WO2024031640A1 - 一种信息传输方法、装置、通信设备及存储介质 - Google Patents

一种信息传输方法、装置、通信设备及存储介质 Download PDF

Info

Publication number
WO2024031640A1
WO2024031640A1 PCT/CN2022/112127 CN2022112127W WO2024031640A1 WO 2024031640 A1 WO2024031640 A1 WO 2024031640A1 CN 2022112127 W CN2022112127 W CN 2022112127W WO 2024031640 A1 WO2024031640 A1 WO 2024031640A1
Authority
WO
WIPO (PCT)
Prior art keywords
discovery
security
relay
management function
relay discovery
Prior art date
Application number
PCT/CN2022/112127
Other languages
English (en)
French (fr)
Inventor
陆伟
Original Assignee
北京小米移动软件有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京小米移动软件有限公司 filed Critical 北京小米移动软件有限公司
Priority to CN202280003173.1A priority Critical patent/CN117882352A/zh
Priority to PCT/CN2022/112127 priority patent/WO2024031640A1/zh
Publication of WO2024031640A1 publication Critical patent/WO2024031640A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L27/00Modulated-carrier systems

Definitions

  • the present disclosure relates to but is not limited to the field of communication technology, and in particular, to an information transmission method, device, communication equipment and storage medium.
  • Proximity Services in the fifth generation ( 5th Generation) cellular mobile communication system
  • the remote UE and U2N relay need to discover each other before adopting the secure method.
  • U2N relay discovery before relay communication there are also two options: CP-based and UP-based security methods.
  • Embodiments of the present disclosure disclose an information transmission method, device, communication equipment and storage medium.
  • an information transmission method in which a security management function is discovered to be executed, including:
  • determining whether the UE adopts the security method assigned to the UE based on at least the relay discovery key request includes:
  • the method further includes:
  • determining relay discovery security parameters for the UE In response to determining that the UE adopts the security mode to which the UE is assigned, determining relay discovery security parameters for the UE and sending a first relay discovery key response to the UE indicating the relay discovery security parameters. .
  • the method further includes:
  • the security mode assigned to the UE is determined by the PCF of the UE and indicated to the UE.
  • the discovery security management function includes one of the following:
  • PMF ProSeKey Management Function
  • DDNMF Direct Discovery Name Management Function
  • an information transmission method is provided, wherein the information transmission method is executed by user equipment UE, including:
  • the relay service code RSC of the relay discovery carried in the relay discovery key request is at least used for policy control sent by the discovery security management function to the UE.
  • Function PCF and the PCF indicates the security mode allocated to the UE to the discovery security management function based on the RSC.
  • the method further includes:
  • the method further includes:
  • the security mode assigned to the UE is determined by the PCF of the UE and indicated to the UE.
  • the discovery security management function includes one of the following:
  • an information transmission method is provided, which is executed by the policy control function PCF, including:
  • the method further includes:
  • the security mode assigned to the UE is determined by the PCF of the UE and indicated to the UE.
  • an information transmission device wherein the device configured in the discovery security management function includes:
  • a transceiver module configured to receive a relay discovery key request sent by the user equipment UE via the base station, wherein the relay discovery key request is used to request a relay discovery key for relay discovery security parameters related to relay discovery. ask;
  • a processing module configured to determine, based at least on the relay discovery key request, whether the UE adopts the security mode assigned to the UE.
  • the transceiver module is further configured to: send a relay service code RSC associated with the relay discovery to the policy control function PCF of the UE, wherein the relay service code RSC is carried in The relay is discovering a key request;
  • the transceiver module is further configured to: receive indication information indicating the security mode assigned to the UE sent by the PCF to the discovery security management function in response to the RSC;
  • the processing module is specifically configured to determine whether the UE adopts the security mode assigned to the UE based on the security mode associated with the discovered security management function.
  • the processing module is further configured to determine a relay discovery security parameter of the UE in response to determining that the UE adopts the security mode assigned to the UE;
  • the transceiver module is further configured to: send a first relay discovery key response indicating the relay discovery security parameter to the UE.
  • the transceiver module is further configured to: in response to the UE not using the security method assigned to the UE, send a second relay discovery key response to the UE, wherein the second relay discovery key Response, used to indicate that the UE does not adopt the security mode assigned to the UE.
  • the security mode assigned to the UE is determined by the PCF of the UE and indicated to the UE.
  • the discovery security management function includes one of the following:
  • an information transmission device is provided, wherein the device is provided in user equipment UE and includes:
  • a transceiver module configured to: send a relay discovery key request to the discovery security management function via the base station, wherein the relay discovery key request is used to request relay discovery security parameters related to relay discovery; wherein, The relay discovery key request is at least used for the discovery security management function to determine whether the UE adopts the security mode assigned to the UE.
  • the relay service code RSC of the relay discovery carried in the relay discovery key request is at least used for policy control sent by the discovery security management function to the UE.
  • Function PCF and the PCF indicates the security mode allocated to the UE to the discovery security management function based on the RSC.
  • the transceiver module is further configured to: receive the first relay discovery key response indicating the relay discovery security parameters sent by the discovery security management function, wherein the relay discovery security parameters, It is determined after the discovery security management function determines that the UE adopts the security mode assigned to the UE.
  • the transceiver module is further configured to: receive a second relay discovery key response, wherein the second relay discovery key response is when the discovery security management function determines that the UE does not use the key assigned to the UE. Sent in a safe manner.
  • the security mode assigned to the UE is determined by the PCF of the UE and indicated to the UE.
  • the discovery security management function includes one of the following:
  • an information transmission device is provided, wherein the device is provided in the policy control function PCF and includes:
  • the transceiver module is configured to: receive the relay service code RSC of the relay discovery sent by the discovery security management function, where the RSC is used for the PCF to determine the security mode to which the user equipment UE is allocated, where the RSC , carried by the UE in the relay discovery key request and sent to the discovery security management function, wherein the relay discovery key request is at least used to request relay discovery security parameters related to the relay discovery. .
  • the transceiver module is further configured to: send indication information indicating the security mode assigned to the UE to the discovery security management function, where the indication information is used for the discovery security management function to determine whether the UE adopts the Describes the security method in which the UE is assigned.
  • the security mode assigned to the UE is determined by the PCF of the UE and indicated to the UE.
  • a communication device wherein the communication device includes:
  • memory for storing instructions executable by the processor
  • the processor is configured to implement the information transmission method described in the first aspect, the second aspect, or the third aspect when running the executable instructions.
  • a computer storage medium stores a computer executable program, and when the executable program is executed by a processor, the first aspect or the second aspect or the third aspect is implemented.
  • the information transmission method described in this aspect is provided, wherein the computer storage medium stores a computer executable program, and when the executable program is executed by a processor, the first aspect or the second aspect or the third aspect is implemented.
  • the discovery security management function performs receiving a relay discovery key request sent by the user equipment (UE) via the base station, wherein the relay discovery key request is used to request relay discovery of relay discovery security parameters related to the relay discovery. Key request; based at least on the relay discovery key request, determine whether the UE adopts the security method in which the UE is assigned. In this way, the discovery security management function determines whether the UE adopts the security method assigned to the UE based on the relay discovery key request, which can reduce the security risk caused by the inability of the discovery security management function to support the security method assigned to the UE. Improve relay service security.
  • Figure 1 is a schematic structural diagram of a wireless communication system.
  • Figure 2 is a flow chart of an information transmission method according to an exemplary embodiment.
  • Figure 3 is a flow chart of an information transmission method according to an exemplary embodiment.
  • Figure 4 is a flow chart of an information transmission method according to an exemplary embodiment.
  • Figure 5 is a flow chart of an information transmission method according to an exemplary embodiment.
  • Figure 6 is a flow chart of an information transmission method according to an exemplary embodiment.
  • Figure 7 is a flow chart of an information transmission method according to an exemplary embodiment.
  • Figure 8 is a flow chart of an information transmission method according to an exemplary embodiment.
  • Figure 9 is a flow chart of an information transmission method according to an exemplary embodiment.
  • Figure 10 is a flow chart of an information transmission method according to an exemplary embodiment.
  • Figure 11 is a block diagram of an information transmission device according to an exemplary embodiment.
  • Figure 12 is a block diagram of an information transmission device according to an exemplary embodiment.
  • Figure 13 is a block diagram of an information transmission device according to an exemplary embodiment.
  • Figure 14 is an organizational block diagram of a communication system according to an exemplary embodiment.
  • Figure 15 is a block diagram of a UE according to an exemplary embodiment.
  • Figure 16 is a block diagram of a base station according to an exemplary embodiment.
  • first, second, third, etc. may be used to describe various information in the embodiments of the present disclosure, the information should not be limited to these terms. These terms are only used to distinguish information of the same type from each other.
  • first information may also be called second information, and similarly, the second information may also be called first information.
  • word “if” as used herein may be interpreted as "when” or "when” or "in response to determining.”
  • FIG. 1 shows a schematic structural diagram of a wireless communication system provided by an embodiment of the present disclosure.
  • the wireless communication system is a communication system based on cellular mobile communication technology.
  • the wireless communication system may include several user equipments 110 and several base stations 120.
  • user equipment 110 may be a device that provides voice and/or data connectivity to a user.
  • the user equipment 110 may communicate with one or more core networks via a Radio Access Network (RAN).
  • RAN Radio Access Network
  • the user equipment 110 may be an Internet of Things user equipment, such as a sensor device, a mobile phone (or a "cellular" phone) ) and computers with IoT user equipment, which may be, for example, fixed, portable, pocket-sized, handheld, computer-built-in, or vehicle-mounted devices.
  • the user equipment 110 may also be equipment of an unmanned aerial vehicle.
  • the user equipment 110 may also be a vehicle-mounted device, for example, it may be an on-board computer with a wireless communication function, or a wireless user equipment connected to an external on-board computer.
  • the user equipment 110 may also be a roadside device, for example, it may be a streetlight, a signal light or other roadside device with a wireless communication function.
  • the base station 120 may be a network-side device in a wireless communication system.
  • the wireless communication system can be the 4th generation mobile communication technology (the 4th generation mobile communication, 4G) system, also known as the Long Term Evolution (LTE) system; or the wireless communication system can also be a 5G system, Also called new air interface system or 5G NR system.
  • the wireless communication system may also be a next-generation system of the 5G system.
  • the access network in the 5G system can be called the New Generation-Radio Access Network (NG-RAN).
  • NG-RAN New Generation-Radio Access Network
  • the base station 120 may be an evolved base station (eNB) used in the 4G system.
  • the base station 120 may also be a base station (gNB) that adopts a centralized distributed architecture in the 5G system.
  • eNB evolved base station
  • gNB base station
  • the base station 120 adopts a centralized distributed architecture it usually includes a centralized unit (central unit, CU) and at least two distributed units (distributed units, DU).
  • the centralized unit is equipped with a protocol stack including the Packet Data Convergence Protocol (PDCP) layer, the Radio Link Control protocol (Radio Link Control, RLC) layer, and the Media Access Control (Medium Access Control, MAC) layer;
  • PDCP Packet Data Convergence Protocol
  • RLC Radio Link Control
  • MAC Media Access Control
  • the distribution unit is provided with a physical (Physical, PHY) layer protocol stack, and the embodiment of the present disclosure does not limit the specific implementation of the base station 120.
  • a wireless connection may be established between the base station 120 and the user equipment 110 through a wireless air interface.
  • the wireless air interface is a wireless air interface based on the fourth generation mobile communication network technology (4G) standard; or the wireless air interface is a wireless air interface based on the fifth generation mobile communication network technology (5G) standard, such as
  • the wireless air interface is a new air interface; alternatively, the wireless air interface may also be a wireless air interface based on the next generation mobile communication network technology standard of 5G.
  • an E2E (End to End, end-to-end) connection can also be established between user equipments 110 .
  • vehicle-to-vehicle (V2V) communication vehicle-to-roadside equipment (vehicle to Infrastructure, V2I) communication and vehicle-to-person (vehicle to pedestrian, V2P) communication in vehicle networking communication (vehicle to everything, V2X) Wait for the scene.
  • V2V vehicle-to-vehicle
  • V2I vehicle-to-roadside equipment
  • V2P vehicle-to-person communication in vehicle networking communication
  • V2X vehicle networking communication
  • the above user equipment can be considered as the terminal equipment of the following embodiments.
  • the above-mentioned wireless communication system may also include a network management device 130.
  • the network management device 130 may be a core network device in a wireless communication system.
  • the network management device 130 may be a mobility management entity (Mobility Management Entity) in an evolved packet core network (Evolved Packet Core, EPC). MME).
  • the network management device can also be other core network devices, such as serving gateway (Serving GateWay, SGW), public data network gateway (Public Data Network GateWay, PGW), policy and charging rule functional unit (Policy and Charging Rules) Function, PCRF) or Home Subscriber Server (HSS), etc.
  • serving gateway Serving GateWay, SGW
  • public data network gateway Public Data Network GateWay, PGW
  • Policy and Charging Rules Policy and Charging Rules
  • PCRF Policy and Charging Rules
  • HSS Home Subscriber Server
  • the embodiments of the present disclosure enumerate multiple implementations to clearly describe the technical solutions of the embodiments of the present disclosure.
  • the multiple embodiments provided in the embodiments of the present disclosure can be executed alone or in combination with the methods of other embodiments in the embodiments of the present disclosure. They can also be executed alone or in combination. It is then executed together with some methods in other related technologies; the embodiments of the present disclosure do not limit this.
  • the 5G ProSe U2N relay discovery (UE-to-Network Relay Discovery) parameters can include control plane security indicators, which are provided by the PCF to the remote UE and Relay UE respectively. If the control plane security indicator is provided for a specific RSC, it indicates that the security mode is performed on the control plane. If no control plane security indicator is provided, secure mode is performed on the user plane.
  • the U2N relay can be configured to use a set of slices that support control plane-based security. When the requested slice corresponding to the control plane based security method is accepted, the U2N relay SHOULD include the RSC in the discovery message with the control plane security indicator set.
  • not all UEs can adopt the assigned security method according to the rules. For example: if the RSC assigned to the UE (including remote UE and/or relay UE) provides a control plane security indicator, the UE will still use the security method based on User-side security approach.
  • the embodiment of the present disclosure provides an information transmission method and is found to perform security management functions, including:
  • Step 201 Receive a relay discovery key request sent by the UE via the base station, where the relay discovery key request is used to request a relay discovery key request for relay discovery security parameters related to relay discovery;
  • Step 202 Based on at least the relay discovery key request, determine whether the UE adopts the security mode assigned to the UE.
  • This embodiment uses a 5G mobile communication system as an example for description.
  • the method of this embodiment is not limited to application to the 5G mobile communication system, and may be applied to next-generation mobile communication systems, for example. No limitation is made here.
  • the method of this embodiment can be applied to Model A and Model B discovered by 5G ProSe User to Network (U2N).
  • U2N 5G ProSe User to Network
  • security methods include control plane-based security methods and user plane-based security methods used in the 5G ProSe discovery process.
  • the discovery security management function may be a core network element used for security management in ProSe.
  • the relay discovery security parameters may include at least one of the following associated with relay discovery: a discovery key; an algorithm for encryption and integrity protection of discovery messages; timing parameters associated with a timer, etc.
  • the discovery security management function may be used to provide security keys, security algorithms, etc. to relay UEs and/or remote UEs.
  • different types of discovery security management functions are associated with different security methods.
  • one type of discovery security management function adopts a control plane-based security method
  • another type of discovery security management function adopts a user plane-based security method.
  • the discovery security management function includes one of the following:
  • PMF ProSeKey Management Function
  • DDNMF Direct Discovery Name Management Function
  • PKMF adopts a user plane-based security method.
  • DDNMF adopts a control plane-based security approach.
  • the UE can be a remote UE (remote UE) in 5G ProSe or a relay UE (Relay UE) in 5G ProSe.
  • the relay UE can be the U2N relay (User to Network Relay) in 5G ProSe.
  • the security mode assigned to the UE is determined by the PCF of the UE and indicated to the UE.
  • the security mode assigned to the UE may be determined by the PCF and indicated to the UE.
  • the PCF indicates to the UE the security mode that the UE needs to be assigned.
  • the UE obtains the address and discovery parameters of its discovery security management function from the PCF during the service authorization and information provision process.
  • the discovery parameters may include at least one of the following: RSC; control plane security indicator.
  • RSC control plane security indicator
  • the discovery parameter includes a control plane security indicator, it means that the PCF instructs the UE to adopt a control plane-based security method.
  • the control plane security indicator is associated with the RSC.
  • the UE can select the discovery security management function after determining its assigned security method, and send a Relay Discovery Key Request (Relay Discovery Key Request) to the discovery security management function.
  • Relay Discovery Key Request Relay Discovery Key Request
  • the RSC assigned to the UE provides a control plane security indicator, that is, the UE needs to implement a control plane-based security method, but the UE will still use user plane-based security methods.
  • PKMF using user plane-based security mode.
  • the RSC assigned to the UE does not provide a control plane security indicator, that is, the UE needs to implement a user plane-based security method, but the UE will still use a control plane-based security method, that is, to DDNMF (using a control plane-based security method). secure method) to send a relay discovery key request.
  • the security method of the relay service cannot be executed correctly, affecting the security of the relay service.
  • the security management function may determine the security manner in which the UE is assigned based on the relay discovery key request.
  • the relay discovery key request may carry indication information used to determine the security method assigned to the UE.
  • the indication information used to determine the security mode allocated to the UE may explicitly or implicitly indicate the security mode allocated to the UE.
  • the indication information used to determine the security mode assigned to the UE may include the RSC assigned to the UE.
  • the security mode supported by the security management function is consistent with the security mode assigned to the UE.
  • the security mode supported by the security management function may be inconsistent with the security mode assigned to the UE.
  • the security management function can compare the security mode supported by the security management function with the determined security mode assigned to the UE, and then whether the UE adopts the security mode assigned to the UE.
  • the discovery security management function determines whether the UE adopts the security method assigned to the UE based on the relay discovery key request, which can reduce the security risk caused by the inability of the discovery security management function to support the security method assigned to the UE and improve the efficiency of the UE. Following service security.
  • the relay discovery key request further includes at least one of the following:
  • UE security capability information such as supported security algorithms, etc.
  • the relay UE may send a relay discovery key request to the discovery security management function (PKMF or DDNMF) of the relay UE, and the relay discovery key request may carry at least one of the following: RSC, relay The identity of the UE and the security capability information of the relay UE.
  • PKMF discovery security management function
  • DDNMF discovery security management function
  • the remote UE may send a relay discovery key request to the discovery security management function (PKMF or DDNMF) of the remote UE.
  • the relay discovery key request may carry at least one of the following: RSC, identification of the remote UE. , the security capability information of the remote UE.
  • the core network elements of the relay UE and the remote UE may be the same or different. That is, the discovery security management function of the relay UE and the discovery security management function of the remote UE may be the same network element, or they may be different network elements.
  • the PCF of the relay UE and the PCF of the remote UE may be the same network element or different network elements.
  • determining whether the UE adopts the security method assigned to the UE based on at least the relay discovery key request includes:
  • the discovery security management function carries the UE's RSC in the Security Method Check Request and sends it to the UE's PCF.
  • the security management function is preset with mapping tables for different UE and PCF addresses.
  • the discovery security management function may have a mapping table between the identity of the UE and the PCF address.
  • the discovery security management function can determine the address of the UE's PCF based on the UE's identity in the relay discovery key request, and then send the RSC carried by the UE in the relay discovery key request to the PCF.
  • the PCF can configure RSC for UE during the process of UE service authorization and information configuration.
  • the RSC may have a corresponding control plane security indicator, indicating that the UE assigned to the RSC needs to perform a control plane-based security method during the discovery process. If the RSC may not have a corresponding control plane security indicator, then the UE assigned to the RSC needs to implement a user plane-based security method during the discovery process.
  • PCF can save the correspondence between each RSC and the corresponding security method.
  • the PCF may determine the security mode corresponding to the RSC based on the correspondence between the RSC and the corresponding security mode.
  • the PCF sends the security method corresponding to the determined RSC to the discovery security management function through instruction information, and notifies the discovery security management function of the security method assigned to the UE.
  • the PCF carries the indication information of the determined security method assigned to the UE in a Security Method Check Response (Security Method Check Response) and sends it to the security management function.
  • a Security Method Check Response Security Method Check Response
  • the security management function sends a security mode check request carrying RSC to the PCF of the UE
  • the security mode check request carries the identity of the UE.
  • Corresponding UE in the requested security manner.
  • the PCF carries the identity of the UE corresponding to the security mode in the security mode check response. To inform the corresponding UE of the security mode.
  • the discovery security management function After the discovery security management function receives the security mode assigned to the UE indicated by the PCF, it determines whether it supports it. If it is determined that the security mode of the security management function itself is the same as the security mode assigned to the UE indicated by the PCF, it can be determined that the UE adopts the security mode assigned to the UE. If it is determined that the security mode of the security management function itself is different from the security mode assigned to the UE indicated by the PCF, it may be determined that the UE does not adopt the security mode assigned to the UE.
  • the security mode in which the UE is assigned is determined by the PCF. Improve the accuracy of determining the security method in which a UE is assigned. Then determining whether the UE adopts the assigned security method can reduce the security risks caused by finding that the security management function cannot support the UE's assigned security method and improve the security of relay services.
  • the embodiment of the present disclosure provides an information transmission method and is found to perform security management functions, including:
  • Step 301 In response to determining that the UE adopts the security mode assigned to the UE, determine relay discovery security parameters of the UE, and send a first relay discovery indicating the relay discovery security parameters to the UE. Key response.
  • Step 301 can be implemented alone or in combination with step 201.
  • security management function execution can provide security services to the UE after it is determined that the security management function supports the assigned security mode of the UE, that is, the UE adopts the assigned security mode.
  • the discovery security management function can determine the relay discovery security parameters of the UE. and sends relay discovery security parameters to the UE.
  • the relay discovery security parameters include but are not limited to at least one of the following: discovery keys; discovery message encryption and integrity protection algorithms; timing parameters associated with timers, etc.
  • determining the relay discovery security parameters of the UE and sending a first relay discovery key response indicating the relay discovery security parameters to the UE includes:
  • the key management function determines the relay discovery security parameters of the relay UE, and sends a first message indicating the relay discovery security parameters to the relay UE. Following the discovered key response.
  • the relay The UE's discovery security management function (5G PKMF or 5G DDNMF) generates discovery security materials (ie, relay discovery security parameters) for the relay UE.
  • the discovery security management function of the relay UE also selects algorithms for encryption and integrity protection of discovery messages broadcast between UEs based on the received security capability information of the relay UE.
  • the discovery security management function of the relay UE sends a first relay discovery key response (Relay Discovery Key Response) message carrying the relay discovery security parameters to the relay UE.
  • determining the relay discovery security parameters of the UE and sending a first relay discovery key response indicating the discovery relay security parameters to the UE includes:
  • a relay discovery key response indicating the relay discovery security parameters is sent to the remote UE.
  • the remote UE's discovery security management function For example, if the security method received by the remote UE's discovery security management function from the PCF matches the role of the remote UE's discovery security management function (that is, the remote UE adopts the assigned security method), then the remote UE's discovery security
  • the management function (5G PKMF or 5G DDNMF) locates the discovery security management function (5G PKMF or 5G DDNMF) of the potential relay UE based on the received RSC, and then forwards the Relay Discovery Key Request (Relay Discovery Key Request) message to Discovery security management function of relay UE.
  • the discovery security management function of the relay UE receives the relay discovery key request message from the discovery security management function of the remote UE and authorizes one of the relay UEs in its domain to provide relay services based on the received RCS.
  • the discovery security management function of the relay UE retrieves the relay discovery security parameters generated for the RSC and responds to the discovery security management function of the remote UE with a relay discovery key response message.
  • the discovery security management function of the remote UE forwards the relay discovery security parameters in the Relay Discovery Key Response (Relay Discovery Key Response) message to the remote UE.
  • Relay Discovery Key Response Relay Discovery Key Response
  • the remote UE and the relay UE perform discovery processes on PC5 respectively and discover each other. It should be noted that if either the remote UE and the relay UE fail to obtain the relay discovery security parameters, the UE will not be able to send protected discovery messages or understand/verify the received discovery messages in order to successfully discover each other, That is, only UEs that correctly use the security method allocated for RSC can discover each other.
  • the embodiment of the present disclosure provides an information transmission method and is found to perform security management functions, including:
  • Step 401 In response to the UE not using the security mode assigned to the UE, send a second relay discovery key response to the UE, where the second relay discovery key response is used to indicate the The UE does not adopt the security mode assigned to the UE.
  • Step 401 can be implemented alone or in combination with step 201 and/or step 301.
  • the discovery security management function sends a second relay discovery key response to the UE and explains to the UE the reason for the failure to obtain the relay discovery security parameters.
  • this embodiment of the present disclosure provides an information transmission method, which is executed by the UE and includes:
  • Step 501 Send a relay discovery key request to the discovery security management function via the base station, where the relay discovery key request is used to request relay discovery security parameters related to relay discovery; wherein the relay The discovery key request is at least used for the discovery security management function to determine whether the UE adopts the security mode assigned to the UE.
  • This embodiment uses a 5G mobile communication system as an example for description.
  • the method of this embodiment is not limited to application to the 5G mobile communication system, and may be applied to next-generation mobile communication systems, for example. No limitation is made here.
  • the method of this embodiment can be applied to Model A and Model B discovered by 5G ProSe User to Network (U2N).
  • U2N 5G ProSe User to Network
  • security methods include control plane-based security methods and user plane-based security methods used in the 5G ProSe discovery process.
  • the discovery security management function may be a core network element used for security management in ProSe.
  • the relay discovery security parameters may include at least one of the following associated with relay discovery: a discovery key; an algorithm for encryption and integrity protection of discovery messages; timing parameters associated with a timer, etc.
  • the discovery security management function may be used to provide security keys, security algorithms, etc. to relay UEs and/or remote UEs.
  • different types of discovery security management functions are associated with different security methods.
  • one type of discovery security management function adopts a control plane-based security method
  • another type of discovery security management function adopts a user plane-based security method.
  • the discovery security management function includes one of the following:
  • PKMF adopts a user plane-based security method.
  • DDNMF adopts a control plane-based security approach.
  • the UE can be a remote UE (remote UE) in 5G ProSe or a relay UE (Relay UE) in 5G ProSe.
  • the relay UE can be the U2N relay (User to Network Relay) in 5G ProSe.
  • the security mode assigned to the UE is determined by the PCF of the UE and indicated to the UE.
  • the security mode assigned to the UE may be determined by the PCF and indicated to the UE.
  • the PCF indicates to the UE the security mode that the UE needs to be assigned.
  • the UE obtains the address and discovery parameters of its discovery security management function from the PCF during the service authorization and information provision process.
  • the discovery parameters may include at least one of the following: RSC; control plane security indicator.
  • RSC control plane security indicator
  • the discovery parameter includes a control plane security indicator, it means that the PCF instructs the UE to adopt a control plane-based security method.
  • the control plane security indicator is associated with the RSC.
  • the UE can select the discovery security management function after determining its assigned security method, and send a Relay Discovery Key Request (Relay Discovery Key Request) to the discovery security management function.
  • Relay Discovery Key Request Relay Discovery Key Request
  • the RSC assigned to the UE provides a control plane security indicator, that is, the UE needs to implement a control plane-based security method, but the UE will still use user plane-based security methods.
  • PKMF using user plane-based security mode.
  • the RSC assigned to the UE does not provide a control plane security indicator, that is, the UE needs to implement a user plane-based security method, but the UE will still use a control plane-based security method, that is, to DDNMF (using a control plane-based security method). secure method) to send a relay discovery key request.
  • the security method of the relay service cannot be executed correctly, affecting the security of the relay service.
  • the security management function may determine the security manner in which the UE is assigned based on the relay discovery key request.
  • the relay discovery key request may carry indication information used to determine the security method assigned to the UE.
  • the indication information used to determine the security mode allocated to the UE may explicitly or implicitly indicate the security mode allocated to the UE.
  • the indication information used to determine the security mode assigned to the UE may include the RSC assigned to the UE.
  • the security mode supported by the security management function is consistent with the security mode assigned to the UE.
  • the security mode supported by the security management function may be inconsistent with the security mode assigned to the UE.
  • the security management function can compare the security mode supported by the security management function with the determined security mode assigned to the UE, and then whether the UE adopts the security mode assigned to the UE.
  • the discovery security management function determines whether the UE adopts the security method assigned to the UE based on the relay discovery key request, which can reduce the security risk caused by the inability of the discovery security management function to support the security method assigned to the UE and improve the efficiency of the UE. Following service security.
  • the relay discovery key request further includes at least one of the following:
  • UE security capability information such as supported security algorithms, etc.
  • the relay UE may send a relay discovery key request to the discovery security management function (PKMF or DDNMF) of the relay UE, and the relay discovery key request may carry at least one of the following: RSC, relay The identity of the UE and the security capability information of the relay UE.
  • PKMF discovery security management function
  • DDNMF discovery security management function
  • the remote UE may send a relay discovery key request to the discovery security management function (PKMF or DDNMF) of the remote UE.
  • the relay discovery key request may carry at least one of the following: RSC, identification of the remote UE. , the security capability information of the remote UE.
  • the core network elements of the relay UE and the remote UE may be the same or different. That is, the discovery security management function of the relay UE and the discovery security management function of the remote UE may be the same network element, or they may be different network elements.
  • the PCF of the relay UE and the PCF of the remote UE may be the same network element or different network elements.
  • the relay service code RSC of the relay discovery carried in the relay discovery key request is at least used for policy control sent by the discovery security management function to the UE.
  • Function PCF and the PCF indicates the security mode allocated to the UE to the discovery security management function based on the RSC.
  • the discovery security management function carries the UE's RSC in the Security Method Check Request and sends it to the UE's PCF.
  • the security management function is preset with mapping tables for different UE and PCF addresses.
  • the discovery security management function may have a mapping table between the identity of the UE and the PCF address.
  • the discovery security management function can determine the address of the UE's PCF based on the UE's identity in the relay discovery key request, and then send the RSC carried by the UE in the relay discovery key request to the PCF.
  • the PCF can configure RSC for UE during the process of UE service authorization and information configuration.
  • the RSC may have a corresponding control plane security indicator, indicating that the UE assigned to the RSC needs to perform a control plane-based security method during the discovery process. If the RSC may not have a corresponding control plane security indicator, then the UE assigned to the RSC needs to implement a user plane-based security method during the discovery process.
  • PCF can save the correspondence between each RSC and the corresponding security method.
  • the PCF may determine the security mode corresponding to the RSC based on the correspondence between the RSC and the corresponding security mode.
  • the PCF sends the security method corresponding to the determined RSC to the discovery security management function through instruction information, and notifies the discovery security management function of the security method assigned to the UE.
  • the PCF carries the determined indication information of the security method assigned to the UE in a Security Method Check Response (Security Method Check Response) and sends it to the security management function.
  • a Security Method Check Response Security Method Check Response
  • the security management function sends a security mode check request carrying RSC to the PCF of the UE
  • the security mode check request carries the identity of the UE.
  • Corresponding UE in the requested security manner.
  • the PCF carries the identity of the UE corresponding to the security mode in the security mode check response. To inform the corresponding UE of the security mode.
  • the discovery security management function After the discovery security management function receives the security mode assigned to the UE indicated by the PCF, it determines whether it supports it. If it is determined that the security mode of the security management function itself is the same as the security mode assigned to the UE indicated by the PCF, it can be determined that the UE adopts the security mode assigned to the UE. If it is determined that the security mode of the security management function itself is different from the security mode assigned to the UE indicated by the PCF, it may be determined that the UE does not adopt the security mode assigned to the UE.
  • the security mode in which the UE is assigned is determined by the PCF. Improve the accuracy of determining the security method in which a UE is assigned. Then determining whether the UE adopts the assigned security method can reduce the security risks caused by finding that the security management function cannot support the UE's assigned security method and improve the security of relay services.
  • the embodiment of the present disclosure provides an information transmission method, which is executed by the UE, including:
  • Step 601 Receive the first relay discovery key response indicating relay discovery security parameters sent by the discovery security management function, wherein the relay discovery security parameters are determined by the discovery security management function of the UE Determined after adopting the security mode assigned to the UE.
  • Step 601 can be implemented alone or in combination with step 501.
  • security management function execution can provide security services to the UE after it is determined that the security management function supports the assigned security mode of the UE, that is, the UE adopts the assigned security mode.
  • the discovery security management function can determine the relay discovery security parameters of the UE. and sends relay discovery security parameters to the UE.
  • the relay discovery security parameters include but are not limited to at least one of the following: discovery keys; discovery message encryption and integrity protection algorithms; timing parameters associated with timers, etc.
  • determining the relay discovery security parameters of the UE and sending a first relay discovery key response indicating the relay discovery security parameters to the UE includes:
  • the key management function determines the relay discovery security parameters of the relay UE, and sends a first message indicating the relay discovery security parameters to the relay UE. Following the discovered key response.
  • the relay The UE's discovery security management function (5G PKMF or 5G DDNMF) generates discovery security materials (ie, relay discovery security parameters) for the relay UE.
  • the discovery security management function of the relay UE also selects algorithms for encryption and integrity protection of discovery messages broadcast between UEs based on the received security capability information of the relay UE.
  • the discovery security management function of the relay UE sends a first relay discovery key response (Relay Discovery Key Response) message carrying the relay discovery security parameters to the relay UE.
  • determining the relay discovery security parameters of the UE and sending a first relay discovery key response indicating the discovery relay security parameters to the UE includes:
  • a relay discovery key response indicating the relay discovery security parameters is sent to the remote UE.
  • the remote UE's discovery security management function For example, if the security method received by the remote UE's discovery security management function from the PCF matches the role of the remote UE's discovery security management function (that is, the remote UE adopts the assigned security method), then the remote UE's discovery security
  • the management function (5G PKMF or 5G DDNMF) locates the discovery security management function (5G PKMF or 5G DDNMF) of the potential relay UE based on the received RSC, and then forwards the Relay Discovery Key Request (Relay Discovery Key Request) message to Discovery security management function of relay UE.
  • the discovery security management function of the relay UE receives the relay discovery key request message from the discovery security management function of the remote UE and authorizes one of the relay UEs in its domain to provide relay services based on the received RCS.
  • the discovery security management function of the relay UE retrieves the relay discovery security parameters generated for the RSC and responds to the discovery security management function of the remote UE with a relay discovery key response message.
  • the discovery security management function of the remote UE forwards the relay discovery security parameters in the Relay Discovery Key Response (Relay Discovery Key Response) message to the remote UE.
  • Relay Discovery Key Response Relay Discovery Key Response
  • the remote UE and the relay UE perform discovery processes on PC5 respectively and discover each other. It should be noted that if either the remote UE and the relay UE fail to obtain the relay discovery security parameters, the UE will not be able to send protected discovery messages or understand/verify the received discovery messages in order to successfully discover each other, That is, only UEs that correctly use the security method allocated for RSC can discover each other.
  • this embodiment of the present disclosure provides an information transmission method, which is executed by the UE and includes:
  • Step 701 Receive a second relay discovery key response, where the second relay discovery key response is sent after the discovery security management function determines that the UE does not adopt the security method assigned to the UE.
  • Step 701 can be implemented alone or in combination with step 501 and/or step 601.
  • the discovery security management function sends a second relay discovery key response to the UE and explains to the UE the reason for the failure to obtain the relay discovery security parameters.
  • the embodiment of the present disclosure provides an information transmission method, which is executed by PCF, including:
  • Step 801 Receive the RSC of the relay discovery sent by the discovery security management function, where the RSC is used for the PCF to determine the security mode assigned to the UE, where the RSC is carried by the UE.
  • the relay discovery key request is sent to the discovery security management function, wherein the relay discovery key request is at least used to request relay discovery security parameters related to the relay discovery.
  • This embodiment uses a 5G mobile communication system as an example for description.
  • the method of this embodiment is not limited to application to the 5G mobile communication system, and may be applied to next-generation mobile communication systems, for example. No limitation is made here.
  • the method of this embodiment can be applied to Model A and Model B discovered by 5G ProSe User to Network (U2N).
  • U2N 5G ProSe User to Network
  • security methods include control plane-based security methods and user plane-based security methods used in the 5G ProSe discovery process.
  • the discovery security management function may be a core network element used for security management in ProSe.
  • the relay discovery security parameters may include at least one of the following associated with relay discovery: a discovery key; an algorithm for encryption and integrity protection of discovery messages; timing parameters associated with a timer, etc.
  • the discovery security management function may be used to provide security keys, security algorithms, etc. to relay UEs and/or remote UEs.
  • different types of discovery security management functions are associated with different security methods.
  • one type of discovery security management function adopts a control plane-based security method
  • another type of discovery security management function adopts a user plane-based security method.
  • the discovery security management function includes one of the following:
  • PMF ProSeKey Management Function
  • DDNMF Direct Discovery Name Management Function
  • PKMF adopts a user plane-based security method.
  • DDNMF adopts a control plane-based security approach.
  • the UE can be a remote UE (remote UE) in 5G ProSe or a relay UE (Relay UE) in 5G ProSe.
  • the relay UE can be the U2N relay (User to Network Relay) in 5G ProSe.
  • the security mode assigned to the UE is determined by the PCF of the UE and indicated to the UE.
  • the security mode assigned to the UE may be determined by the PCF and indicated to the UE.
  • the PCF indicates to the UE the security mode that the UE needs to be assigned.
  • the UE obtains the address and discovery parameters of its discovery security management function from the PCF during the service authorization and information provision process.
  • the discovery parameters may include at least one of the following: RSC; control plane security indicator.
  • RSC control plane security indicator
  • the discovery parameter includes a control plane security indicator, it means that the PCF instructs the UE to adopt a control plane-based security method.
  • the control plane security indicator is associated with the RSC.
  • the UE can select the discovery security management function after determining its assigned security method, and send a Relay Discovery Key Request (Relay Discovery Key Request) to the discovery security management function.
  • Relay Discovery Key Request Relay Discovery Key Request
  • the RSC assigned to the UE provides a control plane security indicator, that is, the UE needs to implement a control plane-based security method, but the UE will still use user plane-based security methods.
  • PKMF using user plane-based security mode.
  • the RSC assigned to the UE does not provide a control plane security indicator, that is, the UE needs to implement a user plane-based security method, but the UE will still use a control plane-based security method, that is, to DDNMF (using a control plane-based security method). secure method) to send a relay discovery key request.
  • the security method of the relay service cannot be executed correctly, affecting the security of the relay service.
  • the security management function may determine the security manner in which the UE is assigned based on the relay discovery key request.
  • the relay discovery key request may carry indication information used to determine the security method assigned to the UE.
  • the indication information used to determine the security mode allocated to the UE may explicitly or implicitly indicate the security mode allocated to the UE.
  • the indication information used to determine the security mode assigned to the UE may include the RSC assigned to the UE.
  • the security mode supported by the security management function is consistent with the security mode assigned to the UE.
  • the security mode supported by the security management function may be inconsistent with the security mode assigned to the UE.
  • the security management function can compare the security mode supported by the security management function with the determined security mode assigned to the UE, and then whether the UE adopts the security mode assigned to the UE.
  • the discovery security management function determines whether the UE adopts the security method assigned to the UE based on the relay discovery key request, which can reduce the security risk caused by the inability of the discovery security management function to support the security method assigned to the UE and improve the efficiency of the UE. Following service security.
  • the relay discovery key request further includes at least one of the following:
  • UE security capability information such as supported security algorithms, etc.
  • the relay UE may send a relay discovery key request to the discovery security management function (PKMF or DDNMF) of the relay UE, and the relay discovery key request may carry at least one of the following: RSC, relay The identity of the UE and the security capability information of the relay UE.
  • PKMF discovery security management function
  • DDNMF discovery security management function
  • the remote UE may send a relay discovery key request to the discovery security management function (PKMF or DDNMF) of the remote UE.
  • the relay discovery key request may carry at least one of the following: RSC, identification of the remote UE. , the security capability information of the remote UE.
  • the core network elements of the relay UE and the remote UE may be the same or different. That is, the discovery security management function of the relay UE and the discovery security management function of the remote UE may be the same network element, or they may be different network elements.
  • the PCF of the relay UE and the PCF of the remote UE may be the same network element or different network elements.
  • the embodiment of the present disclosure provides an information transmission method, which is executed by PCF, including:
  • Step 901 Send indication information indicating the assigned security mode of the UE to the discovery security management function.
  • the indication information is used for the discovery security management function to determine whether the UE adopts the security mode assigned to the UE. Way.
  • Step 901 can be implemented alone or in combination with step 801.
  • the discovery security management function carries the UE's RSC in the Security Method Check Request and sends it to the UE's PCF.
  • the security management function is preset with mapping tables for different UE and PCF addresses.
  • the discovery security management function may have a mapping table between the identity of the UE and the PCF address.
  • the discovery security management function can determine the address of the UE's PCF based on the UE's identity in the relay discovery key request, and then send the RSC carried by the UE in the relay discovery key request to the PCF.
  • the PCF can configure RSC for UE during the process of UE service authorization and information configuration.
  • the RSC may have a corresponding control plane security indicator, indicating that the UE assigned to the RSC needs to perform a control plane-based security method during the discovery process. If the RSC may not have a corresponding control plane security indicator, then the UE assigned to the RSC needs to implement a user plane-based security method during the discovery process.
  • PCF can save the correspondence between each RSC and the corresponding security method.
  • the PCF may determine the security mode corresponding to the RSC based on the correspondence between the RSC and the corresponding security mode.
  • the PCF sends the security method corresponding to the determined RSC to the discovery security management function through indication information, and notifies the discovery security management function of the security method assigned to the UE.
  • the PCF carries the determined indication information of the security method assigned to the UE in a Security Method Check Response (Security Method Check Response) and sends it to the security management function.
  • a Security Method Check Response Security Method Check Response
  • the security management function sends a security mode check request carrying RSC to the PCF of the UE
  • the security mode check request carries the identity of the UE.
  • Corresponding UE in the requested security manner.
  • the PCF carries the identity of the UE corresponding to the security mode in the security mode check response. To inform the corresponding UE of the security mode.
  • the discovery security management function After the discovery security management function receives the security mode assigned to the UE indicated by the PCF, it determines whether it supports it. If it is determined that the security mode of the security management function itself is the same as the security mode assigned to the UE indicated by the PCF, it can be determined that the UE adopts the security mode assigned to the UE. If it is determined that the security mode of the security management function itself is different from the security mode assigned to the UE indicated by the PCF, it may be determined that the UE does not adopt the security mode assigned to the UE.
  • the security mode in which the UE is assigned is determined by the PCF. Improve the accuracy of determining the security method in which a UE is assigned. Determining whether the UE adopts the assigned security method can then reduce the security risk caused by finding that the security management function cannot support the UE's assigned security method, and improve the security of relay services.
  • the PCF method corresponds to the aforementioned UE-side embodiment.
  • the network-side device and the UE need to enter or stop the DRX cycle at the same time to maintain synchronization, and the settings of timers and so on are all implemented synchronously. Therefore, the same explanations or features will not be repeated one by one, and reference can be made to the foregoing embodiments.
  • the security management function execution method is consistent with the information transmission method executed by the discovery security management function side.
  • the UE execution method is consistent with the information transmission method executed by the UE side. This is not the case. Again.
  • the information transmission method proposed in this example is applicable to Model A and Model B of ProSe U2N Discovery.
  • the 5G PKMF/DDNMF of the remote UE is configured with a mapping table between the RSC and the 5G PKMF/DDNMF address of the potential U2N relay (Relay) of the relay service represented by the RSC.
  • the information transmission method specifically includes:
  • Step 100a The remote UE obtains its 5G PKMF address and discovery parameters (RSC and optional control plane security indicator) from the PCF during the service authorization and information provision process.
  • RSC 5G PKMF address and discovery parameters
  • Step 100b The U2N relay obtains its 5G PKMF address and discovery parameters (RSC and optional control plane security indicator) from the PCF during the service authorization and information provision process.
  • RSC 5G PKMF address and discovery parameters
  • Step 101 Based on the availability of the CP security indicator, the U2N relay decides to send its 5G PKMF (if the requested RSC is not assigned a CP security indicator) or 5G DDNMF (if the requested RSC is assigned a CP security indicator). Following the discovery key request message).
  • the message includes the RSC, the U2N relay ID, and the security capabilities of the U2N relay indicating the requested relay service to perform discovery.
  • Step 102 5G PKMF/DDNMF of the U2N Relay
  • the U2N relay is authorized to serve the relay service based on the RSC verification received (e.g. using UDM or PCF).
  • Step 103 The 5G PKMF/DDNMF of the U2N relay sends a security method check request to the PCF of the U2N relay to check the security method assigned to the RSC.
  • the request includes at least the RSC and relay UE ID.
  • Step 104 The PCF of the U2N relay checks the security method assigned to the RSC based on the received RSC and Relay UE ID, and sends a security method check response to the 5G PKMF/DDNMF of the U2N relay to inform the security method.
  • Step 105a If the security method received from the PCF matches its own role, the U2N relay's 5G PKMF/DDNMF generates discovery security material for the U2N relay. Based on the received security capabilities of the U2N relay, the 5G PKMF/DDNMF of the U2N relay also selects algorithms for encryption and integrity protection of discovery messages broadcast between UEs. The 5G PKMF/DDNMF of the U2N relay then sends a Relay Discovery Key Response message to the U2N relay.
  • Step 105a If the security method received from the PCF does not match its role, the U2N relay's 5G PKMF/DDNMF will not generate any discovery security material for the U2N relay and sends a relay discovery key response to the U2N relay (Relay Discovery Key Response) message failure reason.
  • the U2N relay's 5G PKMF/DDNMF will not generate any discovery security material for the U2N relay and sends a relay discovery key response to the U2N relay (Relay Discovery Key Response) message failure reason.
  • Step 106 The remote UE sends a relay discovery key request message to its 5G PKMF/DDNMF.
  • the message includes the RSC indicating the relay service performing the discovery, the remote UE ID, and the security capabilities of the remote UE.
  • Step 107 5G PKMF/DDNMF of the remote UE verifies (e.g. using UDM or PCF) that the remote UE has the authority to request the relay service indicated by the RSC.
  • 5G PKMF/DDNMF of the remote UE verifies (e.g. using UDM or PCF) that the remote UE has the authority to request the relay service indicated by the RSC.
  • Step 108 The 5G PKMF/DDNMF of the remote UE sends a security method check request to the PCF of the remote UE to check the security method assigned to the RSC.
  • the request includes at least the RSC and remote UE ID.
  • Step 109 Based on the received RSC and remote UE ID, the PCF of the remote UE checks the security method assigned to the RSC and sends a security method check response notification security method to the 5G PKMF/DDNMF of the remote UE.
  • Step 110a If the security method received from the PCF matches its own role, the remote UE's 5G PKMF/DDNMF locates the potential U2N relay's 5G PKMF/DDNMF based on the received RSC, and then sends the relay discovery key request ( Relay Discovery Key Request) message is forwarded to the PKMF/DDNMf of the 5G U2N relay.
  • the relay discovery key request Relay Discovery Key Request
  • Step 110b If the security method received from the PCF does not match its own role, the 5G PKMF/DDNMF of the remote UE will not forward the Relay Discovery Key Request message to the 5G PKMF/DDNMf of the U2N relay, but will send the Relay Discovery Key Request message. Key's response message to the U2N relay, indicating the reason for the failure.
  • Step 111 If a Relay Discovery Key Request message is received from the remote UE's 5G PKMF/DDNMF, the U2N relay's 5G PKMF/DDNMF authorizes the received RSC to be served by one of the U2N relays in its domain.
  • Step 112 Based on the received RSC, the U2N relay's 5G PKMF/DDNMF retrieves the discovery security material generated for the RSC in step 105a and responds to the remote UE's 5G PKMF with the relay discovery key response message.
  • Step 113 The 5G PKMF/DDNMF of the remote UE forwards the Relay Discovery Key Response message (including discovered security material, selected algorithm, etc.) to the remote UE.
  • the Relay Discovery Key Response message including discovered security material, selected algorithm, etc.
  • Step 114 The U2N relay and the remote UE perform the discovery process on PC5 respectively and discover each other. It is important to note that if one or both UEs fail to obtain discovery security material in step #5b and/or step #10b, the UE will not be able to send protected discovery messages or understand/verify received messages. Discovery messages so that UEs cannot successfully discover each other, i.e. only UEs that correctly use the security method assigned for RSC can discover each other.
  • Step 115 The remote UE and the U2N relay continue to perform the remaining procedures of the relay service.
  • an embodiment of the present disclosure provides an information transmission device 100, which is provided in the discovery security management function and includes:
  • the transceiver module 110 is configured to receive a relay discovery key request sent by the user equipment UE via the base station, wherein the relay discovery key request is used to request a relay discovery key for relay discovery security parameters related to relay discovery. Key request;
  • the processing module 120 is configured to determine, based at least on the relay discovery key request, whether the UE adopts the security mode assigned to the UE.
  • the transceiver module 110 is further configured to: send a relay service code RSC associated with the relay discovery to the policy control function PCF of the UE, where the relay service code RSC carries In the relay discovery key request;
  • the transceiver module 110 is further configured to: receive indication information indicating the security mode assigned to the UE sent by the PCF to the discovery security management function in response to the RSC;
  • the processing module 120 is specifically configured to determine whether the UE adopts the security mode assigned to the UE based on the security mode associated with the discovered security management function.
  • the processing module 120 is further configured to determine the relay discovery security parameters of the UE in response to determining that the UE adopts the security mode assigned to the UE;
  • the transceiver module 110 is further configured to: send a first relay discovery key response indicating the relay discovery security parameter to the UE.
  • the transceiver module 110 is further configured to: in response to the UE not using the security method assigned to the UE, send a second relay discovery key response to the UE, wherein the second relay discovery key response Key response, used to indicate that the UE does not adopt the security mode assigned to the UE.
  • the security mode assigned to the UE is determined by the PCF of the UE and indicated to the UE.
  • the discovery security management function includes one of the following:
  • an embodiment of the present disclosure provides an information transmission device 200, which is provided in user equipment UE and includes:
  • the transceiver module 210 is configured to: send a relay discovery key request to the discovery security management function via the base station, wherein the relay discovery key request is used to request relay discovery security parameters related to relay discovery; wherein, The relay discovery key request is at least used for the discovery security management function to determine whether the UE adopts the security mode assigned to the UE.
  • the relay service code RSC of the relay discovery carried in the relay discovery key request is at least used for policy control sent by the discovery security management function to the UE.
  • Function PCF and the PCF indicates the security mode allocated to the UE to the discovery security management function based on the RSC.
  • the transceiver module is further configured to: receive the first relay discovery key response indicating the relay discovery security parameters sent by the discovery security management function, wherein the relay discovery security parameters, It is determined after the discovery security management function determines that the UE adopts the security mode assigned to the UE.
  • the transceiver module 210 is further configured to: receive a second relay discovery key response, where the second relay discovery key response is when the discovery security management function determines that the UE does not use the UE to be allocated. Sent in a safe manner.
  • the security mode assigned to the UE is determined by the PCF of the UE and indicated to the UE.
  • the discovery security management function includes one of the following:
  • an embodiment of the present disclosure provides an information transmission device 300, which is provided in the policy control function PCF and includes:
  • the transceiver module 310 is configured to: receive the relay service code RSC of the relay discovery sent by the discovery security management function, where the RSC is used for the PCF to determine the security mode to which the user equipment UE is allocated, where the RSC is carried by the UE in the relay discovery key request and sent to the discovery security management function, where the relay discovery key request is at least used to request relay discovery security related to the relay discovery. parameter.
  • the transceiver module 310 is further configured to: send indication information indicating the security mode assigned to the UE to the discovery security management function, where the indication information is used for the discovery security management function to determine whether the UE adopts The security mode in which the UE is assigned.
  • the security mode assigned to the UE is determined by the PCF of the UE and indicated to the UE.
  • An embodiment of the present disclosure provides a communication device, including:
  • Memory used to store instructions executable by the processor
  • the processor is configured to implement the information transmission method of any embodiment of the present disclosure when running executable instructions.
  • the communication device may include but is not limited to at least one of: a UE and a network device.
  • the network equipment here may include core network or access network equipment, etc.
  • the access network equipment may include a base station; the core network may include AMF and SMF.
  • the processor may include various types of storage media, which are non-transitory computer storage media that can continue to memorize the information stored thereon after the user equipment is powered off.
  • the processor may be connected to the memory through a bus or the like, and be used to read the executable program stored on the memory, for example, at least one of the methods shown in FIGS. 2 to 9 .
  • An embodiment of the present disclosure also provides a computer storage medium.
  • the computer storage medium stores a computer executable program.
  • the executable program is executed by a processor, the information transmission method of any embodiment of the present disclosure is implemented. For example, at least one of the methods shown in Figures 2 to 6.
  • the embodiment of the present disclosure also proposes a communication system 10; it should be noted that the communication system is
  • the aforementioned discovery security management function side and PCF side embodiments correspond to each other, so the same explanations or features will not be repeated one by one, and reference may be made to the foregoing embodiments.
  • the communication system 10 includes: discovery security management function 11 and policy control function PCF 12, wherein,
  • the discovery security management function 11 is used to receive a relay discovery key request sent by the user equipment UE via the base station, wherein the relay discovery key request is used to request relay discovery security parameters associated with relay discovery; at least Based on the relay discovery key request, determine whether the UE adopts the security method to which the UE is assigned;
  • the discovery security management function is specifically used to send a relay service code RSC associated with the relay discovery to the policy control function PCF of the UE, wherein the relay service code RSC is carried in the relay discovery Key request in progress;
  • the PCF 12 is used to receive the relay service code RSC of the relay discovery sent by the discovery security management function, and determine the security mode assigned to the user equipment UE based on the RSC.
  • Figure 15 is a block diagram of a user equipment 3000 according to an exemplary embodiment.
  • the user device 3000 may be a mobile phone, a computer, a digital broadcast user device, a messaging device, a game console, a tablet device, a medical device, a fitness device, a personal digital assistant, or the like.
  • user equipment 3000 may include one or more of the following components: processing component 3002, memory 3004, power supply component 3006, multimedia component 3008, audio component 3010, input/output (I/O) interface 3012, sensor component 3014 , and communication component 3016.
  • Processing component 3002 generally controls the overall operations of user device 3000, such as operations associated with display, phone calls, data communications, camera operations, and recording operations.
  • the processing component 3002 may include one or more processors 3020 to execute instructions to complete all or part of the steps of the above method.
  • processing component 3002 may include one or more modules that facilitate interaction between processing component 3002 and other components.
  • processing component 3002 may include a multimedia module to facilitate interaction between multimedia component 3008 and processing component 3002.
  • Memory 3004 is configured to store various types of data to support operations at user device 3000. Examples of such data include instructions for any application or method operating on user device 3000, contact data, phonebook data, messages, pictures, videos, etc.
  • Memory 3004 may be implemented by any type of volatile or non-volatile storage device, or a combination thereof, such as static random access memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EEPROM), Programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disk.
  • SRAM static random access memory
  • EEPROM electrically erasable programmable read-only memory
  • EEPROM erasable programmable read-only memory
  • EPROM Programmable read-only memory
  • PROM programmable read-only memory
  • ROM read-only memory
  • magnetic memory flash memory, magnetic or optical disk.
  • Power supply component 3006 provides power to various components of user equipment 3000.
  • Power supply components 3006 may include a power management system, one or more power supplies, and other components associated with generating, managing, and distributing power to user device 3000.
  • Multimedia component 3008 includes a screen that provides an output interface between the user device 3000 and the user.
  • the screen may include a liquid crystal display (LCD) and a touch panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive input signals from the user.
  • the touch panel includes one or more touch sensors to sense touches, swipes, and gestures on the touch panel. The touch sensor may not only sense the boundaries of a touch or slide action, but also detect the duration and pressure associated with the touch or slide action.
  • multimedia component 3008 includes a front-facing camera and/or a rear-facing camera.
  • the front camera and/or the rear camera may receive external multimedia data.
  • Each front-facing camera and rear-facing camera can be a fixed optical lens system or have a focal length and optical zoom capabilities.
  • Audio component 3010 is configured to output and/or input audio signals.
  • audio component 3010 includes a microphone (MIC) configured to receive external audio signals when user device 3000 is in operating modes, such as call mode, recording mode, and voice recognition mode. The received audio signals may be further stored in memory 3004 or sent via communications component 3016 .
  • audio component 3010 also includes a speaker for outputting audio signals.
  • the I/O interface 812 provides an interface between the processing component 3002 and a peripheral interface module.
  • the peripheral interface module may be a keyboard, a click wheel, a button, etc. These buttons may include, but are not limited to: Home button, Volume buttons, Start button, and Lock button.
  • Sensor component 3014 includes one or more sensors that provide various aspects of status assessment for user device 3000 .
  • the sensor component 3014 can detect the open/closed state of the device 3000 and the relative positioning of components, such as the display and keypad of the user device 3000.
  • the sensor component 3014 can also detect the user device 3000 or a component of the user device 3000. position changes, the presence or absence of user contact with user device 3000, user device 3000 orientation or acceleration/deceleration and temperature changes of user device 3000.
  • Sensor assembly 3014 may include a proximity sensor configured to detect the presence of nearby objects without any physical contact.
  • Sensor assembly 3014 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications.
  • the sensor component 3014 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
  • the communication component 3016 is configured to facilitate wired or wireless communication between the user device 3000 and other devices.
  • the user equipment 3000 may access a wireless network based on a communication standard, such as WiFi, 4G or 5G, or a combination thereof.
  • the communication component 3016 receives broadcast signals or broadcast related information from an external broadcast management system via a broadcast channel.
  • the communications component 816 also includes a near field communications (NFC) module to facilitate short-range communications.
  • NFC near field communications
  • the NFC module can be implemented based on radio frequency identification (RFID) technology, infrared data association (IrDA) technology, ultra-wideband (UWB) technology, Bluetooth (BT) technology and other technologies.
  • RFID radio frequency identification
  • IrDA infrared data association
  • UWB ultra-wideband
  • Bluetooth Bluetooth
  • user equipment 3000 may be configured by one or more application specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing devices (DSPDs), programmable logic devices (PLDs), field programmable A programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic component implementation is used to perform the above method.
  • ASICs application specific integrated circuits
  • DSPs digital signal processors
  • DSPDs digital signal processing devices
  • PLDs programmable logic devices
  • FPGA field programmable A programmable gate array
  • controller microcontroller, microprocessor or other electronic component implementation is used to perform the above method.
  • a non-transitory computer-readable storage medium including instructions such as a memory 3004 including instructions, which can be executed by the processor 3020 of the user device 3000 to complete the above method is also provided.
  • the non-transitory computer-readable storage medium may be ROM, random access memory (RAM), CD-ROM, magnetic tape, floppy disk, optical data storage device, etc.
  • an embodiment of the present disclosure shows the structure of a base station.
  • the base station 900 may be provided as a network side device.
  • base station 900 includes a processing component 922, which further includes one or more processors, and memory resources represented by memory 932 for storing instructions, such as application programs, executable by processing component 922.
  • the application program stored in memory 932 may include one or more modules, each corresponding to a set of instructions.
  • the processing component 922 is configured to execute instructions to perform any of the foregoing methods applied to the base station.
  • Base station 900 may also include a power supply component 926 configured to perform power management of base station 900, a wired or wireless network interface 950 configured to connect base station 900 to a network, and an input/output (I/O) interface 958.
  • Base station 900 may operate based on an operating system stored in memory 932, such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM or the like.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本公开实施例提供了一种信息传输方法、装置、通信设备及存储介质;发现安全管理功能执行接收用户设备(UE)经由基站发送的中继发现密钥请求,其中,所述中继发现密钥请求用于请求与中继发现相关的中继发现安全参数的中继发现密钥请求;至少基于所述中继发现密钥请求,确定所述UE是否采用所述UE被分配的安全方式。

Description

一种信息传输方法、装置、通信设备及存储介质 技术领域
本公开涉及但不限于通信技术领域,尤其涉及一种信息传输方法、装置、通信设备及存储介质。
背景技术
针对第五代(5 th Generation)蜂窝移动通信系统中邻近通信服务(Proximity Services,ProSe)安全保护,存在基于控制面(Control Plane,CP)和基于用户面(User plane,UP)两种安全方式,用于为远程UE(Remote User Equipment)和用户到网络中继(User to Network Relay,U2N Relay)之间PC5通信提供安全保障。在采用安全方式之前远程UE和U2N中继需要相互发现。对于中继通信之前的U2N中继发现,也有基于CP和基于UP的安全方式两种选择。
发明内容
本公开实施例公开一种信息传输方法、装置、通信设备及存储介质。
根据本公开的第一方面,提供一种信息传输方法,其中,被发现安全管理功能执行,包括:
接收用户设备UE经由基站发送的中继发现密钥请求,其中,所述中继发现密钥请求用于请求与中继发现相关的中继发现安全参数的中继发现密钥请求;
至少基于所述中继发现密钥请求,确定所述UE是否采用所述UE被分配的安全方式。
在一个实施例中,所述至少基于所述中继发现密钥请求,确定所述UE是否采用所述UE被分配的安全方式;包括:
向所述UE的策略控制功能(Policy Control Function,PCF)发送关联于所述中继发现的中继业务代码(Relay Service Code,RSC),其中,所述中继业务代码RSC携带于所述中继发现密钥请求中;
接收所述PCF响应于所述RSC,向所述发现安全管理功能发送的指示所述UE被分配的安全方式的指示信息;
基于所述发现安全管理功能关联的安全方式,确定所述UE是否采用所述UE被分配的安全方式。
在一个实施例中,所述方法还包括:
响应于确定所述UE采用所述UE被分配的安全方式,确定所述UE的中继发现安全参数,并向所述UE发送指示所述中继发现安全参数的第一中继发现密钥响应。
在一个实施例中,所述方法还包括:
响应于所述UE未采用所述UE被分配的安全方式,向所述UE发送第二中继发现密钥响应,其 中,所述第二中继发现密钥响应,用于指示所述UE未采用所述UE被分配的安全方式。
在一个实施例中,所述UE被分配的安全方式是由所述UE的PCF确定并向所述UE指示的。
在一个实施例中,所述发现安全管理功能,包括以下之一:
邻近服务密钥管理功能(ProSeKey Management Function,PKMF);
直连发现名称管理功能(Direct Discovery Name Management Function,DDNMF)。
根据本公开的第二方面,提供一种信息传输方法,其中,被用户设备UE执行,包括:
经由基站向发现安全管理功能发送的中继发现密钥请求,其中,所述中继发现密钥请求用于请求与中继发现相关的中继发现安全参数;其中,所述中继发现密钥请求,至少用于供所述发现安全管理功能确定所述UE是否采用所述UE被分配的安全方式。
在一个实施例中,所述中继发现密钥请求中携带的所述中继发现的中继业务代码RSC,所述RSC至少用于供所述发现安全管理功能发送给所述UE的策略控制功能PCF,并由所述PCF基于所述RSC,向所述发现安全管理功能指示为所述UE分配的安全方式。
在一个实施例中,所述方法还包括:
接收所述发现安全管理功能发送的指示中继发现安全参数的第一中继发现密钥响应,其中,所述中继发现安全参数,是由所述发现安全管理功能确定所述UE采用所述UE被分配的安全方式后确定的。
在一个实施例中,所述方法还包括:
接收第二中继发现密钥响应,其中,所述第二中继发现密钥响应是所述发现安全管理功能确定所述UE未采用所述UE被分配的安全方式后发送的。
在一个实施例中,所述UE被分配的安全方式是由所述UE的PCF确定并向所述UE指示的。
在一个实施例中,所述发现安全管理功能,包括以下之一:
邻近服务密钥管理功能PKMF;
直连发现名称管理功能DDNMF。
根据本公开的第三方面,提供一种信息传输方法,其中,被策略控制功能PCF执行,包括:
接收发现安全管理功能发送的中继发现的中继业务代码RSC,其中,所述RSC,用于供所述PCF确定用户设备UE被分配的安全方式,其中,所述RSC,是由所述UE携带于中继发现密钥请求中发送给发现安全管理功能的,其中,所述中继发现密钥请求至少用于请求与所述中继发现相关的中继发现安全参数。
在一个实施例中,所述方法还包括:
向所述发现安全管理功能发送指示所述UE被分配的安全方式的指示信息,所述指示信息用于供所述发现安全管理功能确定所述UE是否采用所述UE被分配的安全方式。
在一个实施例中,所述UE被分配的安全方式是由所述UE的PCF确定并向所述UE指示的。
根据本公开的第四方面,提供一种信息传输装置,其中,设置于发现安全管理功能中,包括:
收发模块,配置为接收用户设备UE经由基站发送的中继发现密钥请求,其中,所述中继发现 密钥请求用于请求与中继发现相关的中继发现安全参数的中继发现密钥请求;
处理模块,配置为至少基于所述中继发现密钥请求,确定所述UE是否采用所述UE被分配的安全方式。
在一个实施例中,所述收发模块,还配置为:向所述UE的策略控制功能PCF发送关联于所述中继发现的中继业务代码RSC,其中,所述中继业务代码RSC携带于所述中继发现密钥请求中;
所述收发模块,还配置为:接收所述PCF响应于所述RSC,向所述发现安全管理功能发送的指示所述UE被分配的安全方式的指示信息;
所述处理模块,具体配置为基于所述发现安全管理功能关联的安全方式,确定所述UE是否采用所述UE被分配的安全方式。
在一个实施例中,
所述处理模块,还配置为响应于确定所述UE采用所述UE被分配的安全方式,确定所述UE的中继发现安全参数;
所述收发模块,还配置为:向所述UE发送指示所述中继发现安全参数的第一中继发现密钥响应。
在一个实施例中,
所述收发模块,还配置为:响应于所述UE未采用所述UE被分配的安全方式,向所述UE发送第二中继发现密钥响应,其中,所述第二中继发现密钥响应,用于指示所述UE未采用所述UE被分配的安全方式。
在一个实施例中,所述UE被分配的安全方式是由所述UE的PCF确定并向所述UE指示的。
在一个实施例中,所述发现安全管理功能,包括以下之一:
邻近服务密钥管理功能PKMF;
直连发现名称管理功能DDNMF。
根据本公开的第五方面,提供一种信息传输装置,其中,设置于用户设备UE中,包括:
收发模块,配置为:经由基站向发现安全管理功能发送的中继发现密钥请求,其中,所述中继发现密钥请求用于请求与中继发现相关的中继发现安全参数;其中,所述中继发现密钥请求,至少用于供所述发现安全管理功能确定所述UE是否采用所述UE被分配的安全方式。
在一个实施例中,所述中继发现密钥请求中携带的所述中继发现的中继业务代码RSC,所述RSC至少用于供所述发现安全管理功能发送给所述UE的策略控制功能PCF,并由所述PCF基于所述RSC,向所述发现安全管理功能指示为所述UE分配的安全方式。
在一个实施例中,所述收发模块,还配置为:接收所述发现安全管理功能发送的指示中继发现安全参数的第一中继发现密钥响应,其中,所述中继发现安全参数,是由所述发现安全管理功能确定所述UE采用所述UE被分配的安全方式后确定的。
在一个实施例中,
所述收发模块,还配置为:接收第二中继发现密钥响应,其中,所述第二中继发现密钥响应是 所述发现安全管理功能确定所述UE未采用所述UE被分配的安全方式后发送的。
在一个实施例中,所述UE被分配的安全方式是由所述UE的PCF确定并向所述UE指示的。
在一个实施例中,所述发现安全管理功能,包括以下之一:
邻近服务密钥管理功能PKMF;
直连发现名称管理功能DDNMF。
根据本公开的第六方面,提供一种信息传输装置,其中,设置于策略控制功能PCF中,包括:
收发模块,配置为:接收发现安全管理功能发送的中继发现的中继业务代码RSC,其中,所述RSC,用于供所述PCF确定用户设备UE被分配的安全方式,其中,所述RSC,是由所述UE携带于中继发现密钥请求中发送给发现安全管理功能的,其中,所述中继发现密钥请求至少用于请求与所述中继发现相关的中继发现安全参数。
在一个实施例中,
所述收发模块,还配置为:向所述发现安全管理功能发送指示所述UE被分配的安全方式的指示信息,所述指示信息用于供所述发现安全管理功能确定所述UE是否采用所述UE被分配的安全方式。
在一个实施例中,所述UE被分配的安全方式是由所述UE的PCF确定并向所述UE指示的。
根据本公开的第七方面,提供一种通信设备,其中,所述通信设备,包括:
处理器;
用于存储所述处理器可执行指令的存储器;
其中,所述处理器被配置为:用于运行所述可执行指令时,实现第一方面或第二方面或第三方面所述的信息传输方法。
根据本公开的第八方面,提供一种计算机存储介质,其中,所述计算机存储介质存储有计算机可执行程序,所述可执行程序被处理器执行时实现第一方面或第二方面或第三方面所述的信息传输方法。
本公开实施例提供的技术方案可以包括以下有益效果:
在本公开实施例中。发现安全管理功能执行接收用户设备(UE)经由基站发送的中继发现密钥请求,其中,所述中继发现密钥请求用于请求与中继发现相关的中继发现安全参数的中继发现密钥请求;至少基于所述中继发现密钥请求,确定所述UE是否采用所述UE被分配的安全方式。如此,发现安全管理功能基于所述中继发现密钥请求,确定所述UE是否采用UE被分配的安全方式,可以减少由于发现安全管理功能无法支持UE被分配的安全方式带来的安全风险,提高中继服务安全性。
应当理解的是,以上的一般描述和后文的细节描述仅是示例性和解释性的,并不能限制本公开实施例。
附图说明
图1是一种无线通信系统的结构示意图。
图2是根据一示例性实施例示出的一种信息传输方法的流程图。
图3是根据一示例性实施例示出的一种信息传输方法的流程图。
图4是根据一示例性实施例示出的一种信息传输方法的流程图。
图5是根据一示例性实施例示出的一种信息传输方法的流程图。
图6是根据一示例性实施例示出的一种信息传输方法的流程图。
图7是根据一示例性实施例示出的一种信息传输方法的流程图。
图8是根据一示例性实施例示出的一种信息传输方法的流程图。
图9是根据一示例性实施例示出的一种信息传输方法的流程图。
图10是根据一示例性实施例示出的一种信息传输方法的流程图。
图11是根据一示例性实施例示出的一种信息传输装置的框图。
图12是根据一示例性实施例示出的一种信息传输装置的框图。
图13是根据一示例性实施例示出的一种信息传输装置的框图。
图14是根据一示例性实施例示出的一种通信系统的机构框图。
图15是根据一示例性实施例示出的一种UE的框图。
图16是根据一示例性实施例示出的一种基站的框图。
具体实施方式
这里将详细地对示例性实施例进行说明,其示例表示在附图中。下面的描述涉及附图时,除非另有表示,不同附图中的相同数字表示相同或相似的要素。以下示例性实施例中所描述的实施方式并不代表与本公开实施例相一致的所有实施方式。相反,它们仅是与如所附权利要求书中所详述的、本公开实施例的一些方面相一致的装置和方法的例子。
在本公开实施例使用的术语是仅仅出于描述特定实施例的目的,而非旨在限制本公开实施例。在本公开实施例和所附权利要求书中所使用的单数形式的“一种”和“该”也旨在包括多数形式,除非上下文清楚地表示其他含义。还应当理解,本文中使用的术语“和/或”是指并包含一个或多个相关联的列出项目的任何或所有可能组合。
应当理解,尽管在本公开实施例可能采用术语第一、第二、第三等来描述各种信息,但这些信息不应限于这些术语。这些术语仅用来将同一类型的信息彼此区分开。例如,在不脱离本公开实施例范围的情况下,第一信息也可以被称为第二信息,类似地,第二信息也可以被称为第一信息。取决于语境,如在此所使用的词语“如果”可以被解释成为“在……时”或“当……时”或“响应于确定”。
请参考图1,其示出了本公开实施例提供的一种无线通信系统的结构示意图。如图1所示,无线通信系统是基于蜂窝移动通信技术的通信系统,该无线通信系统可以包括:若干个用户设备110以及若干个基站120。
其中,用户设备110可以是指向用户提供语音和/或数据连通性的设备。用户设备110可以经无 线接入网(Radio Access Network,RAN)与一个或多个核心网进行通信,用户设备110可以是物联网用户设备,如传感器设备、移动电话(或称为“蜂窝”电话)和具有物联网用户设备的计算机,例如,可以是固定式、便携式、袖珍式、手持式、计算机内置的或者车载的装置。例如,站(Station,STA)、订户单元(subscriber unit)、订户站(subscriber station),移动站(mobile station)、移动台(mobile)、远程站(remote station)、接入点、远程用户设备(remote terminal)、接入用户设备(access terminal)、用户装置(user terminal)、用户代理(user agent)、用户设备(user device)、或用户设备(user equipment)。或者,用户设备110也可以是无人飞行器的设备。或者,用户设备110也可以是车载设备,比如,可以是具有无线通信功能的行车电脑,或者是外接行车电脑的无线用户设备。或者,用户设备110也可以是路边设备,比如,可以是具有无线通信功能的路灯、信号灯或者其它路边设备等。
基站120可以是无线通信系统中的网络侧设备。其中,该无线通信系统可以是第四代移动通信技术(the 4th generation mobile communication,4G)系统,又称长期演进(Long Term Evolution,LTE)系统;或者,该无线通信系统也可以是5G系统,又称新空口系统或5G NR系统。或者,该无线通信系统也可以是5G系统的再下一代系统。其中,5G系统中的接入网可以称为新一代无线接入网(New Generation-Radio Access Network,NG-RAN)。
其中,基站120可以是4G系统中采用的演进型基站(eNB)。或者,基站120也可以是5G系统中采用集中分布式架构的基站(gNB)。当基站120采用集中分布式架构时,通常包括集中单元(central unit,CU)和至少两个分布单元(distributed unit,DU)。集中单元中设置有分组数据汇聚协议(Packet Data Convergence Protocol,PDCP)层、无线链路层控制协议(Radio Link Control,RLC)层、媒体接入控制(Medium Access Control,MAC)层的协议栈;分布单元中设置有物理(Physical,PHY)层协议栈,本公开实施例对基站120的具体实现方式不加以限定。
基站120和用户设备110之间可以通过无线空口建立无线连接。在不同的实施方式中,该无线空口是基于第四代移动通信网络技术(4G)标准的无线空口;或者,该无线空口是基于第五代移动通信网络技术(5G)标准的无线空口,比如该无线空口是新空口;或者,该无线空口也可以是基于5G的更下一代移动通信网络技术标准的无线空口。
在一些实施例中,用户设备110之间还可以建立E2E(End to End,端到端)连接。比如车联网通信(vehicle to everything,V2X)中的车对车(vehicle to vehicle,V2V)通信、车对路边设备(vehicle to Infrastructure,V2I)通信和车对人(vehicle to pedestrian,V2P)通信等场景。
这里,上述用户设备可认为是下面实施例的终端设备。
在一些实施例中,上述无线通信系统还可以包含网络管理设备130。
若干个基站120分别与网络管理设备130相连。其中,网络管理设备130可以是无线通信系统中的核心网设备,比如,该网络管理设备130可以是演进的数据分组核心网(Evolved Packet Core,EPC)中的移动性管理实体(Mobility Management Entity,MME)。或者,该网络管理设备也可以是其它的核心网设备,比如服务网关(Serving GateWay,SGW)、公用数据网网关(Public Data Network  GateWay,PGW)、策略与计费规则功能单元(Policy and Charging Rules Function,PCRF)或者归属签约用户服务器(Home Subscriber Server,HSS)等。对于网络管理设备130的实现形态,本公开实施例不做限定。
为了便于本领域内技术人员理解,本公开实施例列举了多个实施方式以对本公开实施例的技术方案进行清晰地说明。当然,本领域内技术人员可以理解,本公开实施例提供的多个实施例,可以被单独执行,也可以与本公开实施例中其他实施例的方法结合后一起被执行,还可以单独或结合后与其他相关技术中的一些方法一起被执行;本公开实施例并不对此作出限定。
5G ProSe U2N中继发现(UE-to-Network Relay Discovery)参数中可以包含控制面安全指示符,该控制面安全指示符由PCF分别提供给远程UE和Relay UE。如果为特定RSC提供了控制面安全指示符,则表明安全方式是在控制面上执行的。如果未提供控制面安全指示符,则在用户面上执行安全方式。U2N中继可以配置为使用一组支持基于控制面的安全方式的切片。当请求的切片对应于基于控制面的安全方式被接受时,U2N中继应在发现消息中包含设置了控制面安全指示符的RSC。
但是,并非所有的UE均能根据规则采用被分配的安全方式,例如:如果UE(包括远程UE和/或中继UE)被分配的RSC提供了控制面安全指示符,仍然会出现UE使用基于用户面的安全方式。
因此,如何验证UE使用了被分配的安全方式,以保护5G ProSe发现过程,是亟待解决的问题。
如图2所示,本公开实施例提供一种信息传输方法,被发现安全管理功能执行,包括:
步骤201:接收UE经由基站发送的中继发现密钥请求,其中,所述中继发现密钥请求用于请求与中继发现相关的中继发现安全参数的中继发现密钥请求;
步骤202:至少基于所述中继发现密钥请求,确定所述UE是否采用所述UE被分配的安全方式。
本实施例以5G移动通信系统为例进行描述,但本实施例方法可以不限于应用于5G移动通信系统,如可以应用于下一代移动通信系统中。在此不作限定。
本实施例的方法可以应用于5G ProSe用户到网络(User to Network,U2N)发现的模型A和模型B。
这里,安全方式包括在5G ProSe发现过程中使用的基于控制面的安全方式和基于用户面的安全方式。
发现安全管理功能可以是邻近性服务(ProSe)中用于进行安全性管理的核心网网元。
中继发现安全参数可以包括关联于中继发现以下至少之一:发现密钥;发现消息的加密和完整性保护的算法;关联于定时器的定时参数等。
在一个可能的实现方式中,发现安全管理功能可以用于向中继UE和/或远程UE提供安全密钥、安全算法等。
在一个可能的实现方式中,不同类型的发现安全管理功能关联的安全方式不同。示例行的,一个类型的发现安全管理功能采用基于控制面的安全方式,另一个类型的发现安全管理功能采用基于用户面的安全方式。
在一个实施例中,所述发现安全管理功能,包括以下之一:
邻近服务密钥管理功能(ProSeKey Management Function,PKMF);
直连发现名称管理功能(Direct Discovery Name Management Function,DDNMF)。
在一个可能的实现方式中,PKMF采用基于用户面的安全方式。
在一个可能的实现方式中,DDNMF采用基于控制面的安全方式。
UE可以是5G ProSe中的远程UE(远程UE),也可以是5G ProSe中的中继UE(Relay UE)。其中,中继UE可以是5G ProSe中的U2N中继(User to Network Relay)。
在一个实施例中,所述UE被分配的安全方式是由所述UE的PCF确定并向所述UE指示的。
UE所被分配的安全方式可以是由PCF确定并向UE指示的。
在一个可能的实现方式中,在UE注册到网络的过程中,PCF向UE指示UE需要被分配的安全方式。
在一个可能的实现方式中,UE在服务授权和信息提供过程中从PCF获取其发现安全管理功能的地址以及发现参数。其中,发现参数可以包括以下至少之一项:RSC;控制平面安全指示符。当发现参数包括控制面安全指示符时,表示PCF指示UE采用基于控制面的安全方式。当发现参数不包括控制面安全指示符时,表示PCF指示UE采用基于用户面的安全方式。其中,控制平面安全指示符关联于RSC。
UE可以在确定自身被分配的安全方式后选择发现安全管理功能,并向发现安全管理功能发送中继发现密钥请求(Relay Discovery Key Request)。但是,由于并非所有的UE均能根据规则执行安全方式,例如:UE被分配的RSC提供了控制面安全指示符,即UE需要执行基于控制面的安全方式,但是UE仍然会出现使用基于用户面的安全方式的情况,即向PKMF(采用基于用户面的安全方式)发送中继发现密钥请求。或者,UE被分配的RSC未提供了控制面安全指示符,即UE需要执行基于用户面的安全方式,但是UE仍然会出现使用基于控制面的安全方式的情况,即向DDNMF(采用基于控制面的安全方式)发送中继发现密钥请求。进而使得中继服务的安全方式无法正确执行,影响中继服务安全性。
这里,安全管理功能可以基于中继发现密钥请求确定UE被分配的安全方式。
在一个可能的实现方式中,中继发现密钥请求可以携带有用于确定UE被分配的安全方式的指示信息。
用于确定UE被分配的安全方式的指示信息可以显式或隐含指示UE被分配的安全方式。
在一个可能的实现方式中,用于确定UE被分配的安全方式的指示信息可以包括UE被分配的RSC。
如果UE采用UE被分配的安全方式,那么,安全管理功能支持的安全方式和UE被分配的安全方式一致。
如果UE未采用UE被分配的安全方式,那么,安全管理功能支持的安全方式和UE被分配的安全方式可能不一致。
安全管理功能可以对比安全管理功能支持的安全方式和确定的UE被分配的安全方式,进而UE是否采用了UE被分配的安全方式。
如此,发现安全管理功能基于所述中继发现密钥请求,确定UE是否采用UE被分配的安全方式,可以减少由于发现安全管理功能无法支持UE被分配的安全方式带来的安全风险,提高中继服务安全性。
在一个可能的实现方式中,所述中继发现密钥请求还包括以下至少之一项:
UE的标识;
UE的安全能力信息,如能够支持的安全算法等。
示例性的,中继UE可以向中继UE的发现安全管理功能(PKMF或DDNMF)发送中继发现密钥请求,中继发现密钥请求中可以携带有以下至少之一项:RSC、中继UE的标识、中继UE的的安全能力信息。
示例性的,远程UE可以向远程UE的发现安全管理功能(PKMF或DDNMF)发送中继发现密钥请求,中继发现密钥请求中可以携带有以下至少之一项:RSC、远程UE的标识、远程UE的的安全能力信息。
中继UE和远程UE的核心网网元可以是相同也可以不同。即中继UE的发现安全管理功能和远程UE的发现安全管理功能可以是同一个网元,也可以是不同的网元。中继UE的PCF和远程UE的PCF可以是同一个网元,也可以是不同的网元。
在一个实施例中,所述至少基于所述中继发现密钥请求,确定所述UE是否采用所述UE被分配的安全方式;包括:
向所述UE的策略控制功能PCF发送关联于所述中继发现的中继业务代码RSC,其中,所述中继业务代码RSC携带于所述中继发现密钥请求中;
接收所述PCF响应于所述RSC,向所述发现安全管理功能发送的指示所述UE被分配的安全方式的指示信息;
基于所述发现安全管理功能关联的安全方式,确定所述UE是否采用所述UE被分配的安全方式。
在一个可能的实现方式中,发现安全管理功能将UE的RSC携带于安全方式检查请求(Security Method Check Request)中发送给UE的PCF。
在一个可能的实现方式中,发现安全管理功能预先设置有不同UE与PCF地址的映射表。例如,发现安全管理功能可以具有UE的标识与PCF地址的映射表。发现安全管理功能可以基于中继发现密钥请求中UE的标识,确定UE的PCF的地址,进而向该PCF发送UE携带于中继发现密钥请求中的RSC。
PCF可以在UE业务授权及信息配置等过程中为UE配置RSC。RSC可以具有对应的控制面安全指示符,指示被分配到该RSC的UE需要在发现过程中执行基于控制面的安全方式。如果RSC可以不具有对应的控制面安全指示符,那么,被分配到该RSC的UE需要在发现过程中执行基于用户面的安全方式。
PCF可以保存各RSC与对应安全方式之间的对应关系。
响应于接收到发现安全管理功能发送的RSC,PCF可以基于RSC与对应安全方式之间的对应关系,确定该RSC对应的安全方式。PCF将确定的RSC对应的安全方式通过指示信息发送给发现安全管理功能,即将分配给UE的安全方式通知发现安全管理功能。
在一个可能的方式中,PCF将确定的UE被分配的的安全方式的指示信息携带于安全方式检查响应(Security Method Check Response)中发送给安全管理功能。
在一个可能的方式中,发现安全管理功能在向UE的PCF发送携带RSC的安全方式检查请求时,在安全方式检查请求中携带UE的标识。以指示请求的的安全方式对应的UE。
在一个可能的方式中,PCF将安全方式对应的UE的标识携带于安全方式检查响应中。以告知安全方式对应的UE。
发现安全管理功能接收到PCF指示的UE被分配的安全方式后,确定自身是否支持。如果确定安全管理功能自身的安全方式与PCF指示的UE被分配的安全方式相同,则可以确定UE采用UE被分配的安全方式。如果确定安全管理功能自身的安全方式不同于PCF指示的UE被分配的安全方式,则可以确定UE未采用UE被分配的安全方式。
如此,通过PCF确定UE被分配的安全方式。提高确定UE被分配的安全方式的准确性。进而确定UE是否采用被分配的安全方式,可以减少由于发现安全管理功能无法支持UE被分配的安全方式带来的安全风险,提高中继服务安全性
如图3所示,本公开实施例提供一种信息传输方法,被发现安全管理功能执行,包括:
步骤301:响应于确定所述UE采用所述UE被分配的安全方式,确定所述UE的中继发现安全参数,并向所述UE发送指示所述中继发现安全参数的第一中继发现密钥响应。
步骤301可以单独实施,也可以结合步骤201一起实施。
发现安全管理功能执行可以在确定安全管理功能支持UE被分配的安全方式,即UE采用了被分配的安全方式后,再向UE提供安全服务。
在一个可能的实现方式中,如果发现安全管理功能从PCF接收到的安全方式,与发现安全管理功能自身角色匹配(即现安全管理功能自身安全方式与从PCF接收到的分配给UE的安全方式相同,也即UE采用了被分配的安全方式),则发现安全管理功能可以确定UE的中继发现安全参数。并向UE发送中继发现安全参数。
在一个可能的实现方式中,中继发现安全参数包括但不限于以下至少之一项:发现密钥;发现消息的加密和完整性保护的算法;关联于定时器的定时参数等。
在一个可能的实现方式中,所述确定所述UE的中继发现安全参数,并向所述UE发送指示所述中继发现安全参数的第一中继发现密钥响应,包括:
响应于所述UE为中继UE,由所述密钥管理功能确定所述中继UE的中继发现安全参数,并向所述中继UE发送指示所述中继发现安全参数的第一中继发现密钥响应。
示例性的,如果中继UE的发现安全管理功能从PCF接收到的安全方式,与中继UE的发现安 全管理功能自身角色匹配(即中继UE采用了被分配的安全方式),则中继UE的发现安全管理功能(5G PKMF或5G DDNMF)为中继UE生成发现安全材料(即中继发现安全参数)。中继UE的发现安全管理功能基于接收到的中继UE的安全能力信息也选择用于UE之间广播的发现消息的加密和完整性保护的算法。中继UE的发现安全管理功能向中继UE发送携带中继发现安全参数的第一中继发现密钥响应(Relay Discovery Key Response)消息。
在一个可能的实现方式中,所述确定所述UE的中继发现安全参数,并向所述UE发送指示所述发现中继安全参数的第一中继发现密钥响应,包括:
响应于所述UE为远程UE,向中继UE的密钥管理功能发送所述中继发现密钥请求;
接收所述中继UE的密钥管理功能响应于所述中继发现密钥请求,发送的所述中继发现安全参数;
向所述远程UE发送指示所述中继发现安全参数的中继发现密钥响应。
示例性的,如果远程UE的发现安全管理功能从PCF接收到的安全方法,与远程UE的发现安全管理功能的角色匹配(即远程UE采用了被分配的安全方式),则远程UE的发现安全管理功能(5G PKMF或5G DDNMF)根据收到的RSC定位潜在的中继UE的发现安全管理功能(5G PKMF或5G DDNMF),然后将中继发现密钥请求(Relay Discovery Key Request)消息转发给中继UE的发现安全管理功能。
中继UE的发现安全管理功能从远程UE的发现安全管理功能接收到中继发现密钥请求消息基于接收到的RCS,授权其域中的中继UE之一提供中继服务。
基于接收到的RSC,中继UE的发现安全管理功能检索为RSC生成的中继发现安全参数并以中继发现密钥响应消息响应远程UE的发现安全管理功能。
远程UE的发现安全管理功能将中继发现安全参数携带于中继发现密钥响应(Relay Discovery Key Response)消息转发给远程UE。
远程UE和中继UE分别在PC5上进行发现过程,相互发现。需要注意的是,如果远程UE和中继UE中任一个未能获得中继发现安全参数,则UE将无法发送受保护的发现消息或理解/验证接收到的发现消息,以便成功地发现彼此,即只有正确使用为RSC分配的安全方法的UE才能发现彼此。
如图4所示,本公开实施例提供一种信息传输方法,被发现安全管理功能执行,包括:
步骤401:响应于所述UE未采用所述UE被分配的安全方式,向所述UE发送第二中继发现密钥响应,其中,所述第二中继发现密钥响应,用于指示所述UE未采用所述UE被分配的安全方式。
步骤401可以单独实施,也可以结合步骤201和/或步骤301一起实施。
如果发现安全管理功能从PCF收到的安全方式,与发现安全管理功能自身角色不匹配(即,发现安全管理功能自身安全方式不同于从PCF接收到的分配给UE的安全方式,也即UE未采用了被分配的安全方式),则发现安全管理功能向UE发送第二中继发现密钥响应,向UE说明获取中继发现安全参数失败原因。
如图5所示,本公开实施例提供一种信息传输方法,被UE执行,包括:
步骤501:经由基站向发现安全管理功能发送的中继发现密钥请求,其中,所述中继发现密钥请求用于请求与中继发现相关的中继发现安全参数;其中,所述中继发现密钥请求,至少用于供所述发现安全管理功能确定所述UE是否采用所述UE被分配的安全方式。
本实施例以5G移动通信系统为例进行描述,但本实施例方法可以不限于应用于5G移动通信系统,如可以应用于下一代移动通信系统中。在此不作限定。
本实施例的方法可以应用于5G ProSe用户到网络(User to Network,U2N)发现的模型A和模型B。
这里,安全方式包括在5G ProSe发现过程中使用的基于控制面的安全方式和基于用户面的安全方式。
发现安全管理功能可以是邻近性服务(ProSe)中用于进行安全性管理的核心网网元。
中继发现安全参数可以包括关联于中继发现以下至少之一:发现密钥;发现消息的加密和完整性保护的算法;关联于定时器的定时参数等。
在一个可能的实现方式中,发现安全管理功能可以用于向中继UE和/或远程UE提供安全密钥、安全算法等。
在一个可能的实现方式中,不同类型的发现安全管理功能关联的安全方式不同。示例行的,一个类型的发现安全管理功能采用基于控制面的安全方式,另一个类型的发现安全管理功能采用基于用户面的安全方式。
在一个实施例中,所述发现安全管理功能,包括以下之一:
邻近服务密钥管理功能PKMF;
直连发现名称管理功能DDNMF。
在一个可能的实现方式中,PKMF采用基于用户面的安全方式。
在一个可能的实现方式中,DDNMF采用基于控制面的安全方式。
UE可以是5G ProSe中的远程UE(远程UE),也可以是5G ProSe中的中继UE(Relay UE)。其中,中继UE可以是5G ProSe中的U2N中继(User to Network Relay)。
在一个实施例中,所述UE被分配的安全方式是由所述UE的PCF确定并向所述UE指示的。
UE所被分配的安全方式可以是由PCF确定并向UE指示的。
在一个可能的实现方式中,在UE注册到网络的过程中,PCF向UE指示UE需要被分配的安全方式。
在一个可能的实现方式中,UE在服务授权和信息提供过程中从PCF获取其发现安全管理功能的地址以及发现参数。其中,发现参数可以包括以下至少之一项:RSC;控制平面安全指示符。当发现参数包括控制面安全指示符时,表示PCF指示UE采用基于控制面的安全方式。当发现参数不包括控制面安全指示符时,表示PCF指示UE采用基于用户面的安全方式。其中,控制平面安全指示符关联于RSC。
UE可以在确定自身被分配的安全方式后选择发现安全管理功能,并向发现安全管理功能发送中继发现密钥请求(Relay Discovery Key Request)。但是,由于并非所有的UE均能根据规则执行安全方式,例如:UE被分配的RSC提供了控制面安全指示符,即UE需要执行基于控制面的安全方式,但是UE仍然会出现使用基于用户面的安全方式的情况,即向PKMF(采用基于用户面的安全方式)发送中继发现密钥请求。或者,UE被分配的RSC未提供了控制面安全指示符,即UE需要执行基于用户面的安全方式,但是UE仍然会出现使用基于控制面的安全方式的情况,即向DDNMF(采用基于控制面的安全方式)发送中继发现密钥请求。进而使得中继服务的安全方式无法正确执行,影响中继服务安全性。
这里,安全管理功能可以基于中继发现密钥请求确定UE被分配的安全方式。
在一个可能的实现方式中,中继发现密钥请求可以携带有用于确定UE被分配的安全方式的指示信息。
用于确定UE被分配的安全方式的指示信息可以显式或隐含指示UE被分配的安全方式。
在一个可能的实现方式中,用于确定UE被分配的安全方式的指示信息可以包括UE被分配的RSC。
如果UE采用UE被分配的安全方式,那么,安全管理功能支持的安全方式和UE被分配的安全方式一致。
如果UE未采用UE被分配的安全方式,那么,安全管理功能支持的安全方式和UE被分配的安全方式可能不一致。
安全管理功能可以对比安全管理功能支持的安全方式和确定的UE被分配的安全方式,进而UE是否采用了UE被分配的安全方式。
如此,发现安全管理功能基于所述中继发现密钥请求,确定UE是否采用UE被分配的安全方式,可以减少由于发现安全管理功能无法支持UE被分配的安全方式带来的安全风险,提高中继服务安全性。
在一个可能的实现方式中,所述中继发现密钥请求还包括以下至少之一项:
UE的标识;
UE的安全能力信息,如能够支持的安全算法等。
示例性的,中继UE可以向中继UE的发现安全管理功能(PKMF或DDNMF)发送中继发现密钥请求,中继发现密钥请求中可以携带有以下至少之一项:RSC、中继UE的标识、中继UE的的安全能力信息。
示例性的,远程UE可以向远程UE的发现安全管理功能(PKMF或DDNMF)发送中继发现密钥请求,中继发现密钥请求中可以携带有以下至少之一项:RSC、远程UE的标识、远程UE的的安全能力信息。
中继UE和远程UE的核心网网元可以是相同也可以不同。即中继UE的发现安全管理功能和远程UE的发现安全管理功能可以是同一个网元,也可以是不同的网元。中继UE的PCF和远程UE 的PCF可以是同一个网元,也可以是不同的网元。
在一个实施例中,所述中继发现密钥请求中携带的所述中继发现的中继业务代码RSC,所述RSC至少用于供所述发现安全管理功能发送给所述UE的策略控制功能PCF,并由所述PCF基于所述RSC,向所述发现安全管理功能指示为所述UE分配的安全方式。
在一个可能的实现方式中,发现安全管理功能将UE的RSC携带于安全方式检查请求(Security Method Check Request)中发送给UE的PCF。
在一个可能的实现方式中,发现安全管理功能预先设置有不同UE与PCF地址的映射表。例如,发现安全管理功能可以具有UE的标识与PCF地址的映射表。发现安全管理功能可以基于中继发现密钥请求中UE的标识,确定UE的PCF的地址,进而向该PCF发送UE携带于中继发现密钥请求中的RSC。
PCF可以在UE业务授权及信息配置等过程中为UE配置RSC。RSC可以具有对应的控制面安全指示符,指示被分配到该RSC的UE需要在发现过程中执行基于控制面的安全方式。如果RSC可以不具有对应的控制面安全指示符,那么,被分配到该RSC的UE需要在发现过程中执行基于用户面的安全方式。
PCF可以保存各RSC与对应安全方式之间的对应关系。
响应于接收到发现安全管理功能发送的RSC,PCF可以基于RSC与对应安全方式之间的对应关系,确定该RSC对应的安全方式。PCF将确定的RSC对应的安全方式通过指示信息发送给发现安全管理功能,即将分配给UE的安全方式通知发现安全管理功能。
在一个可能的方式中,PCF将确定的UE被分配的安全方式的指示信息携带于安全方式检查响应(Security Method Check Response)中发送给安全管理功能。
在一个可能的方式中,发现安全管理功能在向UE的PCF发送携带RSC的安全方式检查请求时,在安全方式检查请求中携带UE的标识。以指示请求的的安全方式对应的UE。
在一个可能的方式中,PCF将安全方式对应的UE的标识携带于安全方式检查响应中。以告知安全方式对应的UE。
发现安全管理功能接收到PCF指示的UE被分配的安全方式后,确定自身是否支持。如果确定安全管理功能自身的安全方式与PCF指示的UE被分配的安全方式相同,则可以确定UE采用UE被分配的安全方式。如果确定安全管理功能自身的安全方式不同于PCF指示的UE被分配的安全方式,则可以确定UE未采用UE被分配的安全方式。
如此,通过PCF确定UE被分配的安全方式。提高确定UE被分配的安全方式的准确性。进而确定UE是否采用被分配的安全方式,可以减少由于发现安全管理功能无法支持UE被分配的安全方式带来的安全风险,提高中继服务安全性
如图6所示,本公开实施例提供一种信息传输方法,被UE执行,包括:
步骤601:接收所述发现安全管理功能发送的指示中继发现安全参数的第一中继发现密钥响应,其中,所述中继发现安全参数,是由所述发现安全管理功能确定所述UE采用所述UE被分配的安全 方式后确定的。
步骤601可以单独实施,也可以结合步骤501一起实施。
发现安全管理功能执行可以在确定安全管理功能支持UE被分配的安全方式,即UE采用了被分配的安全方式后,再向UE提供安全服务。
在一个可能的实现方式中,如果发现安全管理功能从PCF接收到的安全方式,与发现安全管理功能自身角色匹配(即现安全管理功能自身安全方式与从PCF接收到的分配给UE的安全方式相同,也即UE采用了被分配的安全方式),则发现安全管理功能可以确定UE的中继发现安全参数。并向UE发送中继发现安全参数。
在一个可能的实现方式中,中继发现安全参数包括但不限于以下至少之一项:发现密钥;发现消息的加密和完整性保护的算法;关联于定时器的定时参数等。
在一个可能的实现方式中,所述确定所述UE的中继发现安全参数,并向所述UE发送指示所述中继发现安全参数的第一中继发现密钥响应,包括:
响应于所述UE为中继UE,由所述密钥管理功能确定所述中继UE的中继发现安全参数,并向所述中继UE发送指示所述中继发现安全参数的第一中继发现密钥响应。
示例性的,如果中继UE的发现安全管理功能从PCF接收到的安全方式,与中继UE的发现安全管理功能自身角色匹配(即中继UE采用了被分配的安全方式),则中继UE的发现安全管理功能(5G PKMF或5G DDNMF)为中继UE生成发现安全材料(即中继发现安全参数)。中继UE的发现安全管理功能基于接收到的中继UE的安全能力信息也选择用于UE之间广播的发现消息的加密和完整性保护的算法。中继UE的发现安全管理功能向中继UE发送携带中继发现安全参数的第一中继发现密钥响应(Relay Discovery Key Response)消息。
在一个可能的实现方式中,所述确定所述UE的中继发现安全参数,并向所述UE发送指示所述发现中继安全参数的第一中继发现密钥响应,包括:
响应于所述UE为远程UE,向中继UE的密钥管理功能发送所述中继发现密钥请求;
接收所述中继UE的密钥管理功能响应于所述中继发现密钥请求,发送的所述中继发现安全参数;
向所述远程UE发送指示所述中继发现安全参数的中继发现密钥响应。
示例性的,如果远程UE的发现安全管理功能从PCF接收到的安全方法,与远程UE的发现安全管理功能的角色匹配(即远程UE采用了被分配的安全方式),则远程UE的发现安全管理功能(5G PKMF或5G DDNMF)根据收到的RSC定位潜在的中继UE的发现安全管理功能(5G PKMF或5G DDNMF),然后将中继发现密钥请求(Relay Discovery Key Request)消息转发给中继UE的发现安全管理功能。
中继UE的发现安全管理功能从远程UE的发现安全管理功能接收到中继发现密钥请求消息基于接收到的RCS,授权其域中的中继UE之一提供中继服务。
基于接收到的RSC,中继UE的发现安全管理功能检索为RSC生成的中继发现安全参数并以中 继发现密钥响应消息响应远程UE的发现安全管理功能。
远程UE的发现安全管理功能将中继发现安全参数携带于中继发现密钥响应(Relay Discovery Key Response)消息转发给远程UE。
远程UE和中继UE分别在PC5上进行发现过程,相互发现。需要注意的是,如果远程UE和中继UE中任一个未能获得中继发现安全参数,则UE将无法发送受保护的发现消息或理解/验证接收到的发现消息,以便成功地发现彼此,即只有正确使用为RSC分配的安全方法的UE才能发现彼此。
如图7所示,本公开实施例提供一种信息传输方法,被UE执行,包括:
步骤701:接收第二中继发现密钥响应,其中,所述第二中继发现密钥响应是所述发现安全管理功能确定所述UE未采用所述UE被分配的安全方式后发送的。
步骤701可以单独实施,也可以结合步骤501和/或步骤601一起实施。
如果发现安全管理功能从PCF收到的安全方式,与发现安全管理功能自身角色不匹配(即,发现安全管理功能自身安全方式不同于从PCF接收到的分配给UE的安全方式,也即UE未采用了被分配的安全方式),则发现安全管理功能向UE发送第二中继发现密钥响应,向UE说明获取中继发现安全参数失败原因。
如图8所示,本公开实施例提供一种信息传输方法,被PCF执行,包括:
步骤801:接收发现安全管理功能发送的中继发现的RSC,其中,所述RSC,用于供所述PCF确定UE被分配的安全方式,其中,所述RSC,是由所述UE携带于中继发现密钥请求中发送给发现安全管理功能的,其中,所述中继发现密钥请求至少用于请求与所述中继发现相关的中继发现安全参数。
本实施例以5G移动通信系统为例进行描述,但本实施例方法可以不限于应用于5G移动通信系统,如可以应用于下一代移动通信系统中。在此不作限定。
本实施例的方法可以应用于5G ProSe用户到网络(User to Network,U2N)发现的模型A和模型B。
这里,安全方式包括在5G ProSe发现过程中使用的基于控制面的安全方式和基于用户面的安全方式。
发现安全管理功能可以是邻近性服务(ProSe)中用于进行安全性管理的核心网网元。
中继发现安全参数可以包括关联于中继发现以下至少之一:发现密钥;发现消息的加密和完整性保护的算法;关联于定时器的定时参数等。
在一个可能的实现方式中,发现安全管理功能可以用于向中继UE和/或远程UE提供安全密钥、安全算法等。
在一个可能的实现方式中,不同类型的发现安全管理功能关联的安全方式不同。示例行的,一个类型的发现安全管理功能采用基于控制面的安全方式,另一个类型的发现安全管理功能采用基于用户面的安全方式。
在一个实施例中,所述发现安全管理功能,包括以下之一:
邻近服务密钥管理功能(ProSeKey Management Function,PKMF);
直连发现名称管理功能(Direct Discovery Name Management Function,DDNMF)。
在一个可能的实现方式中,PKMF采用基于用户面的安全方式。
在一个可能的实现方式中,DDNMF采用基于控制面的安全方式。
UE可以是5G ProSe中的远程UE(远程UE),也可以是5G ProSe中的中继UE(Relay UE)。其中,中继UE可以是5G ProSe中的U2N中继(User to Network Relay)。
在一个实施例中,所述UE被分配的安全方式是由所述UE的PCF确定并向所述UE指示的。
UE所被分配的安全方式可以是由PCF确定并向UE指示的。
在一个可能的实现方式中,在UE注册到网络的过程中,PCF向UE指示UE需要被分配的安全方式。
在一个可能的实现方式中,UE在服务授权和信息提供过程中从PCF获取其发现安全管理功能的地址以及发现参数。其中,发现参数可以包括以下至少之一项:RSC;控制平面安全指示符。当发现参数包括控制面安全指示符时,表示PCF指示UE采用基于控制面的安全方式。当发现参数不包括控制面安全指示符时,表示PCF指示UE采用基于用户面的安全方式。其中,控制平面安全指示符关联于RSC。
UE可以在确定自身被分配的安全方式后选择发现安全管理功能,并向发现安全管理功能发送中继发现密钥请求(Relay Discovery Key Request)。但是,由于并非所有的UE均能根据规则执行安全方式,例如:UE被分配的RSC提供了控制面安全指示符,即UE需要执行基于控制面的安全方式,但是UE仍然会出现使用基于用户面的安全方式的情况,即向PKMF(采用基于用户面的安全方式)发送中继发现密钥请求。或者,UE被分配的RSC未提供了控制面安全指示符,即UE需要执行基于用户面的安全方式,但是UE仍然会出现使用基于控制面的安全方式的情况,即向DDNMF(采用基于控制面的安全方式)发送中继发现密钥请求。进而使得中继服务的安全方式无法正确执行,影响中继服务安全性。
这里,安全管理功能可以基于中继发现密钥请求确定UE被分配的安全方式。
在一个可能的实现方式中,中继发现密钥请求可以携带有用于确定UE被分配的安全方式的指示信息。
用于确定UE被分配的安全方式的指示信息可以显式或隐含指示UE被分配的安全方式。
在一个可能的实现方式中,用于确定UE被分配的安全方式的指示信息可以包括UE被分配的RSC。
如果UE采用UE被分配的安全方式,那么,安全管理功能支持的安全方式和UE被分配的安全方式一致。
如果UE未采用UE被分配的安全方式,那么,安全管理功能支持的安全方式和UE被分配的安全方式可能不一致。
安全管理功能可以对比安全管理功能支持的安全方式和确定的UE被分配的安全方式,进而UE是否采用了UE被分配的安全方式。
如此,发现安全管理功能基于所述中继发现密钥请求,确定UE是否采用UE被分配的安全方式,可以减少由于发现安全管理功能无法支持UE被分配的安全方式带来的安全风险,提高中继服务安全性。
在一个可能的实现方式中,所述中继发现密钥请求还包括以下至少之一项:
UE的标识;
UE的安全能力信息,如能够支持的安全算法等。
示例性的,中继UE可以向中继UE的发现安全管理功能(PKMF或DDNMF)发送中继发现密钥请求,中继发现密钥请求中可以携带有以下至少之一项:RSC、中继UE的标识、中继UE的的安全能力信息。
示例性的,远程UE可以向远程UE的发现安全管理功能(PKMF或DDNMF)发送中继发现密钥请求,中继发现密钥请求中可以携带有以下至少之一项:RSC、远程UE的标识、远程UE的的安全能力信息。
中继UE和远程UE的核心网网元可以是相同也可以不同。即中继UE的发现安全管理功能和远程UE的发现安全管理功能可以是同一个网元,也可以是不同的网元。中继UE的PCF和远程UE的PCF可以是同一个网元,也可以是不同的网元。
如图9所示,本公开实施例提供一种信息传输方法,被PCF执行,包括:
步骤901:向所述发现安全管理功能发送指示所述UE被分配的安全方式的指示信息,所述指示信息用于供所述发现安全管理功能确定所述UE是否采用所述UE被分配的安全方式。
步骤901可以单独实施,也可以结合步骤801一起实施。
在一个可能的实现方式中,发现安全管理功能将UE的RSC携带于安全方式检查请求(Security Method Check Request)中发送给UE的PCF。
在一个可能的实现方式中,发现安全管理功能预先设置有不同UE与PCF地址的映射表。例如,发现安全管理功能可以具有UE的标识与PCF地址的映射表。发现安全管理功能可以基于中继发现密钥请求中UE的标识,确定UE的PCF的地址,进而向该PCF发送UE携带于中继发现密钥请求中的RSC。
PCF可以在UE业务授权及信息配置等过程中为UE配置RSC。RSC可以具有对应的控制面安全指示符,指示被分配到该RSC的UE需要在发现过程中执行基于控制面的安全方式。如果RSC可以不具有对应的控制面安全指示符,那么,被分配到该RSC的UE需要在发现过程中执行基于用户面的安全方式。
PCF可以保存各RSC与对应安全方式之间的对应关系。
响应于接收到发现安全管理功能发送的RSC,PCF可以基于RSC与对应安全方式之间的对应关系,确定该RSC对应的安全方式。PCF将确定的RSC对应的安全方式通过指示信息发送给发现安 全管理功能,即将分配给UE的安全方式通知发现安全管理功能。
在一个可能的方式中,PCF将确定的UE被分配的安全方式的指示信息携带于安全方式检查响应(Security Method Check Response)中发送给安全管理功能。
在一个可能的方式中,发现安全管理功能在向UE的PCF发送携带RSC的安全方式检查请求时,在安全方式检查请求中携带UE的标识。以指示请求的的安全方式对应的UE。
在一个可能的方式中,PCF将安全方式对应的UE的标识携带于安全方式检查响应中。以告知安全方式对应的UE。
发现安全管理功能接收到PCF指示的UE被分配的安全方式后,确定自身是否支持。如果确定安全管理功能自身的安全方式与PCF指示的UE被分配的安全方式相同,则可以确定UE采用UE被分配的安全方式。如果确定安全管理功能自身的安全方式不同于PCF指示的UE被分配的安全方式,则可以确定UE未采用UE被分配的安全方式。
如此,通过PCF确定UE被分配的安全方式。提高确定UE被分配的安全方式的准确性。进而确定UE是否采用被分配的安全方式,可以减少由于发现安全管理功能无法支持UE被分配的安全方式带来的安全风险,提高中继服务安全性。
需要说明的是,PCF该方法是与前述的UE侧实施例相对应的,例如,网络侧设备和UE需要同时进入或停止DRX周期以保持同步,对于定时器等的设置都是同步实施的。因此相同的解释或是特征不再一一赘述,可以参考前述的实施例。
PCF指示的UE被分配的安全方式后,发现安全管理功能执行的方法与上述发现安全管理功能侧执行的信息传输方法一致,UE执行的方法与上述UE侧执行的信息传输方法一致,在此不再赘述。
为了进一步解释本公开任意实施例,以下提供一个具体实施例。
本示例提出的信息传输方法适用于ProSe U2N Discovery的模型A和模型B。
这里,假设远程UE的5G PKMF/DDNMF配置有RSC与RSC所代表的中继服务的潜在U2N中继(Relay)的5G PKMF/DDNMF地址之间的映射表。
如图10所示,信息传输方法具体包括:
步骤100a:远程UE在服务授权和信息提供过程中从PCF获取其5G PKMF的地址以及发现参数(RSC和可选的控制面安全指示符)。
步骤100b:U2N中继在服务授权和信息提供过程中从PCF获取其5G PKMF的地址以及发现参数(RSC和可选的控制面安全指示器)。
步骤101:基于CP安全指示符的可用性,U2N中继决定向其5G PKMF(如果没有为请求的RSC分配CP安全指示符)或5G DDNMF(如果为请求的RSC分配了CP安全指示符)发送中继发现密钥请求消息)。该消息包括指示执行发现的请求的中继服务的RSC、U2N中继ID和U2N中继的安全能力。
步骤102:U2N中继的5G PKMF/DDNMF根据接收到的RSC验证(例如使用UDM或PCF)U2N中继被授权为中继服务提供服务。
步骤103:U2N中继的5G PKMF/DDNMF向U2N中继的PCF发送安全方式检查请求,以检查分配给RSC的安全方法。该请求至少包括RSC和中继UE ID。
步骤104:U2N中继的PCF根据接收到的RSC和Relay UE ID检查分配给RSC的安全方法,并向U2N中继的5G PKMF/DDNMF发送一个安全方式检查响应,告知安全方法。
步骤105a:如果从PCF接收到的安全方法与其自身角色匹配,则U2N中继的5G PKMF/DDNMF为U2N中继生成发现安全材料。基于接收到的U2N中继的安全能力,U2N中继的5G PKMF/DDNMF也选择用于UE之间广播的发现消息的加密和完整性保护的算法。U2N中继的5G PKMF/DDNMF然后向U2N中继发送中继发现密钥响应(Relay Discovery Key Response)消息。
步骤105a:如果从PCF接收到的安全方法与自己的角色不匹配,U2N中继的5G PKMF/DDNMF不会为U2N中继生成任何发现安全材料,并向U2N中继发送中继发现密钥响应(Relay Discovery Key Response)消息失败原因。
步骤106:远程UE向其5G PKMF/DDNMF发送中继发现密钥请求消息。该消息包括指示执行发现的中继服务的RSC、远程UE ID和远程UE的安全能力。
步骤107:远程UE的5G PKMF/DDNMF验证(例如使用UDM或PCF)远程UE有权请求RSC指示的中继服务。
步骤108:远程UE的5G PKMF/DDNMF向远程UE的PCF发送一个安全方式检查请求,用于检查分配给RSC的安全方法。该请求至少包括RSC和远程UE ID。
步骤109:根据接收到的RSC和远程UE ID,远程UE的PCF检查分配给RSC的安全方法,并向远程UE的5G PKMF/DDNMF发送安全方式检查响应通知安全方法。
步骤110a:如果从PCF接收到的安全方法与自己的角色匹配,则远程UE的5G PKMF/DDNMF根据收到的RSC定位潜在U2N中继的5G PKMF/DDNMF,然后将中继发现密钥请求(Relay Discovery Key Request)消息转发给5G U2N中继的PKMF/DDNMf。
步骤110b:如果从PCF收到的安全方法与自己的角色不匹配,则远程UE的5G PKMF/DDNMF不会将Relay Discovery Key Request消息转发给U2N中继的5G PKMF/DDNMf,而是发送Relay Discovery Key对U2N中继的响应消息,说明失败原因。
步骤111:如果从远程UE的5G PKMF/DDNMF接收到中继发现密钥请求消息,则U2N中继的5G PKMF/DDNMF授权接收到的RSC可以由其域中的U2N中继之一提供服务。
步骤112:基于接收到的RSC,U2N中继的5G PKMF/DDNMF检索在步骤105a中为RSC生成的发现安全材料,并以中继发现密钥响应消息响应远程UE的5G PKMF。
步骤113:远程UE的5G PKMF/DDNMF将中继发现密钥响应(Relay Discovery Key Response)消息(包括发现安全材料、选择的算法等)转发给远程UE。
步骤114:U2N中继和远程UE分别在PC5上进行发现过程,相互发现。需要注意的是,如果UE之一或两个UE在步骤#5b和/或步骤#10b中未能获得发现安全材料,则UE将无法发送受保护的发现消息或理解/验证接收到的消息。发现消息,以便UE无法成功地发现彼此,即只有正确使用为 RSC分配的安全方法的UE才能发现彼此。
步骤115:远程UE和U2N中继继续进行中继服务的其余过程。
如图11所示,本公开实施例提供一种信息传输装置100,设置于发现安全管理功能中,包括:
收发模块110,配置为接收用户设备UE经由基站发送的中继发现密钥请求,其中,所述中继发现密钥请求用于请求与中继发现相关的中继发现安全参数的中继发现密钥请求;
处理模块120,配置为至少基于所述中继发现密钥请求,确定所述UE是否采用所述UE被分配的安全方式。
在一个实施例中,所述收发模块110,还配置为:向所述UE的策略控制功能PCF发送关联于所述中继发现的中继业务代码RSC,其中,所述中继业务代码RSC携带于所述中继发现密钥请求中;
所述收发模块110,还配置为:接收所述PCF响应于所述RSC,向所述发现安全管理功能发送的指示所述UE被分配的安全方式的指示信息;
所述处理模块120,具体配置为基于所述发现安全管理功能关联的安全方式,确定所述UE是否采用所述UE被分配的安全方式。
在一个实施例中,
所述处理模块120,还配置为响应于确定所述UE采用所述UE被分配的安全方式,确定所述UE的中继发现安全参数;
所述收发模块110,还配置为:向所述UE发送指示所述中继发现安全参数的第一中继发现密钥响应。
在一个实施例中,
所述收发模块110,还配置为:响应于所述UE未采用所述UE被分配的安全方式,向所述UE发送第二中继发现密钥响应,其中,所述第二中继发现密钥响应,用于指示所述UE未采用所述UE被分配的安全方式。
在一个实施例中,所述UE被分配的安全方式是由所述UE的PCF确定并向所述UE指示的。
在一个实施例中,所述发现安全管理功能,包括以下之一:
邻近服务密钥管理功能PKMF;
直连发现名称管理功能DDNMF。
如图12所示,本公开实施例提供一种信息传输装置200,设置于用户设备UE中,包括:
收发模块210,配置为:经由基站向发现安全管理功能发送的中继发现密钥请求,其中,所述中继发现密钥请求用于请求与中继发现相关的中继发现安全参数;其中,所述中继发现密钥请求,至少用于供所述发现安全管理功能确定所述UE是否采用所述UE被分配的安全方式。
在一个实施例中,所述中继发现密钥请求中携带的所述中继发现的中继业务代码RSC,所述RSC至少用于供所述发现安全管理功能发送给所述UE的策略控制功能PCF,并由所述PCF基于所述RSC,向所述发现安全管理功能指示为所述UE分配的安全方式。
在一个实施例中,所述收发模块,还配置为:接收所述发现安全管理功能发送的指示中继发现 安全参数的第一中继发现密钥响应,其中,所述中继发现安全参数,是由所述发现安全管理功能确定所述UE采用所述UE被分配的安全方式后确定的。
在一个实施例中,
所述收发模块210,还配置为:接收第二中继发现密钥响应,其中,所述第二中继发现密钥响应是所述发现安全管理功能确定所述UE未采用所述UE被分配的安全方式后发送的。
在一个实施例中,所述UE被分配的安全方式是由所述UE的PCF确定并向所述UE指示的。
在一个实施例中,所述发现安全管理功能,包括以下之一:
邻近服务密钥管理功能PKMF;
直连发现名称管理功能DDNMF。
如图13所示,本公开实施例提供一种信息传输装置300,设置于策略控制功能PCF中,包括:
收发模块310,配置为:接收发现安全管理功能发送的中继发现的中继业务代码RSC,其中,所述RSC,用于供所述PCF确定用户设备UE被分配的安全方式,其中,所述RSC,是由所述UE携带于中继发现密钥请求中发送给发现安全管理功能的,其中,所述中继发现密钥请求至少用于请求与所述中继发现相关的中继发现安全参数。
在一个实施例中,
所述收发模块310,还配置为:向所述发现安全管理功能发送指示所述UE被分配的安全方式的指示信息,所述指示信息用于供所述发现安全管理功能确定所述UE是否采用所述UE被分配的安全方式。
在一个实施例中,所述UE被分配的安全方式是由所述UE的PCF确定并向所述UE指示的。
本公开实施例提供一种通信设备,包括:
处理器;
用于存储处理器可执行指令的存储器;
其中,处理器被配置为:用于运行可执行指令时,实现本公开任意实施例的信息传输方法。
在一个实施例中,通信设备可以包括但不限于至少之一:UE及网络设备。这里网络设备可包括核心网或者接入网设备等。这里,接入网设备可包括基站;核心网可包括AMF、SMF。
其中,处理器可包括各种类型的存储介质,该存储介质为非临时性计算机存储介质,在用户设备掉电之后能够继续记忆存储其上的信息。
处理器可以通过总线等与存储器连接,用于读取存储器上存储的可执行程序,例如,如图2至9所示的方法的至少其中之一。
本公开实施例还提供一种计算机存储介质,计算机存储介质存储有计算机可执行程序,可执行程序被处理器执行时实现本公开任意实施例的信息传输方法。例如,如图2至6所示的方法的至少其中之一。
关于上述实施例中的装置或者存储介质,其中各个模块执行操作的具体方式已经在有关该方法的实施例中进行了详细描述,此处将不做详细阐述说明。
与前述的发现安全管理功能侧、UE侧和PCF侧实施例相对应的,如图14所示,本公开实施例还提出了一种由通信系统10;需要说明的是,该通信系统是与前述的发现安全管理功能侧和PCF侧实施例相对应的,因此相同的解释或是特征不再一一赘述,可以参考前述的实施例。
所述通信系统10包括:发现安全管理功能11和策略控制功能PCF 12,其中,
所述发现安全管理功能11,用于接收用户设备UE经由基站发送的中继发现密钥请求,其中,所述中继发现密钥请求用于请求中继发现关联的中继发现安全参数;至少基于所述中继发现密钥请求,确定所述UE是否采用所述UE被分配的安全方式;
所述发现安全管理功能,具体用于向所述UE的策略控制功能PCF发送关联于所述中继发现的中继业务代码RSC,其中,所述中继业务代码RSC携带于所述中继发现密钥请求中;
所述PCF 12,用于所述接收发现安全管理功能发送的中继发现的中继业务代码RSC,基于所述RSC确定用户设备UE被分配的安全方式。
图15是根据一示例性实施例示出的一种用户设备3000的框图。例如,用户设备3000可以是移动电话,计算机,数字广播用户设备,消息收发设备,游戏控制台,平板设备,医疗设备,健身设备,个人数字助理等。
参照图15,用户设备3000可以包括以下一个或多个组件:处理组件3002,存储器3004,电源组件3006,多媒体组件3008,音频组件3010,输入/输出(I/O)的接口3012,传感器组件3014,以及通信组件3016。
处理组件3002通常控制用户设备3000的整体操作,诸如与显示,电话呼叫,数据通信,相机操作和记录操作相关联的操作。处理组件3002可以包括一个或多个处理器3020来执行指令,以完成上述的方法的全部或部分步骤。此外,处理组件3002可以包括一个或多个模块,便于处理组件3002和其他组件之间的交互。例如,处理组件3002可以包括多媒体模块,以方便多媒体组件3008和处理组件3002之间的交互。
存储器3004被配置为存储各种类型的数据以支持在用户设备3000的操作。这些数据的示例包括用于在用户设备3000上操作的任何应用程序或方法的指令,联系人数据,电话簿数据,消息,图片,视频等。存储器3004可以由任何类型的易失性或非易失性存储设备或者它们的组合实现,如静态随机存取存储器(SRAM),电可擦除可编程只读存储器(EEPROM),可擦除可编程只读存储器(EPROM),可编程只读存储器(PROM),只读存储器(ROM),磁存储器,快闪存储器,磁盘或光盘。
电源组件3006为用户设备3000的各种组件提供电力。电源组件3006可以包括电源管理系统,一个或多个电源,及其他与为用户设备3000生成、管理和分配电力相关联的组件。
多媒体组件3008包括在所述用户设备3000和用户之间的提供一个输出接口的屏幕。在一些实施例中,屏幕可以包括液晶显示器(LCD)和触摸面板(TP)。如果屏幕包括触摸面板,屏幕可以被实现为触摸屏,以接收来自用户的输入信号。触摸面板包括一个或多个触摸传感器以感测触摸、滑动和触摸面板上的手势。所述触摸传感器可以不仅感测触摸或滑动动作的边界,而且还检测与所 述触摸或滑动操作相关的持续时间和压力。在一些实施例中,多媒体组件3008包括一个前置摄像头和/或后置摄像头。当用户设备3000处于操作模式,如拍摄模式或视频模式时,前置摄像头和/或后置摄像头可以接收外部的多媒体数据。每个前置摄像头和后置摄像头可以是一个固定的光学透镜系统或具有焦距和光学变焦能力。
音频组件3010被配置为输出和/或输入音频信号。例如,音频组件3010包括一个麦克风(MIC),当用户设备3000处于操作模式,如呼叫模式、记录模式和语音识别模式时,麦克风被配置为接收外部音频信号。所接收的音频信号可以被进一步存储在存储器3004或经由通信组件3016发送。在一些实施例中,音频组件3010还包括一个扬声器,用于输出音频信号。
I/O接口812为处理组件3002和外围接口模块之间提供接口,上述外围接口模块可以是键盘,点击轮,按钮等。这些按钮可包括但不限于:主页按钮、音量按钮、启动按钮和锁定按钮。
传感器组件3014包括一个或多个传感器,用于为用户设备3000提供各个方面的状态评估。例如,传感器组件3014可以检测到设备3000的打开/关闭状态,组件的相对定位,例如所述组件为用户设备3000的显示器和小键盘,传感器组件3014还可以检测用户设备3000或用户设备3000一个组件的位置改变,用户与用户设备3000接触的存在或不存在,用户设备3000方位或加速/减速和用户设备3000的温度变化。传感器组件3014可以包括接近传感器,被配置用来在没有任何的物理接触时检测附近物体的存在。传感器组件3014还可以包括光传感器,如CMOS或CCD图像传感器,用于在成像应用中使用。在一些实施例中,该传感器组件3014还可以包括加速度传感器,陀螺仪传感器,磁传感器,压力传感器或温度传感器。
通信组件3016被配置为便于用户设备3000和其他设备之间有线或无线方式的通信。用户设备3000可以接入基于通信标准的无线网络,如WiFi,4G或5G,或它们的组合。在一个示例性实施例中,通信组件3016经由广播信道接收来自外部广播管理系统的广播信号或广播相关信息。在一个示例性实施例中,所述通信组件816还包括近场通信(NFC)模块,以促进短程通信。例如,在NFC模块可基于射频识别(RFID)技术,红外数据协会(IrDA)技术,超宽带(UWB)技术,蓝牙(BT)技术和其他技术来实现。
在示例性实施例中,用户设备3000可以被一个或多个应用专用集成电路(ASIC)、数字信号处理器(DSP)、数字信号处理设备(DSPD)、可编程逻辑器件(PLD)、现场可编程门阵列(FPGA)、控制器、微控制器、微处理器或其他电子元件实现,用于执行上述方法。
在示例性实施例中,还提供了一种包括指令的非临时性计算机可读存储介质,例如包括指令的存储器3004,上述指令可由用户设备3000的处理器3020执行以完成上述方法。例如,所述非临时性计算机可读存储介质可以是ROM、随机存取存储器(RAM)、CD-ROM、磁带、软盘和光数据存储设备等。
图16所示,本公开一实施例示出一种基站的结构。例如,基站900可以被提供为一网络侧设备。参照图16,基站900包括处理组件922,其进一步包括一个或多个处理器,以及由存储器932所代表的存储器资源,用于存储可由处理组件922的执行的指令,例如应用程序。存储器932中存储的 应用程序可以包括一个或一个以上的每一个对应于一组指令的模块。此外,处理组件922被配置为执行指令,以执行上述方法前述应用在所述基站的任意方法。
基站900还可以包括一个电源组件926被配置为执行基站900的电源管理,一个有线或无线网络接口950被配置为将基站900连接到网络,和一个输入输出(I/O)接口958。基站900可以操作基于存储在存储器932的操作系统,例如Windows Server TM,Mac OS XTM,UnixTM,LinuxTM,FreeBSDTM或类似。
本领域技术人员在考虑说明书及实践这里公开的发明后,将容易想到本发明的其它实施方案。本公开旨在涵盖本发明的任何变型、用途或者适应性变化,这些变型、用途或者适应性变化遵循本发明的一般性原理并包括本公开未公开的本技术领域中的公知常识或惯用技术手段。说明书和实施例仅被视为示例性的,本发明的真正范围和精神由下面的权利要求指出。
应当理解的是,本发明并不局限于上面已经描述并在附图中示出的精确结构,并且可以在不脱离其范围进行各种修改和改变。本发明的范围仅由所附的权利要求来限制。

Claims (21)

  1. 一种信息传输方法,其中,被发现安全管理功能执行,包括:
    接收用户设备UE经由基站发送的中继发现密钥请求,其中,所述中继发现密钥请求用于请求与中继发现相关的中继发现安全参数;
    至少基于所述中继发现密钥请求,确定所述UE是否采用所述UE被分配的安全方式。
  2. 根据权利要求1所述的方法,其中,所述至少基于所述中继发现密钥请求,确定所述UE是否采用所述UE被分配的安全方式;包括:
    向所述UE的策略控制功能PCF发送关联于所述中继发现的中继业务代码RSC,其中,所述中继业务代码RSC携带于所述中继发现密钥请求中;
    接收所述PCF响应于所述RSC,向所述发现安全管理功能发送的指示所述UE被分配的安全方式的指示信息;
    基于所述发现安全管理功能关联的安全方式,确定所述UE是否采用所述UE被分配的安全方式。
  3. 根据权利要求1或2所述的方法,其中,所述方法还包括:
    响应于确定所述UE采用所述UE被分配的安全方式,确定所述UE的中继发现安全参数,并向所述UE发送指示所述中继发现安全参数的第一中继发现密钥响应。
  4. 根据权利要求1或2所述的方法,其中,所述方法还包括:
    响应于所述UE未采用所述UE被分配的安全方式,向所述UE发送第二中继发现密钥响应,其中,所述第二中继发现密钥响应,用于指示所述UE未采用所述UE被分配的安全方式。
  5. 根据权利要求1或2所述的方法,其中,所述UE被分配的安全方式是由所述UE的PCF确定并向所述UE指示的。
  6. 根据权利要求1或2所述的方法,其中,所述发现安全管理功能,包括以下之一:
    邻近服务密钥管理功能PKMF;
    直连发现名称管理功能DDNMF。
  7. 一种信息传输方法,其中,被用户设备UE执行,包括:
    经由基站向发现安全管理功能发送的中继发现密钥请求,其中,所述中继发现密钥请求用于请求与中继发现相关的中继发现安全参数;其中,所述中继发现密钥请求,至少用于供所述发现安全管理功能确定所述UE是否采用所述UE被分配的安全方式。
  8. 根据权利要求7所述的方法,其中,
    所述中继发现密钥请求中携带的所述中继发现的中继业务代码RSC,所述RSC至少用于供所述发现安全管理功能发送给所述UE的策略控制功能PCF,并由所述PCF基于所述RSC,向所述发现安全管理功能指示为所述UE分配的所述安全方式。
  9. 根据权利要求7或8所述的方法,其中,所述方法还包括:
    接收所述发现安全管理功能发送的指示中继发现安全参数的第一中继发现密钥响应,其中,所述中继发现安全参数,是由所述发现安全管理功能确定所述UE采用所述UE被分配的安全方式后确 定的。
  10. 根据权利要求7或8所述的方法,其中,所述方法还包括:
    接收第二中继发现密钥响应,其中,所述第二中继发现密钥响应是所述发现安全管理功能确定所述UE未采用所述UE被分配的安全方式后发送的。
  11. 根据权利要求1或2所述的方法,其中,所述UE被分配的安全方式是由所述UE的PCF确定并向所述UE指示的。
  12. 根据权利要求7或8所述的方法,其中,所述发现安全管理功能,包括以下之一:
    邻近服务密钥管理功能PKMF;
    直连发现名称管理功能DDNMF。
  13. 一种信息传输方法,其中,被策略控制功能PCF执行,包括:
    接收发现安全管理功能发送的中继发现的中继业务代码RSC,其中,所述RSC,用于供所述PCF确定用户设备UE被分配的安全方式,其中,所述RSC,是由所述UE携带于中继发现密钥请求中发送给发现安全管理功能的,其中,所述中继发现密钥请求至少用于请求与所述中继发现相关的中继发现安全参数。
  14. 根据权利要求13所述的方法,其中,所述方法还包括:
    向所述发现安全管理功能发送指示所述UE被分配的安全方式的指示信息,所述指示信息用于供所述发现安全管理功能确定所述UE是否采用所述UE被分配的安全方式。
  15. 根据权利要求13所述的方法,其中,所述UE被分配的安全方式是由所述UE的PCF确定并向所述UE指示的。
  16. 一种信息传输装置,其中,设置于发现安全管理功能中,包括:
    收发模块,配置为接收用户设备UE经由基站发送的中继发现密钥请求,其中,所述中继发现密钥请求用于请求与中继发现相关的中继发现安全参数的中继发现密钥请求;
    处理模块,配置为至少基于所述中继发现密钥请求,确定所述UE是否采用所述UE被分配的安全方式。
  17. 一种信息传输装置,其中,设置于用户设备UE中,包括:
    收发模块,配置为:经由基站向发现安全管理功能发送的中继发现密钥请求,其中,所述中继发现密钥请求用于请求与中继发现相关的中继发现安全参数;其中,所述中继发现密钥请求,至少用于供所述发现安全管理功能确定所述UE是否采用所述UE被分配的安全方式。
  18. 一种信息传输装置,其中,设置于策略控制功能PCF中,包括:
    收发模块,配置为:接收发现安全管理功能发送的中继发现的中继业务代码RSC,其中,所述RSC,用于供所述PCF确定用户设备UE被分配的安全方式,其中,所述RSC,是由所述UE携带于中继发现密钥请求中发送给发现安全管理功能的,其中,所述中继发现密钥请求至少用于请求与所述中继发现相关的中继发现安全参数。
  19. 一种通信设备,其中,所述通信设备,包括:
    处理器;
    用于存储所述处理器可执行指令的存储器;
    其中,所述处理器被配置为:用于运行所述可执行指令时,实现权利要求1至6或7至12或13至15任一项所述的信息传输方法。
  20. 一种计算机存储介质,其中,所述计算机存储介质存储有计算机可执行程序,所述可执行程序被处理器执行时实现权利要求1至6或7至12或13至15任一项所述的信息传输方法。
  21. 一种通信系统,其中,所述通信系统包括:发现安全管理功能和策略控制功能PCF,
    所述发现安全管理功能,用于接收用户设备UE经由基站发送的中继发现密钥请求,其中,所述中继发现密钥请求用于请求中继发现关联的中继发现安全参数;至少基于所述中继发现密钥请求,确定所述UE是否采用所述UE被分配的安全方式;
    所述发现安全管理功能,还用于向所述UE的策略控制功能PCF发送关联于所述中继发现的中继业务代码RSC,其中,所述中继业务代码RSC携带于所述中继发现密钥请求中;
    所述PCF,用于所述接收发现安全管理功能发送的中继发现的中继业务代码RSC,基于所述RSC确定用户设备UE被分配的安全方式。
PCT/CN2022/112127 2022-08-12 2022-08-12 一种信息传输方法、装置、通信设备及存储介质 WO2024031640A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202280003173.1A CN117882352A (zh) 2022-08-12 2022-08-12 一种信息传输方法、装置、通信设备及存储介质
PCT/CN2022/112127 WO2024031640A1 (zh) 2022-08-12 2022-08-12 一种信息传输方法、装置、通信设备及存储介质

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2022/112127 WO2024031640A1 (zh) 2022-08-12 2022-08-12 一种信息传输方法、装置、通信设备及存储介质

Publications (1)

Publication Number Publication Date
WO2024031640A1 true WO2024031640A1 (zh) 2024-02-15

Family

ID=89850421

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/112127 WO2024031640A1 (zh) 2022-08-12 2022-08-12 一种信息传输方法、装置、通信设备及存储介质

Country Status (2)

Country Link
CN (1) CN117882352A (zh)
WO (1) WO2024031640A1 (zh)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106470382A (zh) * 2015-08-14 2017-03-01 中兴通讯股份有限公司 授权验证方法、配置信息接收方法、装置、基站及终端
WO2021115252A1 (zh) * 2019-12-09 2021-06-17 维沃移动通信有限公司 中继参数的配置方法、终端设备和网络侧设备
WO2021236894A1 (en) * 2020-05-20 2021-11-25 Convida Wireless, Llc Sidelink relay connectivity management
US20210400759A1 (en) * 2020-06-19 2021-12-23 Asustek Computer Inc. Method and apparatus for performing link identifier update procedure in a wireless communication system
WO2022038292A1 (en) * 2020-08-21 2022-02-24 Koninklijke Philips N.V. Privacy of relay selection in cellular sliced networks
US20220095398A1 (en) * 2020-09-21 2022-03-24 Asustek Computer Inc. Method and apparatus for supporting ue-to-network relay communication in a wireless communication system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106470382A (zh) * 2015-08-14 2017-03-01 中兴通讯股份有限公司 授权验证方法、配置信息接收方法、装置、基站及终端
WO2021115252A1 (zh) * 2019-12-09 2021-06-17 维沃移动通信有限公司 中继参数的配置方法、终端设备和网络侧设备
CN113038628A (zh) * 2019-12-09 2021-06-25 维沃移动通信有限公司 中继参数的配置方法、终端设备和网络侧设备
WO2021236894A1 (en) * 2020-05-20 2021-11-25 Convida Wireless, Llc Sidelink relay connectivity management
US20210400759A1 (en) * 2020-06-19 2021-12-23 Asustek Computer Inc. Method and apparatus for performing link identifier update procedure in a wireless communication system
WO2022038292A1 (en) * 2020-08-21 2022-02-24 Koninklijke Philips N.V. Privacy of relay selection in cellular sliced networks
US20220095398A1 (en) * 2020-09-21 2022-03-24 Asustek Computer Inc. Method and apparatus for supporting ue-to-network relay communication in a wireless communication system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Study on security aspects of enhancement for proximity based services in the 5G System (5GS) (Release 17)", 3GPP STANDARD; TECHNICAL REPORT; 3GPP TR 33.847, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, no. V0.7.0, 8 September 2021 (2021-09-08), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France, pages 1 - 148, XP052056457 *

Also Published As

Publication number Publication date
CN117882352A (zh) 2024-04-12

Similar Documents

Publication Publication Date Title
WO2022126345A1 (zh) Drx配置方法及装置、通信设备和存储介质
WO2023184561A1 (zh) 中继通信方法、装置、通信设备及存储介质
WO2024031640A1 (zh) 一种信息传输方法、装置、通信设备及存储介质
WO2022032540A1 (zh) Uav飞行控制、管控策略处理方法及装置、设备及介质
WO2022110057A1 (zh) 无线传输的方法、装置、通信设备及存储介质
WO2024055329A1 (zh) 邻近服务ProSe的无线通信方法、装置、通信设备及存储介质
WO2024031400A1 (zh) 确定激活或去激活辅小区的方法、装置及存储介质
WO2023245354A1 (zh) 安全保护方法、装置、通信设备及存储介质
WO2023231018A1 (zh) 个人物联网pin基元凭证配置方法、装置、通信设备及存储介质
WO2024031391A1 (zh) 测距或侧行链路定位方法、装置、通信设备及存储介质
WO2023070685A1 (zh) 中继通信的方法、装置、通信设备及存储介质
WO2024031523A1 (zh) 信息处理方法及装置、通信设备及存储介质
WO2023070560A1 (zh) 信息传输方法、装置、通信设备和存储介质
WO2023220893A1 (zh) 中继通信方法、装置、通信设备及存储介质
WO2023070509A1 (zh) 信息处理方法及装置、通信设备及存储介质
WO2023216257A1 (zh) 信号覆盖信息确定方法、装置、通信设备和存储介质
WO2024031549A1 (zh) 信息处理方法及装置、通信设备及存储介质
WO2024000123A1 (zh) 密钥生成方法及装置、通信设备及存储介质
WO2024031565A1 (zh) 信息处理方法以及装置、通信设备及存储介质
WO2023184172A1 (zh) 创建pin的方法、装置、通信设备及存储介质
WO2024031399A1 (zh) Ue加入pin的方法及装置、通信设备及存储介质
WO2024016349A1 (zh) 提供感知服务的方法、装置、通信设备及存储介质
WO2023184105A1 (zh) 获取终端位置的方法、装置、通信设备及存储介质
WO2023184183A1 (zh) 信息处理方法及装置、通信设备及存储介质
WO2023206504A1 (zh) 系统消息处理方法及装置、通信设备及存储介质

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 202280003173.1

Country of ref document: CN

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22954599

Country of ref document: EP

Kind code of ref document: A1