WO2024098222A1 - 通信方法和设备 - Google Patents

通信方法和设备 Download PDF

Info

Publication number
WO2024098222A1
WO2024098222A1 PCT/CN2022/130434 CN2022130434W WO2024098222A1 WO 2024098222 A1 WO2024098222 A1 WO 2024098222A1 CN 2022130434 W CN2022130434 W CN 2022130434W WO 2024098222 A1 WO2024098222 A1 WO 2024098222A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
access network
key
network device
connection
Prior art date
Application number
PCT/CN2022/130434
Other languages
English (en)
French (fr)
Inventor
甘露
Original Assignee
Oppo广东移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Oppo广东移动通信有限公司 filed Critical Oppo广东移动通信有限公司
Priority to PCT/CN2022/130434 priority Critical patent/WO2024098222A1/zh
Publication of WO2024098222A1 publication Critical patent/WO2024098222A1/zh

Links

Images

Definitions

  • the present application relates to the field of communications, and more specifically, to a communication method, a device, a computer-readable storage medium, a computer program product, and a computer program.
  • terminal devices may need to transmit data with access network devices on the network side through other terminal devices.
  • the terminal device that functions as a relay is called a relay terminal device
  • the device that connects to the access network device on the network side through a relay is called a remote terminal device.
  • how to enable the remote terminal device to efficiently establish a secure connection with the relay terminal device has become a problem that needs to be solved.
  • Embodiments of the present application provide a communication method, a device, a computer-readable storage medium, a computer program product, and a computer program.
  • the present application provides a communication method, including:
  • the first device receives first information sent by the access network device, wherein the first information carries a key generation parameter
  • the first device generates a first key based on the key generation parameter; wherein the first key is used to perform security processing on data transmitted through a first connection; and the first connection is a connection between the first device and the second device.
  • the present application provides a communication method, including:
  • the second device receives second information sent by the access network device, where the second information carries a first key; wherein the first key is used to perform security processing on data transmitted through the first connection; and the first connection is a connection between the first device and the second device.
  • the present application provides a communication method, including:
  • An access network device sends first information to a first device, and the access network device sends second information to a second device; wherein the first information carries a key generation parameter, and the key generation parameter is used to generate a first key; the first key is used to perform security processing on data transmitted on a first connection; and the first connection is a connection between a first device and a second device.
  • the present application provides a first device, including:
  • a first communication unit configured to receive first information sent by an access network device, wherein the first information carries a key generation parameter
  • the first processing unit is used to generate a first key based on the key generation parameter; wherein the first key is used to perform security processing on data transmitted by a first connection; and the first connection is a connection between the first device and a second device.
  • the embodiment of the present application provides a second device, including:
  • the second communication unit is used to receive second information sent by the access network device, and the second information carries a first key; wherein the first key is used to perform security processing on data transmitted by the first connection; the first connection is a connection between the first device and the second device.
  • the present application provides an access network device, including:
  • a third communication unit is used to send first information to the first device and to send second information to the second device; wherein the first information carries a key generation parameter, and the key generation parameter is used to generate a first key; the first key is used to perform security processing on data transmitted on the first connection; the first connection is a connection between the first device and the second device.
  • the embodiment of the present application provides a first device, including a processor and a memory, wherein the memory is used to store a computer program, and the processor is used to call and run the computer program stored in the memory, so that the first device executes the above method.
  • the embodiment of the present application provides a second device, including a processor and a memory, wherein the memory is used to store a computer program, and the processor is used to call and run the computer program stored in the memory, so that the second device executes the above method.
  • the embodiment of the present application provides an access network device, including a processor and a memory.
  • the memory is used to store a computer program
  • the processor is used to call and run the computer program stored in the memory, so that the access network device executes the above method.
  • the embodiment of the present application provides a chip for implementing the above method.
  • the chip includes: a processor, which is used to call and run a computer program from a memory, so that a device equipped with the chip executes the above method.
  • An embodiment of the present application provides a computer-readable storage medium for storing a computer program.
  • the computer program When the computer program is executed by a device, the device executes the above method.
  • An embodiment of the present application provides a computer program product, including computer program instructions, which enable a computer to execute the above method.
  • An embodiment of the present application provides a computer program, which, when executed on a computer, enables the computer to execute the above method.
  • the first device can directly obtain the key generation parameters from the access network device and then generate the first key to perform security processing on the data transmitted on the connection between the first device and the second device.
  • the solution provided by the present application can enable the first device to directly interact with the access network device to obtain the first key, thereby improving the processing efficiency of generating the first key, and then ensuring the efficient establishment of a secure connection between the first device and the second device.
  • FIG. 1 is a schematic diagram of an application scenario according to an embodiment of the present application.
  • FIG2 is a system architecture diagram of MP separation bearer according to an embodiment of the present application.
  • Figure 3 is a schematic diagram of the 5G dual-link architecture.
  • FIG4 is a schematic flowchart of a communication method according to an embodiment of the present application.
  • FIG5 is a schematic flowchart of a communication method according to another embodiment of the present application.
  • FIG. 6 is an exemplary flow chart of a communication method according to another embodiment of the present application.
  • FIG. 7 to 13 are various exemplary flow charts of the processing flow of the remote UE and the relay UE according to the embodiments of the present application.
  • FIG. 14 is an exemplary process flow chart of a remote UE and a relay UE obtaining a key in the related art.
  • FIG. 15 is a schematic block diagram of a first device according to an embodiment of the present application.
  • FIG. 16 is a schematic block diagram of a second device according to an embodiment of the present application.
  • FIG. 17 is a schematic block diagram of an access network device according to an embodiment of the present application.
  • FIG18 is a schematic block diagram of an access network device according to another embodiment of the present application.
  • FIG19 is a schematic block diagram of a communication device according to an embodiment of the present application.
  • FIG. 20 is a schematic block diagram of a chip according to an embodiment of the present application.
  • FIG. 21 is a schematic block diagram of a communication system according to an embodiment of the present application.
  • GSM Global System of Mobile communication
  • CDMA Code Division Multiple Access
  • WCDMA Wideband Code Division Multiple Access
  • GPRS General Packet Radio Service
  • LTE Long Term Evolution
  • LTE-A Advanced long term evolution
  • NR New Radio
  • LTE-based access to unlicensed spectrum (LTE-U) systems LTE-based access to unlicensed spectrum (LTE-U) systems
  • NR-based access to unlicensed spectrum (NR-U) systems NTN-based access to unlicensed spectrum (NR-U) systems
  • NTN non-terrestrial communication networks
  • UMTS universal mobile telecommunication systems
  • WLAN wireless local area networks
  • WiFi wireless fidelity
  • 5G fifth-generation communication
  • D2D Device to Device
  • M2M Machine to Machine
  • MTC Machine Type Communication
  • V2V vehicle to vehicle
  • V2X vehicle to everything
  • the communication system in the embodiment of the present application can be applied to a carrier aggregation (CA) scenario, a dual connectivity (DC) scenario, or a standalone (SA) networking scenario.
  • CA carrier aggregation
  • DC dual connectivity
  • SA standalone
  • the communication system in the embodiment of the present application can be applied to an unlicensed spectrum, where the unlicensed spectrum can also be considered as a shared spectrum; or, the communication system in the embodiment of the present application can also be applied to an authorized spectrum, where the authorized spectrum can also be considered as an unshared spectrum.
  • the embodiments of the present application describe various embodiments in conjunction with network equipment and terminal equipment, wherein the terminal equipment may also be referred to as user equipment (UE), access terminal, user unit, user station, mobile station, mobile station, remote station, remote terminal, mobile device, user terminal, terminal, wireless communication equipment, user agent or user device, etc.
  • UE user equipment
  • the terminal device can be a station (STAION, ST) in a WLAN, a cellular phone, a cordless phone, a Session Initiation Protocol (SIP) phone, a Wireless Local Loop (WLL) station, a Personal Digital Assistant (PDA) device, a handheld device with wireless communication function, a computing device or other processing device connected to a wireless modem, a vehicle-mounted device, a wearable device, a terminal device in the next generation communication system such as the NR network, or a terminal device in the future evolved Public Land Mobile Network (PLMN) network, etc.
  • STAION, ST in a WLAN
  • a cellular phone a cordless phone
  • Session Initiation Protocol (SIP) phone Session Initiation Protocol
  • WLL Wireless Local Loop
  • PDA Personal Digital Assistant
  • PDA Personal Digital Assistant
  • the terminal device can be deployed on land, including indoors or outdoors, handheld, wearable or vehicle-mounted; it can also be deployed on the water surface (such as ships, etc.); it can also be deployed in the air (for example, on airplanes, balloons and satellites, etc.).
  • the terminal device may be a mobile phone, a tablet computer, a computer with wireless transceiver function, a virtual reality (VR) terminal device, an augmented reality (AR) terminal device, a wireless terminal device in industrial control, a wireless terminal device in self-driving, a wireless terminal device in remote medical, a wireless terminal device in smart grid, a wireless terminal device in transportation safety, a wireless terminal device in a smart city, or a wireless terminal device in a smart home, etc.
  • VR virtual reality
  • AR augmented reality
  • the terminal device may also be a wearable device.
  • Wearable devices may also be referred to as wearable smart devices, which are a general term for wearable devices that are intelligently designed and developed using wearable technology for daily wear, such as glasses, gloves, watches, clothing, and shoes.
  • a wearable device is a portable device that is worn directly on the body or integrated into the user's clothes or accessories. Wearable devices are not only hardware devices, but also powerful functions achieved through software support, data interaction, and cloud interaction.
  • wearable smart devices include full-featured, large-sized, and fully or partially independent of smartphones, such as smart watches or smart glasses, as well as devices that only focus on a certain type of application function and need to be used in conjunction with other devices such as smartphones, such as various types of smart bracelets and smart jewelry for vital sign monitoring.
  • the network device may be a device for communicating with a mobile device.
  • the network device may be an access point (AP) in WLAN, a base station (BTS) in GSM or CDMA, a base station (NodeB, NB) in WCDMA, an evolved base station (Evolutional Node B, eNB or eNodeB) in LTE, or a relay station or access point, or a vehicle-mounted device, a wearable device, and a network device (gNB) in an NR network, or a network device in a future evolved PLMN network, or a network device in an NTN network, etc.
  • the network device may have a mobile feature, for example, the network device may be a mobile device.
  • the network device may be a satellite or a balloon station.
  • the satellite may be a low earth orbit (LEO) satellite, a medium earth orbit (MEO) satellite, a geostationary earth orbit (GEO) satellite, a high elliptical orbit (HEO) satellite, etc.
  • the network device may also be a base station set up in a location such as land or water.
  • a network device can provide services for a cell, and a terminal device communicates with the network device through transmission resources used by the cell (for example, frequency domain resources, or spectrum resources).
  • the cell can be a cell corresponding to a network device (for example, a base station), and the cell can belong to a macro base station or a base station corresponding to a small cell.
  • the small cells here may include: metro cells, micro cells, pico cells, femto cells, etc. These small cells have the characteristics of small coverage and low transmission power, and are suitable for providing high-speed data transmission services.
  • FIG1 exemplarily shows a communication system 100.
  • the communication system includes a network device 110 and two terminal devices 120.
  • the communication system 100 may include multiple network devices 110, and each network device 110 may include other number of terminal devices 120 within its coverage area, which is not limited in the present embodiment.
  • the communication system 100 may also include other network entities such as a Mobility Management Entity (MME) and an Access and Mobility Management Function (AMF), but this is not limited to the embodiments of the present application.
  • MME Mobility Management Entity
  • AMF Access and Mobility Management Function
  • the network equipment may include access network equipment and core network equipment. That is, the wireless communication system also includes multiple core networks for communicating with the access network equipment.
  • the access network equipment may be an evolutionary base station (evolutional node B, referred to as eNB or e-NodeB) macro base station, micro base station (also called “small base station”), pico base station, access point (AP), transmission point (TP) or new generation Node B (gNodeB) in a long-term evolution (LTE) system, a next-generation (mobile communication system) (next radio, NR) system or an authorized auxiliary access long-term evolution (LAA-LTE) system.
  • eNB evolutionary base station
  • AP access point
  • TP transmission point
  • gNodeB new generation Node B
  • LTE long-term evolution
  • NR next-generation
  • LAA-LTE authorized auxiliary access long-term evolution
  • the device with communication function in the network/system in the embodiment of the present application can be called a communication device.
  • the communication device may include a network device and a terminal device with communication function, and the network device and the terminal device may be specific devices in the embodiment of the present application, which will not be repeated here; the communication device may also include other devices in the communication system, such as other network entities such as a network controller and a mobile management entity, which is not limited in the embodiment of the present application.
  • the multi-path (MP) technology of UE to network relay means that: MP bearer is supported between UE and base station (such as gNB), that is, UE uses a direct path and an indirect path to connect to the same gNB.
  • MP bearer is supported between UE and base station (such as gNB), that is, UE uses a direct path and an indirect path to connect to the same gNB.
  • base station such as gNB
  • remote UE can provide enhanced user data throughput and reliability
  • gNB can offload the direct connection of congested remote UE (or remote UE) to the indirect connection through relay UE; wherein, relay UE and remote UE (or remote UE) can be in different cells, and the different cells can be different cells with the same frequency or different cells with different frequencies.
  • Direct bearer (bearer mapped to direct path on Uu), indirect bearer (bearer mapped to indirect path through relay UE) and MP split bearer (bearer mapped to the above two paths) are supported between UE (i.e. remote UE) and gNB.
  • MP can have scenario 1 and scenario 2; scenario 1 refers to the connection between UE and gNB through Layer-2 UE-to-Network relay; scenario 2 refers to the connection through another UE.
  • scenario 1 refers to the connection between UE and gNB through Layer-2 UE-to-Network relay; scenario 2 refers to the connection through another UE.
  • a PDCP (Packet Data Convergence Protocol) entity of the remote UE configures a direct Uu RLC (Radio Link Control) channel and an indirect PC5RLC channel.
  • the PDCP entity of the remote UE transmits data to the Uu RLC entity of the remote UE and the PC5RLC entity with the SRAP (Sidelink Relay Adaptation Protocol) entity.
  • the PDCP entity of the remote UE receives data from the Uu RLC entity of the remote UE and the PC5RLC entity with the SRAP entity.
  • the PDCP entity of the gNB when the gNB performs uplink data reception, the PDCP entity of the gNB receives data from the Uu RLC entity of the gNB and the RLC entity with the Uu SRAP entity.
  • the PDCP entity of the gNB transmits to the Uu RLC entity of the gNB and the RLC of the Uu SRAP entity.
  • the relay UE is connected to the remote UE through the PC5SRAP entity, and the RLC, MAC (Medium Access Control), and PHY (Physical) layers associated with the PC5SRAP entity for data transmission; the relay UE is connected to the gNB through the Uu SRAP entity, and the RLC, MAC, and PHY entities associated with the Uu SRAP entity for data transmission.
  • the relay UE is connected to the gNB through the Uu SRAP entity, and the RLC, MAC, and PHY entities associated with the Uu SRAP entity for data transmission.
  • Dual connectivity means that two base stations provide links for UE at the same time; the two base stations are MN (master node) and SN (slave node).
  • MN and SN transmit with UE through SRB (signalling radio bearer) and DRB (Data Radio Bearer) respectively; both MN and SN have protocol layers corresponding to SRB and DRB respectively;
  • the protocol layer corresponding to SRB in MN or SN includes RRC, PDCP, RLC, MAC, and RHY as shown in Figure 3;
  • the protocol layer corresponding to DRB in MN or SN includes SDAP (Service Data Adaptation Protocol), PDCP, RLC, MAC, and PHY.
  • SDAP Service Data Adaptation Protocol
  • MN and SN are interconnected through the Xn interface.
  • the Xn interface between SN and MN includes the Xn control plane (Xn-C) interface and the Xn user plane (Xn-U) interface.
  • the security mechanism of 5G dual link technology is: when MN first establishes a security context between SN and UE for the existing AS (Access Stratum) security context shared between MN and UE, MN generates a key (KSN) for SN and sends it to SN through the Xn-C interface; wherein, the key can be generated by MN using the value of SN Counter as an input for KSN derivation and associating it with the current AS security context to obtain the key.
  • KSN Key
  • MN When MN needs to generate a new KSN, MN sends the value of SN Counter to UE through the RRC signaling path. And the aforementioned KSN is also used to derive the RRC key and UP (user plane) key between UE and SN.
  • the "indication" mentioned in the embodiments of the present application can be a direct indication, an indirect indication, or an indication of an association relationship.
  • a indicates B which can mean that A directly indicates B, for example, B can be obtained through A; it can also mean that A indirectly indicates B, for example, A indicates C, and B can be obtained through C; it can also mean that there is an association relationship between A and B.
  • corresponding may indicate a direct or indirect correspondence between two items, or an association relationship between the two items, or a relationship of indication and being indicated, configuration and being configured, etc.
  • Fig. 4 is a schematic flow chart of a communication method according to an embodiment of the present application. The method includes at least part of the following contents.
  • a first device receives first information sent by an access network device, wherein the first information carries a key generation parameter
  • the first device generates a first key based on the key generation parameter; wherein the first key is used to perform security processing on data transmitted through a first connection; and the first connection is a connection between the first device and a second device.
  • Fig. 5 is a schematic flow chart of a communication method according to another embodiment of the present application. The method includes at least part of the following contents.
  • the second device receives second information sent by the access network device, where the second information carries a first key; wherein the first key is used to perform security processing on data transmitted through a first connection; and the first connection is a connection between the first device and a second device.
  • Fig. 6 is a schematic flow chart of a communication method according to another embodiment of the present application. The method includes at least part of the following contents.
  • the access network device sends first information to the first device, and the access network device sends second information to the second device; wherein, the first information carries key generation parameters, and the key generation parameters are used to generate a first key; the first key is used to perform security processing on data transmitted on the first connection; the first connection is a connection between the first device and the second device.
  • the first device is a remote terminal device; the second device is a relay terminal device.
  • the access network device can be any one of a base station, a gNB, an eNB, etc.
  • the security processing of the data transmitted on the first connection refers to: performing security processing such as integrity protection and encryption on the data transmitted on the first connection. That is, in the solution provided by this embodiment, the access network device can send a key generation parameter to the first device so that the first device generates a first key, and the access network device can also directly send the first key to the second device, so that the first device and the second device can successfully establish a secure first connection based on the first key.
  • the first device triggers the establishment of the aforementioned first connection.
  • the method further includes: the first device sends first request information to the access network device; wherein the first request information is used to request to establish the first connection.
  • the method further includes: the access network device receives the first request information sent by the first device; wherein the first request information is used to request to establish the first connection.
  • the first device may first decide whether to send the first request information, which may include: the first device sends the first request information when it is determined based on the current state that the first connection needs to be established. For example, the first device determines that the first connection needs to be established when the current state is that the data transmission volume of the first device is higher than the preset threshold value, or when the downlink signal strength between the first device and the access network device is less than the first strength threshold value.
  • the preset threshold value can be set according to the actual situation without limitation; the first strength threshold value can also be set according to the actual situation without limitation; the downlink signal strength can be measured by the following content: RSRP (Reference Signal Receiving Power) measurement result and/or RSRQ (Reference Signal Receiving Quality) measurement result, etc. It should be understood that this is only an exemplary description. In actual processing, the first device can also use other methods to determine whether to send the first request information, but it is not exhaustive here.
  • the aforementioned first request information may be referred to as a first DCR (Direct Communication Request).
  • the first request information may also be referred to as a first MP trigger information.
  • the aforementioned first request information may carry relevant information of the second device.
  • the relevant information of the second device may specifically be identification information of the second device.
  • the identification information of the second device may be a unique identifier of the second device.
  • the identification information of the second device may be any one of the following: a temporary mobile subscriber identification code (TMSI, Temporary Mobile Subscriber Identity) of the second device, an international mobile subscriber identification code (IMSI, International Mobile Subscriber Identity) of the second device, and an I-RNTI (Inactive Radio Network Temporary Identifier) of the second device.
  • TMSI Temporary Mobile Subscriber Identity
  • IMSI International Mobile Subscriber Identity
  • I-RNTI Inactive Radio Network Temporary Identifier
  • the first device needs to select or discover the second device before sending the first request message.
  • the way in which the first device selects or discovers the second device may include: Model A discovery process or model B discovery process.
  • the Model A discovery process may be: the first device receives an announcement message sent by multiple candidate devices, and the announcement message actively broadcasts the RSC (Relay service code) of the multiple candidate devices that can provide relay services; the first device can select a suitable device as the second device according to the RSC contained in the announcement message of the received multiple candidate devices.
  • RSC Reflect service code
  • the model B discovery process may be: the first device sends a Solicitation message, and the Solicitation message contains the RSC required by the first device itself; if there are candidate devices that can support RSC around the first device, the candidate device sends a response message to the first device; the first device can select a suitable device as the second device from the candidate devices that send the response message.
  • the access network device After receiving the aforementioned first request information, the access network device will send the first information to the first device and send the second information to the second device respectively.
  • the method further includes: the access network device generates the first key.
  • the access network device sends the second information to the second device, including: the access network device sends the second information to the second device when the first key is generated.
  • the second device can receive the second information sent by the access network device.
  • the access network device generating the first key may include: the access network device generating the first key based on the key generation parameters and the second key; wherein the second key is used to perform security processing on the data transmitted on the second connection; and the second connection is the connection between the first device and the access network device.
  • the key generation parameters include at least one of the following: relevant information of the second device, a first random number, a count value related to the first connection, relevant information of the radio bearer (RB) between the first device and the access network device, and a session identifier between the first device and the access network device.
  • relevant information of the second device a first random number
  • a count value related to the first connection relevant information of the radio bearer (RB) between the first device and the access network device
  • RB radio bearer
  • the relevant information of the second device is the same as that described in the aforementioned embodiment and will not be elaborated on again.
  • the first random number may be a first random number generated by the access network device, and the method for generating the first random number is not limited in this embodiment.
  • the count value associated with the first connection may include at least one of the following: the number of times the first connection is established between the access network device and the first device, the number of RRC messages sent to establish the first connection, the number of times the access network device generates a key, the number of times the SMC is initiated, etc. All possible types of the count value associated with the first connection are not exhaustively listed here, and any count value that may be associated with the first connection can be within the protection scope of this embodiment.
  • the session identifier between the first device and the access network device may refer to a PDU (Protocol Data Unit) Session ID between the first device and the access network device.
  • PDU Protocol Data Unit
  • the relevant information of the bearer between the first device and the access network device may include at least one of the following: an identifier of a DRB between the first device and the access network device; an identifier of an SRB between the first device and the access network device.
  • the first key is generated based on the key generation parameters and the second key, which may be: using a preset key algorithm to calculate the key generation parameters and the second key to obtain the first key.
  • the preset key algorithm may be a KDF (Key Derivation Function), or other key algorithms may be used, which are not exhaustive here.
  • KDF Key Derivation Function
  • the above-mentioned generation of the first key based on the key generation parameters and the second key may be expressed by the following formula:
  • K NR_Pro_MP KDF(K gNB , parameter); wherein, K NR_Pro_MP represents the first key, K gNB represents the second key, parameter represents the key generation parameter, and KDF() represents the use of the KDF algorithm.
  • the time when the aforementioned access network device sends the first information to the first device is within the protection scope of this embodiment as long as it is after the access network device receives the first request information.
  • the access network device sending the first information to the first device may include: after the access network device receives the first request information sent by the first device and before generating the first key, the access network device sends the first information to the first device.
  • the access network device sending the first information to the first device may include: the access network device sending the first information to the first device after receiving the first request information sent by the first device and after generating the first key.
  • the access network device sending the first information to the first device may include: the access network device sending the first information to the first device while generating the first key.
  • the access network device sending the first information to the first device includes: the access network device sending the first information to the first device when the access network device receives confirmation information of the second information sent by the second device. That is, after the access network device receives the first request information sent by the first device, generates the first key and sends the second information to the second device, the access network device sends the first information to the first device when the access network device receives confirmation information of the second information sent by the second device.
  • the first request information may be carried by a first RRC message.
  • the first RRC message may include one of the following: a first RRC connection establishment message, a first RRC connection reconstruction message, a first RRC connection recovery message, and a first RRC connection reconfiguration message.
  • the first RRC message is a first RRC connection reconfiguration message.
  • the aforementioned first information may be carried by a second RRC message.
  • the second RRC message may be an RRC completion message corresponding to the first RRC message.
  • the second RRC message may include one of the following: a first RRC connection establishment completion message, a first RRC connection reconstruction completion message, a first RRC connection recovery completion message, and a first RRC connection reconfiguration completion message.
  • the second RRC message is a first RRC connection reconfiguration completion message.
  • the first device may generate a first key based on the key generation parameters.
  • the first device generates the first key based on the key generation parameters, including: the first device generates the first key based on the key generation parameters and the second key; the second key is used to perform security processing on data transmitted on the second connection; the second connection is the connection between the first device and the access network device.
  • the processing method of the first device generating the first key based on the key generation parameters and the second key is the same as the processing method of the aforementioned access network device generating the first key, so it will not be repeated.
  • the processing of the first device may also include: the first device establishes a sidelink connection with the second device. This embodiment does not limit the manner in which the first device establishes a sidelink connection with the second device.
  • sending the second information to the second device may include: when the access network device generates the first key and the access network device establishes a secure connection of the Uu interface with the second device, the access network device sends the second information to the second device.
  • the process of the access network device generating the first key and the process of the access network device establishing a secure connection of the Uu interface with the second device may not be in any order, and this embodiment does not limit them. In addition, this embodiment does not limit the processing method of the access network device establishing a secure connection of the Uu interface with the second device.
  • the second information may also carry the first request information, and the first request information is used to request to establish the first connection. That is, the access network device may forward the first request information sent by the first device to the second device.
  • the second device may also send confirmation information of the second information to the access network device, and the confirmation information of the second information may be used to confirm receipt of the first key.
  • the second information may be carried by a sixth RRC message.
  • the sixth RRC message may include one of the following: a sixth RRC connection establishment message, a sixth RRC connection reconstruction message, a sixth RRC connection recovery message, and a sixth RRC connection reconfiguration message.
  • the sixth RRC message is a sixth RRC connection reconfiguration message.
  • the confirmation information of the second information can be used to confirm that the second device has received the first key.
  • the confirmation information of the second information can be carried by a seventh RRC message.
  • the seventh RRC message can be a response message of the sixth RRC message.
  • the seventh RRC message can include one of the following: a sixth RRC connection establishment completion message, a sixth RRC connection reconstruction completion message, a sixth RRC connection recovery completion message, and a sixth RRC connection reconfiguration completion message.
  • the seventh RRC message is a sixth RRC connection reconfiguration completion message.
  • both the first device and the second device can obtain the first key. Furthermore, the first device and the second device need to perform a confirmation process of air interface encryption and integrity protection.
  • the second device may initiate a confirmation process for executing encryption and integrity protection.
  • the timing for the second device to initiate the confirmation process of executing encryption and integrity protection is after the second device receives the second information sent by the access network device.
  • the processing performed on the second device side may include:
  • the method also includes: the second device sends first indication information; the first indication information is used to indicate the negotiation of a first key with the first device; the second device receives first response information sent by the first device; the first response information is used to confirm the generation of the first key.
  • the aforementioned second information also carries first request information
  • the first request information is used to request the establishment of the first connection.
  • the method may also include: when the second device receives the first response information sent by the first device, the second device sends confirmation information of the first request information to the first device; the confirmation information of the first request information is used to confirm that the first connection is successfully established securely.
  • the first indication information may carry identification information of the first key, and the identification information of the first key specifically refers to the ID of the first key. That is, after the second device receives the first key carried by the second information sent by the access network device, it carries the ID of the first key in the first indication information and sends it to the first device.
  • the first indication information is also used to indicate the negotiation of other security parameters with the first device; illustratively, the first indication information may also carry relevant information of the other security parameters, such as at least one of the following: relevant information of the second device, a first random number, a count value related to the first connection, relevant information of the wireless bearer RB between the first device and the access network device, a session identifier between the first device and the access network device, etc., which are not exhaustive here.
  • the aforementioned first indication information may be a first SMC (Security Mode Command).
  • the first response information is used to confirm the generation of the first key.
  • the first response information can be used to confirm that other security parameters are the same as those of the second device.
  • the description of the security parameters is the same as that of the aforementioned embodiment and is not repeated here.
  • the aforementioned first response information can be a first SMC response (Response).
  • the first device can send a first response information to the second device.
  • the confirmation information of the first request information is used to confirm that the first connection is securely established successfully, and specifically may refer to confirming that a secure connection of the PC5 interface is completed (or successfully) established between the first device and the second device.
  • the second device sending the first indication information may include one of the following:
  • the second device sends confirmation information of the second information to the access network device; wherein the confirmation information of the second information carries the first indication information;
  • the second device After the second device sends confirmation information of the second information to the access network device, the second device sends the first indication information to the access network device;
  • the second device After the second device sends confirmation information of the second information to the access network device, the second device sends the first indication information to the first device.
  • the timing when the second device sends the first indication information is within the protection scope of this embodiment as long as it is after receiving the second information sent by the access network device.
  • the first indication information can be carried by the confirmation information of the second information, or can be sent separately.
  • the processing performed on the access network device side may include:
  • the method further includes: the access network device receiving first indication information sent by the second device; wherein the first indication information is used to indicate negotiation of a first key with the first device.
  • the access network device receives the first indication information sent by the second device, including one of the following: the access network device receives confirmation information of the second information sent by the second device, and the confirmation information of the second information carries the first indication information; after the access network device receives the confirmation information of the second information sent by the second device, it receives the first indication information sent by the second device.
  • the manner in which the access network device sends the first indication information to the first device may include: when the access network device receives the first indication information sent by the second device, the access network device sends the first indication information to the first device.
  • the access network device may carry the first indication information in the first information and send it. Specifically, the access network device sends the first information to the first device, including: when the access network device receives the first indication information sent by the second device, the access network device sends the first information to the first device, and the first information carries the first indication information.
  • the access network device may send the first information to the first device only when it receives the first indication information sent by the second device, and carry the first indication information in the first information.
  • the time when the access network device sends the first information to the first device is different from the time when it sends the first indication information, that is, two pieces of information are sent separately; in a preferred example of this situation, the access network device sends the first information to the first device as long as it receives the first request information; and when waiting to receive the first indication information sent by the second device, it sends the first indication information to the first device again.
  • the processing that the first device can perform may include:
  • the manner in which the first device receives the first indication information may include one of the following:
  • the first device receives first indication information sent by the second device; the first indication information is used to indicate negotiation of a first key with the first device;
  • the first device receives first indication information sent by the access network device.
  • the first information also carries first indication information, and the first indication information is used to indicate to negotiate a first key with the first device, that is, the first device can obtain the first indication information from the first information.
  • the method also includes: the first device sends a first response message to the second device; the first response message is used to confirm the generation of the first key; the first device receives confirmation information of the first request information sent by the second device; the confirmation information of the first request information is used to confirm that the first connection is securely established successfully.
  • the second device carries the first indication information in the confirmation information of the second information, and carries the first indication information in the first information. Specifically:
  • the processing of the first device may include: the first device sends a first request message to the access network device; the first device receives the first message sent by the access network device, the first message carries first indication information and key generation parameters; the first device generates a first key based on the key generation parameters and the second key; the first device sends a first response message to the second device; the first device receives confirmation information of the first request message sent by the second device.
  • the processing of the access network device may include: the access network device receives a first request message sent by a first device; the access network device generates a first key; when the access network device generates the first key, the access network device sends the second message to the second device, and the second message carries the first key and the first request information; the access network device receives confirmation message of the second message sent by the second device, and the confirmation message of the second message carries the first indication information; when the access network device receives the first indication message sent by the second device, the access network device sends the first message to the first device, and the first message carries the first indication information.
  • the processing of the second device may include: the second device receives second information sent by the access network device, the second information carries the first key and the first request information; the second device sends confirmation information of the second information to the access network device, and the confirmation information of the second information carries the first indication information; the second device receives first response information sent by the first device, and the first response information is used to confirm the generation of the first key; the second device sends confirmation information of the first request information to the first device, and the confirmation information of the first request information is used to confirm that the first connection is securely established successfully.
  • the related descriptions of the first request information, the first information, the second information, the confirmation information of the second information, the first indication information, the first response information and the confirmation information of the first request information are the same as those in the aforementioned embodiment and are not repeated.
  • the first device as a remote UE
  • the second device as a relay UE
  • the access network device as a gNB
  • the first request information as a first DCR
  • the first indication information as a first SMC
  • the first response information as a first SMC response as an example for exemplary description, specifically including:
  • the remote UE sends a first DCR to the gNB, where the first DCR is used to request establishment of the first connection.
  • gNB generates a first key.
  • the time when the gNB generates the first key is within the protection scope of this example as long as it is before S703.
  • the gNB sends second information to the relay UE, where the second information carries the first key.
  • a secure connection of a uu interface may be established between the access network device and the second device.
  • the relay UE sends confirmation information of the second information to the gNB, and the confirmation information of the second information carries the first SMC.
  • the gNB sends a first message to the remote UE, where the first message carries a key generation parameter and a first SMC.
  • S706 The remote UE generates a first key based on the key generation parameter and the second key.
  • the time when the remote UE generates the first key based on the key generation parameter and the second key is within the protection scope of this example as long as it is before S707.
  • the remote UE After generating the first key, the remote UE sends a first SMC response to the relay UE.
  • the PC5 connection has been established between the remote UE and the relay UE.
  • the PC5 connection has been established between the remote UE and the relay UE.
  • the relay UE sends confirmation information of the first DCR to the remote UE.
  • the confirmation information of the first DCR is used to confirm that the first connection is successfully established securely, that is, as shown in FIG7 , a secure PC5 connection is established between the relay UE and the remote UE.
  • the carrying methods of the first DCR, the second information, the confirmation information of the second information, and the first information are the same as those in the aforementioned embodiment, so for the sake of brevity, the carrying messages of each information are not described in detail in FIG. 7 .
  • the second device after the second device sends confirmation information of the second information to the access network device, the second device sends the first indication information to the access network device. Specifically:
  • the processing of the first device may include: the first device sends a first request message to the access network device; the first device receives the first message sent by the access network device, the first message carries a key generation parameter; the first device generates a first key based on the key generation parameter and the second key; the first device receives the first indication message sent by the access network device; the first device sends a first response message to the second device; the first device receives confirmation information of the first request message sent by the second device.
  • the processing of the access network device may include: the access network device receives a first request message sent by a first device; the access network device sends a first message to the first device; the access network device generates a first key; when the access network device generates the first key, the access network device sends the second message to the second device, and the second message carries the first key and the first request information; after the access network device receives confirmation information of the second message sent by the second device, the access network device receives the first indication information sent by the second device; when the access network device receives the first indication information sent by the second device, the access network device sends the first indication information to the first device.
  • the processing of the second device may include: the second device receives second information sent by the access network device, and the second information carries the first key and the first request information; after the second device sends confirmation information of the second information to the access network device, the second device sends the first indication information to the access network device; the second device receives first response information sent by the first device, and the first response information is used to confirm the generation of the first key; the second device sends confirmation information of the first request information to the first device, and the confirmation information of the first request information is used to confirm that the first connection is securely established successfully.
  • the time when the aforementioned access network device sends the first information to the first device can be any one of the following: before the access network device generates the first key; at the same time as the access network device generates the first key; after the access network device generates the first key; at the same time as the access network device sends the second information to the second device; after the access network device sends the second information to the second device.
  • the time when the first device sends the first response information is within the protection scope of this embodiment as long as it is after the first device generates the first key.
  • the first indication information sent by the aforementioned second device to the access network device may be carried by the eighth RRC message.
  • the eighth RRC message may be any one of the following: an eighth RRC connection establishment message, an eighth RRC connection reconstruction message, an eighth RRC connection recovery message, and an eighth RRC connection reconfiguration message.
  • the eighth RRC message is an eighth RRC connection reconfiguration message.
  • the aforementioned access network device may also send confirmation receipt information of the first indication information to the second device; the confirmation receipt information of the first indication information may be carried by the ninth RRC message.
  • the ninth RRC message may be any one of the following: a ninth RRC connection establishment completion message, a ninth RRC connection reconstruction completion message, a ninth RRC connection recovery completion message, and a ninth RRC connection reconfiguration completion message.
  • the related descriptions of the first request information, the first information, the second information, the confirmation information of the second information, the first indication information, the first response information and the confirmation information of the first request information are the same as those in the aforementioned embodiment and are not repeated.
  • the first device as a remote UE
  • the second device as a relay UE
  • the access network device as a gNB
  • the first request information as a first DCR
  • the first indication information as a first SMC
  • the first response information as a first SMC response as an example for exemplary description, specifically including:
  • the remote UE sends a first DCR to the gNB, where the first DCR is used to request establishment of the first connection.
  • gNB generates a first key.
  • the time when the gNB generates the first key is within the protection scope of this example as long as it is before S805.
  • the gNB sends a first message to the remote UE, where the first message carries a key generation parameter.
  • the remote UE generates a first key based on the key generation parameter and the second key.
  • the time when the remote UE generates the first key based on the key generation parameter and the second key can be any time after S803 and before S809, and this example does not limit it.
  • the gNB sends second information to the relay UE, where the second information carries the first key.
  • the aforementioned S803 and S805 may be performed in any order.
  • a secure connection of a uu interface may be established between the access network device and the second device.
  • a PC5 connection has been established between the remote UE and the relay UE.
  • the relay UE sends confirmation information of the second information to the gNB, which is confirmation information of the second information.
  • the relay UE sends the first SMC to the gNB.
  • S807 it may also include: the gNB sends confirmation reception information of the first SMC to the relay UE.
  • gNB sends the first SMC to the remote UE.
  • the remote UE may also include: the remote UE sends a confirmation receipt message to the gNB.
  • the remote UE After confirming the generation of the first key, the remote UE sends a first SMC response to the relay UE.
  • the relay UE sends confirmation information of the first DCR to the remote UE.
  • the confirmation information of the first DCR is used to confirm that the first connection is successfully established securely, that is, as shown in FIG8 , a secure PC5 connection is established between the relay UE and the remote UE.
  • the second device after the second device sends confirmation information of the second information to the access network device, the second device sends the first indication information to the first device. Specifically:
  • the processing of the first device may include: the first device sends a first request message to the access network device; the first device receives the first message sent by the access network device, the first message carries a key generation parameter; the first device generates a first key based on the key generation parameter and the second key; the first device receives the first indication message sent by the second device; the first device sends a first response message to the second device; the first device receives confirmation message of the first request message sent by the second device.
  • the processing of the access network device may include: the access network device receives a first request message sent by a first device; the access network device sends the first message to the first device; the access network device generates a first key; the access network device sends the second message to the second device after generating the first key, and the second message carries the first key and the first request message; the access network device receives confirmation information of the second message sent by the second device.
  • the processing of the second device may include: the second device receives second information sent by the access network device, and the second information carries the first key and the first request information; after the second device sends confirmation information of the second information to the access network device, the second device sends the first indication information to the first device; the second device receives first response information sent by the first device, and the first response information is used to confirm the generation of the first key; the second device sends confirmation information of the first request information to the first device, and the confirmation information of the first request information is used to confirm that the first connection is securely established successfully.
  • the time when the aforementioned access network device sends the first information to the first device can be any one of the following: before the access network device generates the first key; at the same time as the access network device generates the first key; after the access network device generates the first key; at the same time as the access network device sends the second information to the second device; after the access network device sends the second information to the second device.
  • the time when the first device sends the first response information is within the protection scope of this embodiment as long as it is after the first device generates the first key.
  • the first indication information mentioned above may be carried by a sidelink message; similarly, the first response information may also be carried by a sidelink message.
  • the sidelink message may be a sidelink RRC message.
  • the related descriptions of the first request information, the first information, the second information, the confirmation information of the second information, the first indication information, the first response information and the confirmation information of the first request information are the same as those in the aforementioned embodiment and are not repeated.
  • the first device as a remote UE
  • the second device as a relay UE
  • the access network device as a gNB
  • the first request information as a first DCR
  • the first indication information as a first SMC
  • the first response information as a first SMC response as an example for exemplary description, specifically including:
  • the remote UE sends a first DCR to the gNB, where the first DCR is used to request establishment of the first connection.
  • gNB generates a first key.
  • the time when the gNB generates the first key is within the protection scope of this example as long as it is before S905.
  • the gNB sends a first message to the remote UE, where the first message carries a key generation parameter.
  • S904 The remote UE generates a first key based on the key generation parameter and the second key.
  • the remote UE may generate the first key based on the key generation parameter and the second key at any time after S903 and before S909, and this example does not limit this.
  • the gNB sends second information to the relay UE, where the second information carries the first key.
  • the aforementioned S903 and S905 may be performed in any order.
  • a secure connection of a uu interface may be established between the access network device and the second device.
  • a PC5 connection has been established between the remote UE and the relay UE.
  • the relay UE sends confirmation information of the second information to the gNB, which is confirmation information of the second information.
  • the relay UE sends a first SMC to the remote UE.
  • the remote UE After generating the first key, the remote UE sends a first SMC response to the relay UE.
  • the relay UE sends confirmation information of the first DCR to the remote UE.
  • the confirmation information of the first DCR is used to confirm that the first connection is successfully established securely, that is, as shown in FIG9 , a secure PC5 connection is established between the relay UE and the remote UE.
  • the carrying methods of the first DCR, the second information, the confirmation information of the second information, and the first information are the same as those in the aforementioned embodiment, so for the sake of brevity, the carrying messages of each information are not described in detail in FIG. 9 .
  • the first device may initiate a confirmation process for executing air interface encryption and integrity protection.
  • the first device initiates a confirmation process for executing air interface encryption and integrity protection after generating a first key for the first device.
  • the processing performed on the first device side may include:
  • the method also includes: the first device sends second indication information to the second device; the second indication information is used to indicate negotiation of the first key with the second device; the first device receives second response information sent by the second device, and the second response information is used to confirm that the first key is obtained.
  • the second indication information may carry identification information of the first key, and the identification information of the first key may specifically be the ID of the first key. That is, after the first device generates the first key, it carries the ID of the first key in the second indication information and sends it to the second device. It should also be pointed out that the second indication information is also used to indicate negotiation of other security parameters with the second device. The description of the other security parameters here is the same as that in the aforementioned embodiment and is not repeated here.
  • the aforementioned second indication information may be a second SMC.
  • the second response information is used to confirm the acquisition of the first key.
  • the second response information can also be used to confirm the acquisition of other security parameters.
  • the aforementioned second response information can be a second SMC response (Response).
  • the second device can send a second response information to the first device.
  • the second response information is also used to confirm that the first connection is securely established successfully.
  • the second response information may carry confirmation information of the first request information; and the confirmation information of the first request information is used to confirm that the first connection is securely established successfully.
  • the method further includes: the first device receives confirmation information of the first request information sent by the second device; the confirmation information of the first request information is used to confirm that the first connection is securely established successfully.
  • the processing that the second device can perform may include:
  • the method further includes: the second device receives second indication information sent by the first device; the second indication information is used to indicate negotiation of the first key with the second device.
  • the method further includes: the second device sends second response information to the first device, the second response information is used to confirm that the first key is obtained.
  • the second information also carries first request information, and the first request information is used to request to establish the first connection.
  • the method further includes: when the second device sends the second response information to the first device, the second device sends confirmation information of the first request information to the first device; the confirmation information of the first request information is used to confirm that the first connection is securely established successfully.
  • the second information also carries first request information, the first request information is used to request the establishment of the first connection; the second response information is also used to confirm that the first connection is successfully established securely.
  • the second response information may carry confirmation information of the first request information, that is, the second response information is used to confirm the completion of the establishment of a secure connection between the first device and the second device in addition to confirming the acquisition of the first key.
  • the second device can directly confirm the first request information through the second response information, so that the first device confirms that the secure connection of the PC5 interface between the first device and the second device has been established.
  • the second device can further send confirmation information of the first request information to the first device, so that the first device confirms that the secure connection of the PC5 interface between the first device and the second device has been established.
  • the processing of the first device may include: the first device sends a first request message to the access network device; the first device receives the first message sent by the access network device, the first message carries a key generation parameter; the first device generates a first key based on the key generation parameter and a second key; the first device sends the second indication message to the access network device; the first device receives the second response message sent by the second device, the second response message is used to confirm the acquisition of the first key, and the second response message can also be used to confirm the completion of establishing the first connection.
  • the processing of the access network device may include: the access network device receives a first request message sent by a first device; the access network device sends a first message to the first device, and the first message carries a key generation parameter; the access network device generates a first key; the access network device sends a second message to the second device, and the second message carries the first key.
  • the processing of the second device may include: the second device receives second information sent by the access network device, and the second information carries the first key; the second device sends confirmation information of the second information to the access network device; the second device receives second indication information sent by the first device, and the second indication information is used to indicate the negotiation of the first key with the second device; when the second device determines that the first key is received, the second device sends second response information to the first device, and the second response information is used to confirm that the first key is obtained.
  • the second response information is also used to confirm the completion of establishing the first connection.
  • the related descriptions of the first request information, the first information, the second information, the confirmation information of the second information, the second indication information, the second response information and the confirmation information of the first request information are the same as those in the aforementioned embodiment and are not repeated.
  • the first device may also send the second indication information to the second device through the access network device after generating the first key.
  • the first device may send the second indication information to the access network device after generating the first key.
  • the access network device receives the second indication information, it sends the second information to the second device, and the second information carries the second indication information and the first key. Then the second device directly sends the second response information to the first device.
  • the second indication information is sent after the first device generates the first key, it is within the protection scope of this embodiment, and this embodiment does not exhaust all possibilities.
  • the first device as a remote UE
  • the second device as a relay UE
  • the access network device as a gNB
  • the first request information as a first DCR
  • the second indication information as a second SMC
  • the second response information as a second SMC response as an example for exemplary description, specifically including:
  • the remote UE sends a first DCR to the gNB, where the first DCR is used to request establishment of the first connection.
  • the gNB generates a first key.
  • the time when the gNB generates the first key is within the protection scope of this example as long as it is before S1003.
  • the gNB sends second information to the relay UE, where the second information carries the first key.
  • a secure connection of a uu interface may be established between the access network device and the second device.
  • the remote UE may also send confirmation information of the second information to the relay UE, and the confirmation information of the second information may be carried by the third RRC connection reconfiguration complete message.
  • the gNB sends a first message to the remote UE, where the first message carries a key generation parameter.
  • the order of the above S1004 and S1003 is not limited in this embodiment.
  • the remote UE and the relay UE Before executing S1004, the remote UE and the relay UE have already established a PC5 connection.
  • the remote UE generates a first key based on the key generation parameter and the second key.
  • the remote UE sends a second SMC to the relay UE.
  • the relay UE sends a second SMC response to the remote UE.
  • the second SMC response is used to confirm that the first key is obtained and is also used to confirm that the first connection is securely established successfully, specifically to confirm that the secure PC5 connection is established.
  • the relay UE sends a second SMC response to the remote UE, where the second SMC response is used to confirm that the first key has been obtained.
  • the relay UE sends confirmation information of the first DCR to the remote UE.
  • the confirmation information of the first DCR is the same as the above example, and will not be described repeatedly.
  • the carrying methods of the first DCR, the second information, the confirmation information of the second information, and the first information are the same as those in the aforementioned embodiment, so for the sake of brevity, the carrying messages of each information are not described in detail in FIG. 8 .
  • the establishment of the aforementioned first connection is triggered by an access network device.
  • the access network device may send the second request information while sending the first information, that is, the first information also carries the second request information, and the second request information is used to request to establish the first connection.
  • the access network device may first decide whether to send a second request message, which may include: the access network device sends the second request message when it determines that the first connection needs to be established based on the current state of the first device.
  • the current state of the first device is that the data transmission volume of the first device is higher than the preset threshold value, or it may be that the uplink signal strength between the first device and the access network device is less than the second strength threshold value, and it is determined that the first connection needs to be established.
  • the preset threshold value can be set according to actual conditions without limitation; the second strength threshold value can also be set according to actual conditions without limitation. It should be understood that this is only an exemplary explanation. In actual processing, the access network device can also use other methods to determine whether to send the first request message, but they are not exhaustive here.
  • the first information may be carried by a third RRC message.
  • the third RRC message may include one of the following: a third RRC connection establishment message, a third RRC connection reconstruction message, a first RRC connection recovery message, and a third RRC connection reconfiguration message.
  • the third RRC message is a third RRC connection reconfiguration message.
  • second MP trigger information Exemplarily, the aforementioned second request information may be referred to as second MP trigger information.
  • the first information may also carry relevant information of the second device, wherein the relevant information of the second device is the same as that described in the above embodiment and will not be repeated.
  • the access network device needs to select or discover the second device before sending the first information.
  • the first device may first select or discover one or more candidate devices, send the identification of one or more candidate devices to the access network device, and the access network device determines the second device.
  • the first device may first select or discover one or more candidate devices, send the identification of one or more candidate devices to the access network device; the access network device receives the one or more candidate devices reported by the first device, and then determines the second device from the one or more candidate devices based on the geographic location of the candidate devices and the geographic location of the first device.
  • the access network device may be a candidate device that meets the distance requirements with the first device as the second device. The requirement can be set according to the actual situation. For example, it can be less than a specified distance. The specified distance is not limited in this embodiment.
  • the method further includes: the access network device generates the first key. That is, after the access network device sends the first information to the first device and before sending the second information to the second device, the access network device needs to generate the first key.
  • the way in which the access network device generates the first key is the same as in the above-mentioned embodiment and will not be described in detail.
  • the time when the access network device generates the first key is within the protection scope of this embodiment as long as it is before the access network device sends the second information to the second device.
  • the access network device may generate the first key before sending the first information; or the access network device may generate the first key after sending the first information and before sending the second information to the second device. This is only an exemplary description and does not serve as a limitation on the time when the access network device generates the first key.
  • the access network device when the access network device generates the first key and the access network device establishes a secure connection of the Uu interface with the second device, the access network device sends the second information to the second device.
  • the processing of the access network device generating the first key and the processing of the access network device establishing a secure connection of the Uu interface with the second device can be in any order, and this embodiment does not limit them. In addition, this embodiment does not limit the processing method of the access network device establishing a secure connection of the Uu interface with the second device.
  • the second device when the second device receives the second information sent by the access network device, it can also send confirmation information of the second information to the access network device.
  • the access network device after the access network device sends the second information to the second device, it can also receive confirmation information of the second information sent by the second device, and the confirmation information of the second information is used to confirm the receipt of the first key.
  • the messages carried by the second information and the confirmation information of the second information are the same as those in the above-mentioned embodiment, and are not repeated.
  • the first device After the first device receives the first information, it can generate a first key based on the key generation parameters.
  • the process of the first device generating the first key based on the key generation parameters is the same as the above-mentioned embodiment, and no repeated description is given.
  • the first device After the first device receives the first information, it can also include: the first device establishes a side link connection with the second device. This embodiment does not limit the way in which the first device establishes a side link connection with the second device.
  • both the first device and the second device can obtain the first key. Furthermore, the first device and the second device need to perform a confirmation process of air interface encryption and integrity protection.
  • the second device may initiate a confirmation process for executing air interface encryption and integrity protection.
  • the timing for the second device to initiate the confirmation process of executing air interface encryption and integrity protection is after the second device receives the second information sent by the access network device.
  • the processing performed on the second device side may include:
  • the method also includes: the second device sends first indication information; the first indication information is used to indicate negotiation of a first key with the first device; the second device receives first response information sent by the first device; the first response information is used to confirm generation of the first key.
  • the second device sending the first indication information includes: the second device sending the first indication information to the first device.
  • the processing that the first device can perform may include:
  • the manner in which the first device receives the first indication information may include: the first device receives the first indication information sent by the second device; the first indication information is used to indicate the negotiation of the first key with the first device.
  • the method further includes: the first device sends a first response information to the second device; the first response information is used to confirm the generation of the first key; the first device sends a first confirmation information of the second request information to the access network device; the first confirmation information of the second request information is used to confirm that the first connection is securely established successfully.
  • the processing of the access network device may include: the access network device receives first confirmation information of the second request information sent by the first device; the first confirmation information of the second request information is used to confirm that the first connection is securely established successfully.
  • the first confirmation information of the second request information is carried by a fourth RRC message.
  • the fourth RRC message may correspond to the third RRC message carrying the first information, for example, the fourth RRC message may include one of the following: a third RRC connection establishment completion message, a third RRC connection reconstruction completion message, a first RRC connection recovery completion message, and a third RRC connection reconfiguration completion message.
  • the fourth RRC message is a third RRC connection reconfiguration completion message.
  • the access network device triggers the establishment of the aforementioned first connection, and the second device initiates the confirmation process of executing air interface encryption and integrity protection. Specifically:
  • the processing of the access network device may include: the access network device sends a first message to a first device, the first message carries second request information and a key generation parameter; the access network device generates a first key; the access network device sends the second message to the second device when generating the first key, the second message carries the first key; the access network device receives confirmation information of the second information sent by the second device; the access network device receives first confirmation information of the second request information sent by the first device; the first confirmation information of the second request information is used to confirm that the first connection is securely established successfully.
  • the processing of the first device may include: the first device receives first information sent by the access network device, the first information carries second request information and key generation parameters; the first device generates a first key based on the key generation parameters and the second key; the first device receives first indication information sent by the second device, the first indication information is used to indicate negotiation of the first key with the first device; when the first device determines that the first key is generated, the first device sends a first response information to the second device, the first response information is used to confirm the generation of the first key; the first device sends a first confirmation information of the second request information to the access network device, the first confirmation information of the second request information is used to confirm that the first connection is securely established successfully.
  • the processing of the second device may include: the second device receives second information sent by the access network device, and the second information carries the first key; the second device sends first indication information to the first device, and the first indication information is used to indicate the negotiation of the first key with the first device; the second device receives first response information sent by the first device, and the first response information is used to confirm the generation of the first key.
  • the first device as a remote UE
  • the second device as a relay UE
  • the access network device as a gNB
  • the second request information as the second MP trigger information
  • the first indication information as the first SMC
  • the first response information as the first SMC response
  • the gNB sends a first message to a remote UE, where the first message carries a key generation parameter and a second MP trigger message, and the second MP trigger message is used to request to establish the first connection.
  • S1102. gNB generates a first key.
  • the time when the gNB generates the first key may be before S1101 or after S1101 and before S1103, which is not limited in this embodiment.
  • the gNB sends second information to the relay UE, where the second information carries the first key.
  • a secure connection of a uu interface may be established between the access network device and the second device.
  • the relay UE sends confirmation information of the second information to the gNB.
  • the remote UE generates a first key based on the key generation parameter and the second key.
  • S1105 can be executed at any time after S1101. As long as the processing of S1105 is completed before sending the first response information (i.e., the first SMC response), it is within the protection scope of this embodiment; or, as long as the processing of S1105 is completed before sending the second indication information (i.e., the second SMC), it is within the protection scope of this embodiment, and no limitation is made here.
  • first response information i.e., the first SMC response
  • second indication information i.e., the second SMC
  • the relay UE sends a first SMC to the remote UE.
  • the remote UE sends a first SMC response to the relay UE.
  • the PC5 connection has been established between the remote UE and the relay UE.
  • the PC5 connection has been established between the remote UE and the relay UE.
  • the remote UE sends a first confirmation message of the second MP trigger message to the gNB.
  • the first confirmation message of the second MP trigger message is used to confirm that the first connection is securely established successfully.
  • the first device may initiate a confirmation process for executing air interface encryption and integrity protection.
  • the first device initiates a confirmation process for executing air interface encryption and integrity protection after generating a first key for the first device.
  • the processing performed on the first device side may include:
  • the method also includes: the first device sends a second indication message to the second device; the second indication message is used to indicate the negotiation of the first key with the second device; the first device receives a second response message sent by the second device, and the second response message is used to confirm that the first key is obtained; the first device sends a first confirmation message of the second request message to the access network device; wherein the first confirmation message of the second request message is used to confirm that the first connection is securely established successfully.
  • the method also includes: the first device sends a second indication message to the second device; wherein the second indication message is used to indicate negotiation of the first key with the second device; the first device receives a second response message sent by the second device; wherein the second response message is used to confirm that the first key is obtained, and the second response message is also used to confirm that the first connection is securely established successfully.
  • the second response information can be used to confirm that the first connection is successfully established securely, that is, the second response information can carry the first confirmation information of the second request information.
  • the second response information and the first confirmation information of the second request information are sent separately by two signalings.
  • the method also includes: the first device sends second confirmation information of the second request information to the access network device, and the second confirmation information of the second request information is used to confirm the completion of establishing the first connection with the second device; the second confirmation information of the second request information is carried by the fifth RRC message.
  • the second indication information further carries second confirmation information of the second request information; the second confirmation information of the second request information is used to confirm the completion of establishing the first connection with the second device.
  • the first device after the first device receives the first information carrying the second request information sent by the access network device, it can also send a second confirmation information of the second request information to the access network device, so that the access network device confirms that the first device and the second device have a sidelink connection.
  • the second confirmation information of the second request information can be carried by the second indication information, or can be sent separately from the second indication information by different signaling.
  • the processing that the second device can perform may include:
  • the method further includes: the second device receives second indication information sent by the first device; the second indication information is used to indicate negotiation of the first key with the second device.
  • the method further includes: the second device sends second response information to the first device, the second response information is used to confirm that the first key is obtained.
  • the second device receives the second information sent by the access network device, which may include: when the second device receives the second indication information sent by the first device, the second device sends key request information to the access network device; the second device receives the second information sent by the access network device.
  • the second indication information also carries second confirmation information of the second request information, and the second confirmation information of the second request information is used to confirm the completion of establishing the first connection; and the key request information carries the second confirmation information of the second request information.
  • the second device receives the second information sent by the access network device before or after the second device receives the second indication information sent by the first device.
  • the processing of the access network device may also include: the access network device sending first information to the first device, and the access network device sending second information to the second device, including: the access network device sending the first information to the first device; the access network device receiving key request information sent by the second device; the access network device sending the second information to the second device.
  • the access network device may be in a waiting state after sending the first information, and only send the second information to the second device when receiving the key request information sent by the second device. It should be understood that in this case, the timing of the access network device generating the first key is within the protection scope of this embodiment as long as it is before sending the second information to the second device. In a possible example, the access network device generates the first key when receiving the key request information sent by the second device; then the access network device sends the second information to the second device.
  • the key request information carries second confirmation information of the second request information; the second confirmation information of the second request information is used to confirm that the first connection with the second device is established.
  • the method before the access network device receives the key request information sent by the second device, the method also includes: the access network device receives second confirmation information of the second request information sent by the first device, and the second confirmation information of the second request information is used to confirm the completion of establishing the first connection with the second device.
  • the access network device waits to receive the key request information sent by the second device.
  • the access network device may generate the first key before sending the second information to the second device.
  • the access network device may generate the first key when receiving the key request information, and then send the second information to the second device; for example, the access network device may generate the first key before sending the first information, and send the second information to the second device when receiving the key request information. It should be understood that this is an exemplary description and is not a limitation on the time point when the access network device generates the first key.
  • the access network device triggers the establishment of the aforementioned first connection, and the first device initiates the confirmation process of executing air interface encryption and integrity protection. Specifically:
  • the processing of the access network device may include: the access network device sends first information to the first device, the first information carries second request information and key generation parameters; the access network device generates a first key; the access network device sends the second information to the second device when generating the first key, the second information carries the first key; the access network device receives confirmation information of the second information sent by the second device; the access network device receives first confirmation information of the second request information sent by the first device.
  • the processing of the first device may include: the first device receives first information sent by the access network device, the first information carries second request information and key generation parameters; the first device generates a first key based on the key generation parameters and the second key; when the first device determines to generate the first key, the first device sends second indication information to the second device; the first device receives second response information sent by the second device; the first device sends first confirmation information of the second request information to the access network device, and the first confirmation information of the second request information is used to confirm that the first connection is securely established successfully.
  • the processing by the second device may include: the second device receives second information sent by the access network device, the second information carries the first key; the second device receives second indication information sent by the first device; the second device sends second response information to the first device.
  • the aforementioned second response information can also be used to confirm that the first connection is securely established successfully, that is, the second response information can carry the first confirmation information of the second request information.
  • the first device may not need to perform the processing of sending the first confirmation information of the second request information to the access network device, and may also perform the processing of sending the first confirmation information of the second request information to the access network device, which is within the protection scope of this embodiment and will not be described in detail.
  • an exemplary description is given by taking the first device as a remote UE, the second device as a relay UE, the access network device as a gNB, the second request information as the second MP trigger information, the second indication information as the second SMC, and the second response information as the second SMC response as an example, specifically including:
  • the remote UE sends a second SMC to the relay UE.
  • the relay UE sends a second SMC response to the remote UE.
  • S1101 to S1105 and S1108 are the same as those in the above-mentioned embodiment, and thus will not be described repeatedly.
  • the access network device triggers the establishment of the aforementioned first connection, and the first device initiates the confirmation process of executing air interface encryption and integrity protection. Specifically:
  • the processing of the access network device may include: the access network device sends a first message to a first device, the first message carries second request information and a key generation parameter; the access network device receives a key request message sent by a second device, the key request message carries second confirmation information of the second request information, and the second confirmation information of the second request information is used to confirm that a first connection has been established with the second device; the access network device generates a first key; and when generating the first key, the access network device sends the second message to the second device, the second message carries the first key.
  • the processing of the first device may include: the first device receives the first information sent by the access network device, the first information carries the second request information and the key generation parameters; the first device generates the first key based on the key generation parameters and the second key; when determining to generate the first key, the first device sends the second indication information to the second device, the second indication information also carries the second confirmation information of the second request information, the second confirmation information of the second request information is used to confirm the completion of the establishment of the first connection with the second device; the first device receives the second response information sent by the second device; wherein the second response information is used to confirm the acquisition of the first key, and the second response information is also used to confirm that the first connection is successfully established securely.
  • the processing of the second device may include: the second device receives the second indication information sent by the first device; upon receiving the second indication information sent by the first device, the second device sends a key request information to the access network device, and the key request information carries second confirmation information of the second request information; the second device receives the second information sent by the access network device; and the second device sends a second response information to the first device.
  • the second device taking the first device as a remote UE, the second device as a relay UE, the access network device as a gNB, the second request information as the second MP trigger information, the second indication information as the second SMC, and the second response information as the second SMC response as an example for exemplary description, specifically including:
  • the gNB sends a first message to a remote UE, where the first message carries a key generation parameter and a second MP trigger message, and the second MP trigger message is used to request to establish the first connection.
  • the remote UE generates a first key based on a key generation parameter.
  • the remote UE sends a second SMC to the relay UE, where the second SMC carries second confirmation information of the second MP triggering information.
  • the remote UE Before S1203, the remote UE needs to complete the establishment of a PC5 connection with the relay UE.
  • the relay UE sends a key request message to the gNB, where the key request message carries the second confirmation information of the second MP trigger information.
  • the gNB generates a first key.
  • the time when the gNB generates the first key is within the protection scope of this example as long as it is any time before S1206.
  • the gNB sends second information to the relay UE, where the second information carries the first key.
  • a secure connection of a uu interface may be established between the access network device and the second device.
  • the relay UE sends a second SMC response to the remote UE, where the second SMC response is used to confirm that the first key is obtained and is also used to confirm that the first connection is securely established successfully.
  • the access network device triggers the establishment of the aforementioned first connection, and the first device initiates the confirmation process of executing air interface encryption and integrity protection. Specifically:
  • the processing of the access network device may include: the access network device sends a first message to a first device, the first message carries second request information and a key generation parameter; the access network device receives a second confirmation message of the second request message sent by the first device, the second confirmation message of the second request message is used to confirm that the first connection with the second device has been established; the access network device receives a key request message sent by the second device, the key request message carries the second confirmation message of the second request message; the access network device generates a first key; and when generating the first key, the access network device sends the second message to the second device, the second message carries the first key.
  • the processing of the first device may include: the first device receives the first information sent by the access network device, the first information carries the second request information and the key generation parameter; the first device sends the second confirmation information of the second request information to the access network device, and the second confirmation information of the second request information is used to confirm that the first connection with the second device is established; the first device generates the first key based on the key generation parameter and the second key; when determining that the first key is generated, the first device sends the second indication information to the second device; the first device receives the second response information sent by the second device; wherein the second response information is used to confirm that the first key is obtained, and the second response information is also used to confirm that the first connection is successfully established securely.
  • the processing of the second device may include: the second device receives the second indication information sent by the first device; upon receiving the second indication information sent by the first device, the second device sends a key request information to the access network device, and the key request information carries second confirmation information of the second request information; the second device receives the second information sent by the access network device; and the second device sends a second response information to the first device.
  • gNB generates a first key.
  • the execution order of the gNB generating the first key can be any time before S1307. This example does not limit the time for the gNB to generate the first key.
  • the gNB sends a first message to a remote UE, where the first message carries a key generation parameter and a second MP trigger message, and the second MP trigger message is used to request to establish the first connection.
  • the remote UE sends a second confirmation message of the second MP triggering message to the gNB.
  • the remote UE generates a first key based on the key generation parameters.
  • execution order of S1304 and S1303 may not be particular.
  • the remote UE sends a second SMC to the relay UE, where the second SMC carries second confirmation information of the second MP triggering information.
  • the remote UE Before S1305, the remote UE needs to complete the establishment of a PC5 connection with the relay UE.
  • the relay UE sends a key request message to the gNB.
  • the gNB sends second information to the relay UE, where the second information carries the first key.
  • a secure connection of a uu interface may be established between the access network device and the second device.
  • the relay UE sends a second SMC response to the remote UE, where the second SMC response is used to confirm that the first key is obtained and is also used to confirm that the first connection is securely established successfully.
  • the layer 2 security establishment process between the remote UE and the relay UE in the related technology of Figure 14 is explained: S1401, the AUSF (Authentication Server Function) of the remote UE generates a key, which can be represented by K NR_ProSe ; S1402, the AUSF of the remote UE sends a response to the AMF of the relay UE, and the response carries the key and key-related parameters.
  • the key-related parameters may include a second random number (which may be represented as Nonce-2) and may also include an EAP (Extensible Authentication Protocol) success identifier.
  • the response may be an authentication response, which is not limited here; S1403, the AMF of the relay UE sends a response to the relay UE, which carries the key and key-related parameters; S1404, the relay UE sends a direct SMC to the remote UE, and the direct SMC carries key-related parameters; S1405, the remote UE generates a key.
  • S1403 the AMF of the relay UE sends a response to the relay UE, which carries the key and key-related parameters
  • S1404 the relay UE sends a direct SMC to the remote UE, and the direct SMC carries key-related parameters
  • S1405 the remote UE generates a key.
  • the remote UE and the relay UE will also interact with other network elements of the core network, such as the process of the remote UE discovering the relay UE, the process of the relay UE performing authentication, etc., which are not described in detail in FIG14; in addition, after S1405, the remote UE can also complete the SMC confirmation process and other processes with the relay UE, which are not described in detail in FIG14 either.
  • the first device can directly obtain the key generation parameters from the access network device and then generate the first key to perform security processing on the data transmitted on the connection between the first device and the second device.
  • the second device can also directly obtain the first key from the access network device. In this way, the problem of low processing efficiency caused by a large amount of signaling interaction with the core network device to obtain the key is avoided.
  • the solution provided in this application can enable the first device to interact directly with the access network device to obtain the first key, thereby improving the processing efficiency of generating the first key, and then ensuring the efficient establishment of a secure connection between the first device and the second device, and can also improve the processing efficiency of the entire communication system.
  • FIG15 is a schematic diagram of the composition structure of a first device according to an embodiment of the present application, including:
  • the first communication unit 1501 is configured to receive first information sent by an access network device, wherein the first information carries a key generation parameter;
  • the first processing unit 1502 is used to generate a first key based on the key generation parameter; wherein the first key is used to perform security processing on data transmitted in a first connection; and the first connection is a connection between the first device and a second device.
  • the first processing unit is used to generate the first key based on the key generation parameter and the second key; wherein the second key is used to perform security processing on data transmitted on the second connection; the second connection is a connection between the first device and an access network device.
  • the first communication unit is used to send first request information to the access network device before receiving the first information sent by the access network device; wherein the first request information is used to request to establish the first connection.
  • the first request information carries relevant information of the second device.
  • the first information also carries first indication information; the first indication information is used to indicate negotiation of a first key with the first device.
  • the first communication unit is used to perform one of the following: receiving first indication information sent by the second device; wherein the first indication information is used to indicate negotiation of a first key with the first device; receiving first indication information sent by the access network device.
  • the first communication unit is used to send a first response message to the second device after the first processing unit generates a first key based on the key generation parameters; wherein the first response message is used to confirm the generation of the first key; and receive confirmation information of the first request information sent by the second device; wherein the confirmation information of the first request information is used to confirm that the first connection is securely established successfully.
  • the first communication unit is used to send a second indication message to the second device after the first processing unit generates the first key based on the key generation parameters; wherein the second indication message is used to indicate negotiation of the first key with the second device; and receive a second response message sent by the second device, wherein the second response message is used to confirm obtaining the first key.
  • the second response information is also used to confirm that the first connection is securely established successfully.
  • the first communication unit is used to receive confirmation information of the first request information sent by the second device after receiving the second response information sent by the second device; wherein the confirmation information of the first request information is used to confirm that the first connection is securely established successfully.
  • the first request information is carried by a first radio resource control RRC message; and the first information is carried by a second RRC message.
  • the first information also carries second request information, where the second request information is used to request to establish the first connection.
  • the first information also carries relevant information of the second device.
  • the first information is carried by a third RRC message.
  • the first communication unit is used to receive a first indication message sent by the second device; wherein the first indication message is used to indicate negotiation of a first key with the first device; and after the first processing unit generates the first key based on the key generation parameters, a first response message is sent to the second device, and the first response message is used to confirm generation of the first key; and a first confirmation message of a second request message is sent to the access network device, and the first confirmation message of the second request message is used to confirm that the first connection is securely established successfully.
  • the first communication unit is used to send a second indication message to the second device after the first processing unit generates the first key based on the key generation parameters; wherein the second indication message is used to indicate the negotiation of the first key with the second device; receive a second response message sent by the second device, wherein the second response message is used to confirm the acquisition of the first key; send a first confirmation message of the second request message to the access network device; wherein the first confirmation message of the second request message is used to confirm that the first connection is securely established successfully.
  • the first confirmation information of the second request information is carried by a fourth RRC message.
  • the first communication unit is used to send a second indication message to the second device after the first processing unit generates the first key based on the key generation parameters; wherein the second indication message is used to indicate the negotiation of the first key with the second device; and receive a second response message sent by the second device; wherein the second response message is used to confirm that the first key is obtained, and the second response message is also used to confirm that the first connection is securely established successfully.
  • the second indication information also carries second confirmation information of the second request information; the second confirmation information of the second request information is used to confirm that the first connection with the second device is established.
  • the first communication unit is used to send second confirmation information of the second request information to the access network device before the first processing unit generates the first key based on the key generation parameters, the second confirmation information of the second request information is used to confirm the completion of establishing the first connection with the second device, and the first confirmation information of the second request information is carried by the fifth RRC message.
  • the key generation parameters include at least one of the following: relevant information of the second device, a random number, a count value related to the first connection, relevant information of the wireless bearer RB between the first device and the access network device, and a session identifier between the first device and the access network device.
  • the related information of the bearer between the first device and the access network device includes at least one of the following: an identifier of a data radio bearer DRB between the first device and the access network device; an identifier of a signaling radio bearer SRB between the first device and the access network device.
  • the first device is a remote terminal device; the second device is a relay terminal device.
  • FIG16 is a schematic diagram of the composition structure of a second device according to an embodiment of the present application, including:
  • the second communication unit 1601 is used to receive second information sent by the access network device, and the second information carries a first key; wherein the first key is used to perform security processing on data transmitted by the first connection; and the first connection is a connection between the first device and the second device.
  • the second communication unit is used to send first indication information after receiving second information sent by the access network device; wherein the first indication information is used to indicate negotiation of a first key with the first device; and receive first response information sent by the first device; wherein the first response information is used to confirm generation of the first key.
  • the second communication unit is used to send the first indication information to the first device.
  • the second information also carries first request information, where the first request information is used to request to establish the first connection;
  • the second communication unit is used to send confirmation information of the first request information to the first device when receiving the first response information sent by the first device; wherein the confirmation information of the first request information is used to confirm that the first connection is successfully established securely.
  • the second communication unit is used to perform one of the following: sending confirmation information of the second information to the access network device; wherein the confirmation information of the second information carries the first indication information; after sending the confirmation information of the second information to the access network device, sending the first indication information to the access network device; after sending the confirmation information of the second information to the access network device, sending the first indication information to the first device.
  • the second communication unit is used to receive second indication information sent by the first device; wherein the second indication information is used to indicate negotiation of the first key with the second device; and after receiving the second information sent by the access network device, send second response information to the first device, wherein the second response information is used to confirm obtaining the first key.
  • the second information also carries first request information, where the first request information is used to request to establish the first connection;
  • the second communication unit is used to send confirmation information of the first request information to the first device when sending second response information to the first device; wherein the confirmation information of the first request information is used to confirm that the first connection is successfully established securely.
  • the second information also carries first request information, where the first request information is used to request the establishment of the first connection; the second response information is also used to confirm that the first connection is successfully established securely.
  • the second communication unit is used to send key request information to the access network device when receiving second indication information sent by the first device; and receive second information sent by the access network device.
  • the second indication information also carries second confirmation information of the second request information; the second confirmation information of the second request information is used to confirm the completion of establishing the first connection; and the key request information carries the second confirmation information of the second request information.
  • the second information is carried by a sixth RRC message.
  • the first device is a remote terminal device; the second device is a relay terminal device.
  • FIG. 17 is a schematic diagram of a composition structure of an access network device according to an embodiment of the present application, including:
  • the third communication unit 1701 is used to send first information to the first device and send second information to the second device; wherein the first information carries key generation parameters, and the key generation parameters are used to generate a first key; the first key is used to perform security processing on data transmitted on the first connection; the first connection is a connection between the first device and the second device.
  • the third communication unit is used to send first information to the first device, and before sending second information to the second device, receive first request information sent by the first device; wherein the first request information is used to request to establish the first connection.
  • the first request information carries relevant information of the second device.
  • the access network device further includes:
  • the third processing unit 1702 is configured to generate the first key after the third communication unit receives the first request information sent by the first device;
  • the third communication unit 1701 is configured to send the second information to the second device when the third processing unit generates the first key.
  • the second information also carries the first request information.
  • the third communication unit is used to receive first indication information sent by the second device after sending the second information to the second device; wherein the first indication information is used to indicate negotiation of a first key with the first device.
  • the third communication unit is used to perform one of the following: receiving confirmation information of the second information sent by the second device, the confirmation information of the second information carrying the first indication information; after receiving the confirmation information of the second information sent by the second device, receiving the first indication information sent by the second device.
  • the third communication unit is configured to send first information to the first device upon receiving first indication information sent by the second device, wherein the first information carries the first indication information.
  • the third communication unit is configured to send the first indication information to the first device upon receiving the first indication information sent by the second device.
  • the first request information is carried by a first RRC message; and the first information is carried by a second RRC message.
  • the first information also carries second request information, where the second request information is used to request to establish the first connection.
  • the first information also carries relevant information of the second device.
  • the first information is carried by a third RRC message.
  • the third communication unit is used to receive first confirmation information of second request information sent by the first device; the first confirmation information of the second request information is used to confirm that the first connection is successfully established securely, and the first confirmation information of the second request information is carried by a fourth RRC message.
  • the third communication unit is configured to send first information to the first device; receive key request information sent by the second device; and send the second information to the second device.
  • the key request information carries second confirmation information of the second request information; the second confirmation information of the second request information is used to confirm that the first connection with the second device is established.
  • the third communication unit is used to receive the second confirmation information of the second request information sent by the first device before receiving the key request information sent by the second device, and the second confirmation information of the second request information is used to confirm the completion of establishing the first connection with the second device; the second confirmation information of the second request information is carried by the fifth RRC message.
  • the second information is carried by a sixth RRC message.
  • the access network device further includes: a third processing unit, configured to generate the first key before the third communication unit sends the second information to the second device.
  • the third processing unit is used to generate the first key based on the key generation parameter and the second key; wherein the second key is used to perform security processing on data transmitted on the second connection; the second connection is a connection between the first device and the access network device.
  • the key generation parameters include at least one of the following: relevant information of the second device, a random number, a count value related to the first connection, relevant information of the wireless bearer RB between the first device and the access network device, and a session identifier between the first device and the access network device.
  • the related information of the bearer between the first device and the access network device includes at least one of the following: an identifier of a data radio bearer DRB between the first device and the access network device; an identifier of a signaling radio bearer SRB between the first device and the access network device.
  • the first device is a remote terminal device; the second device is a relay terminal device.
  • Fig. 19 is a schematic structural diagram of a communication device 1900 according to an embodiment of the present application.
  • the communication device 1900 includes a processor 1910, and the processor 1910 can call and run a computer program from a memory to enable the communication device 1900 to implement the method in the embodiment of the present application.
  • the communication device 1900 may further include a memory 1920.
  • the processor 1910 may call and run a computer program from the memory 1920, so that the communication device 1900 implements the method in the embodiment of the present application.
  • the memory 1920 may be a separate device independent of the processor 1910 , or may be integrated into the processor 1910 .
  • the communication device 1900 may further include a transceiver 1930, and the processor 1910 may control the transceiver 1930 to communicate with other devices, specifically, may send information or data to other devices, or receive information or data sent by other devices.
  • the transceiver 1930 may include a transmitter and a receiver.
  • the transceiver 1930 may further include an antenna, and the number of antennas may be one or more.
  • the communication device 1900 may be the first device of the embodiment of the present application, and the communication device 1900 may implement the corresponding processes implemented by the first device in each method of the embodiment of the present application, which will not be repeated here for the sake of brevity.
  • the communication device 1900 may be the second device of the embodiment of the present application, and the communication device 1900 may implement the corresponding processes implemented by the second device in each method of the embodiment of the present application, which will not be described here for the sake of brevity.
  • the communication device 1900 may be an access network device of an embodiment of the present application, and the communication device 1900 may implement the corresponding processes implemented by the access network device in each method of the embodiment of the present application, which will not be repeated here for the sake of brevity.
  • Fig. 20 is a schematic structural diagram of a chip 2000 according to an embodiment of the present application.
  • the chip 2000 includes a processor 2010, and the processor 2010 can call and run a computer program from a memory to implement the method in the embodiment of the present application.
  • the chip 2000 may further include a memory 2020.
  • the processor 2010 may call and run a computer program from the memory 2020 to implement the method executed by the access network device or the first core network device in the embodiment of the present application.
  • the memory 2020 may be a separate device independent of the processor 2010 , or may be integrated into the processor 2010 .
  • the chip 2000 may further include an input interface 2030.
  • the processor 2010 may control the input interface 2030 to communicate with other devices or chips, and specifically, may obtain information or data sent by other devices or chips.
  • the chip 2000 may further include an output interface 2040.
  • the processor 2010 may control the output interface 2040 to communicate with other devices or chips, and specifically, may output information or data to other devices or chips.
  • the chip may be applied to the access network device in the embodiment of the present application, and the chip may implement the corresponding processes implemented by the access network device in each method of the embodiment of the present application.
  • the chip may be applied to the first device in the embodiment of the present application, and the chip may implement the corresponding processes implemented by the first device in each method of the embodiment of the present application.
  • the chip may be applied to the second device in the embodiment of the present application, and the chip may implement the corresponding processes implemented by the second device in each method of the embodiment of the present application.
  • the chips applied to the access network device, the first device, and the second device may be the same chip or different chips.
  • the chip mentioned in the embodiments of the present application can also be called a system-level chip, a system chip, a chip system or a system-on-chip chip, etc.
  • the processor mentioned above may be a general-purpose processor, a digital signal processor (DSP), a field programmable gate array (FPGA), an application specific integrated circuit (ASIC) or other programmable logic devices, transistor logic devices, discrete hardware components, etc.
  • DSP digital signal processor
  • FPGA field programmable gate array
  • ASIC application specific integrated circuit
  • the general-purpose processor mentioned above may be a microprocessor or any conventional processor, etc.
  • the memory mentioned above may be a volatile memory or a non-volatile memory, or may include both volatile and non-volatile memories.
  • the non-volatile memory may be a read-only memory (ROM), a programmable read-only memory (PROM), an erasable programmable read-only memory (EPROM), an electrically erasable programmable read-only memory (EEPROM), or a flash memory.
  • the volatile memory may be a random access memory (RAM).
  • the memory in the embodiment of the present application may also be static random access memory (static RAM, SRAM), dynamic random access memory (dynamic RAM, DRAM), synchronous dynamic random access memory (synchronous DRAM, SDRAM), double data rate synchronous dynamic random access memory (double data rate SDRAM, DDR SDRAM), enhanced synchronous dynamic random access memory (enhanced SDRAM, ESDRAM), synchronous link dynamic random access memory (synch link DRAM, SLDRAM) and direct memory bus random access memory (Direct Rambus RAM, DR RAM), etc. That is to say, the memory in the embodiment of the present application is intended to include but not limited to these and any other suitable types of memory.
  • FIG21 is a schematic block diagram of a communication system 2100 according to an embodiment of the present application.
  • the communication system 2100 includes an access network device 2110, a first device 2120, and a second device 2130.
  • the access network device 2110 can be used to implement the corresponding functions implemented by the access network device in the above method
  • the first device 2120 can be used to implement the corresponding functions implemented by the first device in the above method
  • the second device 2130 can be used to implement the corresponding functions implemented by the second device in the above method. For the sake of brevity, it will not be repeated here.
  • the computer program product includes one or more computer instructions.
  • the computer can be a general-purpose computer, a special-purpose computer, a computer network, or other programmable device.
  • the computer instructions can be stored in a computer-readable storage medium, or transmitted from one computer-readable storage medium to another computer-readable storage medium.
  • the computer instructions can be transmitted from a website site, computer, server or data center by wired (e.g., coaxial cable, optical fiber, digital subscriber line (Digital Subscriber Line, DSL)) or wireless (e.g., infrared, wireless, microwave, etc.) mode to another website site, computer, server or data center.
  • the computer-readable storage medium can be any available medium that a computer can access or a data storage device such as a server or data center that includes one or more available media integrated.
  • the available medium can be a magnetic medium (e.g., a floppy disk, a hard disk, a magnetic tape), an optical medium (e.g., a DVD), or a semiconductor medium (e.g., a solid state drive (SSD)), etc.
  • the size of the serial numbers of the above-mentioned processes does not mean the order of execution.
  • the execution order of each process should be determined by its function and internal logic, and should not constitute any limitation on the implementation process of the embodiments of the present application.

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

本申请涉及一种通信方法、设备、计算机可读存储介质、计算机程序产品以及计算机程序。其中方法包括:第一设备接收接入网设备发送的第一信息,其中,所述第一信息携带密钥生成参数;所述第一设备基于所述密钥生成参数,生成第一密钥;其中,所述第一密钥用于对第一连接传输的数据进行安全性处理;所述第一连接为第一设备与第二设备之间的连接。

Description

通信方法和设备 技术领域
本申请涉及通信领域,更具体地,涉及一种通信方法、设备、计算机可读存储介质、计算机程序产品以及计算机程序。
背景技术
在相关技术中,终端设备可能会需要通过其他终端设备与网络侧的接入网设备进行数据传输,这种场景中,作为中继功能的终端设备称为中继终端设备,通过中继与网络侧接入网设备进行连接的设备称为远端终端设备。然而,如何使得远端终端设备与中继终端设备能够高效建立安全的连接,就成为需要解决的问题。
发明内容
本申请实施例提供一种通信方法、设备、计算机可读存储介质、计算机程序产品以及计算机程序。
本申请实施例提供一种通信方法,包括:
第一设备接收接入网设备发送的第一信息,其中,所述第一信息携带密钥生成参数;
所述第一设备基于所述密钥生成参数,生成第一密钥;其中,所述第一密钥用于对第一连接传输的数据进行安全性处理;所述第一连接为第一设备与第二设备之间的连接。
本申请实施例提供一种通信方法,包括:
第二设备接收接入网设备发送的第二信息,所述第二信息携带第一密钥;其中,所述第一密钥用于对第一连接传输的数据进行安全性处理;所述第一连接为第一设备与第二设备之间的连接。
本申请实施例提供一种通信方法,包括:
接入网设备向第一设备发送第一信息,以及所述接入网设备向第二设备发送第二信息;其中,所述第一信息携带密钥生成参数,所述密钥生成参数用于生成第一密钥;所述第一密钥用于对第一连接上传输的数据进行安全性处理;所述第一连接为第一设备与第二设备之间的连接。
本申请实施例提供一种第一设备,包括:
第一通信单元,用于接收接入网设备发送的第一信息,其中,所述第一信息携带密钥生成参数;
第一处理单元,用于基于所述密钥生成参数,生成第一密钥;其中,所述第一密钥用于对第一连接传输的数据进行安全性处理;所述第一连接为所述第一设备与第二设备之间的连接。
本申请实施例提供一种第二设备,包括:
第二通信单元,用于接收接入网设备发送的第二信息,所述第二信息携带第一密钥;其中,所述第一密钥用于对第一连接传输的数据进行安全性处理;所述第一连接为第一设备与第二设备之间的连接。
本申请实施例提供一种接入网设备,包括:
第三通信单元,用于向第一设备发送第一信息,以及向第二设备发送第二信息;其中,所述第一信息携带密钥生成参数,所述密钥生成参数用于生成第一密钥;所述第一密钥用于对第一连接上传输的数据进行安全性处理;所述第一连接为第一设备与第二设备之间的连接。
本申请实施例提供一种第一设备,包括处理器和存储器。该存储器用于存储计算机程序,该处理器用于调用并运行该存储器中存储的计算机程序,以使该第一设备执行上述方法。
本申请实施例提供一种第二设备,包括处理器和存储器。该存储器用于存储计算机程序,该处理器用于调用并运行该存储器中存储的计算机程序,以使该第二设备执行上述方法。
本申请实施例提供一种接入网设备,包括处理器和存储器。该存储器用于存储计算机程序,该处理器用于调用并运行该存储器中存储的计算机程序,以使该接入网设备执行上述方法。
本申请实施例提供一种芯片,用于实现上述方法。
具体地,该芯片包括:处理器,用于从存储器中调用并运行计算机程序,使得安装有该芯片的设备执行上述的方法。
本申请实施例提供一种计算机可读存储介质,用于存储计算机程序,当该计算机程序被设备运行时使得该设备执行上述方法。
本申请实施例提供一种计算机程序产品,包括计算机程序指令,该计算机程序指令使得计算机执行上述方法。
本申请实施例提供一种计算机程序,当其在计算机上运行时,使得计算机执行上述方法。
通过采用上述方案,第一设备可以直接从接入网设备得到密钥生成参数进而生成第一密钥,以对第一设备和第二设备的连接上所传输的数据进行安全性处理。如此,避免了与核心网设备进行大量信令交互才能得到密钥,所带来的处理效率较低的问题,本申请提供的方案可以使得第一设备直接与接入网设备进行交互以得到第一密钥,从而提升生成第一密钥的处理效率,进而可以保证高效的建立安全的第一设备与第二设备之间的连接。
附图说明
图1是根据本申请实施例的应用场景的示意图。
图2是根据本申请实施例的MP分离承载的系统架构图。
图3是5G双链接架构组成示意图。
图4是根据本申请一实施例的通信方法的示意性流程图。
图5是根据本申请另一实施例的通信方法的示意性流程图。
图6是根据本申请又一实施例中通信方法的示例性流程图。
图7~图13是根据本申请实施例中远端UE和中继UE的处理流程的多种示例性流程图。
图14是相关技术中远端UE和中继UE得到密钥的示例性处理流程图。
图15是根据本申请的一实施例的第一设备的示意性框图。
图16是根据本申请的一实施例的第二设备的示意性框图。
图17是根据本申请的一实施例的接入网设备的示意性框图。
图18是根据本申请的另一实施例的接入网设备的示意性框图。
图19是根据本申请实施例的通信设备示意性框图。
图20是根据本申请实施例的芯片的示意性框图。
图21是根据本申请实施例的通信系统的示意性框图。
具体实施方式
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行描述。
本申请实施例的技术方案可以应用于各种通信系统,例如:全球移动通讯(Global System of Mobile communication,GSM)系统、码分多址(Code Division Multiple Access,CDMA)系统、宽带码分多址(Wideband Code Division Multiple Access,WCDMA)系统、通用分组无线业务(General Packet Radio Service,GPRS)、长期演进(Long Term Evolution,LTE)系统、先进的长期演进(Advanced long term evolution,LTE-A)系统、新无线(New Radio,NR)系统、NR系统的演进系统、非授权频谱上的LTE(LTE-based access to unlicensed spectrum,LTE-U)系统、非授权频谱上的NR(NR-based access to unlicensed spectrum,NR-U)系统、非地面通信网络(Non-Terrestrial Networks,NTN)系统、通用移动通信系统(Universal Mobile Telecommunication System,UMTS)、无线局域网(Wireless Local Area Networks,WLAN)、无线保真(Wireless Fidelity,WiFi)、第五代通信(5th-Generation,5G)系统或其他通信系统等。
通常来说,传统的通信系统支持的连接数有限,也易于实现,然而,随着通信技术的发展,移动通信系统将不仅支持传统的通信,还将支持例如,设备到设备(Device to Device,D2D)通信,机器到机器(Machine to Machine,M2M)通信,机器类型通信(Machine Type Communication,MTC),车辆间(Vehicle to Vehicle,V2V)通信,或车联网(Vehicle to everything,V2X)通信等,本申请实施例也可以应用于这些通信系统。
在一种可能的实现方式中,本申请实施例中的通信系统可以应用于载波聚合(Carrier Aggregation,CA)场景,也可以应用于双连接(Dual Connectivity,DC)场景,还可以应用于独立(Standalone,SA)布网场景。
在一种可能的实现方式中,本申请实施例中的通信系统可以应用于非授权频谱,其中,非授权频谱也可以认为是共享频谱;或者,本申请实施例中的通信系统也可以应用于授权频谱,其中,授权频谱也可以认为是非共享频谱。
本申请实施例结合网络设备和终端设备描述了各个实施例,其中,终端设备也可以称为用户设备(User Equipment,UE)、接入终端、用户单元、用户站、移动站、移动台、远方站、远程终端、移动设备、用户终端、终端、无线通信设备、用户代理或用户装置等。
终端设备可以是WLAN中的站点(STAION,ST),可以是蜂窝电话、无绳电话、会话启动协议(Session Initiation Protocol,SIP)电话、无线本地环路(Wireless Local Loop,WLL)站、个人数字处理(Personal Digital Assistant,PDA)设备、具有无线通信功能的手持设备、计算设备或连接到无线调制解调器的其它处理设备、车载设备、可穿戴设备、下一代通信系统例如NR网络中的终端设备,或者未来演进的公共陆地移动网络(Public Land Mobile Network,PLMN)网络中的终端设备等。
在本申请实施例中,终端设备可以部署在陆地上,包括室内或室外、手持、穿戴或车载;也可以部署在水面上(如轮船等);还可以部署在空中(例如飞机、气球和卫星上等)。
在本申请实施例中,终端设备可以是手机(Mobile Phone)、平板电脑(Pad)、带无线收发功能的电脑、虚拟现实(Virtual Reality,VR)终端设备、增强现实(Augmented Reality,AR)终端设备、工业控制(industrial control)中的无线终端设备、无人驾驶(self driving)中的无线终端设备、远程医疗 (remote medical)中的无线终端设备、智能电网(smart grid)中的无线终端设备、运输安全(transportation safety)中的无线终端设备、智慧城市(smart city)中的无线终端设备或智慧家庭(smart home)中的无线终端设备等。
作为示例而非限定,在本申请实施例中,该终端设备还可以是可穿戴设备。可穿戴设备也可以称为穿戴式智能设备,是应用穿戴式技术对日常穿戴进行智能化设计、开发出可以穿戴的设备的总称,如眼镜、手套、手表、服饰及鞋等。可穿戴设备即直接穿在身上,或是整合到用户的衣服或配件的一种便携式设备。可穿戴设备不仅仅是一种硬件设备,更是通过软件支持以及数据交互、云端交互来实现强大的功能。广义穿戴式智能设备包括功能全、尺寸大、可不依赖智能手机实现完整或者部分的功能,例如:智能手表或智能眼镜等,以及只专注于某一类应用功能,需要和其它设备如智能手机配合使用,如各类进行体征监测的智能手环、智能首饰等。
在本申请实施例中,网络设备可以是用于与移动设备通信的设备,网络设备可以是WLAN中的接入点(Access Point,AP),GSM或CDMA中的基站(Base Transceiver Station,BTS),也可以是WCDMA中的基站(NodeB,NB),还可以是LTE中的演进型基站(Evolutional Node B,eNB或eNodeB),或者中继站或接入点,或者车载设备、可穿戴设备以及NR网络中的网络设备(gNB)或者未来演进的PLMN网络中的网络设备或者NTN网络中的网络设备等。
作为示例而非限定,在本申请实施例中,网络设备可以具有移动特性,例如网络设备可以为移动的设备。可选地,网络设备可以为卫星、气球站。例如,卫星可以为低地球轨道(low earth orbit,LEO)卫星、中地球轨道(medium earth orbit,MEO)卫星、地球同步轨道(geostationary earth orbit,GEO)卫星、高椭圆轨道(High Elliptical Orbit,HEO)卫星等。可选地,网络设备还可以为设置在陆地、水域等位置的基站。
在本申请实施例中,网络设备可以为小区提供服务,终端设备通过该小区使用的传输资源(例如,频域资源,或者说,频谱资源)与网络设备进行通信,该小区可以是网络设备(例如基站)对应的小区,小区可以属于宏基站,也可以属于小小区(Small cell)对应的基站,这里的小小区可以包括:城市小区(Metro cell)、微小区(Micro cell)、微微小区(Pico cell)、毫微微小区(Femto cell)等,这些小小区具有覆盖范围小、发射功率低的特点,适用于提供高速率的数据传输服务。
图1示例性地示出了一种通信系统100。该通信系统包括一个网络设备110和两个终端设备120。在一种可能的实现方式中,该通信系统100可以包括多个网络设备110,并且每个网络设备110的覆盖范围内可以包括其它数量的终端设备120,本申请实施例对此不做限定。
在一种可能的实现方式中,该通信系统100还可以包括移动性管理实体(Mobility Management Entity,MME)、接入与移动性管理功能(Access and Mobility Management Function,AMF)等其他网络实体,本申请实施例对此不作限定。
其中,网络设备又可以包括接入网设备和核心网设备。即无线通信系统还包括用于与接入网设备进行通信的多个核心网。接入网设备可以是长期演进(long-term evolution,LTE)系统、下一代(移动通信系统)(next radio,NR)系统或者授权辅助接入长期演进(authorized auxiliary access long-term evolution,LAA-LTE)系统中的演进型基站(evolutional node B,简称可以为eNB或e-NodeB)宏基站、微基站(也称为“小基站”)、微微基站、接入站点(access point,AP)、传输站点(transmission point,TP)或新一代基站(new generation Node B,gNodeB)等。
应理解,本申请实施例中网络/系统中具有通信功能的设备可称为通信设备。以图1示出的通信系统为例,通信设备可包括具有通信功能的网络设备和终端设备,网络设备和终端设备可以为本申请实施例中的具体设备,此处不再赘述;通信设备还可包括通信系统中的其他设备,例如网络控制器、移动管理实体等其他网络实体,本申请实施例中对此不做限定。
为了便于理解本申请实施例,下面对本申请实施例所涉及到的基本流程以及基本概念进行简单说明。应理解,下文所介绍的基本流程以及基本概念并不对本申请实施例产生限定。
UE到网络中继(U2N Relay)的多路径(MP,multi-path)技术指的是:UE和基站(比如gNB)之间支持MP承载,也就是UE使用一条直接路径和一条间接路径连接到同一个gNB。与单链路相比,在MP技术中远程UE(或称为远端UE,Remote UE)可以提供增强的用户数据吞吐量和可靠性,gNB可以将拥塞的远程UE(或称为远端UE)的直接连接卸载到通过中继UE的间接连接;其中,中继UE和远程UE(或称为远端UE)可以在不同小区,该不同小区可以是同频的不同小区或异频的不同小区。通过采用MP技术可以提供直接路径(或称为直接连接)和间接路径(或称为间接连接)之间的高效路径切换。需要指出,在下文中如无特殊说明,远程UE与远端UE含义相同,直接路径与直接连接含义相同,间接路径与间接连接含义相同,在下文中不再进行赘述。
UE(即远端UE)和gNB之间支持直接承载(承载映射到Uu上的直接路径)、间接承载(承载通 过中继UE映射到间接路径)和MP拆分承载(承载映射到上述两条路径)。
MP可以有场景1和场景2为;其中,场景1指的是UE和gNB之间通过Layer-2(层2)UE-to-Network(网络)relay(中继)连接;场景2指的是通过另一个UE连接。本申请下文主要针对前述场景1进行说明,但下文的说明同样可以适用于前述场景2。
对于场景1的MP分离承载,远端UE的一个PDCP(Packet Data Convergence Protocol,分组数据汇聚协议)实体配置一个直接Uu RLC(Radio Link Control,无线链路层控制协议)信道和一个间接PC5RLC信道。结合图2进行说明,远端UE进行上行传输时,远端UE的PDCP实体向远端UE的Uu RLC实体和具有SRAP(Sidelink Relay Adaptation Protocol,侧行链路中继适配协议)实体的PC5RLC实体传输数据。远端UE进行下行数据接收时,远端UE的PDCP实体从远端UE的Uu RLC实体和带有SRAP实体的PC5RLC实体接收。在图2中还可以看出,gNB进行上行数据接收时,gNB的PDCP实体从gNB的Uu RLC实体和具有Uu SRAP实体的RLC实体接收数据。gNB进行下行传输时,gNB的PDCP实体向gNB的Uu RLC实体和Uu SRAP实体的RLC进行传输。相应的,中继UE与远端UE连接是通过PC5SRAP实体,以及PC5SRAP实体关联的RLC、MAC(介质访问控制,Medium Access Control)、PHY(Physical,物理)层进行数据传输;中继UE与gNB的连接是通过Uu SRAP实体,以及该Uu SRAP实体关联的RLC、MAC和PHY实体进行数据传输。
结合图3对5G双链接架构进行说明,双链接(dual connectivity)是指两个基站同时为UE提供链接;其中,两个基站分别为MN(master node,主节点)和SN(slave node,辅节点)。在图3中可以看出,MN和SN分别与UE通过SRB(signalling radio bearer,信令无线承载)和DRB(Data Radio Bearer,数据无线承载)进行传输;在MN和SN中均具备SRB和DRB分别对应的协议层;其中,SRB在MN或SN对应的协议层包括如图3中所示的RRC、PDCP、RLC、MAC、RHY;DRB在MN或SN对应的协议层包括SDAP(Service Data Adaptation Protocol,服务数据适配协议)、PDCP、RLC、MAC、PHY。进一步地,MN和SN之间通过Xn接口互联,如图3所示,SN和MN之间的Xn接口包括了Xn控制平面(Xn-C)接口以及Xn用户平面(Xn-U)接口。5G双链接技术的安全机制是:当MN为MN和UE之间共享的现存的AS(Access Stratum,接入层)安全上下文第一次建立SN和UE之间的安全上下文时,MN为SN生成密钥(KSN)并通过Xn-C接口将其发送给SN;其中,密钥的生成方式可以是MN将SN Counter的值可以用作KSN派生的输入与当前AS安全上下文相关联以得到密钥。当MN需要生成新的KSN时,MN通过RRC信令路径将SN Counter的值发送给UE。并且前述KSN还用于派生UE和SN之间的RRC密钥和UP(用户面)密钥。
应理解,本文中术语“系统”和“网络”在本文中常被可互换使用。本文中术语“和/或”,仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。另外,本文中字符“/”,一般表示前后关联对象是一种“或”的关系。
应理解,在本申请的实施例中提到的“指示”可以是直接指示,也可以是间接指示,还可以是表示具有关联关系。举例说明,A指示B,可以表示A直接指示B,例如B可以通过A获取;也可以表示A间接指示B,例如A指示C,B可以通过C获取;还可以表示A和B之间具有关联关系。
在本申请实施例的描述中,术语“对应”可表示两者之间具有直接对应或间接对应的关系,也可以表示两者之间具有关联关系,也可以是指示与被指示、配置与被配置等关系。
为便于理解本申请实施例的技术方案,以下对本申请实施例的相关技术进行说明,以下相关技术作为可选方案与本申请实施例的技术方案可以进行任意结合,其均属于本申请实施例的保护范围。
图4是根据本申请一实施例的通信方法的示意性流程图。该方法包括以下内容的至少部分内容。
S410、第一设备接收接入网设备发送的第一信息,其中,所述第一信息携带密钥生成参数;
S420、所述第一设备基于所述密钥生成参数,生成第一密钥;其中,所述第一密钥用于对第一连接传输的数据进行安全性处理;所述第一连接为所述第一设备与第二设备之间的连接。
图5是根据本申请另一实施例的通信方法的示意性流程图。该方法包括以下内容的至少部分内容。
S510、第二设备接收接入网设备发送的第二信息,所述第二信息携带第一密钥;其中,所述第一密钥用于对第一连接传输的数据进行安全性处理;所述第一连接为所述第一设备与第二设备之间的连接。
图6是根据本申请另一实施例的通信方法的示意性流程图。该方法包括以下内容的至少部分内容。
S610、接入网设备向第一设备发送第一信息,以及所述接入网设备向第二设备发送第二信息;其中,所述第一信息携带密钥生成参数,所述密钥生成参数用于生成第一密钥;所述第一密钥用于对第一连接上传输的数据进行安全性处理;所述第一连接为所述第一设备与所述第二设备之间的连接。
这里,所述第一设备为远端终端设备;所述第二设备为中继终端设备。该接入网设备可以为基站、gNB、eNB等等任意一种。
所述对第一连接上传输的数据进行安全性处理指的是:对第一连接上传输的数据进行完整性保护、 加密等安全性处理。也就是说,本实施例提供的方案,可以由接入网设备为第一设备发送密钥生成参数使得第一设备生成第一密钥,该接入网设备还可以为第二设备直接发送第一密钥,从而使得第一设备和第二设备之间能够基于第一密钥成功建立安全的第一连接。
在一些可能的实施方式中,由第一设备触发建立前述第一连接。
所述第一设备接收接入网设备发送的第一信息之前,所述方法还包括:所述第一设备向所述接入网设备发送第一请求信息;其中,所述第一请求信息用于请求建立所述第一连接。
所述接入网设备向第一设备发送第一信息,以及所述接入网设备向第二设备发送第二信息之前,所述方法还包括:所述接入网设备接收所述第一设备发送的第一请求信息;其中,所述第一请求信息用于请求建立所述第一连接。
该第一设备可以先决策是否发送第一请求信息,可以包括:所述第一设备基于当前状态确定需要建立第一连接的情况下,发送所述第一请求信息。比如,第一设备在当前状态为第一设备的数据传输量高于预设门限值,或者可以是第一设备与接入网设备之间的下行信号强度小于第一强度门限值的情况下,确定需要建立所述第一连接。其中,所述预设门限值可以根据实际情况设置,不对其进行限定;所述第一强度门限值也可以根据实际情况设置,不进行限定;所述下行信号强度可以是采用以下内容来衡量:RSRP(Reference Signal Receiving Power,参考信号接收功率)测量结果和/或RSRQ(Reference Signal Receiving Quality,参考信号接收强度)测量结果等等。应理解,这里仅为示例性说明,实际处理中,第一设备还可以采用其他方式来确定是否发送第一请求信息,只是这里不做穷举。
示例性的,前述第一请求信息可以称为第一DCR(Direct Communication Request,直接通信请求)。或者,该第一请求信息还可以称为第一MP触发信息。
可选地,前述第一请求信息中可以携带所述第二设备的相关信息。其中,所述第二设备的相关信息,具体可以为第二设备的标识信息。该第二设备的标识信息可以是该第二设备的唯一标识,比如,该第二设备的标识信息可以为以下任意之一:该第二设备的临时移动用户识别码(TMSI,Temporary Mobile Subscriber Identity)、该第二设备的国际移动用户识别码(IMSI,International Mobile Subscriber Identity)、该第二设备的I-RNTI(Inactive Radio Network Temporary Identifier,非激活无线网络临时标识)。应理解,这里仅为示例性说明,该第二设备的标识信息还可以使用其他ID(identity,身份识别码)来表示,这里不做穷举。
若在第一请求信息中携带所述第二设备的相关信息,则该第一设备需要在发送所述第一请求信息之前先选取或发现该第二设备。示例性的,该第一设备选取或发现该第二设备的方式可以包括:Model A(模式A)发现流程或者model B发现流程两种方式。其中,Model A发现流程可以是:第一设备接收多个候选设备发送的announcement(公告)消息,announcement消息主动广播该多个候选设备可以提供中继服务的RSC(中继服务码,Relay service code);第一设备可以根据接收到的多个候选设备的announcement消息中包含的RSC来选取合适的设备作为第二设备。model B发现流程可以是:第一设备发送Solicitation(请求)消息,该Solicitation(请求)消息中包含所述第一设备自身需要的RSC;如果该第一设备周围有可以支持RSC的候选设备,则候选设备向第一设备发送response(响应)消息;该第一设备可以从发送response(响应)消息的候选设备中选取合适的设备作为第二设备。
所述接入网设备在接收到前述第一请求信息之后,会分别向第一设备发送第一信息以及向第二设备发送第二信息。
所述接入网设备在接收到所述第一设备发送的第一请求信息之后,所述方法还包括:所述接入网设备生成所述第一密钥。所述接入网设备向第二设备发送第二信息,包括:所述接入网设备在生成所述第一密钥的情况下,向所述第二设备发送所述第二信息。相应的,所述第二设备可以接收所述接入网设备发送的所述第二信息。
具体来说,所述接入网设备生成所述第一密钥可以包括:所述接入网设备基于密钥生成参数以及第二密钥,生成所述第一密钥;其中,所述第二密钥用于对第二连接上传输的数据进行安全性处理;所述第二连接为所述第一设备与接入网设备之间的连接。
其中,所述密钥生成参数,包括以下至少之一:所述第二设备的相关信息、第一随机数、与所述第一连接相关的计数值、所述第一设备与所述接入网设备之间的无线承载(RB,Radio Bearer)的相关信息、所述第一设备与所述接入网设备之间的会话标识符。
该第二设备的相关信息与前述实施例的说明相同,不做赘述。
所述第一随机数可以为接入网设备产生的第一随机数,该第一随机数的产生方式本实施例不做限定。
所述与第一连接相关的计数值,可以包括以下至少之一:接入网设备与该第一设备之间建立第一连接的次数、建立该第一连接所发送的RRC消息的次数、接入网设备生成密钥的次数、发起SMC的次数等等。这里不对该与第一连接相关的计数值的全部可能的类型进行穷举,只要是与第一连接可能相关 的各种计数值都可以在本实施例的保护范围内。
所述第一设备与所述接入网设备之间的会话标识符,可以指的是所述第一设备与所述接入网设备之间的PDU(Protocol Data Unit,协议数据单元)Session(会话)ID。
所述第一设备与所述接入网设备之间的承载的相关信息,可以包括以下至少之一:所述第一设备与所述接入网设备之间的DRB的标识;所述第一设备与所述接入网设备之间的SRB的标识。
示例性的,基于密钥生成参数以及第二密钥,生成所述第一密钥,可以是:采用预设密钥算法对密钥生成参数以及第二密钥进行计算,得到所述第一密钥。该预设密钥算法可以为KDF(密码衍生算法,Key Derivation Function),或者还可以采用其他密钥算法,这里不做穷举。举例来说,前述基于密钥生成参数以及第二密钥,生成所述第一密钥,可以采用以下公式来表示:
K NR_Pro_MP=KDF(K gNB,parameter);其中,K NR_Pro_MP表示第一密钥,K gNB表示第二密钥,parameter表示密钥生成参数,KDF()表示采用KDF算法。
前述接入网设备向第一设备发送第一信息的时间,只要在该接入网设备接收到第一请求信息之后就在本实施例的保护范围内。
可选地,接入网设备向第一设备发送第一信息可以包括:接入网设备在接收到该第一设备发送的第一请求信息之后、且在生成第一密钥之前,该接入网设备向第一设备发送第一信息。
可选地,接入网设备向第一设备发送第一信息可以包括:接入网设备在接收到该第一设备发送的第一请求信息之后、且在生成第一密钥之后,向第一设备发送第一信息。
可选地,接入网设备向第一设备发送第一信息可以包括:接入网设备生成第一密钥的同时向第一设备发送第一信息。
可选地,所述接入网设备向第一设备发送第一信息,包括:所述接入网设备在接收到所述第二设备发送的第二信息的确认信息的情况下,所述接入网设备向所述第一设备发送所述第一信息。也就是,接入网设备在接收到该第一设备发送的第一请求信息之后、生成第一密钥且向第二设备发送第二信息之后,在接收到第二设备发送的第二信息的确认信息的情况下,该接入网设备向第一设备发送第一信息。
所述第一设备向接入网设备发送该第一请求信息时,该第一请求信息可以由第一RRC消息携带。这里,所述第一RRC消息可以包括以下之一:第一RRC连接建立消息、第一RRC连接重建消息、第一RRC连接恢复消息、第一RRC连接重配置(reconfiguration)消息。在一种优选的示例中,该第一RRC消息为第一RRC连接重配置消息。
前述第一信息可以由第二RRC消息携带。该第二RRC消息可以是第一RRC消息对应的RRC完成消息。比如,该第二RRC消息可以可以包括以下之一:第一RRC连接建立完成消息、第一RRC连接重建完成消息、第一RRC连接恢复完成消息、第一RRC连接重配置(reconfiguration)完成消息。在一种优选的示例中,该第二RRC消息为第一RRC连接重配置完成消息。
所述第一设备接收到所述第一信息之后,可以基于所述密钥生成参数,生成第一密钥。其中,所述第一设备基于所述密钥生成参数,生成第一密钥,包括:所述第一设备基于所述密钥生成参数以及第二密钥,生成所述第一密钥;其中,所述第二密钥用于对第二连接上传输的数据进行安全性处理;所述第二连接为所述第一设备与接入网设备之间的连接。关于第一设备基于所述密钥生成参数以及第二密钥生成所述第一密钥的处理方式,与前述接入网设备生成第一密钥的处理方式相同,因此不做重复说明。
需要指出的是,在第一设备向接入网设备发送第一请求信息之后、该第一设备接收到接入网设备发来的第一信息之前,第一设备的处理还可以包括:第一设备与第二设备建立侧行链路连接。关于第一设备与第二设备建立侧行链路连接的方式,本实施例不做限定。
前述接入网设备向第二设备发送第二信息的时间,为接入网设备生成第一密钥之后。再具体的,所述接入网设备在生成所述第一密钥的情况下,向所述第二设备发送所述第二信息可以包括:所述接入网设备在生成第一密钥、且该接入网设备与所述第二设备建立Uu接口的安全连接的情况下,所述接入网设备向所述第二设备发送所述第二信息。其中,接入网设备生成第一密钥的处理、以及该接入网设备与所述第二设备建立Uu接口的安全连接的处理,可以不分先后顺序,本实施例不对其进行限定。另外,关于该接入网设备与所述第二设备建立Uu接口的安全连接的处理方式,本实施例也不进行限定。
其中,所述第二信息还可以携带所述第一请求信息,所述第一请求信息用于请求建立所述第一连接。也就是接入网设备可以将第一设备发来的第一请求信息转发至第二设备。
需要指出的是,在第二设备接收到所述接入网设备发送的第二信息的情况下,该第二设备还可以向所述接入网设备发送所述第二信息的确认信息,该第二信息的确认信息可以用于确认接收到第一密钥。
该第二信息可以由第六RRC消息携带。该第六RRC消息可以可以包括以下之一:第六RRC连接建立消息、第六RRC连接重建消息、第六RRC连接恢复消息、第六RRC连接重配置(reconfiguration) 消息。在一种优选的示例中,该第六RRC消息为第六RRC连接重配置消息。
该第二信息的确认信息可以用于确认第二设备接收到第一密钥。该第二信息的确认信息可以由第七RRC消息携带。该第七RRC消息可以是第六RRC消息的响应消息,比如,该第七RRC消息可以可以包括以下之一:第六RRC连接建立完成消息、第六RRC连接重建完成消息、第六RRC连接恢复完成消息、第六RRC连接重配置完成消息。在一种优选的示例中,该第七RRC消息为第六RRC连接重配置完成消息。
基于前述处理,第一设备和第二设备均可以得到第一密钥。进一步地,该第一设备与第二设备之间还需要执行空口加密和完整性保护的确认流程。
在一些可能的实施方式中,由第一设备触发建立前述第一连接的场景下,可以由第二设备发起执行加密和完整性保护的确认流程。
该第二设备发起执行加密和完整性保护的确认流程的时机,为所述第二设备接收接入网设备发送的第二信息之后。在第二设备侧执行的处理可以包括:
所述第二设备接收接入网设备发送的第二信息之后,所述方法还包括:所述第二设备发送第一指示信息;所述第一指示信息用于指示与第一设备协商第一密钥;所述第二设备接收所述第一设备发送的第一响应信息;所述第一响应信息用于确认生成所述第一密钥。
进一步地,前述第二信息还携带第一请求信息,所述第一请求信息用于请求建立所述第一连接。相应的,所述方法还可以包括:所述第二设备在接收到所述第一设备发送的第一响应信息的情况下,所述第二设备向所述第一设备发送第一请求信息的确认信息;所述第一请求信息的确认信息用于确认所述第一连接安全建立成功。
该第一指示信息可以携带第一密钥的标识信息,该第一密钥的标识信息具体指的是第一密钥的ID。也就是第二设备接收到接入网设备发送的第二信息所携带的第一密钥后,将该第一密钥的ID携带在第一指示信息中发送至第一设备。还需要指出的是,该第一指示信息还用于指示与第一设备协商其他安全参数;示例性的,该第一指示信息还可以携带所述其他安全参数的相关信息,比如可以包括以下至少之一:所述第二设备的相关信息、第一随机数、与所述第一连接相关的计数值、所述第一设备与所述接入网设备之间的无线承载RB的相关信息、所述第一设备与所述接入网设备之间的会话标识符等等,这里不做穷举。前述第一指示信息可以是第一SMC(安全模式命令,Security Mode Command)。
该第一响应信息用于确认生成第一密钥。该第一响应信息可以用于确认其他安全参数与第二设备相同,关于安全参数的说明与前述实施例相同,不做赘述。前述第一响应信息可以是第一SMC响应(Response)。示例性的,第一设备在生成第一密钥后,若其生成的第一密钥的ID与第一指示信息中携带的第一密钥的ID相同,则第一设备可以向第二设备发送第一响应信息。
关于第一请求信息的说明与前述实施例相同,不做赘述。
所述第一请求信息的确认信息用于确认所述第一连接安全建立成功,具体可以指的是,确认第一设备与第二设备之间完成(或成功)建立PC5接口的安全连接。
其中,所述第二设备发送第一指示信息,可以包括以下之一:
所述第二设备向接入网设备发送所述第二信息的确认信息;其中,所述第二信息的确认信息携带所述第一指示信息;
所述第二设备在向所述接入网设备发送所述第二信息的确认信息之后,所述第二设备向所述接入网设备发送所述第一指示信息;
所述第二设备在向所述接入网设备发送所述第二信息的确认信息之后,所述第二设备向所述第一设备发送所述第一指示信息。
也就是第二设备发送该第一指示信息的时机,只要在接收到接入网设备发来的第二信息之后,就在本实施例的保护范围内。该第一指示信息可以是由第二信息的确认信息携带的,也可以是单独发送的。
在接入网设备侧执行的处理可以包括:
所述接入网设备向第二设备发送第二信息之后,所述方法还包括:所述接入网设备接收所述第二设备发送的第一指示信息;其中,所述第一指示信息用于指示与第一设备协商第一密钥。
所述接入网设备接收所述第二设备发送的第一指示信息,包括以下之一:所述接入网设备接收所述第二设备发送的第二信息的确认信息,所述第二信息的确认信息携带所述第一指示信息;所述接入网设备接收所述第二设备发送的第二信息的确认信息之后,接收所述第二设备发送的所述第一指示信息。
所述接入网设备向第一设备发送第一指示信息的方式,可以包括:所述接入网设备在接收到所述第二设备发送的第一指示信息的情况下,所述接入网设备向所述第一设备发送所述第一指示信息。
或者,该接入网设备可以将第一指示信息携带在第一信息中发送。具体的,所述接入网设备向所述第一设备发送第一信息,包括:所述接入网设备在接收到所述第二设备发送的第一指示信息的情况下, 所述接入网设备向所述第一设备发送第一信息,所述第一信息携带所述第一指示信息。
也就是该接入网设备可以是在向接收到第二设备发来的第一指示信息的情况下,才会向第一设备发送第一信息,并在该第一信息中携带第一指示信息。或者,接入网设备向第一设备发送第一信息的时间与发送第一指示信息的时间不同,即采用两条信息分别发送;这种情况的一种优选的示例中,该接入网设备只要接收到第一请求信息,就向第一设备发送第一信息;等待接收到第二设备发送的第一指示信息的时候,再次向第一设备发送第一指示信息。
该第一设备发送第一指示信息所对应的第一响应信息的时间,需要在第一设备生成第一密钥之后。该第一设备可以执行的处理可以包括:
该第一设备接收第一指示信息的方式,可以包括以下之一:
所述第一设备接收所述第二设备发送的第一指示信息;所述第一指示信息用于指示与第一设备协商第一密钥;
所述第一设备接收所述接入网设备发送的第一指示信息。
或者,所述第一信息还携带第一指示信息;所述第一指示信息用于指示与第一设备协商第一密钥。也就是该第一设备可以从第一信息中得到第一指示信息。
所述第一设备基于所述密钥生成参数,生成第一密钥之后,所述方法还包括:所述第一设备向第二设备发送第一响应信息;所述第一响应信息用于确认生成第一密钥;所述第一设备接收所述第二设备发送的第一请求信息的确认信息;所述第一请求信息的确认信息用于确认所述第一连接安全建立成功。
接下来对前述实施方式中第一设备触发建立第一连接,第二设备发送第一指示信息的处理进行详细说明:
在一种实施例中,该第二设备在第二信息的确认信息中携带第一指示信息,并且第一信息中携带该第一指示信息。具体的:
第一设备的处理可以包括:所述第一设备向所述接入网设备发送第一请求信息;第一设备接收所述接入网设备发送的第一信息,所述第一信息携带第一指示信息以及密钥生成参数;第一设备基于密钥生成参数以及第二密钥,生成第一密钥;第一设备向第二设备发送第一响应信息;第一设备接收第二设备发送的第一请求信息的确认信息。
接入网设备的处理可以包括:所述接入网设备接收第一设备发送的第一请求信息;所述接入网设备生成第一密钥;所述接入网设备在生成所述第一密钥的情况下,向所述第二设备发送所述第二信息,该第二信息携带第一密钥以及所述第一请求信息;所述接入网设备接收所述第二设备发送的第二信息的确认信息,所述第二信息的确认信息携带所述第一指示信息;所述接入网设备在接收到所述第二设备发送的第一指示信息的情况下,所述接入网设备向所述第一设备发送第一信息,所述第一信息携带所述第一指示信息。
第二设备的处理可以包括:所述第二设备接收接入网设备发送的第二信息,该第二信息携带第一密钥以及所述第一请求信息;所述第二设备向接入网设备发送所述第二信息的确认信息,所述第二信息的确认信息携带所述第一指示信息;所述第二设备接收第一设备发送的第一响应信息,所述第一响应信息用于确认生成所述第一密钥;所述第二设备向所述第一设备发送第一请求信息的确认信息,所述第一请求信息的确认信息用于确认所述第一连接安全建立成功。
前述该第一请求信息、第一信息、第二信息、第二信息的确认信息、第一指示信息、第一响应信息以及第一请求信息的确认信息的相关说明与前述实施例均为相同的,不做重复说明。
结合图7,以第一设备为远端UE,第二设备为中继UE,接入网设备为gNB,第一请求信息为第一DCR,第一指示信息为第一SMC,第一响应信息为第一SMC响应为例进行示例性说明,具体包括:
S701、远端UE向gNB发送第一DCR,所述第一DCR用于请求建立所述第一连接。
S702、gNB生成第一密钥。该gNB生成第一密钥的时间,只要在S703之前就在本示例的保护范围内。
S703、gNB向中继UE发送第二信息,该第二信息携带第一密钥。
在执行S703之前,接入网设备与第二设备之间可以先建立uu接口的安全连接。
S704、中继UE向gNB发送第二信息的确认信息,该第二信息的确认信息携带第一SMC。
S705、gNB向远端UE发送第一信息,该第一信息携带密钥生成参数和第一SMC。
S706、远端UE基于密钥生成参数以及第二密钥,生成第一密钥。该远端UE基于密钥生成参数以及第二密钥,生成第一密钥的时间,只要在S707之前就在本示例的保护范围内。
S707、远端UE在生成第一密钥之后,向中继UE发送第一SMC响应。
需要指出的是,在S707之前,该远端UE与中继UE之间已经完成建立PC5连接。优选地,在S705之前该远端UE与中继UE之间已经完成建立PC5连接。
S708、中继UE向远端UE发送第一DCR的确认信息。该第一DCR的确认信息用于确认第一连接安全建立成功,也就是如图7中所示中继UE和远端UE之间完成建立安全的PC5连接。
需要指出,前述第一DCR、第二信息、第二信息的确认信息、第一信息的携带方式与前述实施例相同,因此在图7中为了简洁未对每种信息的携带消息进行详细说明。
在一种实施例中,所述第二设备在向所述接入网设备发送所述第二信息的确认信息之后,所述第二设备向所述接入网设备发送所述第一指示信息。具体的:
第一设备的处理可以包括:所述第一设备向所述接入网设备发送第一请求信息;第一设备接收所述接入网设备发送的第一信息,所述第一信息携带密钥生成参数;第一设备基于密钥生成参数以及第二密钥,生成第一密钥;所述第一设备接收所述接入网设备发送的第一指示信息;第一设备向第二设备发送第一响应信息;第一设备接收第二设备发送的第一请求信息的确认信息。
接入网设备的处理可以包括:所述接入网设备接收第一设备发送的第一请求信息;所述接入网设备向所述第一设备发送第一信息;所述接入网设备生成第一密钥;所述接入网设备在生成所述第一密钥的情况下,向所述第二设备发送所述第二信息,该第二信息携带第一密钥以及所述第一请求信息;所述接入网设备接收所述第二设备发送的第二信息的确认信息之后,接收所述第二设备发送的所述第一指示信息;所述接入网设备在接收到所述第二设备发送的第一指示信息的情况下,所述接入网设备向所述第一设备发送所述第一指示信息。
第二设备的处理可以包括:所述第二设备接收接入网设备发送的第二信息,该第二信息携带第一密钥以及所述第一请求信息;所述第二设备在向所述接入网设备发送所述第二信息的确认信息之后,所述第二设备向所述接入网设备发送所述第一指示信息;所述第二设备接收第一设备发送的第一响应信息,所述第一响应信息用于确认生成所述第一密钥;所述第二设备向所述第一设备发送第一请求信息的确认信息,所述第一请求信息的确认信息用于确认所述第一连接安全建立成功。
需要指出的是,前述接入网设备向第一设备发送第一信息的时间,可以是以下任意之一:接入网设备生成第一密钥之前;接入网设备生成第一密钥的同时;接入网设备生成第一密钥之后;接入网设备向第二设备发送第二信息的同时;接入网设备向第二设备发送第二信息之后。
第一设备发送第一响应信息的时间只要在第一设备生成第一密钥之后,就在本实施例的保护范围内。
第二设备发送第一指示信息的时间只要在接收到第二信息之后,就在本实施例的保护范围之内。
前述第二设备向接入网设备发送的第一指示信息可以由第八RRC消息携带。该第八RRC消息可以为以下任意之一:第八RRC连接建立消息、第八RRC连接重建消息、第八RRC连接恢复消息、第八RRC连接重配置消息。在一种优选的示例中,该第八RRC消息为第八RRC连接重配置消息。前述接入网设备在接收到第二设备发送的所述第一指示信息之后,还可以向该第二设备发送第一指示信息的确认接收信息;该第一指示信息的确认接收信息可以由第九RRC消息携带。该第九RRC消息可以为以下任意之一:第九RRC连接建立完成消息、第九RRC连接重建完成消息、第九RRC连接恢复完成消息、第九RRC连接重配置完成消息。
前述该第一请求信息、第一信息、第二信息、第二信息的确认信息、第一指示信息、第一响应信息以及第一请求信息的确认信息的相关说明与前述实施例均为相同的,不做重复说明。
结合图8,以第一设备为远端UE,第二设备为中继UE,接入网设备为gNB,第一请求信息为第一DCR,第一指示信息为第一SMC,第一响应信息为第一SMC响应为例进行示例性说明,具体包括:
S801、远端UE向gNB发送第一DCR,所述第一DCR用于请求建立所述第一连接。
S802、gNB生成第一密钥。该gNB生成第一密钥的时间,只要在S805之前就在本示例的保护范围内。
S803、gNB向远端UE发送第一信息,该第一信息携带密钥生成参数。
S804、远端UE基于密钥生成参数以及第二密钥,生成第一密钥。
需要指出的是,该远端UE基于密钥生成参数以及第二密钥,生成第一密钥的时间,可以在S803之后、S809之前的任意时间,本示例不对其进行限定。
S805、gNB向中继UE发送第二信息,该第二信息携带第一密钥。
前述S803和S805可以不分先后顺序。
示例性的,在执行S805之前,接入网设备与第二设备之间可以先建立uu接口的安全连接。在S803之前,该远端UE与中继UE之间已经完成建立PC5连接。
S806、中继UE向gNB发送第二信息的确认信息,该第二信息的确认信息。
S807、中继UE向gNB发送第一SMC。
虽然图8中未示出,在S807之后,还可以包括:gNB向中继UE发送第一SMC的确认接收信息。
S808、gNB向远端UE发送第一SMC。
虽然图8中未示出,在S808之后,还可以包括:远端UE向gNB发送确认接收信息。
S809、远端UE在确认生成第一密钥之后,向中继UE发送第一SMC响应。
S810、中继UE向远端UE发送第一DCR的确认信息。该第一DCR的确认信息用于确认第一连接安全建立成功,也就是如图8中所示中继UE和远端UE之间完成建立安全的PC5连接。
需要指出,前述第一DCR、第二信息、第二信息的确认信息、第一信息的携带方式与前述实施例相同,因此在图8中为了简洁未对每种信息的携带消息进行详细说明。
在一种实施例中,所述第二设备在向所述接入网设备发送所述第二信息的确认信息之后,所述第二设备向所述第一设备发送所述第一指示信息。具体的:
所述第一设备的处理可以包括:所述第一设备向所述接入网设备发送第一请求信息;第一设备接收所述接入网设备发送的第一信息,所述第一信息携带密钥生成参数;第一设备基于密钥生成参数以及第二密钥,生成第一密钥;所述第一设备接收所述第二设备发送的第一指示信息;第一设备向第二设备发送第一响应信息;第一设备接收第二设备发送的第一请求信息的确认信息。
接入网设备的处理可以包括:所述接入网设备接收第一设备发送的第一请求信息;所述接入网设备向所述第一设备发送第一信息;所述接入网设备生成第一密钥;所述接入网设备在生成所述第一密钥的情况下,向所述第二设备发送所述第二信息,该第二信息携带第一密钥以及所述第一请求信息;所述接入网设备接收所述第二设备发送的第二信息的确认信息。
第二设备的处理可以包括:所述第二设备接收接入网设备发送的第二信息,该第二信息携带第一密钥以及所述第一请求信息;所述第二设备在向所述接入网设备发送所述第二信息的确认信息之后,所述第二设备向所述第一设备发送所述第一指示信息;所述第二设备接收第一设备发送的第一响应信息,所述第一响应信息用于确认生成所述第一密钥;所述第二设备向所述第一设备发送第一请求信息的确认信息,所述第一请求信息的确认信息用于确认所述第一连接安全建立成功。
需要指出的是,前述接入网设备向第一设备发送第一信息的时间,可以是以下任意之一:接入网设备生成第一密钥之前;接入网设备生成第一密钥的同时;接入网设备生成第一密钥之后;接入网设备向第二设备发送第二信息的同时;接入网设备向第二设备发送第二信息之后。
第一设备发送第一响应信息的时间只要在第一设备生成第一密钥之后,就在本实施例的保护范围内。
第二设备发送第一指示信息的时间只要在接收到第二信息之后,就在本实施例的保护范围之内。
前述第一指示信息,可以由侧行链路消息携带;同样的第一响应信息也有侧行链路消息携带。示例性的,该侧行链路消息可以为侧行链路RRC消息。
前述该第一请求信息、第一信息、第二信息、第二信息的确认信息、第一指示信息、第一响应信息以及第一请求信息的确认信息的相关说明与前述实施例均为相同的,不做重复说明。
结合图9,以第一设备为远端UE,第二设备为中继UE,接入网设备为gNB,第一请求信息为第一DCR,第一指示信息为第一SMC,第一响应信息为第一SMC响应为例进行示例性说明,具体包括:
S901、远端UE向gNB发送第一DCR,所述第一DCR用于请求建立所述第一连接。
S902、gNB生成第一密钥。该gNB生成第一密钥的时间,只要在S905之前就在本示例的保护范围内。
S903、gNB向远端UE发送第一信息,该第一信息携带密钥生成参数。
S904、远端UE基于密钥生成参数以及第二密钥,生成第一密钥。
需要指出的是,该远端UE基于密钥生成参数以及第二密钥,生成第一密钥的时间,可以在S903之后、S909之前的任意时间执行的,本示例不对其进行限定。
S905、gNB向中继UE发送第二信息,该第二信息携带第一密钥。
前述S903和S905可以不分先后顺序。
示例性的,在执行S905之前,接入网设备与第二设备之间可以先建立uu接口的安全连接。在S903之前,该远端UE与中继UE之间已经完成建立PC5连接。
S906、中继UE向gNB发送第二信息的确认信息,该第二信息的确认信息。
S907、中继UE向远端UE发送第一SMC。
S908、远端UE在生成第一密钥之后,向中继UE发送第一SMC响应。
S909、中继UE向远端UE发送第一DCR的确认信息。该第一DCR的确认信息用于确认第一连接安全建立成功,也就是如图9中所示中继UE和远端UE之间完成建立安全的PC5连接。
需要指出,前述第一DCR、第二信息、第二信息的确认信息、第一信息的携带方式与前述实施例相同,因此在图9中为了简洁未对每种信息的携带消息进行详细说明。
在一些可能的实施方式中,由第一设备触发建立前述第一连接的场景下,可以由第一设备发起执行空口加密和完整性保护的确认流程。
该第一设备发起执行空口加密和完整性保护的确认流程的时机,为所述第一设备生成第一密钥之后。在第一设备侧执行的处理可以包括:
所述第一设备基于所述密钥生成参数,生成第一密钥之后,所述方法还包括:所述第一设备向第二设备发送第二指示信息;所述第二指示信息用于指示与第二设备协商第一密钥;所述第一设备接收所述第二设备发送的第二响应信息,所述第二响应信息用于确认得到第一密钥。
该第二指示信息可以携带第一密钥的标识信息,该第一密钥的标识信息具体可以是第一密钥的ID。也就是第一设备在生成第一密钥之后,将该第一密钥的ID携带在第二指示信息中发送至第二设备。还需要指出的是,该第二指示信息还用于指示与第二设备协商其他安全参数,这里该其他安全参数的说明与前述实施例相同,不做赘述。前述第二指示信息可以是第二SMC。
该第二响应信息用于确认得到第一密钥。该第二响应信息还可以用于确认得到其他安全参数。前述第二响应信息可以是第二SMC响应(Response)。示例性的,在第二设备接收到接入网设备发送的第二信息所携带的第一密钥后,若其得到的第一密钥的ID与第二指示信息中携带的第一密钥的ID相同,则第二设备可以向第一设备发送第二响应信息。
可选地,所述第二响应信息还用于确认所述第一连接安全建立成功。具体的,该第二响应信息可以携带第一请求信息的确认信息;所述第一请求信息的确认信息用于确认所述第一连接安全建立成功。
可选地,所述第一设备接收所述第二设备发送的第二响应信息之后,所述方法还包括:所述第一设备接收所述第二设备发送的第一请求信息的确认信息;所述第一请求信息的确认信息用于确认所述第一连接安全建立成功。
该第二设备发送第二指示信息所对应的第二响应信息的时间,需要在第二设备接收到接入网设备发送的第二信息所携带的第一密钥之后。该第二设备可以执行的处理可以包括:
所述方法还包括:所述第二设备接收第一设备发送的第二指示信息;所述第二指示信息用于指示与第二设备协商第一密钥。所述第二设备接收接入网设备发送的第二信息之后,所述方法还包括:所述第二设备向所述第一设备发送第二响应信息,所述第二响应信息用于确认得到第一密钥。
可选地,所述第二信息还携带第一请求信息,所述第一请求信息用于请求建立所述第一连接。所述方法还包括:所述第二设备在向所述第一设备发送第二响应信息的情况下,所述第二设备向所述第一设备发送第一请求信息的确认信息;所述第一请求信息的确认信息用于确认所述第一连接安全建立成功。
可选地,所述第二信息还携带第一请求信息,所述第一请求信息用于请求建立所述第一连接;所述第二响应信息还用于确认所述第一连接安全建立成功。具体的,该第二响应信息中可以携带第一请求信息的确认信息,也就是第二响应信息除了用于确认得到第一密钥之外,还用于确认完成建立第一设备与第二设备之间的安全连接。
也就是说,第二设备可以直接通过第二响应信息对第一请求信息进行确认,以使得第一设备确认已经完成建立与第二设备之间的PC5接口的安全连接。或者,第二设备可以在完成发送第二响应信息之后,进一步发送第一请求信息的确认信息给第一设备,使得第一设备确认已经完成建立与第二设备之间的PC5接口的安全连接。
接下来对前述实施方式中第二设备、第一设备以及接入网设备的处理进行详细说明:
在一种实施例中,所述第一设备的处理可以包括:所述第一设备向所述接入网设备发送第一请求信息;第一设备接收所述接入网设备发送的第一信息,所述第一信息携带密钥生成参数;第一设备基于密钥生成参数以及第二密钥,生成第一密钥;所述第一设备向接入网设备发送所述第二指示信息;所述第一设备接收所述第二设备发送的第二响应信息,所述第二响应信息用于确认得到第一密钥,所述第二响应信息还可以用于确认完成建立所述第一连接。
接入网设备的处理可以包括:所述接入网设备接收第一设备发送的第一请求信息;所述接入网设备向所述第一设备发送第一信息,第一信息携带密钥生成参数;所述接入网设备生成第一密钥;所述接入网设备向所述第二设备发送第二信息,该第二信息携带第一密钥。
第二设备的处理可以包括:所述第二设备接收接入网设备发送的第二信息,该第二信息携带第一密钥;所述第二设备向接入网设备发送所述第二信息的确认信息;所述第二设备接收第一设备发送的第二指示信息,所述第二指示信息用于指示与第二设备协商第一密钥;所述第二设备在确定接收到第一密钥的情况下,向所述第一设备发送第二响应信息,所述第二响应信息用于确认得到所述第一密钥,所述第二响应信息还用于确认完成建立所述第一连接。
前述该第一请求信息、第一信息、第二信息、第二信息的确认信息、第二指示信息、第二响应信息以及第一请求信息的确认信息的相关说明与前述实施例均为相同的,不做重复说明。
需要理解的是,以上仅为示例性说明,在实际处理中,该第一设备还可以在生成第一密钥之后,通过接入网设备向第二设备发送第二指示信息。或者,该第一设备可以在生成第一密钥之后,向接入网设 备发送第二指示信息,该接入网设备接收到第二指示信息的情况下,向第二设备发送第二信息,该第二信息中携带第二指示信息以及第一密钥;然后第二设备直接向第一设备发送第二响应信息。只要第二指示信息的发送时机在第一设备生成第一密钥之后,就在本实施例的保护范围内,本实施例不对全部可能进行穷举。
结合图10,以第一设备为远端UE,第二设备为中继UE,接入网设备为gNB,第一请求信息为第一DCR,第二指示信息为第二SMC,第二响应信息为第二SMC响应为例进行示例性说明,具体包括:
S1001、远端UE向gNB发送第一DCR,所述第一DCR用于请求建立所述第一连接。
S1002、gNB生成第一密钥。该gNB生成第一密钥的时间,只要在S1003之前就在本示例的保护范围内。
S1003、gNB向中继UE发送第二信息,该第二信息携带第一密钥。
在执行S1003之前,接入网设备与第二设备之间可以先建立uu接口的安全连接。
另外,虽然图10中未示意出,但是在完成S1003之后,该远端UE还可以向中继UE发送第二信息的确认信息,该第二信息的确认信息可以由第三RRC连接重配置完成消息携带。
S1004、gNB向远端UE发送第一信息,该第一信息携带密钥生成参数。
前述S1004和S1003的先后顺序本实施例不做限定。并在执行S1004之前该远端UE与中继UE已经完成建立PC5连接。
S1005、远端UE基于密钥生成参数以及第二密钥,生成第一密钥。
S1006、远端UE向中继UE发送第二SMC。
完成S1006之后,可以执行S1007,或者执行S1008~S1009,分别进行说明:
S1007、中继UE向远端UE发送第二SMC响应,所述第二SMC响应用于确认得到所述第一密钥,还用于用于确认第一连接安全建立成功,具体用于确认完成建立安全的PC5连接。
S1008、中继UE向远端UE发送第二SMC响应,所述第二SMC响应用于确认得到所述第一密钥。
S1009、中继UE向远端UE发送第一DCR的确认信息。该第一DCR的确认信息与前述示例相同,不做重复说明。
需要指出,前述第一DCR、第二信息、第二信息的确认信息、第一信息的携带方式与前述实施例相同,因此在图8中为了简洁未对每种信息的携带消息进行详细说明。
在一些可能的实施方式中,由接入网设备触发建立前述第一连接。
这种实施方式中,接入网设备可以在发送第一信息的同时发送第二请求信息。也就是所述第一信息还携带第二请求信息,所述第二请求信息用于请求建立所述第一连接。
该接入网设备可以先决策是否发送第二请求信息,可以包括:所述接入网设备基于该第一设备的当前状态确定需要建立第一连接的情况下,发送所述第二请求信息。比如,第一设备的当前状态为第一设备的数据传输量高于预设门限值,或者可以是第一设备与接入网设备之间的上行信号强度小于第二强度门限值的情况下,确定需要建立所述第一连接。其中,所述预设门限值可以根据实际情况设置,不对其进行限定;所述第二强度门限值也可以根据实际情况设置,不进行限定。应理解,这里仅为示例性说明,实际处理中,接入网设备还可以采用其他方式来确定是否发送第一请求信息,只是这里不做穷举。
接入网设备发送该第一信息时,该第一信息可以由第三RRC消息携带。这里,所述第三RRC消息可以包括以下之一:第三RRC连接建立消息、第三RRC连接重建消息、第一RRC连接恢复消息、第三RRC连接重配置(reconfiguration)消息。在一种优选的示例中,该第三RRC消息为第三RRC连接重配置消息。
示例性的,前述第二请求信息可以称为第二MP触发信息。
可选地,所述第一信息还可以携带所述第二设备的相关信息。其中,所述第二设备的相关信息与前述实施例的说明相同,不做重复说明。
若在第一信息中携带所述第二设备的相关信息,则该接入网设备需要在发送所述第一信息之前先选取或发现该第二设备。示例性的,可以是第一设备先选取或发现一个或多个候选设备,将一个或多个候选设备的标识发送至接入网设备,由接入网设备确定第二设备。示例性的,可以是第一设备先选取或发现一个或多个候选设备,将一个或多个候选设备的标识发送至接入网设备;接入网设备接收第一设备上报的一个或多个候选设备,然后基于候选设备的地理位置以及第一设备的地理位置,从一个或多个候选设备中确定第二设备。其中,接入网设备可以是选取与第一设备的距离满足要求的候选设备作为第二设备,该要求可以根据实际情况设置,比如可以是小于指定距离,该指定距离本实施例不做限定。
所述接入网设备向所述第二设备发送所述第二信息之前,所述方法还包括:所述接入网设备生成所述第一密钥。也就是说,接入网设备在向第一设备发送第一信息之后、向第二设备发送第二信息之前,接入网设备需要生成第一密钥。
所述接入网设备生成所述第一密钥的方式与前述实施例相同,不做赘述。接入网设备生成第一密钥的时间,只要在接入网设备向第二设备发送第二信息之前,就在本实施例保护范围内。比如,该接入网设备可以是在发送第一信息之前,生成第一密钥;或者,接入网设备可以是在发送第一信息之后、向第二设备发送第二信息之前,生成第一密钥。这里仅为示例性说明,不作为对接入网设备生成第一密钥的时间的限定。再具体的,所述接入网设备在生成第一密钥、且该接入网设备与所述第二设备建立Uu接口的安全连接的情况下,所述接入网设备向所述第二设备发送所述第二信息。其中,接入网设备生成第一密钥的处理、以及该接入网设备与所述第二设备建立Uu接口的安全连接的处理,可以不分先后顺序,本实施例不对其进行限定。另外,关于该接入网设备与所述第二设备建立Uu接口的安全连接的处理方式,本实施例也不进行限定。
需要指出的是,第二设备在接收到接入网设备发送的第二信息的情况下,还可以向接入网设备发送第二信息的确认信息。相应的,在接入网设备向所述第二设备发送第二信息之后,还可以接收第二设备发送的第二信息的确认信息,该第二信息的确认信息用于确认接收到第一密钥。该第二信息以及第二信息的确认信息的携带消息与前述实施例相同,不做重复说明。
所述第一设备接收到所述第一信息之后,可以基于所述密钥生成参数,生成第一密钥。其中,所述第一设备基于所述密钥生成参数,生成第一密钥的处理与前述实施例相同,不做重复说明。需要指出的是,在第一设备接收到所述第一信息之后,还可以包括:第一设备与第二设备建立侧行链路连接。关于第一设备与第二设备建立侧行链路连接的方式,本实施例不做限定。
基于前述处理,第一设备和第二设备均可以得到第一密钥。进一步地,该第一设备与第二设备之间还需要执行空口加密和完整性保护的确认流程。
在一些可能的实施方式中,由接入网设备触发建立前述第一连接的场景下,可以由第二设备发起执行空口加密和完整性保护的确认流程。
该第二设备发起执行空口加密和完整性保护的确认流程的时机,为所述第二设备接收接入网设备发送的第二信息之后。在第二设备侧执行的处理可以包括:
所述第二设备接收接入网设备发送的第二信息之后,所述方法还包括:所述第二设备发送第一指示信息;所述第一指示信息用于指示与第一设备协商第一密钥;所述第二设备接收所述第一设备发送的第一响应信息;所述第一响应信息用于确认生成所述第一密钥。
其中,所述第二设备发送第一指示信息包括:所述第二设备向第一设备发送所述第一指示信息。
该第一指示信息、第一响应信息的内容相关说明与前述实施例相同,不做重复说明。
该第一设备发送第一指示信息所对应的第一响应信息的时间,需要在第一设备生成第一密钥之后。该第一设备可以执行的处理可以包括:
该第一设备接收第一指示信息的方式,可以包括:所述第一设备接收所述第二设备发送的第一指示信息;所述第一指示信息用于指示与第一设备协商第一密钥。所述第一设备基于所述密钥生成参数,生成第一密钥之后,所述方法还包括:所述第一设备向第二设备发送第一响应信息;所述第一响应信息用于确认生成第一密钥;所述第一设备向所述接入网设备发送第二请求信息的第一确认信息;所述第二请求信息的第一确认信息用于确认所述第一连接安全建立成功。
所述接入网设备的处理,可以包括:所述接入网设备接收所述第一设备发送的第二请求信息的第一确认信息;所述第二请求信息的第一确认信息用于确认所述第一连接安全建立成功。
其中,所述第二请求信息的第一确认信息由第四RRC消息携带。这里,所述第四RRC消息,可以是与前述携带第一信息的第三RRC消息对应,比如该第四RRC消息可以包括以下之一:第三RRC连接建立完成消息、第三RRC连接重建完成消息、第一RRC连接恢复完成消息、第三RRC连接重配置完成消息。在一种优选的示例中,该第四RRC消息为第三RRC连接重配置完成消息。
接下来对前述实施方式中由接入网设备触发建立前述第一连接,第二设备发送第一指示信息的处理进行详细说明:
在一种实施例中,由接入网设备触发建立前述第一连接、由第二设备发起执行空口加密和完整性保护的确认流程。具体的:
接入网设备的处理可以包括:所述接入网设备向第一设备发送第一信息,该第一信息中携带第二请求信息以及密钥生成参数;所述接入网设备生成第一密钥;所述接入网设备在生成所述第一密钥的情况下,向所述第二设备发送所述第二信息,该第二信息携带第一密钥;所述接入网设备接收所述第二设备发送的第二信息的确认信息;所述接入网设备接收所述第一设备发送的第二请求信息的第一确认信息;所述第二请求信息的第一确认信息用于确认所述第一连接安全建立成功。
所述第一设备的处理可以包括:所述第一设备接收所述接入网设备发送的第一信息,所述第一信息携带第二请求信息以及密钥生成参数;第一设备基于密钥生成参数以及第二密钥,生成第一密钥;所述 第一设备接收所述第二设备发送的第一指示信息,所述第一指示信息用于指示与第一设备协商第一密钥;第一设备在确定生成第一密钥的情况下,向第二设备发送第一响应信息,第一响应信息用于确认生成第一密钥;所述第一设备向所述接入网设备发送第二请求信息的第一确认信息,所述第二请求信息的第一确认信息用于确认所述第一连接安全建立成功。
第二设备的处理可以包括:所述第二设备接收接入网设备发送的第二信息,该第二信息携带第一密钥;所述第二设备向所述第一设备发送第一指示信息,所述第一指示信息用于指示与第一设备协商第一密钥;所述第二设备接收第一设备发送的第一响应信息,所述第一响应信息用于确认生成所述第一密钥。
结合图11,以第一设备为远端UE,第二设备为中继UE,接入网设备为gNB,第二请求信息为第二MP触发信息,第一指示信息为第一SMC,第一响应信息为第一SMC响应为例进行示例性说明,具体包括:
S1101、gNB向远端UE发送第一信息,第一信息中携带密钥生成参数和第二MP触发信息。该第二MP触发信息用于请求建立所述第一连接。
S1102、gNB生成第一密钥。
这里,该gNB生成第一密钥的时间,可以在S1101之前,也可以在S1101之后~S1103之前,本实施例不对其进行限定。
S1103、gNB向中继UE发送第二信息,该第二信息携带第一密钥。
在执行S1103之前,接入网设备与第二设备之间可以先建立uu接口的安全连接。
S1104、中继UE向gNB发送第二信息的确认信息。
S1105、远端UE基于密钥生成参数以及第二密钥,生成第一密钥。
这里,S1105可以是在S1101之后的任意时间执行,只要在发送第一响应信息(即第一SMC响应)之前完成S1105的处理,就在本实施例的保护范围内;或者,只要在发送第二指示信息(即第二SMC)之前完成S1105的处理,就在本实施例保护范围内,这里不进行限定。
接下来结合图11中的a流程进行具体说明:
S1106a、中继UE向远端UE发送第一SMC。
S1107a、远端UE向中继UE发送第一SMC响应。
需要指出的是,在S1106a之前,该远端UE与中继UE之间已经完成建立PC5连接。优选地,在S1105之前该远端UE与中继UE之间已经完成建立PC5连接。
S1108、远端UE向gNB发送第二MP触发信息的第一确认信息。该第二MP触发信息的第一确认信息用于确认第一连接安全建立成功。
在一些可能的实施方式中,由接入网设备触发建立前述第一连接的场景下,可以由第一设备发起执行空口加密和完整性保护的确认流程。
该第一设备发起执行空口加密和完整性保护的确认流程的时机,为所述第一设备生成第一密钥之后。在第一设备侧执行的处理可以包括:
可选地,所述第一设备基于所述密钥生成参数,生成第一密钥之后,所述方法还包括:所述第一设备向第二设备发送第二指示信息;所述第二指示信息用于指示与第二设备协商第一密钥;所述第一设备接收所述第二设备发送的第二响应信息,所述第二响应信息用于确认得到第一密钥;所述第一设备向所述接入网设备发送第二请求信息的第一确认信息;其中,所述第二请求信息的第一确认信息用于确认所述第一连接安全建立成功。
可选地,所述第一设备基于所述密钥生成参数,生成第一密钥之后,所述方法还包括:所述第一设备向第二设备发送第二指示信息;其中,所述第二指示信息用于指示与第二设备协商第一密钥;所述第一设备接收所述第二设备发送的第二响应信息;其中,所述第二响应信息用于确认得到第一密钥,且所述第二响应信息还用于确认所述第一连接安全建立成功。
两者的区别在于一种情况中,第二响应信息可以用于确认第一连接安全建立成功,也就是该第二响应信息可以携带第二请求信息的第一确认信息。另一种情况中,第二响应信息与第二请求信息的第一确认信息由两条信令分别发送。
进一步地,所述第一设备基于所述密钥生成参数,生成第一密钥之前,所述方法还包括:所述第一设备向接入网设备发送第二请求信息的第二确认信息,所述第二请求信息的第二确认信息用于确认与第二设备完成建立第一连接;所述第二请求信息的第二确认信息由第五RRC消息携带。
或者,所述第二指示信息还携带所述第二请求信息的第二确认信息;所述第二请求信息的第二确认信息用于确认与第二设备完成建立第一连接。
也就是说,第一设备接收到接入网设备发送的携带第二请求信息的第一信息之后,还可以向接入网设备发送一个第二请求信息的第二确认信息,以使得接入网设备确认第一设备与第二设备具备侧行链路 连接。该第二请求信息的第二确认信息可以是由第二指示信息携带,或者可以与第二指示信息分别由不同信令发送。
该第二设备发送第二指示信息所对应的第二响应信息的时间,需要在第二设备接收到接入网设备发送的第二信息所携带的第一密钥之后。该第二设备可以执行的处理可以包括:
所述方法还包括:所述第二设备接收第一设备发送的第二指示信息;所述第二指示信息用于指示与第二设备协商第一密钥。所述第二设备接收接入网设备发送的第二信息之后,所述方法还包括:所述第二设备向所述第一设备发送第二响应信息,所述第二响应信息用于确认得到第一密钥。
可选地,所述第二设备接收接入网设备发送的第二信息,可以包括:所述第二设备在接收到第一设备发送的第二指示信息的情况下,所述第二设备向所述接入网设备发送密钥请求信息;所述第二设备接收接入网设备发送的第二信息。
其中,所述第二指示信息还携带所述第二请求信息的第二确认信息,所述第二请求信息的第二确认信息用于确认完成建立第一连接;所述密钥请求信息携带所述第二请求信息的第二确认信息。
可选地,所述第二设备接收接入网设备发送的第二信息,可以在第二设备接收第一设备发送的第二指示信息之前或之后。
接入网设备的处理还可以包括:所述接入网设备向第一设备发送第一信息,以及所述接入网设备向第二设备发送第二信息,包括:所述接入网设备向第一设备发送第一信息;所述接入网设备接收第二设备发送的密钥请求信息;所述接入网设备向所述第二设备发送所述第二信息。
也就是,接入网设备可以是在发送第一信息之后,一直处于等待状态,只有接收到第二设备发送的密钥请求信息的情况下,才会向第二设备发送第二信息。应理解的是,这种情况中,该接入网设备生成第一密钥的时机,只要在向第二设备发送第二信息之前,就在本实施例保护范围内。在一种可能的示例中,该接入网设备接收到第二设备发送的密钥请求信息的情况下,生成第一密钥;然后接入网设备向第二设备发送第二信息。
可选地,所述密钥请求信息携带所述第二请求信息的第二确认信息;所述第二请求信息的第二确认信息用于确认与第二设备完成建立第一连接。
可选地,其中,所述接入网设备接收第二设备发送的密钥请求信息之前,所述方法还包括:所述接入网设备接收所述第一设备发送的第二请求信息的第二确认信息,所述第二请求信息的第二确认信息用于确认与第二设备完成建立第一连接。
这种情况下,该接入网设备在接收到第二请求信息的第二确认信息之后,等待接收第二设备发送的密钥请求信息。接入网设备可以在向第二设备发送第二信息之前,生成第一密钥。比如,接入网设备可以是在接收到密钥请求信息时,生成第一密钥,然后向第二设备发送第二信息;比如,接入网设备可以是在发送第一信息之前就生成了第一密钥,接收到密钥请求信息时,向第二设备发送第二信息。应理解,这里即为示例性说明,不做为对接入网设备生成第一密钥的时间点的限制。
接下来对前述实施方式中由接入网设备触发建立前述第一连接,第二设备发送第一指示信息的处理进行详细说明:
在一种实施例中,由接入网设备触发建立前述第一连接、由第一设备发起执行空口加密和完整性保护的确认流程。具体的:
接入网设备的处理可以包括:所述接入网设备向第一设备发送第一信息,该第一信息中携带第二请求信息以及密钥生成参数;所述接入网设备生成第一密钥;所述接入网设备在生成所述第一密钥的情况下,向所述第二设备发送所述第二信息,该第二信息携带第一密钥;所述接入网设备接收所述第二设备发送的第二信息的确认信息;所述接入网设备接收所述第一设备发送的第二请求信息的第一确认信息。
所述第一设备的处理可以包括:所述第一设备接收所述接入网设备发送的第一信息,所述第一信息携带第二请求信息以及密钥生成参数;第一设备基于密钥生成参数以及第二密钥,生成第一密钥;第一设备在确定生成第一密钥的情况下,向第二设备发送第二指示信息;所述第一设备接收第二设备发送的第二响应信息;所述第一设备向所述接入网设备发送第二请求信息的第一确认信息,所述第二请求信息的第一确认信息用于确认所述第一连接安全建立成功。
第二设备的处理可以包括:所述第二设备接收接入网设备发送的第二信息,该第二信息携带第一密钥;第二设备接收第一设备发送的第二指示信息;所述第二设备向第一设备发送第二响应信息。
在本实施例中,前述第二响应信息除了用于确认得到第一密钥,所述第二响应信息还可以用于确认所述第一连接安全建立成功,也就是该第二响应信息可以携带第二请求信息的第一确认信息。这种情况中,第一设备可以不需要执行向所述接入网设备发送第二请求信息的第一确认信息的处理,也可以执行向所述接入网设备发送第二请求信息的第一确认信息的处理,均在本实施例的保护范围内,不进行赘述。
结合图11的b流程,以第一设备为远端UE,第二设备为中继UE,接入网设备为gNB,第二请求 信息为第二MP触发信息,第二指示信息为第二SMC,第二响应信息为第二SMC响应为例进行示例性说明,具体包括:
S1106b、远端UE向中继UE发送第二SMC。
S1107b、中继UE向远端UE发送第二SMC响应。
需要指出的是,在S1106b之前,该远端UE与中继UE之间已经完成建立PC5连接。
本示例中,S1101~S1105以及S1108与前述实施例相同,因此不做重复说明。
还应理解的是,若第二SMC响应还用于确认所述第一连接安全建立成功,则可以不执行S1108,为了简洁在图11中不再进行示意。需要指出,前述第一信息、第二信息、第二信息的确认信息的携带方式与前述实施例相同,因此在图11中为了简洁未对每种信息的携带消息进行详细说明。
在一种实施例中,由接入网设备触发建立前述第一连接、由第一设备发起执行空口加密和完整性保护的确认流程。具体的:
接入网设备的处理可以包括:所述接入网设备向第一设备发送第一信息,该第一信息中携带第二请求信息以及密钥生成参数;所述接入网设备接收第二设备发送的密钥请求信息,密钥请求信息携带所述第二请求信息的第二确认信息,所述第二请求信息的第二确认信息用于确认与第二设备完成建立第一连接;所述接入网设备生成第一密钥;所述接入网设备在生成所述第一密钥的情况下,向所述第二设备发送所述第二信息,该第二信息携带第一密钥。
所述第一设备的处理可以包括:所述第一设备接收所述接入网设备发送的第一信息,所述第一信息携带第二请求信息以及密钥生成参数;第一设备基于密钥生成参数以及第二密钥,生成第一密钥;第一设备在确定生成第一密钥的情况下,向第二设备发送第二指示信息,所述第二指示信息还携带所述第二请求信息的第二确认信息,所述第二请求信息的第二确认信息用于确认与第二设备完成建立第一连接;所述第一设备接收第二设备发送的第二响应信息;其中,所述第二响应信息用于确认得到第一密钥,且所述第二响应信息还用于确认所述第一连接安全建立成功。
第二设备的处理可以包括:所述第二设备接收第一设备发送的第二指示信息;在接收到第一设备发送的第二指示信息的情况下,所述第二设备向所述接入网设备发送密钥请求信息,密钥请求信息携带所述第二请求信息的第二确认信息;所述第二设备接收接入网设备发送的第二信息;所述第二设备向第一设备发送第二响应信息。
结合图12,以第一设备为远端UE,第二设备为中继UE,接入网设备为gNB,第二请求信息为第二MP触发信息,第二指示信息为第二SMC,第二响应信息为第二SMC响应为例进行示例性说明,具体包括:
S1201、gNB向远端UE发送第一信息,第一信息中携带密钥生成参数和第二MP触发信息。该第二MP触发信息用于请求建立所述第一连接。
S1202、远端UE基于密钥生成参数,生成第一密钥。
S1203、远端UE向中继UE发送第二SMC,第二SMC携带第二MP触发信息的第二确认信息。
S1203之前,该远端UE需要与中继UE完成建立PC5连接。
S1204、中继UE向gNB发送密钥请求信息,密钥请求信息携带所述第二MP触发信息的第二确认信息。
S1205、gNB生成第一密钥。该gNB生成第一密钥的时间,只要在S1206之前的任意时间,均在本示例的保护范围内。
S1206、gNB向中继UE发送第二信息,该第二信息携带第一密钥。
在执行S1206之前,接入网设备与第二设备之间可以先建立uu接口的安全连接。
S1207、中继UE向远端UE发送第二SMC响应,该第二SMC响应用于确认得到第一密钥,还用于确认第一连接安全建立成功。
在一种实施例中,由接入网设备触发建立前述第一连接、由第一设备发起执行空口加密和完整性保护的确认流程。具体的:
接入网设备的处理可以包括:所述接入网设备向第一设备发送第一信息,该第一信息中携带第二请求信息以及密钥生成参数;所述接入网设备接收所述第一设备发送的第二请求信息的第二确认信息,所述第二请求信息的第二确认信息用于确认与第二设备完成建立第一连接;所述接入网设备接收第二设备发送的密钥请求信息,密钥请求信息携带所述第二请求信息的第二确认信息;所述接入网设备生成第一密钥;所述接入网设备在生成所述第一密钥的情况下,向所述第二设备发送所述第二信息,该第二信息携带第一密钥。
所述第一设备的处理可以包括:所述第一设备接收所述接入网设备发送的第一信息,所述第一信息携带第二请求信息以及密钥生成参数;所述第一设备向接入网设备发送第二请求信息的第二确认信息, 所述第二请求信息的第二确认信息用于确认与第二设备完成建立第一连接;第一设备基于密钥生成参数以及第二密钥,生成第一密钥;第一设备在确定生成第一密钥的情况下,向第二设备发送第二指示信息;所述第一设备接收第二设备发送的第二响应信息;其中,所述第二响应信息用于确认得到第一密钥,且所述第二响应信息还用于确认所述第一连接安全建立成功。
第二设备的处理可以包括:所述第二设备接收第一设备发送的第二指示信息;在接收到第一设备发送的第二指示信息的情况下,所述第二设备向所述接入网设备发送密钥请求信息,密钥请求信息携带所述第二请求信息的第二确认信息;所述第二设备接收接入网设备发送的第二信息;所述第二设备向第一设备发送第二响应信息。
结合图13,以第一设备为远端UE,第二设备为中继UE,接入网设备为gNB,第二请求信息为第二MP触发信息,第二指示信息为第二SMC,第二响应信息为第二SMC响应为例进行示例性说明,具体包括:
S1301、gNB生成第一密钥。
这里,gNB生成第一密钥的执行顺序,可以是在S1307之前的任意时间,本示例不作为对gNB生成第一密钥的时间的限定。
S1302、gNB向远端UE发送第一信息,第一信息中携带密钥生成参数和第二MP触发信息。该第二MP触发信息用于请求建立所述第一连接。
S1303、远端UE向gNB发送第二MP触发信息的第二确认信息。
S1304、远端UE基于密钥生成参数,生成第一密钥。
这里S1304和S1303的执行顺序,可以不分先后。
S1305、远端UE向中继UE发送第二SMC,第二SMC携带第二MP触发信息的第二确认信息。
S1305之前,该远端UE需要与中继UE完成建立PC5连接。
S1306、中继UE向gNB发送密钥请求信息。
S1307、gNB向中继UE发送第二信息,该第二信息携带第一密钥。
在执行S1307之前,接入网设备与第二设备之间可以先建立uu接口的安全连接。
S1308、中继UE向远端UE发送第二SMC响应,该第二SMC响应用于确认得到第一密钥,还用于确认第一连接安全建立成功。
需要指出,前述第一信息、第二信息、第二信息的确认信息等信息的携带方式与前述实施例相同,因此在前述示例对应的附图中为了简洁未对每种信息的携带消息进行详细说明。
最后结合图14的相关技术中远端UE和中继UE层2安全建立过程进行说明:S1401,远端UE的AUSF(鉴权服务功能,Authentication Server Function)生成密钥,该密钥可以表示为K NR_ProSe;S1402,远端UE的AUSF向中继UE的AMF发送响应,该响应中携带密钥和密钥相关参数,该密钥相关参数可以包括第二随机数(可以表示为Nonce-2),还可以包括EAP(可扩展的身份验证协议,Extensible Authentication Protocol)成功(success)标识,该响应可以是鉴权响应,这里不做限定;S1403,中继UE的AMF向中继UE发送响应,其中携带密钥和密钥相关参数;S1404,中继UE向远端UE发送直接(Direct)SMC,该直接SMC携带密钥相关参数;S1405,远端UE生成密钥。在前述图14的示意中,仅针对远端UE、中继UE获得密钥的处理做了说明,在S1401之前,远端UE、中继UE还会与核心网的其他网元进行交互,比如远端UE发现中继UE的处理,中继UE进行鉴权的处理等等,在图14中不进行详述;另外,在S1405之后,该远端UE还可以与中继UE完成SMC确认流程等处理,也不在图14中进行详述。
通过图14的示例性说明,可以看出在相关技术中,中继UE和远端UE若要得到密钥以及密钥相关参数,就需要与核心网的AMF、AUSF等网元进行大量交互。这样会使得中继UE和远端UE得到密钥的处理效率较低,无法适用于MP场景下需要高效的建立安全的第一连接的需求。
通过采用本实施例提供的方案,第一设备可以直接从接入网设备得到密钥生成参数进而生成第一密钥,以对第一设备和第二设备的连接上所传输的数据进行安全性处理。另外,第二设备也可以从接入网设备直接得到第一密钥。如此,避免了与核心网设备进行大量信令交互才能得到密钥,所带来的处理效率较低的问题,本申请提供的方案可以使得第一设备直接与接入网设备进行交互以得到第一密钥,从而提升生成第一密钥的处理效率,进而可以保证高效的建立安全的第一设备与第二设备之间的连接,还可以提升整个通信系统的处理效率。
图15是根据本申请一实施例的第一设备的组成结构示意图,包括:
第一通信单元1501,用于接收接入网设备发送的第一信息,其中,所述第一信息携带密钥生成参数;
第一处理单元1502,用于基于所述密钥生成参数,生成第一密钥;其中,所述第一密钥用于对第一连接传输的数据进行安全性处理;所述第一连接为所述第一设备与第二设备之间的连接。
所述第一处理单元,用于基于所述密钥生成参数以及第二密钥,生成所述第一密钥;其中,所述第二密钥用于对第二连接上传输的数据进行安全性处理;所述第二连接为所述第一设备与接入网设备之间的连接。
所述第一通信单元,用于接收接入网设备发送的第一信息之前,向所述接入网设备发送第一请求信息;其中,所述第一请求信息用于请求建立所述第一连接。
所述第一请求信息中携带所述第二设备的相关信息。
所述第一信息还携带第一指示信息;所述第一指示信息用于指示与第一设备协商第一密钥。
所述第一通信单元,用于执行以下之一:接收所述第二设备发送的第一指示信息;其中,所述第一指示信息用于指示与第一设备协商第一密钥;接收所述接入网设备发送的第一指示信息。
所述第一通信单元,用于在第一处理单元基于所述密钥生成参数,生成第一密钥之后,向第二设备发送第一响应信息;其中,所述第一响应信息用于确认生成第一密钥;接收所述第二设备发送的第一请求信息的确认信息;其中,所述第一请求信息的确认信息用于确认所述第一连接安全建立成功。
所述第一通信单元,用于在第一处理单元基于所述密钥生成参数,生成第一密钥之后,向第二设备发送第二指示信息;其中,所述第二指示信息用于指示与第二设备协商第一密钥;接收所述第二设备发送的第二响应信息,其中,所述第二响应信息用于确认得到第一密钥。
所述第二响应信息还用于确认所述第一连接安全建立成功。
所述第一通信单元,用于接收所述第二设备发送的第二响应信息之后,接收所述第二设备发送的第一请求信息的确认信息;其中,所述第一请求信息的确认信息用于确认所述第一连接安全建立成功。
所述第一请求信息由第一无线资源控制RRC消息携带;所述第一信息由第二RRC消息携带。
所述第一信息还携带第二请求信息,所述第二请求信息用于请求建立所述第一连接。
所述第一信息还携带所述第二设备的相关信息。
所述第一信息由第三RRC消息携带。
所述第一通信单元,用于接收所述第二设备发送的第一指示信息;其中,所述第一指示信息用于指示与第一设备协商第一密钥;以及在第一处理单元基于所述密钥生成参数,生成第一密钥之后,向第二设备发送第一响应信息,所述第一响应信息用于确认生成第一密钥;向所述接入网设备发送第二请求信息的第一确认信息,所述第二请求信息的第一确认信息用于确认所述第一连接安全建立成功。
所述第一通信单元,用于在第一处理单元基于所述密钥生成参数,生成第一密钥之后,向第二设备发送第二指示信息;其中,所述第二指示信息用于指示与第二设备协商第一密钥;接收所述第二设备发送的第二响应信息,其中,所述第二响应信息用于确认得到第一密钥;向所述接入网设备发送第二请求信息的第一确认信息;其中,所述第二请求信息的第一确认信息用于确认所述第一连接安全建立成功。
所述第二请求信息的第一确认信息由第四RRC消息携带。
所述第一通信单元,用于在第一处理单元基于所述密钥生成参数,生成第一密钥之后,向第二设备发送第二指示信息;其中,所述第二指示信息用于指示与第二设备协商第一密钥;接收所述第二设备发送的第二响应信息;其中,所述第二响应信息用于确认得到第一密钥,且所述第二响应信息还用于确认所述第一连接安全建立成功。
所述第二指示信息还携带所述第二请求信息的第二确认信息;所述第二请求信息的第二确认信息用于确认与第二设备完成建立第一连接。
所述第一通信单元,用于在第一处理单元基于所述密钥生成参数,生成第一密钥之前,向接入网设备发送第二请求信息的第二确认信息,所述第二请求信息的第二确认信息用于确认与第二设备完成建立第一连接,所述第二请求信息的第一确认信息由第五RRC消息携带。
所述密钥生成参数,包括以下至少之一:所述第二设备的相关信息、随机数、与所述第一连接相关的计数值、所述第一设备与所述接入网设备之间的无线承载RB的相关信息、所述第一设备与所述接入网设备之间的会话标识符。
所述第一设备与所述接入网设备之间的承载的相关信息,包括以下至少之一:所述第一设备与所述接入网设备之间的数据无线承载DRB的标识;所述第一设备与所述接入网设备之间的信令无线承载SRB的标识。
所述第一设备为远端终端设备;所述第二设备为中继终端设备。
图16是根据本申请一实施例的第二设备的组成结构示意图,包括:
第二通信单元1601,用于接收接入网设备发送的第二信息,所述第二信息携带第一密钥;其中,所述第一密钥用于对第一连接传输的数据进行安全性处理;所述第一连接为第一设备与第二设备之间的 连接。
所述第二通信单元,用于接收接入网设备发送的第二信息之后,发送第一指示信息;其中,所述第一指示信息用于指示与第一设备协商第一密钥;接收所述第一设备发送的第一响应信息;其中,所述第一响应信息用于确认生成所述第一密钥。
所述第二通信单元,用于向第一设备发送所述第一指示信息。
所述第二信息还携带第一请求信息,所述第一请求信息用于请求建立所述第一连接;
所述第二通信单元,用于在接收到所述第一设备发送的第一响应信息的情况下,向所述第一设备发送第一请求信息的确认信息;其中,所述第一请求信息的确认信息用于确认所述第一连接安全建立成功。
所述第二通信单元,用于执行以下之一:向接入网设备发送所述第二信息的确认信息;其中,所述第二信息的确认信息携带所述第一指示信息;在向所述接入网设备发送所述第二信息的确认信息之后,向所述接入网设备发送所述第一指示信息;在向所述接入网设备发送所述第二信息的确认信息之后,向所述第一设备发送所述第一指示信息。
所述第二通信单元,用于接收第一设备发送的第二指示信息;其中,所述第二指示信息用于指示与第二设备协商第一密钥;以及在接收接入网设备发送的第二信息之后,向所述第一设备发送第二响应信息,其中,所述第二响应信息用于确认得到第一密钥。
所述第二信息还携带第一请求信息,所述第一请求信息用于请求建立所述第一连接;
所述第二通信单元,用于在向所述第一设备发送第二响应信息的情况下,向所述第一设备发送第一请求信息的确认信息;其中,所述第一请求信息的确认信息用于确认所述第一连接安全建立成功。
所述第二信息还携带第一请求信息,所述第一请求信息用于请求建立所述第一连接;所述第二响应信息还用于确认所述第一连接安全建立成功。
所述第二通信单元,用于在接收到第一设备发送的第二指示信息的情况下,向所述接入网设备发送密钥请求信息;接收接入网设备发送的第二信息。
所述第二指示信息还携带所述第二请求信息的第二确认信息;所述第二请求信息的第二确认信息用于确认完成建立第一连接;所述密钥请求信息携带所述第二请求信息的第二确认信息。
所述第二信息由第六RRC消息携带。
所述第一设备为远端终端设备;所述第二设备为中继终端设备。
图17是根据本申请一实施例的接入网设备的组成结构示意图,包括:
第三通信单元1701,用于向第一设备发送第一信息,以及向第二设备发送第二信息;其中,所述第一信息携带密钥生成参数,所述密钥生成参数用于生成第一密钥;所述第一密钥用于对第一连接上传输的数据进行安全性处理;所述第一连接为第一设备与第二设备之间的连接。
所述第三通信单元,用于向第一设备发送第一信息,以及向第二设备发送第二信息之前,接收所述第一设备发送的第一请求信息;其中,所述第一请求信息用于请求建立所述第一连接。
所述第一请求信息中携带所述第二设备的相关信息。
在图17的基础上,如图18所示,所述接入网设备,还包括:
第三处理单元1702,用于在第三通信单元接收到所述第一设备发送的第一请求信息之后,生成所述第一密钥;
所述第三通信单元1701,用于在第三处理单元生成所述第一密钥的情况下,向所述第二设备发送所述第二信息。
所述第二信息还携带所述第一请求信息。
所述第三通信单元,用于向第二设备发送第二信息之后,接收所述第二设备发送的第一指示信息;其中,所述第一指示信息用于指示与第一设备协商第一密钥。
所述第三通信单元,用于执行以下之一:接收所述第二设备发送的第二信息的确认信息,所述第二信息的确认信息携带所述第一指示信息;接收所述第二设备发送的第二信息的确认信息之后,接收所述第二设备发送的所述第一指示信息。
所述第三通信单元,用于在接收到所述第二设备发送的第一指示信息的情况下,向所述第一设备发送第一信息,所述第一信息携带所述第一指示信息。
所述第三通信单元,用于在接收到所述第二设备发送的第一指示信息的情况下,向所述第一设备发送所述第一指示信息。
所述第一请求信息由第一RRC消息携带;所述第一信息由第二RRC消息携带。
所述第一信息还携带第二请求信息,所述第二请求信息用于请求建立所述第一连接。
所述第一信息还携带所述第二设备的相关信息。
所述第一信息由第三RRC消息携带。
所述第三通信单元,用于接收所述第一设备发送的第二请求信息的第一确认信息;所述第二请求信息的第一确认信息用于确认所述第一连接安全建立成功,所述第二请求信息的第一确认信息由第四RRC消息携带。
所述第三通信单元,用于向第一设备发送第一信息;接收第二设备发送的密钥请求信息;向所述第二设备发送所述第二信息。
所述密钥请求信息携带所述第二请求信息的第二确认信息;所述第二请求信息的第二确认信息用于确认与第二设备完成建立第一连接。
所述第三通信单元,用于接收第二设备发送的密钥请求信息之前,接收所述第一设备发送的第二请求信息的第二确认信息,所述第二请求信息的第二确认信息用于确认与第二设备完成建立第一连接;所述第二请求信息的第二确认信息由第五RRC消息携带。
所述第二信息由第六RRC消息携带。
所述接入网设备,还包括:第三处理单元,用于在第三通信单元向所述第二设备发送所述第二信息之前,生成所述第一密钥。
所述第三处理单元,用于基于所述密钥生成参数以及第二密钥,生成所述第一密钥;其中,所述第二密钥用于对第二连接上传输的数据进行安全性处理;所述第二连接为所述第一设备与接入网设备之间的连接。
所述密钥生成参数,包括以下至少之一:所述第二设备的相关信息、随机数、与所述第一连接相关的计数值、所述第一设备与所述接入网设备之间的无线承载RB的相关信息、所述第一设备与所述接入网设备之间的会话标识符。
所述第一设备与所述接入网设备之间的承载的相关信息,包括以下至少之一:所述第一设备与所述接入网设备之间的数据无线承载DRB的标识;所述第一设备与所述接入网设备之间的信令无线承载SRB的标识。
所述第一设备为远端终端设备;所述第二设备为中继终端设备。
图19是根据本申请实施例的通信设备1900示意性结构图。该通信设备1900包括处理器1910,处理器1910可以从存储器中调用并运行计算机程序,以使通信设备1900实现本申请实施例中的方法。
在一种可能的实现方式中,通信设备1900还可以包括存储器1920。其中,处理器1910可以从存储器1920中调用并运行计算机程序,以使通信设备1900实现本申请实施例中的方法。
其中,存储器1920可以是独立于处理器1910的一个单独的器件,也可以集成在处理器1910中。
在一种可能的实现方式中,通信设备1900还可以包括收发器1930,处理器1910可以控制该收发器1930与其他设备进行通信,具体地,可以向其他设备发送信息或数据,或接收其他设备发送的信息或数据。
其中,收发器1930可以包括发射机和接收机。收发器1930还可以进一步包括天线,天线的数量可以为一个或多个。
在一种可能的实现方式中,该通信设备1900可为本申请实施例的第一设备,并且该通信设备1900可以实现本申请实施例的各个方法中由第一设备实现的相应流程,为了简洁,在此不再赘述。
在一种可能的实现方式中,该通信设备1900可为本申请实施例的第二设备,并且该通信设备1900可以实现本申请实施例的各个方法中由第二设备实现的相应流程,为了简洁,在此不再赘述。
在一种可能的实现方式中,该通信设备1900可为本申请实施例的接入网设备,并且该通信设备1900可以实现本申请实施例的各个方法中由接入网设备实现的相应流程,为了简洁,在此不再赘述。
图20是根据本申请实施例的芯片2000的示意性结构图。该芯片2000包括处理器2010,处理器2010可以从存储器中调用并运行计算机程序,以实现本申请实施例中的方法。
在一种可能的实现方式中,芯片2000还可以包括存储器2020。其中,处理器2010可以从存储器2020中调用并运行计算机程序,以实现本申请实施例中由接入网设备、或第一核心网设备执行的方法。
其中,存储器2020可以是独立于处理器2010的一个单独的器件,也可以集成在处理器2010中。
在一种可能的实现方式中,该芯片2000还可以包括输入接口2030。其中,处理器2010可以控制该输入接口2030与其他设备或芯片进行通信,具体地,可以获取其他设备或芯片发送的信息或数据。
在一种可能的实现方式中,该芯片2000还可以包括输出接口2040。其中,处理器2010可以控制该输出接口2040与其他设备或芯片进行通信,具体地,可以向其他设备或芯片输出信息或数据。
在一种可能的实现方式中,该芯片可应用于本申请实施例中的接入网设备,并且该芯片可以实现本申请实施例的各个方法中由接入网设备实现的相应流程,为了简洁,在此不再赘述。在一种可能的实现方式中,该芯片可应用于本申请实施例中的第一设备,并且该芯片可以实现本申请实施例的各个方法中由第一设备实现的相应流程,为了简洁,在此不再赘述。在一种可能的实现方式中,该芯片可应用于本 申请实施例中的第二设备,并且该芯片可以实现本申请实施例的各个方法中由第二设备实现的相应流程,为了简洁,在此不再赘述。应用于接入网设备、第一设备、第二设备的芯片可以是相同的芯片或不同的芯片。
应理解,本申请实施例提到的芯片还可以称为系统级芯片,系统芯片,芯片系统或片上系统芯片等。
上述提及的处理器可以是通用处理器、数字信号处理器(digital signal processor,DSP)、现成可编程门阵列(field programmable gate array,FPGA)、专用集成电路(application specific integrated circuit,ASIC)或者其他可编程逻辑器件、晶体管逻辑器件、分立硬件组件等。其中,上述提到的通用处理器可以是微处理器或者也可以是任何常规的处理器等。
上述提及的存储器可以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(read-only memory,ROM)、可编程只读存储器(programmable ROM,PROM)、可擦除可编程只读存储器(erasable PROM,EPROM)、电可擦除可编程只读存储器(electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(random access memory,RAM)。
应理解,上述存储器为示例性但不是限制性说明,例如,本申请实施例中的存储器还可以是静态随机存取存储器(static RAM,SRAM)、动态随机存取存储器(dynamic RAM,DRAM)、同步动态随机存取存储器(synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(double data rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(synch link DRAM,SLDRAM)以及直接内存总线随机存取存储器(Direct Rambus RAM,DR RAM)等等。也就是说,本申请实施例中的存储器旨在包括但不限于这些和任意其它适合类型的存储器。
图21是根据本申请实施例的通信系统2100的示意性框图。该通信系统2100包括接入网设备2110、第一设备2120、第二设备2130。其中,该接入网设备2110可以用于实现上述方法中由接入网设备实现的相应的功能,该第一设备2120可以用于实现上述方法中由第一设备实现的相应的功能。该第二设备2130可以用于实现上述方法中由第二设备实现的相应的功能。为了简洁,在此不再赘述。
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。该计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行该计算机程序指令时,全部或部分地产生按照本申请实施例中的流程或功能。该计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。该计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,该计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(Digital Subscriber Line,DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。该计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。该可用介质可以是磁性介质,(例如,软盘、硬盘、磁带)、光介质(例如,DVD)、或者半导体介质(例如固态硬盘(Solid State Disk,SSD))等。
应理解,在本申请的各种实施例中,上述各过程的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本申请实施例的实施过程构成任何限定。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
以上所述仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以该权利要求的保护范围为准。

Claims (123)

  1. 一种通信方法,包括:
    第一设备接收接入网设备发送的第一信息,其中,所述第一信息携带密钥生成参数;
    所述第一设备基于所述密钥生成参数,生成第一密钥;其中,所述第一密钥用于对第一连接传输的数据进行安全性处理;所述第一连接为第一设备与第二设备之间的连接。
  2. 根据权利要求1所述的方法,其中,所述第一设备基于所述密钥生成参数,生成第一密钥,包括:
    所述第一设备基于所述密钥生成参数以及第二密钥,生成所述第一密钥;其中,所述第二密钥用于对第二连接上传输的数据进行安全性处理;所述第二连接为所述第一设备与接入网设备之间的连接。
  3. 根据权利要求2所述的方法,其中,所述第一设备接收接入网设备发送的第一信息之前,所述方法还包括:
    所述第一设备向所述接入网设备发送第一请求信息;其中,所述第一请求信息用于请求建立所述第一连接。
  4. 根据权利要求3所述的方法,其中,所述第一请求信息中携带所述第二设备的相关信息。
  5. 根据权利要求3或4所述的方法,其中,所述第一信息还携带第一指示信息;所述第一指示信息用于指示与第一设备协商第一密钥。
  6. 根据权利要求3或4所述的方法,其中,所述方法还包括以下之一:
    所述第一设备接收所述第二设备发送的第一指示信息;其中,所述第一指示信息用于指示与第一设备协商第一密钥;
    所述第一设备接收所述接入网设备发送的第一指示信息。
  7. 根据权利要求5或6所述的方法,其中,所述第一设备基于所述密钥生成参数,生成第一密钥之后,所述方法还包括:
    所述第一设备向第二设备发送第一响应信息;其中,所述第一响应信息用于确认生成第一密钥;
    所述第一设备接收所述第二设备发送的第一请求信息的确认信息;其中,所述第一请求信息的确认信息用于确认所述第一连接安全建立成功。
  8. 根据权利要求3或4所述的方法,其中,所述第一设备基于所述密钥生成参数,生成第一密钥之后,所述方法还包括:
    所述第一设备向第二设备发送第二指示信息;其中,所述第二指示信息用于指示与第二设备协商第一密钥;
    所述第一设备接收所述第二设备发送的第二响应信息,其中,所述第二响应信息用于确认得到第一密钥。
  9. 根据权利要求8所述的方法,其中,所述第二响应信息还用于确认所述第一连接安全建立成功。
  10. 根据权利要求8所述的方法,其中,所述第一设备接收所述第二设备发送的第二响应信息之后,所述方法还包括:
    所述第一设备接收所述第二设备发送的第一请求信息的确认信息;其中,所述第一请求信息的确认信息用于确认所述第一连接安全建立成功。
  11. 根据权利要求3-10任一项所述的方法,其中,所述第一请求信息由第一无线资源控制RRC消息携带;所述第一信息由第二RRC消息携带。
  12. 根据权利要求2所述的方法,其中,所述第一信息还携带第二请求信息,所述第二请求信息用于请求建立所述第一连接。
  13. 根据权利要求12所述的方法,其中,所述第一信息还携带所述第二设备的相关信息。
  14. 根据权利要求12或13所述的方法,其中,所述第一信息由第三RRC消息携带。
  15. 根据权利要求12-14任一项所述的方法,其中,所述方法还包括:所述第一设备接收所述第二设备发送的第一指示信息;其中,所述第一指示信息用于指示与第一设备协商第一密钥;
    所述第一设备基于所述密钥生成参数,生成第一密钥之后,所述方法还包括:所述第一设备向第二设备发送第一响应信息,所述第一响应信息用于确认生成第一密钥;所述第一设备向所述接入网设备发送第二请求信息的第一确认信息,所述第二请求信息的第一确认信息用于确认所述第一连接安全建立成功。
  16. 根据权利要求12-14任一项所述的方法,其中,所述第一设备基于所述密钥生成参数,生成第一密钥之后,所述方法还包括:
    所述第一设备向第二设备发送第二指示信息;其中,所述第二指示信息用于指示与第二设备协商第一密钥;
    所述第一设备接收所述第二设备发送的第二响应信息,其中,所述第二响应信息用于确认得到第一 密钥;
    所述第一设备向所述接入网设备发送第二请求信息的第一确认信息;其中,所述第二请求信息的第一确认信息用于确认所述第一连接安全建立成功。
  17. 根据权利要求16所述的方法,其中,所述第二请求信息的第一确认信息由第四RRC消息携带。
  18. 根据权利要求12-14任一项所述的方法,其中,所述第一设备基于所述密钥生成参数,生成第一密钥之后,所述方法还包括:
    所述第一设备向第二设备发送第二指示信息;其中,所述第二指示信息用于指示与第二设备协商第一密钥;
    所述第一设备接收所述第二设备发送的第二响应信息;其中,所述第二响应信息用于确认得到第一密钥,且所述第二响应信息还用于确认所述第一连接安全建立成功。
  19. 根据权利要求16或18所述的方法,其中,所述第二指示信息还携带所述第二请求信息的第二确认信息;所述第二请求信息的第二确认信息用于确认与第二设备完成建立第一连接。
  20. 根据权利要求16或18所述的方法,其中,所述第一设备基于所述密钥生成参数,生成第一密钥之前,所述方法还包括:
    所述第一设备向接入网设备发送第二请求信息的第二确认信息,所述第二请求信息的第二确认信息用于确认与第二设备完成建立第一连接,所述第二请求信息的第一确认信息由第五RRC消息携带。
  21. 根据权利要求1-20任一项所述的方法,其中,所述密钥生成参数,包括以下至少之一:所述第二设备的相关信息、第一随机数、与所述第一连接相关的计数值、所述第一设备与所述接入网设备之间的无线承载RB的相关信息、所述第一设备与所述接入网设备之间的会话标识符。
  22. 根据权利要求21所述的方法,其中,所述第一设备与所述接入网设备之间的承载的相关信息,包括以下至少之一:所述第一设备与所述接入网设备之间的数据无线承载DRB的标识;所述第一设备与所述接入网设备之间的信令无线承载SRB的标识。
  23. 根据权利要求1-22任一项所述的方法,其中,所述第一设备为远端终端设备;所述第二设备为中继终端设备。
  24. 一种通信方法,包括:
    第二设备接收接入网设备发送的第二信息,所述第二信息携带第一密钥;其中,所述第一密钥用于对第一连接传输的数据进行安全性处理;所述第一连接为第一设备与第二设备之间的连接。
  25. 根据权利要求24所述的方法,其中,所述第二设备接收接入网设备发送的第二信息之后,所述方法还包括:
    所述第二设备发送第一指示信息;其中,所述第一指示信息用于指示与第一设备协商第一密钥;
    所述第二设备接收所述第一设备发送的第一响应信息;其中,所述第一响应信息用于确认生成所述第一密钥。
  26. 根据权利要求25所述的方法,其中,所述第二设备发送第一指示信息,包括:
    所述第二设备向第一设备发送所述第一指示信息。
  27. 根据权利要求25所述的方法,其中,所述第二信息还携带第一请求信息,所述第一请求信息用于请求建立所述第一连接;
    所述方法还包括:所述第二设备在接收到所述第一设备发送的第一响应信息的情况下,所述第二设备向所述第一设备发送第一请求信息的确认信息;其中,所述第一请求信息的确认信息用于确认所述第一连接安全建立成功。
  28. 根据权利要求27所述的方法,其中,所述第二设备发送第一指示信息,包括以下之一:
    所述第二设备向接入网设备发送所述第二信息的确认信息;其中,所述第二信息的确认信息携带所述第一指示信息;
    所述第二设备在向所述接入网设备发送所述第二信息的确认信息之后,所述第二设备向所述接入网设备发送所述第一指示信息;
    所述第二设备在向所述接入网设备发送所述第二信息的确认信息之后,所述第二设备向所述第一设备发送所述第一指示信息。
  29. 根据权利要求24所述的方法,其中,所述方法还包括:所述第二设备接收第一设备发送的第二指示信息;其中,所述第二指示信息用于指示与第二设备协商第一密钥;
    所述第二设备接收接入网设备发送的第二信息之后,所述方法还包括:所述第二设备向所述第一设备发送第二响应信息,其中,所述第二响应信息用于确认得到第一密钥。
  30. 根据权利要求29所述的方法,其中,所述第二信息还携带第一请求信息,所述第一请求信息用于请求建立所述第一连接;
    所述方法还包括:所述第二设备在向所述第一设备发送第二响应信息的情况下,所述第二设备向所述第一设备发送第一请求信息的确认信息;其中,所述第一请求信息的确认信息用于确认所述第一连接安全建立成功。
  31. 根据权利要求29所述的方法,其中,所述第二信息还携带第一请求信息,所述第一请求信息用于请求建立所述第一连接;所述第二响应信息还用于确认所述第一连接安全建立成功。
  32. 根据权利要求29所述的方法,其中,所述第二设备接收接入网设备发送的第二信息,包括:
    所述第二设备在接收到第一设备发送的第二指示信息的情况下,所述第二设备向所述接入网设备发送密钥请求信息;
    所述第二设备接收接入网设备发送的第二信息。
  33. 根据权利要求32所述的方法,其中,所述第二指示信息还携带第二请求信息的第二确认信息;所述第二请求信息的第二确认信息用于确认完成建立第一连接;
    所述密钥请求信息携带所述第二请求信息的第二确认信息。
  34. 根据权利要求24-33任一项所述的方法,其中,所述第二信息由第六RRC消息携带。
  35. 根据权利要求24-34任一项所述的方法,其中,所述第一设备为远端终端设备;所述第二设备为中继终端设备。
  36. 一种通信方法,包括:
    接入网设备向第一设备发送第一信息,以及所述接入网设备向第二设备发送第二信息;其中,所述第一信息携带密钥生成参数,所述密钥生成参数用于生成第一密钥;所述第一密钥用于对第一连接上传输的数据进行安全性处理;所述第一连接为第一设备与第二设备之间的连接。
  37. 根据权利要求36所述的方法,其中,所述接入网设备向第一设备发送第一信息,以及所述接入网设备向第二设备发送第二信息之前,所述方法还包括:
    所述接入网设备接收所述第一设备发送的第一请求信息;其中,所述第一请求信息用于请求建立所述第一连接。
  38. 根据权利要求37所述的方法,其中,所述第一请求信息中携带所述第二设备的相关信息。
  39. 根据权利要求37或38所述的方法,其中,所述接入网设备在接收到所述第一设备发送的第一请求信息之后,所述方法还包括:所述接入网设备生成所述第一密钥;
    所述接入网设备向第二设备发送第二信息,包括:所述接入网设备在生成所述第一密钥的情况下,向所述第二设备发送所述第二信息。
  40. 根据权利要求39所述的方法,其中,所述第二信息还携带所述第一请求信息。
  41. 根据权利要求39或40所述的方法,其中,所述接入网设备向第二设备发送第二信息之后,所述方法还包括:
    所述接入网设备接收所述第二设备发送的第一指示信息;其中,所述第一指示信息用于指示与第一设备协商第一密钥。
  42. 根据权利要求41所述的方法,其中,所述接入网设备接收所述第二设备发送的第一指示信息,包括以下之一:
    所述接入网设备接收所述第二设备发送的第二信息的确认信息,所述第二信息的确认信息携带所述第一指示信息;
    所述接入网设备接收所述第二设备发送的第二信息的确认信息之后,接收所述第二设备发送的所述第一指示信息。
  43. 根据权利要求41或42所述的方法,其中,所述接入网设备向所述第一设备发送第一信息,包括:
    所述接入网设备在接收到所述第二设备发送的第一指示信息的情况下,所述接入网设备向所述第一设备发送第一信息,所述第一信息携带所述第一指示信息。
  44. 根据权利要求41或42所述的方法,其中,所述方法还包括:
    所述接入网设备在接收到所述第二设备发送的第一指示信息的情况下,所述接入网设备向所述第一设备发送所述第一指示信息。
  45. 根据权利要求37-44任一项所述的方法,其中,所述第一请求信息由第一RRC消息携带;所述第一信息由第二RRC消息携带。
  46. 根据权利要求36所述的方法,其中,所述第一信息还携带第二请求信息,所述第二请求信息用于请求建立所述第一连接。
  47. 根据权利要求46所述的方法,其中,所述第一信息还携带所述第二设备的相关信息。
  48. 根据权利要求46或47所述的方法,其中,所述第一信息由第三RRC消息携带。
  49. 根据权利要求46-48任一项所述的方法,其中,所述方法还包括:
    所述接入网设备接收所述第一设备发送的第二请求信息的第一确认信息;所述第二请求信息的第一确认信息用于确认所述第一连接安全建立成功,所述第二请求信息的第一确认信息由第四RRC消息携带。
  50. 根据权利要求46-48任一项所述的方法,其中,所述接入网设备向第一设备发送第一信息,以及所述接入网设备向第二设备发送第二信息,包括:
    所述接入网设备向第一设备发送第一信息;
    所述接入网设备接收第二设备发送的密钥请求信息;
    所述接入网设备向所述第二设备发送所述第二信息。
  51. 根据权利要求50所述的方法,其中,所述密钥请求信息携带所述第二请求信息的第二确认信息;所述第二请求信息的第二确认信息用于确认与第二设备完成建立第一连接。
  52. 根据权利要求50所述的方法,其中,所述接入网设备接收第二设备发送的密钥请求信息之前,所述方法还包括:
    所述接入网设备接收所述第一设备发送的第二请求信息的第二确认信息,所述第二请求信息的第二确认信息用于确认与第二设备完成建立第一连接;所述第二请求信息的第二确认信息由第五RRC消息携带。
  53. 根据权利要求36-52任一项所述的方法,其中,所述第二信息由第六RRC消息携带。
  54. 根据权利要求46-52任一项所述的方法,其中,所述接入网设备向所述第二设备发送所述第二信息之前,所述方法还包括:
    所述接入网设备生成所述第一密钥。
  55. 根据权利要求39或54所述的方法,其中,所述接入网设备生成所述第一密钥,包括:
    所述接入网设备基于所述密钥生成参数以及第二密钥,生成所述第一密钥;其中,所述第二密钥用于对第二连接上传输的数据进行安全性处理;所述第二连接为所述第一设备与接入网设备之间的连接。
  56. 根据权利要求36-55任一项所述的方法,其中,所述密钥生成参数,包括以下至少之一:所述第二设备的相关信息、第一随机数、与所述第一连接相关的计数值、所述第一设备与所述接入网设备之间的无线承载RB的相关信息、所述第一设备与所述接入网设备之间的会话标识符。
  57. 根据权利要求56所述的方法,其中,所述第一设备与所述接入网设备之间的承载的相关信息,包括以下至少之一:所述第一设备与所述接入网设备之间的数据无线承载DRB的标识;所述第一设备与所述接入网设备之间的信令无线承载SRB的标识。
  58. 根据权利要求36-57任一项所述的方法,其中,所述第一设备为远端终端设备;所述第二设备为中继终端设备。
  59. 一种第一设备,包括:
    第一通信单元,用于接收接入网设备发送的第一信息,其中,所述第一信息携带密钥生成参数;
    第一处理单元,用于基于所述密钥生成参数,生成第一密钥;其中,所述第一密钥用于对第一连接传输的数据进行安全性处理;所述第一连接为所述第一设备与第二设备之间的连接。
  60. 根据权利要求59所述的第一设备,其中,所述第一处理单元,用于基于所述密钥生成参数以及第二密钥,生成所述第一密钥;其中,所述第二密钥用于对第二连接上传输的数据进行安全性处理;所述第二连接为所述第一设备与接入网设备之间的连接。
  61. 根据权利要求60所述的第一设备,其中,所述第一通信单元,用于接收接入网设备发送的第一信息之前,向所述接入网设备发送第一请求信息;其中,所述第一请求信息用于请求建立所述第一连接。
  62. 根据权利要求61所述的第一设备,其中,所述第一请求信息中携带所述第二设备的相关信息。
  63. 根据权利要求61或62所述的第一设备,其中,所述第一信息还携带第一指示信息;所述第一指示信息用于指示与第一设备协商第一密钥。
  64. 根据权利要求61或62所述的第一设备,其中,所述第一通信单元,用于执行以下之一:
    接收所述第二设备发送的第一指示信息;其中,所述第一指示信息用于指示与第一设备协商第一密钥;
    接收所述接入网设备发送的第一指示信息。
  65. 根据权利要求63或64所述的第一设备,其中,所述第一通信单元,用于在第一处理单元基于所述密钥生成参数,生成第一密钥之后,向第二设备发送第一响应信息;其中,所述第一响应信息用于确认生成第一密钥;接收所述第二设备发送的第一请求信息的确认信息;其中,所述第一请求信息的确认信息用于确认所述第一连接安全建立成功。
  66. 根据权利要求61或62所述的第一设备,其中,所述第一通信单元,用于在第一处理单元基于 所述密钥生成参数,生成第一密钥之后,向第二设备发送第二指示信息;其中,所述第二指示信息用于指示与第二设备协商第一密钥;接收所述第二设备发送的第二响应信息,其中,所述第二响应信息用于确认得到第一密钥。
  67. 根据权利要求66所述的第一设备,其中,所述第二响应信息还用于确认所述第一连接安全建立成功。
  68. 根据权利要求66所述的第一设备,其中,所述第一通信单元,用于接收所述第二设备发送的第二响应信息之后,接收所述第二设备发送的第一请求信息的确认信息;其中,所述第一请求信息的确认信息用于确认所述第一连接安全建立成功。
  69. 根据权利要求61-68任一项所述的第一设备,其中,所述第一请求信息由第一无线资源控制RRC消息携带;所述第一信息由第二RRC消息携带。
  70. 根据权利要求60所述的第一设备,其中,所述第一信息还携带第二请求信息,所述第二请求信息用于请求建立所述第一连接。
  71. 根据权利要求70所述的第一设备,其中,所述第一信息还携带所述第二设备的相关信息。
  72. 根据权利要求70或71所述的第一设备,其中,所述第一信息由第三RRC消息携带。
  73. 根据权利要求70-72任一项所述的第一设备,其中,所述第一通信单元,用于接收所述第二设备发送的第一指示信息;其中,所述第一指示信息用于指示与第一设备协商第一密钥;
    以及在第一处理单元基于所述密钥生成参数,生成第一密钥之后,向第二设备发送第一响应信息,所述第一响应信息用于确认生成第一密钥;向所述接入网设备发送第二请求信息的第一确认信息,所述第二请求信息的第一确认信息用于确认所述第一连接安全建立成功。
  74. 根据权利要求70-72任一项所述的第一设备,其中,所述第一通信单元,用于在第一处理单元基于所述密钥生成参数,生成第一密钥之后,向第二设备发送第二指示信息;其中,所述第二指示信息用于指示与第二设备协商第一密钥;接收所述第二设备发送的第二响应信息,其中,所述第二响应信息用于确认得到第一密钥;向所述接入网设备发送第二请求信息的第一确认信息;其中,所述第二请求信息的第一确认信息用于确认所述第一连接安全建立成功。
  75. 根据权利要求74所述的第一设备,其中,所述第二请求信息的第一确认信息由第四RRC消息携带。
  76. 根据权利要求70-72任一项所述的第一设备,其中,所述第一通信单元,用于在第一处理单元基于所述密钥生成参数,生成第一密钥之后,向第二设备发送第二指示信息;其中,所述第二指示信息用于指示与第二设备协商第一密钥;接收所述第二设备发送的第二响应信息;其中,所述第二响应信息用于确认得到第一密钥,且所述第二响应信息还用于确认所述第一连接安全建立成功。
  77. 根据权利要求74或76所述的第一设备,其中,所述第二指示信息还携带所述第二请求信息的第二确认信息;所述第二请求信息的第二确认信息用于确认与第二设备完成建立第一连接。
  78. 根据权利要求74或76所述的第一设备,其中,所述第一通信单元,用于在第一处理单元基于所述密钥生成参数,生成第一密钥之前,向接入网设备发送第二请求信息的第二确认信息,所述第二请求信息的第二确认信息用于确认与第二设备完成建立第一连接,所述第二请求信息的第一确认信息由第五RRC消息携带。
  79. 根据权利要求59-78任一项所述的第一设备,其中,所述密钥生成参数,包括以下至少之一:所述第二设备的相关信息、随机数、与所述第一连接相关的计数值、所述第一设备与所述接入网设备之间的无线承载RB的相关信息、所述第一设备与所述接入网设备之间的会话标识符。
  80. 根据权利要求79所述的第一设备,其中,所述第一设备与所述接入网设备之间的承载的相关信息,包括以下至少之一:所述第一设备与所述接入网设备之间的数据无线承载DRB的标识;所述第一设备与所述接入网设备之间的信令无线承载SRB的标识。
  81. 根据权利要求59-80任一项所述的第一设备,其中,所述第一设备为远端终端设备;所述第二设备为中继终端设备。
  82. 一种第二设备,包括:
    第二通信单元,用于接收接入网设备发送的第二信息,所述第二信息携带第一密钥;其中,所述第一密钥用于对第一连接传输的数据进行安全性处理;所述第一连接为第一设备与第二设备之间的连接。
  83. 根据权利要求82所述的第二设备,其中,所述第二通信单元,用于接收接入网设备发送的第二信息之后,发送第一指示信息;其中,所述第一指示信息用于指示与第一设备协商第一密钥;接收所述第一设备发送的第一响应信息;其中,所述第一响应信息用于确认生成所述第一密钥。
  84. 根据权利要求83所述的第二设备,其中,所述第二通信单元,用于向第一设备发送所述第一指示信息。
  85. 根据权利要求83所述的第二设备,其中,所述第二信息还携带第一请求信息,所述第一请求信息用于请求建立所述第一连接;
    所述第二通信单元,用于在接收到所述第一设备发送的第一响应信息的情况下,向所述第一设备发送第一请求信息的确认信息;其中,所述第一请求信息的确认信息用于确认所述第一连接安全建立成功。
  86. 根据权利要求85所述的第二设备,其中,所述第二通信单元,用于执行以下之一:
    向接入网设备发送所述第二信息的确认信息;其中,所述第二信息的确认信息携带所述第一指示信息;
    在向所述接入网设备发送所述第二信息的确认信息之后,向所述接入网设备发送所述第一指示信息;
    在向所述接入网设备发送所述第二信息的确认信息之后,向所述第一设备发送所述第一指示信息。
  87. 根据权利要求82所述的第二设备,其中,所述第二通信单元,用于接收第一设备发送的第二指示信息;其中,所述第二指示信息用于指示与第二设备协商第一密钥;
    以及在接收接入网设备发送的第二信息之后,向所述第一设备发送第二响应信息,其中,所述第二响应信息用于确认得到第一密钥。
  88. 根据权利要求87所述的第二设备,其中,所述第二信息还携带第一请求信息,所述第一请求信息用于请求建立所述第一连接;
    所述第二通信单元,用于在向所述第一设备发送第二响应信息的情况下,向所述第一设备发送第一请求信息的确认信息;其中,所述第一请求信息的确认信息用于确认所述第一连接安全建立成功。
  89. 根据权利要求87所述的第二设备,其中,所述第二信息还携带第一请求信息,所述第一请求信息用于请求建立所述第一连接;所述第二响应信息还用于确认所述第一连接安全建立成功。
  90. 根据权利要求87所述的第二设备,其中,所述第二通信单元,用于在接收到第一设备发送的第二指示信息的情况下,向所述接入网设备发送密钥请求信息;接收接入网设备发送的第二信息。
  91. 根据权利要求90所述的第二设备,其中,所述第二指示信息还携带第二请求信息的第二确认信息;所述第二请求信息的第二确认信息用于确认完成建立第一连接;
    所述密钥请求信息携带所述第二请求信息的第二确认信息。
  92. 根据权利要求82-91任一项所述的第二设备,其中,所述第二信息由第六RRC消息携带。
  93. 根据权利要求82-93任一项所述的第二设备,其中,所述第一设备为远端终端设备;所述第二设备为中继终端设备。
  94. 一种接入网设备,包括:
    第三通信单元,用于向第一设备发送第一信息,以及向第二设备发送第二信息;其中,所述第一信息携带密钥生成参数,所述密钥生成参数用于生成第一密钥;所述第一密钥用于对第一连接上传输的数据进行安全性处理;所述第一连接为第一设备与第二设备之间的连接。
  95. 根据权利要求94所述的接入网设备,其中,所述第三通信单元,用于向第一设备发送第一信息,以及向第二设备发送第二信息之前,接收所述第一设备发送的第一请求信息;其中,所述第一请求信息用于请求建立所述第一连接。
  96. 根据权利要求95所述的接入网设备,其中,所述第一请求信息中携带所述第二设备的相关信息。
  97. 根据权利要求95或96所述的接入网设备,其中,所述接入网设备,还包括:
    第三处理单元,用于在第三通信单元接收到所述第一设备发送的第一请求信息之后,生成所述第一密钥;
    所述第三通信单元,用于在第三处理单元生成所述第一密钥的情况下,向所述第二设备发送所述第二信息。
  98. 根据权利要求97所述的接入网设备,其中,所述第二信息还携带所述第一请求信息。
  99. 根据权利要求97或98所述的接入网设备,其中,所述第三通信单元,用于向第二设备发送第二信息之后,接收所述第二设备发送的第一指示信息;其中,所述第一指示信息用于指示与第一设备协商第一密钥。
  100. 根据权利要求99所述的接入网设备,其中,所述第三通信单元,用于执行以下之一:
    接收所述第二设备发送的第二信息的确认信息,所述第二信息的确认信息携带所述第一指示信息;
    接收所述第二设备发送的第二信息的确认信息之后,接收所述第二设备发送的所述第一指示信息。
  101. 根据权利要求99或100所述的接入网设备,其中,所述第三通信单元,用于在接收到所述第二设备发送的第一指示信息的情况下,向所述第一设备发送第一信息,所述第一信息携带所述第一指示信息。
  102. 根据权利要求99或100所述的接入网设备,其中,所述第三通信单元,用于在接收到所述第二设备发送的第一指示信息的情况下,向所述第一设备发送所述第一指示信息。
  103. 根据权利要求95-102任一项所述的接入网设备,其中,所述第一请求信息由第一RRC消息携带;所述第一信息由第二RRC消息携带。
  104. 根据权利要求94所述的接入网设备,其中,所述第一信息还携带第二请求信息,所述第二请求信息用于请求建立所述第一连接。
  105. 根据权利要求104所述的接入网设备,其中,所述第一信息还携带所述第二设备的相关信息。
  106. 根据权利要求104或105所述的接入网设备,其中,所述第一信息由第三RRC消息携带。
  107. 根据权利要求104-106任一项所述的接入网设备,其中,所述第三通信单元,用于接收所述第一设备发送的第二请求信息的第一确认信息;所述第二请求信息的第一确认信息用于确认所述第一连接安全建立成功,所述第二请求信息的第一确认信息由第四RRC消息携带。
  108. 根据权利要求104-106任一项所述的接入网设备,其中,所述第三通信单元,用于向第一设备发送第一信息;接收第二设备发送的密钥请求信息;向所述第二设备发送所述第二信息。
  109. 根据权利要求108所述的接入网设备,其中,所述密钥请求信息携带所述第二请求信息的第二确认信息;所述第二请求信息的第二确认信息用于确认与第二设备完成建立第一连接。
  110. 根据权利要求109所述的接入网设备,其中,所述第三通信单元,用于接收第二设备发送的密钥请求信息之前,接收所述第一设备发送的第二请求信息的第二确认信息,所述第二请求信息的第二确认信息用于确认与第二设备完成建立第一连接;所述第二请求信息的第二确认信息由第五RRC消息携带。
  111. 根据权利要求94-110任一项所述的接入网设备,其中,所述第二信息由第六RRC消息携带。
  112. 根据权利要求104-110任一项所述的接入网设备,其中,所述接入网设备,还包括:
    第三处理单元,用于在第三通信单元向所述第二设备发送所述第二信息之前,生成所述第一密钥。
  113. 根据权利要求94或112所述的接入网设备,其中,所述第三处理单元,用于基于所述密钥生成参数以及第二密钥,生成所述第一密钥;其中,所述第二密钥用于对第二连接上传输的数据进行安全性处理;所述第二连接为所述第一设备与接入网设备之间的连接。
  114. 根据权利要求94-113任一项所述的接入网设备,其中,所述密钥生成参数,包括以下至少之一:所述第二设备的相关信息、随机数、与所述第一连接相关的计数值、所述第一设备与所述接入网设备之间的无线承载RB的相关信息、所述第一设备与所述接入网设备之间的会话标识符。
  115. 根据权利要求114所述的接入网设备,其中,所述第一设备与所述接入网设备之间的承载的相关信息,包括以下至少之一:所述第一设备与所述接入网设备之间的数据无线承载DRB的标识;所述第一设备与所述接入网设备之间的信令无线承载SRB的标识。
  116. 根据权利要求94-115任一项所述的接入网设备,其中,所述第一设备为远端终端设备;所述第二设备为中继终端设备。
  117. 一种第一设备,包括:处理器和存储器,该存储器用于存储计算机程序,所述处理器用于调用并运行所述存储器中存储的计算机程序,以使所述第一设备执行如权利要求1至23中任一项所述的方法。
  118. 一种第二设备,包括:处理器和存储器,该存储器用于存储计算机程序,所述处理器用于调用并运行所述存储器中存储的计算机程序,以使所述第二设备执行如权利要求24至35中任一项所述的方法。
  119. 一种接入网设备,包括:处理器和存储器,该存储器用于存储计算机程序,所述处理器用于调用并运行所述存储器中存储的计算机程序,以使所述接入网设备执行如权利要求36至58中任一项所述的方法。
  120. 一种芯片,包括:处理器,用于从存储器中调用并运行计算机程序,使得安装有所述芯片的设备执行如权利要求1至23、或权利要求24至35、或权利要求36至58中任一项所述的方法。
  121. 一种计算机可读存储介质,用于存储计算机程序,当所述计算机程序被设备运行时使得所述设备执行如权利要求1至23、或权利要求24至35、或权利要求36至58中任一项所述的方法。
  122. 一种计算机程序产品,包括计算机程序指令,该计算机程序指令使得计算机执行如权利要求1至23、或权利要求24至35、或权利要求36至58中任一项所述的方法。
  123. 一种计算机程序,所述计算机程序使得计算机执行如权利要求1至23、或权利要求24至35、或权利要求36至58中任一项所述的方法。
PCT/CN2022/130434 2022-11-07 2022-11-07 通信方法和设备 WO2024098222A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2022/130434 WO2024098222A1 (zh) 2022-11-07 2022-11-07 通信方法和设备

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2022/130434 WO2024098222A1 (zh) 2022-11-07 2022-11-07 通信方法和设备

Publications (1)

Publication Number Publication Date
WO2024098222A1 true WO2024098222A1 (zh) 2024-05-16

Family

ID=91031702

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/130434 WO2024098222A1 (zh) 2022-11-07 2022-11-07 通信方法和设备

Country Status (1)

Country Link
WO (1) WO2024098222A1 (zh)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150092942A1 (en) * 2013-01-30 2015-04-02 Telefonaktiebolaget L M Ericsson (Publ) Security Key Generation for Dual Connectivity
CN113038628A (zh) * 2019-12-09 2021-06-25 维沃移动通信有限公司 中继参数的配置方法、终端设备和网络侧设备
CN115022850A (zh) * 2022-05-27 2022-09-06 中国电信股份有限公司 一种d2d通信的认证方法、装置、系统、电子设备及介质

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150092942A1 (en) * 2013-01-30 2015-04-02 Telefonaktiebolaget L M Ericsson (Publ) Security Key Generation for Dual Connectivity
CN113038628A (zh) * 2019-12-09 2021-06-25 维沃移动通信有限公司 中继参数的配置方法、终端设备和网络侧设备
CN115022850A (zh) * 2022-05-27 2022-09-06 中国电信股份有限公司 一种d2d通信的认证方法、装置、系统、电子设备及介质

Similar Documents

Publication Publication Date Title
WO2019080800A1 (zh) 一种信息传输方法和设备
CN109417695A (zh) 一种通信路径转换方法及设备
JP2022544813A (ja) ページング方法および装置
EP3059993B1 (en) Method, base station and terminal for controlling link in cooperative communication
WO2021185350A1 (zh) 一种通信方法、接入网设备、终端设备和核心网设备
EP3393173B1 (en) Terminal device and access network devices
CN116746085A (zh) 传输数据的方法和装置
US20230107139A1 (en) Relay discovery method and terminal
WO2024098222A1 (zh) 通信方法和设备
WO2022160303A1 (zh) 服务质量参数处理方法、终端设备、网络功能实体和网络设备
WO2021189368A1 (zh) 上报释放辅小区组的方法和终端设备
WO2021195894A1 (zh) 完整性保护方法和通信设备
CN116530198A (zh) 一种数据传输方法、终端设备和网络设备
WO2024119491A1 (zh) 无线通信的方法、终端设备和中继节点
WO2022032594A1 (zh) 中继通信的方法及设备
US11924893B2 (en) Method for establishing connection, and terminal device
WO2023150944A1 (zh) 切换方法、终端设备和网络设备
WO2023173405A1 (zh) 中继通信的方法、发起终端、中继终端和目标终端
WO2022174466A1 (zh) 无线通信的方法及终端设备
WO2022099475A1 (zh) 会话管理方法、终端设备和网络设备
WO2024065765A1 (zh) 安全建立的方法、通信方法及装置
WO2022160272A1 (zh) 无线通信的方法、终端设备和网络设备
WO2023184405A1 (zh) 无线通信的方法、网络设备和终端设备
WO2023184257A1 (zh) 无线通信的方法、网络设备和终端设备
WO2023283901A1 (zh) 一种数据传输方法及装置、终端设备、网络设备