WO2024037210A1 - Method and apparatus for broadcast security communication - Google Patents

Method and apparatus for broadcast security communication Download PDF

Info

Publication number
WO2024037210A1
WO2024037210A1 PCT/CN2023/103731 CN2023103731W WO2024037210A1 WO 2024037210 A1 WO2024037210 A1 WO 2024037210A1 CN 2023103731 W CN2023103731 W CN 2023103731W WO 2024037210 A1 WO2024037210 A1 WO 2024037210A1
Authority
WO
WIPO (PCT)
Prior art keywords
network element
air interface
indication information
broadcast service
data
Prior art date
Application number
PCT/CN2023/103731
Other languages
French (fr)
Chinese (zh)
Inventor
郭龙华
吴�荣
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2024037210A1 publication Critical patent/WO2024037210A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/06Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity
    • H04W12/106Packet or message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/40Connection management for selective distribution or broadcast
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W92/00Interfaces specially adapted for wireless communication networks
    • H04W92/04Interfaces between hierarchically different network devices
    • H04W92/10Interfaces between hierarchically different network devices between terminal device and access point, i.e. wireless air interface

Definitions

  • the present application relates to the field of communications, and, more specifically, to a method and apparatus for broadcasting secure communications.
  • public land mobile communication network public land mobile network, PLMN #a and PLMN #b can share a base station.
  • the application function (AF) transmits data to the base station through PLMN#a and PLMN#b, and the base station broadcasts a copy of the data to the user equipment (UE) of PLMN#a and PLMN#b.
  • UE user equipment
  • the data can be securely protected by the multicast/broadcast service transport function (MBSTF) in PLMN#a or PLMN#b.
  • MMSTF multicast/broadcast service transport function
  • This application provides a method and device for broadcasting secure communications, which can improve user experience.
  • a method for broadcasting secure communication is provided.
  • the method can be executed by an access network element, or can also be executed by a component (such as a chip or circuit) of an access network element.
  • a component such as a chip or circuit
  • the method may include: the access network element receives a first session establishment request for the first broadcast service from the first network element in the first network, the first session establishment request includes first indication information, the first The indication information is used to indicate whether security protection is enabled for the first data of the first broadcast service; in response to the first session establishment request, the access network element allocates first air interface resources to the first broadcast service; the access network element The network element receives a second session establishment request for the first broadcast service from the second network element in the second network.
  • the second session establishment request includes second indication information, and the second indication information is used to indicate that the second session establishment request is for the first broadcast service.
  • the access network element determines whether to reuse the first indication information according to the first indication information and/or the second indication information. Air interface resources.
  • the access network elements can determine whether to reuse the first air interface based on whether one or both networks enable security protection for the data of the first broadcast service. resource. This reduces the situation where the terminal device is unable to decrypt and/or integrity check the received broadcast service data because the MBSTFs in the two networks respectively first provide security protection for the broadcast service data, thereby improving user experience.
  • the access network element determines whether to reuse the first air interface resource according to the first indication information and/or the second indication information, including: the access network element determines whether to reuse the first air interface resource according to the first indication information and the second indication information.
  • the indication information determines to reuse the first air interface resource.
  • the above solution can save air interface resources.
  • the method further includes: the access network element sending a message to a terminal device of the first network and a terminal device of the second network based on the first air interface resource. the first data; or, the access network element sends the second data to the terminal equipment of the first network and the terminal equipment of the second network based on the first air interface resource.
  • the first indication information indicates that security protection has been enabled for the first data
  • the second indication information indicates that security has been enabled for the second data.
  • the access network element shall An indication information and/or the second indication information determines whether to reuse the first air interface resource, including: the access network element determines not to reuse the first air interface resource according to the first indication information and/or the second indication information. Air interface resources.
  • the access network element determines not to reuse the first air interface resource according to the first indication information and/or the second indication information, including: the The access network element allocates a second air interface resource to the second data according to the first indication information and/or the second indication information, and the first air interface resource is different from the second air interface resource; the access network element allocates a second air interface resource based on the first indication information and/or the second indication information.
  • the first air interface resource sends the first data to the terminal device of the first network; the access network element sends the second data to the terminal device of the second network based on the second air interface resource.
  • the method further includes: the access network element sending the first data to the terminal device of the first network based on the first air interface resource; the access network element The network element allocates a second air interface resource to the second data, and the first air interface resource is different from the second air interface resource; the access network element sends the third air interface resource to the terminal device of the second network based on the second air interface resource. 2 data.
  • the above solution not only enables the first network and the second network to securely protect the data of the first broadcast service, but also enables the terminal devices of the first network and the second network to separately protect the received data of the first broadcast service. Perform decryption and/or integrity verification to improve communication security and user experience.
  • the first data is securely protected by the first network; and the second data is securely protected by the second network.
  • the method further includes: the access network element storing the first indication information.
  • the first session establishment request further includes a service identifier corresponding to the first broadcast service
  • the second session establishment request further includes a service corresponding to the first broadcast service.
  • Identification the access network element determines whether to reuse the first air interface resource according to the first indication information and/or the second indication information, including: the access network element determines whether to reuse the first air interface resource according to the service identification corresponding to the first broadcast service , and the first indication information and/or the second indication information determine whether to multiplex the first air interface resource.
  • the second aspect provides a method for broadcasting secure communication.
  • the method is a method executed by the second network element corresponding to the method of the first aspect. Therefore, the beneficial effects achieved by the method of the first aspect can also be achieved.
  • the method may be executed by the second network element, or may be executed by a component (such as a chip or circuit) of the second network element, which is not limited in this application. For convenience of description, the following description takes execution by the second network element as an example.
  • the method may include: a second network element of the second network obtaining second indication information, the second indication information being used to indicate whether security protection is enabled for the second data of the first broadcast service;
  • the network element sends a second session establishment request for the first broadcast service, where the second session establishment request includes the second indication information.
  • the second network element of the second network obtains the second indication information, including: the second network element determines the second indication information.
  • the second network element determines the second indication information based on preconfiguration information.
  • the second network element accepts security configuration information from the service provider or application function, and determines the second indication information based on the security configuration information.
  • the security configuration information is used to indicate whether to perform security protection between the user plane network element of the second network and the terminal device of the second network.
  • the second network element is a multicast/broadcast service function (MBSF) or a network exposure function (NEF).
  • MBSF multicast/broadcast service function
  • NEF network exposure function
  • the second network element of the second network obtains the second indication information, including: the second network element receives the second indication information from the third network element of the second network. the second instruction information.
  • the method further includes: the second network element sending a request message to the third network element, the request message being used to request the second indication information.
  • the second network element is a multicast/broadcast service transport function (MBSTF).
  • MMSTF multicast/broadcast service transport function
  • the third aspect provides a method for broadcasting secure communication.
  • This method is a method executed by the second network element corresponding to the method of the first aspect. Therefore, the beneficial effects achieved by the method of the first aspect can also be achieved.
  • the method may be executed by the second network element, or may be executed by a component (such as a chip or circuit) of the second network element, which is not limited in this application. For convenience of description, the following description takes execution by the second network element as an example.
  • the method may include: a second network element of the second network receiving second indication information, the second indication information being used to indicate that the first Whether security protection is enabled for the second data of the broadcast service;
  • the second network element sends a second session establishment request for the first broadcast service to the access network element, and the second session establishment request includes the second indication information.
  • the second network element is a multicast/broadcast-session management function (MB-SMF).
  • M-SMF multicast/broadcast-session management function
  • a method for broadcasting secure communication is provided.
  • the method can be executed by an access network element, or can also be executed by a component (such as a chip or circuit) of an access network element.
  • a component such as a chip or circuit
  • the method may include: the access network element receiving a first session establishment request for the first broadcast service from the first network element in the first network; in response to the first session establishment request, the access network element is The first broadcast service allocates first air interface resources; the access network element receives a second session establishment request for the first broadcast service from the second network element in the second network, the second session establishment request includes Third indication information, the third indication information is used to indicate whether to reuse existing air interface resources for the first broadcast service; in response to the second session establishment request, the access network element determines according to the third indication information Whether to reuse the first air interface resource.
  • the access network elements can determine whether to reuse the first air interface resource according to instructions from the networks. This reduces the situation where the terminal device is unable to decrypt and/or integrity check the received broadcast service data because the MBSTFs in the two networks respectively first provide security protection for the broadcast service data, thereby improving user experience.
  • the third indication information is used to indicate that the access network element is to reuse existing air interface resources for the first broadcast service according to the third The indication information determines whether to reuse the first air interface resource, including: the access network element determines to multiplex the first air interface resource according to the third indication information.
  • the access network element discards the data of the first broadcast service received from the second network.
  • the access network element sends the first broadcast service to the terminal equipment of the first network and the terminal equipment of the second network based on the first air interface resource.
  • the first data of the first broadcast service; or, the access network element sends the second data of the first broadcast service to the terminal equipment of the first network and the terminal equipment of the second network based on the first air interface resource, wherein, the third One data comes from the first network, and the second data comes from the second network.
  • the third indication information indicates that air interface resources are allocated to the first broadcast service according to the service identifier corresponding to the first broadcast service.
  • the access network element determines to multiplex the first air interface resource according to the third indication information, including: the access network element determines to multiplex the first air interface resource according to the existing existence of the third air interface resource.
  • the first air interface resource corresponding to a broadcast service is determined to be multiplexed for the first broadcast service.
  • the second session creation request does not carry the service identifier corresponding to the first broadcast service.
  • the third indication information is used to indicate that the access network element does not reuse existing air interface resources for the first broadcast service according to the third aspect.
  • the third indication information determines whether to reuse the first air interface resource, including: the access network element determines not to reuse the first air interface resource according to the third indication information.
  • the access network element determines not to reuse the first air interface resource according to the third indication information, including: the access network element determines not to reuse the first air interface resource according to the third indication information.
  • the instruction information allocates a second air interface resource to the second data of the first broadcast service, and the first air interface resource is different from the second air interface resource; the access network element provides the terminal of the first network with the first air interface resource based on the first air interface resource.
  • the device sends the first data of the first broadcast service; the access network element sends the second data to the terminal device of the second network based on the second air interface resource, wherein the first data comes from the first network, The second data comes from the second network.
  • the method further includes: the access network element sending a first portion of the first broadcast service to a terminal device of the first network based on the first air interface resource. data; the access network element allocates a second air interface resource for the second data of the first broadcast service, and the first air interface resource is different from the second air interface resource; the access network element allocates a second air interface resource to the second data based on the second air interface resource.
  • the terminal device of the second network sends the second data, wherein the first data comes from the first network and the second data comes from the second network.
  • the first data of the first broadcast service is securely protected by the first network; the second data of the first broadcast service is securely protected by the second network Protect.
  • the third indication information is used to indicate that the existing air interface resources are not reused for the first broadcast service.
  • the session identifier corresponding to the second session establishment request allocates air interface resources for the first broadcast service.
  • the access network element determines not to reuse the first air interface resource according to the third indication information, including: the access network element determines not to reuse the first air interface resource according to the third indication information.
  • the instruction information checks whether there is an air interface resource corresponding to the session identifier; if there is no air interface resource corresponding to the session identifier, the access network element determines not to reuse the first air interface resource for the first broadcast service.
  • a fifth aspect provides a method for broadcasting secure communications.
  • the method is a method executed by a second network element corresponding to the method of the first aspect. Therefore, the beneficial effects achieved by the method of the first aspect can also be achieved.
  • the method may be executed by the second network element, or may be executed by a component (such as a chip or circuit) of the second network element, which is not limited in this application. For convenience of description, the following description takes execution by the second network element as an example.
  • the method may include: a second network element of the second network obtaining third indication information, the third indication information being used to indicate whether to reuse existing air interface resources for the first broadcast service;
  • the network element sends a second session establishment request for the first broadcast service, where the second session establishment request includes the third indication information.
  • the second network element of the second network obtains the third indication information, including: the second network element determines the third indication information.
  • the second network element determines the third indication information, including: the second network element determines the third indication information according to the second indication information, and the second network element determines the third indication information according to the second indication information.
  • the indication information is used to indicate whether security protection is enabled for the data of the first broadcast service.
  • the third indication information when the second indication information is used to indicate that security protection is enabled for the data of the first broadcast service, the third indication information is used to indicate that the security protection is enabled for the data of the first broadcast service.
  • the first broadcast service does not reuse existing air interface resources; or, when the second indication information is used to indicate that security protection is not enabled for the data of the first broadcast service, the third indication information is used to indicate that the security protection for the data of the first broadcast service is not enabled.
  • the first broadcast service reuses existing air interface resources.
  • the second network element of the second network obtains the third indication information, including: the second network element receives the third indication information from the fourth network element of the second network. the third instruction information.
  • a method for broadcast secure communication including: a first network element in a first network sending a first session establishment request for a first broadcast service to an access network element, the first session establishment request being includes first indication information, the first indication information is used to indicate whether security protection is enabled for the first data of the first broadcast service; the access network element receives from the first network element in the first network for the first A first session establishment request for the broadcast service; in response to the first session establishment request, the access network element allocates a first air interface resource to the first broadcast service; the second network element sends a request for the first session establishment request to the access network element.
  • a second session establishment request for a broadcast service the access network element receives a second session establishment request for the first broadcast service from a second network element in the second network, and the second session establishment request includes the second session establishment request.
  • Two indication information the second indication information is used to indicate whether security protection is enabled for the second data of the first broadcast service; in response to the second session establishment request, the access network element according to the first indication information and/ Or the second indication information determines whether to reuse the first air interface resource.
  • the access network element determines whether to reuse the first air interface resource according to the first indication information and/or the second indication information, including: the access network element determines whether to reuse the first air interface resource according to the first indication information and the second indication information.
  • the indication information determines to reuse the first air interface resource.
  • the method further includes: the user plane network element of the first network sending the first data of the first broadcast service to the access network element;
  • the network element entering the network sends the data of the first broadcast service to the terminal equipment of the first network and the terminal equipment of the second network based on the first air interface resource;
  • the terminal equipment of the first network receives the data based on the first air interface resource.
  • the first data is received by the terminal device of the second network based on the first air interface resource; or the user plane network element of the second network sends the third broadcast service of the first broadcast service to the access network element.
  • the access network element sends the data of the first broadcast service to the terminal equipment of the first network and the terminal equipment of the second network based on the first air interface resource; the terminal equipment of the first network based on the The first air interface resource receives the second data, and the terminal device of the second network receives the second data based on the first air interface resource.
  • the first indication information indicates that security protection has been enabled for the first data
  • the second indication information indicates that security has been enabled for the second data.
  • the access network element shall An indication information and/or the second indication information determines whether to reuse the first air interface resource, including: the access network element determines not to reuse the first air interface resource according to the first indication information and/or the second indication information. Air interface resources.
  • the method further includes: the access network element sending the first data to the terminal device of the first network based on the first air interface resource; the first The terminal equipment of the network receives the first data based on the first air interface resource; the access network element allocates a second air interface resource to the data of the first broadcast service, and the first air interface resource is different from the second air interface resource; The access network element sends the second data to the terminal device of the second network based on the second air interface resource; the terminal device of the second network receives the second data based on the second air interface resource.
  • the first data is securely protected by the first network; and the second data is securely protected by the second network.
  • the access network element stores the first indication information.
  • a seventh aspect provides a method for broadcasting secure communications, which is characterized by including:
  • the first network element in the first network sends a first session establishment request for the first broadcast service to the access network element; the access network element receives a first session establishment request for the first broadcast service from the first network element in the first network the first session establishment request; in response to the first session establishment request, the access network element allocates the first air interface resource to the first broadcast service; the second network element of the second network obtains the second indication information, and the The second indication information is used to indicate whether security protection is enabled for the data of the first broadcast service.
  • the second network element sends a second session establishment request for the first broadcast service to the access network element.
  • the second session establishment request includes the second indication information; the access network element receives a second session establishment request for the first broadcast service from the second network element in the second network, the second session establishment request includes third indication information, The third indication information is used to indicate whether to reuse existing air interface resources for the first broadcast service; in response to the second session establishment request, the access network element determines whether to reuse the third indication information according to the third indication information. An empty resource.
  • the third indication information is used to indicate that the access network element is to reuse existing air interface resources for the first broadcast service according to the third The indication information determines whether to reuse the first air interface resource, including: the access network element determines to multiplex the first air interface resource according to the third indication information.
  • the access network element discards the data of the first broadcast service received from the second network.
  • the user plane network element of the first network sends the first data of the first broadcast service to the access network element; the access network element is based on The first air interface resource sends the first data to the terminal equipment of the first network and the terminal equipment of the second network; the terminal equipment of the first network receives the first data based on the first air interface resource, and the second network The terminal equipment receives the first data based on the first air interface resource; or the user plane network element of the second network sends the second data of the first broadcast service to the access network network element; the access network network element The second data of the first broadcast service is sent to the terminal equipment of the first network and the terminal equipment of the second network based on the first air interface resource, and the terminal equipment of the first network receives the second data based on the first air interface resource.
  • Data, the terminal device of the second network receives the second data based on the first air interface resource; wherein the first data comes from the first network, and the second data comes from the second network.
  • the third indication information indicates that air interface resources are allocated to the first broadcast service according to the service identifier corresponding to the first broadcast service.
  • the access network element determines to multiplex the first air interface resource according to the third indication information, including: the access network element determines to multiplex the first air interface resource according to the existing The first air interface resource corresponding to a broadcast service is determined to be multiplexed for the first broadcast service.
  • the third indication information is used to indicate that the access network element does not reuse existing air interface resources for the first broadcast service according to the third The third indication information determines whether to reuse the first air interface resource, including: the access network element determines not to reuse the first air interface resource according to the third indication information.
  • the method further includes: the access network element sending a first portion of the first broadcast service to a terminal device of the first network based on the first air interface resource. data; the terminal equipment of the first network receives the first data based on the first air interface resource; the access network element allocates a second air interface resource for the second data of the first broadcast service, and the first air interface resource is related to the first air interface resource.
  • the second air interface resources are different; the access network element sends the second data to the terminal device of the second network based on the second air interface resource; the terminal device of the second network receives the second data based on the second air interface resource , wherein the first data comes from the first network, and the second data comes from the second network.
  • the first data of the first broadcast service is installed by the first network. Full protection; the second data of the first broadcast service is securely protected by the second network.
  • the third indication information is used to indicate that the existing air interface resources are not reused for the first broadcast service.
  • the session identifier corresponding to the second session establishment request allocates air interface resources for the first broadcast service.
  • the access network element determines not to reuse the first air interface resource according to the third indication information, including: the access network element determines not to reuse the first air interface resource according to the third indication information.
  • the instruction information checks whether there is an air interface resource corresponding to the session identifier; if there is no air interface resource corresponding to the session identifier, the access network element determines not to reuse the first air interface resource for the first broadcast service.
  • An eighth aspect provides a communication device, which includes: at least one processor for executing computer programs or instructions stored in a memory to execute any of the possible implementations of the first to third aspects.
  • the device further includes a memory for storing computer programs or instructions.
  • the device further includes a communication interface, through which the processor reads the computer program or instructions stored in the memory.
  • the device is a communication device (such as an access network element, a first network element, or a second network element).
  • the device is a chip, chip system or circuit used in communication equipment (such as an access network element, such as a first network element, and a second network element).
  • communication equipment such as an access network element, such as a first network element, and a second network element.
  • the present application provides a processor for executing the methods provided in the above first to fifth aspects.
  • processor output, reception, input and other operations can be understood as processor output, reception, input and other operations.
  • transmitting and receiving operations performed by the radio frequency circuit and the antenna, which is not limited in this application.
  • a delay control system including an access network element, a first network element and a second network element.
  • the access network element is used in any of the possible implementation methods of the first aspect.
  • the method, the second network element is used to perform the method in any possible implementation manner of the above second aspect or the third aspect; or, the access network element is used in any possible implementation manner of the above fourth aspect
  • the second network element is configured to perform the method in any possible implementation manner of the fifth aspect.
  • a computer-readable storage medium stores a program code for device execution.
  • the program code includes a program code for executing any of the possible implementations of the above-mentioned first to fifth aspects. Methods.
  • a computer program product containing instructions is provided.
  • the computer program product When the computer program product is run on a computer, it causes the computer to execute the method in any of the possible implementation modes of the first to fifth aspects.
  • Figure 1 is a 5G system applicable to the embodiment of this application.
  • Figure 2 is a schematic diagram of a multicast broadcast service architecture suitable for the method provided by the embodiment of the present application.
  • Figure 3 shows a schematic diagram of a scenario applicable to this application.
  • Figure 4 shows a schematic diagram of another scenario applicable to this application.
  • Figure 5 shows a schematic diagram of a method 100 for broadcasting secure communications provided by this application.
  • Figure 6 shows a schematic diagram of a method 200 for broadcasting secure communications provided by this application.
  • Figure 7 shows a schematic diagram of a method 300 for broadcasting secure communications provided by this application.
  • Figure 8 shows a schematic diagram of a method 400 for broadcasting secure communications provided by this application.
  • Figure 9 shows a schematic diagram of a method 500 for broadcasting secure communications provided by this application.
  • Figure 10 shows a schematic diagram of a method 600 for broadcasting secure communications provided by this application.
  • Figure 11 shows a schematic diagram of a method 700 for broadcasting secure communications provided by this application.
  • Figure 12 shows a schematic diagram of a method 800 for broadcasting secure communications provided by this application.
  • Figure 13 shows a schematic diagram of a method 900 for broadcasting secure communications provided by this application.
  • Figure 14 shows a schematic diagram of a method 1000 for broadcasting secure communications provided by this application.
  • Figure 15 shows a schematic diagram of a method 1100 for broadcasting secure communications provided by this application.
  • Figure 16 is a schematic block diagram of the communication device provided by this application.
  • FIG 17 is another schematic block diagram of the communication device provided by this application.
  • the technical solution provided by this application can be applied to various communication systems, such as: fifth generation (5th generation, 5G) or new radio (new radio, NR) system, long term evolution (long term evolution, LTE) system, LTE frequency division Duplex (frequency division duplex, FDD) system, LTE time division duplex (TDD) system, etc.
  • the technical solution provided by this application can also be applied to future communication systems, such as the sixth generation mobile communication system.
  • the technical solution provided by this application can also be applied to device-to-device (D2D) communication, vehicle-to-everything (V2X) communication, machine-to-machine (M2M) communication, machine type Communication (machine type communication, MTC), and Internet of Things (Internet of things, IoT) communication systems or other communication systems.
  • D2D device-to-device
  • V2X vehicle-to-everything
  • M2M machine-to-machine
  • MTC machine type Communication
  • Internet of Things Internet of things, IoT
  • the network architecture is, for example, the 5G system (the 5th generation system, 5GS) defined in the 3rd Generation Partnership Project (3GPP) protocol TS23.501.
  • the network architecture can be divided into two parts: access network (AN) and core network (CN).
  • the access network can be used to implement wireless access-related functions.
  • the core network mainly includes the following key logical network elements: access and mobility management function (AMF), session management function (session management function (SMF), user plane function (UPF), policy control function (PCF) and unified data management (UDM), etc.
  • AMF access and mobility management function
  • SMF session management function
  • UPF user plane function
  • PCF policy control function
  • UDM unified data management
  • User equipment can be called terminal equipment, terminal device, access terminal, user unit, user station, mobile station, mobile station (MS), mobile terminal , MT), remote station, remote terminal, mobile device, user terminal, terminal, wireless communications equipment, user agent or user device.
  • the terminal device may be a device that provides voice/data connectivity to the user, such as a handheld device, a vehicle-mounted device, etc. with wireless connectivity capabilities.
  • terminals include: mobile phones, tablets, computers with wireless transceiver functions (such as laptops, handheld computers, etc.), mobile internet devices (MID), virtual reality (virtual reality, VR) equipment, augmented reality (AR) equipment, wireless terminals in industrial control, wireless terminals in self-driving, wireless terminals in remote medical Terminals, wireless terminals in smart grids, wireless terminals in transportation safety, wireless terminals in smart cities, wireless terminals in smart homes, cellular phones, cordless Telephone, session initiation protocol (SIP) telephone, wireless local loop (WLL) station, personal digital assistant (PDA), handheld device with wireless communication capabilities, computing device or connection to other processing equipment such as wireless modems, vehicle-mounted equipment, wearable devices, terminal equipment in 5G networks or future evolved public land mobile communication networks (public land mobile network, terminal equipment in PLMN), etc.
  • MID virtual reality
  • VR virtual reality
  • AR augmented reality
  • wireless terminals in industrial control wireless terminals in self-driving
  • wireless terminals in remote medical Terminals wireless terminals in smart grid
  • the terminal device can also be a terminal device in an Internet of things (IoT) system.
  • IoT Internet of things
  • Its main technical feature is to connect objects to the network through communication technology, thereby realizing an intelligent network of human-computer interconnection and object-object interconnection.
  • IoT technology can achieve massive connections, deep coverage, and terminal power saving through narrowband (NB) technology, for example.
  • NB narrowband
  • terminal equipment can also include smart printers, train detectors, etc. Its main functions include collecting data (some terminal equipment), receiving control information and downlink data from network equipment, and sending electromagnetic waves to transmit uplink data to network equipment.
  • the user equipment can be any device that can access the network. Terminal equipment and access network equipment can communicate with each other using some air interface technology.
  • the user equipment can be used to act as a base station.
  • user equipment may act as a scheduling entity that provides sidelink signals between user equipments in V2X or D2D, etc.
  • V2X or D2D a scheduling entity that provides sidelink signals between user equipments in V2X or D2D, etc.
  • cell phones and cars use sidelink signals to communicate with each other.
  • Cell phones and smart home devices communicate between each other without having to relay communication signals through base stations.
  • Radio access network (R)AN) equipment used to provide network access functions for authorized user equipment in a specific area, and can use different services according to the level of user equipment, business needs, etc. Quality transmission tunnel.
  • (R)AN can manage wireless resources, provide access services to user equipment, and then complete the forwarding of control signals and user equipment data between user equipment and the core network.
  • (R)AN can also be understood as a base station in a traditional network.
  • the access network device in the embodiment of the present application may be any communication device with wireless transceiver functions used to communicate with user equipment.
  • the access network equipment includes but is not limited to evolved Node B (eNB) or 5G, such as NR, gNB in the system, or transmission point (TRP or TP), one of the base stations in the 5G system Or a group (including multiple antenna panels) of antenna panels, or it can also be a network node that constitutes a gNB or transmission point, such as a baseband unit (BBU), or a distributed unit (DU), etc.
  • eNB evolved Node B
  • 5G such as NR, gNB in the system, or transmission point (TRP or TP)
  • TRP or TP transmission point
  • BBU baseband unit
  • DU distributed unit
  • gNB may include centralized units (CUs) and DUs.
  • the gNB may also include an active antenna unit (AAU).
  • CU implements some functions of gNB
  • DU implements some functions of gNB.
  • CU is responsible for processing non-real-time protocols and services, implementing radio resource control (RRC), and packet data convergence protocol (PDCP) layer functions.
  • RRC radio resource control
  • PDCP packet data convergence protocol
  • DU is responsible for processing physical layer protocols and real-time services, and implementing the functions of the radio link control (RLC) layer, media access control (MAC) layer and physical (physical, PHY) layer.
  • RLC radio link control
  • MAC media access control
  • PHY physical layer
  • the access network device may be a device including one or more of a CU node, a DU node, and an AAU node.
  • the CU can be divided into access network equipment in the access network (radio access network, RAN), or the CU can be divided into access network equipment in the core network (core network, CN). This application does not Make limitations.
  • UPF User plane function
  • QoS quality of service
  • user plane network elements can still be UPF network elements, or they can have other names, which are not limited in this application.
  • Access and mobility management function (AMF) network element The access and mobility management function network element is mainly used for mobility management and access management, etc., and can be used to implement MME functions in addition to session management. Other functions, such as access authorization/authentication and other functions. For convenience of description, in the embodiment of this application, the access and mobility management function network element is referred to as "AMF" for short.
  • the access and mobility management equipment may still be an AMF, or may have other names, which are not limited in this application.
  • Session management function (SMF) network element mainly used for session management, Internet protocol (IP) address allocation and management of user equipment, selection of manageable user plane functions, policy control and charging The endpoint of the functional interface and downstream data notification, etc.
  • IP Internet protocol
  • the session management function network element is referred to as "SMF" for short.
  • SMF is a type of session management network element.
  • the session management network element may still be SMF, or may have other names, which are not limited in this application.
  • PCF Policy control function
  • the policy control network element can still be a PCF network element, or it can also have other names, which is not limited in this application.
  • Application function (AF) network element used for data routing affected by applications, wireless access network open function network element, interacting with the policy framework for policy control, etc.
  • AF application function
  • the application function network element can still be an AF network element, or it can also have other names, which is not limited in this application.
  • Unified data management (UDM) network element used to process UE identification, access authentication, registration and mobility management, etc.
  • unified data management can still be a UDM network element, or it can also have other names, which is not limited in this application.
  • AUSF Authentication server function
  • the authentication server functional network element can still be an AUSF network element, or it can also have other names, which is not limited in this application.
  • Network data analytics function network element: used to identify network slicing instances and load load level information of network slicing instances.
  • the network data analysis function enables NF consumers to subscribe or unsubscribe to periodic notifications and notify consumers when thresholds are exceeded.
  • network data analysis function network elements can still be NWDAF network elements, or they can have other names, which are not limited in this application.
  • DN Data network
  • DN is a network located outside the operator's network.
  • the operator's network can access multiple DNs.
  • a variety of services can be deployed on the DN, which can provide data and/or voice for terminal devices. Waiting for service.
  • DN is a private network of a smart factory.
  • the sensors installed in the workshop of the smart factory can be terminal devices.
  • the control server of the sensor is deployed in the DN, and the control server can provide services for the sensor.
  • the sensor can communicate with the control server, obtain instructions from the control server, and transmit the collected sensor data to the control server according to the instructions.
  • DN is the internal office network of a company.
  • the mobile phones or computers of employees of the company can be used as terminal devices.
  • the employees' mobile phones or computers can access information and data resources on the company's internal office network.
  • network elements can communicate with each other through the interfaces shown in the figure.
  • the UE and the AMF can interact through the N1 interface, and the interaction message can be called an N1 message (N1Message), for example.
  • N1Message N1 message
  • RAN and AMF can interact through the N2 interface, which can be used for sending non-access stratum (NAS) messages.
  • NAS non-access stratum
  • RAN and UPF can interact through the N3 interface, which can be used to transmit user plane data, etc.
  • SMF and UPF can interact through the N4 interface.
  • the N4 interface can be used to transmit information such as tunnel identification information of the N3 connection, data cache indication information, and downlink data notification messages.
  • UPF and DN can interact through the N6 interface, which can transmit user plane data, etc.
  • the relationship between other interfaces and each network element is shown in Figure 1. For the sake of simplicity, they will not be described in detail here. The following is a brief introduction to the interface names and functions between each network element as follows:
  • N7 The interface between PCF and SMF, used to deliver control policies corresponding to protocol data unit (PDU) sessions or corresponding business data flows.
  • PDU protocol data unit
  • N15 The interface between PCF and AMF, used to deliver UE policies and access control related policies.
  • N5 The interface between AF and PCF, used for issuing application service requests and reporting network events.
  • N4 The interface between SMF and UPF, used to transfer information between the control plane and the user plane, including controlling the delivery of forwarding rules for the user plane, QoS control rules, traffic statistics rules, etc., and reporting of user plane information. .
  • N11 The interface between SMF and AMF, used to transfer PDU session tunnel information between RAN and UPF, transfer control messages sent to UE, transfer radio resource control information sent to RAN, etc.
  • N2 The interface between AMF and RAN, used to transmit wireless bearer control information from the core network side to the RAN.
  • N1 The interface between AMF and UE, independent of access, is used to deliver QoS control rules to UE, etc.
  • N8 The interface between AMF and UDM, used for AMF to obtain access and mobility management-related subscription data and authentication data from UDM, and for AMF to register UE's current mobility management-related information with UDM.
  • N10 The interface between SMF and UDM, used for SMF to obtain session management-related subscription data from UDM, and for SMF to register UE current session-related information with UDM.
  • N35 The interface between UDM and UDR, used by UDM to obtain user subscription data information from UDR.
  • N36 The interface between PCF and UDR, used for PCF to obtain policy-related contract data and application data-related information from UDR.
  • N12 The interface between AMF and AUSF, used for AMF to initiate the authentication process to AUSF, which can carry SUCI as the contract identification;
  • N13 The interface between UDM and AUSF, used by AUSF to obtain the user authentication vector from UDM to perform the authentication process.
  • FIG 2 is a schematic diagram of a multicast broadcast service architecture suitable for the method provided by the embodiment of the present application.
  • the multicast broadcast service architecture and functions shown in Figure 2 are enhanced and defined based on the unicast network architecture and functions.
  • the following is a brief introduction to the multicast broadcast service-specific functions of each network element in Figure 2.
  • UE The main functions of UE are to receive multicast data through PTM/PTP, receive group/broadcast data through PTM, process QoS, initiate session join (session join) and session leave (session leave), and the terminal side of 5G MBS Resource management.
  • RAN is mainly responsible for processing MBS QoS flows, sending data to UE through point to multipoint (PTM) and point to point (PTP), configuring the AS layer to receive broadcast flows, and transmitting data between PTM and Switching between PTPs, supporting Xn and N2 switching of multicast sessions, processing session signaling, and establishing air interface broadcast and multicast resources, etc.
  • PTM point to multipoint
  • PTP point to point
  • AMF is mainly responsible for signaling routing (NG-RAN ⁇ MB-SMF) and selecting broadcast NG-RANs.
  • SMF In order to support 5G MBS features, SMF needs to be enhanced for unicast SMF, which is mainly reflected in the addition of: discovery of MB-SMF, authentication of UE joining, interaction with MB-SMF to manage multicast session context, and interaction with RAN to establish multicast transmission. resources and other functions.
  • UPF is mainly responsible for interacting with MB-UPF to receive multicast data transmitted through the individual delivery mode, and transmitting multicast data transmitted in the individual delivery mode to the UE through the PDU session.
  • PCF is mainly responsible for QoS processing of multicast and broadcast service (MBS) sessions, providing policy information to multicast and broadcast SMF (MB-SMF), and communicating with user data repository ( user data repository, UDR) to interactively obtain QoS information, etc.
  • MMS multicast and broadcast service
  • UDR user data repository
  • PCF is an optional network element. This functional entity is only required when using dynamic policy charging control (PCC).
  • Multicast/broadcast-session management function (MB-SMF) network element MB-SMF is an entity that supports broadcast characteristics. MB-SMF can also have the function of unicast SMF at the same time. Specifically, MB-SMF is responsible for: management of MBS sessions, including QoS control, etc.; configuring multicast and broadcast UPF (MB-UPF); interacting with RAN to control broadcast flow transmission (broadcast session specific functions); Interact with SMF to associate protocol data unit (PDU) sessions; interact with RAN to control the transmission of multicast streams (multicast session specific functions), etc.
  • MB-UPF multicast and broadcast UPF
  • PDU protocol data unit
  • the multicast/broadcast session management function network element is referred to as the multicast session management function network element, or "MB-SMF".
  • MB-SMF is a type of multicast session management network element.
  • the multicast session management network element can still be MB-SMF, or it can also have other names, which is not limited in this application.
  • Multicast/broadcast-user plane function (MB-UPF) network element MB-UPF is the gateway of the data plane of 5G MBS. It is mainly responsible for: interacting with MB-SMF to obtain data forwarding rules, Multicast data is transmitted to the RAN through the shared delivery method; multicast data is transmitted to the UPF through the individual delivery method.
  • the multicast/broadcast user plane functional network element is referred to as the multicast user plane functional network element or "MB-UPF" for short.
  • Multicast and broadcast service function MBSF mainly supports the following functions: business layer functions, interworking with LTE MBS, interacting with AF and MB-SMF to support the operation of MBS sessions, and determining transmission Parameters and type of MBS session, selecting MB-SMF to control MBSTF, and determining the sender's IP multicast address, etc.
  • MBSF is an optional network element.
  • the multicast/broadcast service function network element is referred to as the multicast service function network element or "MBSF" for short.
  • Multicast/broadcast service transport function MBSTF mainly supports the following functions: anchor point of MBS data, serving as the source of IP multicast, supporting frames, multi-streams, and forward error correction. (forward error correction, FEC) and other general transmission functions, sending the input file as an object (object) or object flow (object flow) in a multicast or broadcast manner, etc.
  • MBSTF is an optional network element.
  • the multicast/broadcast service transmission function network element is referred to as the multicast service transmission function network element or "MBSTF" for short.
  • AF AF mainly supports the following functions to provide business information to the 5G core network (5G core network, 5GC) and request multicast or broadcast services, as well as instruct MBS session operations with 5GC, etc.
  • UDM UDM mainly supports subscription/subscription management of multicast sessions, etc.
  • NRF Network repository function
  • NEF Network exposure function
  • Nausf, Nnef, Npcf, Nudm, Naf, Namf, Nsmf, N1, N2, N3, N4, and N6 are interface serial numbers.
  • the meaning of these interface serial numbers can be found in the meaning defined in the 3GPP standard protocol, and is not limited here.
  • the above network architecture applied to the embodiments of the present application is only an example of a network architecture described from the perspective of a traditional point-to-point architecture and a service-oriented architecture.
  • the network architecture applicable to the embodiments of the present application is not limited thereto. Any network architecture that can realize the functions of each of the above network elements is suitable for the embodiments of this application.
  • each of the core network elements shown in Figures 1 and 2 can be understood as network elements used to implement different functions in the core network, and can, for example, be combined into network slices as needed. These core network elements can be independent devices, or can be integrated into the same device to implement different functions. This application does not limit the specific forms of the above network elements.
  • the above network elements or functions can be network elements in hardware devices, software functions running on dedicated hardware, or virtualization functions instantiated on a platform (for example, a cloud platform).
  • a platform for example, a cloud platform.
  • the network device is the access and mobility management network element AMF
  • the base station is the wireless access network RAN as an example.
  • Computer-readable media may include, but are not limited to: magnetic storage devices (e.g., hard disks, floppy disks, tapes, etc.), optical disks (e.g., compact discs (CD), digital versatile discs (DVD)) etc.), smart cards and flash memory devices (e.g. erasable programmable read-only memory (EPROM), cards, sticks or key drives, etc.).
  • magnetic storage devices e.g., hard disks, floppy disks, tapes, etc.
  • optical disks e.g., compact discs (CD), digital versatile discs (DVD)
  • smart cards and flash memory devices e.g. erasable programmable read-only memory (EPROM), cards, sticks or key drives, etc.
  • various storage media described herein may represent one or more devices and/or other machine-readable media for storing information.
  • machine-readable medium may include, but is not limited to, wireless channels and various other media capable of storing, containing and/or carrying instructions and/or data.
  • FIG. 3 shows a schematic diagram of a scenario applicable to this application.
  • operators deploy networks, in order to reduce the cost of deploying wireless access networks, they generally choose to share wireless access network equipment while retaining their respective core networks (in the following description, base stations are used as wireless access networks). equipment for instructions).
  • MOCN multi-operator core network
  • the broadcast message contains the information of the public land mobile network (PLMN).
  • PLMN public land mobile network
  • the cell information sent by the base station includes information about the PLMN to which the cell belongs.
  • FIG 4 shows a schematic diagram of another scenario applicable to this application.
  • the content transmitted by certain broadcast services for example, weather forecast, high-precision map updates, etc.
  • the same broadcast service data needs to be transmitted multiple times on the core networks of different operators and the base stations shared by the operators.
  • the content provider of the multicast/broadcast service MMS content provider
  • PLMN#a the content provider of the multicast/broadcast service
  • PLMN#b sends broadcast data.
  • Multicast/broadcast service-session A multicast/broadcast session can provide services for multicast/broadcast services.
  • Multicast/broadcast sessions include unicast or multicast tunnels from the data network to the core network equipment to the access network equipment, and the unicast or multicast/multicast tunnel allocated by the access network equipment for sending the multicast/broadcast service. Broadcast air interface resources.
  • services/applications have the need to send multicast/broadcast services to multiple user equipments (UEs), that is, the same data transmission from point to multipoint is required.
  • the services/applications include multimedia messaging services, data streaming services, group communication services, etc.
  • the network provides a bearer shared by multiple receivers. The sender only needs to send one piece of data, and the network side copies and transmits the sent data to multiple receivers on demand or uses multiple receivers. Send one piece of data to multiple receivers using broadcast transmission.
  • Services can be hosted by one or more sessions.
  • One service ID corresponds to one or more MBS session IDs.
  • This application takes the transmission of broadcast service sessions and broadcast service data as examples for explanation.
  • At least two networks (PLMN#a and PLMN#b are used as examples for explanation below) share an access network element, and broadcast services are sent to the terminal equipment of the network through the access network element (hereinafter, the first broadcast is used as an example). Take business as an example to illustrate) data. Specifically, the AF transmits data to the base station through PLMN#a and PLMN#b, and the base station broadcasts a copy of the data to the UE of PLMN#a and the UE of PLMN#b.
  • the AF or the service provider establishes MBS sessions through PLMN#a and PLMN#b respectively, and sends data to PLMN#a and/or PLMN#b through the MBS sessions.
  • MBS sessions are identified by corresponding MBS session identifiers.
  • the MBS session identifier can be a specific IP address or a temporary mobile group identity (TMGI).
  • TMGI temporary mobile group identity
  • the MBS session identifier or session identifier involved in this application is the identifier of the MBS session used to carry data of the first broadcast service.
  • the first broadcast service may be marked by a service identifier, which is a globally unique identifier.
  • the service identifier may be sent by the core network to the base station during the session creation process, or may be the corresponding relationship between the base station's preconfigured service identifier and the session identifier, which is not limited here.
  • the MBS session identifier established by the AF or the service provider in PLMN#a is TMGI x, and the service identifier is w.
  • the MBS session identifier established by AF or service provider in PLMN#b is TMGI y, and the service identifier is w.
  • the base station determines based on the service identifier that different broadcast sessions carry/transmit the same service data.
  • the resources involved in this application can be air interface resources, which can be scheduling time resources, frequency resources, scheduling priorities, cache resources, and data radio bearers (DRB); or, the resources can also be stored Context information (for example, QoS description information, identification information of QoS flow (flow)), etc.
  • Context information for example, QoS description information, identification information of QoS flow (flow)
  • the air interface resource information of the first broadcast service determined by the RAN may include: (1) received group-radio network temporary identity (G-RNTI) information. (2) Information about the bandwidth part (BWP) corresponding to the first broadcast service.
  • G-RNTI group-radio network temporary identity
  • BWP bandwidth part
  • the sub-carrier space (sub-carrier space, SCS), frequency domain position and length of the cyclic prefix (CP) corresponding to the BWP are determined according to the BWP configuration.
  • the BWP configuration information also includes control resource set (COREST) configuration information for physical downlink control channel (physical downlink control channel, PDCCH) detection.
  • the COREST configuration information indicates the time and frequency where the PDCCH for G-RNTI is located. resource.
  • the UE uses this sequence for descrambling when decoding the PDSCH of the service; (4) the parameters of G-RNTI discontinuous reception (DRX), it can also be understood that the UE uses the DRX parameters for descrambling.
  • G-RNTI detection e.g., DRX
  • the configuration of the demodulation reference signal can also be understood as the UE using the reference signal to perform PDSCH demodulation for G-RNTI scheduling
  • Multiplexing air interface resources can be understood as the access network element using the same air interface resource to send the same data to terminal devices on different networks.
  • Not reusing air interface resources can be understood as access network elements using different air interface resources to send different data to terminal devices on different networks.
  • the different data here may come from different networks.
  • the different data here may be obtained by encrypting and/or integrity processing the same source data through network elements of different networks.
  • the security activation status refers to whether the core network element performs security protection on the data of the broadcast service, that is, confidentiality and/or integrity protection.
  • the following description takes the core network element as MBSTF as an example.
  • Security activation status may include security activation or security inactivation. When security is activated, the core network provides security protection for broadcast service data, or MBSTF provides security protection for broadcast service data; when security is not activated, the core network does not provide security protection for broadcast service data. Or, MBSTF does not provide security protection for broadcast service data.
  • the security activation indicator is used to indicate the security activation status.
  • safety activation indication indicates safety activation, it can be understood as safety activation on or safety activation turned on or safety activated or safety activation status turned on.
  • security activation indication indicates that security is not activated, it can be understood that security activation is not turned on or that the security activation status is turned off.
  • the value of the security activation indication may be correct (true) or incorrect (false). true means safe activation or safe activation is on or safe activation is on or safety is activated or safe activation is on, false means safety activation is not on or safety is not activated or safety activation is off.
  • the value of the security activation indication #a can be 1 or 0. 1 represents security activation or security activation turned on. Security activation has been turned on or security has been activated or security activation status is on. 0 represents security activation not turned on or security not activated or security activated. Status is closed.
  • PLMN#a and PLMN#b have different core networks but share one base station.
  • the AF transmits data to the base station through PLMN#a and/or PLMN#b, and the base station broadcasts a copy of the data to the UE of PLMN#a and PLMN#b UE.
  • PLMN#a and PLMN#b independently maintain their own keys and provide them to UEs in this network.
  • the data sent by PLMN#a to the base station is data obtained by MBSTF#a using the key of PLMN#a to process the broadcast service data.
  • the data sent by PLMN#b to the base station is data obtained by MBSTF#b using the key of PLMN#b to process the broadcast service data.
  • the data broadcast by the base station is data protected by the security of PLMN #b, and the UE of PLMN #a will not be able to parse the received broadcast service data.
  • Figure 5 shows a schematic diagram of a method 100 for broadcasting secure communications provided by this application.
  • the method 100 for secure communication of multicast sessions provided by this application will be introduced in detail below with reference to Figure 5 .
  • the first network element in the first network sends a first session establishment request for the first broadcast service to the access network element.
  • the access network element receives a request from the first network element in the first network.
  • the first session establishment request includes first indication information, and the first indication information is used to indicate whether security protection is enabled for the data of the first broadcast service.
  • Security protection in this application can also be understood as encryption and/or integrity protection.
  • this application takes security protection as an example for explanation.
  • the first network element may be a control plane network element or a user plane network element.
  • the first network element can directly send the first session establishment request to the access network element, or the first network element can also send the first session establishment request to the access network element through other network elements in the first network.
  • the first network element may be MB-SMF#a, and MB-SMF#a sends a broadcast context creation (Broadcastcontextcreate) message to the access network element through the AMF, and the broadcast context creation message includes the first indication information.
  • the first network element may be NEF/MBSF#a, and NEF/MBSF#a sends an MBS session creation (Nmbsmf_MBSSession_Create) message to MB-SMF#a, and the MBS session creation (Nmbsmf_MBSSession_Create) message includes the first indication information.
  • the first session creation request message here may also be other messages carrying the first indication information.
  • the first network element may be MBSTF#a, and MBSTF#a sends a message carrying the first indication information to NEF/MBSF#a. information.
  • NEF/MBSF#a sends a message carrying the first indication information to MBSTF#a, such as an MBS session creation (Nmbsmf_MBSSession_Create) message.
  • MBSTF#a such as an MBS session creation (Nmbsmf_MBSSession_Create) message.
  • MB-SMF#a sends a broadcast context create (Broadcast context create) message to the access network element, and the broadcast context create message includes first indication information.
  • the first indication information is used to indicate whether the first network or a user plane network element (for example, MBSTF#a) in the first network enables security protection for the first data of the first broadcast service.
  • a user plane network element for example, MBSTF#a
  • the method 100 further includes: the first network element obtains the first indication information. Specifically, the first network element determines the first indication information according to the network opening function or the security configuration information provided by the service provider, or the preconfigured security configuration information. Alternatively, the first network element receives the first indication information from other network elements of the first network.
  • the access network element allocates the first air interface resource to the first broadcast service.
  • the access network element stores the first indication information.
  • the first session establishment request carries the service identifier of the first broadcast service. identification
  • the access network element stores the corresponding relationship between the first indication information and the service identifier.
  • the first session establishment request carries a session identifier
  • the access network element stores the correspondence between the first indication information and the session identifier.
  • the first session establishment request carries a session identifier
  • the access network element may determine the session identifier of the first broadcast service according to the mapping relationship between the locally configured session identifier and the service identifier. Then the corresponding relationship between the first indication information and the service identifier is stored.
  • the access network element has not created resources corresponding to the first broadcast service before receiving the first session establishment request. Then, when the first instruction information indicates whether to enable or disable security protection for the data of the first broadcast service, the access network element allocates the first air interface resource to the first broadcast service, which can be understood as: Create a first air interface resource for the first broadcast service.
  • the second network element sends a second session establishment request for the first broadcast service to the access network element.
  • the access network element receives a request for the first broadcast service from the second network element in the second network. Second session establishment request for broadcast service.
  • the second session establishment request includes second indication information, and the second indication information is used to indicate whether security protection is enabled for the second data of the first broadcast service.
  • the second network element may be a control plane network element or a user plane network element.
  • the second indication information is used to indicate whether the second network or a user plane network element (for example, MBSTF#b) in the second network enables security protection for the data of the first broadcast service.
  • a user plane network element for example, MBSTF#b
  • the second network element can directly send the second session establishment request to the access network element, or the second network element can also send the second session establishment request to the access network element through other network elements in the second network.
  • the second network element may be MB-SMF#b, and MB-SMF#b sends a broadcast context create (Broadcast context create) message to the access network element through the AMF, and the broadcast context create message includes the second indication information.
  • the second network element may be NEF/MBSF#b, and NEF/MBSF#b sends an MBS session creation (Nmbsmf_MBSSession_Create) message to MB-SMF#b, and the MBS session creation (Nmbsmf_MBSSession_Create) message includes the second indication information.
  • the second session creation request message here may also be another message carrying the second indication information.
  • the second network element may be MBSTF#b, and MBSTF#b sends a message carrying the second indication information to NEF/MBSF#b. information.
  • NEF/MBSF#b sends a message carrying the second indication information to MBSTF#b, such as an MBS session creation (Nmbsmf_MBSSession_Create) message.
  • MBSTF#b such as an MBS session creation (Nmbsmf_MBSSession_Create) message.
  • MB-SMF#b sends a broadcast context create (Broadcast context create) message to the access network element, and the broadcast context create message includes the second indication information.
  • the method 100 further includes: the second network element obtains the second indication information. Specifically, the second network element determines the second indication information according to the network opening function or the security configuration information provided by the service provider, or the preconfigured security configuration information. Alternatively, the second network element receives the second indication information from other network elements of the second network.
  • the access network element determines whether to reuse the first air interface resource according to the first indication information and/or the second indication information.
  • Implementation method 1 The access network element does not reuse the first air interface resource.
  • the access network element shall The first indication information and/or the second indication information determines not to reuse the first air interface resource.
  • the access network element determines according to the first indication information and the second indication information.
  • the first air interface resource is not reused, or the access network element determines not to reuse the first air interface resource according to the first indication information or the second indication information.
  • the access network element shall perform the first operation according to the first instruction information.
  • the indication information determines not to reuse the first air interface resource, or the access network element determines not to reuse the first air interface resource according to the first indication information and the second indication information.
  • the access network element may The indication information determines not to reuse the first air interface resource, or the access network element determines not to reuse the first air interface resource according to the first indication information and the second indication information.
  • the access network element does not reuse the first air interface resource, which can also be understood as: the access network element creates the second air interface resource for the second data of the first broadcast service received from the second network, and the first air interface The resources are different from the second air interface resources.
  • the method 100 further includes: the access network element establishing a data transmission channel between the access network element and the user plane network element (for example, UPF#b) of the second network, and transmitting data from the first network element to the second network through the data transmission channel.
  • the user plane network element of the second network receives the data of the first broadcast service.
  • the method 100 further includes: the access network element sending the first data of the first broadcast service to the terminal device of the first network based on the first air interface resource; and the access network element sending the first data of the first broadcast service to the second network based on the second air interface resource.
  • the terminal device sends the second data of the first broadcast service.
  • the first data in which the access network element is the first broadcast service received from the first network is called first data
  • the access network element is the first broadcast service received from the second network.
  • the second data is called second data. And introduce in detail the difference between the first data and the second data.
  • the second data can also be understood as data of the first broadcast service received by the access network element from the user plane network element of the second network (for example, UPF#b). It should be understood that the second data is the data of the first broadcast service that is security protected by the second network, or the second data is the first broadcast that is security protected by the user plane network element of the second network (for example, MBSTF#b).
  • the data of the service, or the second data is the data of the first broadcast service that is encrypted and/or integrity protected by the user plane network element of the second network (for example, MBSTF#b) using the second key.
  • MBSTF#b uses key #b to encrypt and/or integrity protect the second data, which can realize secure communication between MBSTF#b and the terminal device of the second network element.
  • the first data can also be understood as data of the first broadcast service received by the access network element from the user plane network element of the first network (for example, UPF#a). It should be understood that the first data is the data of the first broadcast service that is security protected by the first network, or the first data is the first broadcast that is security protected by the user plane network element of the first network (for example, MBSTF#a).
  • the data of the service, or the first data is the data of the first broadcast service that is encrypted and/or integrity protected by the user plane network element of the first network (for example, MBSTF#a) using the first key.
  • MBSTF#a uses key #a to encrypt and/or integrity protect the first data, which can realize secure communication between MBSTF#a and the terminal device of the first network element.
  • source data of the first data before being encrypted and/or integrity protected is the same as the source data of the second data before being encrypted and/or integrity protected.
  • the above solution not only enables the first network and the second network to securely protect the data of the first broadcast service, but also enables the terminal devices of the first network and the second network to separately protect the received data of the first broadcast service. Perform decryption and/or integrity verification to improve communication security and user experience.
  • Implementation method two the access network element reuses the first air interface resource.
  • the access network element uses the first indication information to and the second indication information to determine to multiplex the first air interface resource.
  • the method 100 also includes: the access network element does not establish a data transmission channel between the access network element and the user plane element of the second network (for example, UPF#b); or, the access network element It is determined to establish a data transmission channel between the access network element and the user plane network element of the second network, but discard the data of the first broadcast service in the data transmission channel (ie, the above-mentioned second data).
  • the access network element does not establish a data transmission channel between the access network element and the user plane element of the second network (for example, UPF#b); or, the access network element It is determined to establish a data transmission channel between the access network element and the user plane network element of the second network, but discard the data of the first broadcast service in the data transmission channel (ie, the above-mentioned second data).
  • the method 100 further includes: the access network element sending the first data or the second data to the terminal device of the first network and the terminal device of the second network based on the first air interface resource.
  • the access network element sends the same piece of data (first data or second data) to the terminal device of the first network and the terminal device of the second network respectively.
  • the above solution can save air interface resources.
  • Figure 6 shows a schematic diagram of a method 200 for broadcasting secure communications provided by this application.
  • the method 200 for broadcasting secure communication provided by this application will be introduced in detail below with reference to Figure 6 .
  • Method 200 provides a specific example for implementation method 1 in method 100.
  • the access network element takes RAN as an example
  • the first network takes PLMN#a as an example
  • the second network takes PLMN#b as an example
  • the first instruction information takes security activation instruction #a as an example
  • the second instruction information takes Security activation indication #b is taken as an example
  • the first air interface resource is taken as resource #a
  • the second air interface resource is taken as resource #b.
  • AF sends an MBS session #a creation request message (Nnef-MBSSesion_Create) to NEF#a/MBSF#a.
  • Nnef-MBSSesion_Create an MBS session #a creation request message
  • the MBS session #a creation request message carries the MBS session ID (MBS session ID) #a, QoS parameter #a, and service service type.
  • the message also carries a service ID.
  • the service identifier is the identification information of the first broadcast service.
  • the MBS session identifier can be a specific IP address or a temporary mobile group identity (TMGI).
  • QoS parameters indicate the quality of service requirements of the current session.
  • the first broadcast service may be marked by a service identifier, which is a globally unique identifier.
  • the service identifier may be sent by the core network to the base station during the session creation process, or may be the corresponding relationship of the session identifier preconfigured by the base station, which is not limited here.
  • Service types include broadcast services and multicast services. This application is mainly applicable to broadcast service scenarios.
  • MBSF/NEF mentioned in this application may represent only MBSF, only NEF, or both MBSF and NEF.
  • the NEF#a/MBSF#a or NEF#b/MBSF#b involved in this application has the same understanding as MBSF/NEF, where #a and #b are used to identify that MBSF/NEF are located in different PLMNs (PLMN#a and PLMN #b)Network.
  • the security activation state #a can be understood as whether MBSTF #a performs security protection, that is, confidentiality and/or integrity protection, on the data of the first broadcast service.
  • the session is used to transmit the data of the first broadcast service.
  • the security activation state #a can also be understood as whether the core network performs security protection on the data of the first broadcast service, that is, confidentiality and/or integrity protection.
  • Solution 1 S203a, NEF#a/MBSF#a determines security activation status #a.
  • NEF#a/MBSF#a determines security activation status #a based on security configuration information provided by AF or preconfigured.
  • NEF#a/MBSF#a receives security activation status #a from MBSTF#a.
  • NEF#a/MBSF#a sends a security activation status #a query message to MBSTF#a.
  • MBSTF#a receives the security activation status #a query message from NEF#a/MBSF#a.
  • the security activation status #a query message is used to query the security activation status #a.
  • This message carries MBS session ID#a, which is used to indicate the session identified by MBS session ID#a.
  • the message may include instruction information for querying the security activation status #a, and the indication information is used to display the message indicating that the message is used to query the security activation status #a, or the message is used to query the security activation status #a.
  • the message name implicitly indicates that the message is used to query security activation status #a.
  • the security activation status #a query message may be sent after S202 or after the MBS session #a creation response message of MB-SMF#a is received (S206 below). Alternatively, it can also be used as an enhancement of the session request (sessionrequest) message sent by NEF#a/MBSF#a to MBSTF#a in TS 23.247 Chapter 7.1.
  • the session request message has the function of querying MBSTF#a for security activation status #a.
  • the session request message may include instruction information for querying the security activation status #a, or the message name of the session request message may implicitly indicate the security activation status #a.
  • the triggering conditions for the message include but are not limited to one or more of the following.
  • the security configuration information indicates whether to perform security protection, that is, confidentiality and/or integrity, on the data of the first broadcast service carried by MBS session #a. sexual protection.
  • (2) MBSF#a/NEF#a determines that the data security activation status of the first broadcast service carried by MBS session #a is not stored.
  • the service type carried in the MBS session #a creation request message in S201 indicates broadcast service.
  • the MBS session #a creation request message in S201 carries the service identifier.
  • MBSTF#a sends a security activation status #a response message to NEF#a/MBSF#a.
  • NEF#a/MBSF#a receives the security activation status #a response message from MBSTF#a.
  • MBSF/NEF#a sends an MBS session creation (Nmbsmf_MBSSession_Create) message to MB-SMF#a.
  • MBS session creation Nmbsmf_MBSSession_Create
  • MB-SMF#a receives the MBS session creation message from MBSF/NEF#a.
  • This message is used to request the creation of an MBS session.
  • the message includes MBS session ID#a.
  • MB-SMF#a sends a response message to MBSF/NEF#a.
  • MBSF/NEF#a receives the response message from MB-SMF#a. This response message is used to respond to the MBS session creation message in S205.
  • NEF#a/MBSF#a sends a security activation instruction #a to MB-SMF#a.
  • the security activation instruction #a is used to instruct security activation. Live state #a.
  • NEF#a/MBSF#a sends security activation instruction #a to MB-SMF#a, which can be understood as a specific example of S101 in method 100.
  • NEF#a/MBSF #a may send the security activation indication #a to MB-SMF #a in a separate message after S206.
  • the MBS session creation message in S205 can be enhanced.
  • the security activation indication #a is carried in the MBS session creation message and sent.
  • S207 is used to respond to S201.
  • S207 is used to respond to S201.
  • TS 23.247 Chapter 7.1 please refer to TS 23.247 Chapter 7.1.
  • MB-SMF#a sends a broadcast context creation message to the RAN.
  • the RAN receives the broadcast context creation message from MB-SMF#a.
  • the message carries MBS session ID#a. This message optionally carries the service identifier and security activation indication #a.
  • the security activation instruction #a in this application can have multiple instruction methods, which are described uniformly here.
  • the value of the security activation indication may be correct (true) or incorrect (false). true means safe activation or safe activation is on or safe activation is on or safety is activated or safe activation is on, false means safety activation is not on or safety is not activated or safety activation is off.
  • the value of the security activation indication #a can be 1 or 0.
  • 1 represents security activation or security activation turned on. Security activation has been turned on or security has been activated or security activation status is on.
  • 0 represents security activation not turned on or security not activated or security activated. Status is closed.
  • S209 can be used as a specific example of S102 in method 100.
  • the RAN stores the correspondence between the security activation indication #a and the service identifier.
  • the base station can determine the service identifier based on the local configuration and session identifier.
  • the resources involved in this application can be air interface resources, which can be scheduling time resources, frequency resources, scheduling priorities, cache resources, and data radio bearers (DRB); or, the resources can also be Stored context information (for example, QoS description information, identification information of QoS flow (flow)), etc.
  • the air interface resource information of the first broadcast service determined by the RAN may include: (1) received group-radio network temporary identity (G-RNTI) information. (2) Information about the bandwidth part (BWP) corresponding to the first broadcast service.
  • G-RNTI group-radio network temporary identity
  • BWP bandwidth part
  • the sub-carrier space (sub-carrier space, SCS), frequency domain position and length of the cyclic prefix (CP) corresponding to the BWP are determined according to the BWP configuration.
  • the BWP configuration information also includes control resource set (COREST) configuration information for physical downlink control channel (physical downlink control channel, PDCCH) detection.
  • the COREST configuration information indicates the time and frequency where the PDCCH for G-RNTI is located. resource.
  • the UE uses this sequence for descrambling when decoding the PDSCH of the service; (4) the parameters of G-RNTI discontinuous reception (DRX), it can also be understood that the UE uses the DRX parameters for descrambling.
  • G-RNTI detection e.g., DRX
  • the configuration of the demodulation reference signal can also be understood as the UE using the reference signal to perform PDSCH demodulation for G-RNTI scheduling
  • S209 may also be understood as the RAN determining the context corresponding to the first broadcast service for the first broadcast service according to the security activation indication #a.
  • the broadcast session context corresponding to the first broadcast service established by the RAN may also include: the identification TMGI#n of the first broadcast service in PLMN#a, broadcast area information (for example, cell list) Information, tracking area list ((tracking area, TA)list), QoS context of the broadcast session.
  • the following description takes the RAN allocating resources for the first broadcast service according to the security activation indication #a as an example.
  • the scope of protection of this application is not limited.
  • Example 1-1 takes as an example that the RAN does not create resources corresponding to the first broadcast service before communicating with the UE of PLMN#a.
  • the RAN determines that security is not activated according to the security activation indication #a. In other words, the RAN determines according to the security activation indication #a that the MBSTF #a does not perform security protection on the data of the first broadcast service carried by the MBS session #a.
  • the RAN checks whether the resource corresponding to the first broadcast service has been created according to the service identifier.
  • the RAN When the resource corresponding to the first broadcast service is not created and security is not activated, the RAN creates the resource #a corresponding to the first broadcast service and establishes a data transmission channel between the RAN and UPF #a.
  • Example 1-1 does not limit the execution order of (1) and (2) above.
  • Example 1-2 takes as an example that the RAN does not create resources corresponding to the first broadcast service before communicating with the UE of PLMN#a.
  • the RAN determines that the security activation indication #a indicates security activation.
  • the MBSTF #a security activation indication #a indicates security protection of the data of the first broadcast service carried by the MBS session #a.
  • the RAN checks whether the resource corresponding to the first broadcast service has been created according to the service identifier.
  • the RAN determines to create the resource #a corresponding to the first broadcast service according to the security activation indication #a, and establishes the relationship between the RAN and UPF #a. data transmission channels between.
  • Example 1-2 does not limit the execution order of (1) and (2) above.
  • Example 1-3 takes as an example that the RAN does not create resources corresponding to the first broadcast service before communicating with the UE of PLMN#a.
  • the security activation indication #a indicates security activation.
  • the MBSTF #a security activation indication #a indicates security protection of the data of the first broadcast service carried by the MBS session #a.
  • the RAN may discard the service identifier or skip the step of checking whether the resource corresponding to the first broadcast service has been created based on the service identifier.
  • RAN checks based on the service identifier whether the resource corresponding to the service identifier has been created. When the resource corresponding to the service identifier is not created, the RAN creates the resource #a corresponding to the service identifier and establishes a data transmission channel between the RAN and UPF#a.
  • S210 is used to respond to S208.
  • the AF sends the media stream to the RAN through the network elements in PLMN#a (such as MBSTF#a and UPF#a).
  • the RAN receives the media stream from the AF through the network elements in PLMN#a.
  • the AF sends the data of the first broadcast service to MBSTF#a, and accordingly, the MBSTF#a receives the data of the first broadcast service from the AF.
  • MBSTF#a processes the data of the first broadcast service and generates the first data.
  • MBSTF#a sends the first data to UPF#a, and accordingly, UPF#a receives the first data from MBSTF#a.
  • UPF#a sends the first data to the RAN, and accordingly, the RAN receives the first data from UPF#a.
  • the RAN sends the first data to the UE of PLMN #a based on resource #a.
  • S212 to S219 please refer to the description of S201 to S208.
  • the difference is that the network element of PLMN#a is replaced by the network element of PLMN#b, and the corresponding message #a, indication #a, and identification #a are replaced with message #b, indication. #b and logo #b etc.
  • the two solutions for NEF#b/MBSF#b to obtain the security activation status #b can be understood as specific examples of the second network element obtaining the second indication information in the method 100.
  • NEF#b/MBSF#b sends security activation instruction #b to MB-SMF#b, which can be understood as a specific example of S103 in method 100.
  • S220 can be used as a specific example of S104 in method 100.
  • Example 2-1 corresponds to any one of Examples 1-1 to 1-3.
  • Security activation indication #a indicates security is not activated or security is activated.
  • the security activation instruction #b indicates security activation. In other words, the security activation instruction #b instructs the MBSTF #b to perform security protection on the data of the first broadcast service carried by the MBS session #b.
  • the RAN determines to create the resource #b according to the security activation instruction #b, and establishes a data transmission channel between the RAN and the UPF #b. The RAN may discard the service identifier or skip the step of checking whether the resource corresponding to the first broadcast service has been created based on the service identifier.
  • Example 2-2 corresponds to any one of Examples 1-1 to 1-3.
  • Security activation indication #a indicates security is not activated or security is activated.
  • the RAN determines security activation according to the security activation instruction #b. In other words, the security activation instruction #b instructs MBSTF #b to perform security protection on the data of the first broadcast service carried by MBS session #b.
  • the RAN checks whether the resource corresponding to the first broadcast service has been created according to the service identifier.
  • the RAN determines not to reuse resource #a according to the security activation indication #b, that is, not to use the same resource to send the data of the first broadcast service.
  • the RAN determines to create the resource #b according to the security activation instruction #b, and establishes a data transmission channel between the RAN and the UPF #b.
  • the base station creates resources carried by MBS session ID#a and MBS session #b respectively, so that it can use different resources to send the same broadcast service data.
  • the RAN determines not to reuse resource #a based on the security activation indication #a and the security activation indication #b.
  • Example 2-2 does not limit the execution order of (1) and (2) above.
  • Example 2-3 corresponds to Example 1-2 or Example 1-3.
  • Secure activation indication #a indicates secure activation.
  • the security activation indication #b indicates that security is not activated. In other words, the security activation indication #b indicates that the MBSTF #b does not perform security protection on the data of the first broadcast service carried by the MBS session #b.
  • the RAN determines not to reuse the resource #a according to the security activation indication #a and the security activation indication #b, that is, not to use the same resource to send the data of the first broadcast service.
  • RAN determines to create resource #b according to the security activation instruction #b, and establishes a data transmission channel between RAN and UPF#b road.
  • the base station creates resources carried by MBS session ID #a and MBS session #b respectively, so that it can use different resources to send the same broadcast service data.
  • the above examples 2-1 to 2-3 can also be understood that if at least one of the security activation indication #a and the security activation indication #b is used to indicate security activation, the RAN will create resource #a and resource #b respectively. . And sending the data of the first broadcast service to the UE of PLMN#a and the UE of PLMN#b through resource #a and resource #b respectively.
  • Example 2-4 RAN checks based on the service identifier whether the resource corresponding to the service identifier has been created. When the resource corresponding to the service identifier is not created, the RAN creates the resource #b corresponding to the service identifier and establishes a data transmission channel between the RAN and UPF#b.
  • S222 The AF sends the media stream to the RAN through the network elements in PLMN#b (such as MBSTF#b and UPF#b).
  • the RAN receives the media stream from the AF through the network elements in PLMN#b.
  • the AF sends the data of the first broadcast service to MBSTF#b, and accordingly, the MBSTF#b receives the data of the first broadcast service from the AF.
  • MBSTF#b processes the data of the first broadcast service and generates the first data.
  • MBSTF#b sends the first data to UPF#b, and accordingly, UPF#b receives the first data from MBSTF#b.
  • UPF#b sends the first data to the RAN, and accordingly, the RAN receives the first data from UPF#b.
  • the RAN sends the first data to the UE of PLMN #b based on resource #b.
  • method 200 does not limit the order of S211 and S222.
  • the method 200 does not limit the execution order of S211 in the method 200, nor does it limit the execution order of S222 in the method 200.
  • S211 can be before or after determining whether to create resource #a, but the RAN needs to send the first broadcast service data based on resource #a after establishing resource #a.
  • S222 may be before or after determining whether to create resource #b, but the RAN needs to send the first broadcast service data based on resource #b after establishing resource #b.
  • the broadcast context creation message in S208 carries the security activation indication #a
  • the broadcast context creation message in S219 carries the security activation indication #b is used as an example for explanation.
  • the following is a detailed introduction to the implementation in which the broadcast context creation message in S208 does not carry the security activation indication #a, and the broadcast context creation message in S219 does not carry the security activation indication #b.
  • the broadcast context creation message in S208 does not carry the security activation indication #a.
  • the RAN may determine that the security activation indication #a indicates security activation according to the broadcast context creation message.
  • the broadcast context creation message in S219 does not carry the security activation indication #b.
  • the RAN may determine that the security activation indication #b indicates security activation according to the broadcast context creation message.
  • the above solution can further improve system security performance.
  • the security activation cannot be indicated. That is, when the first network or the second network instructs security activation, the RAN does not process the security activation as it was received. It is likely to bring security risks and reduce communication success rate.
  • the broadcast context creation message in S208 does not carry the security activation indication #a.
  • the RAN may determine according to the broadcast context creation message that the security activation indication #a indicates security inactivation.
  • the broadcast context creation message in S219 does not carry the security activation indication #b.
  • the RAN may determine according to the broadcast context creation message that the security activation indication #b indicates security inactivation.
  • the above solution can reduce signaling overhead and network consumption.
  • Figure 7 shows a schematic diagram of a method 300 for broadcasting secure communications provided by this application.
  • the method 300 for broadcasting secure communication provided by this application will be introduced in detail below with reference to Figure 7 .
  • Method 300 provides a specific example for the second implementation method in method 100.
  • the access network element takes RAN as an example
  • the first network takes PLMN#a as an example
  • the second network takes PLMN#b as an example
  • the first instruction information takes security activation instruction #a as an example
  • the second instruction information takes Security activation indication #b is taken as an example
  • the first air interface resource is taken as resource #a
  • the second air interface resource is taken as resource #b.
  • the RAN determines that the security activation indication #a indicates that security is not activated.
  • S319 can be used as a specific example of S104 in method 100.
  • security activation indication #a indicates that security is not activated.
  • the security activation indication #b indicates that security is not activated.
  • the MBSTF #b security activation indication #b indicates that the data of the first broadcast service carried by the MBS session #b is not to be security protected.
  • the RAN determines not to create resource #b or to multiplex resource #a according to the security activation indication #a and security activation indication #b stored in S309. Furthermore, the RAN determines not to establish a data transmission channel between the RAN and the UPF#b according to the security activation indication #a and the security activation indication #b; or, determines to establish a data transmission channel between the RAN and the UPF#b, but discards the data. Data of the first broadcast service in the transmission channel.
  • S320 responds to S318.
  • AF sends the media stream (that is, the data of the above-mentioned first broadcast service) to RAN through the network element in PLMN#a (for example, UPF#a).
  • RAN receives the media from AF through the network element in PLMN#a. flow.
  • the RAN After acquiring the data of the first broadcast service, the RAN sends the data of the first broadcast service to the UE of PLMN #a and the UE of PLMN #b based on resource #a.
  • the RAN will only create one resource for the first broadcast service (resource #a is used as an example in method 300), and use the resource #a sends the data of the first broadcast service to the UE of PLMN #a and the UE of PLMN #b (the data of the first broadcast service obtained by the RAN from the AF through PLMN #a in S321).
  • the method 300 also includes: Step 1, the AF sends the media stream (that is, the data of the above-mentioned first broadcast service) to the RAN through the network element in PLMN#b (for example, UPF#b).
  • the RAN sends the media stream through the PLMN#b.
  • the network element in b receives the media stream from AF.
  • the RAN discards the data of the first broadcast service received from the network element in PLMN #b according to the security activation indication #a and the security activation indication #b.
  • method 300 does not limit the order of S321 and step 1.
  • Method 300 does not limit the execution order of S321 in method 300, nor does it limit the execution order of step 1 in method 300.
  • S321 can be before or after determining whether to create resource #a, but the RAN needs to send the first broadcast service data based on resource #a after establishing resource #a.
  • step 1 can be before or after determining whether to create resource #b.
  • the broadcast context creation message in S308 carries the security activation indication #a
  • the broadcast context creation message in S318 carries the security activation indication #b is used as an example for explanation.
  • the following is a detailed introduction to the implementation in which the broadcast context creation message in S308 does not carry the security activation indication #a, and the broadcast context creation message in S318 does not carry the security activation indication #b.
  • the broadcast context creation message in S308 does not carry the security activation indication #a.
  • the RAN may determine according to the broadcast context creation message that the security activation indication #a indicates security inactivation.
  • the broadcast context creation message in S318 does not carry the security activation indication #b.
  • the RAN may determine that the security activation indication #b indicates security inactivation according to the broadcast context creation message.
  • the above solution can reduce signaling overhead and network consumption.
  • Figure 8 shows a schematic diagram of a method 400 for broadcasting secure communications provided by this application.
  • the method 400 for broadcasting secure communication provided by this application will be introduced in detail below with reference to Figure 8 .
  • the first network element in the first network sends a first session establishment request to the access network element.
  • the access network element receives a request for the first broadcast service from the first network element in the first network.
  • First session establishment request is a request for the first broadcast service from the first network element in the first network.
  • the first network element may be a control plane network element.
  • the first network element may directly send the first session establishment request to the access network element, or may send the first session establishment request to the access network element through other network elements in the first network, for example,
  • One network element may be MB-SMF#a, for example, the first network element may be NEF/MBSF#a.
  • the first session creation request message here may also be other messages.
  • the first network element may be MBSTF#a.
  • the access network element allocates the first air interface resource to the first broadcast service.
  • the access network element has not created resources corresponding to the first broadcast service before receiving the first session establishment request.
  • the access network element may also carry a fourth indication information, the fourth indication information being used to indicate whether to reuse existing air interface resources for the first broadcast service.
  • the implementation method for the access network element to allocate the first air interface resource for the first broadcast service can refer to the relevant description in S404.
  • the interaction between the access network element and the first network element in this application can be See the interaction between the access network element and the second network element.
  • the second network element sends a second session establishment request for the first broadcast service to the access network element.
  • the access network receives a second session establishment request for the first broadcast service from the second network element in the second network.
  • the second session establishment request includes third indication information, and the third indication information is used to indicate whether to reuse existing air interface resources for the first broadcast service.
  • the existing air interface resources are air interface resources for the first broadcast service that have been established by the access network element.
  • the existing air interface resources are air interface resources that have been established by the access network element for transmitting data of the first broadcast service.
  • the data of the first broadcast service may come from the second network or other networks.
  • the existing air interface resources here include the first air interface resource.
  • the second network element may be a control plane network element.
  • the second network element may directly send the second session establishment request to the access network element, or may send the second session establishment request to the access network element through other network elements in the second network.
  • the second network element may be MB-SMF#b.
  • the second network element may be NEF/MBSF#b.
  • the second session creation request message here may also be other messages carrying third indication information.
  • the second network element may be a user plane network element (for example, MBSTF#b).
  • method 400 further includes: the second network element obtains third indication information. Specifically, the second network element determines the third indication information based on other information (such as security activation indication or security configuration information). Alternatively, the second network element receives the third indication information from other network elements of the second network. For example, when the security activation indicates that security has been activated or security activation has been turned on, the second network element determines the third indication information according to the security activation indication to indicate not to reuse existing air interface resources. When the security activation indication indicates that security is not activated or security activation is not enabled, the second network element determines the third indication information according to the security activation indication to indicate reuse of existing air interface resources.
  • the second network element determines the third indication information based on the security configuration information to indicate not to reuse existing air interface resources.
  • the security configuration information indicates that the data of the first broadcast service is not subject to security protection
  • the second network element determines the third indication information based on the security configuration information to instruct the reuse of existing air interface resources.
  • the access network element determines whether to reuse the first air interface resource according to the third indication information.
  • Implementation method 1 The access network element does not reuse the first air interface resource.
  • the access network element determines not to reuse the first air interface resources according to the third indication information.
  • the third indication information is used to indicate that the existing air interface resources are not to be reused for the first broadcast service.
  • the third indication information indicates that the air interface is allocated to the first broadcast service according to the session identifier corresponding to the second session establishment request. resources, or the third indication information indicates not to allocate air interface resources to the first broadcast service according to the service identifier corresponding to the first broadcast service.
  • the access network element checks whether there is an air interface resource corresponding to the session identifier corresponding to the second session establishment request; if there is no air interface resource corresponding to the session identifier corresponding to the second session establishment request, the access network element determines whether the air interface resource corresponding to the session identifier corresponding to the second session establishment request exists. A broadcast service does not reuse the first air interface resource.
  • the access network element does not reuse the first air interface resource, which can also be understood as: the access network element creates the second air interface resource for the data of the first broadcast service received from the second network, and the first air interface resource is the same as the first air interface resource.
  • the second air interface resources are different.
  • the method 400 further includes: the access network element establishing a data transmission channel between the access network element and the user plane network element (for example, UPF#b) of the second network, and transmitting data from the first network element to the second network through the data transmission channel.
  • the user plane network element of the second network receives the second data of the first broadcast service.
  • the access network element receiving the second data of the first broadcast service from the user plane network element of the second network please refer to the description of the second data in method 100.
  • the method 400 further includes: the access network element receives the first data of the first broadcast service from the user plane network element of the first network, and the access network element transmits the data to the terminal device of the first network based on the first air interface resource. Send first data of the first broadcast service; and the access network element sends second data of the first broadcast service to the terminal device of the second network based on the first air interface resource.
  • the access network element receiving the first data of the first broadcast service from the user plane network element of the first network please refer to the description of the first data in method 100.
  • the above solution not only enables the first network and the second network to securely protect the data of the first broadcast service, but also enables the terminal devices of the first network and the second network to separately protect the received data of the first broadcast service. Perform decryption and/or integrity verification to improve communication security and user experience.
  • Implementation method two the access network element reuses the first air interface resource.
  • the access network element determines to reuse the first air interface resources according to the third indication information.
  • the third indication information indicates that air interface resources are allocated to the first broadcast service according to the service identifier corresponding to the first broadcast service.
  • the access network element determines the target based on the first air interface resource corresponding to the service identifier corresponding to the first broadcast service.
  • the first air interface resource is multiplexed for the first broadcast service.
  • the method 400 also includes: the access network element does not establish a data transmission channel between the access network element and the user plane network element of the second network (for example, UPF#b); or, the access network element It is determined to establish a data transmission channel between the access network element and the user plane network element of the second network, but discard the second data of the first broadcast service in the data transmission channel.
  • the access network element does not establish a data transmission channel between the access network element and the user plane network element of the second network (for example, UPF#b); or, the access network element It is determined to establish a data transmission channel between the access network element and the user plane network element of the second network, but discard the second data of the first broadcast service in the data transmission channel.
  • the second data please refer to the description of the second data in method 100.
  • the method 400 further includes: the access network element sending the first data of the first broadcast service to the terminal device of the first network and the terminal device of the second network based on the first air interface resource.
  • the access network element sending the first data of the first broadcast service to the terminal device of the first network and the terminal device of the second network based on the first air interface resource.
  • the above solution can save air interface resources.
  • Figure 9 shows a schematic diagram of a method 500 for broadcasting secure communications provided by this application.
  • the method 500 for broadcasting secure communication provided by this application will be introduced in detail below with reference to Figure 9 .
  • Method 500 provides a specific example for implementation method 1 in method 400.
  • the access network element takes RAN as an example
  • the first network takes PLMN#a as an example
  • the second network takes PLMN#b as an example
  • the first instruction information takes security activation instruction #a as an example
  • the second instruction information takes Security activation indication #b is taken as an example
  • the first air interface resource is taken as resource #a
  • the second air interface resource is taken as resource #b.
  • S501 refers to the description of S201-S207.
  • the description includes: NEF#a/MBSF#a sends security activation indication #a to MB-SMF#a, and accordingly, MB-SMF#a receives security activation indication #a from NEF#a/MBSF#a.
  • MB-SMF#a determines the optimization instruction #a according to the security activation instruction #a.
  • Optimization indication #a is used to indicate whether the RAN allocates resources for the first broadcast service according to the service identifier. Alternatively, the optimization indication #a is used to indicate whether the RAN reuses the existing resources corresponding to the service identifier. Alternatively, the optimization indication #a is used to indicate whether the RAN reuses existing resources allocated for the first broadcast service. For resources in method 500, please refer to the relevant description in method 200.
  • the optimization indication #a determined by the MB-SMF#a based on the security activation indication #a is used to instruct the RAN to allocate resources to the first broadcast service based on the service identifier.
  • the MB-SMF#a determines the optimization indication #a based on the security activation indication #a to instruct the RAN to reuse existing resources.
  • the optimization indication #a determined by the MB-SMF#a based on the security activation indication #a is used to instruct the RAN not to allocate resources for the first broadcast service based on the service identifier.
  • the MB-SMF#a determines the optimization indication #a based on the security activation indication #a to instruct the RAN not to reuse existing resources.
  • resources are allocated to the first broadcast service based on the session identifier of MBS session #a (for example, called session identifier #a).
  • the optimization instruction #a in this application can have multiple instruction methods, which will be described uniformly here.
  • the value of optimization instruction #a can be correct (true) or wrong (false).
  • true means instructing the RAN to allocate resources for the first broadcast service according to the service identifier, or instructing the RAN to reuse existing resources.
  • false means instructing the RAN not to allocate resources for the first broadcast service based on the service identifier, or instructing the RAN not to reuse existing resources.
  • the value of optimization indication #a may be 1 or 0. 1 indicates instructing the RAN to allocate resources for the first broadcast service according to the service identifier, or instructs the RAN to reuse existing resources.
  • 0 represents instructing the RAN not to allocate resources for the first broadcast service based on the service identifier, or instructing the RAN not to reuse existing resources.
  • MB-SMF#a sends a broadcast context creation message to the RAN.
  • the RAN receives the broadcast context creation message from MB-SMF#a.
  • the message carries MBS session ID#a. This message optionally carries the service identifier and optimization instruction #a.
  • the RAN allocates (or determines) resources for the first broadcast service according to the optimization instruction #a, and determines the processing method of the transmission channel between the RAN and the UPF.
  • the RAN stores the corresponding relationship between optimization indication #a and service identifier.
  • the base station can determine the service identifier based on the local configuration and session identifier.
  • S504 may also be understood to mean that the RAN determines the context corresponding to the first broadcast service for the first broadcast service according to the optimization instruction.
  • the following description takes the RAN allocating resources for the first broadcast service according to the optimization instruction #a as an example.
  • the scope of protection of this application is not limited.
  • Example 3-1 (1) RAN determines not to reuse the resources allocated for the first broadcast service according to the optimization instruction #a, and the optimization instruction #a instructs the RAN not to allocate resources for the first broadcast service according to the service identifier, or instructs the RAN Do not reuse existing resources. (2) The RAN checks whether the resource corresponding to the first broadcast service has been created according to the service identifier. According to (1) and (2), RAN creates resource #a corresponding to the first broadcast service and establishes a data transmission channel between RAN and UPF #a.
  • Example 3-1 does not limit the execution order of (1) and (2) above.
  • (1) in Example 3-1 may be replaced with: the RAN allocates resources to the first broadcast service according to the optimization instruction #a, and the optimization instruction #a instructs the RAN to allocate resources to the first broadcast service according to the session identifier #a. For example, the RAN checks according to the session identifier #a whether the resource corresponding to the session identifier #a has been created. If the resource corresponding to the session identifier #a is not found, it is determined that the RAN has not created the resource corresponding to the session identifier #a.
  • Example 3-2 (1) RAN determines that the optimization indication #a instructs RAN not to allocate resources for the first broadcast service according to the service identifier, or instructs RAN not to reuse existing resources. (2) The RAN determines to create the resource #a corresponding to the first broadcast service according to the optimization instruction #a, and establishes a data transmission channel between the RAN and the UPF #a. The RAN may discard the service identifier or skip the step of checking whether the resource corresponding to the first broadcast service has been created based on the service identifier.
  • Example 3-2 the RAN determines that the optimization indication #a instructs the RAN to allocate resources to the first broadcast service according to the session identifier #a.
  • the RAN checks according to the session identifier #a whether the resource corresponding to the session identifier #a has been created. If the resource corresponding to the session identifier #a is not found, it is determined that the RAN has not created the resource corresponding to the session identifier #a.
  • Example 3-3 takes as an example that the RAN does not create resources corresponding to the first broadcast service before communicating with the UE of PLMN#a.
  • the RAN determines that the optimization indication #a instructs the RAN to allocate resources for the first broadcast service according to the service identifier, or instructs the RAN to reuse existing resources.
  • the RAN checks whether the resource corresponding to the first broadcast service has been created according to the service identifier.
  • the RAN determines to create the resource #a corresponding to the first broadcast service according to the optimization instruction #a, and establishes a data transmission channel between the RAN and UPF #a.
  • Example 3-3 does not limit the execution order of (1) and (2) above.
  • S505 is used to respond to S503.
  • S507 see the description of S212-S218.
  • the description includes: NEF#b/MBSF#b sends security activation indication #b to MB-SMF#b, and accordingly, MB-SMF#b receives security activation indication #b from NEF#b/MBSF#b.
  • MB-SMF#b determines the optimization instruction #b according to the security activation instruction #b.
  • S502 replace MB-SMF#a in S502 with MB-SMF#b in S508, replace optimization instruction #a in S502 with optimization instruction #b in S508, replace S502
  • the security activation indication #a in S508 is replaced with the security activation indication #b in S508.
  • MB-SMF#b sends a broadcast context creation message to the RBN.
  • the RBN receives the broadcast context creation message from MB-SMF#b.
  • the message carries MBS session ID#b. This message optionally carries the service identifier and optimization instruction #b.
  • the RAN allocates (or determines) resources for the first broadcast service according to the optimization instruction #b and/or the optimization instruction #a, and determines the processing method of the transmission channel between the RAN and the UPF #a.
  • Example 4-1 corresponds to any one of Example 3-1 to Example 3-3.
  • the RAN determines that the optimization indication #b instructs the RAN not to allocate resources for the first broadcast service according to the service identifier, or instructs the RAN not to reuse existing resources.
  • RAN determines to create resource #b according to optimization instruction #b, and establishes a data transmission channel between RAN and UPF #b. The RAN may discard the service identifier or skip the step of checking whether the resource corresponding to the first broadcast service has been created based on the service identifier.
  • Example 4-1 replace (1) in Example 4-1 with: the RAN determines that the optimization indication #b instructs the RAN to allocate resources to the first broadcast service according to the session identifier #b.
  • Example 4-2 corresponds to any one of Examples 3-1 to 3-3.
  • the RAN determines that the optimization indication #b instructs the RAN not to allocate resources for the first broadcast service according to the service identifier, or instructs the RAN not to reuse existing resources.
  • the RAN checks whether the resource corresponding to the first broadcast service has been created according to the service identifier.
  • the RAN determines not to reuse resource #a according to optimization instruction #a and optimization instruction #b, that is, not to use the same resource to send the data of the first broadcast service.
  • RAN determines to create resource #b according to optimization instruction #b, and establishes a data transmission channel between RAN and UPF #b.
  • the base station creates resources corresponding to MBS session ID#a and MBS session ID#b respectively, so that it can use different resources to send the same broadcast service data.
  • the RAN determines not to reuse resource #a based on the security activation indication #a and the security activation indication #b.
  • Example 4-2 does not limit the execution order of (1) and (2) above.
  • Example 4-2 replace (1) in Example 4-2 with: the RAN determines that the optimization indication #b instructs the RAN to allocate resources to the first broadcast service according to the session identifier #b.
  • Example 4-3 corresponds to Example 3-1 or Example 3-2.
  • the optimization instruction #a instructs the RAN not to allocate resources for the first broadcast service based on the service identifier, or instructs the RAN not to reuse existing resources, or instructs the RAN to allocate resources for the first broadcast service based on the session identifier #a.
  • the optimization instruction #b instructs the RAN to allocate resources for the first broadcast service according to the service identifier, or instructs the RAN to reuse existing resources.
  • the RAN determines not to reuse the resource #a according to the security activation indication #a and the security activation indication #b, that is, not to use the same resource to send the data of the first broadcast service.
  • the RAN determines to create the resource #b according to the security activation instruction #b, and establishes a data transmission channel between the RAN and the UPF #b.
  • the base station creates resources corresponding to MBS session ID#a and MBS session ID#b respectively, so that it can use different resources to send the same broadcast service data.
  • the above Examples 4-1 to 4-3 can also be understood that at least one of the optimization instruction #a and the optimization instruction #b is used to indicate at least one of the following: not allocating resources for the first broadcast service according to the service identifier, Or, without reusing existing resources, or by allocating resources to the first broadcast service according to the session identifier #b, the RAN will create resource #a and resource #b respectively. And sending the data of the first broadcast service to the UE of PLMN#a and the UE of PLMN#b through resource #a and resource #b respectively.
  • S511 is used in response to S09.
  • AF sends the media stream (that is, the data of the above-mentioned first broadcast service) to RAN through the network element in PLMN#b (for example, UPF#b).
  • RAN receives the media from AF through the network element in PLMN#b. flow.
  • the RAN sends the data of the first broadcast service to the UE of PLMN #b based on resource #b.
  • method 500 does not limit the order of S506 and S512.
  • the method 500 does not limit the execution order of S506 in the method 500, nor does it limit the execution order of S512 in the method 500.
  • S506 can be before or after determining whether to create resource #a, but the RAN needs to send the first broadcast service data based on resource #a after establishing resource #a.
  • S512 may be before or after determining whether to create resource #b, but the RAN needs to send the first broadcast service data based on resource #b after establishing resource #b.
  • the broadcast context creation message in S503 carries the security activation indication #a
  • the broadcast context creation message in S509 carries the security activation indication #b is used as an example for explanation.
  • the following is a detailed introduction to the implementation in which the broadcast context creation message in S503 does not carry the security activation indication #a, and the broadcast context creation message in S509 does not carry the security activation indication #b.
  • the broadcast context creation message in S503 does not carry the security activation indication #a.
  • the RAN may determine that the security activation indication #a indicates security activation according to the broadcast context creation message.
  • the broadcast context creation message in S509 does not carry security activation indication #b.
  • the RAN may determine that the security activation indication #b indicates security activation according to the broadcast context creation message.
  • the above solution can further improve system security performance.
  • the security activation cannot be indicated. That is, when the first network or the second network instructs security activation, the RAN does not process the security activation as it was received. It is likely to bring security risks and reduce communication success rate.
  • the broadcast context creation message in S503 does not carry the security activation indication #a.
  • the RAN may determine according to the broadcast context creation message that the security activation indication #a indicates security inactivation.
  • the broadcast context creation message in S509 does not carry security activation indication #b.
  • the RAN may determine according to the broadcast context creation message that the security activation indication #b indicates security inactivation.
  • the above solution can reduce signaling overhead and network consumption.
  • Figure 10 shows a schematic diagram of a method 600 for broadcasting secure communications provided by this application.
  • the method 600 for broadcasting secure communication provided by this application will be introduced in detail below with reference to Figure 10 .
  • Method 600 provides a specific example for the second implementation method in method 400.
  • the access network element takes RAN as an example
  • the first network takes PLMN#a as an example
  • the second network takes PLMN#b as an example
  • the first instruction information takes security activation instruction #a as an example
  • the second instruction information takes Security activation indication #b is taken as an example
  • the first air interface resource is taken as resource #a
  • the second air interface resource is taken as resource #b.
  • the RAN determines that the optimization instruction #a instructs the RAN to allocate resources for the first broadcast service according to the service identifier, or instructs the RAN to reuse existing resources.
  • the RAN allocates (or determines) resources for the first broadcast service according to the security activation indication #b and the security activation indication #a, and determines the processing method of the transmission channel between the RAN and the UPF.
  • the optimization instruction #a instructs the RAN to allocate resources for the first broadcast service according to the service identifier, or instructs the RAN to reuse existing resources.
  • the optimization instruction #b instructs the RAN to allocate resources for the first broadcast service according to the service identifier, or instructs the RAN to reuse existing resources.
  • the RAN determines not to create resource #b or to multiplex resource #a according to optimization instruction #a and optimization instruction #b.
  • the RAN determines not to establish a data transmission channel between the RAN and UPF#b according to optimization instruction #a and optimization instruction #b; or, determines to establish a data transmission channel between the RAN and UPF#b, but discards the data transmission channel. Data for the first broadcast service in .
  • S610 responds to S608.
  • AF sends the media stream (that is, the data of the above-mentioned first broadcast service) to RAN through the network element in PLMN#a (for example, UPF#a).
  • RAN receives the media from AF through the network element in PLMN#a. flow.
  • the RAN After acquiring the data of the first broadcast service, the RAN sends the data of the first broadcast service to the UE of PLMN #a and the UE of PLMN #b based on resource #a.
  • both the optimization instruction #a and the optimization instruction #b instruct the RAN to allocate resources for the first broadcast service according to the service identifier, or instruct the RAN to reuse existing resources, and the RAN will only create one for the first broadcast service.
  • resource (resource #a is taken as an example in method 600), and sends the data of the first broadcast service to the UE of PLMN#a and the UE of PLMN#b through resource #a (the data obtained by RAN from AF through PLMN#a in S611 First broadcast service data).
  • the method 600 also includes: Step 1, the AF sends the media stream (that is, the data of the above-mentioned first broadcast service) to the RAN through the network element in PLMN#b (for example, UPF#b).
  • the RAN sends the media stream through the PLMN#b.
  • the network element in b receives the media stream from AF.
  • the RAN discards the data of the first broadcast service received from the network element in PLMN #b according to the optimization instruction #a and the optimization instruction #b.
  • method 600 does not limit the order of S611 and step 1.
  • Method 600 does not limit the execution order of S611 in method 600, nor does it limit the execution order of step 1 in method 600.
  • S611 can be before or after determining whether to create resource #a, but the RAN needs to send the first broadcast service data based on resource #a after establishing resource #a.
  • step 1 can be before or after determining whether to create resource #b.
  • the broadcast context creation message in S603 carries the optimization instruction #a
  • the broadcast context creation message in S608 carries the optimization instruction #b is used as an example for explanation.
  • the following is a detailed introduction to the implementation in which the broadcast context creation message in S603 does not carry the optimization indication #a, and the broadcast context creation message in S608 does not carry the optimization indication #b.
  • the broadcast context creation message in S603 does not carry the optimization indication #a.
  • the RAN may determine the optimization indication #a according to the broadcast context creation message to instruct the RAN to allocate resources for the first broadcast service according to the service identifier, or instruct the RAN to reuse existing resources.
  • the broadcast context creation message in S608 does not carry optimization indication #b.
  • the RAN may determine the optimization indication #b according to the broadcast context creation message to instruct the RAN to allocate resources for the first broadcast service according to the service identifier, or instruct the RAN to reuse existing resources.
  • the above solution can reduce signaling overhead and network consumption.
  • Figure 11 shows a schematic diagram of a method 700 for broadcasting secure communications provided by this application.
  • the method 700 for broadcasting secure communication provided by this application will be introduced in detail below with reference to Figure 11 .
  • Method 700 provides a specific example for implementation method 1 in method 400.
  • the access network element takes RAN as an example
  • the first network takes PLMN#a as an example
  • the second network takes PLMN#b as an example
  • the first instruction information takes security activation instruction #a as an example
  • the second instruction information takes Security activation indication #b is taken as an example
  • the first air interface resource is taken as resource #a
  • the second air interface resource is taken as resource #b.
  • method 700 please refer to the description of method 500.
  • the difference between method 700 and method 500 is: (1) In method 700, NEF#a/MBSF#a determines the optimization instruction #a according to the security activation status #a, and sends the optimization instruction #a to MB-SMF#a. In 500, the optimization instruction #a is determined by MB-SMF#a based on the security activation status #a. (2) In method 700, MB-SMF#a does not need to obtain security activation status #a, but in method 500, MB-SMF#a needs to obtain security activation status #a.
  • NEF#b/MBSF#b determines the optimization instruction #b according to the security activation status #b, and sends the optimization instruction #b to MB-SMF#b.
  • MB-SMF#b determines the optimization instruction #b according to the security activation status #b.
  • Security activation status #b determines optimization instructions #b.
  • MB-SMF#b does not need to obtain security activation status #b, but in method 500, MB-SMF#b needs to obtain security activation status #b.
  • the beneficial effects of method 700 can be found in the beneficial effects of method 500.
  • Figure 12 shows a schematic diagram of a method 800 for broadcasting secure communications provided by this application.
  • the method 800 for broadcasting secure communication provided by this application will be introduced in detail below with reference to Figure 12 .
  • Method 800 provides a specific example for the second implementation method in method 400.
  • the access network element takes RAN as an example
  • the first network takes PLMN#a as an example
  • the second network takes PLMN#b as an example
  • the first instruction information takes security activation instruction #a as an example
  • the second instruction information takes Security activation indication #b is taken as an example
  • the first air interface resource is taken as resource #a
  • the second air interface resource is taken as resource #b.
  • method 800 please refer to the description of method 600.
  • the difference between method 800 and method 600 is: (1) In method 800, NEF#a/MBSF#a determines the optimization instruction #a based on the security activation status #a, and sends the optimization instruction #a to MB-SMF#a. In method 600, MB-SMF#a determines the optimization based on the security activation status #a. Instructions #a. (2) In method 800, MB-SMF#a does not need to obtain security activation status #a, but in method 600, MB-SMF#a needs to obtain security activation status #a.
  • NEF#b/MBSF#b determines the optimization instruction #b according to the security activation status #b, and sends the optimization instruction #b to MB-SMF#b.
  • MB-SMF#b determines the optimization instruction #b according to the security activation status #b.
  • Security activation status #b determines optimization instructions #b.
  • MB-SMF#b does not need to obtain security activation status #b, but in method 600, MB-SMF#b needs to obtain security activation status #b.
  • the beneficial effects of method 800 can be found in the beneficial effects of method 600.
  • Figure 13 shows a schematic diagram of a method 900 for broadcasting secure communications provided by this application.
  • the method 900 for broadcasting secure communication provided by this application will be introduced in detail below with reference to Figure 13 .
  • Method 900 provides a specific example for implementation method 1 in method 400.
  • the access network element takes RAN as an example
  • the first network takes PLMN#a as an example
  • the second network takes PLMN#b as an example
  • the first instruction information takes security activation instruction #a as an example
  • the second instruction information takes Security activation indication #b is taken as an example
  • the first air interface resource is taken as resource #a
  • the second air interface resource is taken as resource #b.
  • method 900 please refer to the description of method 700.
  • MBSTF#a determines the optimization instruction #a according to the security activation status #a, and sends the optimization instruction #a to NEF#a/MBSF#a.
  • Optimization instruction #a is determined by NEF#a/MBSF#a based on security activation status #a.
  • NEF#a/MBSF#a does not need to obtain security activation status #a, but in method 700, NEF#a/MBSF#a needs to obtain security activation status #a.
  • MBSTF#b determines the optimization instruction #b according to the security activation status #b, and sends the optimization instruction #b to NEF#b/MBSF#b.
  • NEF#b/MBSF#b determines the optimization instruction #b according to the security activation status #b.
  • Security activation status #b determines optimization instructions #b.
  • NEF#b/MBSF#b does not need to obtain security activation status #b.
  • NEF#b/MBSF#b needs to obtain security activation status #b.
  • the beneficial effects of method 900 can be found in the beneficial effects of method 500.
  • Figure 14 shows a schematic diagram of a method 1000 for broadcasting secure communications provided by this application.
  • the method 1000 for broadcasting secure communication provided by this application will be introduced in detail below with reference to Figure 14 .
  • Method 1000 provides a specific example for the second implementation method in method 400.
  • the access network element takes RAN as an example
  • the first network takes PLMN#a as an example
  • the second network takes PLMN#b as an example
  • the first instruction information takes security activation instruction #a as an example
  • the second instruction information takes Security activation indication #b is taken as an example
  • the first air interface resource is taken as resource #a
  • the second air interface resource is taken as resource #b.
  • method 1000 please refer to the description of method 800.
  • MBSTF#a determines the optimization instruction #a according to the security activation status #a, and sends the optimization instruction #a to NEF#a/MBSF#a.
  • Optimization instruction #a is determined by NEF#a/MBSF#a based on security activation status #a.
  • NEF#a/MBSF#a does not need to obtain security activation status #a.
  • NEF#a/MBSF#a needs to obtain security activation status #a.
  • MBSTF#b determines the optimization instruction #b according to the security activation status #b, and sends the optimization instruction #b to NEF#b/MBSF#b.
  • NEF#b/MBSF#b determines the optimization instruction #b according to the security activation status #b.
  • Security activation status #b determines optimization instructions #b.
  • NEF#b/MBSF#b does not need to obtain security activation status #b.
  • NEF#b/MBSF#b needs to obtain security activation status #b.
  • the beneficial effects of method 1000 can be found in the beneficial effects of method 600.
  • Figure 15 shows a schematic diagram of a method 1100 for broadcasting secure communications provided by this application.
  • the method 1100 for broadcasting secure communication provided by this application will be introduced in detail below with reference to Figure 15 .
  • Method 1100 provides a specific example for implementation method 1 in method 400.
  • the access network element takes RAN as an example
  • the first network takes PLMN#a as an example
  • the second network takes PLMN#b as an example
  • the first instruction information takes security activation instruction #a as an example
  • the second instruction information takes Security activation indication #b is taken as an example
  • the first air interface resource is taken as resource #a
  • the second air interface resource is taken as resource #b.
  • method 1100 please refer to the description of method 1000.
  • the difference between method 1100 and method 1000 is: (1) In method 1100, AF determines optimization instruction #a and sends optimization instruction #a to NEF#a/MBSF#a. In method 1000, MBSTF#a activates the status according to the security #aIdentify optimization instructions #a. (2) In method 1100, the AF determines the optimization instruction #b and sends the optimization instruction #b to NEF#b/MBSF#b. In the method 1000, the MBSTF#b determines the optimization instruction #b according to the security activation status #b.
  • the optimization instruction #a and the optimization instruction #b both instruct the RAN to allocate resources for the first broadcast service according to the service identifier, or instruct the RAN to reuse existing resources, are taken as an example for explanation.
  • the beneficial effects of method 1100 can be found in the beneficial effects of method 500.
  • Figures 16 and 17 are schematic structural diagrams of possible communication devices provided by embodiments of the present application. These communication devices can be used to implement the functions of the access network element or the second network element in the above method embodiments, and therefore can also achieve the beneficial effects of the above method embodiments.
  • the communication device may be an access network element or a second network element, or may be a module (such as a chip) applied to the access network element or the second network element.
  • the communication device 1200 includes a processing unit 1210 and a transceiver unit 1220 .
  • the communication device 1200 is used to implement the functions of the access network element or the second network element in the method embodiments shown in Figures 5 to 15.
  • the transceiver unit 1220 is used to receive second indication information, and the second indication information is used to indicate that the first Whether the security protection is enabled for the data of the broadcast service, or the processing unit 1210 is used to determine the second indication information, the second indication information is used to indicate whether the security protection is enabled for the data of the first broadcast service; the transceiver unit 1220, Used to send a second session establishment request for the first broadcast service to the access network element, where the second session establishment request includes the second indication information.
  • the transceiver unit 1220 is used to receive the third broadcast service from the first network element in the first network.
  • a session establishment request the first session establishment request includes first indication information, the first indication information is used to indicate whether security protection is enabled for the data of the first broadcast service; in response to the first session establishment request, the processing unit 1210, configured to allocate first air interface resources to the first broadcast service; the transceiver unit 1220, further configured to receive a second session establishment request for the first broadcast service from the second network element in the second network.
  • the second session establishment request includes second indication information, the second indication information is used to indicate whether security protection is enabled for the data of the first broadcast service; in response to the second session establishment request, the processing unit 1210 is also configured to: The first indication information and/or the second indication information determine whether to multiplex the first air interface resource.
  • the transceiver unit 1220 is used to receive third indication information, the third indication information is used to indicate that the first broadcast service Whether to reuse existing air interface resources, or, the processing unit 1210 is used to determine third indication information, the third indication information is used to indicate whether to reuse existing air interface resources for the first broadcast service; the transceiver unit 1220, Used to send a second session establishment request for the first broadcast service to the access network element, where the second session establishment request includes the third indication information.
  • the transceiver unit 1220 is used to receive the first broadcast service from the first network element in the first network. Session establishment request; in response to the first session establishment request, the processing unit 1210 is configured to allocate the first air interface resource to the first broadcast service; the transceiving unit 1220 is also configured to receive a message from the second network element in the second network
  • a second session establishment request for the first broadcast service, the second session establishment request includes third indication information, the third indication information is used to indicate whether to reuse existing air interface resources for the first broadcast service; response
  • the processing unit 1210 is further configured to determine whether to reuse the first air interface resource according to the third indication information.
  • processing unit 1210 and the transceiver unit 1220 please refer to the relevant descriptions in the method embodiments shown in FIGS. 5 to 15 .
  • the communication device 1300 includes a processor 1310 and an interface circuit 1320.
  • the processor 1310 and the interface circuit 1320 are coupled to each other.
  • the interface circuit 1320 may be a transceiver or an input-output interface.
  • the communication device 1300 may also include a memory 1330 for storing instructions executed by the processor 1310 or input data required for the processor 1310 to run the instructions or data generated after the processor 1310 executes the instructions.
  • the processor 1310 is used to implement the functions of the above-mentioned processing unit 1210
  • the interface circuit 1320 is used to implement the functions of the above-mentioned transceiver unit 1220.
  • the second network element chip implements the functions of the second network element in the above method embodiment.
  • the second network element chip receives information from other modules (such as radio frequency modules or antennas) in the second network element, and the information is sent by the access network element or to the second network element; or, the second network element
  • the chip sends information to other modules (such as radio frequency modules or antennas) in the second network element, and the information is sent by the second network element to the access network element.
  • the terminal chip implements the functions of the access network element in the above method embodiment.
  • the chip of the access network element receives information from other modules (such as radio frequency modules or antennas) in the access network element, and the information is sent by the second network element to the access network element; or, the access network
  • the chip of the network element sends information to other modules (such as radio frequency modules or antennas) in the base station, and the information is sent by the access network element to the second network element.
  • the processor in the embodiments of the present application may be a central processing unit (CPU), or other general-purpose processor, a digital signal processor (Digital Signal Processor, DSP), or an application-specific integrated circuit. (Application Specific Integrated Circuit, ASIC), Field Programmable Gate Array (FPGA) or Other programmable logic devices, transistor logic devices, hardware components, or any combination thereof.
  • a general-purpose processor can be a microprocessor or any conventional processor.
  • the method steps in the embodiments of the present application can be implemented in hardware or in software instructions that can be executed by a processor.
  • Software instructions can be composed of corresponding software modules, and the software modules can be stored in random access memory, flash memory, read-only memory, programmable read-only memory, erasable programmable read-only memory, electrically erasable programmable read-only memory In memory, register, hard disk, mobile hard disk, CD-ROM or any other form of storage medium well known in the art.
  • An exemplary storage medium is coupled to the processor such that the processor can read information from the storage medium and write information to the storage medium.
  • the storage medium may also be an integral part of the processor.
  • the processor and storage media may be located in an ASIC. Additionally, the ASIC can be located in the base station or terminal.
  • the processor and storage medium may also exist as discrete components in the base station or terminal.
  • the computer program product includes one or more computer programs or instructions.
  • the computer may be a general purpose computer, a special purpose computer, a computer network, a network device, a user equipment, or other programmable device.
  • the computer program or instructions may be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another.
  • the computer program or instructions may be transmitted from a website, computer, A server or data center transmits via wired or wireless means to another website site, computer, server, or data center.
  • the computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server or data center that integrates one or more available media.
  • the available media may be magnetic media, such as floppy disks, hard disks, and tapes; optical media, such as digital video optical disks; or semiconductor media, such as solid-state hard drives.
  • the computer-readable storage medium may be volatile or nonvolatile storage media, or may include both volatile and nonvolatile types of storage media.
  • “at least one” refers to one or more, and “plurality” refers to two or more.
  • “And/or” describes the relationship between associated objects, indicating that there can be three relationships, for example, A and/or B, which can mean: A exists alone, A and B exist simultaneously, and B exists alone, where A, B can be singular or plural.
  • the character “/” generally indicates that the related objects before and after are an “or” relationship; in the formula of this application, the character “/” indicates that the related objects before and after are a kind of "division” Relationship.
  • “Including at least one of A, B and C” may mean: including A; including B; including C; including A and B; including A and C; including B and C; including A, B and C.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Small-Scale Networks (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

Provided in the present application are a method and apparatus for broadcast security communication. The method comprises: a first network element in a first network sending to an access network element a first session establishment request for a first broadcast service, wherein the first session establishment request comprises first indication information, which is used for indicating whether to enable security protection for first data of the first broadcast service; the access network element allocating a first air interface resource to the first broadcast service according to the first session establishment request; a second network element in a second network sending to the access network element a second session establishment request for the first broadcast service, wherein the second session establishment request comprises second indication information, which is used for indicating whether to enable security protection for second data of the first broadcast service; and according to the first indication information and/or the second indication information, the access network element determining whether to reuse the first air interface resource. The method and apparatus for broadcast security communication provided in the present application can improve the user experience.

Description

广播安全通信的方法和装置Method and device for broadcasting secure communications
本申请要求于2022年8月14日提交中国专利局、申请号为202210970901.8、申请名称为“广播安全通信的方法和装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。This application claims priority to the Chinese patent application filed with the China Patent Office on August 14, 2022, with application number 202210970901.8 and the application title "Method and Device for Broadcasting Secure Communication", the entire content of which is incorporated into this application by reference. .
技术领域Technical field
本申请涉及通信领域,并且,更具体地,涉及一种广播安全通信的方法和装置。The present application relates to the field of communications, and, more specifically, to a method and apparatus for broadcasting secure communications.
背景技术Background technique
在多播/广播业务数据传输中,对于同一个广播业务,公用陆地移动通信网络(public land mobile network,PLMN)#a和PLMN#b可以共用一个基站。具体地,应用功能(application function,AF)通过PLMN#a和PLMN#b将数据传输到该基站,该基站广播一份数据到PLMN#a的终端设备(user eqiupment,UE)和PLMN#b的UE。并且,该数据可以由PLMN#a或PLMN#b中的多播/广播服务传输功能(multicast/broadcast service transport function,MBSTF)对广播业务的数据进行安全保护。但是,在该过程中,可能存在UE无法对接收到的广播业务的数据进行解密和/或完整性校验的情况,导致通信受到影响,用户体验很差。In multicast/broadcast service data transmission, for the same broadcast service, public land mobile communication network (public land mobile network, PLMN) #a and PLMN #b can share a base station. Specifically, the application function (AF) transmits data to the base station through PLMN#a and PLMN#b, and the base station broadcasts a copy of the data to the user equipment (UE) of PLMN#a and PLMN#b. UE. Moreover, the data can be securely protected by the multicast/broadcast service transport function (MBSTF) in PLMN#a or PLMN#b. However, during this process, there may be situations where the UE cannot decrypt and/or integrity check the received broadcast service data, causing communication to be affected and user experience to be poor.
发明内容Contents of the invention
本申请提供一种广播安全通信的方法和装置,能够提升用户体验。This application provides a method and device for broadcasting secure communications, which can improve user experience.
第一方面,提供了一种广播安全通信的方法,该方法可以由接入网网元执行,或者,也可以由接入网网元的组成部件(例如芯片或者电路)执行,本申请对此不作限定。为了便于描述,下面以由接入网网元执行为例进行说明。In the first aspect, a method for broadcasting secure communication is provided. The method can be executed by an access network element, or can also be executed by a component (such as a chip or circuit) of an access network element. This application focuses on Not limited. For the convenience of description, the following description takes the execution by the access network element as an example.
该方法可以包括:接入网网元接收来自第一网络中的第一网元的针对第一广播业务的第一会话建立请求,该第一会话建立请求中包括第一指示信息,该第一指示信息用于指示针对该第一广播业务的第一数据是否开启安全保护;响应于该第一会话建立请求,该接入网网元为该第一广播业务分配第一空口资源;该接入网网元接收来自第二网络中的第二网元的针对该第一广播业务的第二会话建立请求,该第二会话建立请求中包括第二指示信息,该第二指示信息用于指示针对该第一广播业务的第二数据是否开启安全保护;响应于该第二会话建立请求,该接入网网元根据该第一指示信息和/或该第二指示信息确定是否复用该第一空口资源。The method may include: the access network element receives a first session establishment request for the first broadcast service from the first network element in the first network, the first session establishment request includes first indication information, the first The indication information is used to indicate whether security protection is enabled for the first data of the first broadcast service; in response to the first session establishment request, the access network element allocates first air interface resources to the first broadcast service; the access network element The network element receives a second session establishment request for the first broadcast service from the second network element in the second network. The second session establishment request includes second indication information, and the second indication information is used to indicate that the second session establishment request is for the first broadcast service. Whether security protection is enabled for the second data of the first broadcast service; in response to the second session establishment request, the access network element determines whether to reuse the first indication information according to the first indication information and/or the second indication information. Air interface resources.
上述方案,两个网络共享接入网网元的情况下,接入网网元能够根据其中一个网络或该两个网络是否对第一广播业务的数据开启安全保护,确定是否复用第一空口资源。减少由于两个网络中的MBSTF分别第一对广播业务的数据进行安全保护,而出现的终端设备无法对接收到的广播业务的数据进行解密和/或完整性校验的情况,提高用户体验。In the above solution, when two networks share access network elements, the access network elements can determine whether to reuse the first air interface based on whether one or both networks enable security protection for the data of the first broadcast service. resource. This reduces the situation where the terminal device is unable to decrypt and/or integrity check the received broadcast service data because the MBSTFs in the two networks respectively first provide security protection for the broadcast service data, thereby improving user experience.
结合第一方面,在第一方面的某些实现方式中,在该第一指示信息指示针对该第一数据未开启安全保护且该第二指示信息指示针对该第二数据未开启安全保护的情况下,该接入网网元根据该第一指示信息和/或该第二指示信息确定是否复用该第一空口资源,包括:该接入网网元根据该第一指示信息和该第二指示信息确定复用该第一空口资源。In conjunction with the first aspect, in some implementations of the first aspect, when the first indication information indicates that security protection is not enabled for the first data and the second indication information indicates that security protection is not enabled for the second data In this case, the access network element determines whether to reuse the first air interface resource according to the first indication information and/or the second indication information, including: the access network element determines whether to reuse the first air interface resource according to the first indication information and the second indication information. The indication information determines to reuse the first air interface resource.
上述方案,能够节省空口资源。The above solution can save air interface resources.
结合第一方面,在第一方面的某些实现方式中,该方法还包括:该接入网网元基于该第一空口资源向该第一网络的终端设备和该第二网络的终端设备发送该第一数据;或,该接入网网元基于该第一空口资源向该第一网络的终端设备和该第二网络的终端设备发送该第二数据。With reference to the first aspect, in some implementations of the first aspect, the method further includes: the access network element sending a message to a terminal device of the first network and a terminal device of the second network based on the first air interface resource. the first data; or, the access network element sends the second data to the terminal equipment of the first network and the terminal equipment of the second network based on the first air interface resource.
结合第一方面,在第一方面的某些实现方式中,该第一指示信息指示针对该第一数据已开启安全保护,和/或,该第二指示信息指示针对该第二数据已开启安全保护的情况下,该接入网网元根据该第 一指示信息和/或该第二指示信息确定是否复用该第一空口资源,包括:该接入网网元根据该第一指示信息和/或该第二指示信息确定不复用该第一空口资源。In conjunction with the first aspect, in some implementations of the first aspect, the first indication information indicates that security protection has been enabled for the first data, and/or the second indication information indicates that security has been enabled for the second data. In the case of protection, the access network element shall An indication information and/or the second indication information determines whether to reuse the first air interface resource, including: the access network element determines not to reuse the first air interface resource according to the first indication information and/or the second indication information. Air interface resources.
结合第一方面,在第一方面的某些实现方式中,该该接入网网元根据该第一指示信息和/或该第二指示信息确定不复用该第一空口资源,包括:该接入网网元根据该第一指示信息和/或该第二指示信息为该第二数据分配第二空口资源,该第一空口资源与该第二空口资源不同;该接入网网元基于该第一空口资源向该第一网络的终端设备发送该第一数据;该接入网网元基于该第二空口资源向该第二网络的终端设备发送该第二数据。With reference to the first aspect, in some implementations of the first aspect, the access network element determines not to reuse the first air interface resource according to the first indication information and/or the second indication information, including: the The access network element allocates a second air interface resource to the second data according to the first indication information and/or the second indication information, and the first air interface resource is different from the second air interface resource; the access network element allocates a second air interface resource based on the first indication information and/or the second indication information. The first air interface resource sends the first data to the terminal device of the first network; the access network element sends the second data to the terminal device of the second network based on the second air interface resource.
结合第一方面,在第一方面的某些实现方式中,该方法还包括:该接入网网元基于该第一空口资源向该第一网络的终端设备发送该第一数据;该接入网网元为该第二数据分配第二空口资源,该第一空口资源与该第二空口资源不同;该接入网网元基于该第二空口资源向该第二网络的终端设备发送该第二数据。With reference to the first aspect, in some implementations of the first aspect, the method further includes: the access network element sending the first data to the terminal device of the first network based on the first air interface resource; the access network element The network element allocates a second air interface resource to the second data, and the first air interface resource is different from the second air interface resource; the access network element sends the third air interface resource to the terminal device of the second network based on the second air interface resource. 2 data.
上述方案,在能够实现第一网络和第二网络对第一广播业务的数据进行安全保护的同时,也使得第一网络和第二网络的终端设备能够分别对接收到的第一广播业务的数据进行解密和/或完整性校验,提高通信安全性能,提升用户体验。The above solution not only enables the first network and the second network to securely protect the data of the first broadcast service, but also enables the terminal devices of the first network and the second network to separately protect the received data of the first broadcast service. Perform decryption and/or integrity verification to improve communication security and user experience.
结合第一方面,在第一方面的某些实现方式中,该第一数据由该第一网络进行安全保护;该第二数据由该第二网络进行安全保护。With reference to the first aspect, in some implementations of the first aspect, the first data is securely protected by the first network; and the second data is securely protected by the second network.
结合第一方面,在第一方面的某些实现方式中,该方法还包括:该接入网网元存储该第一指示信息。With reference to the first aspect, in some implementations of the first aspect, the method further includes: the access network element storing the first indication information.
结合第一方面,在第一方面的某些实现方式中,该第一会话建立请求还包括该第一广播业务对应的服务标识,该第二会话建立请求还包括该第一广播业务对应的服务标识,该接入网网元根据该第一指示信息和/或该第二指示信息确定是否复用该第一空口资源,包括:该接入网网元根据该第一广播业务对应的服务标识,以及,该第一指示信息和/或该第二指示信息确定是否复用该第一空口资源。With reference to the first aspect, in some implementations of the first aspect, the first session establishment request further includes a service identifier corresponding to the first broadcast service, and the second session establishment request further includes a service corresponding to the first broadcast service. Identification, the access network element determines whether to reuse the first air interface resource according to the first indication information and/or the second indication information, including: the access network element determines whether to reuse the first air interface resource according to the service identification corresponding to the first broadcast service , and the first indication information and/or the second indication information determine whether to multiplex the first air interface resource.
第二方面,提供了一种广播安全通信的方法,该方法是与第一方面的方法对应的由第二网元执行的方法,因此也能实现第一方面的方法所能实现的有益效果。该方法可以由第二网元执行,或者,也可以由第二网元的组成部件(例如芯片或者电路)执行,本申请对此不作限定。为了便于描述,下面以由第二网元执行为例进行说明。The second aspect provides a method for broadcasting secure communication. The method is a method executed by the second network element corresponding to the method of the first aspect. Therefore, the beneficial effects achieved by the method of the first aspect can also be achieved. The method may be executed by the second network element, or may be executed by a component (such as a chip or circuit) of the second network element, which is not limited in this application. For convenience of description, the following description takes execution by the second network element as an example.
该方法可以包括:第二网络的第二网元获取第二指示信息,该第二指示信息用于指示针对该第一广播业务的第二数据是否开启安全保护;该第二网元向接入网网元发送针对第一广播业务的第二会话建立请求,该第二会话建立请求中包括该第二指示信息。The method may include: a second network element of the second network obtaining second indication information, the second indication information being used to indicate whether security protection is enabled for the second data of the first broadcast service; The network element sends a second session establishment request for the first broadcast service, where the second session establishment request includes the second indication information.
结合第二方面,在第二方面的某些实现方式中,该第二网络的第二网元获取第二指示信息,包括:该第二网元确定该第二指示信息。With reference to the second aspect, in some implementations of the second aspect, the second network element of the second network obtains the second indication information, including: the second network element determines the second indication information.
一种可能实现方式中,该第二网元根据预配置信息确定第二指示信息。或者,第二网元接受来自服务提供商或应用功能的安全配置信息,并根据该安全配置信息确定第二指示信息。该安全配置信息用于指示是否对第二网络的用户面网元与第二网络的终端设备之间进行安全保护。In a possible implementation manner, the second network element determines the second indication information based on preconfiguration information. Alternatively, the second network element accepts security configuration information from the service provider or application function, and determines the second indication information based on the security configuration information. The security configuration information is used to indicate whether to perform security protection between the user plane network element of the second network and the terminal device of the second network.
结合第二方面,在第二方面的某些实现方式中,该第二网元为多播/广播服务功能(multicast and broadcast service function,MBSF)或网络开放功能(network exposure function,NEF)。Combined with the second aspect, in some implementations of the second aspect, the second network element is a multicast/broadcast service function (MBSF) or a network exposure function (NEF).
结合第二方面,在第二方面的某些实现方式中,该第二网络的第二网元获取第二指示信息,包括:该第二网元接收来自该第二网络的第三网元的该第二指示信息。Combined with the second aspect, in some implementations of the second aspect, the second network element of the second network obtains the second indication information, including: the second network element receives the second indication information from the third network element of the second network. the second instruction information.
结合第二方面,在第二方面的某些实现方式中,该方法还包括:该第二网元向该第三网元发送请求消息,该请求消息用于请求该第二指示信息。With reference to the second aspect, in some implementations of the second aspect, the method further includes: the second network element sending a request message to the third network element, the request message being used to request the second indication information.
结合第二方面,在第二方面的某些实现方式中,该第二网元为多播/广播服务传输功能(multicast/broadcast service transport function,MBSTF)。Combined with the second aspect, in some implementations of the second aspect, the second network element is a multicast/broadcast service transport function (MBSTF).
第三方面,提供了一种广播安全通信的方法,该方法是与第一方面的方法对应的由第二网元执行的方法,因此也能实现第一方面的方法所能实现的有益效果。该方法可以由第二网元执行,或者,也可以由第二网元的组成部件(例如芯片或者电路)执行,本申请对此不作限定。为了便于描述,下面以由第二网元执行为例进行说明。The third aspect provides a method for broadcasting secure communication. This method is a method executed by the second network element corresponding to the method of the first aspect. Therefore, the beneficial effects achieved by the method of the first aspect can also be achieved. The method may be executed by the second network element, or may be executed by a component (such as a chip or circuit) of the second network element, which is not limited in this application. For convenience of description, the following description takes execution by the second network element as an example.
该方法可以包括:第二网络的第二网元接收第二指示信息,该第二指示信息用于指示针对该第一 广播业务的第二数据是否开启安全保护;The method may include: a second network element of the second network receiving second indication information, the second indication information being used to indicate that the first Whether security protection is enabled for the second data of the broadcast service;
该第二网元向接入网网元发送针对第一广播业务的第二会话建立请求,该第二会话建立请求中包括该第二指示信息。The second network element sends a second session establishment request for the first broadcast service to the access network element, and the second session establishment request includes the second indication information.
结合第三方面,在第三方面的某些实现方式中,该第二网元为多播/广播会话管理功能(multicast/broadcast-session management function,MB-SMF)。Combined with the third aspect, in some implementations of the third aspect, the second network element is a multicast/broadcast-session management function (MB-SMF).
第四方面,提供了一种广播安全通信的方法,该方法可以由接入网网元执行,或者,也可以由接入网网元的组成部件(例如芯片或者电路)执行,本申请对此不作限定。为了便于描述,下面以由接入网网元执行为例进行说明。In the fourth aspect, a method for broadcasting secure communication is provided. The method can be executed by an access network element, or can also be executed by a component (such as a chip or circuit) of an access network element. This application discusses Not limited. For the convenience of description, the following description takes the execution by the access network element as an example.
该方法可以包括:接入网网元接收来自第一网络中的第一网元的针对第一广播业务的第一会话建立请求;响应于该第一会话建立请求,该接入网网元为该第一广播业务分配第一空口资源;该接入网网元接收来自第二网络中的第二网元的针对该第一广播业务的第二会话建立请求,该第二会话建立请求中包括第三指示信息,该第三指示信息用于指示针对该第一广播业务是否复用已有的空口资源;响应于该第二会话建立请求,该接入网网元根据该第三指示信息确定是否复用该第一空口资源。The method may include: the access network element receiving a first session establishment request for the first broadcast service from the first network element in the first network; in response to the first session establishment request, the access network element is The first broadcast service allocates first air interface resources; the access network element receives a second session establishment request for the first broadcast service from the second network element in the second network, the second session establishment request includes Third indication information, the third indication information is used to indicate whether to reuse existing air interface resources for the first broadcast service; in response to the second session establishment request, the access network element determines according to the third indication information Whether to reuse the first air interface resource.
上述方案,两个网络共享接入网网元的情况下,接入网网元能够根据其中网络的指示确定是否复用第一空口资源。减少由于两个网络中的MBSTF分别第一对广播业务的数据进行安全保护,而出现的终端设备无法对接收到的广播业务的数据进行解密和/或完整性校验的情况,提高用户体验。In the above solution, when two networks share access network elements, the access network elements can determine whether to reuse the first air interface resource according to instructions from the networks. This reduces the situation where the terminal device is unable to decrypt and/or integrity check the received broadcast service data because the MBSTFs in the two networks respectively first provide security protection for the broadcast service data, thereby improving user experience.
结合第四方面,在第四方面的某些实现方式中,第三指示信息用于指示针对该第一广播业务复用已有的空口资源的情况下,该接入网网元根据该第三指示信息确定是否复用该第一空口资源,包括:该接入网网元根据该第三指示信息确定复用该第一空口资源。In conjunction with the fourth aspect, in some implementations of the fourth aspect, the third indication information is used to indicate that the access network element is to reuse existing air interface resources for the first broadcast service according to the third The indication information determines whether to reuse the first air interface resource, including: the access network element determines to multiplex the first air interface resource according to the third indication information.
结合第四方面,在第四方面的某些实现方式中,该接入网网元丢弃从该第二网络接收的该第一广播业务的数据。With reference to the fourth aspect, in some implementations of the fourth aspect, the access network element discards the data of the first broadcast service received from the second network.
结合第四方面,在第四方面的某些实现方式中,该接入网网元基于该第一空口资源向该第一网络的终端设备和该第二网络的终端设备发送该第一广播业务的第一数据;或,该接入网网元基于该第一空口资源向该第一网络的终端设备和该第二网络的终端设备发送该第一广播业务的第二数据,其中,该第一数据来自该第一网络,该第二数据来自该第二网络。With reference to the fourth aspect, in some implementations of the fourth aspect, the access network element sends the first broadcast service to the terminal equipment of the first network and the terminal equipment of the second network based on the first air interface resource. The first data of the first broadcast service; or, the access network element sends the second data of the first broadcast service to the terminal equipment of the first network and the terminal equipment of the second network based on the first air interface resource, wherein, the third One data comes from the first network, and the second data comes from the second network.
结合第四方面,在第四方面的某些实现方式中,该第三指示信息指示根据该第一广播业务对应的服务标识为该第一广播业务分配空口资源。With reference to the fourth aspect, in some implementations of the fourth aspect, the third indication information indicates that air interface resources are allocated to the first broadcast service according to the service identifier corresponding to the first broadcast service.
结合第四方面,在第四方面的某些实现方式中,该接入网网元根据该第三指示信息确定复用该第一空口资源,包括:该接入网网元根据已经存在该第一广播业务对应的该第一空口资源确定针对该第一广播业务复用该第一空口资源。With reference to the fourth aspect, in some implementations of the fourth aspect, the access network element determines to multiplex the first air interface resource according to the third indication information, including: the access network element determines to multiplex the first air interface resource according to the existing existence of the third air interface resource. The first air interface resource corresponding to a broadcast service is determined to be multiplexed for the first broadcast service.
结合第四方面,在第四方面的某些实现方式中,该第二会话创建请求不携带该第一广播业务对应的服务标识。With reference to the fourth aspect, in some implementations of the fourth aspect, the second session creation request does not carry the service identifier corresponding to the first broadcast service.
结合第四方面,在第四方面的某些实现方式中,第三指示信息用于指示针对该第一广播业务不复用已有的空口资源的情况下,该接入网网元根据该第三指示信息确定是否复用该第一空口资源,包括:该接入网网元根据该第三指示信息确定不复用该第一空口资源。With reference to the fourth aspect, in some implementations of the fourth aspect, the third indication information is used to indicate that the access network element does not reuse existing air interface resources for the first broadcast service according to the third aspect. The third indication information determines whether to reuse the first air interface resource, including: the access network element determines not to reuse the first air interface resource according to the third indication information.
结合第四方面,在第四方面的某些实现方式中,该接入网网元根据该第三指示信息确定不复用该第一空口资源,包括:该接入网网元根据该第三指示信息为该第一广播业务的第二数据分配第二空口资源,该第一空口资源与该第二空口资源不同;该接入网网元基于该第一空口资源向该第一网络的终端设备发送该第一广播业务的第一数据;该接入网网元基于该第二空口资源向该第二网络的终端设备发送该第二数据,其中,该第一数据来自该第一网络,该第二数据来自该第二网络。With reference to the fourth aspect, in some implementations of the fourth aspect, the access network element determines not to reuse the first air interface resource according to the third indication information, including: the access network element determines not to reuse the first air interface resource according to the third indication information. The instruction information allocates a second air interface resource to the second data of the first broadcast service, and the first air interface resource is different from the second air interface resource; the access network element provides the terminal of the first network with the first air interface resource based on the first air interface resource. The device sends the first data of the first broadcast service; the access network element sends the second data to the terminal device of the second network based on the second air interface resource, wherein the first data comes from the first network, The second data comes from the second network.
结合第四方面,在第四方面的某些实现方式中,该方法还包括:该接入网网元基于该第一空口资源向该第一网络的终端设备发送该第一广播业务的第一数据;该接入网网元为该第一广播业务的第二数据分配第二空口资源,该第一空口资源与该第二空口资源不同;该接入网网元基于该第二空口资源向该第二网络的终端设备发送该第二数据,其中,该第一数据来自该第一网络,该第二数据来自该第二网络。With reference to the fourth aspect, in some implementations of the fourth aspect, the method further includes: the access network element sending a first portion of the first broadcast service to a terminal device of the first network based on the first air interface resource. data; the access network element allocates a second air interface resource for the second data of the first broadcast service, and the first air interface resource is different from the second air interface resource; the access network element allocates a second air interface resource to the second data based on the second air interface resource. The terminal device of the second network sends the second data, wherein the first data comes from the first network and the second data comes from the second network.
结合第四方面,在第四方面的某些实现方式中,该第一广播业务的第一数据由该第一网络进行安全保护;该第一广播业务的第二数据由该第二网络进行安全保护。 Combined with the fourth aspect, in some implementations of the fourth aspect, the first data of the first broadcast service is securely protected by the first network; the second data of the first broadcast service is securely protected by the second network Protect.
结合第四方面,在第四方面的某些实现方式中,该第三指示信息用于指示针对该第一广播业务不复用已有的空口资源的情况下,该第三指示信息指示根据该第二会话建立请求对应的会话标识为第一广播业务分配空口资源。Combined with the fourth aspect, in some implementations of the fourth aspect, the third indication information is used to indicate that the existing air interface resources are not reused for the first broadcast service. The session identifier corresponding to the second session establishment request allocates air interface resources for the first broadcast service.
结合第四方面,在第四方面的某些实现方式中,该接入网网元根据该第三指示信息确定不复用该第一空口资源,包括:该接入网网元根据该第三指示信息检查是否存在该会话标识对应的空口资源;在不存在该会话标识对应的空口资源的情况下,该接入网网元确定针对该第一广播业务不复用该第一空口资源。With reference to the fourth aspect, in some implementations of the fourth aspect, the access network element determines not to reuse the first air interface resource according to the third indication information, including: the access network element determines not to reuse the first air interface resource according to the third indication information. The instruction information checks whether there is an air interface resource corresponding to the session identifier; if there is no air interface resource corresponding to the session identifier, the access network element determines not to reuse the first air interface resource for the first broadcast service.
第五方面,提供了一种广播安全通信的方法,该方法是与第一方面的方法对应的由第二网元执行的方法,因此也能实现第一方面的方法所能实现的有益效果。该方法可以由第二网元执行,或者,也可以由第二网元的组成部件(例如芯片或者电路)执行,本申请对此不作限定。为了便于描述,下面以由第二网元执行为例进行说明。A fifth aspect provides a method for broadcasting secure communications. The method is a method executed by a second network element corresponding to the method of the first aspect. Therefore, the beneficial effects achieved by the method of the first aspect can also be achieved. The method may be executed by the second network element, or may be executed by a component (such as a chip or circuit) of the second network element, which is not limited in this application. For convenience of description, the following description takes execution by the second network element as an example.
该方法可以包括:第二网络的第二网元获取第三指示信息,该第三指示信息用于指示针对该第一广播业务是否复用已有的空口资源;该第二网元向接入网网元发送针对第一广播业务的第二会话建立请求,该第二会话建立请求中包括该第三指示信息。The method may include: a second network element of the second network obtaining third indication information, the third indication information being used to indicate whether to reuse existing air interface resources for the first broadcast service; The network element sends a second session establishment request for the first broadcast service, where the second session establishment request includes the third indication information.
结合第五方面,在第五方面的某些实现方式中,该第二网络的第二网元获取第三指示信息,包括:该第二网元确定该第三指示信息。Combined with the fifth aspect, in some implementations of the fifth aspect, the second network element of the second network obtains the third indication information, including: the second network element determines the third indication information.
结合第五方面,在第五方面的某些实现方式中,该第二网元确定该第三指示信息,包括:该第二网元根据第二指示信息确定该第三指示信息,该第二指示信息用于指示针对该第一广播业务的数据是否开启安全保护。With reference to the fifth aspect, in some implementations of the fifth aspect, the second network element determines the third indication information, including: the second network element determines the third indication information according to the second indication information, and the second network element determines the third indication information according to the second indication information. The indication information is used to indicate whether security protection is enabled for the data of the first broadcast service.
结合第五方面,在第五方面的某些实现方式中,在该第二指示信息用于指示针对该第一广播业务的数据开启安全保护的情况下,该第三指示信息用于指示针对该第一广播业务不复用已有的空口资源;或者,在该第二指示信息用于指示针对该第一广播业务的数据不开启安全保护的情况下,该第三指示信息用于指示针对该第一广播业务复用已有的空口资源。In conjunction with the fifth aspect, in some implementations of the fifth aspect, when the second indication information is used to indicate that security protection is enabled for the data of the first broadcast service, the third indication information is used to indicate that the security protection is enabled for the data of the first broadcast service. The first broadcast service does not reuse existing air interface resources; or, when the second indication information is used to indicate that security protection is not enabled for the data of the first broadcast service, the third indication information is used to indicate that the security protection for the data of the first broadcast service is not enabled. The first broadcast service reuses existing air interface resources.
结合第五方面,在第五方面的某些实现方式中,该第二网络的第二网元获取第三指示信息,包括:该第二网元接收来自该第二网络的第四网元的该第三指示信息。With reference to the fifth aspect, in some implementations of the fifth aspect, the second network element of the second network obtains the third indication information, including: the second network element receives the third indication information from the fourth network element of the second network. the third instruction information.
第六方面,提供了一种广播安全通信的方法,包括:第一网络中的第一网元向接入网网元发送针对第一广播业务的第一会话建立请求,该第一会话建立请求中包括第一指示信息,该第一指示信息用于指示针对该第一广播业务的第一数据是否开启安全保护;接入网网元接收来自第一网络中的第一网元的针对第一广播业务的第一会话建立请求;响应于该第一会话建立请求,该接入网网元为该第一广播业务分配第一空口资源;该第二网元向接入网网元发送针对第一广播业务的第二会话建立请求;该接入网网元接收来自第二网络中的第二网元的针对该第一广播业务的第二会话建立请求,该第二会话建立请求中包括第二指示信息,该第二指示信息用于指示针对该第一广播业务的第二数据是否开启安全保护;响应于该第二会话建立请求,该接入网网元根据该第一指示信息和/或该第二指示信息确定是否复用该第一空口资源。In a sixth aspect, a method for broadcast secure communication is provided, including: a first network element in a first network sending a first session establishment request for a first broadcast service to an access network element, the first session establishment request being includes first indication information, the first indication information is used to indicate whether security protection is enabled for the first data of the first broadcast service; the access network element receives from the first network element in the first network for the first A first session establishment request for the broadcast service; in response to the first session establishment request, the access network element allocates a first air interface resource to the first broadcast service; the second network element sends a request for the first session establishment request to the access network element. A second session establishment request for a broadcast service; the access network element receives a second session establishment request for the first broadcast service from a second network element in the second network, and the second session establishment request includes the second session establishment request. Two indication information, the second indication information is used to indicate whether security protection is enabled for the second data of the first broadcast service; in response to the second session establishment request, the access network element according to the first indication information and/ Or the second indication information determines whether to reuse the first air interface resource.
结合第六方面,在第六方面的某些实现方式中,在该第一指示信息指示针对该第一数据未开启安全保护且该第二指示信息指示针对该第二数据未开启安全保护的情况下,该接入网网元根据该第一指示信息和/或该第二指示信息确定是否复用该第一空口资源,包括:该接入网网元根据该第一指示信息和该第二指示信息确定复用该第一空口资源。In conjunction with the sixth aspect, in some implementations of the sixth aspect, when the first indication information indicates that security protection is not enabled for the first data and the second indication information indicates that security protection is not enabled for the second data In this case, the access network element determines whether to reuse the first air interface resource according to the first indication information and/or the second indication information, including: the access network element determines whether to reuse the first air interface resource according to the first indication information and the second indication information. The indication information determines to reuse the first air interface resource.
结合第六方面,在第六方面的某些实现方式中,该方法还包括:该第一网络的用户面网元向该接入网网元发送该第一广播业务的第一数据;该接入网网元基于该第一空口资源向该第一网络的终端设备和该第二网络的终端设备发送该第一广播业务的该数据;该第一网络的终端设备基于该第一空口资源接收该第一数据,该第二网络的终端设备基于该第一空口资源接收该第一数据;或者,该第二网络的用户面网元向该接入网网元发送该第一广播业务的第二数据;该接入网网元基于该第一空口资源向该第一网络的终端设备和该第二网络的终端设备发送该第一广播业务的该数据;该第一网络的终端设备基于该第一空口资源接收该第二数据,该第二网络的终端设备基于该第一空口资源接收该第二数据。With reference to the sixth aspect, in some implementations of the sixth aspect, the method further includes: the user plane network element of the first network sending the first data of the first broadcast service to the access network element; The network element entering the network sends the data of the first broadcast service to the terminal equipment of the first network and the terminal equipment of the second network based on the first air interface resource; the terminal equipment of the first network receives the data based on the first air interface resource. The first data is received by the terminal device of the second network based on the first air interface resource; or the user plane network element of the second network sends the third broadcast service of the first broadcast service to the access network element. Two data; the access network element sends the data of the first broadcast service to the terminal equipment of the first network and the terminal equipment of the second network based on the first air interface resource; the terminal equipment of the first network based on the The first air interface resource receives the second data, and the terminal device of the second network receives the second data based on the first air interface resource.
结合第六方面,在第六方面的某些实现方式中,该第一指示信息指示针对该第一数据已开启安全保护,和/或,该第二指示信息指示针对该第二数据已开启安全保护的情况下,该接入网网元根据该第 一指示信息和/或该第二指示信息确定是否复用该第一空口资源,包括:该接入网网元根据该第一指示信息和/或该第二指示信息确定不复用该第一空口资源。In conjunction with the sixth aspect, in some implementations of the sixth aspect, the first indication information indicates that security protection has been enabled for the first data, and/or the second indication information indicates that security has been enabled for the second data. In the case of protection, the access network element shall An indication information and/or the second indication information determines whether to reuse the first air interface resource, including: the access network element determines not to reuse the first air interface resource according to the first indication information and/or the second indication information. Air interface resources.
结合第六方面,在第六方面的某些实现方式中,该方法还包括:该接入网网元基于该第一空口资源向该第一网络的终端设备发送该第一数据;该第一网络的终端设备基于该第一空口资源接收该第一数据;该接入网网元为该第一广播业务的数据分配第二空口资源,该第一空口资源与该第二空口资源不同;该接入网网元基于该第二空口资源向该第二网络的终端设备发送该第二数据;该第二网络的终端设备基于该第二空口资源接收该第二数据。With reference to the sixth aspect, in some implementations of the sixth aspect, the method further includes: the access network element sending the first data to the terminal device of the first network based on the first air interface resource; the first The terminal equipment of the network receives the first data based on the first air interface resource; the access network element allocates a second air interface resource to the data of the first broadcast service, and the first air interface resource is different from the second air interface resource; The access network element sends the second data to the terminal device of the second network based on the second air interface resource; the terminal device of the second network receives the second data based on the second air interface resource.
结合第六方面,在第六方面的某些实现方式中,该该第一数据由该第一网络进行安全保护;该第二数据由该第二网络进行安全保护。In conjunction with the sixth aspect, in some implementations of the sixth aspect, the first data is securely protected by the first network; and the second data is securely protected by the second network.
结合第六方面,在第六方面的某些实现方式中,该接入网网元存储该第一指示信息。With reference to the sixth aspect, in some implementations of the sixth aspect, the access network element stores the first indication information.
第七方面,提供了一种广播安全通信的方法,其特征在于,包括:A seventh aspect provides a method for broadcasting secure communications, which is characterized by including:
第一网络中的第一网元向接入网网元发送针对第一广播业务的第一会话建立请求;接入网网元接收来自第一网络中的第一网元的针对第一广播业务的第一会话建立请求;响应于该第一会话建立请求,该接入网网元为该第一广播业务分配第一空口资源;第二网络的第二网元获取第二指示信息,该第二指示信息用于指示针对该第一广播业务的数据是否开启安全保护该第二网元向接入网网元发送针对第一广播业务的第二会话建立请求,该第二会话建立请求中包括该第二指示信息;该接入网网元接收来自第二网络中的第二网元的针对该第一广播业务的第二会话建立请求,该第二会话建立请求中包括第三指示信息,该第三指示信息用于指示针对该第一广播业务是否复用已有的空口资源;响应于该第二会话建立请求,该接入网网元根据该第三指示信息确定是否复用该第一空口资源。The first network element in the first network sends a first session establishment request for the first broadcast service to the access network element; the access network element receives a first session establishment request for the first broadcast service from the first network element in the first network the first session establishment request; in response to the first session establishment request, the access network element allocates the first air interface resource to the first broadcast service; the second network element of the second network obtains the second indication information, and the The second indication information is used to indicate whether security protection is enabled for the data of the first broadcast service. The second network element sends a second session establishment request for the first broadcast service to the access network element. The second session establishment request includes the second indication information; the access network element receives a second session establishment request for the first broadcast service from the second network element in the second network, the second session establishment request includes third indication information, The third indication information is used to indicate whether to reuse existing air interface resources for the first broadcast service; in response to the second session establishment request, the access network element determines whether to reuse the third indication information according to the third indication information. An empty resource.
结合第七方面,在第七方面的某些实现方式中,第三指示信息用于指示针对该第一广播业务复用已有的空口资源的情况下,该接入网网元根据该第三指示信息确定是否复用该第一空口资源,包括:该接入网网元根据该第三指示信息确定复用该第一空口资源。In conjunction with the seventh aspect, in some implementations of the seventh aspect, the third indication information is used to indicate that the access network element is to reuse existing air interface resources for the first broadcast service according to the third The indication information determines whether to reuse the first air interface resource, including: the access network element determines to multiplex the first air interface resource according to the third indication information.
结合第七方面,在第七方面的某些实现方式中,该接入网网元丢弃从该第二网络接收的该第一广播业务的数据。With reference to the seventh aspect, in some implementations of the seventh aspect, the access network element discards the data of the first broadcast service received from the second network.
结合第七方面,在第七方面的某些实现方式中,该第一网络的用户面网元向该接入网网元发送该第一广播业务的第一数据;该接入网网元基于该第一空口资源向该第一网络的终端设备和该第二网络的终端设备发送该第一数据;该第一网络的终端设备基于该第一空口资源接收该第一数据,该第二网络的终端设备基于该第一空口资源接收该第一数据;或,该第二网络的用户面网元向该接入网网元发送该第一广播业务的第二数据;该接入网网元基于该第一空口资源向该第一网络的终端设备和该第二网络的终端设备发送该第一广播业务的第二数据,该第一网络的终端设备基于该第一空口资源接收该第二数据,该第二网络的终端设备基于该第一空口资源接收该第二数据;其中,该第一数据来自该第一网络,该第二数据来自该第二网络。Combined with the seventh aspect, in some implementations of the seventh aspect, the user plane network element of the first network sends the first data of the first broadcast service to the access network element; the access network element is based on The first air interface resource sends the first data to the terminal equipment of the first network and the terminal equipment of the second network; the terminal equipment of the first network receives the first data based on the first air interface resource, and the second network The terminal equipment receives the first data based on the first air interface resource; or the user plane network element of the second network sends the second data of the first broadcast service to the access network network element; the access network network element The second data of the first broadcast service is sent to the terminal equipment of the first network and the terminal equipment of the second network based on the first air interface resource, and the terminal equipment of the first network receives the second data based on the first air interface resource. Data, the terminal device of the second network receives the second data based on the first air interface resource; wherein the first data comes from the first network, and the second data comes from the second network.
结合第七方面,在第七方面的某些实现方式中,该第三指示信息指示根据该第一广播业务对应的服务标识为该第一广播业务分配空口资源。With reference to the seventh aspect, in some implementations of the seventh aspect, the third indication information indicates that air interface resources are allocated to the first broadcast service according to the service identifier corresponding to the first broadcast service.
结合第七方面,在第七方面的某些实现方式中,该接入网网元根据该第三指示信息确定复用该第一空口资源,包括:该接入网网元根据已经存在该第一广播业务对应的该第一空口资源确定针对该第一广播业务复用该第一空口资源。In connection with the seventh aspect, in some implementations of the seventh aspect, the access network element determines to multiplex the first air interface resource according to the third indication information, including: the access network element determines to multiplex the first air interface resource according to the existing The first air interface resource corresponding to a broadcast service is determined to be multiplexed for the first broadcast service.
结合第七方面,在第七方面的某些实现方式中,第三指示信息用于指示针对该第一广播业务不复用已有的空口资源的情况下,该接入网网元根据该第三指示信息确定是否复用该第一空口资源,包括:该接入网网元根据该第三指示信息确定不复用该第一空口资源。In conjunction with the seventh aspect, in some implementations of the seventh aspect, the third indication information is used to indicate that the access network element does not reuse existing air interface resources for the first broadcast service according to the third The third indication information determines whether to reuse the first air interface resource, including: the access network element determines not to reuse the first air interface resource according to the third indication information.
结合第七方面,在第七方面的某些实现方式中,该方法还包括:该接入网网元基于该第一空口资源向该第一网络的终端设备发送该第一广播业务的第一数据;该第一网络的终端设备基于该第一空口资源接收该第一数据;该接入网网元为该第一广播业务的第二数据分配第二空口资源,该第一空口资源与该第二空口资源不同;该接入网网元基于该第二空口资源向该第二网络的终端设备发送该第二数据;该第二网络的终端设备基于该第二空口资源接收该第二数据,其中,该第一数据来自该第一网络,该第二数据来自该第二网络。With reference to the seventh aspect, in some implementations of the seventh aspect, the method further includes: the access network element sending a first portion of the first broadcast service to a terminal device of the first network based on the first air interface resource. data; the terminal equipment of the first network receives the first data based on the first air interface resource; the access network element allocates a second air interface resource for the second data of the first broadcast service, and the first air interface resource is related to the first air interface resource. The second air interface resources are different; the access network element sends the second data to the terminal device of the second network based on the second air interface resource; the terminal device of the second network receives the second data based on the second air interface resource , wherein the first data comes from the first network, and the second data comes from the second network.
结合第七方面,在第七方面的某些实现方式中,该第一广播业务的第一数据由该第一网络进行安 全保护;该第一广播业务的第二数据由该第二网络进行安全保护。In conjunction with the seventh aspect, in some implementations of the seventh aspect, the first data of the first broadcast service is installed by the first network. Full protection; the second data of the first broadcast service is securely protected by the second network.
结合第七方面,在第七方面的某些实现方式中,该第三指示信息用于指示针对该第一广播业务不复用已有的空口资源的情况下,该第三指示信息指示根据该第二会话建立请求对应的会话标识为第一广播业务分配空口资源。In conjunction with the seventh aspect, in some implementations of the seventh aspect, the third indication information is used to indicate that the existing air interface resources are not reused for the first broadcast service. The session identifier corresponding to the second session establishment request allocates air interface resources for the first broadcast service.
结合第七方面,在第七方面的某些实现方式中,该接入网网元根据该第三指示信息确定不复用该第一空口资源,包括:该接入网网元根据该第三指示信息检查是否存在该会话标识对应的空口资源;在不存在该会话标识对应的空口资源的情况下,该接入网网元确定针对该第一广播业务不复用该第一空口资源。Combined with the seventh aspect, in some implementations of the seventh aspect, the access network element determines not to reuse the first air interface resource according to the third indication information, including: the access network element determines not to reuse the first air interface resource according to the third indication information. The instruction information checks whether there is an air interface resource corresponding to the session identifier; if there is no air interface resource corresponding to the session identifier, the access network element determines not to reuse the first air interface resource for the first broadcast service.
第八方面,提供一种通信装置,该装置包括:至少一个处理器,用于执行存储器存储的计算机程序或指令,以执行上述第一方面至第第三方面中任一种可能实现方式中的方法。可选地,该装置还包括存储器,用于存储的计算机程序或指令。可选地,该装置还包括通信接口,处理器通过通信接口读取存储器存储的计算机程序或指令。An eighth aspect provides a communication device, which includes: at least one processor for executing computer programs or instructions stored in a memory to execute any of the possible implementations of the first to third aspects. method. Optionally, the device further includes a memory for storing computer programs or instructions. Optionally, the device further includes a communication interface, through which the processor reads the computer program or instructions stored in the memory.
在一种实现方式中,该装置为通信设备(如接入网网元,又如第一网元,再如第二网元)。In an implementation manner, the device is a communication device (such as an access network element, a first network element, or a second network element).
在另一种实现方式中,该装置为用于通信设备(如接入网网元,又如第一网元,再如第二网元)的芯片、芯片系统或电路。In another implementation manner, the device is a chip, chip system or circuit used in communication equipment (such as an access network element, such as a first network element, and a second network element).
第九方面,本申请提供一种处理器,用于执行上述第一方面至第五方面提供的方法。In a ninth aspect, the present application provides a processor for executing the methods provided in the above first to fifth aspects.
对于处理器所涉及的发送和获取/接收等操作,如果没有特殊说明,或者,如果未与其在相关描述中的实际作用或者内在逻辑相抵触,则可以理解为处理器输出和接收、输入等操作,也可以理解为由射频电路和天线所进行的发送和接收操作,本申请对此不做限定。For operations such as sending and getting/receiving involved in the processor, if there is no special explanation, or if it does not conflict with its actual role or internal logic in the relevant description, it can be understood as processor output, reception, input and other operations. , can also be understood as the transmitting and receiving operations performed by the radio frequency circuit and the antenna, which is not limited in this application.
第十方面,提供了一种时延控制的系统,包括接入网网元、第一网元和第二网元,该接入网网元用于上述第一方面任一种可能实现方式中的方法,该第二网元用于执行上述第二方面或第三方面任一种可能实现方式中的方法;或者,该接入网网元用于上述第四方面任一种可能实现方式中的方法,该第二网元用于执行上述第五方面任一种可能实现方式中的方法。In a tenth aspect, a delay control system is provided, including an access network element, a first network element and a second network element. The access network element is used in any of the possible implementation methods of the first aspect. The method, the second network element is used to perform the method in any possible implementation manner of the above second aspect or the third aspect; or, the access network element is used in any possible implementation manner of the above fourth aspect The second network element is configured to perform the method in any possible implementation manner of the fifth aspect.
第十一方面,提供一种计算机可读存储介质,该计算机可读介质存储用于设备执行的程序代码,该程序代码包括用于执行上述第一方面至第五方面任一种可能实现方式中的方法。In an eleventh aspect, a computer-readable storage medium is provided. The computer-readable medium stores a program code for device execution. The program code includes a program code for executing any of the possible implementations of the above-mentioned first to fifth aspects. Methods.
第十二方面,提供一种包含指令的计算机程序产品,当该计算机程序产品在计算机上运行时,使得计算机执行上述第一方面至第五方面任一种可能实现方式中的方法。In a twelfth aspect, a computer program product containing instructions is provided. When the computer program product is run on a computer, it causes the computer to execute the method in any of the possible implementation modes of the first to fifth aspects.
附图说明Description of drawings
图1是本申请实施例适用的5G系统。Figure 1 is a 5G system applicable to the embodiment of this application.
图2是适用于本申请实施例提供的方法的多播广播业务架构的示意图。Figure 2 is a schematic diagram of a multicast broadcast service architecture suitable for the method provided by the embodiment of the present application.
图3示出了本申请适用的一种场景示意图。Figure 3 shows a schematic diagram of a scenario applicable to this application.
图4示出了本申请适用的另一种场景示意图。Figure 4 shows a schematic diagram of another scenario applicable to this application.
图5示出了本申请提供的广播安全通信的方法100的示意图。Figure 5 shows a schematic diagram of a method 100 for broadcasting secure communications provided by this application.
图6示出了本申请提供的广播安全通信的方法200的示意图。Figure 6 shows a schematic diagram of a method 200 for broadcasting secure communications provided by this application.
图7示出了本申请提供的广播安全通信的方法300的示意图。Figure 7 shows a schematic diagram of a method 300 for broadcasting secure communications provided by this application.
图8示出了本申请提供的广播安全通信的方法400的示意图。Figure 8 shows a schematic diagram of a method 400 for broadcasting secure communications provided by this application.
图9示出了本申请提供的广播安全通信的方法500的示意图。Figure 9 shows a schematic diagram of a method 500 for broadcasting secure communications provided by this application.
图10示出了本申请提供的广播安全通信的方法600的示意图。Figure 10 shows a schematic diagram of a method 600 for broadcasting secure communications provided by this application.
图11示出了本申请提供的广播安全通信的方法700的示意图。Figure 11 shows a schematic diagram of a method 700 for broadcasting secure communications provided by this application.
图12示出了本申请提供的广播安全通信的方法800的示意图。Figure 12 shows a schematic diagram of a method 800 for broadcasting secure communications provided by this application.
图13示出了本申请提供的广播安全通信的方法900的示意图。Figure 13 shows a schematic diagram of a method 900 for broadcasting secure communications provided by this application.
图14示出了本申请提供的广播安全通信的方法1000的示意图。Figure 14 shows a schematic diagram of a method 1000 for broadcasting secure communications provided by this application.
图15示出了本申请提供的广播安全通信的方法1100的示意图。Figure 15 shows a schematic diagram of a method 1100 for broadcasting secure communications provided by this application.
图16是本申请提供的通信装置的一种示意性框图。Figure 16 is a schematic block diagram of the communication device provided by this application.
图17是本申请提供的通信装置的另一种示意性框图。 Figure 17 is another schematic block diagram of the communication device provided by this application.
具体实施方式Detailed ways
为了使本申请的目的、技术方案和优点更加清楚,下面将结合附图对本申请作进一步地详细描述。方法实施例中的具体操作方法也可以应用于装置实施例或系统实施例中。其中,在本申请的描述中,除非另有说明,“多个”的含义是两个或两个以上。In order to make the purpose, technical solutions and advantages of the present application clearer, the present application will be described in further detail below in conjunction with the accompanying drawings. The specific operation methods in the method embodiments can also be applied to the device embodiments or system embodiments. Among them, in the description of this application, unless otherwise stated, the meaning of "plurality" is two or more.
在本申请的各个实施例中,如果没有特殊说明以及逻辑冲突,不同的实施例之间的术语和/或描述具有一致性、且可以相互引用,不同的实施例中的技术特征根据其内在的逻辑关系可以组合形成新的实施例。In the various embodiments of this application, if there is no special explanation or logical conflict, the terms and/or descriptions between different embodiments are consistent and can be referenced to each other. The technical features in different embodiments are based on their inherent Logical relationships can be combined to form new embodiments.
可以理解的是,在本申请中涉及的各种数字编号仅为描述方便进行的区分,并不用来限制本申请的范围。上述各过程的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定。It can be understood that the various numerical numbers involved in this application are only for convenience of description and are not used to limit the scope of this application. The size of the serial numbers of the above processes does not mean the order of execution. The execution order of each process should be determined by its function and internal logic.
本申请的说明书和权利要求书及上述附图中的术语“第一”、“第二”、“第三”、“第四”以及其他各种术语标号等(如果存在)是用于区别类似的对象,而不必用于描述特定的顺序或先后次序。应该理解这样使用的数据在适当情况下可以互换,以便这里描述的实施例能够以除了在这里图示或描述的内容以外的顺序实施。此外,术语“包括”和“具有”以及他们的任何变形,意图在于覆盖不排他的包含,例如,包含了一系列步骤或单元的过程、方法、系统、产品或设备不必限于清楚地列出的那些步骤或单元,而是可包括没有清楚地列出的或对于这些过程、方法、产品或设备固有的其它步骤或单元。The terms "first", "second", "third", "fourth" and other various terminology labels (if any) in the description and claims of this application and the above-mentioned drawings are used to distinguish similar objects and not necessarily used to describe a specific order or sequence. It is to be understood that the data so used are interchangeable under appropriate circumstances so that the embodiments described herein can be practiced in sequences other than those illustrated or described herein. Furthermore, the terms "include" and "having" and any variations thereof are intended to cover non-exclusive inclusions, e.g., a process, method, system, product, or apparatus that encompasses a series of steps or units and need not be limited to those explicitly listed. Those steps or elements may instead include other steps or elements not expressly listed or inherent to the process, method, product or apparatus.
本申请提供的技术方案可以应用于各种通信系统,例如:第五代(5th generation,5G)或新无线(new radio,NR)系统、长期演进(long term evolution,LTE)系统、LTE频分双工(frequency division duplex,FDD)系统、LTE时分双工(time division duplex,TDD)系统等。本申请提供的技术方案还可以应用于未来的通信系统,如第六代移动通信系统。本申请提供的技术方案还可以应用于设备到设备(device to device,D2D)通信,车到万物(vehicle-to-everything,V2X)通信,机器到机器(machine to machine,M2M)通信,机器类型通信(machine type communication,MTC),以及物联网(internet of things,IoT)通信系统或者其他通信系统。The technical solution provided by this application can be applied to various communication systems, such as: fifth generation (5th generation, 5G) or new radio (new radio, NR) system, long term evolution (long term evolution, LTE) system, LTE frequency division Duplex (frequency division duplex, FDD) system, LTE time division duplex (TDD) system, etc. The technical solution provided by this application can also be applied to future communication systems, such as the sixth generation mobile communication system. The technical solution provided by this application can also be applied to device-to-device (D2D) communication, vehicle-to-everything (V2X) communication, machine-to-machine (M2M) communication, machine type Communication (machine type communication, MTC), and Internet of Things (Internet of things, IoT) communication systems or other communication systems.
下面将结合图1举例说明本申请实施例适用的5G系统。应理解,本文中描述的5G系统仅是示例,不应对本申请构成任何限定。The following will illustrate the 5G system applicable to the embodiment of the present application with reference to Figure 1. It should be understood that the 5G system described in this article is only an example and should not constitute any limitation on this application.
如图1所示,该网络架构例如是第三代合作伙伴计划(3rd Generation Partnership Project,3GPP)协议TS23.501中定义的5G系统(the 5th generation system,5GS)。该网络架构可以分为接入网(access network,AN)和核心网(core network,CN)两部分。其中,接入网可用于实现无线接入有关的功能,核心网主要包括以下几个关键逻辑网元:接入和移动性管理功能(access and mobility management function,AMF)、会话管理功能(session management function,SMF)、用户面功能(user plane function,UPF)、策略控制功能(policy control function,PCF)和统一数据管理(unified data management,UDM)等。As shown in Figure 1, the network architecture is, for example, the 5G system (the 5th generation system, 5GS) defined in the 3rd Generation Partnership Project (3GPP) protocol TS23.501. The network architecture can be divided into two parts: access network (AN) and core network (CN). Among them, the access network can be used to implement wireless access-related functions. The core network mainly includes the following key logical network elements: access and mobility management function (AMF), session management function (session management function (SMF), user plane function (UPF), policy control function (PCF) and unified data management (UDM), etc.
下面对图1中示出的各网元进行简单介绍:The following is a brief introduction to each network element shown in Figure 1:
1、用户设备(usereqiupment,UE):可以称为终端设备(terminal equipment)、终端装置、接入终端、用户单元、用户站、移动站、移动台(mobile station,MS)、移动终端(mobile terminal,MT)、远方站、远程终端、移动设备、用户终端、终端、无线通信设备、用户代理或用户装置。终端设备可以是一种向用户提供语音/数据连通性的设备,例如,具有无线连接功能的手持式设备、车载设备等。目前,一些终端的举例可以为:手机(mobile phone)、平板电脑(pad)、带无线收发功能的电脑(如笔记本电脑、掌上电脑等)、移动互联网设备(mobile internet device,MID)、虚拟现实(virtual reality,VR)设备、增强现实(augmented reality,AR)设备、工业控制(industrial control)中的无线终端、无人驾驶(self driving)中的无线终端、远程医疗(remote medical)中的无线终端、智能电网(smart grid)中的无线终端、运输安全(transportation safety)中的无线终端、智慧城市(smart city)中的无线终端、智慧家庭(smart home)中的无线终端、蜂窝电话、无绳电话、会话启动协议(session initiation protocol,SIP)电话、无线本地环路(wireless local loop,WLL)站、个人数字助理(personal digital assistant,PDA)、具有无线通信功能的手持设备、计算设备或连接到无线调制解调器的其它处理设备、车载设备、可穿戴设备,5G网络中的终端设备或者未来演进的公用陆地移动通信网络(public land mobile  network,PLMN)中的终端设备等。1. User equipment (UE): can be called terminal equipment, terminal device, access terminal, user unit, user station, mobile station, mobile station (MS), mobile terminal , MT), remote station, remote terminal, mobile device, user terminal, terminal, wireless communications equipment, user agent or user device. The terminal device may be a device that provides voice/data connectivity to the user, such as a handheld device, a vehicle-mounted device, etc. with wireless connectivity capabilities. Currently, some examples of terminals include: mobile phones, tablets, computers with wireless transceiver functions (such as laptops, handheld computers, etc.), mobile internet devices (MID), virtual reality (virtual reality, VR) equipment, augmented reality (AR) equipment, wireless terminals in industrial control, wireless terminals in self-driving, wireless terminals in remote medical Terminals, wireless terminals in smart grids, wireless terminals in transportation safety, wireless terminals in smart cities, wireless terminals in smart homes, cellular phones, cordless Telephone, session initiation protocol (SIP) telephone, wireless local loop (WLL) station, personal digital assistant (PDA), handheld device with wireless communication capabilities, computing device or connection to other processing equipment such as wireless modems, vehicle-mounted equipment, wearable devices, terminal equipment in 5G networks or future evolved public land mobile communication networks (public land mobile network, terminal equipment in PLMN), etc.
此外,终端设备还可以是物联网(Internet of things,IoT)系统中的终端设备。IoT是未来信息技术发展的重要组成部分,其主要技术特点是将物品通过通信技术与网络连接,从而实现人机互连,物-物互连的智能化网络。IoT技术可以通过例如窄带(narrow band,NB)技术,做到海量连接,深度覆盖,终端省电。In addition, the terminal device can also be a terminal device in an Internet of things (IoT) system. IoT is an important part of the future development of information technology. Its main technical feature is to connect objects to the network through communication technology, thereby realizing an intelligent network of human-computer interconnection and object-object interconnection. IoT technology can achieve massive connections, deep coverage, and terminal power saving through narrowband (NB) technology, for example.
此外,终端设备还可以包括智能打印机、火车探测器等,主要功能包括收集数据(部分终端设备)、接收网络设备的控制信息与下行数据,并发送电磁波,向网络设备传输上行数据。In addition, terminal equipment can also include smart printers, train detectors, etc. Its main functions include collecting data (some terminal equipment), receiving control information and downlink data from network equipment, and sending electromagnetic waves to transmit uplink data to network equipment.
应理解,用户设备可以是任何可以接入网络的设备。终端设备与接入网设备之间可以采用某种空口技术相互通信。It should be understood that the user equipment can be any device that can access the network. Terminal equipment and access network equipment can communicate with each other using some air interface technology.
可选地,用户设备可以用于充当基站。例如,用户设备可以充当调度实体,其在V2X或D2D等中的用户设备之间提供侧行链路信号。比如,蜂窝电话和汽车利用侧行链路信号彼此通信。蜂窝电话和智能家居设备之间通信,而无需通过基站中继通信信号。Optionally, the user equipment can be used to act as a base station. For example, user equipment may act as a scheduling entity that provides sidelink signals between user equipments in V2X or D2D, etc. For example, cell phones and cars use sidelink signals to communicate with each other. Cell phones and smart home devices communicate between each other without having to relay communication signals through base stations.
2、(无线)接入网((radio)access network,(R)AN)设备:用于为特定区域的授权用户设备提供入网功能,并能够根据用户设备的级别,业务的需求等使用不同服务质量的传输隧道。2. (Radio) access network (R)AN) equipment: used to provide network access functions for authorized user equipment in a specific area, and can use different services according to the level of user equipment, business needs, etc. Quality transmission tunnel.
(R)AN能够管理无线资源,为用户设备提供接入服务,进而完成控制信号和用户设备数据在用户设备和核心网之间的转发,(R)AN也可以理解为传统网络中的基站。(R)AN can manage wireless resources, provide access services to user equipment, and then complete the forwarding of control signals and user equipment data between user equipment and the core network. (R)AN can also be understood as a base station in a traditional network.
示例性地,本申请实施例中的接入网设备可以是用于与用户设备通信的任意一种具有无线收发功能的通信设备。该接入网设备包括但不限为演进型节点B(evolved Node B,eNB)或5G,如,NR,系统中的gNB,或,传输点(TRP或TP),5G系统中的基站的一个或一组(包括多个天线面板)天线面板,或者,还可以为构成gNB或传输点的网络节点,如基带单元(BBU),或,分布式单元(distributed unit,DU)等。Illustratively, the access network device in the embodiment of the present application may be any communication device with wireless transceiver functions used to communicate with user equipment. The access network equipment includes but is not limited to evolved Node B (eNB) or 5G, such as NR, gNB in the system, or transmission point (TRP or TP), one of the base stations in the 5G system Or a group (including multiple antenna panels) of antenna panels, or it can also be a network node that constitutes a gNB or transmission point, such as a baseband unit (BBU), or a distributed unit (DU), etc.
在一些部署中,gNB可以包括集中式单元(centralized unit,CU)和DU。gNB还可以包括有源天线单元(active antenna unit,AAU)。CU实现gNB的部分功能,DU实现gNB的部分功能。比如,CU负责处理非实时协议和服务,实现无线资源控制(radio resource control,RRC),分组数据汇聚层协议(packet data convergence protocol,PDCP)层的功能。DU负责处理物理层协议和实时服务,实现无线链路控制(radio link control,RLC)层、媒体接入控制(media access control,MAC)层和物理(physical,PHY)层的功能。AAU实现部分物理层处理功能、射频处理及有源天线的相关功能。由于RRC层的信息最终会变成PHY层的信息,或者,由PHY层的信息转变而来,因而,在这种架构下,高层信令,如RRC层信令,也可以认为是由DU发送的,或者,由DU+AAU发送的。可以理解的是,接入网设备可以为包括CU节点、DU节点、AAU节点中一项或多项的设备。此外,可以将CU划分为接入网(radio access network,RAN)中的接入网设备,也可以将CU划分为核心网(core network,CN)中的接入网设备,本申请对此不做限定。In some deployments, gNB may include centralized units (CUs) and DUs. The gNB may also include an active antenna unit (AAU). CU implements some functions of gNB, and DU implements some functions of gNB. For example, CU is responsible for processing non-real-time protocols and services, implementing radio resource control (RRC), and packet data convergence protocol (PDCP) layer functions. DU is responsible for processing physical layer protocols and real-time services, and implementing the functions of the radio link control (RLC) layer, media access control (MAC) layer and physical (physical, PHY) layer. AAU implements some physical layer processing functions, radio frequency processing and active antenna related functions. Since RRC layer information will eventually become PHY layer information, or transformed from PHY layer information, in this architecture, high-level signaling, such as RRC layer signaling, can also be considered to be sent by DU , or sent by DU+AAU. It can be understood that the access network device may be a device including one or more of a CU node, a DU node, and an AAU node. In addition, the CU can be divided into access network equipment in the access network (radio access network, RAN), or the CU can be divided into access network equipment in the core network (core network, CN). This application does not Make limitations.
3、用户面功能(user plane function,UPF)网元:用于分组路由和转发以及用户面数据的服务质量(quality of service,QoS)处理等。为叙述方便,本申请实施例中,用户面功能网元被简称为“UPF”。3. User plane function (UPF) network element: used for packet routing and forwarding and quality of service (QoS) processing of user plane data. For convenience of description, in the embodiment of this application, the user plane functional network element is referred to as "UPF" for short.
在未来通信系统中,用户面网元仍可以是UPF网元,或者,还可以有其它的名称,本申请不做限定。In future communication systems, user plane network elements can still be UPF network elements, or they can have other names, which are not limited in this application.
4、接入和移动管理功能(access and mobility management function,AMF)网元:接入和移动管理功能网元主要用于移动性管理和接入管理等,可以用于实现MME功能中除会话管理之外的其它功能,例如,接入授权/鉴权等功能。为叙述方便,本申请实施例中,接入和移动管理功能网元被简称为“AMF”。4. Access and mobility management function (AMF) network element: The access and mobility management function network element is mainly used for mobility management and access management, etc., and can be used to implement MME functions in addition to session management. Other functions, such as access authorization/authentication and other functions. For convenience of description, in the embodiment of this application, the access and mobility management function network element is referred to as "AMF" for short.
在未来通信系统中,接入和移动管理设备仍可以是AMF,或者,还可以有其它的名称,本申请不做限定。In future communication systems, the access and mobility management equipment may still be an AMF, or may have other names, which are not limited in this application.
5、会话管理功能(session management function,SMF)网元:主要用于会话管理、用户设备的网络互连协议(internet protocol,IP)地址分配和管理、选择可管理用户平面功能、策略控制和收费功能接口的终结点以及下行数据通知等。为叙述方便,本申请实施例中,会话管理功能网元被简称为“SMF”。5. Session management function (SMF) network element: mainly used for session management, Internet protocol (IP) address allocation and management of user equipment, selection of manageable user plane functions, policy control and charging The endpoint of the functional interface and downstream data notification, etc. For convenience of description, in the embodiment of this application, the session management function network element is referred to as "SMF" for short.
SMF为会话管理网元的一种。在未来通信系统中,会话管理网元仍可以是SMF,或者,还可以有其它的名称,本申请不做限定。SMF is a type of session management network element. In future communication systems, the session management network element may still be SMF, or may have other names, which are not limited in this application.
6、策略控制功能(policy control function,PCF)网元:用于指导网络行为的统一策略框架,为控 制面功能网元(例如AMF,SMF等)提供策略规则信息等。6. Policy control function (PCF) network element: a unified policy framework used to guide network behavior. Noodle making function network elements (such as AMF, SMF, etc.) provide policy rule information, etc.
在未来通信系统中,策略控制网元仍可以是PCF网元,或者,还可以有其它的名称,本申请不做限定。In future communication systems, the policy control network element can still be a PCF network element, or it can also have other names, which is not limited in this application.
7、应用功能(application function,AF)网元:用于进行应用影响的数据路由,无线接入网络开放功能网元,与策略框架交互进行策略控制等。为叙述方便,本申请实施例中,应用功能网元被简称为“AF”。7. Application function (AF) network element: used for data routing affected by applications, wireless access network open function network element, interacting with the policy framework for policy control, etc. For convenience of description, in the embodiment of this application, the application function network element is referred to as "AF" for short.
在未来通信系统中,应用功能网元仍可以是AF网元,或者,还可以有其它的名称,本申请不做限定。In the future communication system, the application function network element can still be an AF network element, or it can also have other names, which is not limited in this application.
8、统一数据管理(unified data management,UDM)网元:用于处理UE标识,接入鉴权,注册以及移动性管理等。8. Unified data management (UDM) network element: used to process UE identification, access authentication, registration and mobility management, etc.
在未来通信系统中,统一数据管理仍可以是UDM网元,或者,还可以有其它的名称,本申请不做限定。In future communication systems, unified data management can still be a UDM network element, or it can also have other names, which is not limited in this application.
9、认证服务器(authentication server function,AUSF)网元:用于鉴权服务、产生密钥实现对用户设备的双向鉴权,支持统一的鉴权框架。9. Authentication server function (AUSF) network element: used for authentication services, generating keys to implement two-way authentication of user equipment, and supporting a unified authentication framework.
在未来通信系统中,认证服务器功能网元仍可以是AUSF网元,或者,还可以有其它的名称,本申请不做限定。In future communication systems, the authentication server functional network element can still be an AUSF network element, or it can also have other names, which is not limited in this application.
10、网络数据分析功能(network data analytics function,NWDAF)网元:用于识别网络切片实例、加载网络切片实例的负载级别信息。网络数据分析功能可使NF消费者订阅或取消订阅定期通知,并在超过阈值的情况下,通知消费者。10. Network data analytics function (NWDAF) network element: used to identify network slicing instances and load load level information of network slicing instances. The network data analysis function enables NF consumers to subscribe or unsubscribe to periodic notifications and notify consumers when thresholds are exceeded.
在未来通信系统中,网络数据分析功能网元仍可以是NWDAF网元,或者,还可以有其它的名称,本申请不做限定。In future communication systems, network data analysis function network elements can still be NWDAF network elements, or they can have other names, which are not limited in this application.
11、数据网络(data network,DN):DN是位于运营商网络之外的网络,运营商网络可以接入多个DN,DN上可部署多种业务,可为终端设备提供数据和/或语音等服务。例如,DN是某智能工厂的私有网络,智能工厂安装在车间的传感器可为终端设备,DN中部署了传感器的控制服务器,控制服务器可为传感器提供服务。传感器可与控制服务器通信,获取控制服务器的指令,根据指令将采集的传感器数据传送给控制服务器等。又例如,DN是某公司的内部办公网络,该公司员工的手机或者电脑可为终端设备,员工的手机或者电脑可以访问公司内部办公网络上的信息、数据资源等。11. Data network (DN): DN is a network located outside the operator's network. The operator's network can access multiple DNs. A variety of services can be deployed on the DN, which can provide data and/or voice for terminal devices. Waiting for service. For example, DN is a private network of a smart factory. The sensors installed in the workshop of the smart factory can be terminal devices. The control server of the sensor is deployed in the DN, and the control server can provide services for the sensor. The sensor can communicate with the control server, obtain instructions from the control server, and transmit the collected sensor data to the control server according to the instructions. For another example, DN is the internal office network of a company. The mobile phones or computers of employees of the company can be used as terminal devices. The employees' mobile phones or computers can access information and data resources on the company's internal office network.
在图1所示的网络架构中,各网元之间可以通过图中所示的接口通信。如图所示,UE和AMF之间可以通过N1接口进行交互,交互消息例如可以称为N1消息(N1Message)。RAN和AMF之间可以通过N2接口进行交互,N2接口可以用于非接入层(non-access stratum,NAS)消息的发送等。RAN和UPF之间可以通过N3接口进行交互,N3接口可以用于传输用户面的数据等。SMF和UPF之间可以通过N4接口进行交互,N4接口可以用于传输例如N3连接的隧道标识信息,数据缓存指示信息,以及下行数据通知消息等信息。UPF和DN之间可以通过N6接口进行交互,N6接口可以于传输用户面的数据等。其他接口与各网元之间的关系如图1中所示,为了简洁,这里不一一详述。下面简单介绍各个网元之间的接口名称及功能如下:In the network architecture shown in Figure 1, network elements can communicate with each other through the interfaces shown in the figure. As shown in the figure, the UE and the AMF can interact through the N1 interface, and the interaction message can be called an N1 message (N1Message), for example. RAN and AMF can interact through the N2 interface, which can be used for sending non-access stratum (NAS) messages. RAN and UPF can interact through the N3 interface, which can be used to transmit user plane data, etc. SMF and UPF can interact through the N4 interface. The N4 interface can be used to transmit information such as tunnel identification information of the N3 connection, data cache indication information, and downlink data notification messages. UPF and DN can interact through the N6 interface, which can transmit user plane data, etc. The relationship between other interfaces and each network element is shown in Figure 1. For the sake of simplicity, they will not be described in detail here. The following is a brief introduction to the interface names and functions between each network element as follows:
1)N7:PCF与SMF之间的接口,用于下发对应协议数据单元(protocol data unit,PDU)会话或者对应业务数据流的控制策略。1) N7: The interface between PCF and SMF, used to deliver control policies corresponding to protocol data unit (PDU) sessions or corresponding business data flows.
2)N15:PCF与AMF之间的接口,用于下发UE策略及接入控制相关策略。2) N15: The interface between PCF and AMF, used to deliver UE policies and access control related policies.
3)N5:AF与PCF之间的接口,用于应用业务请求下发以及网络事件上报。3) N5: The interface between AF and PCF, used for issuing application service requests and reporting network events.
4)N4:SMF与UPF之间的接口,用于控制面与用户面之间传递信息,包括控制面向用户面的转发规则、QoS控制规则、流量统计规则等的下发以及用户面的信息上报。4) N4: The interface between SMF and UPF, used to transfer information between the control plane and the user plane, including controlling the delivery of forwarding rules for the user plane, QoS control rules, traffic statistics rules, etc., and reporting of user plane information. .
5)N11:SMF与AMF之间的接口,用于传递RAN和UPF之间的PDU会话隧道信息、传递发送给UE的控制消息、传递发送给RAN的无线资源控制信息等。5) N11: The interface between SMF and AMF, used to transfer PDU session tunnel information between RAN and UPF, transfer control messages sent to UE, transfer radio resource control information sent to RAN, etc.
6)N2:AMF与RAN之间的接口,用于传递核心网侧至RAN的无线承载控制信息等。6) N2: The interface between AMF and RAN, used to transmit wireless bearer control information from the core network side to the RAN.
7)N1:AMF与UE之间的接口,接入无关,用于向UE传递QoS控制规则等。7) N1: The interface between AMF and UE, independent of access, is used to deliver QoS control rules to UE, etc.
8)N8:AMF与UDM间的接口,用于AMF向UDM获取接入与移动性管理相关签约数据与鉴权数据,以及AMF向UDM注册UE当前移动性管理相关信息等。 8) N8: The interface between AMF and UDM, used for AMF to obtain access and mobility management-related subscription data and authentication data from UDM, and for AMF to register UE's current mobility management-related information with UDM.
9)N10:SMF与UDM间的接口,用于SMF向UDM获取会话管理相关签约数据,以及SMF向UDM注册UE当前会话相关信息等。9) N10: The interface between SMF and UDM, used for SMF to obtain session management-related subscription data from UDM, and for SMF to register UE current session-related information with UDM.
10)N35:UDM与UDR间的接口,用于UDM从UDR中获取用户签约数据信息。10) N35: The interface between UDM and UDR, used by UDM to obtain user subscription data information from UDR.
11)N36:PCF与UDR间的接口,用于PCF从UDR中获取策略相关签约数据以及应用数据相关信息。11) N36: The interface between PCF and UDR, used for PCF to obtain policy-related contract data and application data-related information from UDR.
12)N12:AMF和AUSF间的接口,用于AMF向AUSF发起鉴权流程,其中可携带SUCI作为签约标识;12) N12: The interface between AMF and AUSF, used for AMF to initiate the authentication process to AUSF, which can carry SUCI as the contract identification;
13)N13:UDM与AUSF间的接口,用于AUSF向UDM获取用户鉴权向量,以执行鉴权流程。13) N13: The interface between UDM and AUSF, used by AUSF to obtain the user authentication vector from UDM to perform the authentication process.
图2是适用于本申请实施例提供的方法的多播广播业务架构的示意图。图2所示的多播广播业务架构和功能是在单播网络架构和功能的基础上增强而定义的。下面对图2中各个网元特定于多播广播业务的功能做简单介绍。Figure 2 is a schematic diagram of a multicast broadcast service architecture suitable for the method provided by the embodiment of the present application. The multicast broadcast service architecture and functions shown in Figure 2 are enhanced and defined based on the unicast network architecture and functions. The following is a brief introduction to the multicast broadcast service-specific functions of each network element in Figure 2.
1、UE:UE主要功能为通过PTM/PTP接收多播数据、通过PTM接收组/广播数据、处理QoS、发起会话加入(session join)和会话离开(session leave)、以及5G MBS的终端侧的资源管理。1. UE: The main functions of UE are to receive multicast data through PTM/PTP, receive group/broadcast data through PTM, process QoS, initiate session join (session join) and session leave (session leave), and the terminal side of 5G MBS Resource management.
2、RAN:RAN主要负责处理MBS QoS流、通过点到多点(point to multipoint,PTM)、点到点(point to point,PTP)向UE发送数据、配置AS层接收广播流、在PTM和PTP之间切换、支持多播会话的Xn和N2切换、处理会话信令、以及建立空口广播和多播资源等。2. RAN: RAN is mainly responsible for processing MBS QoS flows, sending data to UE through point to multipoint (PTM) and point to point (PTP), configuring the AS layer to receive broadcast flows, and transmitting data between PTM and Switching between PTPs, supporting Xn and N2 switching of multicast sessions, processing session signaling, and establishing air interface broadcast and multicast resources, etc.
3、AMF:AMF主要负责信令路由(NG-RAN~MB-SMF)、以及选择广播的NG-RANs等。3. AMF: AMF is mainly responsible for signaling routing (NG-RAN~MB-SMF) and selecting broadcast NG-RANs.
4、SMF:SMF为支持5G MBS特性,单播SMF需要增强,主要体现在增加:发现MB-SMF、UE加入的认证、与MB-SMF交互管理多播会话上下文、与RAN交互建立多播传输资源等功能。4. SMF: In order to support 5G MBS features, SMF needs to be enhanced for unicast SMF, which is mainly reflected in the addition of: discovery of MB-SMF, authentication of UE joining, interaction with MB-SMF to manage multicast session context, and interaction with RAN to establish multicast transmission. resources and other functions.
5、UPF:UPF主要负责与MB-UPF交互接收通过单独传递模式传输的多播数据、通过PDU会话向UE传输单独传递模式传输的多播数据。5. UPF: UPF is mainly responsible for interacting with MB-UPF to receive multicast data transmitted through the individual delivery mode, and transmitting multicast data transmitted in the individual delivery mode to the UE through the PDU session.
6、PCF:PCF主要负责多播广播业务(multicast and broadcast service,MBS)会话的QoS处理、向多播广播SMF(multicast and broadcast SMF,MB-SMF)提供策略信息、以及与用户数据存储库(user data repository,UDR)交互获取QoS信息等。PCF是可选网元,仅在使用动态策略计费控制(policy charging control,PCC)时,才需要该功能实体。6. PCF: PCF is mainly responsible for QoS processing of multicast and broadcast service (MBS) sessions, providing policy information to multicast and broadcast SMF (MB-SMF), and communicating with user data repository ( user data repository, UDR) to interactively obtain QoS information, etc. PCF is an optional network element. This functional entity is only required when using dynamic policy charging control (PCC).
7、多播/广播会话管理功能(multicast/broadcast-session management function,MB-SMF)网元:MB-SMF是一个具备支持广播特性的实体。MB-SMF还可以同时具备单播SMF的功能。具体地,MB-SMF负责:MBS会话的管理,包括QoS控制等;配置多播广播(multicast and broadcast UPF,MB-UPF);与RAN交互控制广播流(flow)传输(广播会话特定功能);与SMF交互关联协议数据单元(protocol data unit,PDU)会话;和RAN交互控制多播流的传输(多播会话特定功能)等。为叙述方便,本申请实施例中,多播/广播会话管理功能网元被简称为多播会话管理功能网元,或“MB-SMF”。MB-SMF为多播会话管理网元中的一种,在未来通信系统中,多播会话管理网元仍可以是MB-SMF,或者,还可以有其它的名称,本申请不做限定。7. Multicast/broadcast-session management function (MB-SMF) network element: MB-SMF is an entity that supports broadcast characteristics. MB-SMF can also have the function of unicast SMF at the same time. Specifically, MB-SMF is responsible for: management of MBS sessions, including QoS control, etc.; configuring multicast and broadcast UPF (MB-UPF); interacting with RAN to control broadcast flow transmission (broadcast session specific functions); Interact with SMF to associate protocol data unit (PDU) sessions; interact with RAN to control the transmission of multicast streams (multicast session specific functions), etc. For convenience of description, in the embodiment of this application, the multicast/broadcast session management function network element is referred to as the multicast session management function network element, or "MB-SMF". MB-SMF is a type of multicast session management network element. In future communication systems, the multicast session management network element can still be MB-SMF, or it can also have other names, which is not limited in this application.
8、多播/广播用户面功能(multicast/broadcast-user plane function,MB-UPF)网元:MB-UPF是5G MBS的数据面的网关,主要负责:与MB-SMF交互获取数据转发规则、向RAN通过共享传递方法(shared delivery method)传输多播数据;向UPF通过单独传递方法(individual delivery method)传输多播数据。为叙述方便,本申请实施例中,多播/广播用户面功能网元被简称为多播用户面功能网元或“MB-UPF”。8. Multicast/broadcast-user plane function (MB-UPF) network element: MB-UPF is the gateway of the data plane of 5G MBS. It is mainly responsible for: interacting with MB-SMF to obtain data forwarding rules, Multicast data is transmitted to the RAN through the shared delivery method; multicast data is transmitted to the UPF through the individual delivery method. For convenience of description, in the embodiment of this application, the multicast/broadcast user plane functional network element is referred to as the multicast user plane functional network element or "MB-UPF" for short.
9、多播/广播服务功能(multicast and broadcast service function,MBSF):MBSF主要支持以下功能:业务层功能、与LTE MBS的互通、与AF和MB-SMF交互以支持MBS会话的操作、确定传输参数和MBS会话的类型、选择MB-SMF控制MBSTF、以及确定发送者的IP多播地址等。MBSF为可选网元。为叙述方便,本申请实施例中,多播/广播服务功能网元被简称为多播服务功能网元或“MBSF”。9. Multicast and broadcast service function (MBSF): MBSF mainly supports the following functions: business layer functions, interworking with LTE MBS, interacting with AF and MB-SMF to support the operation of MBS sessions, and determining transmission Parameters and type of MBS session, selecting MB-SMF to control MBSTF, and determining the sender's IP multicast address, etc. MBSF is an optional network element. For convenience of description, in the embodiment of this application, the multicast/broadcast service function network element is referred to as the multicast service function network element or "MBSF" for short.
10、多播/广播服务传输功能(multicast/broadcast service transport function,MBSTF):MBSTF主要支持以下功能:MBS数据的锚点、作为IP多播的源、支持例如帧、多流、前向纠错(forward error correction,FEC)等通用传输功能、将输入的文件作为目标(object)或目标流(object flow)以多播或广播的方式发送等。MBSTF为可选网元。为叙述方便,本申请实施例中,多播/广播服务传输功能网元被简称为多播服务传输功能网元或“MBSTF”。 10. Multicast/broadcast service transport function (MBSTF): MBSTF mainly supports the following functions: anchor point of MBS data, serving as the source of IP multicast, supporting frames, multi-streams, and forward error correction. (forward error correction, FEC) and other general transmission functions, sending the input file as an object (object) or object flow (object flow) in a multicast or broadcast manner, etc. MBSTF is an optional network element. For convenience of description, in the embodiment of this application, the multicast/broadcast service transmission function network element is referred to as the multicast service transmission function network element or "MBSTF" for short.
11、AF:AF主要支持以下功能向5G核心网(5G core network,5GC)提供业务信息并请求多播或广播服务、以及指示(instruct)与5GC的MBS会话操作等。11. AF: AF mainly supports the following functions to provide business information to the 5G core network (5G core network, 5GC) and request multicast or broadcast services, as well as instruct MBS session operations with 5GC, etc.
12、UDM:UDM主要支持多播会话的订阅/签约管理等。12. UDM: UDM mainly supports subscription/subscription management of multicast sessions, etc.
13、网络存储功能(network repository function,NRF):NRF主要是核心网网元的信息,在支持MBS特性上,主要包括以下功能:支持对服务MBS会话的MB-SMF的管理,具体包括保存MB-SMF服务的MBS会话ID。13. Network repository function (NRF): NRF is mainly information about core network elements. In terms of supporting MBS features, it mainly includes the following functions: Supports the management of MB-SMF that serves MBS sessions, including saving MB -MBS session ID of the SMF service.
14、网络开放功能(network exposure function,NEF):NEF在支持MBS特性上,主要负责以下功能:选择MB-SMF,与AF以及MB-SMF交互实现MBS会话操作、确定传输参数等,向AF提供5G MBS流程的接口如服务配置、MBS会话配置和QoS管理等接口。14. Network exposure function (NEF): NEF is mainly responsible for the following functions in supporting MBS features: selecting MB-SMF, interacting with AF and MB-SMF to implement MBS session operations, determining transmission parameters, etc., and providing AF with The interfaces of the 5G MBS process include service configuration, MBS session configuration and QoS management interfaces.
图2中Nausf、Nnef、Npcf、Nudm、Naf、Namf、Nsmf、N1、N2、N3、N4,以及N6为接口序列号。这些接口序列号的含义可参见3GPP标准协议中定义的含义,在此不做限制。In Figure 2, Nausf, Nnef, Npcf, Nudm, Naf, Namf, Nsmf, N1, N2, N3, N4, and N6 are interface serial numbers. The meaning of these interface serial numbers can be found in the meaning defined in the 3GPP standard protocol, and is not limited here.
应理解,上述应用于本申请实施例的网络架构仅是举例说明的从传统点到点的架构和服务化架构的角度描述的网络架构,适用本申请实施例的网络架构并不局限于此,任何能够实现上述各个网元的功能的网络架构都适用于本申请实施例。It should be understood that the above network architecture applied to the embodiments of the present application is only an example of a network architecture described from the perspective of a traditional point-to-point architecture and a service-oriented architecture. The network architecture applicable to the embodiments of the present application is not limited thereto. Any network architecture that can realize the functions of each of the above network elements is suitable for the embodiments of this application.
还应理解,图1和图2中所示各个核心网网元可以理解为核心网中用于实现不同功能的网元,例如可以按需组合成网络切片。这些核心网网元可以各自独立的设备,也可以集成于同一设备中实现不同的功能,本申请对于上述网元的具体形态不作限定。It should also be understood that each of the core network elements shown in Figures 1 and 2 can be understood as network elements used to implement different functions in the core network, and can, for example, be combined into network slices as needed. These core network elements can be independent devices, or can be integrated into the same device to implement different functions. This application does not limit the specific forms of the above network elements.
还应理解,上述命名仅为便于区分不同的功能而定义,不应对本申请构成任何限定。本申请并不排除在5G网络以及未来其它的网络中采用其他命名的可能。例如,在6G网络中,上述各个网元中的部分或全部可以沿用5G中的术语,也可能采用其他名称等。图1中的各个网元之间的接口名称只是一个示例,具体实现中接口的名称可能为其他的名称,本申请对此不作具体限定。此外,上述各个网元之间的所传输的消息(或信令)的名称也仅仅是一个示例,对消息本身的功能不构成任何限定。It should also be understood that the above nomenclature is only defined to facilitate the differentiation of different functions and should not constitute any limitation on this application. This application does not rule out the possibility of using other naming in 5G networks and other future networks. For example, in a 6G network, some or all of the above network elements may use the terminology used in 5G, or may adopt other names. The interface names between each network element in Figure 1 are just an example. In specific implementations, the names of the interfaces may be other names, and this application does not specifically limit this. In addition, the names of the messages (or signaling) transmitted between the various network elements are only examples and do not constitute any limitation on the function of the messages themselves.
可以理解的是,上述网元或者功能既可以是硬件设备中的网络元件,也可以是在专用硬件上运行软件功能,或者是平台(例如,云平台)上实例化的虚拟化功能。为方便说明,本申请后续,以网络设备为接入和移动管理网元AMF,基站为无线接入网络RAN为例进行说明。It can be understood that the above network elements or functions can be network elements in hardware devices, software functions running on dedicated hardware, or virtualization functions instantiated on a platform (for example, a cloud platform). For convenience of explanation, in the following description of this application, the network device is the access and mobility management network element AMF, and the base station is the wireless access network RAN as an example.
本申请实施例描述的网络架构以及业务场景是为了更加清楚的说明本申请实施例的技术方案,并不构成对于本申请实施例提供的技术方案的限定,本领域普通技术人员可知,随着网络架构的演变和新业务场景的出现,本申请实施例提供的技术方案对于类似的技术问题,同样适用。The network architecture and business scenarios described in the embodiments of this application are for the purpose of explaining the technical solutions of the embodiments of this application more clearly, and do not constitute a limitation on the technical solutions provided by the embodiments of this application. Those of ordinary skill in the art will know that with the network With the evolution of architecture and the emergence of new business scenarios, the technical solutions provided in the embodiments of this application are also applicable to similar technical problems.
本申请实施例的各个方面或特征可以用于实现成方法,或者通过装置或标准编程和/或工程技术的制品进行实现。本申请中使用的术语“制品”涵盖可从任何计算机可读器件、载体或介质访问的计算机程序。例如,计算机可读介质可以包括,但不限于:磁存储器件(例如,硬盘、软盘或磁带等),光盘(例如,压缩盘(compact disc,CD)、数字通用盘(digital versatile disc,DVD)等),智能卡和闪存器件(例如,可擦写可编程只读存储器(erasable programmable read-only memory,EPROM)、卡、棒或钥匙驱动器等)。另外,本文描述的各种存储介质可代表用于存储信息的一个或多个设备和/或其它机器可读介质。术语“机器可读介质”可包括但不限于,无线信道和能够存储、包含和/或承载指令和/或数据的各种其它介质。Various aspects or features of embodiments of the present application may be implemented as methods, or may be implemented by means of devices or articles of standard programming and/or engineering techniques. The term "article of manufacture" as used in this application encompasses a computer program accessible from any computer-readable device, carrier or medium. For example, computer-readable media may include, but are not limited to: magnetic storage devices (e.g., hard disks, floppy disks, tapes, etc.), optical disks (e.g., compact discs (CD), digital versatile discs (DVD)) etc.), smart cards and flash memory devices (e.g. erasable programmable read-only memory (EPROM), cards, sticks or key drives, etc.). Additionally, the various storage media described herein may represent one or more devices and/or other machine-readable media for storing information. The term "machine-readable medium" may include, but is not limited to, wireless channels and various other media capable of storing, containing and/or carrying instructions and/or data.
图3示出了本申请适用的一种场景示意图。通常情况下,运营商在部署网络时,为了减少部署无线接入网的成本,一般选择会在保留各自核心网的同时共享无线接入网设备(下述描述中,以基站作为无线接入网设备进行说明)。例如,TS23.501中所定义的多运营商核心网(multi-operator core network,MOCN)场景。如图3所示,假设有三个运营商,其中,运营商#A、运营商#B和运营商#C分别拥有自己的核心网,但是为了节约成本(例如,部署基站的成本),三个运营商可能会共享基站。与普通场景相比,MOCN场景的部署方式中,广播消息中包含公共陆地移动网络(public land mobile network,PLMN)的信息。例如,基站发送的小区信息中包括小区所属的PLMN的信息。Figure 3 shows a schematic diagram of a scenario applicable to this application. Under normal circumstances, when operators deploy networks, in order to reduce the cost of deploying wireless access networks, they generally choose to share wireless access network equipment while retaining their respective core networks (in the following description, base stations are used as wireless access networks). equipment for instructions). For example, the multi-operator core network (MOCN) scenario defined in TS23.501. As shown in Figure 3, it is assumed that there are three operators. Among them, Operator #A, Operator #B and Operator #C each have their own core network. However, in order to save costs (for example, the cost of deploying base stations), the three Carriers may share base stations. Compared with the ordinary scenario, in the deployment method of the MOCN scenario, the broadcast message contains the information of the public land mobile network (PLMN). For example, the cell information sent by the base station includes information about the PLMN to which the cell belongs.
图4示出了本申请适用的另一种场景示意图。如图4所示,目前,某些广播业务(例如,天气预报,高精地图更新等)在不同运营商上传输的内容是相同的。针对这类广播业务,相同的广播业务的数据在不同运营商的核心网以及运营商所共享的基站上需要多次传输。例如,如图4所示,假设有两个运营商(记为PLMN#a和PLMN#b),多播/广播业务的内容提供商(MBS content provider)分别向PLMN#a 和PLMN#b发送广播数据。由于PLMN#a和PLMN#b共享基站,相同的广播业务的数据会在基站中发送两次(也可以理解为,基站为传输不同运营商网络中的相同广播业务需要分配两次空口资源),从而造成传输资源的浪费。Figure 4 shows a schematic diagram of another scenario applicable to this application. As shown in Figure 4, currently, the content transmitted by certain broadcast services (for example, weather forecast, high-precision map updates, etc.) on different operators is the same. For this type of broadcast service, the same broadcast service data needs to be transmitted multiple times on the core networks of different operators and the base stations shared by the operators. For example, as shown in Figure 4, assuming there are two operators (denoted as PLMN#a and PLMN#b), the content provider of the multicast/broadcast service (MBS content provider) provides services to PLMN#a respectively. and PLMN#b sends broadcast data. Since PLMN#a and PLMN#b share the base station, the same broadcast service data will be sent twice in the base station (it can also be understood that the base station needs to allocate air interface resources twice to transmit the same broadcast service in different operator networks). This results in a waste of transmission resources.
为了便于理解本申请实施例的技术方案,下面介绍本申请涉及的一些技术用语。In order to facilitate understanding of the technical solutions of the embodiments of this application, some technical terms involved in this application are introduced below.
1、多播/广播业务会话(multicast/broadcast service-session,MBS session):多播/广播会话可以为多播/广播业务提供服务。多播/广播会话包括从数据网络到核心网设备再到接入网设备的单播或组播隧道、以及接入网设备分配的用于发送该多播/广播业务的单播或多播/广播空口资源。1. Multicast/broadcast service-session (MBS session): A multicast/broadcast session can provide services for multicast/broadcast services. Multicast/broadcast sessions include unicast or multicast tunnels from the data network to the core network equipment to the access network equipment, and the unicast or multicast/multicast tunnel allocated by the access network equipment for sending the multicast/broadcast service. Broadcast air interface resources.
2、多播/广播业务数据的传输2. Transmission of multicast/broadcast service data
在3GPP网络中,服务/应用存在向多个用户设备(UE)发送多播/广播业务的需求,即需要单点对多点的相同数据传输。该服务/应用包括多媒体消息服务、数据流服务、组通信服务等。通过建立多播/广播/单播会话,网络提供一条被多个接收方共享的承载,发送方仅需发送一份数据,在网络侧按需将发送数据复制并传输至多个接收方或者使用多播的传输方式发送一份数据给多个接收方。服务可以由一个或多个会话承载。一个服务标识对应1个或多个MBS会话标识。In the 3GPP network, services/applications have the need to send multicast/broadcast services to multiple user equipments (UEs), that is, the same data transmission from point to multipoint is required. The services/applications include multimedia messaging services, data streaming services, group communication services, etc. By establishing a multicast/broadcast/unicast session, the network provides a bearer shared by multiple receivers. The sender only needs to send one piece of data, and the network side copies and transmits the sent data to multiple receivers on demand or uses multiple receivers. Send one piece of data to multiple receivers using broadcast transmission. Services can be hosted by one or more sessions. One service ID corresponds to one or more MBS session IDs.
本申请中以广播业务会话、广播业务数据的传输为例进行说明。This application takes the transmission of broadcast service sessions and broadcast service data as examples for explanation.
3、第一广播业务、MBS会话标识、服务标识3. First broadcast service, MBS session identifier, service identifier
至少两个网络(下面以PLMN#a和PLMN#b为例进行说明)共用一个接入网网元,分别通过该接入网网元向所在网络的终端设备发送广播业务(下面以第一广播业务为例进行说明)的数据。具体地,AF通过PLMN#a和PLMN#b将数据传输到该基站,该基站广播一份数据到PLMN#a的UE和PLMN#b的UE。At least two networks (PLMN#a and PLMN#b are used as examples for explanation below) share an access network element, and broadcast services are sent to the terminal equipment of the network through the access network element (hereinafter, the first broadcast is used as an example). Take business as an example to illustrate) data. Specifically, the AF transmits data to the base station through PLMN#a and PLMN#b, and the base station broadcasts a copy of the data to the UE of PLMN#a and the UE of PLMN#b.
AF或服务提供商通过PLMN#a和PLMN#b分别建立MBS会话,并通过MBS会话分别向PLMN#a和/或PLMN#b发送数据。MBS会话由相应的MBS会话标识进行标识。MBS会话标识可以是特定的IP地址或者临时移动组标识(temporary mobile group identity,TMGI)。换句话说,本申请中涉及的MBS会话标识或会话标识为用于承载第一广播业务的数据的MBS会话的标识。The AF or the service provider establishes MBS sessions through PLMN#a and PLMN#b respectively, and sends data to PLMN#a and/or PLMN#b through the MBS sessions. MBS sessions are identified by corresponding MBS session identifiers. The MBS session identifier can be a specific IP address or a temporary mobile group identity (TMGI). In other words, the MBS session identifier or session identifier involved in this application is the identifier of the MBS session used to carry data of the first broadcast service.
第一广播业务可以由服务标识进行标记,服务标识为全局唯一标识。示例性的,服务标识可以是在会话创建过程中由核心网发送给基站的,也可以是基站预配置服务标识和会话标识的对应关系,此处不做限定。The first broadcast service may be marked by a service identifier, which is a globally unique identifier. For example, the service identifier may be sent by the core network to the base station during the session creation process, or may be the corresponding relationship between the base station's preconfigured service identifier and the session identifier, which is not limited here.
示例性的,AF或服务提供商在PLMN#a建立的MBS会话标识为TMGI x,服务标识为w。AF或服务提供商在PLMN#b建立的MBS会话标识为TMGI y,服务标识为w。基站根据服务标识确定不同的广播会话承载/传递的业务数据相同。For example, the MBS session identifier established by the AF or the service provider in PLMN#a is TMGI x, and the service identifier is w. The MBS session identifier established by AF or service provider in PLMN#b is TMGI y, and the service identifier is w. The base station determines based on the service identifier that different broadcast sessions carry/transmit the same service data.
4、资源、复用空口资源、不复用空口资源4. Resources, reused air interface resources, non-reused air interface resources
本申请中涉及的资源可以是空口资源,该空口资源可以是调度时间资源、频率资源、调度优先级、缓存资源、数据无线承载(data radio bearer,DRB);或者,该资源也可以是存储的上下文信息(例如,QoS描述信息、QoS流(flow)的标识信息)等。在这里进行统一说明。作为一个示例,RAN确定的第一广播业务的空口资源信息可以包括:(1)接收的群组无线网络临时标识符(group-radio network tempory identity,G-RNTI)的信息。(2)第一广播业务对应的部分带宽(bandwidth part,BWP)的信息。例如,在所述BWP进行该业务的接收,根据BWP配置确定该BWP对应子载波间隔(sub-carrier space,SCS),频域位置和循环前缀(cyclic prefix,CP)的长度。该BWP配置信息还包括物理下行控制信道(physical downlink control channel,PDCCH)检测的控制资源集(control resource set,COREST)配置信息,所述COREST配置信息指示了进行G-RNTI的PDCCH所在的时频资源。(3)第一广播业务的物理下行数据信道(physical downlink data channel,PDSCH)的加扰序列。也可以理解为,UE在解码该业务的PDSCH时采用该序列进行解扰;(4)G-RNTI的非连续接收(discontinuous reception,DRX)的参数,也可以理解为,UE使用该DRX参数进行G-RNTI检测。(5)解调参考信号的配置,也可以理解为,UE用该参考信号进行G-RNTI调度的PDSCH解调。(6)速率匹配参考信号的信息。The resources involved in this application can be air interface resources, which can be scheduling time resources, frequency resources, scheduling priorities, cache resources, and data radio bearers (DRB); or, the resources can also be stored Context information (for example, QoS description information, identification information of QoS flow (flow)), etc. A unified explanation is provided here. As an example, the air interface resource information of the first broadcast service determined by the RAN may include: (1) received group-radio network temporary identity (G-RNTI) information. (2) Information about the bandwidth part (BWP) corresponding to the first broadcast service. For example, when the service is received at the BWP, the sub-carrier space (sub-carrier space, SCS), frequency domain position and length of the cyclic prefix (CP) corresponding to the BWP are determined according to the BWP configuration. The BWP configuration information also includes control resource set (COREST) configuration information for physical downlink control channel (physical downlink control channel, PDCCH) detection. The COREST configuration information indicates the time and frequency where the PDCCH for G-RNTI is located. resource. (3) The scrambling sequence of the physical downlink data channel (PDSCH) of the first broadcast service. It can also be understood that the UE uses this sequence for descrambling when decoding the PDSCH of the service; (4) the parameters of G-RNTI discontinuous reception (DRX), it can also be understood that the UE uses the DRX parameters for descrambling. G-RNTI detection. (5) The configuration of the demodulation reference signal can also be understood as the UE using the reference signal to perform PDSCH demodulation for G-RNTI scheduling. (6) Rate matching reference signal information.
复用空口资源可以理解为,接入网网元使用同一份空口资源,向不同网络的终端设备发送同一份数据。不复用空口资源可以理解为,接入网网元分别使用不同的空口资源,向不同网络的终端设备发送不同的数据。示例性地,这里的不同的数据可以是来自不同的网络。或者,这里的不同的数据可以是由同一份源数据经过不同网络的网元的加密和/或完整性处理获得的。 Multiplexing air interface resources can be understood as the access network element using the same air interface resource to send the same data to terminal devices on different networks. Not reusing air interface resources can be understood as access network elements using different air interface resources to send different data to terminal devices on different networks. For example, the different data here may come from different networks. Alternatively, the different data here may be obtained by encrypting and/or integrity processing the same source data through network elements of different networks.
5、安全激活状态、安全激活指示5. Security activation status, security activation instructions
安全激活状态为核心网网元是否对广播业务的数据进行安全保护,即机密性和/或完整性保护。下面以核心网网元是MBSTF为例进行说明。安全激活状态可以包括安全激活或安全不激活。在安全激活的情况下,核心网对广播业务的数据进行安全保护,或,MBSTF对广播业务的数据进行安全保护;在安全不激活的情况下,核心网对广播业务的数据不进行安全保护,或,MBSTF对广播业务的数据不进行安全保护。The security activation status refers to whether the core network element performs security protection on the data of the broadcast service, that is, confidentiality and/or integrity protection. The following description takes the core network element as MBSTF as an example. Security activation status may include security activation or security inactivation. When security is activated, the core network provides security protection for broadcast service data, or MBSTF provides security protection for broadcast service data; when security is not activated, the core network does not provide security protection for broadcast service data. Or, MBSTF does not provide security protection for broadcast service data.
安全激活指示用于指示安全激活状态。安全激活指示在指示安全激活的情况下,可以理解为安全激活开启或安全激活已开启或安全已激活或安全激活状态开启。安全激活指示在指示安全未激活的情况下,可以理解为安全激活未开启或安全激活状态关闭。The security activation indicator is used to indicate the security activation status. When the safety activation indication indicates safety activation, it can be understood as safety activation on or safety activation turned on or safety activated or safety activation status turned on. When the security activation indication indicates that security is not activated, it can be understood that security activation is not turned on or that the security activation status is turned off.
示例性的,安全激活指示取值可以是正确(true)或错误(false)。true代表安全激活或安全激活开启或安全激活已开启或安全已激活或安全激活状态开启,false代表安全激活未开启或安全未激活或安全激活状态关闭。或者,安全激活指示#a取值可以是1或0。1代表安全激活或安全激活开启安全激活已开启或安全已激活或安全激活状态开启,0代表安全激活未开启或安全未激活或安全激活状态关闭。For example, the value of the security activation indication may be correct (true) or incorrect (false). true means safe activation or safe activation is on or safe activation is on or safety is activated or safe activation is on, false means safety activation is not on or safety is not activated or safety activation is off. Alternatively, the value of the security activation indication #a can be 1 or 0. 1 represents security activation or security activation turned on. Security activation has been turned on or security has been activated or security activation status is on. 0 represents security activation not turned on or security not activated or security activated. Status is closed.
在基站共享的场景中,PLMN#a和PLMN#b的核心网不同,但共用一个基站。在多播/广播业务数据传输中,对于同一个广播业务,AF通过PLMN#a和/或PLMN#b将数据传输到该基站,该基站广播一份数据到PLMN#a的UE和PLMN#b的UE。由于PLMN#a和PLMN#b分别独立维护自己的密钥,并提供给本网络的UE使用。在开启安全保护的情况下,PLMN#a向基站发送的数据为MBSTF#a使用PLMN#a的密钥对广播业务的数据进行处理后的数据。PLMN#b向基站发送的数据为MBSTF#b使用PLMN#b的密钥对广播业务的数据进行处理后的数据。在该过程中,如果基站只广播一份数据,存在部分UE无法对接收到的广播业务数据进行解密和/或完整性校验的情况,导致通信受到影响,用户体验很差。例如,基站广播的数据为PLMN#b安全保护的数据,PLMN#a的UE将无法解析接收的广播业务数据。In the scenario of base station sharing, PLMN#a and PLMN#b have different core networks but share one base station. In multicast/broadcast service data transmission, for the same broadcast service, the AF transmits data to the base station through PLMN#a and/or PLMN#b, and the base station broadcasts a copy of the data to the UE of PLMN#a and PLMN#b UE. Because PLMN#a and PLMN#b independently maintain their own keys and provide them to UEs in this network. When security protection is turned on, the data sent by PLMN#a to the base station is data obtained by MBSTF#a using the key of PLMN#a to process the broadcast service data. The data sent by PLMN#b to the base station is data obtained by MBSTF#b using the key of PLMN#b to process the broadcast service data. During this process, if the base station only broadcasts one copy of data, some UEs may not be able to decrypt and/or integrity check the received broadcast service data, causing communication to be affected and user experience to be poor. For example, the data broadcast by the base station is data protected by the security of PLMN #b, and the UE of PLMN #a will not be able to parse the received broadcast service data.
图5示出了本申请提供的广播安全通信的方法100的示意图。下面结合图5,详细介绍本申请提供的多播会话安全通信的方法100。Figure 5 shows a schematic diagram of a method 100 for broadcasting secure communications provided by this application. The method 100 for secure communication of multicast sessions provided by this application will be introduced in detail below with reference to Figure 5 .
S101,第一网络中的第一网元向接入网网元发送针对第一广播业务的第一会话建立请求,相应地,接入网网元接收来自第一网络中的第一网元的针对第一广播业务的第一会话建立请求。S101. The first network element in the first network sends a first session establishment request for the first broadcast service to the access network element. Correspondingly, the access network element receives a request from the first network element in the first network. A first session establishment request for a first broadcast service.
其中,第一会话建立请求中包括第一指示信息,第一指示信息用于指示针对第一广播业务的数据是否开启安全保护。The first session establishment request includes first indication information, and the first indication information is used to indicate whether security protection is enabled for the data of the first broadcast service.
本申请中的安全保护,还可以理解为加密和/或完整性保护。为了方便说明,本申请均以安全保护为例进行说明。Security protection in this application can also be understood as encryption and/or integrity protection. For convenience of explanation, this application takes security protection as an example for explanation.
示例性地,第一网元可以是控制面网元或用户面网元。示例性地,第一网元可以直接向接入网网元发送第一会话建立请求,第一网元也可以通过第一网络中的其他网元向接入网网元发送第一会话建立请求。例如,第一网元可以是MB-SMF#a,MB-SMF#a通过AMF向接入网网元发送广播上下文创建(Broadcastcontextcreate)消息,广播上下文创建消息包括第一指示信息。例如,第一网元可以是NEF/MBSF#a,NEF/MBSF#a向MB-SMF#a发送MBS会话创建(Nmbsmf_MBSSession_Create)消息,MBS会话创建(Nmbsmf_MBSSession_Create)消息中包括第一指示信息。或者,这里的第一会话创建请求消息还可以是承载第一指示信息的其他消息,例如,第一网元可以是MBSTF#a,MBSTF#a向NEF/MBSF#a发送承载第一指示信息的消息。NEF/MBSF#a向MBSTF#a发送承载第一指示信息的消息,例如MBS会话创建(Nmbsmf_MBSSession_Create)消息。MB-SMF#a向接入网网元发送广播上下文创建(Broadcast context create)消息,广播上下文创建消息包括第一指示信息。For example, the first network element may be a control plane network element or a user plane network element. For example, the first network element can directly send the first session establishment request to the access network element, or the first network element can also send the first session establishment request to the access network element through other network elements in the first network. . For example, the first network element may be MB-SMF#a, and MB-SMF#a sends a broadcast context creation (Broadcastcontextcreate) message to the access network element through the AMF, and the broadcast context creation message includes the first indication information. For example, the first network element may be NEF/MBSF#a, and NEF/MBSF#a sends an MBS session creation (Nmbsmf_MBSSession_Create) message to MB-SMF#a, and the MBS session creation (Nmbsmf_MBSSession_Create) message includes the first indication information. Alternatively, the first session creation request message here may also be other messages carrying the first indication information. For example, the first network element may be MBSTF#a, and MBSTF#a sends a message carrying the first indication information to NEF/MBSF#a. information. NEF/MBSF#a sends a message carrying the first indication information to MBSTF#a, such as an MBS session creation (Nmbsmf_MBSSession_Create) message. MB-SMF#a sends a broadcast context create (Broadcast context create) message to the access network element, and the broadcast context create message includes first indication information.
示例性地,第一指示信息用于指示第一网络或第一网络中的用户面网元(例如MBSTF#a)针对第一广播业务的第一数据是否开启安全保护。For example, the first indication information is used to indicate whether the first network or a user plane network element (for example, MBSTF#a) in the first network enables security protection for the first data of the first broadcast service.
可选地,方法100还包括:第一网元获取第一指示信息。具体地,第一网元根据网络开放功能或服务提供商提供的安全配置信息,或预配置的安全配置信息确定第一指示信息。或者,第一网元从第一网络的其他网元接收第一指示信息。Optionally, the method 100 further includes: the first network element obtains the first indication information. Specifically, the first network element determines the first indication information according to the network opening function or the security configuration information provided by the service provider, or the preconfigured security configuration information. Alternatively, the first network element receives the first indication information from other network elements of the first network.
S102,响应于第一会话建立请求,接入网网元为第一广播业务分配第一空口资源。S102. In response to the first session establishment request, the access network element allocates the first air interface resource to the first broadcast service.
示例性地,接入网网元存储第一指示信息。例如,第一会话建立请求携带第一广播业务的服务标 识,接入网网元存储第一指示信息与该服务标识的对应关系。再例如,第一会话建立请求携带会话标识,接入网网元存储第一指示信息与该会话标识的对应关系。再例如,再例如,第一会话建立请求携带会话标识,接入网网元可以根据本地配置的会话标识与服务标识的映射关系,确定第一广播业务的会话标识。随后存储第一指示信息与该服务标识的对应关系。Exemplarily, the access network element stores the first indication information. For example, the first session establishment request carries the service identifier of the first broadcast service. identification, the access network element stores the corresponding relationship between the first indication information and the service identifier. For another example, the first session establishment request carries a session identifier, and the access network element stores the correspondence between the first indication information and the session identifier. For another example, the first session establishment request carries a session identifier, and the access network element may determine the session identifier of the first broadcast service according to the mapping relationship between the locally configured session identifier and the service identifier. Then the corresponding relationship between the first indication information and the service identifier is stored.
作为一个示例,假设接入网网元在接收到第一会话建立请求之前,还未创建第一广播业务对应的资源。那么,第一指示信息指示针对第一广播业务的数据开启或不开启安全保护的情况下,接入网网元为第一广播业务分配第一空口资源,均可以理解为,接入网网元为第一广播业务创建第一空口资源。As an example, assume that the access network element has not created resources corresponding to the first broadcast service before receiving the first session establishment request. Then, when the first instruction information indicates whether to enable or disable security protection for the data of the first broadcast service, the access network element allocates the first air interface resource to the first broadcast service, which can be understood as: Create a first air interface resource for the first broadcast service.
作为另一个示例,假设接入网网元在接收到第一会话建立请求之前,已经存在第一广播业务对应的资源。那么,接入网网元为第一广播业务分配第一空口资源的实现方式可以参见S104中相关的描述。换句话说,假设接入网网元在接收到第一会话建立请求之前,已经建第一广播业务对应的资源,那么本申请中接入网网元与第一网元之间的交互,可以参见接入网网元与第二网元之间的交互。As another example, assume that before the access network element receives the first session establishment request, resources corresponding to the first broadcast service already exist. Then, for the implementation method of the access network element allocating the first air interface resource to the first broadcast service, please refer to the relevant description in S104. In other words, assuming that the access network element has already established resources corresponding to the first broadcast service before receiving the first session establishment request, then the interaction between the access network element and the first network element in this application can be See the interaction between the access network element and the second network element.
S103,所述第二网元向接入网网元发送针对第一广播业务的第二会话建立请求,相应地,接入网网元接收来自第二网络中的第二网元的针对第一广播业务的第二会话建立请求。S103: The second network element sends a second session establishment request for the first broadcast service to the access network element. Correspondingly, the access network element receives a request for the first broadcast service from the second network element in the second network. Second session establishment request for broadcast service.
其中,第二会话建立请求中包括第二指示信息,第二指示信息用于指示针对第一广播业务的第二数据是否开启安全保护。The second session establishment request includes second indication information, and the second indication information is used to indicate whether security protection is enabled for the second data of the first broadcast service.
示例性地,第二网元可以是控制面网元或用户面网元。For example, the second network element may be a control plane network element or a user plane network element.
示例性地,第二指示信息用于指示第二网络或第二网络中的用户面网元(例如MBSTF#b)针对第一广播业务的数据是否开启安全保护。For example, the second indication information is used to indicate whether the second network or a user plane network element (for example, MBSTF#b) in the second network enables security protection for the data of the first broadcast service.
示例性地,第二网元可以直接向接入网网元发送第二会话建立请求,第二网元也可以通过第二网络中的其他网元向接入网网元发送第二会话建立请求。例如,第二网元可以是MB-SMF#b,MB-SMF#b通过AMF向接入网网元发送广播上下文创建(Broadcast context create)消息,广播上下文创建消息包括第二指示信息。例如,第二网元可以是NEF/MBSF#b,NEF/MBSF#b向MB-SMF#b发送MBS会话创建(Nmbsmf_MBSSession_Create)消息,MBS会话创建(Nmbsmf_MBSSession_Create)消息中包括第二指示信息。或者,这里的第二会话创建请求消息还可以是承载第二指示信息的其他消息,例如,第二网元可以是MBSTF#b,MBSTF#b向NEF/MBSF#b发送承载第二指示信息的消息。NEF/MBSF#b向MBSTF#b发送承载第二指示信息的消息,例如MBS会话创建(Nmbsmf_MBSSession_Create)消息。MB-SMF#b向接入网网元发送广播上下文创建(Broadcast context create)消息,广播上下文创建消息包括第二指示信息。For example, the second network element can directly send the second session establishment request to the access network element, or the second network element can also send the second session establishment request to the access network element through other network elements in the second network. . For example, the second network element may be MB-SMF#b, and MB-SMF#b sends a broadcast context create (Broadcast context create) message to the access network element through the AMF, and the broadcast context create message includes the second indication information. For example, the second network element may be NEF/MBSF#b, and NEF/MBSF#b sends an MBS session creation (Nmbsmf_MBSSession_Create) message to MB-SMF#b, and the MBS session creation (Nmbsmf_MBSSession_Create) message includes the second indication information. Alternatively, the second session creation request message here may also be another message carrying the second indication information. For example, the second network element may be MBSTF#b, and MBSTF#b sends a message carrying the second indication information to NEF/MBSF#b. information. NEF/MBSF#b sends a message carrying the second indication information to MBSTF#b, such as an MBS session creation (Nmbsmf_MBSSession_Create) message. MB-SMF#b sends a broadcast context create (Broadcast context create) message to the access network element, and the broadcast context create message includes the second indication information.
可选地,方法100还包括:第二网元获取第二指示信息。具体地,第二网元根据网络开放功能或服务提供商提供的安全配置信息,或预配置的安全配置信息确定第二指示信息。或者,第二网元从第二网络的其他网元接收第二指示信息。Optionally, the method 100 further includes: the second network element obtains the second indication information. Specifically, the second network element determines the second indication information according to the network opening function or the security configuration information provided by the service provider, or the preconfigured security configuration information. Alternatively, the second network element receives the second indication information from other network elements of the second network.
S104,响应于第二会话建立请求,接入网网元根据第一指示信息和/或第二指示信息确定是否复用第一空口资源。S104. In response to the second session establishment request, the access network element determines whether to reuse the first air interface resource according to the first indication information and/or the second indication information.
下面针对S104给出几种可能的实现方式。Several possible implementation methods are given below for S104.
实现方式一,接入网网元不复用第一空口资源。Implementation method 1: The access network element does not reuse the first air interface resource.
所述第一指示信息指示针对所述第一数据已开启安全保护,和/或,所述第二指示信息指示针对所述第二数据已开启安全保护的情况下,接入网网元根据第一指示信息和/或第二指示信息确定不复用第一空口资源。When the first indication information indicates that security protection has been enabled for the first data, and/or, when the second indication information indicates that security protection has been enabled for the second data, the access network element shall The first indication information and/or the second indication information determines not to reuse the first air interface resource.
具体地,第一指示信息和第二指示信息分别指示针对第一广播业务的第一数据和第二数据开启安全保护的情况下,接入网网元根据第一指示信息和第二指示信息确定不复用第一空口资源,或者,接入网网元根据第一指示信息或第二指示信息确定不复用第一空口资源。或者,第一指示信息指示针对第一广播业务的第一数据开启安全保护,第二指示信息指示针对第一广播业务的第二数据不开启安全保护的情况下,接入网网元根据第一指示信息确定不复用第一空口资源,或者,接入网网元根据第一指示信息和第二指示信息确定不复用第一空口资源。或者,第二指示信息指示针对第一广播业务的第二数据开启安全保护,第一指示信息指示针对第一广播业务的第一数据不开启安全保护的情况下,接入网网元根据第二指示信息确定不复用第一空口资源,或者,接入网网元根据第一指示信息和第二指示信息确定不复用第一空口资源。 Specifically, when the first indication information and the second indication information respectively indicate that security protection is enabled for the first data and the second data of the first broadcast service, the access network element determines according to the first indication information and the second indication information. The first air interface resource is not reused, or the access network element determines not to reuse the first air interface resource according to the first indication information or the second indication information. Alternatively, when the first instruction information indicates that security protection is enabled for the first data of the first broadcast service, and the second instruction information indicates that security protection is not enabled for the second data of the first broadcast service, the access network element shall perform the first operation according to the first instruction information. The indication information determines not to reuse the first air interface resource, or the access network element determines not to reuse the first air interface resource according to the first indication information and the second indication information. Alternatively, when the second instruction information indicates that security protection is enabled for the second data of the first broadcast service, and the first instruction information indicates that security protection is not enabled for the first data of the first broadcast service, the access network element may The indication information determines not to reuse the first air interface resource, or the access network element determines not to reuse the first air interface resource according to the first indication information and the second indication information.
其中,接入网网元不复用第一空口资源,还可以理解为:接入网网元为从第二网络接收的第一广播业务的第二数据创建第二空口资源,且第一空口资源与第二空口资源不同。Wherein, the access network element does not reuse the first air interface resource, which can also be understood as: the access network element creates the second air interface resource for the second data of the first broadcast service received from the second network, and the first air interface The resources are different from the second air interface resources.
可选地,方法100还包括:接入网网元建立接入网网元和第二网络的用户面网元(例如UPF#b)之间的数据传输通道,并通过该数据传输通道从第二网络的用户面网元接收第一广播业务的数据。Optionally, the method 100 further includes: the access network element establishing a data transmission channel between the access network element and the user plane network element (for example, UPF#b) of the second network, and transmitting data from the first network element to the second network through the data transmission channel. The user plane network element of the second network receives the data of the first broadcast service.
可选地,方法100还包括:接入网网元基于第一空口资源向第一网络的终端设备发送第一广播业务的第一数据;接入网网元基于第二空口资源向第二网络的终端设备发送第一广播业务的第二数据。Optionally, the method 100 further includes: the access network element sending the first data of the first broadcast service to the terminal device of the first network based on the first air interface resource; and the access network element sending the first data of the first broadcast service to the second network based on the second air interface resource. The terminal device sends the second data of the first broadcast service.
下面为了方便说明,将接入网网元为从第一网络接收的第一广播业务的第一数据称为第一数据,将接入网网元为从第二网络接收的第一广播业务的第二数据称为第二数据。并详细介绍第一数据和第二数据的区别。For convenience of explanation below, the first data in which the access network element is the first broadcast service received from the first network is called first data, and the access network element is the first broadcast service received from the second network. The second data is called second data. And introduce in detail the difference between the first data and the second data.
第二数据还可以理解为接入网网元为从第二网络的用户面网元(例如UPF#b)接收的第一广播业务的数据。应理解,第二数据是由第二网络进行安全保护的第一广播业务的数据,或者,第二数据是由第二网络的用户面网元(例如MBSTF#b)进行安全保护的第一广播业务的数据,或者,第二数据是由第二网络的用户面网元(例如MBSTF#b)使用第二密钥进行加密和/或完整性保护处理的第一广播业务的数据。例如,MBSTF#b使用密钥#b对第二数据进行加密和/或完整性保护,可以实现MBSTF#b与第二网元的终端设备之间的安全通信。The second data can also be understood as data of the first broadcast service received by the access network element from the user plane network element of the second network (for example, UPF#b). It should be understood that the second data is the data of the first broadcast service that is security protected by the second network, or the second data is the first broadcast that is security protected by the user plane network element of the second network (for example, MBSTF#b). The data of the service, or the second data is the data of the first broadcast service that is encrypted and/or integrity protected by the user plane network element of the second network (for example, MBSTF#b) using the second key. For example, MBSTF#b uses key #b to encrypt and/or integrity protect the second data, which can realize secure communication between MBSTF#b and the terminal device of the second network element.
第一数据还可以理解为接入网网元为从第一网络的用户面网元(例如UPF#a)接收的第一广播业务的数据。应理解,第一数据是由第一网络进行安全保护的第一广播业务的数据,或者,第一数据是由第一网络的用户面网元(例如MBSTF#a)进行安全保护的第一广播业务的数据,或者,第一数据是由第一网络的用户面网元(例如MBSTF#a)使用第一密钥进行加密和/或完整性保护处理的第一广播业务的数据。例如,MBSTF#a使用密钥#a对第一数据进行加密和/或完整性保护,可以实现MBSTF#a与第一网元的终端设备之间的安全通信。The first data can also be understood as data of the first broadcast service received by the access network element from the user plane network element of the first network (for example, UPF#a). It should be understood that the first data is the data of the first broadcast service that is security protected by the first network, or the first data is the first broadcast that is security protected by the user plane network element of the first network (for example, MBSTF#a). The data of the service, or the first data is the data of the first broadcast service that is encrypted and/or integrity protected by the user plane network element of the first network (for example, MBSTF#a) using the first key. For example, MBSTF#a uses key #a to encrypt and/or integrity protect the first data, which can realize secure communication between MBSTF#a and the terminal device of the first network element.
还可以理解的是,第一数据在被进行加密和/或完整性保护处理之前的源数据,与,第二数据在被进行加密和/或完整性保护处理之前的源数据相同。It can also be understood that the source data of the first data before being encrypted and/or integrity protected is the same as the source data of the second data before being encrypted and/or integrity protected.
上述方案,在能够实现第一网络和第二网络对第一广播业务的数据进行安全保护的同时,也使得第一网络和第二网络的终端设备能够分别对接收到的第一广播业务的数据进行解密和/或完整性校验,提高通信安全性能,提升用户体验。The above solution not only enables the first network and the second network to securely protect the data of the first broadcast service, but also enables the terminal devices of the first network and the second network to separately protect the received data of the first broadcast service. Perform decryption and/or integrity verification to improve communication security and user experience.
实现方式二,接入网网元复用第一空口资源。Implementation method two: the access network element reuses the first air interface resource.
在所述第一指示信息指示针对所述第一数据未开启安全保护且所述第二指示信息指示针对所述第二数据未开启安全保护的情况下,接入网网元根据第一指示信息和第二指示信息确定复用第一空口资源。In the case where the first indication information indicates that security protection is not enabled for the first data and the second indication information indicates that security protection is not enabled for the second data, the access network element uses the first indication information to and the second indication information to determine to multiplex the first air interface resource.
可选地,方法100还包括:接入网网元不建立接入网网元和第二网络的用户面网元(例如UPF#b)之间的数据传输通道;或者,接入网网元确定建立接入网网元和第二网络的用户面网元之间的数据传输通道,但丢弃该数据传输通道中的第一广播业务的数据(即上述第二数据)。Optionally, the method 100 also includes: the access network element does not establish a data transmission channel between the access network element and the user plane element of the second network (for example, UPF#b); or, the access network element It is determined to establish a data transmission channel between the access network element and the user plane network element of the second network, but discard the data of the first broadcast service in the data transmission channel (ie, the above-mentioned second data).
可选地,方法100还包括:接入网网元基于第一空口资源向第一网络的终端设备和第二网络的终端设备发送第一数据或第二数据。Optionally, the method 100 further includes: the access network element sending the first data or the second data to the terminal device of the first network and the terminal device of the second network based on the first air interface resource.
可以理解的,在实现方式二中,由于针对第一数据和第二数据均未进行安全保护,因此第一数据和第二数据的数据内容相同。在此情况下,接入网网元分别发送同一份数据(第一数据或第二数据)至第一网络的终端设备和第二网络的终端设备。It can be understood that in the second implementation manner, since neither the first data nor the second data is subject to security protection, the data contents of the first data and the second data are the same. In this case, the access network element sends the same piece of data (first data or second data) to the terminal device of the first network and the terminal device of the second network respectively.
上述方案,能够节省空口资源。The above solution can save air interface resources.
图6示出了本申请提供的广播安全通信的方法200的示意图。下面结合图6,详细介绍本申请提供的广播安全通信的方法200。方法200针对方法100中的实现方式一给出了具体的示例。其中,接入网网元以RAN为例,第一网络以PLMN#a为例,第二网络以PLMN#b为例,第一指示信息以安全激活指示#a为例,第二指示信息以安全激活指示#b为例,第一空口资源以资源#a为例,第二空口资源以资源#b为例进行说明。Figure 6 shows a schematic diagram of a method 200 for broadcasting secure communications provided by this application. The method 200 for broadcasting secure communication provided by this application will be introduced in detail below with reference to Figure 6 . Method 200 provides a specific example for implementation method 1 in method 100. Among them, the access network element takes RAN as an example, the first network takes PLMN#a as an example, the second network takes PLMN#b as an example, the first instruction information takes security activation instruction #a as an example, and the second instruction information takes Security activation indication #b is taken as an example, the first air interface resource is taken as resource #a, and the second air interface resource is taken as resource #b.
S201,AF向NEF#a/MBSF#a发送MBS会话#a创建请求消息(Nnef-MBSSesion_Create),具体可以参见TS 23.247第7.1章节。S201, AF sends an MBS session #a creation request message (Nnef-MBSSesion_Create) to NEF#a/MBSF#a. For details, please refer to TS 23.247 Chapter 7.1.
其中,MBS会话#a创建请求消息中携带MBS会话标识(MBS session ID)#a、QoS参数#a、和服 务类型(service type)。可选地,该消息还携带服务标识(service ID)。示例性的,服务标识为第一广播业务的标识信息。Among them, the MBS session #a creation request message carries the MBS session ID (MBS session ID) #a, QoS parameter #a, and service service type. Optionally, the message also carries a service ID. For example, the service identifier is the identification information of the first broadcast service.
MBS会话标识可以是特定的IP地址或者临时移动组标识(temporary mobile group identity,TMGI)。QoS参数表示当前会话的服务质量要求。第一广播业务可以由服务标识进行标记,服务标识为全局唯一标识。示例性的,服务标识可以是在会话创建过程中由核心网发送给基站的,也可以是基站预配置会话标识的对应关系,此处不做限定。服务类型包括广播服务和多播服务。本申请主要适用于广播服务场景。The MBS session identifier can be a specific IP address or a temporary mobile group identity (TMGI). QoS parameters indicate the quality of service requirements of the current session. The first broadcast service may be marked by a service identifier, which is a globally unique identifier. For example, the service identifier may be sent by the core network to the base station during the session creation process, or may be the corresponding relationship of the session identifier preconfigured by the base station, which is not limited here. Service types include broadcast services and multicast services. This application is mainly applicable to broadcast service scenarios.
根据配置的不同,本申请涉及的MBSF/NEF可以仅表示MBSF,或仅表示NEF、或表示MBSF和NEF。本申请涉及的NEF#a/MBSF#a或NEF#b/MBSF#b与MBSF/NEF的理解一致,其中#a和#b用于标识MBSF/NEF分别位于不同的PLMN(PLMN#a和PLMN#b)网络。Depending on the configuration, MBSF/NEF mentioned in this application may represent only MBSF, only NEF, or both MBSF and NEF. The NEF#a/MBSF#a or NEF#b/MBSF#b involved in this application has the same understanding as MBSF/NEF, where #a and #b are used to identify that MBSF/NEF are located in different PLMNs (PLMN#a and PLMN #b)Network.
S202,NEF#a/MBSF#a对AF进行授权,具体可以参考TS 23.247第7.1章节。S202, NEF#a/MBSF#a authorizes AF. For details, please refer to TS 23.247 Chapter 7.1.
下面介绍NEF#a/MBSF#a获取安全激活状态#a的两种方案。该两种方案可以理解为方法100中第一网元获取第一指示信息的具体示例。例如下文所述S203a,或,S203b和S204。安全激活状态#a可以理解为MBSTF#a是否对第一广播业务的数据进行安全保护,即机密性和/或完整性保护,该会话用于传输第一广播业务的数据。示例性的,安全激活状态#a还可以理解为核心网是否对第一广播业务的数据进行安全保护,即机密性和/或完整性保护。The following describes two options for NEF#a/MBSF#a to obtain security activation status #a. These two solutions can be understood as specific examples of the first network element obtaining the first indication information in the method 100. For example, S203a, or S203b and S204 described below. The security activation state #a can be understood as whether MBSTF #a performs security protection, that is, confidentiality and/or integrity protection, on the data of the first broadcast service. The session is used to transmit the data of the first broadcast service. For example, the security activation state #a can also be understood as whether the core network performs security protection on the data of the first broadcast service, that is, confidentiality and/or integrity protection.
方案一,S203a,NEF#a/MBSF#a确定安全激活状态#a。Solution 1, S203a, NEF#a/MBSF#a determines security activation status #a.
例如,NEF#a/MBSF#a根据AF提供的或预配置的安全配置信息确定安全激活状态#a。For example, NEF#a/MBSF#a determines security activation status #a based on security configuration information provided by AF or preconfigured.
方案二,NEF#a/MBSF#a从MBSTF#a接收安全激活状态#a。Solution 2: NEF#a/MBSF#a receives security activation status #a from MBSTF#a.
S203b,NEF#a/MBSF#a向MBSTF#a发送安全激活状态#a查询消息,相应地,MBSTF#a接收来自NEF#a/MBSF#a的安全激活状态#a查询消息。S203b, NEF#a/MBSF#a sends a security activation status #a query message to MBSTF#a. Correspondingly, MBSTF#a receives the security activation status #a query message from NEF#a/MBSF#a.
其中,安全激活状态#a查询消息用于查询安全激活状态#a。该消息中携带MBS session ID#a,用于指示MBS session ID#a标识的会话。Among them, the security activation status #a query message is used to query the security activation status #a. This message carries MBS session ID#a, which is used to indicate the session identified by MBS session ID#a.
作为一个示例,该消息中可以包括用于查询安全激活状态#a的指示信息,由该指示信息用于显示指示该消息用于查询安全激活状态#a,或者,由安全激活状态#a查询消息的消息名称隐式指示该消息用于查询安全激活状态#a。As an example, the message may include instruction information for querying the security activation status #a, and the indication information is used to display the message indicating that the message is used to query the security activation status #a, or the message is used to query the security activation status #a. The message name implicitly indicates that the message is used to query security activation status #a.
作为另一个示例,安全激活状态#a查询消息可以发送于S202之后或者接收到MB-SMF#a的MBS会话#a创建响应消息(下述S206)之后。或者,也可以作为TS 23.247第7.1章节中NEF#a/MBSF#a向MBSTF#a发送的会话请求(sessionrequest)消息的增强。比如,该会话请求消息具备向MBSTF#a查询安全激活状态#a的功能。比如,该会话请求消息中携带可以包括用于查询安全激活状态#a的指示信息,或者,该会话请求消息的消息名称隐式指示安全激活状态#a。As another example, the security activation status #a query message may be sent after S202 or after the MBS session #a creation response message of MB-SMF#a is received (S206 below). Alternatively, it can also be used as an enhancement of the session request (sessionrequest) message sent by NEF#a/MBSF#a to MBSTF#a in TS 23.247 Chapter 7.1. For example, the session request message has the function of querying MBSTF#a for security activation status #a. For example, the session request message may include instruction information for querying the security activation status #a, or the message name of the session request message may implicitly indicate the security activation status #a.
作为再一个示例,该消息的触发条件包括但不限于以下一项或多项。As yet another example, the triggering conditions for the message include but are not limited to one or more of the following.
(1)MBSF#a/NEF#a未收到AF发送的安全配置信息,该安全配置信息指示是否对MBS会话#a承载的第一广播业务的数据进行安全保护,即机密性和/或完整性保护。(1) MBSF#a/NEF#a did not receive the security configuration information sent by the AF. The security configuration information indicates whether to perform security protection, that is, confidentiality and/or integrity, on the data of the first broadcast service carried by MBS session #a. sexual protection.
(2)MBSF#a/NEF#a确定未存储MBS会话#a承载的第一广播业务的数据安全激活状态。(2) MBSF#a/NEF#a determines that the data security activation status of the first broadcast service carried by MBS session #a is not stored.
(3)S201中的MBS会话#a创建请求消息中携带的service type指示为广播服务。(3) The service type carried in the MBS session #a creation request message in S201 indicates broadcast service.
(4)S202中MBSF#a/NEF#a对AF授权完成。(4) In S202, the authorization of AF by MBSF#a/NEF#a is completed.
(5)S201中的MBS会话#a创建请求消息中携带有服务标识。(5) The MBS session #a creation request message in S201 carries the service identifier.
(6)响应于MBS会话#a创建响应消息(下述S206)。(6) Create a response message in response to MBS session #a (S206 below).
S204,MBSTF#a向NEF#a/MBSF#a发送安全激活状态#a响应消息,相应地,NEF#a/MBSF#a接收来自MBSTF#a的安全激活状态#a响应消息。S204, MBSTF#a sends a security activation status #a response message to NEF#a/MBSF#a. Correspondingly, NEF#a/MBSF#a receives the security activation status #a response message from MBSTF#a.
S205,MBSF/NEF#a向MB-SMF#a发送MBS会话创建(Nmbsmf_MBSSession_Create)消息,相应地,MB-SMF#a接收来自MBSF/NEF#a的MBS会话创建消息。S205, MBSF/NEF#a sends an MBS session creation (Nmbsmf_MBSSession_Create) message to MB-SMF#a. Correspondingly, MB-SMF#a receives the MBS session creation message from MBSF/NEF#a.
该消息用于请求创建MBS会话。该消息中包括MBS session ID#a。This message is used to request the creation of an MBS session. The message includes MBS session ID#a.
S206,MB-SMF#a向MBSF/NEF#a发送响应消息,相应地,MBSF/NEF#a接收来自MB-SMF#a的响应消息。该响应消息用于响应S205中的MBS会话创建消息。S206: MB-SMF#a sends a response message to MBSF/NEF#a. Correspondingly, MBSF/NEF#a receives the response message from MB-SMF#a. This response message is used to respond to the MBS session creation message in S205.
下面介绍NEF#a/MBSF#a向MB-SMF#a发送安全激活指示#a,该安全激活指示#a用于指示安全激 活状态#a。其中,NEF#a/MBSF#a向MB-SMF#a发送安全激活指示#a,可以理解为方法100中S101的一种具体示例。The following describes how NEF#a/MBSF#a sends a security activation instruction #a to MB-SMF#a. The security activation instruction #a is used to instruct security activation. Live state #a. Among them, NEF#a/MBSF#a sends security activation instruction #a to MB-SMF#a, which can be understood as a specific example of S101 in method 100.
在执行上述方案二时,对于方案二中S203b响应于MBS会话#a创建响应消息(上述触发条件(6))的情况,即S203b晚于MBS会话#a创建响应消息时,NEF#a/MBSF#a可以在S206之后的一条独立的消息中向MB-SMF#a发送安全激活指示#a。When executing the above scheme two, for the situation in scheme two that S203b creates a response message in response to MBS session #a (the above trigger condition (6)), that is, when S203b creates a response message later than MBS session #a, NEF#a/MBSF #a may send the security activation indication #a to MB-SMF #a in a separate message after S206.
在执行上述方案一,以及方案二中S203b不是响应于MBS会话#a创建响应消息的情况,即S203b早于MBS会话#a创建响应消息时,可以对S205中的MBS会话创建消息进行增强。比如,安全激活指示#a承载于MBS会话创建消息中发送。When executing the above solution one, and in the second solution when S203b is not in response to the MBS session #a creation response message, that is, when S203b creates the response message earlier than MBS session #a, the MBS session creation message in S205 can be enhanced. For example, the security activation indication #a is carried in the MBS session creation message and sent.
S207用于响应S201,具体可以参见TS 23.247第7.1章节。S207 is used to respond to S201. For details, please refer to TS 23.247 Chapter 7.1.
S208,MB-SMF#a向RAN发送广播上下文创建消息,相应地,RAN接收来自MB-SMF#a的广播上下文创建消息。消息中携带MBS session ID#a。该消息中可选携带服务标识和安全激活指示#a。S208: MB-SMF#a sends a broadcast context creation message to the RAN. Correspondingly, the RAN receives the broadcast context creation message from MB-SMF#a. The message carries MBS session ID#a. This message optionally carries the service identifier and security activation indication #a.
本申请中的安全激活指示#a可以有多种指示方式,在这里进行统一说明。示例性的,安全激活指示取值可以是正确(true)或错误(false)。true代表安全激活或安全激活开启或安全激活已开启或安全已激活或安全激活状态开启,false代表安全激活未开启或安全未激活或安全激活状态关闭。或者,安全激活指示#a取值可以是1或0。1代表安全激活或安全激活开启安全激活已开启或安全已激活或安全激活状态开启,0代表安全激活未开启或安全未激活或安全激活状态关闭。The security activation instruction #a in this application can have multiple instruction methods, which are described uniformly here. For example, the value of the security activation indication may be correct (true) or incorrect (false). true means safe activation or safe activation is on or safe activation is on or safety is activated or safe activation is on, false means safety activation is not on or safety is not activated or safety activation is off. Alternatively, the value of the security activation indication #a can be 1 or 0. 1 represents security activation or security activation turned on. Security activation has been turned on or security has been activated or security activation status is on. 0 represents security activation not turned on or security not activated or security activated. Status is closed.
S209可以作为方法100中S102的一种具体示例。S209,RAN根据安全激活指示#a为第一广播业务分配(或确定)资源,并确定RAN和UPF之间传输通道的处理方式。S209 can be used as a specific example of S102 in method 100. S209: The RAN allocates (or determines) resources for the first broadcast service according to the security activation indication #a, and determines the processing method of the transmission channel between the RAN and the UPF.
RAN存储安全激活指示#a和服务标识的对应关系。可选地,在未携带服务标识的情况下,基站可以根据本地配置和会话标识确定服务标识。The RAN stores the correspondence between the security activation indication #a and the service identifier. Optionally, if the service identifier is not carried, the base station can determine the service identifier based on the local configuration and session identifier.
其中,本申请中涉及的资源可以是空口资源,该空口资源可以是调度时间资源、频率资源、调度优先级、缓存资源、数据无线承载(data radio bearer,DRB);或者,该资源也可以是存储的上下文信息(例如,QoS描述信息、QoS流(flow)的标识信息)等。在这里进行统一说明。作为一个示例,RAN确定的第一广播业务的空口资源信息可以包括:(1)接收的群组无线网络临时标识符(group-radio network tempory identity,G-RNTI)的信息。(2)第一广播业务对应的部分带宽(bandwidth part,BWP)的信息。例如,在所述BWP进行该业务的接收,根据BWP配置确定该BWP对应子载波间隔(sub-carrier space,SCS),频域位置和循环前缀(cyclic prefix,CP)的长度。该BWP配置信息还包括物理下行控制信道(physical downlink control channel,PDCCH)检测的控制资源集(control resource set,COREST)配置信息,所述COREST配置信息指示了进行G-RNTI的PDCCH所在的时频资源。(3)第一广播业务的物理下行数据信道(physical downlink data channel,PDSCH)的加扰序列。也可以理解为,UE在解码该业务的PDSCH时采用该序列进行解扰;(4)G-RNTI的非连续接收(discontinuous reception,DRX)的参数,也可以理解为,UE使用该DRX参数进行G-RNTI检测。(5)解调参考信号的配置,也可以理解为,UE用该参考信号进行G-RNTI调度的PDSCH解调。(6)速率匹配参考信号的信息。Among them, the resources involved in this application can be air interface resources, which can be scheduling time resources, frequency resources, scheduling priorities, cache resources, and data radio bearers (DRB); or, the resources can also be Stored context information (for example, QoS description information, identification information of QoS flow (flow)), etc. A unified explanation is provided here. As an example, the air interface resource information of the first broadcast service determined by the RAN may include: (1) received group-radio network temporary identity (G-RNTI) information. (2) Information about the bandwidth part (BWP) corresponding to the first broadcast service. For example, when the service is received at the BWP, the sub-carrier space (sub-carrier space, SCS), frequency domain position and length of the cyclic prefix (CP) corresponding to the BWP are determined according to the BWP configuration. The BWP configuration information also includes control resource set (COREST) configuration information for physical downlink control channel (physical downlink control channel, PDCCH) detection. The COREST configuration information indicates the time and frequency where the PDCCH for G-RNTI is located. resource. (3) The scrambling sequence of the physical downlink data channel (PDSCH) of the first broadcast service. It can also be understood that the UE uses this sequence for descrambling when decoding the PDSCH of the service; (4) the parameters of G-RNTI discontinuous reception (DRX), it can also be understood that the UE uses the DRX parameters for descrambling. G-RNTI detection. (5) The configuration of the demodulation reference signal can also be understood as the UE using the reference signal to perform PDSCH demodulation for G-RNTI scheduling. (6) Rate matching reference signal information.
或者,S209也可以理解为,RAN根据安全激活指示#a为第一广播业务确定第一广播业务对应的上下文。作为一个示例,RAN建立的第一广播业务对应的广播会话上下文中还可以包括:第一广播业务在PLMN#a中的标识TMGI#n、广播的区域信息(例如,小区列表(cell list)的信息、跟踪区列表((tracking area,TA)list)、广播会话的QoS上下文。Alternatively, S209 may also be understood as the RAN determining the context corresponding to the first broadcast service for the first broadcast service according to the security activation indication #a. As an example, the broadcast session context corresponding to the first broadcast service established by the RAN may also include: the identification TMGI#n of the first broadcast service in PLMN#a, broadcast area information (for example, cell list) Information, tracking area list ((tracking area, TA)list), QoS context of the broadcast session.
为了方便说明,下面以RAN根据安全激活指示#a为第一广播业务分配资源为例进行说明。但对本申请的保护范围不造成限定。For convenience of explanation, the following description takes the RAN allocating resources for the first broadcast service according to the security activation indication #a as an example. However, the scope of protection of this application is not limited.
示例1-1,以RAN在与PLMN#a的UE通信之前没有创建第一广播业务对应的资源为例。(1)RAN根据安全激活指示#a确定安全未激活。换句话说,RAN根据安全激活指示#a确定MBSTF#a不针对MBS会话#a承载的第一广播业务的数据进行安全保护。(2)RAN根据服务标识检查是否已经创建第一广播业务对应的资源。Example 1-1 takes as an example that the RAN does not create resources corresponding to the first broadcast service before communicating with the UE of PLMN#a. (1) The RAN determines that security is not activated according to the security activation indication #a. In other words, the RAN determines according to the security activation indication #a that the MBSTF #a does not perform security protection on the data of the first broadcast service carried by the MBS session #a. (2) The RAN checks whether the resource corresponding to the first broadcast service has been created according to the service identifier.
在没有创建该第一广播业务对应的资源,并且安全未激活的情况下,RAN创建该第一广播业务对应的资源#a,建立RAN和UPF#a之间的数据传输通道。When the resource corresponding to the first broadcast service is not created and security is not activated, the RAN creates the resource #a corresponding to the first broadcast service and establishes a data transmission channel between the RAN and UPF #a.
需要说明的是,示例1-1不限制上述(1)和(2)的执行顺序。It should be noted that Example 1-1 does not limit the execution order of (1) and (2) above.
示例1-2,以RAN在与PLMN#a的UE通信之前没有创建该第一广播业务对应的资源为例。(1) RAN确定安全激活指示#a指示安全激活,换句话说,MBSTF#a安全激活指示#a指示对MBS会话#a承载的第一广播业务的数据进行安全保护。(2)RAN根据服务标识检查是否已经创建该第一广播业务对应的资源。Example 1-2 takes as an example that the RAN does not create resources corresponding to the first broadcast service before communicating with the UE of PLMN#a. (1) The RAN determines that the security activation indication #a indicates security activation. In other words, the MBSTF #a security activation indication #a indicates security protection of the data of the first broadcast service carried by the MBS session #a. (2) The RAN checks whether the resource corresponding to the first broadcast service has been created according to the service identifier.
在没有创建该服务标识对应的资源,并且安全激活指示#a指示安全激活的情况下,RAN根据安全激活指示#a确定创建该第一广播业务对应的资源#a,建立RAN和UPF#a之间的数据传输通道。If the resource corresponding to the service identifier is not created and the security activation indication #a indicates security activation, the RAN determines to create the resource #a corresponding to the first broadcast service according to the security activation indication #a, and establishes the relationship between the RAN and UPF #a. data transmission channels between.
需要说明的是,示例1-2不限制上述(1)和(2)的执行顺序。It should be noted that Example 1-2 does not limit the execution order of (1) and (2) above.
示例1-3,以RAN在与PLMN#a的UE通信之前没有创建该第一广播业务对应的资源为例。安全激活指示#a指示安全激活,换句话说,MBSTF#a安全激活指示#a指示对MBS会话#a承载的第一广播业务的数据进行安全保护。其中,RAN可以丢弃服务标识或跳过根据服务标识检查是否已经创建该第一广播业务对应的资源的步骤。Example 1-3 takes as an example that the RAN does not create resources corresponding to the first broadcast service before communicating with the UE of PLMN#a. The security activation indication #a indicates security activation. In other words, the MBSTF #a security activation indication #a indicates security protection of the data of the first broadcast service carried by the MBS session #a. The RAN may discard the service identifier or skip the step of checking whether the resource corresponding to the first broadcast service has been created based on the service identifier.
示例1-4,RAN根据服务标识检查是否已经创建该服务标识对应的资源。在没有创建该服务标识对应的资源的情况下,RAN创建该服务标识对应的资源#a,建立RAN和UPF#a之间的数据传输通道。Example 1-4, RAN checks based on the service identifier whether the resource corresponding to the service identifier has been created. When the resource corresponding to the service identifier is not created, the RAN creates the resource #a corresponding to the service identifier and establishes a data transmission channel between the RAN and UPF#a.
S210用于响应S208。S210 is used to respond to S208.
S211,AF通过PLMN#a中的网元(例如MBSTF#a和UPF#a)向RAN发送媒体流,相应地,RAN通过PLMN#a中的网元接收来自AF的媒体流。S211. The AF sends the media stream to the RAN through the network elements in PLMN#a (such as MBSTF#a and UPF#a). Correspondingly, the RAN receives the media stream from the AF through the network elements in PLMN#a.
例如,AF向MBSTF#a发送第一广播业务的数据,相应地,MBSTF#a接收来自AF的第一广播业务的数据。MBSTF#a对第一广播业务的数据进行处理后生成第一数据。MBSTF#a发送第一数据给UPF#a,相应地,UPF#a接收来自MBSTF#a的第一数据。UPF#a将第一数据发送给RAN,相应地,RAN接收来自UPF#a的第一数据。For example, the AF sends the data of the first broadcast service to MBSTF#a, and accordingly, the MBSTF#a receives the data of the first broadcast service from the AF. MBSTF#a processes the data of the first broadcast service and generates the first data. MBSTF#a sends the first data to UPF#a, and accordingly, UPF#a receives the first data from MBSTF#a. UPF#a sends the first data to the RAN, and accordingly, the RAN receives the first data from UPF#a.
随后,RAN基于资源#a向PLMN#a的UE发送该第一数据。Subsequently, the RAN sends the first data to the UE of PLMN #a based on resource #a.
S212至S219可以参见S201至S208的描述,区别在于将PLMN#a的网元替换为PLMN#b的网元,相应的消息#a、指示#a和标识#a等替换为消息#b、指示#b和标识#b等。其中,NEF#b/MBSF#b获取安全激活状态#b的两种方案,可以理解为方法100中第二网元获取第二指示信息的具体示例。NEF#b/MBSF#b向MB-SMF#b发送安全激活指示#b,可以理解为方法100中S103的一种具体示例。For S212 to S219, please refer to the description of S201 to S208. The difference is that the network element of PLMN#a is replaced by the network element of PLMN#b, and the corresponding message #a, indication #a, and identification #a are replaced with message #b, indication. #b and logo #b etc. Among them, the two solutions for NEF#b/MBSF#b to obtain the security activation status #b can be understood as specific examples of the second network element obtaining the second indication information in the method 100. NEF#b/MBSF#b sends security activation instruction #b to MB-SMF#b, which can be understood as a specific example of S103 in method 100.
S220可以作为方法100中S104的一种具体示例。S220,RAN根据安全激活指示#b和/或安全激活指示#a为第一广播业务分配(或确定)资源,并确定RAN和UPF#a之间传输通道的处理方式。S220 can be used as a specific example of S104 in method 100. S220: The RAN allocates (or determines) resources for the first broadcast service according to the security activation indication #b and/or the security activation indication #a, and determines the processing method of the transmission channel between the RAN and the UPF #a.
示例2-1,与示例1-1至示例1-3中的任一个示例对应。安全激活指示#a指示安全未激活或安全激活。安全激活指示#b指示安全激活,换句话说,安全激活指示#b指示MBSTF#b对MBS会话#b承载的第一广播业务的数据进行安全保护。RAN根据安全激活指示#b确定创建资源#b,建立RAN和UPF#b之间的数据传输通道。其中,RAN可以丢弃服务标识或跳过根据服务标识检查是否已经创建该第一广播业务对应的资源的步骤。Example 2-1 corresponds to any one of Examples 1-1 to 1-3. Security activation indication #a indicates security is not activated or security is activated. The security activation instruction #b indicates security activation. In other words, the security activation instruction #b instructs the MBSTF #b to perform security protection on the data of the first broadcast service carried by the MBS session #b. The RAN determines to create the resource #b according to the security activation instruction #b, and establishes a data transmission channel between the RAN and the UPF #b. The RAN may discard the service identifier or skip the step of checking whether the resource corresponding to the first broadcast service has been created based on the service identifier.
示例2-2,与示例1-1至示例1-3中的任一个示例对应。安全激活指示#a指示安全未激活或安全激活。(1)RAN根据安全激活指示#b确定安全激活,换句话说,安全激活指示#b指示MBSTF#b对MBS会话#b承载的第一广播业务的数据进行安全保护。(2)RAN根据服务标识检查是否已经创建该第一广播业务对应的资源。Example 2-2 corresponds to any one of Examples 1-1 to 1-3. Security activation indication #a indicates security is not activated or security is activated. (1) The RAN determines security activation according to the security activation instruction #b. In other words, the security activation instruction #b instructs MBSTF #b to perform security protection on the data of the first broadcast service carried by MBS session #b. (2) The RAN checks whether the resource corresponding to the first broadcast service has been created according to the service identifier.
RAN根据安全激活指示#b确定不重用资源#a,即不使用相同的资源发送该第一广播业务的数据。RAN根据安全激活指示#b确定创建资源#b,建立RAN和UPF#b之间的数据传输通道。或者,也可以理解为,基站分别创建MBS session ID#a和MBS会话#b承载的资源,从而能够使用不同的资源发送相同的广播业务的数据。The RAN determines not to reuse resource #a according to the security activation indication #b, that is, not to use the same resource to send the data of the first broadcast service. The RAN determines to create the resource #b according to the security activation instruction #b, and establishes a data transmission channel between the RAN and the UPF #b. Alternatively, it can also be understood that the base station creates resources carried by MBS session ID#a and MBS session #b respectively, so that it can use different resources to send the same broadcast service data.
可选地,在RAN检查到资源#a的情况下,RAN根据安全激活指示#a和安全激活指示#b确定不重用资源#a。Optionally, in the case where the RAN detects resource #a, the RAN determines not to reuse resource #a based on the security activation indication #a and the security activation indication #b.
需要说明的是,示例2-2不限制上述(1)和(2)的执行顺序。It should be noted that Example 2-2 does not limit the execution order of (1) and (2) above.
示例2-3,与示例1-2或示例1-3对应。安全激活指示#a指示安全激活。安全激活指示#b指示安全未激活,换句话说,安全激活指示#b指示MBSTF#b不对MBS会话#b承载的第一广播业务的数据进行安全保护。Example 2-3 corresponds to Example 1-2 or Example 1-3. Secure activation indication #a indicates secure activation. The security activation indication #b indicates that security is not activated. In other words, the security activation indication #b indicates that the MBSTF #b does not perform security protection on the data of the first broadcast service carried by the MBS session #b.
RAN根据安全激活指示#a和安全激活指示#b确定不重用资源#a,即不使用相同的资源发送该第一广播业务的数据。RAN根据安全激活指示#b确定创建资源#b,建立RAN和UPF#b之间的数据传输通 道。或者,也可以理解为,基站分别创建MBS session ID#a和MBS会话#b承载的资源,从而能够使用不同的资源发送相同的广播业务的数据。The RAN determines not to reuse the resource #a according to the security activation indication #a and the security activation indication #b, that is, not to use the same resource to send the data of the first broadcast service. RAN determines to create resource #b according to the security activation instruction #b, and establishes a data transmission channel between RAN and UPF#b road. Alternatively, it can also be understood that the base station creates resources carried by MBS session ID #a and MBS session #b respectively, so that it can use different resources to send the same broadcast service data.
另外,上述示例2-1至示例2-3还可以理解为,安全激活指示#a和安全激活指示#b中的至少一个用于指示安全激活,RAN就会分别创建资源#a和资源#b。并分别通过资源#a和资源#b向PLMN#a的UE和PLMN#b的UE发送第一广播业务的数据。In addition, the above examples 2-1 to 2-3 can also be understood that if at least one of the security activation indication #a and the security activation indication #b is used to indicate security activation, the RAN will create resource #a and resource #b respectively. . And sending the data of the first broadcast service to the UE of PLMN#a and the UE of PLMN#b through resource #a and resource #b respectively.
示例2-4,RAN根据服务标识检查是否已经创建该服务标识对应的资源。在没有创建该服务标识对应的资源的情况下,RAN创建该服务标识对应的资源#b,建立RAN和UPF#b之间的数据传输通道。Example 2-4, RAN checks based on the service identifier whether the resource corresponding to the service identifier has been created. When the resource corresponding to the service identifier is not created, the RAN creates the resource #b corresponding to the service identifier and establishes a data transmission channel between the RAN and UPF#b.
S222,AF通过PLMN#b中的网元(例如MBSTF#b和UPF#b)向RAN发送媒体流,相应地,RAN通过PLMN#b中的网元接收来自AF的媒体流。S222: The AF sends the media stream to the RAN through the network elements in PLMN#b (such as MBSTF#b and UPF#b). Correspondingly, the RAN receives the media stream from the AF through the network elements in PLMN#b.
例如,AF向MBSTF#b发送第一广播业务的数据,相应地,MBSTF#b接收来自AF的第一广播业务的数据。MBSTF#b对第一广播业务的数据进行处理后生成第一数据。MBSTF#b发送第一数据给UPF#b,相应地,UPF#b接收来自MBSTF#b的第一数据。UPF#b将第一数据发送给RAN,相应地,RAN接收来自UPF#b的第一数据。For example, the AF sends the data of the first broadcast service to MBSTF#b, and accordingly, the MBSTF#b receives the data of the first broadcast service from the AF. MBSTF#b processes the data of the first broadcast service and generates the first data. MBSTF#b sends the first data to UPF#b, and accordingly, UPF#b receives the first data from MBSTF#b. UPF#b sends the first data to the RAN, and accordingly, the RAN receives the first data from UPF#b.
随后,RAN基于资源#b向PLMN#b的UE发送该第一数据。Subsequently, the RAN sends the first data to the UE of PLMN #b based on resource #b.
需要说明的是,方法200并不限制S211与S222的先后顺序。方法200不限制S211在方法200中的执行顺序,也不限制S222在方法200中的执行顺序。换句话说,不限制RAN何时获取第一广播业务的数据,例如S211可以在确定是否创建资源#a之前或之后,但RAN基于资源#a发送第一广播业务数据需要在建立资源#a之后。例如S222可以在确定是否创建资源#b之前或之后,但RAN基于资源#b发送第一广播业务数据需要在建立资源#b之后。It should be noted that method 200 does not limit the order of S211 and S222. The method 200 does not limit the execution order of S211 in the method 200, nor does it limit the execution order of S222 in the method 200. In other words, there is no limit on when the RAN obtains the data of the first broadcast service. For example, S211 can be before or after determining whether to create resource #a, but the RAN needs to send the first broadcast service data based on resource #a after establishing resource #a. . For example, S222 may be before or after determining whether to create resource #b, but the RAN needs to send the first broadcast service data based on resource #b after establishing resource #b.
还需要说明的是,本申请中为了方便说明方案,仅以两个PLMN为例进行说明,对本申请保护范围并不造成限定。即本申请实施例可以适用于至少两个网络共享接入网网元的场景。在这里进行统一说明,下不赘述。It should also be noted that in this application, in order to facilitate the explanation of the solution, only two PLMNs are used as an example for explanation, which does not limit the scope of protection of this application. That is, the embodiments of this application can be applied to the scenario where at least two networks share access network elements. A unified explanation is given here and will not be repeated below.
上述S201至S222中,均以S208中的广播上下文创建消息携带安全激活指示#a,S219中的广播上下文创建消息携带安全激活指示#b为例进行说明。下面详细介绍S208中的广播上下文创建消息不携带安全激活指示#a,以及S219中的广播上下文创建消息不携带安全激活指示#b的实现方式。In the above S201 to S222, the broadcast context creation message in S208 carries the security activation indication #a, and the broadcast context creation message in S219 carries the security activation indication #b is used as an example for explanation. The following is a detailed introduction to the implementation in which the broadcast context creation message in S208 does not carry the security activation indication #a, and the broadcast context creation message in S219 does not carry the security activation indication #b.
一种实现方式中,S208中的广播上下文创建消息不携带安全激活指示#a。S209中,RAN可以根据广播上下文创建消息确定安全激活指示#a指示安全激活。S219中的广播上下文创建消息不携带安全激活指示#b。S220中,RAN可以根据广播上下文创建消息确定安全激活指示#b指示安全激活。In one implementation, the broadcast context creation message in S208 does not carry the security activation indication #a. In S209, the RAN may determine that the security activation indication #a indicates security activation according to the broadcast context creation message. The broadcast context creation message in S219 does not carry the security activation indication #b. In S220, the RAN may determine that the security activation indication #b indicates security activation according to the broadcast context creation message.
上述方案,能够进一步提高系统安全性能。The above solution can further improve system security performance.
应理解,如果第一网络或第二网络的控制面中的一个或多个网元故障,导致未能指示安全激活。即第一网络或第二网络指示进行安全激活的情况下,RAN未按照收到安全激活的时候处理。很可能带来安全风险,降低通信成功率。It should be understood that if one or more network elements in the control plane of the first network or the second network fail, the security activation cannot be indicated. That is, when the first network or the second network instructs security activation, the RAN does not process the security activation as it was received. It is likely to bring security risks and reduce communication success rate.
另一种实现方式中,S208中的广播上下文创建消息不携带安全激活指示#a。S209中,RAN可以根据广播上下文创建消息确定安全激活指示#a指示安全不激活。S219中的广播上下文创建消息不携带安全激活指示#b。S220中,RAN可以根据广播上下文创建消息确定安全激活指示#b指示安全不激活。In another implementation manner, the broadcast context creation message in S208 does not carry the security activation indication #a. In S209, the RAN may determine according to the broadcast context creation message that the security activation indication #a indicates security inactivation. The broadcast context creation message in S219 does not carry the security activation indication #b. In S220, the RAN may determine according to the broadcast context creation message that the security activation indication #b indicates security inactivation.
上述方案,能够降低信令开销,减小网络消耗。The above solution can reduce signaling overhead and network consumption.
图7示出了本申请提供的广播安全通信的方法300的示意图。下面结合图7,详细介绍本申请提供的广播安全通信的方法300。方法300针对方法100中的实现方式二给出了具体的示例。其中,接入网网元以RAN为例,第一网络以PLMN#a为例,第二网络以PLMN#b为例,第一指示信息以安全激活指示#a为例,第二指示信息以安全激活指示#b为例,第一空口资源以资源#a为例,第二空口资源以资源#b为例进行说明。Figure 7 shows a schematic diagram of a method 300 for broadcasting secure communications provided by this application. The method 300 for broadcasting secure communication provided by this application will be introduced in detail below with reference to Figure 7 . Method 300 provides a specific example for the second implementation method in method 100. Among them, the access network element takes RAN as an example, the first network takes PLMN#a as an example, the second network takes PLMN#b as an example, the first instruction information takes security activation instruction #a as an example, and the second instruction information takes Security activation indication #b is taken as an example, the first air interface resource is taken as resource #a, and the second air interface resource is taken as resource #b.
S301-S308可以参见S201-S208的描述。For S301-S308, please refer to the description of S201-S208.
S309,可以参见S209中除示例1-2、示例1-3以外的描述。其中,RAN确定安全激活指示#a指示安全未激活。For S309, please refer to the description in S209 except Example 1-2 and Example 1-3. Wherein, the RAN determines that the security activation indication #a indicates that security is not activated.
S310-S318可以参见S210、S212-S219的描述。For S310-S318, please refer to the description of S210 and S212-S219.
S319可以作为方法100中S104的一种具体示例。S319,RAN根据安全激活指示#b和安全激活指示#a为第一广播业务分配(或确定)资源,并确定RAN和UPF之间传输通道的处理方式。 S319 can be used as a specific example of S104 in method 100. S319: The RAN allocates (or determines) resources for the first broadcast service according to the security activation indication #b and the security activation indication #a, and determines the processing method of the transmission channel between the RAN and the UPF.
例如,安全激活指示#a指示安全未激活。安全激活指示#b指示安全未激活,换句话说,MBSTF#b安全激活指示#b指示不对MBS会话#b承载的第一广播业务的数据进行安全保护。RAN根据S309中存储的安全激活指示#a和安全激活指示#b确定不创建资源#b,或,复用资源#a。并且,RAN根据安全激活指示#a和安全激活指示#b确定不建立RAN和UPF#b之间的数据传输通道;或者,确定建立RAN和UPF#b之间的数据传输通道,但丢弃该数据传输通道中的第一广播业务的数据。For example, security activation indication #a indicates that security is not activated. The security activation indication #b indicates that security is not activated. In other words, the MBSTF #b security activation indication #b indicates that the data of the first broadcast service carried by the MBS session #b is not to be security protected. The RAN determines not to create resource #b or to multiplex resource #a according to the security activation indication #a and security activation indication #b stored in S309. Furthermore, the RAN determines not to establish a data transmission channel between the RAN and the UPF#b according to the security activation indication #a and the security activation indication #b; or, determines to establish a data transmission channel between the RAN and the UPF#b, but discards the data. Data of the first broadcast service in the transmission channel.
S320响应于S318。S320 responds to S318.
S321,AF通过PLMN#a中的网元(例如UPF#a)向RAN发送媒体流(即上述第一广播业务的数据),相应地,RAN通过PLMN#a中的网元接收来自AF的媒体流。S321, AF sends the media stream (that is, the data of the above-mentioned first broadcast service) to RAN through the network element in PLMN#a (for example, UPF#a). Correspondingly, RAN receives the media from AF through the network element in PLMN#a. flow.
RAN获取第一广播业务的数据后,基于资源#a向PLMN#a的UE和PLMN#b的UE发送该第一广播业务的数据。After acquiring the data of the first broadcast service, the RAN sends the data of the first broadcast service to the UE of PLMN #a and the UE of PLMN #b based on resource #a.
可以理解的是,安全激活指示#a和安全激活指示#b均指示安全未激活,RAN就会为第一广播业务只创建一份资源(方法300中以资源#a为例),并通过资源#a向PLMN#a的UE和PLMN#b的UE发送第一广播业务的数据(S321中RAN通过PLMN#a从AF获取的第一广播业务的数据)。It can be understood that if both the security activation indication #a and the security activation indication #b indicate that security is not activated, the RAN will only create one resource for the first broadcast service (resource #a is used as an example in method 300), and use the resource #a sends the data of the first broadcast service to the UE of PLMN #a and the UE of PLMN #b (the data of the first broadcast service obtained by the RAN from the AF through PLMN #a in S321).
可选地,方法300还包括:步骤1,AF通过PLMN#b中的网元(例如UPF#b)向RAN发送媒体流(即上述第一广播业务的数据),相应地,RAN通过PLMN#b中的网元接收来自AF的媒体流。Optionally, the method 300 also includes: Step 1, the AF sends the media stream (that is, the data of the above-mentioned first broadcast service) to the RAN through the network element in PLMN#b (for example, UPF#b). Correspondingly, the RAN sends the media stream through the PLMN#b. The network element in b receives the media stream from AF.
RAN根据安全激活指示#a和安全激活指示#b丢弃从PLMN#b中的网元接收的第一广播业务的数据。The RAN discards the data of the first broadcast service received from the network element in PLMN #b according to the security activation indication #a and the security activation indication #b.
需要说明的是,方法300并不限制S321与步骤1的先后顺序。方法300不限制S321在方法300中的执行顺序,也不限制步骤1在方法300中的执行顺序。换句话说,不限制RAN何时获取第一广播业务的数据,例如S321可以在确定是否创建资源#a之前或之后,但RAN基于资源#a发送第一广播业务数据需要在建立资源#a之后。例如步骤1可以在确定是否创建资源#b之前或之后。It should be noted that method 300 does not limit the order of S321 and step 1. Method 300 does not limit the execution order of S321 in method 300, nor does it limit the execution order of step 1 in method 300. In other words, there is no limit on when the RAN obtains the data of the first broadcast service. For example, S321 can be before or after determining whether to create resource #a, but the RAN needs to send the first broadcast service data based on resource #a after establishing resource #a. . For example step 1 can be before or after determining whether to create resource #b.
上述S301至S321中,均以S308中的广播上下文创建消息携带安全激活指示#a,S318中的广播上下文创建消息携带安全激活指示#b为例进行说明。下面详细介绍S308中的广播上下文创建消息不携带安全激活指示#a,以及S318中的广播上下文创建消息不携带安全激活指示#b的实现方式。In the above S301 to S321, the broadcast context creation message in S308 carries the security activation indication #a, and the broadcast context creation message in S318 carries the security activation indication #b is used as an example for explanation. The following is a detailed introduction to the implementation in which the broadcast context creation message in S308 does not carry the security activation indication #a, and the broadcast context creation message in S318 does not carry the security activation indication #b.
一种实现方式中,S308中的广播上下文创建消息不携带安全激活指示#a。S309中,RAN可以根据广播上下文创建消息确定安全激活指示#a指示安全不激活。S318中的广播上下文创建消息不携带安全激活指示#b。S319中,RAN可以根据广播上下文创建消息确定安全激活指示#b指示安全不激活。In one implementation, the broadcast context creation message in S308 does not carry the security activation indication #a. In S309, the RAN may determine according to the broadcast context creation message that the security activation indication #a indicates security inactivation. The broadcast context creation message in S318 does not carry the security activation indication #b. In S319, the RAN may determine that the security activation indication #b indicates security inactivation according to the broadcast context creation message.
上述方案,能够降低信令开销,减小网络消耗。The above solution can reduce signaling overhead and network consumption.
图8示出了本申请提供的广播安全通信的方法400的示意图。下面结合图8,详细介绍本申请提供的广播安全通信的方法400。Figure 8 shows a schematic diagram of a method 400 for broadcasting secure communications provided by this application. The method 400 for broadcasting secure communication provided by this application will be introduced in detail below with reference to Figure 8 .
S401,第一网络中的第一网元向接入网网元发送第一会话建立请求,相应地,接入网网元接收来自第一网络中的第一网元的针对第一广播业务的第一会话建立请求。S401. The first network element in the first network sends a first session establishment request to the access network element. Correspondingly, the access network element receives a request for the first broadcast service from the first network element in the first network. First session establishment request.
示例性地,第一网元可以是控制面网元。For example, the first network element may be a control plane network element.
示例性地,第一网元可以直接向接入网网元发送第一会话建立请求,也可以通过第一网络中的其他网元向接入网网元发送第一会话建立请求,例如,第一网元可以是MB-SMF#a,例如,第一网元可以是NEF/MBSF#a。或者,这里的第一会话创建请求消息还可以是其他消息,例如,第一网元可以是MBSTF#a。For example, the first network element may directly send the first session establishment request to the access network element, or may send the first session establishment request to the access network element through other network elements in the first network, for example, One network element may be MB-SMF#a, for example, the first network element may be NEF/MBSF#a. Alternatively, the first session creation request message here may also be other messages. For example, the first network element may be MBSTF#a.
S402,响应于第一会话建立请求,接入网网元为第一广播业务分配第一空口资源。S402: In response to the first session establishment request, the access network element allocates the first air interface resource to the first broadcast service.
作为一个示例,假设接入网网元在接收到第一会话建立请求之前,还未创建第一广播业务对应的资源。As an example, assume that the access network element has not created resources corresponding to the first broadcast service before receiving the first session establishment request.
作为另一个示例,假设接入网网元在接收到第一会话建立请求之前,已经存在第一广播业务对应的资源。可选地,第一会话建立请求也可以携带一个第四指示信息,该第四指示信息用于指示针对第一广播业务是否复用已有的空口资源。那么,接入网网元为第一广播业务分配第一空口资源的实现方式可以参见S404中相关的描述。换句话说,假设接入网网元在接收到第一会话建立请求之前,已经建第一广播业务对应的资源,那么本申请中接入网网元与第一网元之间的交互,可以参见接入网网元与第二网元之间的交互。As another example, assume that before the access network element receives the first session establishment request, resources corresponding to the first broadcast service already exist. Optionally, the first session establishment request may also carry a fourth indication information, the fourth indication information being used to indicate whether to reuse existing air interface resources for the first broadcast service. Then, the implementation method for the access network element to allocate the first air interface resource for the first broadcast service can refer to the relevant description in S404. In other words, assuming that the access network element has already established resources corresponding to the first broadcast service before receiving the first session establishment request, then the interaction between the access network element and the first network element in this application can be See the interaction between the access network element and the second network element.
S403,所述第二网元向接入网网元发送针对第一广播业务的第二会话建立请求,相应地,接入网 网元接收来自第二网络中的第二网元的针对第一广播业务的第二会话建立请求。S403: The second network element sends a second session establishment request for the first broadcast service to the access network element. Correspondingly, the access network The network element receives a second session establishment request for the first broadcast service from the second network element in the second network.
其中,第二会话建立请求中包括第三指示信息,第三指示信息用于指示针对第一广播业务是否复用已有的空口资源。应理解,这里的已有的空口资源为接入网网元已经建立的针对第一广播业务的空口资源。或者,这里的已有的空口资源为接入网网元已经建立的用于传输第一广播业务的数据的空口资源。这里的第一广播业务的数据可以来自第二网络,也可以来自其他网络。例如,在S402中接入网网元已经建立第一空口资源的情况下,这里的已有的空口资源包括第一空口资源。The second session establishment request includes third indication information, and the third indication information is used to indicate whether to reuse existing air interface resources for the first broadcast service. It should be understood that the existing air interface resources here are air interface resources for the first broadcast service that have been established by the access network element. Alternatively, the existing air interface resources here are air interface resources that have been established by the access network element for transmitting data of the first broadcast service. The data of the first broadcast service here may come from the second network or other networks. For example, in the case where the access network element has established the first air interface resource in S402, the existing air interface resources here include the first air interface resource.
示例性地,第二网元可以是控制面网元。For example, the second network element may be a control plane network element.
示例性地,第二网元可以直接向接入网网元发送第二会话建立请求,也可以通过第二网络中的其他网元向接入网网元发送第二会话建立请求。例如,第二网元可以是MB-SMF#b,例如,第二网元可以是NEF/MBSF#b。或者,这里的第二会话创建请求消息还可以是承载第三指示信息的其他消息,例如,第二网元可以是用户面网元(例如MBSTF#b)。For example, the second network element may directly send the second session establishment request to the access network element, or may send the second session establishment request to the access network element through other network elements in the second network. For example, the second network element may be MB-SMF#b. For example, the second network element may be NEF/MBSF#b. Alternatively, the second session creation request message here may also be other messages carrying third indication information. For example, the second network element may be a user plane network element (for example, MBSTF#b).
可选地,方法400还包括:第二网元获取第三指示信息。具体地,第二网元根据其他信息(例如安全激活指示或安全配置信息)确定第三指示信息。或者,第二网元从第二网络的其他网元接收第三指示信息。例如,安全激活指示安全已激活或安全激活已开启的情况下,第二网元根据安全激活指示确定第三指示信息用于指示不复用已有的空口资源。安全激活指示安全未激活或安全激活未开启的情况下,第二网元根据安全激活指示确定第三指示信息用于指示复用已有的空口资源。再例如,安全配置信息指示对第一广播业务的数据进行安全保护的情况下,第二网元根据安全配置信息确定第三指示信息用于指示不复用已有的空口资源。安全配置信息指示对第一广播业务的数据不进行安全保护的情况下,第二网元根据安全配置信息确定第三指示信息用于指示复用已有的空口资源。Optionally, method 400 further includes: the second network element obtains third indication information. Specifically, the second network element determines the third indication information based on other information (such as security activation indication or security configuration information). Alternatively, the second network element receives the third indication information from other network elements of the second network. For example, when the security activation indicates that security has been activated or security activation has been turned on, the second network element determines the third indication information according to the security activation indication to indicate not to reuse existing air interface resources. When the security activation indication indicates that security is not activated or security activation is not enabled, the second network element determines the third indication information according to the security activation indication to indicate reuse of existing air interface resources. For another example, when the security configuration information indicates security protection of data of the first broadcast service, the second network element determines the third indication information based on the security configuration information to indicate not to reuse existing air interface resources. When the security configuration information indicates that the data of the first broadcast service is not subject to security protection, the second network element determines the third indication information based on the security configuration information to instruct the reuse of existing air interface resources.
S404,响应于第二会话建立请求,接入网网元根据第三指示信息确定是否复用第一空口资源。S404: In response to the second session establishment request, the access network element determines whether to reuse the first air interface resource according to the third indication information.
下面针对S404给出几种可能的实现方式。Several possible implementation methods for S404 are given below.
实现方式一,接入网网元不复用第一空口资源。Implementation method 1: The access network element does not reuse the first air interface resource.
第三指示信息用于指示针对所述第一广播业务不复用已有的空口资源的情况下,所述接入网网元根据所述第三指示信息确定不复用所述第一空口资源。When the third indication information is used to indicate not to reuse the existing air interface resources for the first broadcast service, the access network element determines not to reuse the first air interface resources according to the third indication information. .
作为一个示例,第三指示信息用于指示针对第一广播业务不复用已有的空口资源的情况下,第三指示信息指示根据第二会话建立请求对应的会话标识为第一广播业务分配空口资源,或者,第三指示信息指示不根据第一广播业务对应的服务标识为第一广播业务分配空口资源。接入网网元检查是否存在第二会话建立请求对应的会话标识对应的空口资源;在不存在第二会话建立请求对应的会话标识对应的空口资源的情况下,接入网网元确定针对第一广播业务不复用第一空口资源。As an example, the third indication information is used to indicate that the existing air interface resources are not to be reused for the first broadcast service. The third indication information indicates that the air interface is allocated to the first broadcast service according to the session identifier corresponding to the second session establishment request. resources, or the third indication information indicates not to allocate air interface resources to the first broadcast service according to the service identifier corresponding to the first broadcast service. The access network element checks whether there is an air interface resource corresponding to the session identifier corresponding to the second session establishment request; if there is no air interface resource corresponding to the session identifier corresponding to the second session establishment request, the access network element determines whether the air interface resource corresponding to the session identifier corresponding to the second session establishment request exists. A broadcast service does not reuse the first air interface resource.
其中,接入网网元不复用第一空口资源,还可以理解为:接入网网元为从第二网络接收的第一广播业务的数据创建第二空口资源,且第一空口资源与第二空口资源不同。Wherein, the access network element does not reuse the first air interface resource, which can also be understood as: the access network element creates the second air interface resource for the data of the first broadcast service received from the second network, and the first air interface resource is the same as the first air interface resource. The second air interface resources are different.
可选地,方法400还包括:接入网网元建立接入网网元和第二网络的用户面网元(例如UPF#b)之间的数据传输通道,并通过该数据传输通道从第二网络的用户面网元接收第一广播业务的第二数据。其中,关于接入网网元从第二网络的用户面网元接收第一广播业务的第二数据,可以参见方法100中对于第二数据的说明。Optionally, the method 400 further includes: the access network element establishing a data transmission channel between the access network element and the user plane network element (for example, UPF#b) of the second network, and transmitting data from the first network element to the second network through the data transmission channel. The user plane network element of the second network receives the second data of the first broadcast service. Regarding the access network element receiving the second data of the first broadcast service from the user plane network element of the second network, please refer to the description of the second data in method 100.
可选地,方法400还包括:接入网网元从第一网络的用户面网元接收第一广播业务的第一数据,接入网网元基于第一空口资源向第一网络的终端设备发送第一广播业务的第一数据;接入网网元基于第一空口资源向第二网络的终端设备发送第一广播业务的第二数据。其中,关于接入网网元从第一网络的用户面网元接收第一广播业务的第一数据,可以参见方法100中对于第一数据的说明。Optionally, the method 400 further includes: the access network element receives the first data of the first broadcast service from the user plane network element of the first network, and the access network element transmits the data to the terminal device of the first network based on the first air interface resource. Send first data of the first broadcast service; and the access network element sends second data of the first broadcast service to the terminal device of the second network based on the first air interface resource. Regarding the access network element receiving the first data of the first broadcast service from the user plane network element of the first network, please refer to the description of the first data in method 100.
上述方案,在能够实现第一网络和第二网络对第一广播业务的数据进行安全保护的同时,也使得第一网络和第二网络的终端设备能够分别对接收到的第一广播业务的数据进行解密和/或完整性校验,提高通信安全性能,提升用户体验。The above solution not only enables the first network and the second network to securely protect the data of the first broadcast service, but also enables the terminal devices of the first network and the second network to separately protect the received data of the first broadcast service. Perform decryption and/or integrity verification to improve communication security and user experience.
实现方式二,接入网网元复用第一空口资源。Implementation method two: the access network element reuses the first air interface resource.
第三指示信息用于指示针对第一广播业务复用已有的空口资源的情况下,接入网网元根据第三指示信息确定复用第一空口资源。When the third indication information is used to instruct the existing air interface resources to be reused for the first broadcast service, the access network element determines to reuse the first air interface resources according to the third indication information.
作为一个示例,所述第三指示信息指示根据所述第一广播业务对应的服务标识为所述第一广播业务分配空口资源。接入网网元根据已经存在第一广播业务对应的服务标识对应的第一空口资源确定针 对第一广播业务复用第一空口资源。As an example, the third indication information indicates that air interface resources are allocated to the first broadcast service according to the service identifier corresponding to the first broadcast service. The access network element determines the target based on the first air interface resource corresponding to the service identifier corresponding to the first broadcast service. The first air interface resource is multiplexed for the first broadcast service.
可选地,方法400还包括:接入网网元不建立接入网网元和第二网络的用户面网元(例如UPF#b)之间的数据传输通道;或者,接入网网元确定建立接入网网元和第二网络的用户面网元之间的数据传输通道,但丢弃该数据传输通道中的第一广播业务的第二数据。这里的第二数据可以参见方法100中对于第二数据的说明。Optionally, the method 400 also includes: the access network element does not establish a data transmission channel between the access network element and the user plane network element of the second network (for example, UPF#b); or, the access network element It is determined to establish a data transmission channel between the access network element and the user plane network element of the second network, but discard the second data of the first broadcast service in the data transmission channel. For the second data here, please refer to the description of the second data in method 100.
可选地,方法400还包括:接入网网元基于第一空口资源向第一网络的终端设备和第二网络的终端设备发送第一广播业务的第一数据。这里的第一数据可以参见方法100中对于第一数据的说明。Optionally, the method 400 further includes: the access network element sending the first data of the first broadcast service to the terminal device of the first network and the terminal device of the second network based on the first air interface resource. For the first data here, please refer to the description of the first data in method 100.
上述方案,能够节省空口资源。The above solution can save air interface resources.
图9示出了本申请提供的广播安全通信的方法500的示意图。下面结合图9,详细介绍本申请提供的广播安全通信的方法500。方法500针对方法400中的实现方式一给出了具体的示例。其中,接入网网元以RAN为例,第一网络以PLMN#a为例,第二网络以PLMN#b为例,第一指示信息以安全激活指示#a为例,第二指示信息以安全激活指示#b为例,第一空口资源以资源#a为例,第二空口资源以资源#b为例进行说明。Figure 9 shows a schematic diagram of a method 500 for broadcasting secure communications provided by this application. The method 500 for broadcasting secure communication provided by this application will be introduced in detail below with reference to Figure 9 . Method 500 provides a specific example for implementation method 1 in method 400. Among them, the access network element takes RAN as an example, the first network takes PLMN#a as an example, the second network takes PLMN#b as an example, the first instruction information takes security activation instruction #a as an example, and the second instruction information takes Security activation indication #b is taken as an example, the first air interface resource is taken as resource #a, and the second air interface resource is taken as resource #b.
S501参见S201-S207的描述。该描述包括:NEF#a/MBSF#a向MB-SMF#a发送安全激活指示#a,相应地,MB-SMF#a接收来自NEF#a/MBSF#a的安全激活指示#a。S501 refers to the description of S201-S207. The description includes: NEF#a/MBSF#a sends security activation indication #a to MB-SMF#a, and accordingly, MB-SMF#a receives security activation indication #a from NEF#a/MBSF#a.
S502,MB-SMF#a根据安全激活指示#a确定优化指示#a。S502, MB-SMF#a determines the optimization instruction #a according to the security activation instruction #a.
优化指示#a用于指示RAN是否根据服务标识为第一广播业务分配资源。或者,优化指示#a用于指示RAN是否复用服务标识对应的已有的资源。或者,优化指示#a用于指示RAN是否复用已有的为第一广播业务分配的资源。方法500中的资源参见方法200中的相关描述。Optimization indication #a is used to indicate whether the RAN allocates resources for the first broadcast service according to the service identifier. Alternatively, the optimization indication #a is used to indicate whether the RAN reuses the existing resources corresponding to the service identifier. Alternatively, the optimization indication #a is used to indicate whether the RAN reuses existing resources allocated for the first broadcast service. For resources in method 500, please refer to the relevant description in method 200.
例如,安全激活指示#a指示安全未激活的情况下,MB-SMF#a根据安全激活指示#a确定的优化指示#a,用于指示RAN根据服务标识为第一广播业务分配资源。或者,安全激活指示#a指示安全未激活的情况下,MB-SMF#a根据安全激活指示#a确定的优化指示#a,用于指示RAN复用已有的资源。For example, when the security activation indication #a indicates that security is not activated, the optimization indication #a determined by the MB-SMF#a based on the security activation indication #a is used to instruct the RAN to allocate resources to the first broadcast service based on the service identifier. Alternatively, when the security activation indication #a indicates that security is not activated, the MB-SMF#a determines the optimization indication #a based on the security activation indication #a to instruct the RAN to reuse existing resources.
再例如,安全激活指示#a指示安全激活的情况下,MB-SMF#a根据安全激活指示#a确定的优化指示#a,用于指示RAN不根据服务标识为第一广播业务分配资源。或者,安全激活指示#a指示安全激活的情况下,MB-SMF#a根据安全激活指示#a确定的优化指示#a,用于指示RAN不复用已有的资源。可选地,不根据服务标识为第一广播业务分配资源,可以理解为,根据MBS会话#a的会话标识(例如称为会话标识#a)为第一广播业务分配资源。For another example, when the security activation indication #a indicates security activation, the optimization indication #a determined by the MB-SMF#a based on the security activation indication #a is used to instruct the RAN not to allocate resources for the first broadcast service based on the service identifier. Alternatively, when the security activation indication #a indicates security activation, the MB-SMF#a determines the optimization indication #a based on the security activation indication #a to instruct the RAN not to reuse existing resources. Optionally, instead of allocating resources to the first broadcast service based on the service identifier, it can be understood that resources are allocated to the first broadcast service based on the session identifier of MBS session #a (for example, called session identifier #a).
本申请中的优化指示#a可以有多种指示方式,在这里进行统一说明。示例性的,优化指示#a取值可以是正确(true)或错误(false)。其中,true代表指示RAN根据服务标识为第一广播业务分配资源,或,指示RAN复用已有的资源。false代表指示RAN不根据服务标识为第一广播业务分配资源,或,指示RAN不复用已有的资源。或者,优化指示#a取值可以是1或0。1代表指示RAN根据服务标识为第一广播业务分配资源,或,指示RAN复用已有的资源。0代表指示RAN不根据服务标识为第一广播业务分配资源,或,指示RAN不复用已有的资源。The optimization instruction #a in this application can have multiple instruction methods, which will be described uniformly here. For example, the value of optimization instruction #a can be correct (true) or wrong (false). Among them, true means instructing the RAN to allocate resources for the first broadcast service according to the service identifier, or instructing the RAN to reuse existing resources. false means instructing the RAN not to allocate resources for the first broadcast service based on the service identifier, or instructing the RAN not to reuse existing resources. Alternatively, the value of optimization indication #a may be 1 or 0. 1 indicates instructing the RAN to allocate resources for the first broadcast service according to the service identifier, or instructs the RAN to reuse existing resources. 0 represents instructing the RAN not to allocate resources for the first broadcast service based on the service identifier, or instructing the RAN not to reuse existing resources.
S503,MB-SMF#a向RAN发送广播上下文创建消息,相应地,RAN接收来自MB-SMF#a的广播上下文创建消息。消息中携带MBS session ID#a。该消息中可选携带服务标识和优化指示#a。S503. MB-SMF#a sends a broadcast context creation message to the RAN. Correspondingly, the RAN receives the broadcast context creation message from MB-SMF#a. The message carries MBS session ID#a. This message optionally carries the service identifier and optimization instruction #a.
S504,RAN根据优化指示#a为第一广播业务分配(或确定)资源,并确定RAN和UPF之间传输通道的处理方式。S504: The RAN allocates (or determines) resources for the first broadcast service according to the optimization instruction #a, and determines the processing method of the transmission channel between the RAN and the UPF.
RAN存储优化指示#a和服务标识的对应关系。可选地,在未携带服务标识的情况下,基站可以根据本地配置和会话标识确定服务标识。RAN stores the corresponding relationship between optimization indication #a and service identifier. Optionally, if the service identifier is not carried, the base station can determine the service identifier based on the local configuration and session identifier.
或者,S504也可以理解为,RAN根据优化指示为第一广播业务确定第一广播业务对应的上下文。Alternatively, S504 may also be understood to mean that the RAN determines the context corresponding to the first broadcast service for the first broadcast service according to the optimization instruction.
为了方便说明,下面以RAN根据优化指示#a为第一广播业务分配资源为例进行说明。但对本申请的保护范围不造成限定。For convenience of explanation, the following description takes the RAN allocating resources for the first broadcast service according to the optimization instruction #a as an example. However, the scope of protection of this application is not limited.
示例3-1,(1)RAN根据优化指示#a确定不复用为第一广播业务已分配的资源,优化指示#a指示RAN不根据服务标识为第一广播业务分配资源,或,指示RAN不复用已有的资源。(2)RAN根据服务标识检查是否已经创建第一广播业务对应的资源。根据(1)和(2),RAN创建该第一广播业务对应的资源#a,建立RAN和UPF#a之间的数据传输通道。Example 3-1, (1) RAN determines not to reuse the resources allocated for the first broadcast service according to the optimization instruction #a, and the optimization instruction #a instructs the RAN not to allocate resources for the first broadcast service according to the service identifier, or instructs the RAN Do not reuse existing resources. (2) The RAN checks whether the resource corresponding to the first broadcast service has been created according to the service identifier. According to (1) and (2), RAN creates resource #a corresponding to the first broadcast service and establishes a data transmission channel between RAN and UPF #a.
需要说明的是,示例3-1不限制上述(1)和(2)的执行顺序。 It should be noted that Example 3-1 does not limit the execution order of (1) and (2) above.
或者,示例3-1中的(1)可以替换为:RAN根据优化指示#a为第一广播业务分配资源,该优化指示#a指示RAN根据会话标识#a为第一广播业务分配资源。示例性的,RAN根据会话标识#a检查是否已经创建该会话标识#a对应的资源。在未找到会话标识#a对应的资源的情况下,确定RAN未创建该会话标识#a对应的资源。Alternatively, (1) in Example 3-1 may be replaced with: the RAN allocates resources to the first broadcast service according to the optimization instruction #a, and the optimization instruction #a instructs the RAN to allocate resources to the first broadcast service according to the session identifier #a. For example, the RAN checks according to the session identifier #a whether the resource corresponding to the session identifier #a has been created. If the resource corresponding to the session identifier #a is not found, it is determined that the RAN has not created the resource corresponding to the session identifier #a.
示例3-2,(1)RAN确定优化指示#a指示RAN不根据服务标识为第一广播业务分配资源,或,指示RAN不复用已有的资源。(2)RAN根据优化指示#a确定创建该第一广播业务对应的资源#a,建立RAN和UPF#a之间的数据传输通道。其中,RAN可以丢弃服务标识或跳过根据服务标识检查是否已经创建该第一广播业务对应的资源的步骤。Example 3-2, (1) RAN determines that the optimization indication #a instructs RAN not to allocate resources for the first broadcast service according to the service identifier, or instructs RAN not to reuse existing resources. (2) The RAN determines to create the resource #a corresponding to the first broadcast service according to the optimization instruction #a, and establishes a data transmission channel between the RAN and the UPF #a. The RAN may discard the service identifier or skip the step of checking whether the resource corresponding to the first broadcast service has been created based on the service identifier.
或者,示例3-2中的(1)替换为:RAN确定优化指示#a指示RAN根据会话标识#a为第一广播业务分配资源。RAN根据会话标识#a检查是否已经创建该会话标识#a对应的资源。在未找到会话标识#a对应的资源的情况下,确定RAN未创建该会话标识#a对应的资源。Or, (1) in Example 3-2 is replaced with: the RAN determines that the optimization indication #a instructs the RAN to allocate resources to the first broadcast service according to the session identifier #a. The RAN checks according to the session identifier #a whether the resource corresponding to the session identifier #a has been created. If the resource corresponding to the session identifier #a is not found, it is determined that the RAN has not created the resource corresponding to the session identifier #a.
示例3-3,以RAN在与PLMN#a的UE通信之前没有创建该第一广播业务对应的资源为例。(1)RAN确定优化指示#a指示RAN根据服务标识为第一广播业务分配资源,或,指示RAN复用已有的资源。(2)RAN根据服务标识检查是否已经创建该第一广播业务对应的资源。Example 3-3 takes as an example that the RAN does not create resources corresponding to the first broadcast service before communicating with the UE of PLMN#a. (1) The RAN determines that the optimization indication #a instructs the RAN to allocate resources for the first broadcast service according to the service identifier, or instructs the RAN to reuse existing resources. (2) The RAN checks whether the resource corresponding to the first broadcast service has been created according to the service identifier.
在没有创建该第一广播业务对应的资源的情况下,RAN根据优化指示#a确定创建该第一广播业务对应的资源#a,建立RAN和UPF#a之间的数据传输通道。If the resource corresponding to the first broadcast service is not created, the RAN determines to create the resource #a corresponding to the first broadcast service according to the optimization instruction #a, and establishes a data transmission channel between the RAN and UPF #a.
需要说明的是,示例3-3不限制上述(1)和(2)的执行顺序。It should be noted that Example 3-3 does not limit the execution order of (1) and (2) above.
S505用于响应S503。S505 is used to respond to S503.
S506,具体可以参见S211的描述。S506, please refer to the description of S211 for details.
S507,参见S212-S218的描述。该描述包括:NEF#b/MBSF#b向MB-SMF#b发送安全激活指示#b,相应地,MB-SMF#b接收来自NEF#b/MBSF#b的安全激活指示#b。S507, see the description of S212-S218. The description includes: NEF#b/MBSF#b sends security activation indication #b to MB-SMF#b, and accordingly, MB-SMF#b receives security activation indication #b from NEF#b/MBSF#b.
S508,MB-SMF#b根据安全激活指示#b确定优化指示#b。S508, MB-SMF#b determines the optimization instruction #b according to the security activation instruction #b.
具体可以参见S502的描述,区别在于:将S502中的MB-SMF#a替换为S508中的MB-SMF#b,将S502中的优化指示#a替换为S508中的优化指示#b,将S502中的安全激活指示#a替换为S508中的安全激活指示#b。For details, please refer to the description of S502. The difference is: replace MB-SMF#a in S502 with MB-SMF#b in S508, replace optimization instruction #a in S502 with optimization instruction #b in S508, replace S502 The security activation indication #a in S508 is replaced with the security activation indication #b in S508.
S509,MB-SMF#b向RBN发送广播上下文创建消息,相应地,RBN接收来自MB-SMF#b的广播上下文创建消息。消息中携带MBS session ID#b。该消息中可选携带服务标识和优化指示#b。S509, MB-SMF#b sends a broadcast context creation message to the RBN. Correspondingly, the RBN receives the broadcast context creation message from MB-SMF#b. The message carries MBS session ID#b. This message optionally carries the service identifier and optimization instruction #b.
S510,RAN根据优化指示#b和/或优化指示#a为第一广播业务分配(或确定)资源,并确定RAN和UPF#a之间传输通道的处理方式。S510: The RAN allocates (or determines) resources for the first broadcast service according to the optimization instruction #b and/or the optimization instruction #a, and determines the processing method of the transmission channel between the RAN and the UPF #a.
示例4-1,与示例3-1至示例3-3中的任一个示例对应。(1)RAN确定优化指示#b指示RAN不根据服务标识为第一广播业务分配资源,或,指示RAN不复用已有的资源。(2)RAN根据优化指示#b确定创建资源#b,建立RAN和UPF#b之间的数据传输通道。其中,RAN可以丢弃服务标识或跳过根据服务标识检查是否已经创建该第一广播业务对应的资源的步骤。Example 4-1 corresponds to any one of Example 3-1 to Example 3-3. (1) The RAN determines that the optimization indication #b instructs the RAN not to allocate resources for the first broadcast service according to the service identifier, or instructs the RAN not to reuse existing resources. (2) RAN determines to create resource #b according to optimization instruction #b, and establishes a data transmission channel between RAN and UPF #b. The RAN may discard the service identifier or skip the step of checking whether the resource corresponding to the first broadcast service has been created based on the service identifier.
或者,将示例4-1中的(1)替换为:RAN确定优化指示#b指示RAN根据会话标识#b为第一广播业务分配资源。Or, replace (1) in Example 4-1 with: the RAN determines that the optimization indication #b instructs the RAN to allocate resources to the first broadcast service according to the session identifier #b.
示例4-2,与示例3-1至示例3-3中的任一个示例对应。(1)RAN确定优化指示#b指示RAN不根据服务标识为第一广播业务分配资源,或,指示RAN不复用已有的资源。(2)RAN根据服务标识检查是否已经创建该第一广播业务对应的资源。Example 4-2 corresponds to any one of Examples 3-1 to 3-3. (1) The RAN determines that the optimization indication #b instructs the RAN not to allocate resources for the first broadcast service according to the service identifier, or instructs the RAN not to reuse existing resources. (2) The RAN checks whether the resource corresponding to the first broadcast service has been created according to the service identifier.
RAN根据优化指示#a和优化指示#b确定不重用资源#a,即不使用相同的资源发送该第一广播业务的数据。RAN根据优化指示#b确定创建资源#b,建立RAN和UPF#b之间的数据传输通道。或者,也可以理解为,基站分别创建MBS session ID#a和MBS session ID#b对应的资源,从而能够使用不同的资源发送相同的广播业务的数据。The RAN determines not to reuse resource #a according to optimization instruction #a and optimization instruction #b, that is, not to use the same resource to send the data of the first broadcast service. RAN determines to create resource #b according to optimization instruction #b, and establishes a data transmission channel between RAN and UPF #b. Alternatively, it can also be understood that the base station creates resources corresponding to MBS session ID#a and MBS session ID#b respectively, so that it can use different resources to send the same broadcast service data.
可选地,在RAN检查到资源#a的情况下,RAN根据安全激活指示#a和安全激活指示#b确定不重用资源#a。Optionally, in the case where the RAN detects resource #a, the RAN determines not to reuse resource #a based on the security activation indication #a and the security activation indication #b.
需要说明的是,示例4-2不限制上述(1)和(2)的执行顺序。It should be noted that Example 4-2 does not limit the execution order of (1) and (2) above.
或者,将示例4-2中的(1)替换为:RAN确定优化指示#b指示RAN根据会话标识#b为第一广播业务分配资源。 Or, replace (1) in Example 4-2 with: the RAN determines that the optimization indication #b instructs the RAN to allocate resources to the first broadcast service according to the session identifier #b.
示例4-3,与示例3-1或示例3-2对应。优化指示#a指示RAN不根据服务标识为第一广播业务分配资源,或,指示RAN不复用已有的资源,或,指示RAN根据会话标识#a为第一广播业务分配资源。优化指示#b指示RAN根据服务标识为第一广播业务分配资源,或,指示RAN复用已有的资源。Example 4-3 corresponds to Example 3-1 or Example 3-2. The optimization instruction #a instructs the RAN not to allocate resources for the first broadcast service based on the service identifier, or instructs the RAN not to reuse existing resources, or instructs the RAN to allocate resources for the first broadcast service based on the session identifier #a. The optimization instruction #b instructs the RAN to allocate resources for the first broadcast service according to the service identifier, or instructs the RAN to reuse existing resources.
RAN根据安全激活指示#a和安全激活指示#b确定不重用资源#a,即不使用相同的资源发送该第一广播业务的数据。RAN根据安全激活指示#b确定创建资源#b,建立RAN和UPF#b之间的数据传输通道。或者,也可以理解为,基站分别创建MBS session ID#a和MBS session ID#b对应的资源,从而能够使用不同的资源发送相同的广播业务的数据。The RAN determines not to reuse the resource #a according to the security activation indication #a and the security activation indication #b, that is, not to use the same resource to send the data of the first broadcast service. The RAN determines to create the resource #b according to the security activation instruction #b, and establishes a data transmission channel between the RAN and the UPF #b. Alternatively, it can also be understood that the base station creates resources corresponding to MBS session ID#a and MBS session ID#b respectively, so that it can use different resources to send the same broadcast service data.
另外,上述示例4-1至示例4-3还可以理解为,优化指示#a和优化指示#b中的至少一个用于指示以下至少一项:不根据服务标识为第一广播业务分配资源,或,不复用已有的资源,或,根据会话标识#b为第一广播业务分配资源,RAN就会分别创建资源#a和资源#b。并分别通过资源#a和资源#b向PLMN#a的UE和PLMN#b的UE发送第一广播业务的数据。In addition, the above Examples 4-1 to 4-3 can also be understood that at least one of the optimization instruction #a and the optimization instruction #b is used to indicate at least one of the following: not allocating resources for the first broadcast service according to the service identifier, Or, without reusing existing resources, or by allocating resources to the first broadcast service according to the session identifier #b, the RAN will create resource #a and resource #b respectively. And sending the data of the first broadcast service to the UE of PLMN#a and the UE of PLMN#b through resource #a and resource #b respectively.
S511用于响应S09。S511 is used in response to S09.
S512,AF通过PLMN#b中的网元(例如UPF#b)向RAN发送媒体流(即上述第一广播业务的数据),相应地,RAN通过PLMN#b中的网元接收来自AF的媒体流。S512, AF sends the media stream (that is, the data of the above-mentioned first broadcast service) to RAN through the network element in PLMN#b (for example, UPF#b). Correspondingly, RAN receives the media from AF through the network element in PLMN#b. flow.
随后,RAN基于资源#b向PLMN#b的UE发送该第一广播业务的数据。Subsequently, the RAN sends the data of the first broadcast service to the UE of PLMN #b based on resource #b.
需要说明的是,方法500并不限制S506与S512的先后顺序。方法500不限制S506在方法500中的执行顺序,也不限制S512在方法500中的执行顺序。换句话说,不限制RAN何时获取第一广播业务的数据,例如S506可以在确定是否创建资源#a之前或之后,但RAN基于资源#a发送第一广播业务数据需要在建立资源#a之后。例如S512可以在确定是否创建资源#b之前或之后,但RAN基于资源#b发送第一广播业务数据需要在建立资源#b之后。It should be noted that method 500 does not limit the order of S506 and S512. The method 500 does not limit the execution order of S506 in the method 500, nor does it limit the execution order of S512 in the method 500. In other words, there is no limit on when the RAN obtains the data of the first broadcast service. For example, S506 can be before or after determining whether to create resource #a, but the RAN needs to send the first broadcast service data based on resource #a after establishing resource #a. . For example, S512 may be before or after determining whether to create resource #b, but the RAN needs to send the first broadcast service data based on resource #b after establishing resource #b.
上述S501至S512中,均以S503中的广播上下文创建消息携带安全激活指示#a,S509中的广播上下文创建消息携带安全激活指示#b为例进行说明。下面详细介绍S503中的广播上下文创建消息不携带安全激活指示#a,以及S509中的广播上下文创建消息不携带安全激活指示#b的实现方式。In the above S501 to S512, the broadcast context creation message in S503 carries the security activation indication #a, and the broadcast context creation message in S509 carries the security activation indication #b is used as an example for explanation. The following is a detailed introduction to the implementation in which the broadcast context creation message in S503 does not carry the security activation indication #a, and the broadcast context creation message in S509 does not carry the security activation indication #b.
一种实现方式中,S503中的广播上下文创建消息不携带安全激活指示#a。S504中,RAN可以根据广播上下文创建消息确定安全激活指示#a指示安全激活。S509中的广播上下文创建消息不携带安全激活指示#b。S510中,RAN可以根据广播上下文创建消息确定安全激活指示#b指示安全激活。In one implementation, the broadcast context creation message in S503 does not carry the security activation indication #a. In S504, the RAN may determine that the security activation indication #a indicates security activation according to the broadcast context creation message. The broadcast context creation message in S509 does not carry security activation indication #b. In S510, the RAN may determine that the security activation indication #b indicates security activation according to the broadcast context creation message.
上述方案,能够进一步提高系统安全性能。The above solution can further improve system security performance.
应理解,如果第一网络或第二网络的控制面中的一个或多个网元故障,导致未能指示安全激活。即第一网络或第二网络指示进行安全激活的情况下,RAN未按照收到安全激活的时候处理。很可能带来安全风险,降低通信成功率。It should be understood that if one or more network elements in the control plane of the first network or the second network fail, the security activation cannot be indicated. That is, when the first network or the second network instructs security activation, the RAN does not process the security activation as it was received. It is likely to bring security risks and reduce communication success rate.
另一种实现方式中,S503中的广播上下文创建消息不携带安全激活指示#a。S504中,RAN可以根据广播上下文创建消息确定安全激活指示#a指示安全不激活。S509中的广播上下文创建消息不携带安全激活指示#b。S510中,RAN可以根据广播上下文创建消息确定安全激活指示#b指示安全不激活。In another implementation manner, the broadcast context creation message in S503 does not carry the security activation indication #a. In S504, the RAN may determine according to the broadcast context creation message that the security activation indication #a indicates security inactivation. The broadcast context creation message in S509 does not carry security activation indication #b. In S510, the RAN may determine according to the broadcast context creation message that the security activation indication #b indicates security inactivation.
上述方案,能够降低信令开销,减小网络消耗。The above solution can reduce signaling overhead and network consumption.
图10示出了本申请提供的广播安全通信的方法600的示意图。下面结合图10,详细介绍本申请提供的广播安全通信的方法600。方法600针对方法400中的实现方式二给出了具体的示例。其中,接入网网元以RAN为例,第一网络以PLMN#a为例,第二网络以PLMN#b为例,第一指示信息以安全激活指示#a为例,第二指示信息以安全激活指示#b为例,第一空口资源以资源#a为例,第二空口资源以资源#b为例进行说明。Figure 10 shows a schematic diagram of a method 600 for broadcasting secure communications provided by this application. The method 600 for broadcasting secure communication provided by this application will be introduced in detail below with reference to Figure 10 . Method 600 provides a specific example for the second implementation method in method 400. Among them, the access network element takes RAN as an example, the first network takes PLMN#a as an example, the second network takes PLMN#b as an example, the first instruction information takes security activation instruction #a as an example, and the second instruction information takes Security activation indication #b is taken as an example, the first air interface resource is taken as resource #a, and the second air interface resource is taken as resource #b.
S601-S603可以参见S501-S503的描述。For S601-S603, please refer to the description of S501-S503.
S604,可以参见S209中除示例3-1、示例3-2以外的描述。其中,RAN确定优化指示#a指示RAN根据服务标识为第一广播业务分配资源,或,指示RAN复用已有的资源。For S604, please refer to the description in S209 except Example 3-1 and Example 3-2. The RAN determines that the optimization instruction #a instructs the RAN to allocate resources for the first broadcast service according to the service identifier, or instructs the RAN to reuse existing resources.
S605-S608可以参见S505、S507-S509的描述。For S605-S608, please refer to the description of S505 and S507-S509.
S609,RAN根据安全激活指示#b和安全激活指示#a为第一广播业务分配(或确定)资源,并确定RAN和UPF之间传输通道的处理方式。S609: The RAN allocates (or determines) resources for the first broadcast service according to the security activation indication #b and the security activation indication #a, and determines the processing method of the transmission channel between the RAN and the UPF.
例如,优化指示#a指示RAN根据服务标识为第一广播业务分配资源,或,指示RAN复用已有的资源。优化指示#b指示RAN根据服务标识为第一广播业务分配资源,或,指示RAN复用已有的资源。 RAN根据优化指示#a和优化指示#b确定不创建资源#b,或,复用资源#a。并且,RAN根据优化指示#a和优化指示#b确定不建立RAN和UPF#b之间的数据传输通道;或者,确定建立RAN和UPF#b之间的数据传输通道,但丢弃该数据传输通道中的第一广播业务的数据。For example, the optimization instruction #a instructs the RAN to allocate resources for the first broadcast service according to the service identifier, or instructs the RAN to reuse existing resources. The optimization instruction #b instructs the RAN to allocate resources for the first broadcast service according to the service identifier, or instructs the RAN to reuse existing resources. The RAN determines not to create resource #b or to multiplex resource #a according to optimization instruction #a and optimization instruction #b. Furthermore, the RAN determines not to establish a data transmission channel between the RAN and UPF#b according to optimization instruction #a and optimization instruction #b; or, determines to establish a data transmission channel between the RAN and UPF#b, but discards the data transmission channel. Data for the first broadcast service in .
S610响应于S608。S610 responds to S608.
S611,AF通过PLMN#a中的网元(例如UPF#a)向RAN发送媒体流(即上述第一广播业务的数据),相应地,RAN通过PLMN#a中的网元接收来自AF的媒体流。S611, AF sends the media stream (that is, the data of the above-mentioned first broadcast service) to RAN through the network element in PLMN#a (for example, UPF#a). Correspondingly, RAN receives the media from AF through the network element in PLMN#a. flow.
RAN获取第一广播业务的数据后,基于资源#a向PLMN#a的UE和PLMN#b的UE发送该第一广播业务的数据。After acquiring the data of the first broadcast service, the RAN sends the data of the first broadcast service to the UE of PLMN #a and the UE of PLMN #b based on resource #a.
可以理解的是,优化指示#a和优化指示#b均指示RAN根据服务标识为第一广播业务分配资源,或,指示RAN复用已有的资源,RAN就会为第一广播业务只创建一份资源(方法600中以资源#a为例),并通过资源#a向PLMN#a的UE和PLMN#b的UE发送第一广播业务的数据(S611中RAN通过PLMN#a从AF获取的第一广播业务的数据)。It can be understood that both the optimization instruction #a and the optimization instruction #b instruct the RAN to allocate resources for the first broadcast service according to the service identifier, or instruct the RAN to reuse existing resources, and the RAN will only create one for the first broadcast service. resource (resource #a is taken as an example in method 600), and sends the data of the first broadcast service to the UE of PLMN#a and the UE of PLMN#b through resource #a (the data obtained by RAN from AF through PLMN#a in S611 First broadcast service data).
可选地,方法600还包括:步骤1,AF通过PLMN#b中的网元(例如UPF#b)向RAN发送媒体流(即上述第一广播业务的数据),相应地,RAN通过PLMN#b中的网元接收来自AF的媒体流。Optionally, the method 600 also includes: Step 1, the AF sends the media stream (that is, the data of the above-mentioned first broadcast service) to the RAN through the network element in PLMN#b (for example, UPF#b). Correspondingly, the RAN sends the media stream through the PLMN#b. The network element in b receives the media stream from AF.
RAN根据优化指示#a和优化指示#b丢弃从PLMN#b中的网元接收的第一广播业务的数据。The RAN discards the data of the first broadcast service received from the network element in PLMN #b according to the optimization instruction #a and the optimization instruction #b.
需要说明的是,方法600并不限制S611与步骤1的先后顺序。方法600不限制S611在方法600中的执行顺序,也不限制步骤1在方法600中的执行顺序。换句话说,不限制RAN何时获取第一广播业务的数据,例如S611可以在确定是否创建资源#a之前或之后,但RAN基于资源#a发送第一广播业务数据需要在建立资源#a之后。例如步骤1可以在确定是否创建资源#b之前或之后。It should be noted that method 600 does not limit the order of S611 and step 1. Method 600 does not limit the execution order of S611 in method 600, nor does it limit the execution order of step 1 in method 600. In other words, there is no limit on when the RAN obtains the data of the first broadcast service. For example, S611 can be before or after determining whether to create resource #a, but the RAN needs to send the first broadcast service data based on resource #a after establishing resource #a. . For example step 1 can be before or after determining whether to create resource #b.
上述S601至S611中,均以S603中的广播上下文创建消息携带优化指示#a,S608中的广播上下文创建消息携带优化指示#b为例进行说明。下面详细介绍S603中的广播上下文创建消息不携带优化指示#a,以及S608中的广播上下文创建消息不携带优化指示#b的实现方式。In the above S601 to S611, the broadcast context creation message in S603 carries the optimization instruction #a, and the broadcast context creation message in S608 carries the optimization instruction #b is used as an example for explanation. The following is a detailed introduction to the implementation in which the broadcast context creation message in S603 does not carry the optimization indication #a, and the broadcast context creation message in S608 does not carry the optimization indication #b.
一种实现方式中,S603中的广播上下文创建消息不携带优化指示#a。S604中,RAN可以根据广播上下文创建消息确定优化指示#a指示RAN根据服务标识为第一广播业务分配资源,或,指示RAN复用已有的资源。S608中的广播上下文创建消息不携带优化指示#b。S609中,RAN可以根据广播上下文创建消息确定优化指示#b指示RAN根据服务标识为第一广播业务分配资源,或,指示RAN复用已有的资源。In one implementation, the broadcast context creation message in S603 does not carry the optimization indication #a. In S604, the RAN may determine the optimization indication #a according to the broadcast context creation message to instruct the RAN to allocate resources for the first broadcast service according to the service identifier, or instruct the RAN to reuse existing resources. The broadcast context creation message in S608 does not carry optimization indication #b. In S609, the RAN may determine the optimization indication #b according to the broadcast context creation message to instruct the RAN to allocate resources for the first broadcast service according to the service identifier, or instruct the RAN to reuse existing resources.
上述方案,能够降低信令开销,减小网络消耗。The above solution can reduce signaling overhead and network consumption.
图11示出了本申请提供的广播安全通信的方法700的示意图。下面结合图11,详细介绍本申请提供的广播安全通信的方法700。方法700针对方法400中的实现方式一给出了具体的示例。其中,接入网网元以RAN为例,第一网络以PLMN#a为例,第二网络以PLMN#b为例,第一指示信息以安全激活指示#a为例,第二指示信息以安全激活指示#b为例,第一空口资源以资源#a为例,第二空口资源以资源#b为例进行说明。Figure 11 shows a schematic diagram of a method 700 for broadcasting secure communications provided by this application. The method 700 for broadcasting secure communication provided by this application will be introduced in detail below with reference to Figure 11 . Method 700 provides a specific example for implementation method 1 in method 400. Among them, the access network element takes RAN as an example, the first network takes PLMN#a as an example, the second network takes PLMN#b as an example, the first instruction information takes security activation instruction #a as an example, and the second instruction information takes Security activation indication #b is taken as an example, the first air interface resource is taken as resource #a, and the second air interface resource is taken as resource #b.
方法700可以参见方法500的描述。方法700与方法500的区别在于:(1)方法700中由NEF#a/MBSF#a根据安全激活状态#a确定优化指示#a,并将优化指示#a发送给MB-SMF#a,方法500中由MB-SMF#a根据安全激活状态#a确定优化指示#a。(2)方法700中MB-SMF#a可以不获取安全激活状态#a,方法500中MB-SMF#a需要获取安全激活状态#a。(3)方法700中由NEF#b/MBSF#b根据安全激活状态#b确定优化指示#b,并将优化指示#b发送给MB-SMF#b,方法500中由MB-SMF#b根据安全激活状态#b确定优化指示#b。(4)方法700中MB-SMF#b可以不获取安全激活状态#b,方法500中MB-SMF#b需要获取安全激活状态#b。For method 700, please refer to the description of method 500. The difference between method 700 and method 500 is: (1) In method 700, NEF#a/MBSF#a determines the optimization instruction #a according to the security activation status #a, and sends the optimization instruction #a to MB-SMF#a. In 500, the optimization instruction #a is determined by MB-SMF#a based on the security activation status #a. (2) In method 700, MB-SMF#a does not need to obtain security activation status #a, but in method 500, MB-SMF#a needs to obtain security activation status #a. (3) In method 700, NEF#b/MBSF#b determines the optimization instruction #b according to the security activation status #b, and sends the optimization instruction #b to MB-SMF#b. In method 500, MB-SMF#b determines the optimization instruction #b according to the security activation status #b. Security activation status #b determines optimization instructions #b. (4) In method 700, MB-SMF#b does not need to obtain security activation status #b, but in method 500, MB-SMF#b needs to obtain security activation status #b.
方法700的有益效果可以参见方法500的有益效果。The beneficial effects of method 700 can be found in the beneficial effects of method 500.
图12示出了本申请提供的广播安全通信的方法800的示意图。下面结合图12,详细介绍本申请提供的广播安全通信的方法800。方法800针对方法400中的实现方式二给出了具体的示例。其中,接入网网元以RAN为例,第一网络以PLMN#a为例,第二网络以PLMN#b为例,第一指示信息以安全激活指示#a为例,第二指示信息以安全激活指示#b为例,第一空口资源以资源#a为例,第二空口资源以资源#b为例进行说明。Figure 12 shows a schematic diagram of a method 800 for broadcasting secure communications provided by this application. The method 800 for broadcasting secure communication provided by this application will be introduced in detail below with reference to Figure 12 . Method 800 provides a specific example for the second implementation method in method 400. Among them, the access network element takes RAN as an example, the first network takes PLMN#a as an example, the second network takes PLMN#b as an example, the first instruction information takes security activation instruction #a as an example, and the second instruction information takes Security activation indication #b is taken as an example, the first air interface resource is taken as resource #a, and the second air interface resource is taken as resource #b.
方法800可以参见方法600的描述。方法800与方法600的区别在于:(1)方法800中由 NEF#a/MBSF#a根据安全激活状态#a确定优化指示#a,并将优化指示#a发送给MB-SMF#a,方法600中由MB-SMF#a根据安全激活状态#a确定优化指示#a。(2)方法800中MB-SMF#a可以不获取安全激活状态#a,方法600中MB-SMF#a需要获取安全激活状态#a。(3)方法800中由NEF#b/MBSF#b根据安全激活状态#b确定优化指示#b,并将优化指示#b发送给MB-SMF#b,方法600中由MB-SMF#b根据安全激活状态#b确定优化指示#b。(4)方法800中MB-SMF#b可以不获取安全激活状态#b,方法600中MB-SMF#b需要获取安全激活状态#b。For method 800, please refer to the description of method 600. The difference between method 800 and method 600 is: (1) In method 800, NEF#a/MBSF#a determines the optimization instruction #a based on the security activation status #a, and sends the optimization instruction #a to MB-SMF#a. In method 600, MB-SMF#a determines the optimization based on the security activation status #a. Instructions #a. (2) In method 800, MB-SMF#a does not need to obtain security activation status #a, but in method 600, MB-SMF#a needs to obtain security activation status #a. (3) In method 800, NEF#b/MBSF#b determines the optimization instruction #b according to the security activation status #b, and sends the optimization instruction #b to MB-SMF#b. In method 600, MB-SMF#b determines the optimization instruction #b according to the security activation status #b. Security activation status #b determines optimization instructions #b. (4) In method 800, MB-SMF#b does not need to obtain security activation status #b, but in method 600, MB-SMF#b needs to obtain security activation status #b.
方法800的有益效果可以参见方法600的有益效果。The beneficial effects of method 800 can be found in the beneficial effects of method 600.
图13示出了本申请提供的广播安全通信的方法900的示意图。下面结合图13,详细介绍本申请提供的广播安全通信的方法900。方法900针对方法400中的实现方式一给出了具体的示例。其中,接入网网元以RAN为例,第一网络以PLMN#a为例,第二网络以PLMN#b为例,第一指示信息以安全激活指示#a为例,第二指示信息以安全激活指示#b为例,第一空口资源以资源#a为例,第二空口资源以资源#b为例进行说明。Figure 13 shows a schematic diagram of a method 900 for broadcasting secure communications provided by this application. The method 900 for broadcasting secure communication provided by this application will be introduced in detail below with reference to Figure 13 . Method 900 provides a specific example for implementation method 1 in method 400. Among them, the access network element takes RAN as an example, the first network takes PLMN#a as an example, the second network takes PLMN#b as an example, the first instruction information takes security activation instruction #a as an example, and the second instruction information takes Security activation indication #b is taken as an example, the first air interface resource is taken as resource #a, and the second air interface resource is taken as resource #b.
方法900可以参见方法700的描述。方法900与方法700的区别在于:(1)方法900中由MBSTF#a根据安全激活状态#a确定优化指示#a,并将优化指示#a发送给NEF#a/MBSF#a,方法700中由NEF#a/MBSF#a根据安全激活状态#a确定优化指示#a。(2)方法900中NEF#a/MBSF#a可以不获取安全激活状态#a,方法700中NEF#a/MBSF#a需要获取安全激活状态#a。(3)方法900中由MBSTF#b根据安全激活状态#b确定优化指示#b,并将优化指示#b发送给NEF#b/MBSF#b,方法700中由NEF#b/MBSF#b根据安全激活状态#b确定优化指示#b。(4)方法900中NEF#b/MBSF#b可以不获取安全激活状态#b,方法700中NEF#b/MBSF#b需要获取安全激活状态#b。For method 900, please refer to the description of method 700. The difference between method 900 and method 700 is: (1) In method 900, MBSTF#a determines the optimization instruction #a according to the security activation status #a, and sends the optimization instruction #a to NEF#a/MBSF#a. In method 700, Optimization instruction #a is determined by NEF#a/MBSF#a based on security activation status #a. (2) In method 900, NEF#a/MBSF#a does not need to obtain security activation status #a, but in method 700, NEF#a/MBSF#a needs to obtain security activation status #a. (3) In method 900, MBSTF#b determines the optimization instruction #b according to the security activation status #b, and sends the optimization instruction #b to NEF#b/MBSF#b. In method 700, NEF#b/MBSF#b determines the optimization instruction #b according to the security activation status #b. Security activation status #b determines optimization instructions #b. (4) In method 900, NEF#b/MBSF#b does not need to obtain security activation status #b. In method 700, NEF#b/MBSF#b needs to obtain security activation status #b.
方法900的有益效果可以参见方法500的有益效果。The beneficial effects of method 900 can be found in the beneficial effects of method 500.
图14示出了本申请提供的广播安全通信的方法1000的示意图。下面结合图14,详细介绍本申请提供的广播安全通信的方法1000。方法1000针对方法400中的实现方式二给出了具体的示例。其中,接入网网元以RAN为例,第一网络以PLMN#a为例,第二网络以PLMN#b为例,第一指示信息以安全激活指示#a为例,第二指示信息以安全激活指示#b为例,第一空口资源以资源#a为例,第二空口资源以资源#b为例进行说明。Figure 14 shows a schematic diagram of a method 1000 for broadcasting secure communications provided by this application. The method 1000 for broadcasting secure communication provided by this application will be introduced in detail below with reference to Figure 14 . Method 1000 provides a specific example for the second implementation method in method 400. Among them, the access network element takes RAN as an example, the first network takes PLMN#a as an example, the second network takes PLMN#b as an example, the first instruction information takes security activation instruction #a as an example, and the second instruction information takes Security activation indication #b is taken as an example, the first air interface resource is taken as resource #a, and the second air interface resource is taken as resource #b.
方法1000可以参见方法800的描述。方法1000与方法800的区别在于:(1)方法1000中由MBSTF#a根据安全激活状态#a确定优化指示#a,并将优化指示#a发送给NEF#a/MBSF#a,方法800中由NEF#a/MBSF#a根据安全激活状态#a确定优化指示#a。(2)方法1000中NEF#a/MBSF#a可以不获取安全激活状态#a,方法800中NEF#a/MBSF#a需要获取安全激活状态#a。(3)方法1000中由MBSTF#b根据安全激活状态#b确定优化指示#b,并将优化指示#b发送给NEF#b/MBSF#b,方法800中由NEF#b/MBSF#b根据安全激活状态#b确定优化指示#b。(4)方法1000中NEF#b/MBSF#b可以不获取安全激活状态#b,方法800中NEF#b/MBSF#b需要获取安全激活状态#b。For method 1000, please refer to the description of method 800. The difference between method 1000 and method 800 is: (1) In method 1000, MBSTF#a determines the optimization instruction #a according to the security activation status #a, and sends the optimization instruction #a to NEF#a/MBSF#a. In method 800, Optimization instruction #a is determined by NEF#a/MBSF#a based on security activation status #a. (2) In method 1000, NEF#a/MBSF#a does not need to obtain security activation status #a. In method 800, NEF#a/MBSF#a needs to obtain security activation status #a. (3) In method 1000, MBSTF#b determines the optimization instruction #b according to the security activation status #b, and sends the optimization instruction #b to NEF#b/MBSF#b. In method 800, NEF#b/MBSF#b determines the optimization instruction #b according to the security activation status #b. Security activation status #b determines optimization instructions #b. (4) In method 1000, NEF#b/MBSF#b does not need to obtain security activation status #b. In method 800, NEF#b/MBSF#b needs to obtain security activation status #b.
方法1000的有益效果可以参见方法600的有益效果。The beneficial effects of method 1000 can be found in the beneficial effects of method 600.
图15示出了本申请提供的广播安全通信的方法1100的示意图。下面结合图15,详细介绍本申请提供的广播安全通信的方法1100。方法1100针对方法400中的实现方式一给出了具体的示例。其中,接入网网元以RAN为例,第一网络以PLMN#a为例,第二网络以PLMN#b为例,第一指示信息以安全激活指示#a为例,第二指示信息以安全激活指示#b为例,第一空口资源以资源#a为例,第二空口资源以资源#b为例进行说明。Figure 15 shows a schematic diagram of a method 1100 for broadcasting secure communications provided by this application. The method 1100 for broadcasting secure communication provided by this application will be introduced in detail below with reference to Figure 15 . Method 1100 provides a specific example for implementation method 1 in method 400. Among them, the access network element takes RAN as an example, the first network takes PLMN#a as an example, the second network takes PLMN#b as an example, the first instruction information takes security activation instruction #a as an example, and the second instruction information takes Security activation indication #b is taken as an example, the first air interface resource is taken as resource #a, and the second air interface resource is taken as resource #b.
方法1100可以参见方法1000的描述。方法1100与方法1000的区别在于:(1)方法1100中由AF确定优化指示#a,并将优化指示#a发送给NEF#a/MBSF#a,方法1000中由MBSTF#a根据安全激活状态#a确定优化指示#a。(2)方法1100中由AF确定优化指示#b,并将优化指示#b发送给NEF#b/MBSF#b,方法1000中由MBSTF#b根据安全激活状态#b确定优化指示#b。For method 1100, please refer to the description of method 1000. The difference between method 1100 and method 1000 is: (1) In method 1100, AF determines optimization instruction #a and sends optimization instruction #a to NEF#a/MBSF#a. In method 1000, MBSTF#a activates the status according to the security #aIdentify optimization instructions #a. (2) In method 1100, the AF determines the optimization instruction #b and sends the optimization instruction #b to NEF#b/MBSF#b. In the method 1000, the MBSTF#b determines the optimization instruction #b according to the security activation status #b.
应理解,方法1100中,以优化指示#a和优化指示#b均指示RAN根据服务标识为第一广播业务分配资源,或,指示RAN复用已有的资源为例进行说明。It should be understood that in the method 1100, the optimization instruction #a and the optimization instruction #b both instruct the RAN to allocate resources for the first broadcast service according to the service identifier, or instruct the RAN to reuse existing resources, are taken as an example for explanation.
方法1100的有益效果可以参见方法500的有益效果。The beneficial effects of method 1100 can be found in the beneficial effects of method 500.
图16和图17为本申请的实施例提供的可能的通信装置的结构示意图。这些通信装置可以用于实现上述方法实施例中接入网网元或第二网元的功能,因此也能实现上述方法实施例所具备的有益效果。 在本申请的实施例中,该通信装置可以是接入网网元或第二网元,还可以是应用于接入网网元或第二网元的模块(如芯片)。Figures 16 and 17 are schematic structural diagrams of possible communication devices provided by embodiments of the present application. These communication devices can be used to implement the functions of the access network element or the second network element in the above method embodiments, and therefore can also achieve the beneficial effects of the above method embodiments. In the embodiment of the present application, the communication device may be an access network element or a second network element, or may be a module (such as a chip) applied to the access network element or the second network element.
如图16所示,通信装置1200包括处理单元1210和收发单元1220。通信装置1200用于实现上述图5-图15中所示的方法实施例中接入网网元或第二网元的功能。As shown in FIG. 16 , the communication device 1200 includes a processing unit 1210 and a transceiver unit 1220 . The communication device 1200 is used to implement the functions of the access network element or the second network element in the method embodiments shown in Figures 5 to 15.
当通信装置1200用于实现图3所示的方法实施例中第二网元的功能时:收发单元1220,用于接收第二指示信息,所述第二指示信息用于指示针对所述第一广播业务的数据是否开启安全保护,或,处理单元1210,用于确定第二指示信息,所述第二指示信息用于指示针对所述第一广播业务的数据是否开启安全保护;收发单元1220,用于向接入网网元发送针对第一广播业务的第二会话建立请求,该第二会话建立请求中包括该第二指示信息。When the communication device 1200 is used to implement the functions of the second network element in the method embodiment shown in Figure 3: the transceiver unit 1220 is used to receive second indication information, and the second indication information is used to indicate that the first Whether the security protection is enabled for the data of the broadcast service, or the processing unit 1210 is used to determine the second indication information, the second indication information is used to indicate whether the security protection is enabled for the data of the first broadcast service; the transceiver unit 1220, Used to send a second session establishment request for the first broadcast service to the access network element, where the second session establishment request includes the second indication information.
当通信装置1200用于实现图3所示的方法实施例中接入网网元的功能时:收发单元1220,用于接收来自第一网络中的第一网元的针对第一广播业务的第一会话建立请求,该第一会话建立请求中包括第一指示信息,该第一指示信息用于指示针对该第一广播业务的数据是否开启安全保护;响应于该第一会话建立请求,处理单元1210,用于为该第一广播业务分配第一空口资源;收发单元1220,还用于接收来自第二网络中的第二网元的针对该第一广播业务的第二会话建立请求,该第二会话建立请求中包括第二指示信息,该第二指示信息用于指示针对该第一广播业务的数据是否开启安全保护;响应于该第二会话建立请求,处理单元1210,还用于根据该第一指示信息和/或该第二指示信息确定是否复用该第一空口资源。When the communication device 1200 is used to implement the functions of the access network element in the method embodiment shown in Figure 3: the transceiver unit 1220 is used to receive the third broadcast service from the first network element in the first network. A session establishment request, the first session establishment request includes first indication information, the first indication information is used to indicate whether security protection is enabled for the data of the first broadcast service; in response to the first session establishment request, the processing unit 1210, configured to allocate first air interface resources to the first broadcast service; the transceiver unit 1220, further configured to receive a second session establishment request for the first broadcast service from the second network element in the second network. The second session establishment request includes second indication information, the second indication information is used to indicate whether security protection is enabled for the data of the first broadcast service; in response to the second session establishment request, the processing unit 1210 is also configured to: The first indication information and/or the second indication information determine whether to multiplex the first air interface resource.
当通信装置1200用于实现图8所示的方法实施例中的第二网元的功能时:收发单元1220用于接收第三指示信息,该第三指示信息用于指示针对该第一广播业务是否复用已有的空口资源,或,处理单元1210,用于确定第三指示信息,该第三指示信息用于指示针对该第一广播业务是否复用已有的空口资源;收发单元1220,用于向接入网网元发送针对第一广播业务的第二会话建立请求,该第二会话建立请求中包括该第三指示信息。When the communication device 1200 is used to implement the function of the second network element in the method embodiment shown in Figure 8: the transceiver unit 1220 is used to receive third indication information, the third indication information is used to indicate that the first broadcast service Whether to reuse existing air interface resources, or, the processing unit 1210 is used to determine third indication information, the third indication information is used to indicate whether to reuse existing air interface resources for the first broadcast service; the transceiver unit 1220, Used to send a second session establishment request for the first broadcast service to the access network element, where the second session establishment request includes the third indication information.
当通信装置1200用于实现图8所示的方法实施例中接入网网元的功能时:收发单元1220用于接收来自第一网络中的第一网元的针对第一广播业务的第一会话建立请求;响应于该第一会话建立请求,处理单元1210,用于为该第一广播业务分配第一空口资源;收发单元1220,还用于接收来自第二网络中的第二网元的针对该第一广播业务的第二会话建立请求,该第二会话建立请求中包括第三指示信息,该第三指示信息用于指示针对该第一广播业务是否复用已有的空口资源;响应于该第二会话建立请求,处理单元1210,还用于根据该第三指示信息确定是否复用该第一空口资源。When the communication device 1200 is used to implement the functions of the access network element in the method embodiment shown in Figure 8: the transceiver unit 1220 is used to receive the first broadcast service from the first network element in the first network. Session establishment request; in response to the first session establishment request, the processing unit 1210 is configured to allocate the first air interface resource to the first broadcast service; the transceiving unit 1220 is also configured to receive a message from the second network element in the second network A second session establishment request for the first broadcast service, the second session establishment request includes third indication information, the third indication information is used to indicate whether to reuse existing air interface resources for the first broadcast service; response In response to the second session establishment request, the processing unit 1210 is further configured to determine whether to reuse the first air interface resource according to the third indication information.
有关上述处理单元1210和收发单元1220更详细的描述可以参考图5至图15所示的方法实施例中相关描述。For a more detailed description of the processing unit 1210 and the transceiver unit 1220, please refer to the relevant descriptions in the method embodiments shown in FIGS. 5 to 15 .
如图17所示,通信装置1300包括处理器1310和接口电路1320。处理器1310和接口电路1320之间相互耦合。可以理解的是,接口电路1320可以为收发器或输入输出接口。可选的,通信装置1300还可以包括存储器1330,用于存储处理器1310执行的指令或存储处理器1310运行指令所需要的输入数据或存储处理器1310运行指令后产生的数据。As shown in FIG. 17, the communication device 1300 includes a processor 1310 and an interface circuit 1320. The processor 1310 and the interface circuit 1320 are coupled to each other. It can be understood that the interface circuit 1320 may be a transceiver or an input-output interface. Optionally, the communication device 1300 may also include a memory 1330 for storing instructions executed by the processor 1310 or input data required for the processor 1310 to run the instructions or data generated after the processor 1310 executes the instructions.
当通信装置1300用于实现图17所示的方法时,处理器1310用于实现上述处理单元1210的功能,接口电路1320用于实现上述收发单元1220的功能。When the communication device 1300 is used to implement the method shown in Figure 17, the processor 1310 is used to implement the functions of the above-mentioned processing unit 1210, and the interface circuit 1320 is used to implement the functions of the above-mentioned transceiver unit 1220.
当上述通信装置为应用于第二网元的芯片时,该第二网元芯片实现上述方法实施例中的第二网元的功能。该第二网元芯片从第二网元中的其它模块(如射频模块或天线)接收信息,该信息是由接入网网元或发送给第二网元的;或者,该第二网元芯片向第二网元中的其它模块(如射频模块或天线)发送信息,该信息是第二网元发送给接入网网元的。When the above communication device is a chip applied to the second network element, the second network element chip implements the functions of the second network element in the above method embodiment. The second network element chip receives information from other modules (such as radio frequency modules or antennas) in the second network element, and the information is sent by the access network element or to the second network element; or, the second network element The chip sends information to other modules (such as radio frequency modules or antennas) in the second network element, and the information is sent by the second network element to the access network element.
当上述通信装置为应用于接入网网元的芯片时,该终端芯片实现上述方法实施例中接入网网元的功能。该接入网网元的芯片从接入网网元中的其它模块(如射频模块或天线)接收信息,该信息是第二网元发送给接入网网元的;或者,该接入网网元的芯片向基站中的其它模块(如射频模块或天线)发送信息,该信息是接入网网元发送给第二网元的。When the above communication device is a chip applied to an access network element, the terminal chip implements the functions of the access network element in the above method embodiment. The chip of the access network element receives information from other modules (such as radio frequency modules or antennas) in the access network element, and the information is sent by the second network element to the access network element; or, the access network The chip of the network element sends information to other modules (such as radio frequency modules or antennas) in the base station, and the information is sent by the access network element to the second network element.
可以理解的是,本申请的实施例中的处理器可以是中央处理单元(Central Processing Unit,CPU),还可以是其它通用处理器、数字信号处理器(Digital Signal Processor,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现场可编程门阵列(Field Programmable Gate Array,FPGA)或者 其它可编程逻辑器件、晶体管逻辑器件,硬件部件或者其任意组合。通用处理器可以是微处理器,也可以是任何常规的处理器。It can be understood that the processor in the embodiments of the present application may be a central processing unit (CPU), or other general-purpose processor, a digital signal processor (Digital Signal Processor, DSP), or an application-specific integrated circuit. (Application Specific Integrated Circuit, ASIC), Field Programmable Gate Array (FPGA) or Other programmable logic devices, transistor logic devices, hardware components, or any combination thereof. A general-purpose processor can be a microprocessor or any conventional processor.
本申请的实施例中的方法步骤可以在硬件中实现,也可以在可由处理器执行的软件指令中实现。软件指令可以由相应的软件模块组成,软件模块可以被存放于随机存取存储器、闪存、只读存储器、可编程只读存储器、可擦除可编程只读存储器、电可擦除可编程只读存储器、寄存器、硬盘、移动硬盘、CD-ROM或者本领域熟知的任何其它形式的存储介质中。一种示例性的存储介质耦合至处理器,从而使处理器能够从该存储介质读取信息,且可向该存储介质写入信息。存储介质也可以是处理器的组成部分。处理器和存储介质可以位于ASIC中。另外,该ASIC可以位于基站或终端中。处理器和存储介质也可以作为分立组件存在于基站或终端中。The method steps in the embodiments of the present application can be implemented in hardware or in software instructions that can be executed by a processor. Software instructions can be composed of corresponding software modules, and the software modules can be stored in random access memory, flash memory, read-only memory, programmable read-only memory, erasable programmable read-only memory, electrically erasable programmable read-only memory In memory, register, hard disk, mobile hard disk, CD-ROM or any other form of storage medium well known in the art. An exemplary storage medium is coupled to the processor such that the processor can read information from the storage medium and write information to the storage medium. The storage medium may also be an integral part of the processor. The processor and storage media may be located in an ASIC. Additionally, the ASIC can be located in the base station or terminal. The processor and storage medium may also exist as discrete components in the base station or terminal.
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机程序或指令。在计算机上加载和执行所述计算机程序或指令时,全部或部分地执行本申请实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、网络设备、用户设备或者其它可编程装置。所述计算机程序或指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机程序或指令可以从一个网站站点、计算机、服务器或数据中心通过有线或无线方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是集成一个或多个可用介质的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质,例如,软盘、硬盘、磁带;也可以是光介质,例如,数字视频光盘;还可以是半导体介质,例如,固态硬盘。该计算机可读存储介质可以是易失性或非易失性存储介质,或可包括易失性和非易失性两种类型的存储介质。In the above embodiments, it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented using software, it may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer programs or instructions. When the computer program or instructions are loaded and executed on the computer, the processes or functions described in the embodiments of the present application are executed in whole or in part. The computer may be a general purpose computer, a special purpose computer, a computer network, a network device, a user equipment, or other programmable device. The computer program or instructions may be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another. For example, the computer program or instructions may be transmitted from a website, computer, A server or data center transmits via wired or wireless means to another website site, computer, server, or data center. The computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server or data center that integrates one or more available media. The available media may be magnetic media, such as floppy disks, hard disks, and tapes; optical media, such as digital video optical disks; or semiconductor media, such as solid-state hard drives. The computer-readable storage medium may be volatile or nonvolatile storage media, or may include both volatile and nonvolatile types of storage media.
在本申请的各个实施例中,如果没有特殊说明以及逻辑冲突,不同的实施例之间的术语和/或描述具有一致性、且可以相互引用,不同的实施例中的技术特征根据其内在的逻辑关系可以组合形成新的实施例。In the various embodiments of this application, if there is no special explanation or logical conflict, the terms and/or descriptions between different embodiments are consistent and can be referenced to each other. The technical features in different embodiments are based on their inherent Logical relationships can be combined to form new embodiments.
本申请中,“至少一个”是指一个或者多个,“多个”是指两个或两个以上。“和/或”,描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B的情况,其中A,B可以是单数或者复数。在本申请的文字描述中,字符“/”,一般表示前后关联对象是一种“或”的关系;在本申请的公式中,字符“/”,表示前后关联对象是一种“相除”的关系。“包括A,B和C中的至少一个”可以表示:包括A;包括B;包括C;包括A和B;包括A和C;包括B和C;包括A、B和C。In this application, "at least one" refers to one or more, and "plurality" refers to two or more. "And/or" describes the relationship between associated objects, indicating that there can be three relationships, for example, A and/or B, which can mean: A exists alone, A and B exist simultaneously, and B exists alone, where A, B can be singular or plural. In the text description of this application, the character "/" generally indicates that the related objects before and after are an "or" relationship; in the formula of this application, the character "/" indicates that the related objects before and after are a kind of "division" Relationship. "Including at least one of A, B and C" may mean: including A; including B; including C; including A and B; including A and C; including B and C; including A, B and C.
可以理解的是,在本申请的实施例中涉及的各种数字编号仅为描述方便进行的区分,并不用来限制本申请的实施例的范围。上述各过程的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定。 It can be understood that the various numerical numbers involved in the embodiments of the present application are only for convenience of description and are not used to limit the scope of the embodiments of the present application. The size of the serial numbers of the above processes does not mean the order of execution. The execution order of each process should be determined by its function and internal logic.

Claims (39)

  1. 一种广播安全通信的方法,其特征在于,包括:A method of broadcasting secure communications, characterized by including:
    接入网网元接收来自第一网络中的第一网元的针对第一广播业务的第一会话建立请求,所述第一会话建立请求中包括第一指示信息,所述第一指示信息用于指示针对所述第一广播业务的第一数据是否开启安全保护;The access network element receives a first session establishment request for the first broadcast service from the first network element in the first network, where the first session establishment request includes first indication information, and the first indication information is Instructing whether to enable security protection for the first data of the first broadcast service;
    响应于所述第一会话建立请求,所述接入网网元为所述第一广播业务分配第一空口资源;In response to the first session establishment request, the access network element allocates a first air interface resource to the first broadcast service;
    所述接入网网元接收来自第二网络中的第二网元的针对所述第一广播业务的第二会话建立请求,所述第二会话建立请求中包括第二指示信息,所述第二指示信息用于指示针对所述第一广播业务的第二数据是否开启安全保护;The access network element receives a second session establishment request for the first broadcast service from a second network element in the second network, the second session establishment request includes second indication information, and the second session establishment request The second indication information is used to indicate whether security protection is enabled for the second data of the first broadcast service;
    响应于所述第二会话建立请求,所述接入网网元根据所述第一指示信息和/或所述第二指示信息确定是否复用所述第一空口资源。In response to the second session establishment request, the access network element determines whether to reuse the first air interface resource according to the first indication information and/or the second indication information.
  2. 根据权利要求1所述的方法,其特征在于,The method according to claim 1, characterized in that:
    在所述第一指示信息指示针对所述第一数据未开启安全保护且所述第二指示信息指示针对所述第二数据未开启安全保护的情况下,When the first indication information indicates that security protection is not enabled for the first data and the second indication information indicates that security protection is not enabled for the second data,
    所述接入网网元根据所述第一指示信息和/或所述第二指示信息确定是否复用所述第一空口资源,包括:The access network element determines whether to reuse the first air interface resource according to the first indication information and/or the second indication information, including:
    所述接入网网元根据所述第一指示信息和所述第二指示信息确定复用所述第一空口资源。The access network element determines to multiplex the first air interface resource according to the first indication information and the second indication information.
  3. 根据权利要求2所述的方法,其特征在于,所述方法还包括:The method of claim 2, further comprising:
    所述接入网网元基于所述第一空口资源向所述第一网络的终端设备和所述第二网络的终端设备发送所述第一数据;或,The access network element sends the first data to the terminal device of the first network and the terminal device of the second network based on the first air interface resource; or,
    所述接入网网元基于所述第一空口资源向所述第一网络的终端设备和所述第二网络的终端设备发送所述第二数据。The access network element sends the second data to the terminal device of the first network and the terminal device of the second network based on the first air interface resource.
  4. 根据权利要求1所述的方法,其特征在于,The method according to claim 1, characterized in that:
    所述第一指示信息指示针对所述第一数据已开启安全保护,和/或,所述第二指示信息指示针对所述第二数据已开启安全保护的情况下,When the first indication information indicates that security protection has been turned on for the first data, and/or the second indication information indicates that security protection has been turned on for the second data,
    所述接入网网元根据所述第一指示信息和/或所述第二指示信息确定是否复用所述第一空口资源,包括:The access network element determines whether to reuse the first air interface resource according to the first indication information and/or the second indication information, including:
    所述接入网网元根据所述第一指示信息和/或所述第二指示信息确定不复用所述第一空口资源。The access network element determines not to reuse the first air interface resource according to the first indication information and/or the second indication information.
  5. 根据权利要求4所述的方法,其特征在于,所述方法还包括:The method of claim 4, further comprising:
    所述接入网网元基于所述第一空口资源向所述第一网络的终端设备发送所述第一数据;The access network element sends the first data to the terminal device of the first network based on the first air interface resource;
    所述接入网网元为所述第二数据分配第二空口资源,所述第一空口资源与所述第二空口资源不同;The access network element allocates a second air interface resource to the second data, and the first air interface resource is different from the second air interface resource;
    所述接入网网元基于所述第二空口资源向所述第二网络的终端设备发送所述第二数据。The access network element sends the second data to the terminal device of the second network based on the second air interface resource.
  6. 根据权利要求5所述的方法,其特征在于,The method according to claim 5, characterized in that:
    所述第一数据由所述第一网络进行安全保护;The first data is securely protected by the first network;
    所述第二数据由所述第二网络进行安全保护。The second data is securely protected by the second network.
  7. 根据权利要求1至6中任一项所述的方法,其特征在于,所述方法还包括:The method according to any one of claims 1 to 6, characterized in that the method further includes:
    所述接入网网元存储所述第一指示信息。The access network element stores the first indication information.
  8. 一种广播安全通信的方法,其特征在于,包括:A method of broadcasting secure communications, characterized by including:
    第一网络中的第一网元向接入网网元发送针对第一广播业务的第一会话建立请求,所述第一会话建立请求中包括第一指示信息,所述第一指示信息用于指示针对所述第一广播业务的第一数据是否开启安全保护;The first network element in the first network sends a first session establishment request for the first broadcast service to the access network element, the first session establishment request includes first indication information, and the first indication information is used to Indicate whether security protection is enabled for the first data of the first broadcast service;
    所述接入网网元接收来自所述第一网络中的所述第一网元的针对所述第一广播业务的所述第一会话建立请求;The access network element receives the first session establishment request for the first broadcast service from the first network element in the first network;
    响应于所述第一会话建立请求,所述接入网网元为所述第一广播业务分配第一空口资源; In response to the first session establishment request, the access network element allocates a first air interface resource to the first broadcast service;
    第二网络中的第二网元向所述接入网网元发送针对所述第一广播业务的第二会话建立请求;The second network element in the second network sends a second session establishment request for the first broadcast service to the access network element;
    所述接入网网元接收来自所述第二网络中的所述第二网元的针对所述第一广播业务的所述第二会话建立请求,所述第二会话建立请求中包括第二指示信息,所述第二指示信息用于指示针对所述第一广播业务的第二数据是否开启安全保护;The access network element receives the second session establishment request for the first broadcast service from the second network element in the second network, and the second session establishment request includes a second Indication information, the second indication information is used to indicate whether security protection is enabled for the second data of the first broadcast service;
    响应于所述第二会话建立请求,所述接入网网元根据所述第一指示信息和/或所述第二指示信息确定是否复用所述第一空口资源。In response to the second session establishment request, the access network element determines whether to reuse the first air interface resource according to the first indication information and/or the second indication information.
  9. 根据权利要求8所述的方法,其特征在于,The method according to claim 8, characterized in that:
    所述第一指示信息指示针对所述第一数据已开启安全保护,和/或,所述第二指示信息指示针对所述第二数据已开启安全保护的情况下,所述接入网网元根据所述第一指示信息和/或所述第二指示信息确定是否复用所述第一空口资源,包括:所述接入网网元根据所述第一指示信息和/或所述第二指示信息确定不复用所述第一空口资源。When the first indication information indicates that security protection has been enabled for the first data, and/or when the second indication information indicates that security protection has been enabled for the second data, the access network element Determining whether to multiplex the first air interface resource according to the first indication information and/or the second indication information includes: the access network element according to the first indication information and/or the second indication information. The indication information determines not to reuse the first air interface resource.
  10. 根据权利要求9所述的方法,其特征在于,所述方法还包括:The method of claim 9, further comprising:
    所述接入网网元基于所述第一空口资源向所述第一网络的终端设备发送所述第一数据;所述第一网络的终端设备基于所述第一空口资源接收所述第一数据;所述接入网网元为所述第一广播业务的数据分配第二空口资源,所述第一空口资源与所述第二空口资源不同;所述接入网网元基于所述第二空口资源向所述第二网络的终端设备发送所述第二数据;所述第二网络的终端设备基于所述第二空口资源接收所述第二数据。The access network element sends the first data to the terminal device of the first network based on the first air interface resource; the terminal device of the first network receives the first data based on the first air interface resource. data; the access network element allocates second air interface resources for the data of the first broadcast service, and the first air interface resource is different from the second air interface resource; the access network element is based on the third The second air interface resource sends the second data to the terminal device of the second network; the terminal device of the second network receives the second data based on the second air interface resource.
  11. 根据权利要求10所述的方法,其特征在于,The method according to claim 10, characterized in that:
    所述第一数据由所述第一网络进行安全保护;The first data is securely protected by the first network;
    所述第二数据由所述第二网络进行安全保护。The second data is securely protected by the second network.
  12. 一种广播安全通信的方法,其特征在于,包括:A method of broadcasting secure communications, characterized by including:
    接入网网元接收来自第一网络中的第一网元的针对第一广播业务的第一会话建立请求;The access network element receives a first session establishment request for the first broadcast service from the first network element in the first network;
    响应于所述第一会话建立请求,所述接入网网元为所述第一广播业务分配第一空口资源;In response to the first session establishment request, the access network element allocates a first air interface resource to the first broadcast service;
    所述接入网网元接收来自第二网络中的第二网元的针对所述第一广播业务的第二会话建立请求,所述第二会话建立请求中包括第三指示信息,所述第三指示信息用于指示针对所述第一广播业务是否复用已有的空口资源;The access network element receives a second session establishment request for the first broadcast service from a second network element in the second network, the second session establishment request includes third indication information, and the third Three indication information is used to indicate whether to reuse existing air interface resources for the first broadcast service;
    响应于所述第二会话建立请求,所述接入网网元根据所述第三指示信息确定是否复用所述第一空口资源。In response to the second session establishment request, the access network element determines whether to reuse the first air interface resource according to the third indication information.
  13. 根据权利要求12所述的方法,其特征在于,第三指示信息用于指示针对所述第一广播业务复用已有的空口资源的情况下,The method according to claim 12, characterized in that the third indication information is used to indicate that existing air interface resources are reused for the first broadcast service,
    所述接入网网元根据所述第三指示信息确定是否复用所述第一空口资源,包括:The access network element determines whether to reuse the first air interface resource according to the third indication information, including:
    所述接入网网元根据所述第三指示信息确定复用所述第一空口资源。The access network element determines to multiplex the first air interface resource according to the third indication information.
  14. 根据权利要求13所述的方法,其特征在于,The method according to claim 13, characterized in that:
    所述接入网网元基于所述第一空口资源向所述第一网络的终端设备和所述第二网络的终端设备发送所述第一广播业务的第一数据;或,The access network element sends the first data of the first broadcast service to the terminal equipment of the first network and the terminal equipment of the second network based on the first air interface resource; or,
    所述接入网网元基于所述第一空口资源向所述第一网络的终端设备和所述第二网络的终端设备发送所述第一广播业务的第二数据,The access network element sends the second data of the first broadcast service to the terminal equipment of the first network and the terminal equipment of the second network based on the first air interface resource,
    其中,所述第一数据来自所述第一网络,所述第二数据来自所述第二网络。Wherein, the first data comes from the first network, and the second data comes from the second network.
  15. 根据权利要求13或14所述的方法,其特征在于,The method according to claim 13 or 14, characterized in that,
    所述第三指示信息指示根据所述第一广播业务对应的服务标识为所述第一广播业务分配空口资源。The third indication information instructs to allocate air interface resources to the first broadcast service according to the service identifier corresponding to the first broadcast service.
  16. 根据权利要求15所述的方法,其特征在于,所述接入网网元根据所述第三指示信息确定复用所述第一空口资源,包括:The method according to claim 15, characterized in that the access network element determines to multiplex the first air interface resource according to the third indication information, including:
    所述接入网网元根据已经存在所述第一广播业务对应的所述第一空口资源确定针对所述第一广播业务复用所述第一空口资源。The access network element determines to multiplex the first air interface resource for the first broadcast service based on the existing first air interface resource corresponding to the first broadcast service.
  17. 根据权利要求12所述的方法,其特征在于,The method according to claim 12, characterized in that:
    所述第三指示信息用于指示针对所述第一广播业务不复用已有的空口资源的情况下,The third indication information is used to indicate that existing air interface resources are not to be reused for the first broadcast service,
    所述接入网网元根据所述第三指示信息确定是否复用所述第一空口资源,包括: 所述接入网网元根据所述第三指示信息确定不复用所述第一空口资源。The access network element determines whether to reuse the first air interface resource according to the third indication information, including: The access network element determines not to reuse the first air interface resource according to the third indication information.
  18. 根据权利要求17所述的方法,其特征在于,所述方法还包括:The method of claim 17, further comprising:
    所述接入网网元基于所述第一空口资源向所述第一网络的终端设备发送所述第一广播业务的第一数据;The access network element sends the first data of the first broadcast service to the terminal device of the first network based on the first air interface resource;
    所述接入网网元为所述第一广播业务的第二数据分配第二空口资源,所述第一空口资源与所述第二空口资源不同;The access network element allocates a second air interface resource to the second data of the first broadcast service, and the first air interface resource is different from the second air interface resource;
    所述接入网网元基于所述第二空口资源向所述第二网络的终端设备发送所述第二数据,The access network element sends the second data to the terminal device of the second network based on the second air interface resource,
    其中,所述第一数据来自所述第一网络,所述第二数据来自所述第二网络。Wherein, the first data comes from the first network, and the second data comes from the second network.
  19. 根据权利要求18所述的方法,其特征在于,The method according to claim 18, characterized in that:
    所述第一广播业务的第一数据由所述第一网络进行安全保护;The first data of the first broadcast service is securely protected by the first network;
    所述第一广播业务的第二数据由所述第二网络进行安全保护。The second data of the first broadcast service is securely protected by the second network.
  20. 根据权利要求18或19所述的方法,其特征在于,所述第三指示信息用于指示针对所述第一广播业务不复用已有的空口资源的情况下,The method according to claim 18 or 19, characterized in that the third indication information is used to indicate that existing air interface resources are not to be reused for the first broadcast service,
    所述第三指示信息指示根据所述第二会话建立请求对应的会话标识为所述第一广播业务分配空口资源。The third indication information indicates that air interface resources are allocated to the first broadcast service according to the session identifier corresponding to the second session establishment request.
  21. 根据权利要求20所述的方法,其特征在于,所述接入网网元根据所述第三指示信息确定不复用所述第一空口资源,包括:The method according to claim 20, characterized in that the access network element determines not to reuse the first air interface resource according to the third indication information, including:
    所述接入网网元根据所述第三指示信息检查是否存在所述会话标识对应的空口资源;The access network element checks whether there is an air interface resource corresponding to the session identifier according to the third indication information;
    在不存在所述会话标识对应的空口资源的情况下,所述接入网网元确定针对所述第一广播业务不复用所述第一空口资源。If there is no air interface resource corresponding to the session identifier, the access network element determines not to reuse the first air interface resource for the first broadcast service.
  22. 一种广播安全通信的方法,其特征在于,包括:A method of broadcasting secure communications, characterized by including:
    第二网络的第二网元获取第三指示信息,所述第三指示信息用于指示针对第一广播业务是否复用已有的空口资源;The second network element of the second network obtains third indication information, where the third indication information is used to indicate whether to reuse existing air interface resources for the first broadcast service;
    所述第二网元向接入网网元发送针对所述第一广播业务的第二会话建立请求,所述第二会话建立请求中包括所述第三指示信息。The second network element sends a second session establishment request for the first broadcast service to the access network element, where the second session establishment request includes the third indication information.
  23. 根据权利要求22所述的方法,其特征在于,所述第二网络的第二网元获取第三指示信息,包括:The method according to claim 22, characterized in that the second network element of the second network obtains third indication information, including:
    所述第二网元确定所述第三指示信息。The second network element determines the third indication information.
  24. 根据权利要求23所述的方法,其特征在于,所述第二网元确定所述第三指示信息,包括:The method according to claim 23, characterized in that the second network element determines the third indication information, including:
    所述第二网元根据第二指示信息确定所述第三指示信息,所述第二指示信息用于指示针对所述第一广播业务的数据是否开启安全保护。The second network element determines the third indication information according to the second indication information, and the second indication information is used to indicate whether security protection is enabled for the data of the first broadcast service.
  25. 根据权利要求24所述的方法,其特征在于,The method according to claim 24, characterized in that:
    在所述第二指示信息用于指示针对所述第一广播业务的数据开启安全保护的情况下,所述第三指示信息用于指示针对所述第一广播业务不复用已有的空口资源;或者,When the second indication information is used to indicate that security protection is enabled for the data of the first broadcast service, the third indication information is used to indicate not to reuse existing air interface resources for the first broadcast service. ;or,
    在所述第二指示信息用于指示针对所述第一广播业务的数据不开启安全保护的情况下,所述第三指示信息用于指示针对所述第一广播业务复用已有的空口资源。When the second indication information is used to indicate that security protection is not enabled for the data of the first broadcast service, the third indication information is used to indicate that existing air interface resources are reused for the first broadcast service. .
  26. 根据权利要求22所述的方法,其特征在于,所述第二网络的第二网元获取第三指示信息,包括:The method according to claim 22, characterized in that the second network element of the second network obtains third indication information, including:
    所述第二网元接收来自所述第二网络的第四网元的所述第三指示信息。The second network element receives the third indication information from a fourth network element of the second network.
  27. 一种广播安全通信的方法,其特征在于,包括:A method of broadcasting secure communications, characterized by including:
    第一网络中的第一网元向接入网网元发送针对第一广播业务的第一会话建立请求;所述接入网网元接收来自所述第一网络中的所述第一网元的针对所述第一广播业务的所述第一会话建立请求;响应于所述第一会话建立请求,所述接入网网元为所述第一广播业务分配第一空口资源;第二网络的第二网元获取第三指示信息,所述第二网元向所述接入网网元发送针对所述第一广播业务的第二会话建立请求,所述第二会话建立请求中包括所述第三指示信息;所述接入网网元接收来自所述第二网络中的所述第二网元的针对所述第一广播业务的所述第二会话建立请求,所述第二会话建立请求中包括第三指示信息,所述第三指示信息用于指示针对所述第一广播业务是否复用已有的空口资源;响应于所述 第二会话建立请求,所述接入网网元根据所述第三指示信息确定是否复用所述第一空口资源。The first network element in the first network sends a first session establishment request for the first broadcast service to the access network element; the access network element receives the first session establishment request from the first network element. the first session establishment request for the first broadcast service; in response to the first session establishment request, the access network element allocates first air interface resources for the first broadcast service; the second network The second network element obtains the third indication information, and the second network element sends a second session establishment request for the first broadcast service to the access network element, and the second session establishment request includes the The third indication information; the access network element receives the second session establishment request for the first broadcast service from the second network element in the second network, and the second session The establishment request includes third indication information, the third indication information is used to indicate whether to reuse existing air interface resources for the first broadcast service; in response to the In the second session establishment request, the access network element determines whether to reuse the first air interface resource according to the third indication information.
  28. 根据权利要求27所述的方法,其特征在于,所述第三指示信息用于指示针对所述第一广播业务不复用已有的空口资源的情况下,所述接入网网元根据所述第三指示信息确定是否复用所述第一空口资源,包括:所述接入网网元根据所述第三指示信息确定不复用所述第一空口资源。The method according to claim 27, characterized in that the third indication information is used to indicate that the access network element shall not reuse existing air interface resources for the first broadcast service according to the The third indication information determines whether to reuse the first air interface resource, including: the access network element determines not to reuse the first air interface resource according to the third indication information.
  29. 根据权利要求28所述的方法,其特征在于,所述方法还包括:The method of claim 28, further comprising:
    所述接入网网元基于所述第一空口资源向所述第一网络的终端设备发送所述第一广播业务的第一数据;所述第一网络的终端设备基于所述第一空口资源接收所述第一数据;所述接入网网元为所述第一广播业务的第二数据分配第二空口资源,所述第一空口资源与所述第二空口资源不同;所述接入网网元基于所述第二空口资源向所述第二网络的终端设备发送所述第二数据;所述第二网络的终端设备基于所述第二空口资源接收所述第二数据,其中,所述第一数据来自所述第一网络,所述第二数据来自所述第二网络。The access network element sends the first data of the first broadcast service to the terminal device of the first network based on the first air interface resource; the terminal device of the first network sends the first data of the first broadcast service based on the first air interface resource. Receive the first data; the access network element allocates a second air interface resource for the second data of the first broadcast service, and the first air interface resource is different from the second air interface resource; the access network element The network element sends the second data to the terminal device of the second network based on the second air interface resource; the terminal device of the second network receives the second data based on the second air interface resource, wherein, The first data comes from the first network, and the second data comes from the second network.
  30. 根据权利要求29所述的方法,其特征在于,The method according to claim 29, characterized in that:
    所述第一广播业务的第一数据由所述第一网络进行安全保护;The first data of the first broadcast service is securely protected by the first network;
    所述第一广播业务的第二数据由所述第二网络进行安全保护。The second data of the first broadcast service is securely protected by the second network.
  31. 根据权利要求29或30所述的方法,其特征在于,所述第三指示信息用于指示针对所述第一广播业务不复用已有的空口资源的情况下,The method according to claim 29 or 30, characterized in that the third indication information is used to indicate that existing air interface resources are not to be reused for the first broadcast service,
    所述第三指示信息指示根据所述第二会话建立请求对应的会话标识为所述第一广播业务分配空口资源。The third indication information indicates that air interface resources are allocated to the first broadcast service according to the session identifier corresponding to the second session establishment request.
  32. 根据权利要求31所述的方法,其特征在于,所述接入网网元根据所述第三指示信息确定不复用所述第一空口资源,包括:The method according to claim 31, characterized in that the access network element determines not to reuse the first air interface resource according to the third indication information, including:
    所述接入网网元根据所述第三指示信息检查是否存在所述第二会话建立请求对应的所述会话标识对应的空口资源;The access network element checks whether there is an air interface resource corresponding to the session identifier corresponding to the second session establishment request according to the third indication information;
    在不存在所述第二会话建立请求对应的所述会话标识对应的空口资源的情况下,所述接入网网元确定针对所述第一广播业务不复用所述第一空口资源。If there is no air interface resource corresponding to the session identifier corresponding to the second session establishment request, the access network element determines not to reuse the first air interface resource for the first broadcast service.
  33. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质中存储有计算机指令,当所述计算机指令在计算机上运行时,使得所述计算机执行如权利要求1至7中任一项所述的方法,或者,执行如权利要求12至21中任一项所述的方法,或者,执行如权利要求22至26中任一项所述的方法。A computer-readable storage medium, characterized in that computer instructions are stored in the computer-readable storage medium. When the computer instructions are run on a computer, the computer is caused to execute any one of claims 1 to 7. The method according to the item, or perform the method according to any one of claims 12 to 21, or perform the method according to any one of claims 22 to 26.
  34. 一种芯片,其特征在于,包括:A chip is characterized by including:
    存储器,用于存储计算机程序;Memory, used to store computer programs;
    处理器,用于读取并执行所述存储器中存储的所述计算机程序,当所述计算机程序被执行时,所述处理器执行如权利要求1至7中任一项所述的方法,或者,执行如权利要求12至21中任一项所述的方法,或者,执行如权利要求22至26中任一项所述的方法。A processor configured to read and execute the computer program stored in the memory, and when the computer program is executed, the processor executes the method according to any one of claims 1 to 7, or , perform the method according to any one of claims 12 to 21, or perform the method according to any one of claims 22 to 26.
  35. 一种计算机程序产品,其特征在于,所述计算机程序产品包括计算机程序代码,当所述计算机程序代码在计算机上运行时,使得计算机执行如权利要求1至7中任一项所述的方法,或者,执行如权利要求12至21中任一项所述的方法,或者,执行如权利要求22至26中任一项所述的方法。A computer program product, characterized in that the computer program product includes computer program code, which when the computer program code is run on a computer, causes the computer to perform the method according to any one of claims 1 to 7, Alternatively, the method as described in any one of claims 12 to 21 is performed, or the method as described in any one of claims 22 to 26 is performed.
  36. 一种通信装置,其特征在于,所述装置包括:用于执行如权利要求1至7中任一项所述的方法的模块,或者用于执行如权利要求12至21中任一项所述的方法的模块,或者用于执行如权利要求22至26中任一项所述的方法的模块。A communication device, characterized in that the device includes: a module for performing the method as described in any one of claims 1 to 7, or a module for performing the method as described in any one of claims 12 to 21 means for a method, or means for performing a method as claimed in any one of claims 22 to 26.
  37. 一种通信装置,其特征在于,包括:A communication device, characterized by including:
    处理器,用于执行存储器中存储的计算机程序,以使得所述装置执行如权利要求1至7中任一项所述的方法,或者以使得所述装置执行如权利要求12至21中任一项所述的方法,或者以使得所述装置执行如权利要求22至26中任一项所述的方法。Processor, configured to execute a computer program stored in the memory, so that the device performs the method as claimed in any one of claims 1 to 7, or to cause the device to perform the method as claimed in any one of claims 12 to 21 The method described in claim 22, or the device is configured to perform the method described in any one of claims 22 to 26.
  38. 一种通信系统,其特征在于,包括:接入网网元、第一网络中的第一网元和第二网络中的第二网元,其中:A communication system, characterized in that it includes: an access network element, a first network element in a first network, and a second network element in a second network, wherein:
    所述接入网网元用于执行如权利要求1至7中任一项所述的方法;The access network element is configured to perform the method according to any one of claims 1 to 7;
    所述第一网元用于向所述接入网网元发送针对第一广播业务的第一会话建立请求; The first network element is configured to send a first session establishment request for a first broadcast service to the access network element;
    所述第二网元向所述接入网网元发送针对所述第一广播业务的第二会话建立请求。The second network element sends a second session establishment request for the first broadcast service to the access network element.
  39. 一种通信系统,其特征在于,包括:接入网网元、第一网络中的第一网元和第二网络中的第二网元,其中:A communication system, characterized in that it includes: an access network element, a first network element in a first network, and a second network element in a second network, wherein:
    所述接入网网元用于执行如权利要求12至21中任一项所述的方法;The access network element is configured to perform the method according to any one of claims 12 to 21;
    所述第二网元用于执行如权利要求22至26中任一项所述的方法;The second network element is configured to perform the method according to any one of claims 22 to 26;
    所述第一网元用于向所述接入网网元发送针对第一广播业务的第一会话建立请求。 The first network element is configured to send a first session establishment request for a first broadcast service to the access network element.
PCT/CN2023/103731 2022-08-14 2023-06-29 Method and apparatus for broadcast security communication WO2024037210A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202210970901.8A CN117641255A (en) 2022-08-14 2022-08-14 Method and device for broadcasting secure communication
CN202210970901.8 2022-08-14

Publications (1)

Publication Number Publication Date
WO2024037210A1 true WO2024037210A1 (en) 2024-02-22

Family

ID=89940622

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/103731 WO2024037210A1 (en) 2022-08-14 2023-06-29 Method and apparatus for broadcast security communication

Country Status (2)

Country Link
CN (1) CN117641255A (en)
WO (1) WO2024037210A1 (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101730178A (en) * 2008-10-30 2010-06-09 摩托罗拉公司 Admission control for a heterogeneous communication system
CN105723785A (en) * 2013-10-24 2016-06-29 高通股份有限公司 Evolved multimedia broadcast multicast service network sharing and roaming support
US20190124623A1 (en) * 2016-04-28 2019-04-25 Nokia Technologies Oy Method and apparatus for providing broadcast/multicast services
CN112449311A (en) * 2019-08-31 2021-03-05 华为技术有限公司 Communication method, device and system
CN113873443A (en) * 2020-06-30 2021-12-31 华为技术有限公司 Communication method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101730178A (en) * 2008-10-30 2010-06-09 摩托罗拉公司 Admission control for a heterogeneous communication system
CN105723785A (en) * 2013-10-24 2016-06-29 高通股份有限公司 Evolved multimedia broadcast multicast service network sharing and roaming support
US20190124623A1 (en) * 2016-04-28 2019-04-25 Nokia Technologies Oy Method and apparatus for providing broadcast/multicast services
CN112449311A (en) * 2019-08-31 2021-03-05 华为技术有限公司 Communication method, device and system
CN113873443A (en) * 2020-06-30 2021-12-31 华为技术有限公司 Communication method and device

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
HUAWEI, HISILICON: "New test case on security enforcement configuration for 5G LAN services", 3GPP DRAFT; S3-203527, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. SA WG3, no. e-meeting; 20201109 - 20201120, 23 November 2020 (2020-11-23), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France , XP051958325 *
NOKIA, NOKIA SHANGHAI-BELL: "KI#1: Conclusion update related to ETSUN", 3GPP DRAFT; S2-2101015, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. SA WG2, no. e-meeting; 20210224 - 20210303, 18 February 2021 (2021-02-18), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France, XP052173508 *

Also Published As

Publication number Publication date
CN117641255A (en) 2024-03-01

Similar Documents

Publication Publication Date Title
US12035205B2 (en) Multicast and broadcast services in 5G networks for IoT applications
CN109997334B (en) Session management with relaying and charging for indirect connectivity of internet of things applications in 3GPP networks
US10171958B2 (en) Managing a multimedia broadcast multicast service using an MBMS relay device
US20190313359A1 (en) Method and apparatus for supporting vehicle communications in 5g system
EP2928220B1 (en) Method, system, base station and cluster epc for establishing group call context
WO2016145735A1 (en) D2d-based data sharing method, apparatus, and device
EP3498034A2 (en) Methods, apparatus, and systems for power efficient d2d communications for wearable and iot devices
JP2014511168A (en) Mobile communication network and method
US11765055B2 (en) UPF service-based packet delay status event exposure service method and device
WO2022028277A1 (en) Methods and apparatuses for resource allocation to terminal device
WO2021218563A1 (en) Method and device for transmitting data
WO2024037210A1 (en) Method and apparatus for broadcast security communication
WO2017000591A1 (en) Information sending method and terminal
WO2024099230A1 (en) Method for broadcast security communication, and apparatus
WO2023061167A1 (en) Communication method and apparatus
WO2023103575A1 (en) Multicast/broadcast communication method and related apparatus
CN114915917B (en) Method and device for transmitting multicast service
WO2024094128A1 (en) Communication method and apparatus
WO2023143097A1 (en) Method and apparatus for multicast/broadcast service
WO2023185328A1 (en) Communication method and apparatus
WO2023202503A1 (en) Communication method and apparatus
WO2022267883A1 (en) Communication method and apparatus
US20240349184A1 (en) A downlink multicast service transmission
CN117858183A (en) Communication method, device and system
CN117223303A (en) Communication method, device and storage medium

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23854115

Country of ref document: EP

Kind code of ref document: A1