WO2024041469A1 - 寻呼消息处理方法、装置、通信设备及可读存储介质 - Google Patents
寻呼消息处理方法、装置、通信设备及可读存储介质 Download PDFInfo
- Publication number
- WO2024041469A1 WO2024041469A1 PCT/CN2023/113949 CN2023113949W WO2024041469A1 WO 2024041469 A1 WO2024041469 A1 WO 2024041469A1 CN 2023113949 W CN2023113949 W CN 2023113949W WO 2024041469 A1 WO2024041469 A1 WO 2024041469A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- paging
- base station
- terminal
- paging message
- configuration information
- Prior art date
Links
- 238000004891 communication Methods 0.000 title claims abstract description 30
- 238000003672 processing method Methods 0.000 title claims abstract description 16
- 238000000034 method Methods 0.000 claims abstract description 125
- 230000006870 function Effects 0.000 claims description 127
- 238000004422 calculation algorithm Methods 0.000 claims description 60
- 238000012790 confirmation Methods 0.000 claims description 25
- 230000004044 response Effects 0.000 claims description 15
- 238000012545 processing Methods 0.000 claims description 13
- 238000010586 diagram Methods 0.000 description 11
- 238000005516 engineering process Methods 0.000 description 11
- 239000008186 active pharmaceutical agent Substances 0.000 description 10
- 230000000694 effects Effects 0.000 description 10
- 238000007726 management method Methods 0.000 description 10
- 238000004590 computer program Methods 0.000 description 5
- 230000001360 synchronised effect Effects 0.000 description 5
- 230000002411 adverse Effects 0.000 description 3
- 230000003190 augmentative effect Effects 0.000 description 2
- 238000010295 mobile communication Methods 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 241000699670 Mus sp. Species 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000013523 data management Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000007599 discharging Methods 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 230000002441 reversible effect Effects 0.000 description 1
- 239000004984 smart glass Substances 0.000 description 1
- 230000001052 transient effect Effects 0.000 description 1
- CSRZQMIRAZTJOY-UHFFFAOYSA-N trimethylsilyl iodide Substances C[Si](C)(C)I CSRZQMIRAZTJOY-UHFFFAOYSA-N 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
- 238000005406 washing Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
Definitions
- the present application belongs to the field of communication technology, and specifically relates to a paging message processing method, device, communication equipment and readable storage medium.
- the base station sends a paging message to the terminal (such as User Equipment (UE)) through broadcast.
- the content of the paging message is sent in clear text.
- an illegal base station sends a paging message, it indicates the parking
- the terminal under it performs certain operations (such as: following the Evolved Packet System (EPS) fallback indicator (fallback indicator) from the fifth generation mobile communication technology (5th Generation, 5G) network to the fourth generation Mobile communication technology (4th Generation, 4G) network), the terminal will work according to the instructions of the illegal base station. This will cause the relevant policies configured by the operator to be invalid; it may even induce the UE to access the illegal base station, causing unpredictable losses to the user . Therefore, the security of the paging process in the related technology is low.
- EPS Evolved Packet System
- Embodiments of the present application provide a paging message processing method, device, communication equipment and readable storage medium to solve the problem of how to improve paging security.
- the first aspect provides a paging message processing method, including:
- the terminal sends capability information related to the security protection of paging messages
- the terminal receives configuration information, and the configuration information is used to enable or disable security protection for paging messages.
- a paging message processing method including:
- the network side device receives the terminal's capability information related to the security protection of paging messages
- the network side device sends configuration information to the terminal, and the configuration information is used to enable or disable security protection for the paging message.
- a paging message processing method including:
- the third base station determines that the paging record in the paging message includes the digital signature corresponding to the paging message;
- the third base station sends the paging message
- the third base station determines whether to enable security protection for the paging message
- the third base station determines the content of the paging message according to whether security protection is turned on or not;
- the third base station sends the paging message.
- a paging message processing device including:
- the first sending module is used to send capability information related to the security protection of paging messages
- the first receiving module is configured to receive configuration information, where the configuration information is used to enable or disable security protection for paging messages.
- a paging message device including:
- the third receiving module is used to receive the capability information of the terminal related to the security protection of paging messages
- the third sending module is used to send configuration information to the terminal, and the configuration information is used to enable or disable security protection for the paging message.
- a paging message processing device including:
- the fourth determination module is used to determine that the paging record in the paging message includes the digital signature corresponding to the paging message;
- the tenth sending module is used to send the paging message
- the second judgment module is used to judge whether to enable security protection for paging messages
- the fifth determination module is used to determine the content of the paging message according to whether security protection is turned on or not;
- An eleventh sending module is used to send the paging message.
- a communication device including: a processor, a memory, and a program or instruction stored on the memory and executable on the processor.
- the program or instruction is executed by the processor Implement the steps of the method described in the first aspect, the second aspect, or the third aspect.
- a readable storage medium is provided. Programs or instructions are stored on the readable storage medium. When the programs or instructions are executed by a processor, the implementation is as described in the first aspect, the second aspect, or the third aspect. steps of the method.
- a chip in a ninth aspect, includes a processor and a communication interface.
- the communication interface is coupled to the processor.
- the processor is used to run programs or instructions to implement the first aspect or the second aspect. or the steps of the method described in the third aspect.
- a computer program/program product is provided, the computer program/program product is stored in a non-transitory storage medium, and the program/program product is executed by at least one processor to implement the first aspect Or the steps of the method described in the second or third aspect.
- An eleventh aspect provides a communication system.
- the communication system includes a terminal and a network side device.
- the terminal is configured to perform the steps of the method described in the first aspect.
- the network side device is configured to perform the steps of the second method. or the steps of the method described in the third aspect.
- the paging message is securely protected through negotiation between the terminal and the network side device, thereby reducing Reduce the negative impact of illegal base stations on terminals and improve paging security.
- Figure 1 is a schematic diagram of using digital signatures to verify system messages
- Figure 2 is a schematic architectural diagram of a wireless communication system according to an embodiment of the present application.
- Figure 3 is one of the flow charts of the paging message processing method according to the embodiment of the present application.
- Figure 4 is the second flow chart of the paging message processing method according to the embodiment of the present application.
- Figure 5 is the third flow chart of the paging message processing method according to the embodiment of the present application.
- Figure 6 is one of the schematic diagrams of the paging message processing device according to the embodiment of the present application.
- Figure 7 is a second schematic diagram of the paging message processing device according to the embodiment of the present application.
- Figure 8 is the third schematic diagram of the paging message processing device according to the embodiment of the present application.
- Figure 9 is a schematic diagram of a terminal according to an embodiment of the present application.
- Figure 10 is a schematic diagram of a network side device according to an embodiment of the present application.
- Figure 11 is a schematic diagram of a communication device according to an embodiment of the present application.
- first, second, etc. in the description and claims of this application are used to distinguish similar objects and are not used to describe a specific order or sequence. It is to be understood that the terms so used are interchangeable under appropriate circumstances so that the embodiments of the present application can be practiced in sequences other than those illustrated or described herein, and that "first" and “second” are distinguished objects It is usually one type, and the number of objects is not limited.
- the first object can be one or multiple.
- “and/or” in the description and claims indicates at least one of the connected objects, and the character “/" generally indicates that the related objects are in an "or” relationship.
- LTE Long Term Evolution
- LTE-Advanced, LTE-A Long Term Evolution
- CDMA Code Division Multiple Access
- TDMA Time Division Multiple Access
- FDMA Frequency Division Multiple Access
- OFDMA Orthogonal Frequency Division Multiple Access
- SC-FDMA Single-carrier Frequency Division Multiple Access
- NR New Radio
- 6G 6th Generation
- SI System Information
- signature key information related to the SI sending time
- output result is the number corresponding to the SI Signature (Digital Signature, DS).
- the network calls one or more UEs through paging messages.
- a paging message contains at least one paging record (Paging Record).
- Each paging record corresponds to the paging of a UE and can carry the following information:
- UE ID UE Identifer, UE ID
- 5G-S-TMSI 5G S-Temporary Mobile Subscription Identifier
- I -RNTI Inactive Radio Network Temporary Identifier
- -Access Type for example, 3rd Generation Partnership Project (3GPP) access method, non-3GPP access method.
- 3GPP 3rd Generation Partnership Project
- FIG. 2 shows a block diagram of a wireless communication system to which embodiments of the present application are applicable.
- the wireless communication system includes a terminal 21 and a network side device 22.
- the terminal 21 can be a mobile phone, a tablet computer (Tablet Personal Computer), a laptop computer (Laptop Computer), or a notebook computer, a personal digital assistant (Personal Digital Assistant, PDA), a handheld computer, a netbook, or a super mobile personal computer.
- Tablet Personal Computer Tablet Personal Computer
- laptop computer laptop computer
- PDA Personal Digital Assistant
- the terminal involved in this application can also be a chip within the terminal, such as a modem chip or a system on chip (SoC). It should be noted that the embodiment of the present application does not limit the specific type of the terminal 21.
- the network side device 22 may include an access network device or a core network device, where the access network device may also be called a radio access network device, a radio access network (Radio Access Network, RAN), a radio access network function or a wireless access network unit.
- the access network device 12 may include a base station, a Wireless Local Area Network (WLAN) Access point or WiFi node, etc., the base station may be called Node B, Evolved Node B (eNB), access point, Base Transceiver Station (BTS), radio base station, radio transceiver, basic service set ( Basic Service Set (BSS), Extended Service Set (ESS), Home Node B, Home Evolved Node B, Transmitting Receiving Point (TRP) or some other appropriate term in the field, As long as the same technical effect is achieved, the base station is not limited to specific technical terms. It should be noted that in the embodiment of this application, only the base station in the NR system is used as an example for introduction, and the specific type of the base station is not limited.
- Core network equipment may include but is not limited to at least one of the following: core network nodes, core network functions, mobility management entities (Mobility Management Entity, MME), access and mobility management functions (Access and Mobility Management Function, AMF), session management Function (Session Management Function, SMF), User Plane Function (UPF), Policy Control Function (PCF), Policy and Charging Rules Function (PCRF), Edge Application Service Discovery Function (Edge Application Server Discovery Function, EASDF), Unified Data Management (UDM), Unified Data Repository (UDR), Home Subscriber Server (HSS), centralized network configuration (Centralized network configuration, CNC), network storage function (Network Repository Function, NRF), network opening function (Network Exposure Function, NEF), local NEF (Local NEF, or L-NEF), binding support function (Binding Support Function) , BSF), application function (Application Function, AF), etc.
- MME mobility management entities
- AMF Access and Mobility Management Function
- SMF Session Management Function
- UPF User Plane Function
- an embodiment of the present application provides a paging message processing method, which is applied to a terminal.
- the method includes: step 301 and step 302.
- Step 301 The terminal sends capability information related to the security protection of paging messages
- the terminal sends capability information to core network equipment or service base stations, where the core network equipment includes but is not limited to AMF.
- Step 302 The terminal receives configuration information, which is used to enable or disable security protection for the paging message.
- the terminal can receive configuration information from the core network equipment or service base station, where the core network equipment or service base station can send corresponding configuration information to each terminal based on the capability information reported by each terminal, so that each terminal can achieve ( per UE) level security protection.
- security protection includes encryption and/or digital signatures.
- step 301 and step 302 the terminal and the network side device negotiate to securely protect the paging message, effectively improving paging security.
- the method further includes:
- the terminal In response to the configuration information, the terminal sends a confirmation message.
- the capability information includes at least one of the following:
- the configuration information is used for at least one of the following:
- the configuration information includes enabling the encryption function of paging messages, and the configuration information also includes at least one of the following:
- a first algorithm for encrypting the paging message wherein the capability information includes the first algorithm
- the first input parameter includes: part of the information carried in the paging record of the terminal, for example, it can be any combination of paging Cause and access Type.
- the first input parameter can Implement security protection for specified parts of the paging message.
- the configuration information includes enabling the digital signature function of paging messages, and the configuration information also includes at least one of the following:
- a second algorithm for digitally signing the paging message wherein the capability information includes the second algorithm
- the second input parameter includes any of the following:
- Part of the information carried in the paging record of the terminal can be any combination of UE ID, paging Cause, and access Type.
- the method further includes:
- the terminal receives a paging message
- the terminal determines the content of the paging message according to the terminal's capability information and/or the configuration information.
- the terminal can determine the content of the paging message through the terminal's capability information and/or the configuration information, and then verify the legitimacy of the base station.
- the terminal determines the content of the paging message based on the terminal's capability information and/or the configuration information, including:
- the terminal determines that the paging record in the paging message includes at least one of the following: (1) the plain text part of the paging record; ( 2) Addition of the paging record secret part.
- the terminal determines the content of the paging message based on the terminal's capability information and/or the configuration information, including any of the following:
- the terminal determines that the paging record in the paging message includes: the digital signature corresponding to the paging record of the terminal;
- the terminal determines that the paging message includes: the digital signature corresponding to the paging message;
- the terminal determines that the paging message includes: the digital signature corresponding to the paging message.
- the digital signature corresponding to the terminal's paging record is determined based on the encrypted paging record; or, the digital signature corresponding to the paging message is based on all encrypted paging records.
- the paging message is determined by the above.
- the paging information is completely protected, the adverse impact of illegal base stations on terminals is reduced, and paging security is improved.
- an embodiment of the present application provides a paging message method, which is applied to a network side device.
- the network side device includes a core network device or a first base station, and the first base station includes a terminal of the terminal.
- Serving the base station, the method includes: step 401 and step 402.
- Step 401 The network side device receives the terminal's capability information related to the security protection of paging messages
- Step 402 The network side device sends configuration information to the terminal, and the configuration information is used to enable or disable security protection for the paging message.
- the method further includes:
- the network side device receives a confirmation message sent by the terminal in response to the configuration information.
- the network side device includes core network device, and the method further includes:
- the network side device sends the configuration information to the first base station and/or at least one second base station;
- the first base station includes a serving base station of the terminal, and the at least one second base station includes a radio access network notification area (RAN Notification Area, RNA) configuration or tracking area (Tracking Area, TA) of the terminal. Configure the base station it belongs to.
- RAN Notification Area RNA
- Tracking Area TA
- the network side device sends the configuration information to the first base station and/or at least one second base station, including:
- the network side device When the network side device successfully receives the confirmation message, or when the network side device pages the terminal, the network side device sends the configuration information to the first base station and/or the at least one second base station.
- the method further includes:
- the network side device When the network side device fails to receive the confirmation message sent by the terminal in response to the configuration information, or when the network side device pages the terminal, the network side device sends a message to the first base station. And/or at least one second base station sends indication information, where the indication information is used to indicate not to enable security protection for the paging message of the terminal.
- the network side device includes a first base station, the first base station includes a serving base station of the terminal, and the method further includes:
- the network side device sends the configuration information to at least one second base station, where the at least one second base station includes the base station to which the radio access network notification area RNA configuration or tracking area TA configuration of the terminal belongs.
- the network side device sends the configuration information to at least one second base station, including:
- the network side device When the network side device successfully receives the confirmation message sent by the terminal in response to the configuration information, or when the network side device pages the terminal, the network side device sends the configuration information to the at least one second base station.
- the method further includes:
- the network side device When the network side device fails to receive the confirmation message sent by the terminal in response to the configuration information, or when the network side device pages the terminal, the network side device sends a message to at least one second base station. Send instruction information, where the instruction information is used to instruct not to enable security protection for the paging message of the terminal.
- the network side device is the first base station, and the first base station includes the serving base station of the terminal.
- the Methods also include:
- the network side device sends the capability information to the core network device
- the network side device receives the configuration information sent by the core network device.
- the network side device is a first base station, and the method further includes:
- the network side device determines whether to enable security protection for the paging message of the terminal
- the network side device determines the content of the paging message according to whether security protection is turned on or not;
- the network side device sends the paging message.
- the network side device determines whether to enable security protection for paging messages, including at least one of the following:
- the network side device sequentially determines whether to enable security protection for the paging messages according to the sending order of the paging records in the paging message;
- the network side device determines whether to enable security protection for the paging message according to the configuration information.
- the network side device determines the content of the paging message according to the status of enabling security protection, including:
- the network side device determines that the paging record in the paging message includes at least one of the following:
- the network side device determines that the paging record in the paging message includes the encrypted part of the paging record, including at least one of the following:
- the network side device receives the encrypted part of the paging record sent by the core network device;
- the network side device performs an encryption operation on the paging record to obtain the encrypted part of the paging record.
- the network side device determines the content of the paging message according to the status of turning on security protection, including any of the following:
- the network side device determines that the paging record in the paging message includes the digital signature corresponding to the paging record of the terminal;
- the network side device determines that the paging message includes the digital signature corresponding to the paging message.
- the digital signature corresponding to the paging record of the terminal is determined based on the encrypted paging record.
- the method further includes:
- the network side device determines that the paging message includes a digital signature corresponding to the paging message
- the network side device sends the paging message.
- the digital signature corresponding to the paging message is determined based on the encrypted paging message.
- the capability information includes at least one of the following:
- the configuration information is used for at least one of the following:
- the configuration information includes enabling the encryption function of paging messages, and the configuration information also includes at least one of the following:
- the configuration information includes enabling the digital signature function of paging messages, and the configuration information also includes at least one of the following:
- a second algorithm for digitally signing the paging message wherein the capability information of the terminal includes the second algorithm
- the first input parameter includes:
- the second input parameter includes any of the following:
- the paging message is securely protected through negotiation between the terminal and the network side device, thereby reducing the adverse impact of illegal base stations on the terminal and improving paging security.
- an embodiment of the present application provides a paging message processing method, which is applied to a third base station.
- the third base station includes a first base station or a second base station.
- the first base station includes the serving base station of the terminal.
- the second base station includes the base station to which the RNA configuration or TA configuration of the terminal belongs. Specific steps include: step 501 and step 502, or step 503, step 504 and step 505.
- Step 501 The third base station determines that the paging record in the paging message includes the digital signature corresponding to the paging message;
- Step 502 The third base station sends the paging message
- Step 503 The third base station determines whether to enable security protection for the paging message
- Step 504 The third base station determines the content of the paging message according to whether security protection is turned on or not;
- Step 505 The third base station sends the paging message.
- the third base station determines the content of the paging message, it can be determined based on the configuration information.
- the third base station determines whether to enable security protection for paging messages, including at least one of the following:
- the third base station sequentially determines whether to enable security protection for the paging messages according to the sending order of the paging records in the paging message;
- the network side device determines whether to enable security protection for the paging message according to the configuration information.
- the third base station determines the content of the paging message according to the status of enabling security protection, including:
- the third base station determines that the paging record in the paging message includes at least one of the following:
- the third base station includes a first base station, the first base station includes a serving base station of the terminal, and the third base station determines that the paging record in the paging message includes
- the encrypted part of the paging record includes at least one of the following:
- the third base station receives the encrypted part of the paging record sent by the core network device, and the encryption operation of the encrypted part of the paging record is performed by the core network device;
- the third base station performs an encryption operation on the paging record to obtain the encrypted part of the paging record.
- the third base station includes a second base station, the second base station includes a base station to which the RNA configuration or TA configuration of the terminal belongs, and the third base station determines the paging message
- the paging record in includes the encrypted part of the paging record, including:
- the third base station receives the encrypted part of the paging record sent by the anchor base station of the terminal, and the encryption operation of the encrypted part of the paging record is performed by the anchor base station;
- the anchor base station of the terminal includes the first base station.
- the third base station determines the content of the paging message according to the situation of turning on security protection, including any of the following:
- the third base station determines that the paging record in the paging message includes the digital signature corresponding to the paging record of the terminal;
- the third base station determines that the paging message includes a digital signature corresponding to the paging message.
- the digital signature corresponding to the paging record of the terminal is determined based on the encrypted paging record.
- the digital signature corresponding to the paging message is determined based on the encrypted paging message.
- the method before the third base station determines whether to enable security protection for the terminal's paging message, the method further includes:
- the third base station receives configuration information, and the configuration information is used to enable or disable security protection for paging messages.
- the configuration information is used for at least one of the following:
- the configuration information when the configuration information includes enabling the encryption function of paging messages, the configuration information further includes at least one of the following:
- the configuration information in the case where the configuration information includes enabling the digital signature function of paging messages, the configuration information further includes at least one of the following:
- a second algorithm for digitally signing the paging message wherein the capability information of the terminal includes the second algorithm
- the first input parameter includes:
- the second input parameter includes any of the following:
- the third base station may send a paging message including a digital signature, or a paging message determined based on whether security protection is turned on or not, to the terminal, so that the terminal can use the terminal's capability information and/or
- the configuration information determines the content of the paging message, thereby verifying the legitimacy of the base station, reducing the adverse impact of illegal base stations on terminals, and improving paging security.
- Embodiment 1 Negotiation process between the network side device and the UE on whether and how to perform security protection on paging messages.
- the network side device is the core network device (for example, AMF) that serves the UE, and implements security protection negotiation based on the Non-Access Stratum (NAS) process.
- Example 1 is applicable to Core Network (CN) paging (paging) in Radio Resource Control (RRC) idle state and Radio Access Network (Radio Access Network) in RRC inactive state. ,RAN)paging.
- CN Core Network
- RRC Radio Resource Control
- Radio Access Network Radio Access Network
- Step 1 The UE sends capability information for security protection of paging messages to the core network device.
- the capability information may include at least one of the following:
- Step 2 The core network device sends configuration information for security protection of paging messages to the UE.
- This configuration information can be used for at least one of the following:
- step 2-1 When the configuration information includes enabling the encryption function of paging messages, the configuration information may also include at least one of the following:
- a first algorithm for encrypting paging messages wherein the capability information of the terminal includes the first algorithm
- the first input parameter for encrypting the paging message includes any information carried in the paging message except the UE ID.
- the first input parameter can be any combination of paging Cause and access Type.
- step 2-2 When the configuration information includes enabling the digital signature function of paging messages, the configuration information may also include at least one of the following:
- a second algorithm for digitally signing paging messages wherein the capability information of the terminal includes the second algorithm
- the second input parameter may include any of the following:
- a complete paging message which at least contains the Paging Record of the UE (i.e., the signature of the entire Paging message);
- Part of the information carried in the UE's Paging Record i.e., a further simplification of the signature of each UE or each Paging Record.
- it can be any combination of UE ID, paging Cause, and access Type.
- Step 3 The UE sends a confirmation message of the configuration information for security protection of the paging message to the core network device.
- step 3-1 When the core network device successfully receives the confirmation message from the UE, the core network device forwards the configuration information to the first base station and at least one second base station, and the at least one second base station performs the configuration according to the configuration.
- the information enables security protection for the paging message of the UE.
- the first base station is a serving base station.
- At least one second base station may be the base station to which the TA configuration of the UE belongs (for CN Paging in RRC idle state) or the base station to which the RNA configuration of the UE belongs (for RAN Paging in RRC inactive state).
- the core network device may forward the configuration information to at least one second base station when the acknowledgment message is successfully received or at the time of paging terminal.
- step 3-2 In the case where the core network device fails to receive the confirmation message from the UE, the core network device determines that the configuration information has failed. Further, the core network device can send indication information to at least one second base station, The indication information is used to indicate not to enable security protection for the paging message of the UE, and the at least one second base station not to enable security protection for the paging message of the UE.
- At least one second base station is the base station to which the UE's RNA configuration belongs (for CN Paging in the RRC idle state) or the base station to which the TA configuration of the UE belongs (for the RAN Paging in the RRC INACTIVE state).
- the core network device may send indication information to at least one base station at the paging time.
- the network side device is the first base station serving the UE (ie, the first base station), and implements security protection negotiation based on the RRC process.
- Step 1 The UE sends capability information for security protection of paging messages to the first base station.
- the capability information may include at least one of the following:
- the first base station forwards the capability of the UE to the core network device. Force information, and receive configuration information for security protection of paging messages from the core network equipment.
- Step 2 The first base station sends the configuration information for security protection of the paging message to the UE.
- the configuration information can be used for at least one of the following:
- step 2-1 When the configuration includes enabling the encryption function of paging messages, the configuration information may also include at least one of the following:
- a first algorithm for encrypting paging messages wherein the capability information of the terminal includes the first algorithm
- the first input parameter for encrypting the paging message includes any information carried in the paging message except the UE ID.
- the first input parameter can be any combination of paging Cause and access Type.
- step 2-2 When the configuration information includes enabling the digital signature function of paging messages, the configuration information may also include at least one of the following:
- a second algorithm for digitally signing paging messages wherein the capability information of the terminal includes the second algorithm
- the second input parameter may include any of the following:
- a complete paging message which at least contains the Paging Record of the UE (i.e., the signature of the entire Paging message);
- Part of the information carried in the UE's Paging Record i.e., a further simplification of the signature of each UE or each Paging Record.
- it can be any combination of UE ID, paging Cause, and access Type.
- Step 3 The UE sends a confirmation message of the configuration information for security protection of the paging message to the first base station.
- step 3-1 When the first base station successfully receives the confirmation message from the UE, the first base station forwards the configuration information to at least one second base station, and the at least one second base station performs the configuration according to the configuration information. Security protection is enabled for the paging message of the UE.
- At least one second base station is the base station to which the UE's RNA configuration belongs (for RRC inactive RAN Paging).
- the first base station may forward the configuration information to at least one second base station when successfully receiving a confirmation message from the UE, or at the time of paging the terminal, for example, when RAN Paging the UE is initiated.
- step 3-2 If the first base station fails to receive the confirmation message from the UE, the first base station determines that the configuration information has failed. Further, the first base station may send an indication to at least one second base station. information, that refers to The indication information is used to indicate not to enable security protection for the paging message of the UE, and the at least one second base station does not enable security protection for the paging message of the UE.
- At least one second base station is the base station to which the UE's RNA configuration belongs (for RAN Paging in RRC INACTIVE state).
- the first base station may send indication information to at least one base station at the paging time.
- Embodiment 2 Content and sending method of Paging message.
- Step 1 The third base station determines whether security protection is enabled for each UE's paging message one by one according to the PagingRecord sending order in the paging message, and determines the specific content of the paging message.
- the third base station may include the first base station or the second base station.
- the first base station includes the serving base station of the terminal, and the second base station includes the base station to which the RNA configuration or TA configuration of the terminal belongs.
- step 1-1 When the encryption function is enabled for the paging message of the UE, the PagingRecord for the UE includes at least one of the following:
- the PagingRecord of the UE includes an encrypted part, it also includes any of the following:
- the encryption operation is performed by the core network equipment, and then the encrypted PagingRecord is sent to the first base station (applicable to the paging message being CN paging);
- the encryption operation is performed by the first base station, which directly generates the encrypted PagingRecord.
- the first base station is the anchor base station of the UE (applicable to the paging message for RAN paging);
- the encryption operation is performed by the anchor base station of the UE, and the encrypted PagingRecord is directly generated and forwarded to the second base station (applicable to the paging message being RAN paging).
- the setting order of the plaintext part and the encrypted part is not limited in PagingRecord.
- PagingRecord the plaintext part can be set first, and then the encrypted part can be set, that is, the plaintext part is sent first, and then the ciphertext part is sent, such as PagingRecord ⁇ UE ID plain text; cipher text based on joint encryption of paging Cause and access Type ⁇ ;
- PagingRecord you can set the encryption part first, and then set the plaintext part, that is, send the ciphertext part first, and then send the plaintext part.
- PagingRecord ⁇ ciphertext based on joint encryption of paging Cause and access Type; UE ID plaintext ⁇
- the encrypted part of PagingRecord can be jointly encrypted, or the encrypted part of PagingRecord can also be encrypted separately, for example:
- PagingRecord ⁇ UE ID plain text; cipher text encrypted based on paging Cause, cipher text encrypted based on access Type ⁇ ;
- step 1-2 When the digital signature function (per UE signature) is enabled for paging of the UE, the PagingRecord for the UE includes: the DS corresponding to the PagingRecord of the UE (corresponding to Embodiment 1) Step 2-2).
- the calculation of DS uses encrypted PagingRecord, that is, the sender needs to encrypt first and then sign.
- the paging message is ⁇ PagingRecord 1, PagingRecord 2,..., PagingRecord N ⁇ .
- PagingRecord 1 corresponds to UE 1
- PagingRecord 2 corresponds to UE 2
- PagingRecord N corresponds to UE N.
- the Paging message is ⁇ PagingRecord 1, DS1 ⁇ , ⁇ PagingRecord 2, DS2 ⁇ ,..., PagingRecord N ⁇ .
- step 1-3 When the digital signature function (per Paging message signature) is enabled for paging of the UE, the Paging message includes at least one of the following: the DS (per Paging message signature) corresponding to the paging message.
- the DS per Paging message signature
- DS is calculated using the encrypted Paging message, that is, the sender needs to encrypt first and then sign.
- Paging message is ⁇ PagingRecord 1, PagingRecord 2,..., PagingRecord N ⁇ .
- PagingRecord 1 corresponds to UE 1
- PagingRecord 2 corresponds to UE 2
- PagingRecord N corresponds to UE N.
- the Paging message is ⁇ PagingRecord1, PagingRecord 2,..., PagingRecord N, DS ⁇ . That is, UE1, UE2,...,UEN verify the Paging message based on the same DS.
- Step 2 Send the Paging message according to the contents of steps 1-1, 1-2, and 1-3.
- DS-related content can also be sent in another paging message.
- two paging messages can send paging with DS and paging without DS separately.
- Paging message is ⁇ PagingRecord 1, PagingRecord 2,..., PagingRecord N ⁇ .
- PagingRecord 1 corresponds to UE 1
- PagingRecord 2 corresponds to UE 2
- PagingRecord N corresponds to UE N.
- UE1 and UE2 have digital signature enabled, and other UEs have not enabled digital signature, then separate the UEs that have not enabled digital signatures and the UEs that have enabled digital signatures.
- Paging message 1 is ⁇ PagingRecord 3,...,PagingRecord N ⁇ ;
- Paging message 2 is ⁇ PagingRecord 1, DS1 ⁇ , ⁇ PagingRecord 2, DS2 ⁇ .
- an embodiment of the present application provides a paging message processing device, which is applied to a terminal.
- the device 600 includes:
- the first sending module 601 is used to send capability information related to the security protection of paging messages
- the first receiving module 602 is configured to receive configuration information, where the configuration information is used to enable or disable security protection for paging messages.
- the device further includes:
- the second sending module is configured to send a confirmation message to the terminal in response to the configuration information.
- the capability information includes at least one of the following:
- the configuration information is used for at least one of the following:
- the configuration information includes enabling the encryption function of paging messages, and the configuration information also includes at least one of the following:
- a first algorithm for encrypting the paging message wherein the capability information includes the first algorithm
- the configuration information includes enabling the digital signature function of paging messages, and the configuration information also includes at least one of the following:
- a second algorithm for digitally signing the paging message wherein the capability information includes the second algorithm
- the first input parameter includes: part of the information carried in the paging record of the terminal.
- the second input parameter includes any of the following:
- the device further includes:
- the second receiving module is used to receive paging messages
- the first determination module is configured to determine the content of the paging message according to the terminal's capability information and/or the configuration information.
- the first determination module is further used for:
- the paging record in the paging message includes at least one of the following: (1) the plain text part of the paging record; (2) the The encrypted portion of the paging record.
- the first determination module is further configured to perform any of the following:
- the configuration information includes enabling the digital signature function of paging messages
- the configuration information includes enabling the digital signature function of the paging message, determine that the paging message includes: the digital signature corresponding to the paging message;
- the capability information of the terminal includes a digital signature capability that supports paging messages
- the digital signature corresponding to the terminal's paging record is determined based on the encrypted paging record; or, the digital signature corresponding to the paging message is based on all encrypted paging records.
- the above paging message is determined.
- the device provided by the embodiment of the present application can implement each process implemented by the method embodiment in Figure 3 and achieve the same technical effect. To avoid duplication, the details will not be described here.
- an embodiment of the present application provides a paging message device, which is applied to network side equipment.
- the network side equipment includes core network equipment or a first base station.
- the first base station includes a terminal of the terminal.
- Serving base station, the device 700 includes:
- the third receiving module 701 is used to receive the capability information of the terminal related to the security protection of paging messages
- the third sending module 702 is configured to send configuration information to the terminal, where the configuration information is used to enable or disable security protection for the paging message.
- the device 700 further includes:
- the fourth receiving module is configured to receive a confirmation message sent by the terminal in response to the configuration information.
- the network side equipment includes core network equipment
- the device 700 further includes:
- a fourth sending module configured to send the configuration information to the first base station and/or at least one second base station;
- the first base station includes a serving base station of the terminal
- the at least one second base station includes a base station to which the radio access network notification area RNA configuration or tracking area TA configuration of the terminal belongs.
- the fourth sending module is further used for:
- the configuration information is sent to the at least one second base station.
- the fourth sending module is further used for:
- the confirmation message sent by the terminal in response to the configuration information is not successfully received, or when the network side device pages the terminal, send indication information to the first base station and/or at least one second base station,
- the indication information is used to indicate not to enable security protection for the paging message of the terminal.
- the network side device includes a first base station, the first base station includes a serving base station of the terminal, and the device further includes:
- the fifth sending module is configured to send the configuration information to at least one second base station, where the at least one second base station includes the base station to which the radio access network notification area RNA configuration or tracking area TA configuration of the terminal belongs.
- the fifth sending module is further used for:
- the configuration information is sent to the at least one second base station.
- the device further includes:
- the sixth sending module is configured to send indication information to at least one second base station when the confirmation message sent by the terminal in response to the configuration information is not successfully received, or when the network side device pages the terminal, so The indication information is used to indicate not to enable security protection for the paging message of the terminal.
- the network side device is a first base station
- the first base station includes a serving base station of the terminal
- the device further includes:
- the seventh sending module is used to send the capability information to the core network equipment
- the fifth receiving module is configured to receive the configuration information sent by the core network device.
- the network side device is the first base station, and the device further includes:
- the first judgment module is used to judge whether to enable security protection for the paging message of the terminal;
- the second determination module is used to determine the content of the paging message according to whether security protection is turned on or not;
- the eighth sending module is used to send the paging message.
- the first network judgment module is further used for at least one of the following:
- the sending order of the paging records in the paging message it is determined in sequence whether to enable security protection for the paging message; according to the configuration information, it is determined whether to enable security protection for the paging message.
- the second determination module is further used to:
- the paging record in the paging message includes at least one of the following:
- the second determination module includes at least one of the following:
- a first receiving unit configured to receive the encrypted part of the paging record sent by the core network device
- the first encryption unit is configured to perform an encryption operation on the paging record to obtain the encrypted part of the paging record.
- the second determination module is further configured to perform any of the following:
- the digital signature corresponding to the paging record of the terminal is determined based on the encrypted paging record.
- the device further includes:
- a third determination module configured to determine that the paging message includes a digital signature corresponding to the paging message
- the ninth sending module is used to send the paging message.
- the digital signature corresponding to the paging message is based on the encrypted paging message.
- the news is confirmed.
- the capability information includes at least one of the following:
- the configuration information is used for at least one of the following:
- the configuration information includes enabling the encryption function of paging messages, and the configuration information also includes at least one of the following:
- the configuration information includes enabling the digital signature function of paging messages, and the configuration information also includes at least one of the following:
- a second algorithm for digitally signing the paging message wherein the capability information of the terminal includes the second algorithm
- the first input parameter includes:
- the second input parameter includes any of the following:
- the device provided by the embodiment of the present application can implement each process implemented by the method embodiment in Figure 4 and achieve the same technical effect. To avoid duplication, the details will not be described here.
- an embodiment of the present application provides a paging message processing device, which is applied to a third base station.
- the third base station includes a first base station or a second base station.
- the first base station includes the serving base station of the terminal.
- the second base station includes the base station to which the RNA configuration or TA configuration of the terminal belongs.
- the device includes: a fourth determining module 801 and a tenth sending module 802, or a second judging module 803, a fifth determining module 804 and an eleventh sending module 805.
- the fourth determination module 801 is used to determine that the paging record in the paging message includes the digital signature corresponding to the paging message;
- the tenth sending module 802 is used to send the paging message
- the second judgment module 803 is used to judge whether to enable security protection for paging messages
- the fifth determination module 804 is used to determine the content of the paging message according to whether security protection is turned on or not;
- the eleventh sending module 805 is used to send the paging message.
- the second judgment module 803 is further used for at least one of the following:
- the sending order of the paging records in the paging message it is determined in sequence whether to enable security protection for the paging message; according to the configuration information, it is determined whether to enable security protection for the paging message.
- the fifth determination module 804 is further used to:
- the paging record in the paging message includes at least one of the following:
- the third base station includes the first base station
- the first base station includes the serving base station of the terminal
- the fifth determination module 804 includes at least one of the following:
- the second receiving unit is configured to receive the encrypted part of the paging record sent by the core network device, and the encryption operation of the encrypted part of the paging record is performed by the core network device;
- the second encryption unit is configured to perform an encryption operation on the paging record to obtain the encrypted part of the paging record.
- the third base station includes a second base station, and the second base station includes the base station to which the RNA configuration or TA configuration of the terminal belongs.
- the fifth determination module 804 includes:
- a second receiving unit configured to receive the encrypted part of the paging record sent by the anchor base station of the terminal, and the encryption operation of the encrypted part of the paging record is performed by the anchor base station;
- the anchor base station of the terminal includes the first base station.
- the fifth determination module 804 is further configured to perform any of the following:
- the digital signature function When the digital signature function is turned on, it is determined that the paging record in the paging message includes the digital signature corresponding to the paging record of the terminal;
- the digital signature function When the digital signature function is enabled, it is determined that the paging message includes a digital signature corresponding to the paging message.
- the digital signature corresponding to the paging record of the terminal is determined based on the encrypted paging record.
- the digital signature corresponding to the paging message is determined based on the encrypted paging message.
- the device further includes:
- the sixth receiving module is used to receive configuration information, where the configuration information is used to enable or disable security protection for the paging message.
- the configuration information is used for at least one of the following:
- the configuration information when the configuration information includes enabling the encryption function of paging messages, the configuration information further includes at least one of the following:
- the configuration information in the case where the configuration information includes enabling the digital signature function of paging messages, the configuration information further includes at least one of the following:
- a second algorithm for digitally signing the paging message wherein the capability information of the terminal includes the second algorithm
- the first input parameter includes:
- the second input parameter includes any of the following:
- the device provided by the embodiment of the present application can implement each process implemented by the method embodiment in Figure 5 and achieve the same technical effect. To avoid duplication, the details will not be described here.
- FIG. 9 is a schematic diagram of the hardware structure of a terminal that implements an embodiment of the present application.
- the terminal 900 includes but is not limited to: a radio frequency unit 901, a network module 902, an audio output unit 903, an input unit 904, a sensor 905, a display unit 906, a user input unit 907, an interface unit 908, a memory 909, a processor 910, etc. At least some parts.
- the terminal 900 may also include a power supply (such as a battery) that supplies power to various components.
- the power supply may be logically connected to the processor 910 through a power management system, thereby managing charging, discharging, and power consumption through the power management system. Management and other functions.
- the terminal structure shown in FIG. 9 does not constitute a limitation on the terminal.
- the terminal may include more or fewer components than shown in the figure, or may combine certain components, or arrange different components, which will not be described again here.
- the input unit 904 may include a graphics processing unit (GPU) 9041 and a microphone 9042.
- the graphics processor 9041 is responsible for the image capture device (GPU) in the video capture mode or the image capture mode. Process the image data of still pictures or videos obtained by cameras (such as cameras).
- the display unit 906 may include a display panel 9061, which may be configured in the form of a liquid crystal display, an organic light emitting diode, or the like.
- the user input unit 907 includes a touch panel 9071 and at least one of other input devices 9072 A sort of. Touch panel 9071, also known as touch screen.
- the touch panel 9071 may include two parts: a touch detection device and a touch controller.
- Other input devices 9072 may include but are not limited to physical keyboards, function keys (such as volume control keys, switch keys, etc.), trackballs, mice, and joysticks, which will not be described again here.
- the radio frequency unit 901 after receiving downlink data from the network side device, can transmit it to the processor 910 for processing; in addition, the radio frequency unit 901 can send uplink data to the network side device.
- the radio frequency unit 901 includes, but is not limited to, an antenna, an amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, etc.
- Memory 909 may be used to store software programs or instructions as well as various data.
- the memory 909 may mainly include a first storage area for storing programs or instructions and a second storage area for storing data, wherein the first storage area may store an operating system, an application program or instructions required for at least one function (such as a sound playback function, Image playback function, etc.) etc.
- memory 909 may include volatile memory or nonvolatile memory, or memory 909 may include both volatile and nonvolatile memory.
- non-volatile memory can be read-only memory (Read-Only Memory, ROM), programmable read-only memory (Programmable ROM, PROM), erasable programmable read-only memory (Erasable PROM, EPROM), electrically removable memory.
- Volatile memory can be random access memory (Random Access Memory, RAM), static random access memory (Static RAM, SRAM), dynamic random access memory (Dynamic RAM, DRAM), synchronous dynamic random access memory (Synchronous DRAM, SDRAM), double data rate synchronous dynamic random access memory (Double Data Rate SDRAM, DDRSDRAM), enhanced synchronous dynamic random access memory (Enhanced SDRAM, ESDRAM), synchronous link dynamic random access memory (Synch link DRAM) , SLDRAM) and direct memory bus random access memory (Direct Rambus RAM, DRRAM).
- RAM Random Access Memory
- SRAM static random access memory
- DRAM dynamic random access memory
- synchronous dynamic random access memory Synchronous DRAM, SDRAM
- Double data rate synchronous dynamic random access memory Double Data Rate SDRAM, DDRSDRAM
- Enhanced SDRAM, ESDRAM synchronous link dynamic random access memory
- Synch link DRAM synchronous link dynamic random access memory
- SLDRAM direct memory bus random access memory
- the processor 910 may include one or more processing units; optionally, the processor 910 integrates an application processor and a modem processor, where the application processor mainly handles operations related to the operating system, user interface, application programs, etc., Modem processors mainly process wireless communication signals, such as baseband processors. It can be understood that the above modem processor may not be integrated into the processor 910.
- the terminal provided by the embodiment of this application can implement each process implemented by the method embodiment in Figure 3 and achieve the same technical effect. To avoid duplication, details will not be described here.
- Figure 10 is a structural diagram of a communication device applied in an embodiment of the present invention.
- the communication device 1000 includes: a processor 1001, a transceiver 1002, a memory 1003 and a bus interface.
- the processor 1001 May be responsible for managing the bus architecture and general processing.
- Memory 1003 may store data used by processor 1001 in performing operations.
- the communication device 1000 further includes: a program stored in the memory 1003 and executable on the processor 1001. When the program is executed by the processor 1001, the steps in the method shown in Figure 4 or Figure 5 are implemented. .
- the bus architecture may include any number of interconnected buses and bridges, specifically linked together by various circuits of one or more processors represented by processor 1001 and memory represented by memory 1003.
- the bus architecture also links together various other circuits such as peripherals, voltage regulators, and power management circuits, which are It is well known in the art and therefore will not be described further herein.
- the bus interface provides the interface.
- Transceiver 1002 may be a plurality of elements, including a transmitter and a receiver, providing a unit for communicating with various other devices over a transmission medium.
- this embodiment of the present application also provides a communication device 1100, which includes a processor 1101 and a memory 1102.
- the memory 1102 stores programs or instructions that can be run on the processor 1101, such as , when the communication device 1100 is a terminal, when the program or instruction is executed by the processor 1101, each step of the method embodiment in Figure 3 is implemented.
- the communication device 1100 is a network side device, when the program or instruction is executed by the processor 1101
- Each step of the above-mentioned method embodiment in Figure 4 or Figure 5 can be implemented and the same technical effect can be achieved. To avoid repetition, details will not be described here.
- Embodiments of the present application also provide a readable storage medium, with programs or instructions stored on the readable storage medium.
- the program or instructions are executed by a processor, the method in Figure 3 or Figure 4 or Figure 5 and the above-mentioned embodiments are implemented. Each process can achieve the same technical effect. To avoid repetition, we will not go into details here.
- the processor is the processor in the terminal described in the above embodiment.
- the readable storage medium may be non-volatile or non-transient.
- Readable storage media may include computer-readable storage media, such as computer read-only memory ROM, random access memory RAM, magnetic disks or optical disks.
- An embodiment of the present application further provides a chip.
- the chip includes a processor and a communication interface.
- the communication interface is coupled to the processor.
- the processor is used to run programs or instructions to implement FIG. 3 or FIG. 4 or FIG.
- Each process shown in 5 and the above-mentioned method embodiments can achieve the same technical effect. To avoid repetition, it will not be described again here.
- chips mentioned in the embodiments of this application may also be called system-on-chip, system-on-a-chip, system-on-chip or system-on-chip, etc.
- Embodiments of the present application further provide a computer program/program product, the computer program/program product is stored in a storage medium, and the computer program/program product is executed by at least one processor to implement Figure 3 or Figure 4 or
- the various processes of the method embodiments shown in Figure 5 and above can achieve the same technical effect. To avoid repetition, they will not be described again here.
- An embodiment of the present application further provides a communication system.
- the communication system includes a terminal and a network side device.
- the terminal is used to perform various processes in Figure 3 and the above method embodiments.
- the network side device is used to perform the following: The processes in Figure 4 or Figure 5 and the above-mentioned method embodiments can achieve the same technical effect. To avoid repetition, they will not be described again here.
- the methods of the above embodiments can be implemented by means of software plus the necessary general hardware platform. Of course, it can also be implemented by hardware, but in many cases the former is better. implementation.
- the technical solution of the present application can be embodied in the form of a computer software product that is essentially or contributes to related technologies.
- the computer software product is stored in a storage medium (such as ROM/RAM, disk, CD), including several instructions to cause a terminal (which can be a mobile phone, computer, server, air conditioner, or network device, etc.) to execute the methods described in various embodiments of this application.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
本申请公开了一种寻呼消息处理方法、装置、通信设备及可读存储介质,该方法包括:终端发送与寻呼消息的安全保护相关的能力信息;所述终端接收配置信息,所述配置信息用于对寻呼消息开启或不开启安全保护。
Description
相关申请的交叉引用
本申请主张在2022年8月26日在中国提交的中国专利申请No.202211035819.2的优先权,其全部内容通过引用包含于此。
本申请属于通信技术领域,具体涉及一种寻呼消息处理方法、装置、通信设备及可读存储介质。
相关技术中,基站通过广播方式向终端(比如,用户设备(User Equipment,UE)发送寻呼消息。寻呼消息的内容通过明文的方式发送。如果一个非法基站发送了寻呼消息,指示驻留其下的终端进行某些操作(比如:按照演进的分组系统(Evolved Packet System,EPS)回退指示(fallback indicator)从第五代移动通信技术(5th Generation,5G)网络回退到第四代移动通信技术(4th Generation,4G)网络),终端将按照非法基站的指示进行工作。这将导致运营商配置的相关策略失效;甚至还可能诱导UE接入非法基站,给用户造成不可预知的损失。因此,相关技术中寻呼过程的安全性较低。
发明内容
本申请实施例提供一种寻呼消息处理方法、装置、通信设备及可读存储介质,解决如何提升寻呼安全的问题。
第一方面,提供一种寻呼消息处理方法,包括:
终端发送与寻呼消息的安全保护相关的能力信息;
所述终端接收配置信息,所述配置信息用于对寻呼消息开启或不开启安全保护。
第二方面,提供一种寻呼消息处理方法,包括:
网络侧设备接收终端的与寻呼消息的安全保护相关的能力信息;
所述网络侧设备向所述终端发送配置信息,所述配置信息用于对寻呼消息开启或不开启安全保护。
第三方面,提供一种寻呼消息处理方法,包括:
第三基站确定寻呼消息中的寻呼记录包括所述寻呼消息对应的数字签名;
所述第三基站发送所述寻呼消息;
或者,
第三基站判断是否对寻呼消息开启安全保护;
所述第三基站根据开启或不开启安全保护的情况,确定所述寻呼消息的内容;
所述第三基站发送所述寻呼消息。
第四方面,提供一种寻呼消息处理装置,包括:
第一发送模块,用于发送与寻呼消息的安全保护相关的能力信息;
第一接收模块,用于接收配置信息,所述配置信息用于对寻呼消息开启或不开启安全保护。
第五方面,提供一种寻呼消息装置,包括:
第三接收模块,用于接收终端的与寻呼消息的安全保护相关的能力信息;
第三发送模块,用于向所述终端发送配置信息,所述配置信息用于对寻呼消息开启或不开启安全保护。
第六方面,提供一种寻呼消息处理装置,包括:
第四确定模块,用于确定寻呼消息中的寻呼记录包括所述寻呼消息对应的数字签名;
第十发送模块,用于发送所述寻呼消息;
或者,
第二判断模块,用于判断是否对寻呼消息开启安全保护;
第五确定模块,用于根据开启或不开启安全保护的情况,确定所述寻呼消息的内容;
第十一发送模块,用于发送所述寻呼消息。
第七方面,提供了一种通信设备,包括:处理器,存储器及存储在所述存储器上并可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现如第一方面或第二方面或第三方面所述的方法的步骤。
第八方面,提供了一种可读存储介质,所述可读存储介质上存储程序或指令,所述程序或指令被处理器执行时实现如第一方面或第二方面或第三方面所述的方法的步骤。
第九方面,提供了一种芯片,所述芯片包括处理器和通信接口,所述通信接口和所述处理器耦合,所述处理器用于运行程序或指令,实现如第一方面或第二方面或第三方面所述的法的步骤。
第十方面,提供了一种计算机程序/程序产品,所述计算机程序/程序产品被存储在非瞬态的存储介质中,所述程序/程序产品被至少一个处理器执行以实现如第一方面或第二方面或第三方面所述的方法的步骤。
第十一方面,提供一种通信系统,所述通信系统包括终端与网络侧设备,所述终端用于执行如第一方面所述的方法的步骤,所述网络侧设备用于执行如第二方面或第三方面所述的方法的步骤。
在本申请实施例中,通过终端与网络侧设备协商,对寻呼消息进行安全保护,从而减
少非法基站对终端的不良影响,提升寻呼安全。
图1为使用数字签名验证系统消息的示意图;
图2为本申请实施例的无线通信系统的架构示意图;
图3为本申请实施例的寻呼消息处理方法的流程图之一;
图4为本申请实施例的寻呼消息处理方法的流程图之二;
图5为本申请实施例的寻呼消息处理方法的流程图之三;
图6为本申请实施例的寻呼消息处理装置的示意图之一;
图7为本申请实施例的寻呼消息处理装置的示意图之二;
图8为本申请实施例的寻呼消息处理装置的示意图之三;
图9为本申请实施例的终端的示意图;
图10为本申请实施例的网络侧设备的示意图;
图11为本申请实施例的通信设备的示意图。
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员所获得的所有其他实施例,都属于本申请保护的范围。
本申请的说明书和权利要求书中的术语“第一”、“第二”等是用于区别类似的对象,而不用于描述特定的顺序或先后次序。应该理解这样使用的术语在适当情况下可以互换,以便本申请的实施例能够以除了在这里图示或描述的那些以外的顺序实施,且“第一”、“第二”所区别的对象通常为一类,并不限定对象的个数,例如第一对象可以是一个,也可以是多个。此外,说明书以及权利要求中“和/或”表示所连接对象的至少其中之一,字符“/”一般表示前后关联对象是一种“或”的关系。
值得指出的是,本申请实施例所描述的技术不限于长期演进型(Long Term Evolution,LTE)/LTE的演进(LTE-Advanced,LTE-A)系统,还可用于其他无线通信系统,诸如码分多址(Code Division Multiple Access,CDMA)、时分多址(Time Division Multiple Access,TDMA)、频分多址(Frequency Division Multiple Access,FDMA)、正交频分多址(Orthogonal Frequency Division Multiple Access,OFDMA)、单载波频分多址(Single-carrier Frequency Division Multiple Access,SC-FDMA)和其他系统。本申请实施例中的术语“系统”和“网络”常被可互换地使用,所描述的技术既可用于以上提及的系统和无线电技术,也可用于其他系统和无线电技术。以下描述出于示例目的描述了新空口(New Radio,NR)系统,并且在以下大部分描述中使用NR术语,但是这些技术也可应用于NR系统应用以外的应用,
如第6代(6th Generation,6G)通信系统。
为了便于理解本申请的实施方式,下面先介绍以下技术点。
一、关于系统消息签名。
如图1所示,系统消息的验证采用以下作为输入参数:系统消息(System Information,SI),签名秘钥,与所述SI发送时间相关的信息等;输出结果为与所述SI对应的数字签名(Digital Signature,DS)。
相关技术中公开了针对系统消息进行数字签名的方法,但是对于系统消息没有加密需求,主要是做了完整性保护。因此,针对寻呼消息是否以及如何进行加密和/或完整性保护的机制尚不明确。
二、关于寻呼消息(Paging message)。
网络通过寻呼消息呼叫一个或多个UE。一条寻呼消息包含至少一个寻呼记录(Paging Record),每个寻呼记录对应一个UE的寻呼,可携带如下信息:
-终端标识(UE Identifer,UE ID),例如5G S-临时移动订阅标识符(5G S-Temporary Mobile Subscription Identifier,5G-S-TMSI),非激活无线网络临时标识(Inactive Radio Network Temporary Identifier,I-RNTI);
-寻呼原因(paging Cause),例如,语音(Voice);
-接入类型(access Type),例如,第三代合作伙伴计划(3rd Generation Partnership Project,3GPP)接入方式,非3GPP接入方式。
图2示出本申请实施例可应用的一种无线通信系统的框图。无线通信系统包括终端21和网络侧设备22。
其中,终端21可以是手机、平板电脑(Tablet Personal Computer)、膝上型电脑(Laptop Computer)或称为笔记本电脑、个人数字助理(Personal Digital Assistant,PDA)、掌上电脑、上网本、超级移动个人计算机(ultra-mobile personal computer,UMPC)、移动上网装置(Mobile Internet Device,MID)、增强现实(augmented reality,AR)/虚拟现实(virtual reality,VR)设备、机器人、可穿戴式设备(Wearable Device)、车载设备(Vehicle User Equipment,VUE)、行人终端(Pedestrian User Equipment,PUE)、智能家居(具有无线通信功能的家居设备,如冰箱、电视、洗衣机或者家具等)、游戏机、个人计算机(personal computer,PC)、柜员机或者自助机等终端侧设备,可穿戴式设备包括:智能手表、智能手环、智能耳机、智能眼镜、智能首饰(智能手镯、智能手链、智能戒指、智能项链、智能脚镯、智能脚链等)、智能腕带、智能服装等。除了上述终端设备,本申请涉及的终端也可以是终端内的芯片,例如调制解调器(Modem)芯片,系统级芯片(System on Chip,SoC)。需要说明的是,在本申请实施例并不限定终端21的具体类型。
网络侧设备22可以包括接入网设备或核心网设备,其中,接入网设备也可以称为无线接入网设备、无线接入网(Radio Access Network,RAN)、无线接入网功能或无线接入网单元。接入网设备12可以包括基站、无线局域网(Wireless Local Area Network,WLAN)
接入点或WiFi节点等,基站可被称为节点B、演进节点B(eNB)、接入点、基收发机站(Base Transceiver Station,BTS)、无线电基站、无线电收发机、基本服务集(Basic Service Set,BSS)、扩展服务集(Extended Service Set,ESS)、家用B节点、家用演进型B节点、发送接收点(Transmitting Receiving Point,TRP)或所述领域中其他某个合适的术语,只要达到相同的技术效果,所述基站不限于特定技术词汇,需要说明的是,在本申请实施例中仅以NR系统中的基站为例进行介绍,并不限定基站的具体类型。
核心网设备可以包含但不限于如下至少一项:核心网节点、核心网功能、移动管理实体(Mobility Management Entity,MME)、接入和移动管理功能(Access and Mobility Management Function,AMF)、会话管理功能(Session Management Function,SMF)、用户平面功能(User Plane Function,UPF)、策略控制功能(Policy Control Function,PCF)、策略与计费规则功能单元(Policy and Charging Rules Function,PCRF)、边缘应用服务发现功能(Edge Application Server Discovery Function,EASDF)、统一数据管理(Unified Data Management,UDM),统一数据仓储(Unified Data Repository,UDR)、归属用户服务器(Home Subscriber Server,HSS)、集中式网络配置(Centralized network configuration,CNC)、网络存储功能(Network Repository Function,NRF),网络开放功能(Network Exposure Function,NEF)、本地NEF(Local NEF,或L-NEF)、绑定支持功能(Binding Support Function,BSF)、应用功能(Application Function,AF)等。需要说明的是,在本申请实施例中仅以NR系统中的核心网设备为例进行介绍,并不限定核心网设备的具体类型。
下面结合附图,通过一些实施例及其应用场景对本申请实施例提供的寻呼消息处理方法、装置、通信设备及可读存储介质进行详细地说明。
参见图3,本申请实施例提供一种寻呼消息处理方法,应用于终端,该方法包括:步骤301和步骤302。
步骤301:终端发送与寻呼消息的安全保护相关的能力信息;
比如,终端向核心网设备或服务基站发送能力信息,其中核心网设备包括但不限于AMF。
步骤302:终端接收配置信息,所述配置信息用于对寻呼消息开启或不开启安全保护。
比如,终端可以从核心网设备或服务基站接收配置信息,其中核心网设备或服务基站可以基于每个终端上报的能力信息分别给每个终端发送对应的配置信息,从而可以做到每个终端(per UE)级别的安全保护。
可选的,安全保护包括加密和/或数字签名。
在本实施例中,通过步骤301和步骤302实现终端与网络侧设备协商对寻呼消息进行安全保护,有效提升寻呼安全。
在本申请的一种实施方式中,所述方法还包括:
响应于所述配置信息,所述终端发送确认消息。
在本申请的一种实施方式中,所述能力信息包括以下至少一项:
(1)支持寻呼消息的加密能力,或者不支持寻呼消息的加密能力;
(2)支持对寻呼消息进行加密的至少一种算法;
(3)支持寻呼消息的数字签名能力,或者不支持寻呼消息的数字签名能力;
(4)支持对寻呼消息进行数字签名的至少一种算法。
在本申请的一种实施方式中,所述配置信息用于以下至少一项:
(1)开启寻呼消息的加密功能;
(2)不开启寻呼消息的加密功能;
(3)开启寻呼消息的数字签名功能;
(4)不开启寻呼消息的数字签名功能。
在本申请的一种实施方式中,所述配置信息包括开启寻呼消息的加密功能,所述配置信息还包括以下至少一项:
(1)对所述寻呼消息进行加密的第一算法;其中,所述能力信息包括所述第一算法;
(2)对所述寻呼消息进行加密的第一输入参数。
在本申请的一种实施方式中,所述第一输入参数包括:所述终端的寻呼记录中携带的部分信息,比如,可以是paging Cause,access Type的任意组合,通过第一输入参数可以实现对寻呼消息中指定部分内容进行安全保护。
在本申请的一种实施方式中,所述配置信息包括开启寻呼消息的数字签名功能,所述配置信息还包括以下至少一项:
(1)对所述寻呼消息进行数字签名的第二算法;其中,所述能力信息包括所述第二算法;
(2)对所述寻呼消息进行数字签名的第二输入参数。
在本申请的一种实施方式中,所述第二输入参数包括以下任一项:
(1)完整的所述寻呼消息;
(2)所述寻呼消息中包含的所述终端的寻呼记录;
(3)所述终端的寻呼记录中携带的部分信息,比如,可以是UE ID,paging Cause,access Type的任意组合。
在本申请的一种实施方式中,所述方法还包括:
所述终端接收寻呼消息;
所述终端根据所述终端的能力信息和/或所述配置信息确定所述寻呼消息的内容。
在本实施例中,终端可以通过所述终端的能力信息和/或所述配置信息确定所述寻呼消息的内容,进而验证基站的合法性。
在本申请的一种实施方式中,所述终端根据所述终端的能力信息和/或所述配置信息确定所述寻呼消息的内容,包括:
在所述配置信息包括开启寻呼消息的加密功能的情况下,所述终端确定所述寻呼消息中的寻呼记录包括以下至少一项:(1)所述寻呼记录的明文部分;(2)所述寻呼记录的加
密部分。
在本申请的一种实施方式中,所述终端根据终端的能力信息和/或所述配置信息确定所述寻呼消息的内容,包括以下任一项:
(1)在所述配置信息包括开启寻呼消息的数字签名功能的情况下,所述终端确定所述寻呼消息中的寻呼记录包括:所述终端的寻呼记录对应的数字签名;
(2)在所述配置信息包括开启寻呼消息的数字签名功能的情况下,所述终端确定所述寻呼消息包括:所述寻呼消息对应的数字签名;
(3)在所述终端的能力信息包括支持寻呼消息的数字签名能力的情况下,所述终端确定所述寻呼消息包括:所述寻呼消息对应的数字签名。
在本申请的一种实施方式中,所述终端的寻呼记录对应的数字签名是基于经过加密的所述寻呼记录确定的;或者,所述寻呼消息对应的数字签名基于经过加密的所述寻呼消息确定的。
在本申请实施例中,实现对寻呼信息进行完全保护,减少非法基站对终端的不良影响,提升寻呼安全。
参见图4,本申请实施例提供一种寻呼消息方法,应用于网络侧设备,可选的,所述网络侧设备包括核心网设备或第一基站,所述第一基站包括所述终端的服务基站,该方法包括:步骤401和步骤402。
步骤401:网络侧设备接收终端的与寻呼消息的安全保护相关的能力信息;
步骤402:网络侧设备向所述终端发送配置信息,所述配置信息用于对寻呼消息开启或不开启安全保护。
在本申请的一种实施方式中,所述方法还包括:
所述网络侧设备接收所述终端响应于所述配置信息发送的确认消息。
在本申请的一种实施方式中,所述网络侧设备包括核心网设备,所述方法还包括:
所述网络侧设备将所述配置信息发送给第一基站和/或至少一个第二基站;
其中,所述第一基站包括所述终端的服务基站,所述至少一个第二基站包括所述终端的无线接入网通知区域(RAN Notification Area,RNA)配置或跟踪区(Tracking Area,TA)配置所属的基站。
在本申请的一种实施方式中,所述网络侧设备将所述配置信息发送给所述第一基站和/或至少一个第二基站,包括:
在所述网络侧设备成功接收到所述确认消息时,或者在所述网络侧设备寻呼所述终端时,所述网络侧设备将所述配置信息发送给所述第一基站和/或所述至少一个第二基站。
在本申请的一种实施方式中,所述方法还包括:
在所述网络侧设备未成功接收到所述终端响应于所述配置信息发送的确认消息时,或者在所述网络侧设备寻呼所述终端时,所述网络侧设备向所述第一基站和/或至少一个第二基站发送指示信息,所述指示信息用于指示对所述终端的寻呼消息不开启安全保护。
在本申请的一种实施方式中,所述网络侧设备包括第一基站,所述第一基站包括所述终端的服务基站,所述方法还包括:
所述网络侧设备将所述配置信息发送给至少一个第二基站,所述至少一个第二基站包括所述终端的无线接入网通知区域RNA配置或跟踪区TA配置所属的基站。
在本申请的一种实施方式中,所述网络侧设备将所述配置信息发送给至少一个第二基站,包括:
在所述网络侧设备成功接收到所述终端响应于所述配置信息发送的确认消息时,或者在所述网络侧设备寻呼所述终端时,所述网络侧设备将所述配置信息发送给所述至少一个第二基站。
在本申请的一种实施方式中,所述方法还包括:
在所述网络侧设备未成功接收到所述终端响应于所述配置信息发送的确认消息时,或者在所述网络侧设备寻呼所述终端时,所述网络侧设备向至少一个第二基站发送指示信息,所述指示信息用于指示对所述终端的寻呼消息不开启安全保护。
在本申请的一种实施方式中,所述网络侧设备为所述第一基站,所述第一基站包括所述终端的服务基站,在所述网络侧设备向终端发送配置信息之前,所述方法还包括:
所述网络侧设备向核心网设备发送所述能力信息;
所述网络侧设备接收所述核心网设备发送的所述配置信息。
在本申请的一种实施方式中,所述网络侧设备为第一基站,所述方法还包括:
所述网络侧设备判断是否对所述终端的寻呼消息开启安全保护;
所述网络侧设备根据开启或不开启安全保护的情况,确定所述寻呼消息的内容;
所述网络侧设备发送所述寻呼消息。
在本申请的一种实施方式中,所述网络侧设备判断是否对寻呼消息开启安全保护,包括以下至少一项:
所述网络侧设备根据所述寻呼消息中的寻呼记录的发送顺序,依次判断是否对所述寻呼消息开启安全保护;
所述网络侧设备根据配置信息,确定是否对所述寻呼消息开启安全保护。
在本申请的一种实施方式中,所述网络侧设备根据开启安全保护的情况,确定所述寻呼消息的内容,包括:
在开启加密功能的情况下,所述网络侧设备确定所述寻呼消息中的寻呼记录包括以下至少一项:
(1)所述寻呼记录的明文部分;
(2)所述寻呼记录的加密部分。
在本申请的一种实施方式中,所述网络侧设备根据开启安全保护的情况,确定所述寻呼消息中的寻呼记录包括所述寻呼记录的加密部分,包括以下至少一项:
所述网络侧设备接收核心网设备发送的所述寻呼记录的加密部分;
所述网络侧设备对所述寻呼记录执行加密操作,得到所述寻呼记录的加密部分。
在本申请的一种实施方式中,所述网络侧设备根据开启安全保护的情况,确定所述寻呼消息的内容,包括以下任一项:
(1)在所述开启数字签名功能的情况下,所述网络侧设备确定所述寻呼消息中的寻呼记录包括所述终端的寻呼记录对应的数字签名;
(2)在开启数字签名功能的情况下,所述网络侧设备确定所述寻呼消息包括所述寻呼消息对应的数字签名。
在本申请的一种实施方式中,所述终端的寻呼记录对应的数字签名是基于加密后的寻呼记录确定的。
在本申请的一种实施方式中,所述方法还包括:
所述网络侧设备确定所述寻呼消息包括所述寻呼消息对应的数字签名;
所述网络侧设备发送所述寻呼消息。
在本申请的一种实施方式中,所述寻呼消息对应的数字签名是基于加密后的所述寻呼消息确定的。
在本申请的一种实施方式中,所述能力信息包括以下至少一项:
(1)支持寻呼消息的加密能力,或者不支持寻呼消息的加密能力;
(2)支持对寻呼消息进行加密的至少一种算法;
(3)支持寻呼消息的数字签名能力,或者不支持寻呼消息的数字签名能力;
(4)支持对寻呼消息进行数字签名的至少一种算法。
在本申请的一种实施方式中,所述配置信息用于以下至少一项:
(1)开启寻呼消息的加密功能;
(2)不开启寻呼消息的加密功能;
(3)开启寻呼消息的数字签名功能;
(4)不开启寻呼消息的数字签名功能。
在本申请的一种实施方式中,所述配置信息包括开启寻呼消息的加密功能,所述配置信息还包括以下至少一项:
(1)对所述寻呼消息进行加密的第一算法的信息,其中,所述终端的能力信息包括所述第一算法;
(2)对所述寻呼消息进行加密的第一输入参数。
在本申请的一种实施方式中,所述配置信息包括开启寻呼消息的数字签名功能,所述配置信息还包括以下至少一项:
(1)对所述寻呼消息进行数字签名的第二算法;其中,所述终端的能力信息包括所述第二算法;
(2)对所述寻呼消息进行数字签名的第二输入参数。
在本申请的一种实施方式中,所述第一输入参数包括:
所述终端的寻呼记录中携带的部分信息。
在本申请的一种实施方式中,所述第二输入参数包括以下任一项:
(1)完整的所述寻呼消息;
(2)所述寻呼消息中包含的所述终端的寻呼记录;
(3)所述终端的寻呼记录中携带的部分信息。
在本申请实施例中,通过终端与网络侧设备协商对寻呼消息进行安全保护,减少非法基站对终端的不良影响,提升寻呼安全。
参见图5,本申请实施例提供一种寻呼消息处理方法,应用于第三基站,所述第三基站包括第一基站或第二基站,所述第一基站包括所述终端的服务基站,所述第二基站包括所述终端的RNA配置或TA配置所属的基站。具体步骤包括:步骤501和步骤502,或者,步骤503、步骤504和步骤505。
步骤501:第三基站确定寻呼消息中的寻呼记录包括所述寻呼消息对应的数字签名;
步骤502:第三基站发送所述寻呼消息;
或者,
步骤503:第三基站判断是否对寻呼消息开启安全保护;
步骤504:第三基站根据开启或不开启安全保护的情况,确定所述寻呼消息的内容;
步骤505:第三基站发送所述寻呼消息。
可以理解的是,第三基站在确定寻呼消息的内容时可以根据配置信息确定。
在本申请的一种实施方式中,所述第三基站判断是否对寻呼消息开启安全保护,包括以下至少一项:
所述第三基站根据所述寻呼消息中的寻呼记录的发送顺序,依次判断是否对寻呼消息是否开启安全保护;
所述网络侧设备根据配置信息,确定是否对所述寻呼消息开启安全保护。
在本申请的一种实施方式中,所述第三基站根据开启安全保护的情况,确定所述寻呼消息的内容,包括:
在开启加密功能的情况下,所述第三基站确定所述寻呼消息中的寻呼记录包括以下至少一项:
(1)所述寻呼记录的明文部分;
(2)所述寻呼记录的加密部分。
在本申请的一种实施方式中,所述第三基站包括第一基站,所述第一基站包括所述终端的服务基站,所述第三基站确定所述寻呼消息中的寻呼记录包括所述寻呼记录的加密部分,包括以下至少一项:
所述第三基站接收核心网设备发送的所述寻呼记录的加密部分,所述寻呼记录的加密部分的加密操作由所述核心网设备执行;
所述第三基站对所述寻呼记录执行加密操作,得到所述寻呼记录的加密部分。
在本申请的一种实施方式中,所述第三基站包括第二基站,所述第二基站包括所述终端的RNA配置或TA配置所属的基站,所述第三基站确定所述寻呼消息中的寻呼记录包括所述寻呼记录的加密部分,包括:
所述第三基站接收所述终端的锚点基站发送的所述寻呼记录的加密部分,所述寻呼记录的加密部分的加密操作由所述锚点基站执行;
其中,所述终端的锚点基站包括所述第一基站。
在本申请的一种实施方式中,在开启安全保护的情况下,所述第三基站根据开启安全保护的情况,确定所述寻呼消息的内容,包括以下任一项:
在开启数字签名功能的情况下,所述第三基站确定所述寻呼消息中的寻呼记录包括所述终端的寻呼记录对应的数字签名;
在开启数字签名功能的情况下,所述第三基站确定所述寻呼消息中包括所述寻呼消息对应的数字签名。
在本申请的一种实施方式中,所述终端的寻呼记录对应的数字签名是基于加密后的所述寻呼记录确定的。
在本申请的一种实施方式中,所述寻呼消息对应的数字签名是基于加密后的所述寻呼消息确定的。
在本申请的一种实施方式中,所述第三基站判断是否对终端的寻呼消息开启安全保护之前,所述方法还包括:
所述第三基站接收配置信息,所述配置信息用于对寻呼消息开启或不开启安全保护。
在本申请的一种实施方式中,所述配置信息用于以下至少一项:
(1)开启寻呼消息的加密功能;
(2)不开启寻呼消息的加密功能;
(3)开启寻呼消息的数字签名功能;
(4)不开启寻呼消息的数字签名功能。
在本申请的一种实施方式中,在所述配置信息包括开启寻呼消息的加密功能的情况下,所述配置信息还包括以下至少一项:
(1)对所述寻呼消息进行加密的第一算法;其中,所述终端的能力信息包括所述第一算法;
(2)对所述寻呼消息进行加密的第一输入参数。
在本申请的一种实施方式中,在所述配置信息包括开启寻呼消息的数字签名功能的情况下,所述配置信息还包括以下至少一项:
(1)对所述寻呼消息进行数字签名的第二算法;其中,所述终端的能力信息包括所述第二算法;
(2)对所述寻呼消息进行数字签名的第二输入参数。
在本申请的一种实施方式中,所述第一输入参数包括:
所述终端的寻呼记录中携带的部分信息。
在本申请的一种实施方式中,所述第二输入参数包括以下任一项:
(1)完整的所述寻呼消息;
(2)所述寻呼消息中包含的所述终端的寻呼记录;
(3)所述终端的寻呼记录中携带的部分信息。
在本实施例中,第三基站可以将包括数字签名的寻呼消息,或者将根据开启或不开启安全保护的情况确定的寻呼消息发送给终端,使得终端可以通过终端的能力信息和/或配置信息确定寻呼消息的内容,进而验证基站的合法性,减少非法基站对终端的不良影响,提升寻呼安全。
实施例一:网络侧设备与UE之间针对寻呼消息是否以及如何进行安全保护的协商流程。
示例1:网络侧设备为服务UE的核心网设备(例如,AMF),基于非接入层(Non-Access Stratum,NAS)流程实现安全保护的协商。示例1适用于无线资源控制(Radio Resource Control,RRC)空闲(idle)状态的核心网(Core Network,CN)寻呼(paging)和RRC非激活(inactive)状态的无线接入网(Radio Access Network,RAN)paging。
步骤1:UE向核心网设备发送针对寻呼消息进行安全保护的能力信息,该能力信息可以包括以下至少一项:
(1)支持寻呼消息的加密能力,或不支持寻呼消息的加密能力;
(2)支持对寻呼消息进行加密的至少一种算法;
(3)支持寻呼消息的数字签名能力,或不支持寻呼消息的数字签名能力;
(4)支持对寻呼消息进行数字签名的至少一种算法。
步骤2:核心网设备向UE发送针对寻呼消息进行安全保护的配置信息,该配置信息可以用于如下至少一项:
(1)开启寻呼消息的加密功能;
(2)不开启寻呼消息的加密功能;
(3)开启寻呼消息的数字签名功能;
(4)不开启寻呼消息的数字签名功能。
可选的,步骤2-1:在配置信息包括开启寻呼消息的加密功能的情况下,配置信息还可以包括如下至少一项:
(1)对寻呼消息进行加密的第一算法,其中,所述终端的能力信息包括所述第一算法;
(2)对寻呼消息进行加密的第一输入参数,可选的,该第一输入参数包括寻呼消息携带的除了UE ID之外的任意信息。比如,可以是paging Cause,access Type的任意组合。
可选的,步骤2-2:在配置信息包括开启寻呼消息的数字签名功能的情况下,配置信息还可以包括如下至少一项:
(1)对寻呼消息进行数字签名的第二算法,其中,所述终端的能力信息包括所述第二算法;
(2)对寻呼消息进行数字签名的第二输入参数;
其中,第二输入参数可以包括以下任一项:
(a)完整的寻呼消息,所述寻呼消息至少包含该UE的Paging Record(即整条Paging消息签名);
(b)寻呼消息中包含的该UE的Paging Record(即,每个UE或每个Paging Record签名);
(c)该UE的Paging Record中携带的部分信息(即,每个UE或每个Paging Record签名的进一步简化)。比如,可以是UE ID,paging Cause,access Type的任意组合。
步骤3:UE向核心网设备发送针对寻呼消息进行安全保护的配置信息的确认消息。
可选的,步骤3-1:在核心网设备成功收到了UE的确认消息的情况下,核心网设备将配置信息转发给第一基站和至少一个第二基站,由至少一个第二基站根据配置信息对该UE的寻呼消息开启安全保护。
其中,第一基站是服务基站。
可选的,至少一个第二基站可以是该UE的TA配置所属的基站(针对RRC idle态的CN Paging)或者该UE的RNA配置所属的基站(针对RRC inactive态的RAN Paging)。
可选的,核心网设备可以在成功收到确认消息时,或者在Paging终端的时刻,将配置信息转发给至少一个第二基站。
可选的,步骤3-2:在核心网设备未成功接收到UE的确认消息的情况下,核心网设备判定配置信息失败,进一步地,核心网设备可以向至少一个第二基站发送指示信息,该指示信息用于指示针对该UE的寻呼消息不开启安全保护,该至少一个第二基站对该UE的寻呼消息不开启安全保护。
可选的,至少一个第二基站是该UE的RNA配置所属的基站(针对RRC idle态的CN Paging)或者该UE的TA配置所属的基站(针对RRC INACTIVE态的RAN Paging)。
可选的,核心网设备可以在Paging时刻向至少一个基站发送指示信息。
示例2:网络侧设备为服务UE的第一基站(即第一基站),基于RRC流程实现安全保护的协商。
步骤1:UE向第一基站发送针对寻呼消息进行安全保护的能力信息,该能力信息可以包括以下至少一项:
(1)支持寻呼消息的加密能力,或不支持寻呼消息的加密能力;
(2)支持对寻呼消息进行加密的至少一种算法;
(3)支持寻呼消息的数字签名能力,或不支持寻呼消息的数字签名能力;
(4)支持对寻呼消息进行数字签名的至少一种算法。
可选地,在步骤1之后,步骤2执行之前,第一基站向核心网设备转发所述UE的能
力信息,并从核心网设备接收针对寻呼消息进行安全保护的配置信息。
步骤2:第一基站向UE发送针对寻呼消息进行安全保护的配置信息,该配置信息可以用于如下至少一项:
(1)开启寻呼消息的加密功能;
(2)不开启寻呼消息的加密功能;
(3)开启寻呼消息的数字签名功能;
(4)不开启寻呼消息的数字签名功能。
可选的,步骤2-1:在配置包括开启寻呼消息的加密功能的情况下,配置信息还可以包括如下至少一项:
(1)对寻呼消息进行加密的第一算法,其中,所述终端的能力信息包括所述第一算法;
(2)对寻呼消息进行加密的第一输入参数,可选的,该第一输入参数包括寻呼消息携带的除了UE ID之外的任意信息。比如,可以是paging Cause,access Type的任意组合。
可选的,步骤2-2:在配置信息包括开启寻呼消息的数字签名功能的情况下,配置信息还可以包括如下至少一项:
(1)对寻呼消息进行数字签名的第二算法,其中,所述终端的能力信息包括所述第二算法;
(2)对寻呼消息进行数字签名的第二输入参数;
其中,第二输入参数可以包括以下任一项:
(a)完整的寻呼消息,所述寻呼消息至少包含该UE的Paging Record(即整条Paging消息签名);
(b)寻呼消息中包含的该UE的Paging Record(即,每个UE或每个Paging Record签名);
(c)该UE的Paging Record中携带的部分信息(即,每个UE或每个Paging Record签名的进一步简化)。比如,可以是UE ID,paging Cause,access Type的任意组合。
步骤3:UE向第一基站发送针对寻呼消息进行安全保护的配置信息的确认消息。
可选的,步骤3-1:在该第一基站成功收到UE的确认消息的情况下,该第一基站将配置信息转发给至少一个第二基站,由至少一个第二基站根据配置信息对该UE的寻呼消息开启安全保护。
可选的,至少一个第二基站是该UE的RNA配置所属的基站(针对RRC inactive态的RAN Paging)。
可选的,第一基站可以在成功接收到UE的确认消息时,或者Paging终端的时刻,例如发起RAN Paging该UE时,将配置信息转发给至少一个第二基站。
可选的,步骤3-2:在该第一基站未成功接收到UE的确认消息的情况下,第一基站判定配置信息失败,进一步地,该第一基站可以向至少一个第二基站发送指示信息,该指
示信息用于指示针对该UE的寻呼消息不开启安全保护,该至少一个第二基站对该UE的寻呼消息不开启安全保护。
可选的,至少一个第二基站是该UE的RNA配置所属的基站(针对RRC INACTIVE态的RAN Paging)。
可选的,第一基站可以在Paging时刻向至少一个基站发送指示信息。
实施例二:Paging消息的内容和发送方式。
步骤1:第三基站按照寻呼消息中的PagingRecord发送顺序逐个判断针对每个UE的寻呼消息是否开启了安全保护,确定所述寻呼消息的具体内容。
其中,第三基站可以包括第一基站或第二基站。所述第一基站包括所述终端的服务基站,所述第二基站包括所述终端的RNA配置或TA配置所属的基站
可选的,步骤1-1:在针对该UE的寻呼消息开启了加密功能的情况下,针对该UE的PagingRecord包括以下至少一项:
(1)PagingRecord的明文部分,该明文部分至少包括UE ID;
(2)PagingRecord的加密部分(对应实施例一步骤2-1)。
进一步地,在该UE的PagingRecord包括了加密部分的情况下,还包括以下任一项:
-加密操作由核心网设备执行,再把加密后的PagingRecord发给所述第一基站(适用于所述寻呼消息为CN paging);
-加密操作由所述第一基站执行,直接生成加密后的PagingRecord,所述第一基站为UE的锚点(anchor)基站(适用于所述寻呼消息为RAN paging);
-加密操作由UE的anchor基站执行,直接生成加密后的PagingRecord转发给所述第二基站(适用于所述寻呼消息为RAN paging)。
需要说明的是,在PagingRecord中不限定明文部分和加密部分的设置顺序,PagingRecord中可以是先设置明文部分,再设置加密部分,也就是先发送明文部分,再发送密文部分,比如PagingRecord{UE ID明文;基于paging Cause和access Type联合加密的密文};
PagingRecord中可以是先设置加密部分,再设置明文部分,也就是先发送密文部分,再发送明文部分,比如,PagingRecord{基于paging Cause和access Type联合加密的密文;UE ID明文}
需要说明的是,PagingRecord的加密部分可以是联合加密,或者,PagingRecord的加密部分也可以是分开加密,比如:
(a)未开启加密功能时,PagingRecord{UE ID,paging Cause和access Type全部明文};
(b)分开加密时,PagingRecord{UE ID明文;基于paging Cause加密的密文,基于access Type加密的密文};
(c)联合加密时,PagingRecord{UE ID明文;基于paging Cause和access Type联合
加密的密文}。
可选的,步骤1-2:在针对该UE的寻呼开启了数字签名功能(per UE签名)的情况下,针对该UE的PagingRecord包括:所述UE的PagingRecord对应的DS(对应实施例一步骤2-2)。
其中,DS的计算是使用加密后的PagingRecord,即发送端需要先加密后签名。
比如,寻呼消息(Paging message)为{PagingRecord 1,PagingRecord 2,...,PagingRecord N}。
其中,PagingRecord 1对应UE 1,PagingRecord 2对应UE 2,...,PagingRecord N对应UE N。
在针对某个特定UE,例如UE1和UE2开启了数字签名的情况下,Paging message为{{PagingRecord 1,DS1},{PagingRecord 2,DS2},...,PagingRecord N}。
可选的,步骤1-3:在针对该UE的寻呼开启了数字签名功能(per Paging消息签名)的情况下,所述Paging消息包括以下至少一项:所述寻呼消息对应的DS(对应实施例一步骤2-2)
其中,DS的计算是使用加密后的Paging消息,即发送端需要先加密后签名
比如,Paging message为{PagingRecord 1,PagingRecord 2,...,PagingRecord N}。
其中,PagingRecord 1对应UE 1,PagingRecord 2对应UE 2,...,PagingRecord N对应UE N。
在针对该UE的寻呼开启了数字签名功能的情况下,Paging message为{PagingRecord1,PagingRecord 2,...,PagingRecord N,DS}。即,UE1,UE 2,...,UE N基于同一个DS对所述Paging消息进行验证。
步骤2:根据步骤1-1和1-2,1-3的内容发送所述Paging消息。
可选的,与DS相关的内容也可以分别放在另一条寻呼消息中发送。
比如,两条paging消息,可以将有DS和没有DS的寻呼分开发送。
Paging message为{PagingRecord 1,PagingRecord 2,...,PagingRecord N}。
PagingRecord 1对应UE 1,PagingRecord 2对应UE 2,...,PagingRecord N对应UE N。
针对某个特定UE,例如只有UE1和UE2开启了数字签名,其他UE未开启数字签名,则将未开启数字签名的UE和开启了数字签名的UE分开放。
Paging message 1为{PagingRecord 3,...,PagingRecord N};
Paging message 2为{{PagingRecord 1,DS1},{PagingRecord 2,DS2}}。
参见图6,本申请实施例提供一种寻呼消息处理装置,应用于终端,该装置600包括:
第一发送模块601,用于发送与寻呼消息的安全保护相关的能力信息;
第一接收模块602,用于接收配置信息,所述配置信息用于对寻呼消息开启或不开启安全保护。
在本申请的一种实施方式中,所述装置还包括:
第二发送模块,用于响应于所述配置信息,所述终端发送确认消息。
在本申请的一种实施方式中,所述能力信息包括以下至少一项:
(1)支持寻呼消息的加密能力,或者不支持寻呼消息的加密能力;
(2)支持对寻呼消息进行加密的至少一种算法;
(3)支持寻呼消息的数字签名能力,或者不支持寻呼消息的数字签名能力;
(4)支持对寻呼消息进行数字签名的至少一种算法。
在本申请的一种实施方式中,所述配置信息用于以下至少一项:
(1)开启寻呼消息的加密功能;
(2)不开启寻呼消息的加密功能;
(3)开启寻呼消息的数字签名功能;
(4)不开启寻呼消息的数字签名功能。
在本申请的一种实施方式中,所述配置信息包括开启寻呼消息的加密功能,所述配置信息还包括以下至少一项:
(1)对所述寻呼消息进行加密的第一算法;其中,所述能力信息包括所述第一算法;
(2)对所述寻呼消息进行加密的第一输入参数。
在本申请的一种实施方式中,所述配置信息包括开启寻呼消息的数字签名功能,所述配置信息还包括以下至少一项:
(1)对所述寻呼消息进行数字签名的第二算法;其中,所述能力信息包括所述第二算法;
(2)对所述寻呼消息进行数字签名的第二输入参数。
在本申请的一种实施方式中,所述第一输入参数包括:所述终端的寻呼记录中携带的部分信息。
在本申请的一种实施方式中,所述第二输入参数包括以下任一项:
(1)完整的所述寻呼消息;
(2)所述寻呼消息中包含的所述终端的寻呼记录;
(3)所述终端的寻呼记录中携带的部分信息。
在本申请的一种实施方式中,所述装置还包括:
第二接收模块,用于接收寻呼消息;
第一确定模块,用于根据终端的能力信息和/或所述配置信息确定所述寻呼消息的内容。
在本申请的一种实施方式中,第一确定模块进一步用于:
在所述配置信息包括开启寻呼消息的加密功能的情况下,确定所述寻呼消息中的寻呼记录包括以下至少一项:(1)所述寻呼记录的明文部分;(2)所述寻呼记录的加密部分。
在本申请的一种实施方式中,第一确定模块进一步用于执行以下任一项:
(1)在所述配置信息包括开启寻呼消息的数字签名功能的情况下,确定所述寻呼消息中的寻呼记录包括:所述终端的寻呼记录对应的数字签名;
(2)在所述配置信息包括开启寻呼消息的数字签名功能的情况下,确定所述寻呼消息包括:所述寻呼消息对应的数字签名;
(3)在所述终端的能力信息包括支持寻呼消息的数字签名能力的情况下,确定所述寻呼消息包括:所述寻呼消息对应的数字签名。
在本申请的一种实施方式中,所述终端的寻呼记录对应的数字签名是基于经过加密的所述寻呼记录确定的;或者,所述寻呼消息对应的数字签名基于经过加密的所述寻呼消息确定的。
本申请实施例提供的装置能够实现图3的方法实施例实现的各个过程,并达到相同的技术效果,为避免重复,这里不再赘述。
参见图7,本申请实施例提供一种寻呼消息装置,应用于网络侧设备,可选的,所述网络侧设备包括核心网设备或第一基站,所述第一基站包括所述终端的服务基站,该装置700包括:
第三接收模块701,用于接收终端的与寻呼消息的安全保护相关的能力信息;
第三发送模块702,用于向所述终端发送配置信息,所述配置信息用于对寻呼消息开启或不开启安全保护。
在本申请的一种实施方式中,所述装置700还包括:
第四接收模块,用于接收所述终端响应于所述配置信息发送的确认消息。
在本申请的一种实施方式中,所述网络侧设备包括核心网设备,所述装置700还包括:
第四发送模块,用于将所述配置信息发送给第一基站和/或至少一个第二基站;
其中,所述第一基站包括所述终端的服务基站,所述至少一个第二基站包括所述终端的无线接入网通知区域RNA配置或跟踪区TA配置所属的基站。
在本申请的一种实施方式中,第四发送模块进一步用于:
在成功接收到所述确认消息时,或者在网络侧设备寻呼所述终端时,将所述配置信息发送给所述至少一个第二基站。
在本申请的一种实施方式中,第四发送模块进一步用于:
在未成功接收到所述终端响应于所述配置信息发送的确认消息时,或者在网络侧设备寻呼所述终端时,向所述第一基站和/或至少一个第二基站发送指示信息,所述指示信息用于指示对所述终端的寻呼消息不开启安全保护。
在本申请的一种实施方式中,所述网络侧设备包括第一基站,所述第一基站包括所述终端的服务基站,所述装置还包括:
第五发送模块,用于将所述配置信息发送给至少一个第二基站,所述至少一个第二基站包括所述终端的无线接入网通知区域RNA配置或跟踪区TA配置所属的基站。
在本申请的一种实施方式中,第五发送模块进一步用于:
在成功接收到所述终端响应于所述配置信息发送的确认消息时,或者在网络侧设备寻呼所述终端时,将所述配置信息发送给所述至少一个第二基站。
在本申请的一种实施方式中,所述装置还包括:
第六发送模块,用于在未成功接收到所述终端响应于所述配置信息发送的确认消息时,或者在网络侧设备寻呼所述终端时,向至少一个第二基站发送指示信息,所述指示信息用于指示对所述终端的寻呼消息不开启安全保护。
在本申请的一种实施方式中,所述网络侧设备为第一基站,所述第一基站包括所述终端的服务基站,所述装置还包括:
第七发送模块,用于向核心网设备发送所述能力信息;
第五接收模块,用于接收所述核心网设备发送的所述配置信息。
在本申请的一种实施方式中,所述网络侧设备为所述第一基站,所述装置还包括:
第一判断模块,用于判断是否对所述终端的寻呼消息开启安全保护;
第二确定模块,用于根据开启或不开启安全保护的情况,确定所述寻呼消息的内容;
第八发送模块,用于发送所述寻呼消息。
在本申请的一种实施方式中,所述网第一判断模块进一步用于以下至少一项:
根据所述寻呼消息中的寻呼记录的发送顺序,依次判断是否对所述寻呼消息开启安全保护;根据所述配置信息,确定是否对所述寻呼消息开启安全保护。
在本申请的一种实施方式中,第二确定模块进一步用于:
在开启加密功能的情况下,确定所述寻呼消息中的寻呼记录包括以下至少一项:
(1)所述寻呼记录的明文部分;
(2)所述寻呼记录的加密部分。
在本申请的一种实施方式中,所述第二确定模块,包括以下至少一项:
第一接收单元,用于接收核心网设备发送的所述寻呼记录的加密部分;
第一加密单元,用于对所述寻呼记录执行加密操作,得到所述寻呼记录的加密部分。
在本申请的一种实施方式中,所述第二确定模块进一步用于执行以下任一项:
(1)在所述开启数字签名功能的情况下,确定所述寻呼消息中的寻呼记录包括所述终端的寻呼记录对应的数字签名;
(2)在开启数字签名功能的情况下,确定所述寻呼消息包括所述寻呼消息对应的数字签名。
在本申请的一种实施方式中,所述终端的寻呼记录对应的数字签名是基于加密后的寻呼记录确定的。
在本申请的一种实施方式中,所述装置还包括:
第三确定模块,用于确定所述寻呼消息中包括所述寻呼消息对应的数字签名;
第九发送模块,用于发送所述寻呼消息。
在本申请的一种实施方式中,所述寻呼消息对应的数字签名是基于加密后的所述寻呼
消息确定的。
在本申请的一种实施方式中,所述能力信息包括以下至少一项:
(1)支持寻呼消息的加密能力,或者不支持寻呼消息的加密能力;
(2)支持对寻呼消息进行加密的至少一种算法;
(3)支持寻呼消息的数字签名能力,或者不支持寻呼消息的数字签名能力;
(4)支持对寻呼消息进行数字签名的至少一种算法。
在本申请的一种实施方式中,所述配置信息用于以下至少一项:
(1)开启寻呼消息的加密功能;
(2)不开启寻呼消息的加密功能;
(3)开启寻呼消息的数字签名功能;
(4)不开启寻呼消息的数字签名功能。
在本申请的一种实施方式中,所述配置信息包括开启寻呼消息的加密功能,所述配置信息还包括以下至少一项:
(1)对所述寻呼消息进行加密的第一算法的信息,其中,所述终端的能力信息包括所述第一算法;
(2)对所述寻呼消息进行加密的第一输入参数。
在本申请的一种实施方式中,所述配置信息包括开启寻呼消息的数字签名功能,所述配置信息还包括以下至少一项:
(1)对所述寻呼消息进行数字签名的第二算法;其中,所述终端的能力信息包括所述第二算法;
(2)对所述寻呼消息进行数字签名的第二输入参数。
在本申请的一种实施方式中,所述第一输入参数包括:
所述终端的寻呼记录中携带的部分信息。
在本申请的一种实施方式中,所述第二输入参数包括以下任一项:
(1)完整的所述寻呼消息;
(2)所述寻呼消息中包含的所述终端的寻呼记录;
(3)所述终端的寻呼记录中携带的部分信息。
本申请实施例提供的装置能够实现图4的方法实施例实现的各个过程,并达到相同的技术效果,为避免重复,这里不再赘述。
参见图8,本申请实施例提供一种寻呼消息处理装置,应用于第三基站,所述第三基站包括第一基站或第二基站,所述第一基站包括所述终端的服务基站,所述第二基站包括所述终端的RNA配置或TA配置所属的基站。装置包括:第四确定模块801和第十发送模块802,或者,第二判断模块803、第五确定模块804和第十一发送模块805。
第四确定模块801,用于确定寻呼消息中的寻呼记录包括所述寻呼消息对应的数字签名;
第十发送模块802,用于发送所述寻呼消息;
或者,
第二判断模块803,用于判断是否对寻呼消息开启安全保护;
第五确定模块804,用于根据开启或不开启安全保护的情况,确定所述寻呼消息的内容;
第十一发送模块805,用于发送所述寻呼消息。
在本申请的一种实施方式中,第二判断模块803进一步用于以下至少一项:
根据所述寻呼消息中的寻呼记录的发送顺序,依次判断是否对寻呼消息是否开启安全保护;根据所述配置信息,确定是否对所述寻呼消息开启安全保护。
在本申请的一种实施方式中,第五确定模块804进一步用于:
在开启加密功能的情况下,确定所述寻呼消息中的寻呼记录包括以下至少一项:
(1)所述寻呼记录的明文部分;
(2)所述寻呼记录的加密部分。
在本申请的一种实施方式中,所述第三基站包括第一基站,所述第一基站包括所述终端的服务基站,第五确定模块804包括以下至少一项:
第二接收单元,用于接收核心网设备发送的所述寻呼记录的加密部分,所述寻呼记录的加密部分的加密操作由所述核心网设备执行;
第二加密单元,用于对所述寻呼记录执行加密操作,得到所述寻呼记录的加密部分。
在本申请的一种实施方式中,所述第三基站包括第二基站,所述第二基站包括所述终端的RNA配置或TA配置所属的基站,第五确定模块804,包括:
第二接收单元,用于接收所述终端的锚点基站发送的所述寻呼记录的加密部分,所述寻呼记录的加密部分的加密操作由所述锚点基站执行;
其中,所述终端的锚点基站包括所述第一基站。
在本申请的一种实施方式中,第五确定模块804进一步用于执行以下任一项:
在开启数字签名功能的情况下,确定所述寻呼消息中的寻呼记录包括所述终端的寻呼记录对应的数字签名;
在开启数字签名功能的情况下,确定所述寻呼消息中包括所述寻呼消息对应的数字签名。
在本申请的一种实施方式中,所述终端的寻呼记录对应的数字签名是基于加密后的所述寻呼记录确定的。
在本申请的一种实施方式中,所述寻呼消息对应的数字签名是基于加密后的所述寻呼消息确定的。
在本申请的一种实施方式中,所述装置还包括:
第六接收模块,用于接收配置信息,所述配置信息用于对寻呼消息开启或不开启安全保护。
在本申请的一种实施方式中,所述配置信息用于以下至少一项:
(1)开启寻呼消息的加密功能;
(2)不开启寻呼消息的加密功能;
(3)开启寻呼消息的数字签名功能;
(4)不开启寻呼消息的数字签名功能。
在本申请的一种实施方式中,在所述配置信息包括开启寻呼消息的加密功能的情况下,所述配置信息还包括以下至少一项:
(1)对所述寻呼消息进行加密的第一算法;其中,所述终端的能力信息包括所述第一算法;
(2)对所述寻呼消息进行加密的第一输入参数。
在本申请的一种实施方式中,在所述配置信息包括开启寻呼消息的数字签名功能的情况下,所述配置信息还包括以下至少一项:
(1)对所述寻呼消息进行数字签名的第二算法;其中,所述终端的能力信息包括所述第二算法;
(2)对所述寻呼消息进行数字签名的第二输入参数。
在本申请的一种实施方式中,所述第一输入参数包括:
所述终端的寻呼记录中携带的部分信息。
在本申请的一种实施方式中,所述第二输入参数包括以下任一项:
(1)完整的所述寻呼消息;
(2)所述寻呼消息中包含的所述终端的寻呼记录;
(3)所述终端的寻呼记录中携带的部分信息。
本申请实施例提供的装置能够实现图5的方法实施例实现的各个过程,并达到相同的技术效果,为避免重复,这里不再赘述。
图9为实现本申请实施例的一种终端的硬件结构示意图。该终端900包括但不限于:射频单元901、网络模块902、音频输出单元903、输入单元904、传感器905、显示单元906、用户输入单元907、接口单元908、存储器909以及处理器910等中的至少部分部件。
本领域技术人员可以理解,终端900还可以包括给各个部件供电的电源(比如电池),电源可以通过电源管理系统与处理器910逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。图9中示出的终端结构并不构成对终端的限定,终端可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置,在此不再赘述。
应理解的是,本申请实施例中,输入单元904可以包括图形处理单元(Graphics Processing Unit,GPU)9041和麦克风9042,图形处理器9041对在视频捕获模式或图像捕获模式中由图像捕获装置(如摄像头)获得的静态图片或视频的图像数据进行处理。显示单元906可包括显示面板9061,可以采用液晶显示器、有机发光二极管等形式来配置显示面板9061。用户输入单元907包括触控面板9071以及其他输入设备9072中的至少
一种。触控面板9071,也称为触摸屏。触控面板9071可包括触摸检测装置和触摸控制器两个部分。其他输入设备9072可以包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆,在此不再赘述。
本申请实施例中,射频单元901接收来自网络侧设备的下行数据后,可以传输给处理器910进行处理;另外,射频单元901可以向网络侧设备发送上行数据。通常,射频单元901包括但不限于天线、放大器、收发信机、耦合器、低噪声放大器、双工器等。
存储器909可用于存储软件程序或指令以及各种数据。存储器909可主要包括存储程序或指令的第一存储区和存储数据的第二存储区,其中,第一存储区可存储操作系统、至少一个功能所需的应用程序或指令(比如声音播放功能、图像播放功能等)等。此外,存储器909可以包括易失性存储器或非易失性存储器,或者,存储器909可以包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(Read-Only Memory,ROM)、可编程只读存储器(Programmable ROM,PROM)、可擦除可编程只读存储器(Erasable PROM,EPROM)、电可擦除可编程只读存储器(Electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(Random Access Memory,RAM),静态随机存取存储器(Static RAM,SRAM)、动态随机存取存储器(Dynamic RAM,DRAM)、同步动态随机存取存储器(Synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(Double Data Rate SDRAM,DDRSDRAM)、增强型同步动态随机存取存储器(Enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(Synch link DRAM,SLDRAM)和直接内存总线随机存取存储器(Direct Rambus RAM,DRRAM)。本申请实施例中的存储器909包括但不限于这些和任意其它适合类型的存储器。
处理器910可包括一个或多个处理单元;可选的,处理器910集成应用处理器和调制解调处理器,其中,应用处理器主要处理涉及操作系统、用户界面和应用程序等的操作,调制解调处理器主要处理无线通信信号,如基带处理器。可以理解的是,上述调制解调处理器也可以不集成到处理器910中。
本申请实施例提供的终端能够实现图3的方法实施例实现的各个过程,并达到相同的技术效果,为避免重复,这里不再赘述。
请参阅图10,图10是本发明实施例应用的通信设备的结构图,如图10所示,通信设备1000包括:处理器1001、收发机1002、存储器1003和总线接口,其中,处理器1001可以负责管理总线架构和通常的处理。存储器1003可以存储处理器1001在执行操作时所使用的数据。
在本发明的一个实施例中,通信设备1000还包括:存储在存储器1003并可在处理器1001上运行的程序,程序被处理器1001执行时实现以上图4或图5所示方法中的步骤。
在图10中,总线架构可以包括任意数量的互联的总线和桥,具体由处理器1001代表的一个或多个处理器和存储器1003代表的存储器的各种电路链接在一起。总线架构还可以将诸如外围设备、稳压器和功率管理电路等之类的各种其他电路链接在一起,这些都是
本领域所公知的,因此,本文不再对其进行进一步描述。总线接口提供接口。收发机1002可以是多个元件,即包括发送机和接收机,提供用于在传输介质上与各种其他装置通信的单元。
可选的,如图11所示,本申请实施例还提供一种通信设备1100,包括处理器1101和存储器1102,存储器1102上存储有可在所述处理器1101上运行的程序或指令,例如,该通信设备1100为终端时,该程序或指令被处理器1101执行时实现上述图3方法实施例的各个步骤,该通信设备1100为网络侧设备时,该程序或指令被处理器1101执行时实现上述图4或图5方法实施例的各个步骤且能达到相同的技术效果,为避免重复,这里不再赘述。
本申请实施例还提供一种可读存储介质,所述可读存储介质上存储有程序或指令,该程序或指令被处理器执行时实现图3或图4或图5方法及上述各个实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。
其中,所述处理器为上述实施例中所述的终端中的处理器。所述可读存储介质,可以是非易失性的,也可以是非瞬态的。可读存储介质,可以包括计算机可读存储介质,如计算机只读存储器ROM、随机存取存储器RAM、磁碟或者光盘等。
本申请实施例另提供了一种芯片,所述芯片包括处理器和通信接口,所述通信接口和所述处理器耦合,所述处理器用于运行程序或指令,实现图3或图4或图5所示及上述各个方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。
应理解,本申请实施例提到的芯片还可以称为系统级芯片,系统芯片,芯片系统或片上系统芯片等。
本申请实施例另提供了一种计算机程序/程序产品,所述计算机程序/程序产品被存储在存储介质中,所述计算机程序/程序产品被至少一个处理器执行以实现图3或图4或图5所示及上述各个方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。
本申请实施例另提供一种通信系统,所述通信系统包括终端与网络侧设备,所述终端用于执行如图3及上述各个方法实施例的各个过程,所述网络侧设备用于执行如图4或图5及上述各个方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。
需要说明的是,在本文中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者装置不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者装置所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的过程、方法、物品或者装置中还存在另外的相同要素。此外,需要指出的是,本申请实施方式中的方法和装置的范围不限按示出或讨论的顺序来执行功能,还可包括根据所涉及的功能按基本同时的方式或按相反的顺序来执行功能,例如,可以按不同于所描
述的次序来执行所描述的方法,并且还可以添加、省去、或组合各种步骤。另外,参照某些示例所描述的特征可在其他示例中被组合。
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到上述实施例方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本申请的技术方案本质上或者说对相关技术做出贡献的部分可以以计算机软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端(可以是手机,计算机,服务器,空调器,或者网络设备等)执行本申请各个实施例所述的方法。
上面结合附图对本申请的实施例进行了描述,但是本申请并不局限于上述的具体实施方式,上述的具体实施方式仅仅是示意性的,而不是限制性的,本领域的普通技术人员在本申请的启示下,在不脱离本申请宗旨和权利要求所保护的范围情况下,还可做出很多形式,均属于本申请的保护之内。
Claims (56)
- 一种寻呼消息处理方法,包括:终端发送与寻呼消息的安全保护相关的能力信息;所述终端接收配置信息,所述配置信息用于对寻呼消息开启或不开启安全保护。
- 根据权利要求1所述的方法,其中,所述方法还包括:响应于所述配置信息,所述终端发送确认消息。
- 根据权利要求1所述的方法,其中,所述能力信息包括以下至少一项:支持寻呼消息的加密能力,或者不支持寻呼消息的加密能力;支持对寻呼消息进行加密的至少一种算法;支持寻呼消息的数字签名能力,或者不支持寻呼消息的数字签名能力;支持对寻呼消息进行数字签名的至少一种算法。
- 根据权利要求1或3所述的方法,其中,所述配置信息用于以下至少一项:开启寻呼消息的加密功能;不开启寻呼消息的加密功能;开启寻呼消息的数字签名功能;不开启寻呼消息的数字签名功能。
- 根据权利要求4所述的方法,其中,所述配置信息包括开启寻呼消息的加密功能,所述配置信息还包括以下至少一项:对所述寻呼消息进行加密的第一算法;其中,所述能力信息包括所述第一算法;对所述寻呼消息进行加密的第一输入参数。
- 根据权利要求4所述的方法,其中,所述配置信息包括开启寻呼消息的数字签名功能,所述配置信息还包括以下至少一项:对所述寻呼消息进行数字签名的第二算法;其中,所述能力信息包括所述第二算法;对所述寻呼消息进行数字签名的第二输入参数。
- 根据权利要求5所述的方法,其中,所述第一输入参数包括:所述终端的寻呼记录中携带的部分信息。
- 根据权利要求6所述的方法,其中,所述第二输入参数包括以下任一项:完整的所述寻呼消息;所述寻呼消息中包含的所述终端的寻呼记录;所述终端的寻呼记录中携带的部分信息。
- 根据权利要求1或4所述的方法,其中,所述方法还包括:所述终端接收寻呼消息;所述终端根据终端的能力信息和/或所述配置信息确定所述寻呼消息的内容。
- 根据权利要求9所述的方法,其中,所述终端根据所述终端的能力信息和/或所述 配置信息确定所述寻呼消息的内容,包括:在所述配置信息包括开启寻呼消息的加密功能的情况下,所述终端确定所述寻呼消息中的寻呼记录包括以下至少一项:所述寻呼记录的明文部分;所述寻呼记录的加密部分。
- 根据权利要求9所述的方法,其中,所述终端根据终端的能力信息和/或所述配置信息确定所述寻呼消息的内容,包括以下任一项:在所述配置信息包括开启寻呼消息的数字签名功能的情况下,所述终端确定所述寻呼消息中的寻呼记录包括:所述终端的寻呼记录对应的数字签名;在所述配置信息包括开启寻呼消息的数字签名功能的情况下,所述终端确定所述寻呼消息包括:所述寻呼消息对应的数字签名;在所述终端的能力信息包括支持寻呼消息的数字签名能力的情况下,所述终端确定所述寻呼消息包括:所述寻呼消息对应的数字签名。
- 根据权利要求11所述的方法,其中,所述终端的寻呼记录对应的数字签名是基于经过加密的所述寻呼记录确定的;或者,所述寻呼消息对应的数字签名基于经过加密的所述寻呼消息确定的。
- 一种寻呼消息处理方法,包括:网络侧设备接收终端的与寻呼消息的安全保护相关的能力信息;所述网络侧设备向所述终端发送配置信息,所述配置信息用于对寻呼消息开启或不开启安全保护。
- 根据权利要求13所述的方法,其中,所述方法还包括:所述网络侧设备接收所述终端响应于所述配置信息发送的确认消息。
- 根据权利要求13或14所述的方法,其中,所述网络侧设备包括核心网设备,所述方法还包括:所述网络侧设备将所述配置信息发送给第一基站和/或至少一个第二基站;其中,所述第一基站包括所述终端的服务基站,所述至少一个第二基站包括所述终端的无线接入网通知区域RNA配置或跟踪区TA配置所属的基站。
- 根据权利要求15所述的方法,其中,所述网络侧设备将所述配置信息发送给所述第一基站和/或至少一个第二基站,包括:在所述网络侧设备成功接收到所述确认消息时,或者在所述网络侧设备寻呼所述终端时,所述网络侧设备将所述配置信息发送给所述第一基站和/或所述至少一个第二基站。
- 根据权利要求15所述的方法,其中,所述方法还包括:在所述网络侧设备未成功接收到所述终端响应于所述配置信息发送的确认消息时,或者在所述网络侧设备寻呼所述终端时,所述网络侧设备向所述第一基站和/或至少一个第二基站发送指示信息,所述指示信息用于指示对所述终端的寻呼消息不开启安全保护。
- 根据权利要求13或14所述的方法,其中,所述网络侧设备包括第一基站,所述 第一基站包括所述终端的服务基站,所述方法还包括:所述网络侧设备将所述配置信息发送给至少一个第二基站,所述至少一个第二基站包括所述终端的无线接入网通知区域RNA配置或跟踪区TA配置所属的基站。
- 根据权利要求18所述的方法,其中,所述网络侧设备将所述配置信息发送给至少一个第二基站,包括:在所述网络侧设备成功接收到所述终端响应于所述配置信息发送的确认消息时,或者在所述网络侧设备寻呼所述终端时,所述网络侧设备将所述配置信息发送给所述至少一个第二基站。
- 根据权利要求18所述的方法,其中,所述方法还包括:在所述网络侧设备未成功接收到所述终端响应于所述配置信息发送的确认消息时,或者在所述网络侧设备寻呼所述终端时,所述网络侧设备向至少一个第二基站发送指示信息,所述指示信息用于指示对所述终端的寻呼消息不开启安全保护。
- 根据权利要求13所述的方法,其中,所述网络侧设备为第一基站,所述第一基站包括所述终端的服务基站,在所述网络侧设备向终端发送配置信息之前,所述方法还包括:所述网络侧设备向核心网设备发送所述能力信息;所述网络侧设备接收所述核心网设备发送的所述配置信息。
- 根据权利要求13所述的方法,其中,所述网络侧设备为第一基站,所述方法还包括:所述网络侧设备判断是否对寻呼消息开启安全保护;所述网络侧设备根据开启或不开启安全保护的情况,确定所述寻呼消息的内容;所述网络侧设备发送所述寻呼消息。
- 根据权利要求22所述的方法,其中,所述网络侧设备判断是否对寻呼消息开启安全保护,包括以下至少一项:所述网络侧设备根据所述寻呼消息中的寻呼记录的发送顺序,依次判断是否对所述寻呼消息开启安全保护;所述网络侧设备根据所述配置信息,确定是否对所述寻呼消息开启安全保护。
- 根据权利要求22所述的方法,其中,所述网络侧设备根据开启安全保护的情况,确定所述寻呼消息的内容,包括:在开启加密功能的情况下,所述网络侧设备确定所述寻呼消息中的寻呼记录包括以下至少一项:所述寻呼记录的明文部分;所述寻呼记录的加密部分。
- 根据权利要求24所述的方法,其中,所述网络侧设备根据开启安全保护的情况,确定所述寻呼消息中的寻呼记录包括所述寻呼记录的加密部分,包括以下至少一项:所述网络侧设备接收核心网设备发送的所述寻呼记录的加密部分;所述网络侧设备对所述寻呼记录执行加密操作,得到所述寻呼记录的加密部分。
- 根据权利要求22所述的方法,其中,所述网络侧设备根据开启安全保护的情况,确定所述寻呼消息的内容,包括以下任一项:在所述开启数字签名功能的情况下,所述网络侧设备确定所述寻呼消息中的寻呼记录包括所述终端的寻呼记录对应的数字签名;在开启数字签名功能的情况下,所述网络侧设备确定所述寻呼消息包括所述寻呼消息对应的数字签名。
- 根据权利要求26所述的方法,其中,所述终端的寻呼记录对应的数字签名是基于加密后的寻呼记录确定的。
- 根据权利要求13所述的方法,其中,所述方法还包括:所述网络侧设备确定所述寻呼消息包括所述寻呼消息对应的数字签名;所述网络侧设备发送所述寻呼消息。
- 根据权利要求26或28所述的方法,其中,所述寻呼消息对应的数字签名是基于加密后的所述寻呼消息确定的。
- 根据权利要求13或21所述的方法,其中,所述能力信息包括以下至少一项:支持寻呼消息的加密能力,或者不支持寻呼消息的加密能力;支持对寻呼消息进行加密的至少一种算法;支持寻呼消息的数字签名能力,或者不支持寻呼消息的数字签名能力;支持对寻呼消息进行数字签名的至少一种算法。
- 根据权利要求13所述的方法,其中,所述配置信息用于以下至少一项:开启寻呼消息的加密功能;不开启寻呼消息的加密功能;开启寻呼消息的数字签名功能;不开启寻呼消息的数字签名功能。
- 根据权利要求31所述的方法,其中,所述配置信息包括开启寻呼消息的加密功能,所述配置信息还包括以下至少一项:对所述寻呼消息进行加密的第一算法的信息,其中,所述终端的能力信息包括所述第一算法;对所述寻呼消息进行加密的第一输入参数。
- 根据权利要求31所述的方法,其中,所述配置信息包括开启寻呼消息的数字签名功能,所述配置信息还包括以下至少一项:对所述寻呼消息进行数字签名的第二算法;其中,所述终端的能力信息包括所述第二算法;对所述寻呼消息进行数字签名的第二输入参数。
- 根据权利要求32所述的方法,其中,所述第一输入参数包括:所述终端的寻呼记录中携带的部分信息。
- 根据权利要求33所述的方法,其中,所述第二输入参数包括以下任一项:完整的所述寻呼消息;所述寻呼消息中包含的所述终端的寻呼记录;所述终端的寻呼记录中携带的部分信息。
- 根据权利要求13所述的方法,其中所述网络侧设备包括核心网设备或第一基站,所述第一基站包括所述终端的服务基站。
- 一种寻呼消息处理方法,包括:第三基站确定寻呼消息中的寻呼记录包括所述寻呼消息对应的数字签名;所述第三基站发送所述寻呼消息;或者,第三基站判断是否对寻呼消息开启安全保护;所述第三基站根据开启或不开启安全保护的情况,确定所述寻呼消息的内容;所述第三基站发送所述寻呼消息。
- 根据权利要求37所述的方法,其中,所述第三基站判断是否对寻呼消息开启安全保护,包括以下至少一项:所述第三基站根据所述寻呼消息中的寻呼记录的发送顺序,依次判断是否对的寻呼消息是否开启安全保护;所述第三基站根据配置信息,确定是否对所述寻呼消息开启安全保护。
- 根据权利要求37所述的方法,其中,所述第三基站根据开启安全保护的情况,确定所述寻呼消息的内容,包括:在开启加密功能的情况下,所述第三基站确定所述寻呼消息中的寻呼记录包括以下至少一项:所述寻呼记录的明文部分;所述寻呼记录的加密部分。
- 根据权利要求39所述的方法,其中,所述第三基站包括第一基站,所述第一基站包括终端的服务基站,所述第三基站确定所述寻呼消息中的寻呼记录包括所述寻呼记录的加密部分,包括以下至少一项:所述第三基站接收核心网设备发送的所述寻呼记录的加密部分,所述寻呼记录的加密部分的加密操作由所述核心网设备执行;所述第三基站对所述寻呼记录执行加密操作,得到所述寻呼记录的加密部分。
- 根据权利要求39所述的方法,其中,所述第三基站包括第二基站,所述第二基站包括终端的RNA配置或TA配置所属的基站,所述第三基站确定所述寻呼消息中的寻呼记录包括所述寻呼记录的加密部分,包括:所述第三基站接收所述终端的锚点基站发送的所述寻呼记录的加密部分,所述寻呼记录的加密部分的加密操作由所述锚点基站执行;其中,所述终端的锚点基站包括第一基站。
- 根据权利要求37所述的方法,其中,在开启安全保护的情况下,所述第三基站根据开启安全保护的情况,确定所述寻呼消息的内容,包括以下任一项:在开启数字签名功能的情况下,所述第三基站确定所述寻呼消息中的寻呼记录包括终端的寻呼记录对应的数字签名;在开启数字签名功能的情况下,所述第三基站确定所述寻呼消息中包括所述寻呼消息对应的数字签名。
- 根据权利要求42所述的方法,其中,所述终端的寻呼记录对应的数字签名是基于加密后的所述寻呼记录确定的。
- 根据权利要求42所述的方法,其中,所述寻呼消息对应的数字签名是基于加密后的所述寻呼消息确定的。
- 根据权利要求37所述的方法,其中,所述第三基站判断是否对终端的寻呼消息开启安全保护之前,所述方法还包括:所述第三基站接收配置信息,所述配置信息用于对寻呼消息开启或不开启安全保护。
- 根据权利要求38或45所述的方法,其中,所述配置信息用于以下至少一项:开启寻呼消息的加密功能;不开启寻呼消息的加密功能;开启寻呼消息的数字签名功能;不开启寻呼消息的数字签名功能。
- 根据权利要求46所述的方法,其中,在所述配置信息包括开启寻呼消息的加密功能的情况下,所述配置信息还包括以下至少一项:对所述寻呼消息进行加密的第一算法;其中,所述终端的能力信息包括所述第一算法;对所述寻呼消息进行加密的第一输入参数。
- 根据权利要求46所述的方法,其中,在所述配置信息包括开启寻呼消息的数字签名功能的情况下,所述配置信息还包括以下至少一项:对所述寻呼消息进行数字签名的第二算法;其中,所述终端的能力信息包括所述第二算法;对所述寻呼消息进行数字签名的第二输入参数。
- 根据权利要求47所述的方法,其中,所述第一输入参数包括:所述终端的寻呼记录中携带的部分信息。
- 根据权利要求47所述的方法,其中,所述第二输入参数包括以下任一项:完整的所述寻呼消息;所述寻呼消息中包含的所述终端的寻呼记录;所述终端的寻呼记录中携带的部分信息。
- 根据权利要求37所述的方法,其中,所述第三基站包括第一基站或第二基站,所述第一基站包括终端的服务基站,所述第二基站包括终端的RNA配置或TA配置所属的基站。
- 一种寻呼消息处理装置,包括:第一发送模块,用于发送与寻呼消息的安全保护相关的能力信息;第一接收模块,用于接收配置信息,所述配置信息用于对寻呼消息开启或不开启安全保护。
- 一种寻呼消息装置,包括:第三接收模块,用于接收终端的与寻呼消息的安全保护相关的能力信息;第三发送模块,用于向所述终端发送配置信息,所述配置信息用于对寻呼消息开启或不开启安全保护。
- 一种寻呼消息处理装置,包括:第四确定模块,用于确定寻呼消息中的寻呼记录包括所述寻呼消息对应的数字签名;第十发送模块,用于发送所述寻呼消息;或者,第二判断模块,用于判断是否对寻呼消息开启安全保护;第五确定模块,用于根据开启或不开启安全保护的情况,确定所述寻呼消息的内容;第十一发送模块,用于发送所述寻呼消息。
- 一种通信设备,包括处理器,存储器及存储在所述存储器上并可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现如权利要求1至51中任一项所述的方法的步骤。
- 一种可读存储介质,所述可读存储介质上存储程序或指令,所述程序或指令被处理器执行时实现如权利要求1至51中任一项所述的方法的步骤。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211035819.2 | 2022-08-26 | ||
CN202211035819.2A CN117675214A (zh) | 2022-08-26 | 2022-08-26 | 寻呼消息处理方法、装置、通信设备及可读存储介质 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2024041469A1 true WO2024041469A1 (zh) | 2024-02-29 |
Family
ID=90012494
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2023/113949 WO2024041469A1 (zh) | 2022-08-26 | 2023-08-21 | 寻呼消息处理方法、装置、通信设备及可读存储介质 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN117675214A (zh) |
WO (1) | WO2024041469A1 (zh) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101080036A (zh) * | 2006-05-25 | 2007-11-28 | 华为技术有限公司 | 无线通信网络中实现寻呼处理的方法 |
CN102026174A (zh) * | 2009-09-17 | 2011-04-20 | 中兴通讯股份有限公司 | 一种寻呼过程中用户标识的保密方法及装置 |
CN110536290A (zh) * | 2018-05-24 | 2019-12-03 | 华为技术有限公司 | 一种寻呼处理方法及装置 |
US20210092706A1 (en) * | 2019-09-25 | 2021-03-25 | Qualcomm Incorporated | Secure paging for service prioritization |
CN113395697A (zh) * | 2020-03-12 | 2021-09-14 | 华为技术有限公司 | 传输寻呼信息的方法和通信装置 |
-
2022
- 2022-08-26 CN CN202211035819.2A patent/CN117675214A/zh active Pending
-
2023
- 2023-08-21 WO PCT/CN2023/113949 patent/WO2024041469A1/zh unknown
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101080036A (zh) * | 2006-05-25 | 2007-11-28 | 华为技术有限公司 | 无线通信网络中实现寻呼处理的方法 |
CN102026174A (zh) * | 2009-09-17 | 2011-04-20 | 中兴通讯股份有限公司 | 一种寻呼过程中用户标识的保密方法及装置 |
CN110536290A (zh) * | 2018-05-24 | 2019-12-03 | 华为技术有限公司 | 一种寻呼处理方法及装置 |
US20210092706A1 (en) * | 2019-09-25 | 2021-03-25 | Qualcomm Incorporated | Secure paging for service prioritization |
CN113395697A (zh) * | 2020-03-12 | 2021-09-14 | 华为技术有限公司 | 传输寻呼信息的方法和通信装置 |
Also Published As
Publication number | Publication date |
---|---|
CN117675214A (zh) | 2024-03-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20130013926A1 (en) | Method and Apparatus for Device-to-Device Key Management | |
WO2021169880A1 (zh) | 一种安全认证方法、装置及电子设备 | |
US20220272511A1 (en) | Subscription data management method and apparatus | |
CN108616878A (zh) | 一种加密解密方法、设备和计算机存储介质 | |
US20230334172A1 (en) | Information privacy protection method and apparatus, device, and storage medium | |
WO2018083298A1 (en) | Deriving a security key for relayed communication | |
WO2024041469A1 (zh) | 寻呼消息处理方法、装置、通信设备及可读存储介质 | |
WO2023005898A1 (zh) | 多终端联合会话管理方法、网络侧设备及终端 | |
EP3028429B1 (en) | Local communication interception | |
WO2023143418A1 (zh) | 设备鉴权方法、装置、终端及网络功能 | |
WO2023185929A1 (zh) | 资源控制方法、装置、终端及网络侧设备 | |
WO2023143436A1 (zh) | 数据转发的方法、装置、终端设备和网络设备 | |
WO2021239076A1 (zh) | 密钥获取方法、装置、用户设备及网络侧设备 | |
WO2022178727A1 (zh) | 寻呼方法、装置及通信设备 | |
WO2024041470A1 (zh) | 系统信息消息接收方法、发送方法、终端及网络侧设备 | |
EP4231681A1 (en) | Trusted relay communication method and apparatus, terminal, and network side device | |
WO2023208048A1 (zh) | 小区切换方法、装置、终端及网络侧设备 | |
WO2023185728A1 (zh) | 业务处理方法、装置、终端、网络侧设备及可读存储介质 | |
WO2022206898A1 (zh) | 寻呼方法、装置、终端及网络侧设备 | |
WO2023193676A1 (zh) | 测量上报处理方法、装置、终端及网络侧设备 | |
WO2024153014A1 (zh) | 消息传输方法、装置及设备 | |
WO2024022398A1 (zh) | 托管网络的选网信息的获取方法、终端及网络侧设备 | |
WO2024022389A1 (zh) | 小区连接方法、装置及相关设备 | |
WO2023143416A1 (zh) | 信息处理方法、终端及网络功能 | |
WO2024012279A1 (zh) | 信息传输方法、装置及设备 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 23856559 Country of ref document: EP Kind code of ref document: A1 |