UE请求通信的目标UE,则所述源UE可能就接收不到为所述接受消息的所述第二响应消息。
在一些实施例中,所述方法还包括:
在接收到第二响应消息之后,与所述中继UE建立中继连接,其中,所述中继连接,用于所述源UE和所述目标UE的中继通信。
若源UE接收到第二响应消息,就进入到与中继UE建立中继连接的步骤。
示例性地,所述与中继UE建立中继连接可包括:
向中继UE发送直连通信请求(Direct Communication Request,DCR)消息等,
接收中继UE的直连通信响应消息。
通过DCR消息和DRC响应消息完成密钥协商,从而建立源UE和中继UE之间的安全直连链路的建立。
当然以上仅仅是中继UE和源UE之间中继连接的具体举例,具体实现不局限于上述举例。
所述中继连接为一种SL连接。
若所述RSC对应的安全策略表明无需UE之间的相互发现,无需进行完整性验证和/或机密性验证,则无需源UE广播的第二请求消息为明文的请求消息。
若所述RSC对应的安全策略表明UE之间的相互需要进行完整性验证和机密性验证,则需要源UE在广播第二请求消息之前,使用安全参数对所述第二请求消息进行安全处理,然后广播进行了安全处理的第二请求消息。因此,如图6所示,本公开实施例提供一种信息处理方法,由源UE执行,所述方法包括:
S2310:向网络设备发送第一请求消息,其中,所述请求消息至少包括:RSC;
S2320:接收所述网络设备基于所述第一请求消息返回的第一响应消息,其中,所述源UE具有获取所述RSC所指示中继业务的权限,所述第一响应消息包括:UE到UE的中继发现的安全参数;
S2330:在接收到所述第一响应消息之后,使用所述安全参数对所述第二请求消息进行安全处理;
S2340:广播使用所述安全参数安全处理之后的所述第二请求消息。
此处使用安全参数对第二请求消息进行安全处理可包括但不限于以下至少之一:
使用所述安全参数对所述第二请求消息进行完整性保护,得到进行了完整性保护的第二请求消息;
使用所述安全参数对所述第二请求消息进行机密性保护,得到进行了机密性保护的第二请求消息;
使用所述安全参数对所述第二请求消息进行完整性保护和/或机密性保护,得到进行了完整性保护和机密性保护的第二请求消息。
如图7所示,本公开实施例提供一种信息处理方法,其中,由目标UE执行,所述方法包括:
S3110:向网络设备发送第一请求消息,其中,所述请求消息至少包括:RSC;所述RSC可用于标识中继业务;所述第一请求消息可用于网络设备验证所述目标UE是否具有获取所述RSC所指示中继业务的权限,和/或请求提供所述RSC所指示中继业务的安全参数。
S3120:接收所述网络设备基于所述第一请求消息返回的第一响应消息,其中,所述目标UE具有获取所述RSC所指示中继业务的权限,所述第一响应消息包括:UE到UE的中继发现的安全参数。示例性地,所述第一响应消息可用于供所述中继UE确定所述目标UE是否具有提供所述RSC所指示中继业务的权限,和/或提供所述目标UE提供所述RSC所指示中继业务的安全参数。
S3130:在接收到所述第一响应消息之后监听第三请求消息;,所述第三请求消息用于通知目标 UE和中继UE建立中继连接。
S3140:当所述目标UE支持所述第三请求消息携带的RSC指示的中继业务时,返回第三响应消息,其中,所述第三响应消息,用于供中继UE向源UE返回第二响应消息。
该信息处理方法可由目标UE执行,该目标UE也可以与自身对应的DDNMF或者PKMF进行通信,从而获取到上述安全参数。
在一些实施例中,所述当所述目标UE支持所述第三请求消息携带的RSC指示的中继业务时,返回第三响应消息,包括:
当所述目标UE支持所述第三请求消息携带的RSC指示的中继业务且所述第三请求消息通过基于所述安全参数进行的安全验证之后,返回第三响应消息。
在一些实施例中,所述方法还包括:
在发送所述第三响应消息之后,接收中继UE的连接建立请求;
基于所述连接建立请求,与所述中继UE建立中继连接,其中,所述中继连接,用于所述目标UE和源UE之间的中继通信。
所述连接建立请求包括但不限于直连通信请求(Direct Communication Request,DCR)消息。
若目标UE确定与中继UE建立中继连接,则会根据直连通信请求并向中继UE返回直连通信响应,以此通过直连通信请求和直连通信响应协商密钥,并完成安全的中继连接的建立。
在一些实施例中,所述当所述目标UE支持所述第三请求消息携带的RSC指示的中继业务时,返回第三响应消息,包括:
当所述目标UE支持所述第三请求消息携带的RSC所指示中继业务且选择中继UE获取中继服务时,返回第三响应消息,其中,所述第三响应消息,用于供中继UE向源UE返回第二响应消息。
若目标UE支持第三请求消息携带的RSC所指示中继业务但是并未选择中继UE获取中继服务,则不返回表示接受通信请求的第三请求消息,或者返回拒绝消息。
本公开实施例提供一种信息处理方法可包括:
确保源UE和目标UE可以通过UE到UE中继安全地发现对方。
提供U2U中继传输的发现过程的消息完整性和/或机密性保护。
当UE中的应用程序客户端,意图发现其他UE,例如,发现应用程序的好友账户的UE,UE将从ProSe应用服务器获取这些用户的RPAUID列表(目标RPAUID列表)或/和可以提供中继服务的中继用户ID列表(中继RPAUID列表),UE可以监控该列表中的目标UE或者中继UE。目标RPAUID列表或/和中继RPAUID列表在一个应用层容器中传递给UE。
在使用UE中继时,在执行U2U中继发现之前,需要获取RSC。RSC也可以预先配置在UE上,也可以在UE的业务授权过程中由网络设备发放给中继UE。
如图8所示,本公开实施例提供一种信息处理方法,由网络设备执行,所述方法包括:
S4110:接收UE的第一请求消息,其中,所述第一请求消息至少包括:RSC;
S4220:根据所述RSC向所述UE发送第一响应消息,其中,所述UE具有所述RSC指示的中 继业务权限,所述第一响应消息包括UE到UE的中继发现的安全参数。
该网络设备可为任意可以为UE配置安全参数的网络设备。示例性地,该网络设备可为核心网设备。该核心网设备包括但不限于以下至少之一:直连发现名称管理功能(Direct Discovery Name Management Function,DDNMF)和/或5G邻近服务密钥管理功能(ProSe Key Management Function,PKMF)等。即DDNMF和/或PKMF等核心网设备会提供安全参数用于U2U的中继发现,从而减少U2U的中继通信的安全隐患,提升U2U中继通信的安全性。
该UE可为基于PC5接口或者基于SR5接口进行通信的源UE、目标UE或者中继UE。此处的中继UE为:源UE和目标UE之间的UE到UE之间的中继设备。
所述第一请求消息可为各种可由UE发送给网络设备的消息,该第一请求消息包括但不限于中继发现密钥第一请求消息(Relay Discovery key Request message)。对应地,此时所述第一响应消息可包括:中继发现密钥第一响应消息(Relay Discovery key response message)。
不同中继业务的RSC不同。安全参数是与RSC相关的,因此,支持相同RSC指示的中继业务的UE,则网络设备返回的安全参数可是相同的。
示例性地,所述安全参数可包括:用于U2U中继发现的授权和/或密钥参数等任意参数。
该安全参数返回给UE之后,可以用于UE基于模式A和/或模式B,完成源UE和目标UE分别和中继UE之间的中继发现。
在一些实施例中,所述第一请求消息还包括:UE的ID;
所述方法还包括:
根据所述UE的ID,确定所述UE是否具有UE到UE的中继通信的权限;
所述根据所述RSC向所述UE发送第一响应消息,包括:
在所述UE具有UE到UE的中继通信的权限时,根据所述RSC向所述UE发送第一响应消息。
所述UE的ID可包括但不限于所述UE的受限邻近业务应用用户标识(Restricted Prose Application User,RPAUID)。
示例性地,所述根据所述UE的ID,确定所述UE是否具有UE到UE的中继通信的权限,可包括:若所述UE为中继UE,则根据所述中继UE的ID确定所述中继UE是否能够提供中继业务。
例如,中继UE的PKMF和/或DDNMF向应用服务器等其他网络设备发送授权请求,从其他网元接收授权响应。此处的其他网络设备可包括但不限于:Prose应用服务器、策略控制功能(Policy Control Function,PCF)或者统一数据管理(Unified Data Management,UDM)。
示例性地,所述根据所述UE的ID,确定所述UE是否具有UE到UE的中继通信的权限,可包括:
若所述UE为源UE或目标UE,则根据所述源UE或目标UE的ID确定所述源UE或者目标UE是否能够使用第一请求消息中携带RSC指示的中继业务。
例如,源UE或目标UE的PKMF和/或DDNMF向应用服务器等其他网络设备发送授权请求,从其他网元接收授权响应。此处的其他网络设备可包括但不限于:Prose应用服务器、策略控制功 能(Policy Control Function,PCF)或者统一数据管理(Unified Data Management,UDM)。
如图9所示,本公开实施例提供一种信息处理方法可包括:
第一阶段:
1.U2U中继向5G DDNMF或PKMF发送包含RPAUID和中继服务代码(RSC)的中继发现密钥请求消息,以获取相关的安全材料。此外,U2U中继应提供自身的PC5UE安全能力。在中继发现密钥请求消息中还包含UE支持的加密算法列表。
值得注意的是:在基于用户面的U2U中继发现安全流程,5G PKMF会被使用。在基于控制面的U2U中继发现安全流程,5G DDNMF会被使用。
2.5G DDNMF/PKMF可以向ProSe应用服务器(Application Server)/PCF/UDM检查授权。
值得注意的是:若U2U中继处于漫游状态,则U2U中继的归属陆地移动通信网(Home Public Land Mobile Network,HPLMN)中的DDNMF和拜访地公用陆地移动网(Visited Public Land Mobile Network,V PLMN)中的DDNMF会交互U2U中继的授权。
3.U2U中继的5G DDNMF/PKMF返回对应于RSC的安全参数,以及CURRENT_TIME和MAX_OFFSET等。CURRENT_TIME为当前时间戳,MAX_OFFSET为时间偏移量。通过时间戳和MAX_OFFSET可以确保UE抵御攻击者的重放攻击。针对U2U中继而言,所述RSC的安全参数可为:Code-SecParams。
安全参数是根据RSC生成的,该安全参数为U2U中继发现过程中必要的安全材料。U2U中继的5G DDNMF/PKMF应在中继发现密钥响应消息中包含所选的PC5安全算法。5G DDNMF/PKMF根据第1步中RSC和接收到的PC5UE安全能力决定所选择的PC5安全算法。U2U中继将RSC和所选的PC5安全算法一起存储。所选的PC5安全算法可包括所选的PC5加密算法和/或所选的PC5完整性算法。PC5加密算法用于机密性保护。所选的PC5完整性算法,用于PC5的完整性保护。
值得注意的是:一个支持多个RSC的U2U中继可以使用多个U2U中继发现消息获取对应的安全参数,每个U2U中继发现消息中只携带一个RSC。
值得注意的是:代码安全参数与RSC相关联。U2U中继应该使用相应的代码安全参数(Code-secParams)来保护/验证特定U2U中继服务下的所有发现消息。此处的代码安全参数(Code-secParams)为前述的U2U中继的安全参数。
第二阶段:
4.源UE/目标UE发送一个中继密钥发现请求消息到5G DDNMF/PKMF,其中包含自身的RPAUID、RSC、源UE/目标UE的PC5UE安全能力和可选中继UE的RPAUID。源UE/目标UE的PC5UE安全能力,可代表源UE和/或目标UE支持的PC5安全算法。
值得注意的是:支持多个RSC的源UE/目标UE可以使用多个中继发现密钥消息获得安全参数,每个中继发现密钥消息携带一个RSC。即,涉及不同RSC所指示业务的安全参数的获取,将使用不同的中继发现密钥消息等请求消息。
5.源/目标UE的5G DDNMF/PKMF向ProSe应用服务器(Application Server)/PCF/UDM发送授权请求。如果允许源UE/目标UE使用这个特定的U2U中继服务,ProSe应用服务器(Application Server)/PCF/UDM将返回一个授权响应。
6.如果发现请求被授权,且中继RPAUID中的PLMN ID表示不同的PLMN,则源UE/目标UE的5G DDNMF/PKMF通过发送包含步骤4中收到的PC5UE安全能力的监控请求,联系指定PLMN的5G DDNMF/PKMF,即U2U中继的5G DDNMF。
值得注意时:如果中继RPAUID(s)分别归属于多个不同的PLMN,则源/目标UE的5G DDNMF/PKMF选择一个PLMN,发送发现消息(Discovery Request)以获取代码安全参数(Code-SecParams)。代码安全参数与前述安全参数相一致。
7.U2U中继的5G DDNMF/PKMF与ProSe应用服务器(Application Server)/PCF/UDM交换授权消息。ProSe应用服务器检查源UE/目标UE、UE到UE中继是否授权进行指定U2U中继业务下的U2U发现,或者检查U2U中继是否被授权为源UE/目标UE提供U2U中继服务。
8.如果U2U中继被授权,并且步骤4中的PC5UE安全能力包括所选的PC5安全算法,UE到UE中继的5G DDNMF/PKMF响应源UE/目标UE的5G DDNMF/PKMF,返回一个发现响应消息,包括相应的代码安全参数和选择的PC5安全算法(基于步骤3中存储的信息/密钥)。代码安全参数提供源UE/目标UE所需的信息,以对U2U中继发现消息进行保护和去保护。RSC和代码接收安全参数保存在源/目标UE的5G DDNMF/PKMF中。
9.源UE/目标UE的5G DDNMF/PKMF返回代码安全参数,以及CURRENT_TIME和MAX_OFFSET和选择的PC5安全算法。源UE/目标UE存储代码安全参数(Code-SecParams)、所选的PC5安全算法和RSC。
第三阶段:
10.源UE广播请求(Solicitation)消息,并使用相应的代码安全参数进行保护。请求消息可以包含发现类型(即U2U中继)、RSC、源UE信息(即源UE的RPAUID)和目标UE信息(即目标UE的RPAUID)。
11.基于该发现时隙相关联的基于世界标准时间(Universal Time Coordinated,UTC)的计时器的计时,如果在CURRENT-TIME和MAX_OFFSET对应的时间范围内,中继UE侦听指定RSC的请求消息。在接收到请求消息时,U2U中继会使用与RSC相应的代码安全参数对其进行处理。如果该请求消息的完整性检查/机密性检查通过,U2U中继将中继信息添加到请求消息中,并广播新的请求消息,该请求消息受相应的代码安全参数保护。新的请求信息可能包含发现信息类型、中继信息(即UE-to-UE Relay的RPAUID)、RSC、中继指示(指示由U2U中继转发)、原始发现者信息(即源UE的RPAUID)和目标发现者信息(即目标UE的RPAUID)。
12.如果当前时间在目标UE的ProSe时钟的MAX_OFFSET范围内,则目标UE侦听指定RSC的请求消息。如果完整性检查/机密性检查通过或U2U中继的RPAUID在可选中继RPAUID中且完整性检查/机密性检查通过,目标UE通过响应消息响应请求消息。
13.在接收到响应消息时,U2U中继根据安全策略检查其完整性和机密性。如果检查通过,U2U中继转发包含发现消息类型、中继信息(即中继的RPAUID)、RSC、中继指示(指示由U2U中继转发)、目标发现者信息(即目标UE的RPAUID)和原始发现者信息(即源UE的RPAUID)的响应消息。
在接收到U2U中继的响应消息时,源UE检查其完整性和机密性,并确定是否可以使用此U2U中继。如果源UE希望通过该中继与目标UE通信,则源UE可以启动U2U中继链路建立程序。
如图10所示,本公开实施例提供一种信息处理装置,所述方法包括:
第一发送模块110,被配置为向网络设备发送第一请求消息,其中,所述请求消息至少包括:中继业务码RSC;
第一接收模块120,被配置为接收所述网络设备基于所述第一请求消息返回的第一响应消息,其中,所述中继UE具有提供所述RSC所指示中继业务的权限,所述第一响应消息包括:UE到UE的中继发现的安全参数;
第一监听模块130,被配置为在接收到所述第一响应消息之后,监听源UE的第二请求消息;
所述第一发送模块,被配置为当所述中继UE支持所述第二请求消息包含所述RSC指示的中继业务时,根据所述第二请求消息和中继信息广播第三请求消息。
该信息处理装置可包括前述中继UE。
在一些实施例中,所述第一发送模块110、所述第一接收模块120以及第一监听模块130可均为程序模块;所述程序模块被处理器执行之后,能够实现上述操作。
在另一些实施例中,所述第一发送模块110、所述第一接收模块120以及第一监听模块130可均为软硬结合模块;所述软硬结合模块包括但不限于可编程阵列;所述可编程阵列包括但不限于:现场可编程阵列和/或复杂可编程阵列。
在还有一些实施例中,所述第一发送模块110、所述第一接收模块120以及第一监听模块130可均为纯硬件模块;所述纯硬件模块包括但不限于:专用集成电路。
在一些实施例中,所述第一接收模块,被配置为接收基于所述第三请求消息返回的第三响应消息;
所述第一发送模块,还被配置为当接收到所述第三响应消息,向所述源UE返回第二响应消息。
在一些实施例中,所述当所述中继UE支持所述第二请求消息包含所述RSC指示的中继业务时,根据所述第二请求消息和中继信息广播第三请求消息,包括:
当监听到所述第二请求消息包含所述RSC且使用所述安全参数对所述第二请求消息的安全验证通过之后,根据所述第二请求消息和中继信息广播第三请求消息。
在一些实施例中,所述第二请求消息还包括以下至少之一:
发现类型信息;
所述源UE的设备信息;
目标UE的设备信息。
在一些实施例中,所述中继信息包括以下至少之一:
所述中继UE的设备信息;
中继指示。
如图11所示,本公开实施例提供一种信息处理装置,所述装置包括:
第二发送模块210,被配置为向网络设备发送第一请求消息,其中,所述请求消息至少包括:中继业务码RSC;
第二接收模块220,被配置为接收所述网络设备基于所述第一请求消息返回的第一响应消息,其中,所述源UE具有获取所述RSC所指示中继业务的权限,所述第一响应消息包括:UE到UE的中继发现的安全参数;
所述第二发送模块210,还被配置为在接收到所述第一响应消息之后,广播第二请求消息;其中,所述第二请求消息,用于通过中继UE发现目标UE。
该信息处理装置可包括前述源UE。
在一些实施例中,所述第二发送模块210以及第二接收模块220可均为程序模块;所述程序模块被处理器执行之后,能够实现上述操作。
在另一些实施例中,所述第二发送模块210以及第二接收模块220可均为软硬结合模块;所述软硬结合模块包括但不限于可编程阵列;所述可编程阵列包括但不限于:现场可编程阵列和/或复杂可编程阵列。
在还有一些实施例中,所述第二发送模块210以及第二接收模块220可均为纯硬件模块;所述纯硬件模块包括但不限于:专用集成电路。
在一些实施例中,所述第二接收模块220,还被配置为接收第二响应消息,其中,所述第二响应消息为:所述中继UE在接收到第三响应消息之后发送的,其中,所述第三响应消息是:所述目标UE接收到基于所述第二请求消息和中继信息广播的第三请求消息后返回给所述中继UE的。
在一些实施例中,所述装置还包括:
第一连接模块,还被配置为在接收到第二响应消息之后,与所述中继UE建立中继连接,其中,所述中继连接,用于所述源UE和所述目标UE的中继通信。
在一些实施例中,所述装置还包括:
第一处理模块,被配置为在接收到所述第一响应消息之后,使用所述安全参数对所述第二请求消息进行安全处理;
所述第二发送模块210,还被配置为广播使用所述安全参数安全处理之后的所述第二请求消息。
如图12所示,本公开实施例提供一种信息处理装置,其中,所述装置包括:
第三发送模块310,被配置为向网络设备发送第一请求消息,其中,所述请求消息至少包括:RSC;
第三接收模块320,被配置为接收所述网络设备基于所述第一请求消息返回的第一响应消息,其中,所述目标UE具有获取所述RSC所指示中继业务的权限,所述第一响应消息包括:UE到UE的中继发现的安全参数;
第二监听模块330,被配置为在接收到所述第一响应消息之后监听第三请求消息;
所述第三发送模块310,被配置为当所述目标UE支持所述第三请求消息携带的RSC指示的中继业务时,返回第三响应消息,其中,所述第三响应消息,用于供中继UE向源UE返回第二响应消息。
该信息处理装置可包括前述目标UE。
在一些实施例中,所述第三发送模块310、第三接收模块320以及第二监听模块330可均为程序模块;所述程序模块被处理器执行之后,能够实现上述操作。
在另一些实施例中,所述第三发送模块310、第三接收模块320以及第二监听模块330可均为软硬结合模块;所述软硬结合模块包括但不限于可编程阵列;所述可编程阵列包括但不限于:现场可编程阵列和/或复杂可编程阵列。
在还有一些实施例中,所述第三发送模块310、第三接收模块320以及第二监听模块330可均为纯硬件模块;所述纯硬件模块包括但不限于:专用集成电路。
在一些实施例中,所述第三发送模块310,还被配置为当所述目标UE支持所述第三请求消息携带的RSC指示的中继业务且所述第三请求消息通过基于所述安全参数进行的安全验证之后,返回第三响应消息。
在一些实施例中,所述第三接收模块320,还被配置为在发送所述第三响应消息之后,接收中继UE的连接建立请求;
所述装置,还包括:
第二连接模块,被配置为基于所述连接建立请求,与所述中继UE建立中继连接,其中,所述中继连接,用于所述目标UE和源UE之间的中继通信。
在一些实施例中,所述第三发送模块310,还被配置为当所述目标UE支持所述第三请求消息携带的RSC所指示中继业务且选择中继UE获取中继服务时,返回第三响应消息,其中,所述第三响应消息,用于供中继UE向源UE返回第二响应消息。
本公开实施例提供一种通信设备,包括:
用于存储处理器可执行指令的存储器;
处理器,分别存储器连接;
其中,处理器被配置为执行前述任意技术方案提供的信息处理方法。
处理器可包括各种类型的存储介质,该存储介质为非临时性计算机存储介质,在通信设备掉电之后能够继续记忆存储其上的信息。
这里,所述通信设备包括:UE或者网络设备,该UE可为前述源UE、中继UE和/或目标UE。
所述处理器可以通过总线等与存储器连接,用于读取存储器上存储的可执行程序,例如,如图2至图9所示的方法的至少其中之一。
图13是根据一示例性实施例示出的一种UE 800的框图。例如,UE 800可以是移动电话,计算机,数字广播用户设备,消息收发设备,游戏控制台,平板设备,医疗设备,健身设备,个人数字 助理等。
参照图13,UE 800可以包括以下一个或多个组件:处理组件802,存储器804,电源组件806,多媒体组件808,音频组件810,输入/输出(I/O)的接口812,传感器组件814,以及通信组件816。
处理组件802通常控制UE 800的整体操作,诸如与显示,电话呼叫,数据通信,相机操作和记录操作相关联的操作。处理组件802可以包括一个或多个处理器820来执行指令,以生成上述的方法的全部或部分步骤。此外,处理组件802可以包括一个或多个模块,便于处理组件802和其他组件之间的交互。例如,处理组件802可以包括多媒体模块,以方便多媒体组件808和处理组件802之间的交互。
存储器804被配置为存储各种类型的数据以支持在UE 800的操作。这些数据的示例包括用于在UE 800上操作的任何应用程序或方法的指令,联系人数据,电话簿数据,消息,图片,视频等。存储器804可以由任何类型的易失性或非易失性存储设备或者它们的组合实现,如静态随机存取存储器(SRAM),电可擦除可编程只读存储器(EEPROM),可擦除可编程只读存储器(EPROM),可编程只读存储器(PROM),只读存储器(ROM),磁存储器,快闪存储器,磁盘或光盘。
电源组件806为UE 800的各种组件提供电力。电源组件806可以包括电源管理系统,一个或多个电源,及其他与为UE 800生成、管理和分配电力相关联的组件。
多媒体组件808包括在所述UE 800和用户之间的提供一个输出接口的屏幕。在一些实施例中,屏幕可以包括液晶显示器(LCD)和触摸面板(TP)。如果屏幕包括触摸面板,屏幕可以被实现为触摸屏,以接收来自用户的输入信号。触摸面板包括一个或多个触摸传感器以感测触摸、滑动和触摸面板上的手势。所述触摸传感器可以不仅感测触摸或滑动动作的边界,而且还检测与所述触摸或滑动操作相关的持续时间和压力。在一些实施例中,多媒体组件808包括一个前置摄像头和/或后置摄像头。当UE 800处于操作模式,如拍摄模式或视频模式时,前置摄像头和/或后置摄像头可以接收外部的多媒体数据。每个前置摄像头和后置摄像头可以是一个固定的光学透镜系统或具有焦距和光学变焦能力。
音频组件810被配置为输出和/或输入音频信号。例如,音频组件810包括一个麦克风(MIC),当UE 800处于操作模式,如呼叫模式、记录模式和语音识别模式时,麦克风被配置为接收外部音频信号。所接收的音频信号可以被进一步存储在存储器804或经由通信组件816发送。在一些实施例中,音频组件810还包括一个扬声器,用于输出音频信号。
I/O接口812为处理组件802和外围接口模块之间提供接口,上述外围接口模块可以是键盘,点击轮,按钮等。这些按钮可包括但不限于:主页按钮、音量按钮、启动按钮和锁定按钮。
传感器组件814包括一个或多个传感器,用于为UE 800提供各个方面的状态评估。例如,传感器组件814可以检测到设备800的打开/关闭状态,组件的相对定位,例如所述组件为UE 800的显示器和小键盘,传感器组件814还可以检测UE 800或UE 800一个组件的位置改变,用户与UE 800接触的存在或不存在,UE 800方位或加速/减速和UE 800的温度变化。传感器组件814可以包括接近传感器,被配置用来在没有任何的物理接触时检测附近物体的存在。传感器组件814还可以包括 光传感器,如CMOS或CCD图像传感器,用于在成像应用中使用。在一些实施例中,该传感器组件814还可以包括加速度传感器,陀螺仪传感器,磁传感器,压力传感器或温度传感器。
通信组件816被配置为便于UE 800和其他设备之间有线或无线方式的通信。UE 800可以接入基于通信标准的无线网络,如WiFi,2G或3G,或它们的组合。在一个示例性实施例中,通信组件816经由广播信道接收来自外部广播管理系统的广播信号或广播相关信息。在一个示例性实施例中,所述通信组件816还包括近场通信(NFC)模块,以促进短程通信。例如,在NFC模块可基于射频识别(RFID)技术,红外数据协会(IrDA)技术,超宽带(UWB)技术,蓝牙(BT)技术和其他技术来实现。
在示例性实施例中,UE 800可以被一个或多个应用专用集成电路(ASIC)、数字信号处理器(DSP)、数字信号处理设备(DSPD)、可编程逻辑器件(PLD)、现场可编程门阵列(FPGA)、控制器、微控制器、微处理器或其他电子元件实现,用于执行上述方法。
在示例性实施例中,还提供了一种包括指令的非临时性计算机可读存储介质,例如包括指令的存储器804,上述指令可由UE 800的处理器820执行以生成上述方法。例如,所述非临时性计算机可读存储介质可以是ROM、随机存取存储器(RAM)、CD-ROM、磁带、软盘和光数据存储设备等。
如图14所示,本公开一实施例示出一种网络设备的结构。例如,网络设备900可以被提供为一网络侧设备。该通信设备可为前述的接入网元和/或网络功能等各种网元。
参照图14,网络设备900包括处理组件922,其进一步包括一个或多个处理器,以及由存储器932所代表的存储器资源,用于存储可由处理组件922的执行的指令,例如应用程序。存储器932中存储的应用程序可以包括一个或一个以上的每一个对应于一组指令的模块。此外,处理组件922被配置为执行指令,以执行上述方法前述应用在所述接入设备的任意方法,例如,如图2至图9任意一个所示方法。
网络设备900还可以包括一个电源组件926被配置为执行网络设备900的电源管理,一个有线或无线网络接口950被配置为将网络设备900连接到网络,和一个输入输出(I/O)接口958。网络设备900可以操作基于存储在存储器932的操作系统,例如Windows Server TM,Mac OS XTM,UnixTM,LinuxTM,FreeBSDTM或类似。
本公开实施例提供一种计算机存储介质,所述计算机存储介质存储有可执行程序;所述可执行程序被处理器执行后,能够前述任意技术方案提供的信息处理方法,例如图2至图9所示方法中的一个或多个。
该计算机存储介质可包括但不限于非临时性计算机可读存储介质。
本领域技术人员在考虑说明书及实践这里公开的发明后,将容易想到本发明的其它实施方案。本公开旨在涵盖本发明的任何变型、用途或者适应性变化,这些变型、用途或者适应性变化遵循本发明的一般性原理并包括本公开未公开的本技术领域中的公知常识或惯用技术手段。说明书和实施例仅被视为示例性的,本发明的真正范围和精神由下面的权利要求指出。
应当理解的是,本发明并不局限于上面已经描述并在附图中示出的精确结构,并且可以在不脱 离其范围进行各种修改和改变。本发明的范围仅由所附的权利要求来限制。

Claims (28)

  1. 一种信息处理方法,由中继UE执行,其中所述中继UE能够分别与源UE和目标UE建立连接以作为中继实现源UE和目标UE之间的UE到UE中继通信;所述方法包括:
    向网络设备发送第一请求消息,其中,所述请求消息至少包括:中继业务码RSC;其中所述RSC用于标识中继业务;
    接收所述网络设备基于所述第一请求消息返回的第一响应消息,其中,所述中继UE具有提供所述RSC所指示中继业务的权限,所述第一响应消息包括:UE到UE的中继发现的安全参数;
    在接收到所述第一响应消息之后,监听所述源UE的第二请求消息;
    当所述中继UE支持所述第二请求消息包含所述RSC指示的中继业务时,根据所述第二请求消息和中继信息广播第三请求消息。
  2. 根据权利要求1所述的方法,其中,所述方法还包括:
    接收基于所述第三请求消息返回的第三响应消息;
    当接收到所述第三响应消息,向所述源UE返回第二响应消息。
  3. 根据权利要求2所述的方法,其中,所述当所述中继UE支持所述第二请求消息包含所述RSC指示的中继业务时,根据所述第二请求消息和中继信息广播第三请求消息,包括:
    当监听到所述第二请求消息包含所述RSC且使用所述安全参数对所述第二请求消息的安全验证通过之后,根据所述第二请求消息和中继信息广播第三请求消息。
  4. 根据权利要求1至3任一项所述的方法,其中,所述第二请求消息还包括以下至少之一:
    发现类型信息;
    所述源UE的设备信息;
    目标UE的设备信息。
  5. 根据权利要求1至3任一项所述的方法,其中,所述中继信息包括以下至少之一:
    所述中继UE的设备信息;
    中继指示。
  6. 一种信息处理方法,由源UE执行,所述方法包括:
    向网络设备发送第一请求消息,其中,所述请求消息至少包括:中继业务码RSC;其中所述RSC用于标识中继业务;
    接收所述网络设备基于所述第一请求消息返回的第一响应消息,其中,所述源UE具有获取所述RSC所指示中继业务的权限,所述第一响应消息包括:UE到UE的中继发现的安全参数;
    在接收到所述第一响应消息之后,广播第二请求消息;其中,所述第二请求消息,用于通过中继UE发现目标UE。
  7. 根据权利要求6所述的方法,其中,所述方法还包括:
    接收第二响应消息,其中,所述第二响应消息为:所述中继UE在接收到第三响应消息之后发 送的,其中,所述第三响应消息是:所述目标UE接收到基于所述第二请求消息和中继信息广播的第三请求消息后返回给所述中继UE的。
  8. 根据权利要求7所述的方法,其中,所述方法还包括:
    在接收到第二响应消息之后,与所述中继UE建立中继连接,其中,所述中继连接,用于所述源UE和所述目标UE的中继通信。
  9. 根据权利要求6至8任一项所述的方法,其中,所述方法还包括:
    在接收到所述第一响应消息之后,使用所述安全参数对所述第二请求消息进行安全处理;
    所述广播第二请求消息,包括:
    广播使用所述安全参数安全处理之后的所述第二请求消息。
  10. 一种信息处理方法,其中,由目标UE执行,所述方法包括:
    向网络设备发送第一请求消息,其中,所述请求消息至少包括:中继业务码RSC;其中所述RSC用于标识中继业务;
    接收所述网络设备基于所述第一请求消息返回的第一响应消息,其中,所述目标UE具有获取所述RSC所指示中继业务的权限,所述第一响应消息包括:UE到UE的中继发现的安全参数;
    在接收到所述第一响应消息之后监听第三请求消息;
    当所述目标UE支持所述第三请求消息携带的RSC指示的中继业务时,返回第三响应消息,其中,所述第三响应消息,用于供中继UE向源UE返回第二响应消息。
  11. 根据权利要求10所述的方法,其中,所述当所述目标UE支持所述第三请求消息携带的RSC指示的中继业务时,返回第三响应消息,包括:
    当所述目标UE支持所述第三请求消息携带的RSC指示的中继业务且所述第三请求消息通过基于所述安全参数进行的安全验证之后,返回第三响应消息。
  12. 根据权利要求10或11所述的方法,其中,所述方法还包括:
    在发送所述第三响应消息之后,接收中继UE的连接建立请求;
    基于所述连接建立请求,与所述中继UE建立中继连接,其中,所述中继连接,用于所述目标UE和源UE之间的中继通信。
  13. 根据权利要求10至12任一项所述的方法,其中,所述当所述目标UE支持所述第三请求消息携带的RSC指示的中继业务时,返回第三响应消息,包括:
    当所述目标UE支持所述第三请求消息携带的RSC所指示中继业务且选择中继UE获取中继服务时,返回第三响应消息,其中,所述第三响应消息,用于供中继UE向源UE返回第二响应消息。
  14. 一种信息处理装置,所述方法包括:
    第一发送模块,被配置为向网络设备发送第一请求消息,其中,所述请求消息至少包括:中继业务码RSC;其中所述RSC用于标识中继业务;
    第一接收模块,被配置为接收所述网络设备基于所述第一请求消息返回的第一响应消息,其中,所述中继UE具有提供所述RSC所指示中继业务的权限,所述第一响应消息包括:UE到UE的中继 发现的安全参数;
    第一监听模块,被配置为在接收到所述第一响应消息之后,监听源UE的第二请求消息;
    所述第一发送模块,被配置为当所述中继UE支持所述第二请求消息包含所述RSC指示的中继业务时,根据所述第二请求消息和中继信息广播第三请求消息。
  15. 根据权利要求14所述的装置,其中,
    所述第一接收模块,被配置为接收基于所述第三请求消息返回的第三响应消息;
    所述第一发送模块,还被配置为当接收到所述第三响应消息,向所述源UE返回第二响应消息。
  16. 根据权利要求15所述的方法,其中,所述当所述中继UE支持所述第二请求消息包含所述RSC指示的中继业务时,根据所述第二请求消息和中继信息广播第三请求消息,包括:
    当监听到所述第二请求消息包含所述RSC且使用所述安全参数对所述第二请求消息的安全验证通过之后,根据所述第二请求消息和中继信息广播第三请求消息。
  17. 根据权利要求14至16任一项所述的装置,其中,所述第二请求消息还包括以下至少之一:
    发现类型信息;
    所述源UE的设备信息;
    目标UE的设备信息。
  18. 根据权利要求14至16任一项所述的装置,其中,所述中继信息包括以下至少之一:
    所述中继UE的设备信息;
    中继指示。
  19. 一种信息处理装置,所述装置包括:
    第二发送模块,被配置为向网络设备发送第一请求消息,其中,所述请求消息至少包括:中继业务码RSC;其中所述RSC用于标识中继业务;
    第二接收模块,被配置为接收所述网络设备基于所述第一请求消息返回的第一响应消息,其中,所述源UE具有获取所述RSC所指示中继业务的权限,所述第一响应消息包括:UE到UE的中继发现的安全参数;
    所述第二发送模块,还被配置为在接收到所述第一响应消息之后,广播第二请求消息;其中,所述第二请求消息,用于通过中继UE发现目标UE。
  20. 根据权利要求19所述的装置,其中,所述第二接收模块,还被配置为接收第二响应消息,其中,所述第二响应消息为:所述中继UE在接收到第三响应消息之后发送的,其中,所述第三响应消息是:所述目标UE接收到基于所述第二请求消息和中继信息广播的第三请求消息后返回给所述中继UE的。
  21. 根据权利要求20所述的装置,其中,所述装置还包括:
    第一连接模块,还被配置为在接收到第二响应消息之后,与所述中继UE建立中继连接,其中,所述中继连接,用于所述源UE和所述目标UE的中继通信。
  22. 根据权利要求19至21任一项所述的装置,其中,所述装置还包括:
    第一处理模块,被配置为在接收到所述第一响应消息之后,使用所述安全参数对所述第二请求消息进行安全处理;
    所述第二发送模块,还被配置为广播使用所述安全参数安全处理之后的所述第二请求消息。
  23. 一种信息处理装置,其中,所述装置包括:
    第三发送模块,被配置为向网络设备发送第一请求消息,其中,所述请求消息至少包括:中继业务码RSC;其中所述RSC用于标识中继业务;
    第三接收模块,被配置为接收所述网络设备基于所述第一请求消息返回的第一响应消息,其中,所述目标UE具有获取所述RSC所指示中继业务的权限,所述第一响应消息包括:UE到UE的中继发现的安全参数;
    第二监听模块,被配置为在接收到所述第一响应消息之后监听第三请求消息;
    所述第三发送模块,被配置为当所述目标UE支持所述第三请求消息携带的RSC指示的中继业务时,返回第三响应消息,其中,所述第三响应消息,用于供中继UE向源UE返回第二响应消息。
  24. 根据权利要求23所述的装置,其中,所述第三发送模块,还被配置为当所述目标UE支持所述第三请求消息携带的RSC指示的中继业务且所述第三请求消息通过基于所述安全参数进行的安全验证之后,返回第三响应消息。
  25. 根据权利要求23或24所述的装置,其中,所述第三接收模块,还被配置为在发送所述第三响应消息之后,接收中继UE的连接建立请求;
    所述装置,还包括:
    第二连接模块,被配置为基于所述连接建立请求,与所述中继UE建立中继连接,其中,所述中继连接,用于所述目标UE和源UE之间的中继通信。
  26. 根据权利要求23至25任一项所述的装置,其中,所述第三发送模块,还被配置为当所述目标UE支持所述第三请求消息携带的RSC所指示中继业务且选择中继UE获取中继服务时,返回第三响应消息,其中,所述第三响应消息,用于供中继UE向源UE返回第二响应消息。
  27. 一种通信设备,包括处理器、收发器、存储器及存储在存储器上并能够有所述处理器运行的可执行程序,其中,所述处理器运行所述可执行程序时执行如权利要求1至5、6至9或10至13任一项提供的方法。
  28. 一种计算机存储介质,所述计算机存储介质存储有可执行程序;所述可执行程序被处理器执行后,能够实现如权利要求1至5、6至9或10至13任一项提供的方法。
PCT/CN2022/111826 2022-08-11 2022-08-11 信息处理方法及装置、通信设备及存储介质 WO2024031549A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2022/111826 WO2024031549A1 (zh) 2022-08-11 2022-08-11 信息处理方法及装置、通信设备及存储介质

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2022/111826 WO2024031549A1 (zh) 2022-08-11 2022-08-11 信息处理方法及装置、通信设备及存储介质

Publications (1)

Publication Number Publication Date
WO2024031549A1 true WO2024031549A1 (zh) 2024-02-15

Family

ID=89850382

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/111826 WO2024031549A1 (zh) 2022-08-11 2022-08-11 信息处理方法及装置、通信设备及存储介质

Country Status (1)

Country Link
WO (1) WO2024031549A1 (zh)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112788783A (zh) * 2019-11-07 2021-05-11 维沃移动通信有限公司 一种中继连接建立方法及设备
CN113438652A (zh) * 2020-03-04 2021-09-24 维沃移动通信有限公司 一种授权和策略参数配置方法、终端及网络功能
US20220109996A1 (en) * 2020-10-01 2022-04-07 Qualcomm Incorporated Secure communication link establishment for a ue-to-ue relay

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112788783A (zh) * 2019-11-07 2021-05-11 维沃移动通信有限公司 一种中继连接建立方法及设备
CN113438652A (zh) * 2020-03-04 2021-09-24 维沃移动通信有限公司 一种授权和策略参数配置方法、终端及网络功能
US20220109996A1 (en) * 2020-10-01 2022-04-07 Qualcomm Incorporated Secure communication link establishment for a ue-to-ue relay

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
INTERDIGITAL: "Solution for authorization and security with UE-to-Network relay using Remote UE network primary authentication", 3GPP DRAFT; S3-202665, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. SA WG3, no. e-meeting; 20201012 - 20201016, 2 October 2020 (2020-10-02), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France , XP051937965 *

Similar Documents

Publication Publication Date Title
CN108702288A (zh) 数据传输方法、设备及系统
WO2023184561A1 (zh) 中继通信方法、装置、通信设备及存储介质
WO2024031549A1 (zh) 信息处理方法及装置、通信设备及存储介质
WO2024031523A1 (zh) 信息处理方法及装置、通信设备及存储介质
WO2024092735A1 (zh) 通信控制方法、系统及装置、通信设备及存储介质
WO2023201551A1 (zh) 信息处理方法及装置、通信设备及存储介质
WO2023197178A1 (zh) 信息处理方法及装置、通信设备及存储介质
WO2023240574A1 (zh) 信息处理方法及装置、通信设备及存储介质
WO2024092796A1 (zh) 信息处理方法及装置、通信设备及存储介质
WO2024031640A1 (zh) 一种信息传输方法、装置、通信设备及存储介质
WO2024011457A1 (zh) 信息处理方法及装置、通信设备及存储介质
WO2024000123A1 (zh) 密钥生成方法及装置、通信设备及存储介质
WO2024092573A1 (zh) 信息处理方法及装置、通信设备及存储介质
WO2023245354A1 (zh) 安全保护方法、装置、通信设备及存储介质
WO2023184183A1 (zh) 信息处理方法及装置、通信设备及存储介质
WO2024000439A1 (zh) 信息处理方法及装置、通信设备及存储介质
WO2024031565A1 (zh) 信息处理方法以及装置、通信设备及存储介质
WO2023231018A1 (zh) 个人物联网pin基元凭证配置方法、装置、通信设备及存储介质
WO2024060091A1 (zh) 信息处理方法及装置、通信设备及存储介质
WO2024031711A1 (zh) 信息处理方法及装置、通信设备及存储介质
WO2023184548A1 (zh) 信息处理方法及装置、通信设备及存储介质
WO2024031556A1 (zh) 信息处理方法及装置、通信设备及存储介质
WO2024065312A1 (zh) 信息处理方法及装置、通信设备及存储介质
WO2023240575A1 (zh) 一种中继通信方法、通信装置及通信设备
WO2023070685A1 (zh) 中继通信的方法、装置、通信设备及存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22954516

Country of ref document: EP

Kind code of ref document: A1