WO2024153014A1 - 消息传输方法、装置及设备 - Google Patents
消息传输方法、装置及设备 Download PDFInfo
- Publication number
- WO2024153014A1 WO2024153014A1 PCT/CN2024/072233 CN2024072233W WO2024153014A1 WO 2024153014 A1 WO2024153014 A1 WO 2024153014A1 CN 2024072233 W CN2024072233 W CN 2024072233W WO 2024153014 A1 WO2024153014 A1 WO 2024153014A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- layer
- target
- content
- mac
- security
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 118
- 230000005540 biological transmission Effects 0.000 title claims abstract description 66
- 238000012545 processing Methods 0.000 claims abstract description 197
- 230000011664 signaling Effects 0.000 claims abstract description 99
- 238000004891 communication Methods 0.000 claims abstract description 61
- 238000012795 verification Methods 0.000 claims description 97
- 230000015654 memory Effects 0.000 claims description 30
- 230000006870 function Effects 0.000 description 31
- 238000010586 diagram Methods 0.000 description 15
- 230000000694 effects Effects 0.000 description 9
- 238000007726 management method Methods 0.000 description 9
- 238000012790 confirmation Methods 0.000 description 8
- 238000005516 engineering process Methods 0.000 description 7
- 230000001360 synchronised effect Effects 0.000 description 4
- 238000004590 computer program Methods 0.000 description 3
- 101001121408 Homo sapiens L-amino-acid oxidase Proteins 0.000 description 2
- 102100026388 L-amino-acid oxidase Human genes 0.000 description 2
- 238000013523 data management Methods 0.000 description 2
- 238000013507 mapping Methods 0.000 description 2
- 239000000203 mixture Substances 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 238000012384 transportation and delivery Methods 0.000 description 2
- 101000827703 Homo sapiens Polyphosphoinositide phosphatase Proteins 0.000 description 1
- 102100023591 Polyphosphoinositide phosphatase Human genes 0.000 description 1
- 101100012902 Saccharomyces cerevisiae (strain ATCC 204508 / S288c) FIG2 gene Proteins 0.000 description 1
- 101100233916 Saccharomyces cerevisiae (strain ATCC 204508 / S288c) KAR5 gene Proteins 0.000 description 1
- 230000003190 augmentative effect Effects 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000007599 discharging Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 230000002441 reversible effect Effects 0.000 description 1
- 239000004984 smart glass Substances 0.000 description 1
- 238000005406 washing Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/10—Integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/10—Integrity
- H04W12/106—Packet or message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W80/00—Wireless network protocols or protocol adaptations to wireless operation
- H04W80/02—Data link layer protocols
Definitions
- the present application belongs to the field of communication technology, and specifically relates to a message transmission method, device and equipment.
- the sending end supports secure processing of data and signaling.
- the Packet Data Convergence Protocol (PDCP) layer encrypts and protects the integrity of the received high-level data and signaling, and the PDCP layer at the receiving end performs corresponding decryption and integrity protection verification before submitting it to the high-level layer.
- PDCP Packet Data Convergence Protocol
- the security of communication is relatively poor.
- the embodiments of the present application provide a message transmission method, apparatus and device, which can solve the problem of poor communication security.
- a message transmission method comprising:
- the transmitting end performs security processing on the target content at the target layer, and the target layer includes: a PDCP layer, and/or a protocol layer below the PDCP layer; wherein, in the case where the target layer includes the PDCP layer, the target content includes at least one of data and signaling generated by the PDCP layer; in the case where the target layer includes a protocol layer below the PDCP layer, the target content includes at least one of the following: upper layer or high layer data received by the target layer, upper layer or high layer signaling received by the target layer, and signaling generated by the target layer;
- the sending end sends a target message, and the target message includes the content of the security processing.
- a message transmission method comprising:
- the receiving end receives the target message
- the receiving end performs a security verification operation on the security-processed content at the target layer;
- the content of the security processing includes: the content of the security processing performed by the sending end on the target content at the target layer;
- the target layer includes: a Packet Data Convergence Protocol PDCP layer, and/or a protocol layer below the PDCP layer.
- PDCP Packet Data Convergence Protocol
- a message transmission device including:
- a processing module configured to perform security processing on a target content at a target layer, wherein the target layer includes: a packet data convergence protocol PDCP layer, and/or a protocol layer below the PDCP layer; wherein, in the case where the target layer includes the PDCP layer, the target content includes at least one of data and signaling generated by the PDCP layer; in the case where the target layer includes a protocol layer below the PDCP layer, the target content includes at least one of the following: upper layer or high layer data received by the target layer, upper layer or high layer signaling received by the target layer, and signaling generated by the target layer;
- the sending module is used to send a target message, wherein the target message includes the content of the security processing.
- a message transmission device including:
- a receiving module used for receiving a target message
- a verification module configured to, when the target message includes security-processed content, cause the receiving end to perform a security verification operation on the security-processed content at a target layer;
- the content of the security processing includes: the content of the security processing performed by the sending end on the target content at the target layer;
- the target layer includes: a Packet Data Convergence Protocol PDCP layer, and/or a protocol layer below the PDCP layer.
- PDCP Packet Data Convergence Protocol
- a communication device which includes a processor and a memory, wherein the memory stores a program or instruction that can be run on the processor, and when the program or instruction is executed by the processor, the steps of the message transmission method on the sending end side provided in the embodiment of the present application are implemented, or when the program or instruction is executed by the processor, the steps of the message transmission method on the receiving end side provided in the embodiment of the present application are implemented.
- a communication device comprising a processor and a communication interface, wherein the processor is used to perform security processing on a target content at a target layer, and the target layer includes: a packet data convergence protocol PDCP layer, and/or a protocol layer below the PDCP layer; wherein, in the case where the target layer includes the PDCP layer, the target content includes at least one of data and signaling generated by the PDCP layer; in the case where the target layer includes a protocol layer below the PDCP layer, the target content includes at least one of the following: upper layer or high layer data received by the target layer, upper layer or high layer signaling received by the target layer, and signaling generated by the target layer; the communication interface is used to send a target message, and the target message includes the content of the security processing.
- the processor is used to perform security processing on a target content at a target layer
- the target layer includes: a packet data convergence protocol PDCP layer, and/or a protocol layer below the PDCP layer
- the target content includes at least one of data
- the communication interface is used to receive a target message; the processor is used to perform a security verification operation on the content of the security processing at the target layer by the receiving end when the target message includes the content of the security processing; wherein the content of the security processing includes: the content of the security processing performed by the sending end on the target content at the target layer; the target layer includes: a packet data convergence protocol PDCP layer, and/or a protocol layer below the PDCP layer.
- a message transmission system including: a sending end and a receiving end, the sending end can be used to execute the steps of the message transmission method on the sending end side provided in the embodiment of the present application, and the receiving end can be used to execute the steps of the message transmission method on the receiving end side provided in the embodiment of the present application.
- a readable storage medium on which a program or instruction is stored.
- the program or instruction is executed by a processor, the steps of the message transmission method on the sending end side as provided in the embodiment of the present application are implemented, or the steps of the message transmission method on the receiving end side as provided in the embodiment of the present application are implemented.
- a chip which includes a processor and a communication interface, wherein the communication interface is coupled to the processor, and the processor is used to run a program or instruction to implement a message transmission method on the sending side as provided in an embodiment of the present application, or to implement a message transmission method on the receiving side as provided in an embodiment of the present application.
- a computer program/program product is provided, which is stored in a storage medium, and is executed by at least one processor to implement the steps of the message transmission method on the sending end side as provided in the embodiments of the present application, or the computer program/program product is executed by at least one processor to implement the steps of the message transmission method on the receiving end side as provided in the embodiments of the present application.
- the transmitting end performs security processing on the target content at the target layer
- the target layer includes: a packet data convergence protocol PDCP layer, and/or a protocol layer below the PDCP layer; wherein, in the case where the target layer includes the PDCP layer, the target content includes at least one of the data and signaling generated by the PDCP layer; in the case where the target layer includes the protocol layer below the PDCP layer, the target content includes at least one of the following: upper layer or high layer data received by the target layer, upper layer or high layer signaling received by the target layer, and signaling generated by the target layer; the transmitting end sends a target message, and the target message includes the securely processed content.
- the PDCP layer can perform security processing on at least one of the data and signaling generated by the PDCP layer, and the protocol layer below the PDCP layer can perform security processing on at least one of the received data, received signaling, and generated signaling, thereby improving the security of communication.
- FIG1 is a block diagram of a wireless communication system to which an embodiment of the present application can be applied;
- FIG2 is a flowchart of a message transmission method provided in an embodiment of the present application.
- FIG3 is one of schematic diagrams of a protocol stack provided in an embodiment of the present application.
- FIG4 is a second schematic diagram of a protocol stack provided in an embodiment of the present application.
- FIG5 is one of schematic diagrams of a target message provided in an embodiment of the present application.
- FIG6 is a second schematic diagram of a target message provided in an embodiment of the present application.
- FIG7 is a third schematic diagram of a target message provided in an embodiment of the present application.
- FIG8 is a second flowchart of a message transmission method provided in an embodiment of the present application.
- FIG9 is a structural diagram of a message transmission device provided in an embodiment of the present application.
- FIG10 is a second structural diagram of a message transmission device provided in an embodiment of the present application.
- FIG11 is one of the structural diagrams of a communication device provided in an embodiment of the present application.
- FIG12 is a second structural diagram of a communication device provided in an embodiment of the present application.
- FIG. 13 is a third structural diagram of a communication device provided in an embodiment of the present application.
- first, second, etc. in the specification and claims of the present application are used to distinguish similar objects, and are not used to describe a specific order or sequence. It should be understood that the terms used in this way are interchangeable under appropriate circumstances, so that the embodiments of the present application can be implemented in an order other than those illustrated or described here, and the objects distinguished by “first” and “second” are generally of the same type, and the number of objects is not limited.
- the first object can be one or more.
- “and/or” in the specification and claims represents at least one of the connected objects, and the character “/" generally represents that the objects associated with each other are in an "or” relationship.
- instruction in the specification and claims of this application can be either an explicit instruction or an implicit instruction.
- An explicit instruction can be understood as the sender explicitly informing the receiver of the operation to be performed or the request result in the instruction sent; an implicit instruction can be understood as the receiver making a judgment based on the instruction sent by the sender and determining the operation to be performed or the request result based on the judgment result.
- LTE Long Term Evolution
- LTE-A Long Term Evolution
- CDMA Code Division Multiple Access
- TDMA Time Division Multiple Access
- FDMA Frequency Division Multiple Access
- OFDMA Orthogonal Frequency Division Multiple Access
- SC-FDMA Single-carrier Frequency Division Multiple Access
- NR new radio
- FIG1 shows a block diagram of a wireless communication system applicable to an embodiment of the present application.
- the wireless communication system includes a terminal 11 and a network side device 12 .
- the terminal 11 may be a mobile phone, a tablet computer (Tablet Personal Computer), a laptop computer (Laptop Computer) or a notebook computer, a personal digital assistant (PDA), a handheld computer, a netbook, an ultra-mobile personal computer (UMPC), a mobile Internet device (Mobile Internet Device, MID), an augmented reality (AR)/virtual reality (VR) device, a robot, a wearable device (Wearable Device), a vehicle user equipment (VUE), a pedestrian terminal (Pedestrian User Equipment, PUE), a smart home (a home appliance with wireless communication function, such as a refrigerator, a television, a washing machine or furniture, etc.), a game console, a personal computer (personal computer, PC), a teller machine or a self-service machine and other terminal side devices, and the wearable device includes: a smart watch
- the network side device 12 may include an access network device or a core network device, wherein the access network device may also be referred to as a wireless access network device, a wireless access network (RAN), a wireless access Network function or wireless access network unit.
- Access network equipment may include base stations, wireless local area network (WLAN) access points or wireless fidelity (WiFi) nodes, etc.
- the base station may be called a node B, an evolved node B (eNB), an access point, a base transceiver station (BTS), a radio base station, a radio transceiver, a basic service set (BSS), an extended service set (ESS), a home B node, a home evolved B node, a transmission reception point (TRP) or some other suitable term in the field, as long as the same technical effect is achieved, the base station is not limited to a specific technical vocabulary, it should be noted that in the embodiment of the present application, only the base station in the NR system is used as an example for introduction, and the specific type of the base station is not limited.
- the core network equipment may include but is not limited to at least one of the following: core network node, core network function, mobility management entity (Mobility Management Entity, MME), access mobility management function (Access and Mobility Management Function, AMF), session management function (Session Management Function, SMF), user plane function (User Plane Function, UPF), policy control function (Policy Control Function, PCF), policy and charging rules function unit (Policy and Charging Rules Function, PCRF), edge application service discovery function (Edge Application Server Discovery Function, EASDF), unified data management (Unified Data Management, UDM), unified data storage (Unified Data Repository, UDR), home user server (Home Subscriber Server, HSS), centralized network configuration (CNC), network storage function (Network Repository Function, NRF), network exposure function (Network Exposure Function, NEF), local NEF (Local NEF, or L-NEF), binding support function (Binding Support Function, BSF), application function (Application Function, AF), etc. It should be noted that in
- FIG. 2 is a flow chart of a message transmission method provided in an embodiment of the present application. As shown in FIG. 2, the method includes the following steps:
- Step 201 The transmitting end performs security processing on the target content at the target layer, and the target layer includes: a PDCP layer, and/or a protocol layer below the PDCP layer; wherein, when the target layer includes the PDCP layer, the target content includes at least one of the data and signaling generated by the PDCP layer; when the target layer includes the protocol layer below the PDCP layer, the target content includes at least one of the following: upper layer or high layer data received by the target layer, upper layer or high layer signaling received by the target layer, and signaling generated by the target layer.
- the protocol layer below the above-mentioned PDCP layer may be one or more protocol layers below the above-mentioned PDCP layer.
- the protocol layer below the above-mentioned PDCP layer may include at least one of a media access control (Media Access Control, MAC) layer and a radio link layer control (Radio Link Control, RLC) layer.
- Media Access Control Media Access Control
- RLC Radio Link Control
- the target layer includes: a PDCP layer, and/or a protocol layer below the PDCP layer can be understood as one of the following:
- the target layer includes: a PDCP layer, or a protocol layer below the PDCP layer; or
- the target layers include: the PDCP layer and the protocol layers below the PDCP layer.
- the signaling generated by the above-mentioned PDCP layer may include a PDCP control protocol data unit (Protocol Data Unit, PDU).
- PDU Protocol Data Unit
- the data received by the above-mentioned target layer may be data received by the protocol layer below the PDCP layer, and the data may be data generated by the upper layer; for example: the data received from the upper layer includes signaling generated by the upper layer, and the data serves as the bearer data (payload) of the protocol layer below the PDCP layer.
- the signaling received by the target layer may be signaling received by a protocol layer below the PDCP layer, and the data may be signaling generated by a higher layer.
- the signaling generated by the above-mentioned target layer may be the signaling generated by the protocol layer below the PDCP layer, for example: the RLC control PDU generated by the RLC layer, or the Media Access Control Control Element (MAC CE) generated by the MAC layer.
- the protocol layer below the PDCP layer for example: the RLC control PDU generated by the RLC layer, or the Media Access Control Control Element (MAC CE) generated by the MAC layer.
- MAC CE Media Access Control Control Element
- the PDCP layer performs security processing on signaling generated by the PDCP layer
- the MAC layer performs security processing on signaling generated by the MAC layer, and the MAC layer performs security processing on received data;
- the RLC layer performs security processing on signaling generated by the RLC layer, and the RLC layer performs security processing on received data;
- the PDCP layer performs security processing on signaling generated by the PDCP layer
- the MAC layer performs security processing on signaling generated by the MAC layer
- the MAC layer performs security processing on received data
- the RLC layer performs security processing on signaling generated by the RLC layer
- the PDCP layer performs security processing on signaling generated by the PDCP layer
- the MAC layer performs security processing on signaling generated by the MAC layer
- the RLC layer performs security processing on signaling generated by the RLC layer
- the RLC layer performs security processing on received data
- the MAC layer performs security processing on signaling generated by the MAC layer, the MAC layer performs security processing on received data, and the RLC layer performs security processing on signaling generated by the RLC layer;
- the MAC layer performs security processing on signaling generated by the MAC layer
- the RLC layer performs security processing on signaling generated by the RLC layer
- the RLC layer performs security processing on received data.
- generating may also be referred to as generating.
- the above-mentioned sending end may be a terminal or a network side device, and the corresponding receiving end may be a network side device or a terminal.
- the user plane protocol stack between the transmitter and the receiver may be as shown in FIG. 3, and the control protocol stack between the transmitter and the receiver may be as shown in FIG. 4. It should be noted that FIG. 3 and FIG. 4 are examples only based on the 5G communication system. In the embodiments of the present application, the protocol stack is not limited.
- Step 202 The sending end sends a target message, where the target message includes the security processed content.
- the target message may be a PDU of a target layer, such as a MAC PDU, an RLC PDU, or a PDCP PDU.
- a target layer such as a MAC PDU, an RLC PDU, or a PDCP PDU.
- the target message may be a target layer transport block (Transport Block, TB), such as a MAC TB.
- Transport Block TB
- MAC TB MAC transport block
- the target message may be a message sent to a receiving end, the message including the target layer PDU or TB.
- the security processed content is the content obtained by the security processing in step 201, or the content that has been security processed, or the content after security processing, or the content formed after security processing.
- it includes at least one of the following:
- the above steps can enable the PDCP layer to securely process at least one item of the data and signaling generated by the PDCP layer, and can also enable the protocol layer below the PDCP layer to securely process at least one item of the received data, received signaling, and generated signaling, thereby improving the security of communication.
- the security processing includes at least one of the following:
- the same encryption and integrity protection can be used for different data or signaling, or encryption can be used for some data or signaling and integrity protection can be used for other data or signaling, or multiple data or signaling can be concatenated and then at least one of encryption and integrity protection can be performed on the concatenated content.
- encryption and integrity protection may adopt the encryption and integrity protection defined in the protocol, without limitation thereto.
- communication security can be improved through the above encryption and integrity protection.
- the encrypting includes:
- the integrity protection includes:
- the multiple contents are concatenated, and integrity protection is performed on the concatenated contents.
- the multiple contents may be multiple data, multiple signaling, or at least one data and at least one signaling, such as multiple service data units (SDUs) and multiple control signaling. It should be noted that one of the multiple contents may be data or signaling.
- the SDU may be a PDCP SDU, an RLC SDU, or a MAC SDU.
- the control signaling may be a PDCP control PDU, an RLC control PDU, or a MAC CE.
- the target message further includes:
- a first sub-PDU or a first sub-header wherein the first sub-PDU or the first sub-header is used to indicate at least one of the following:
- the first sub-PDU may be a target layer sub-PDU, such as a MAC sub-PDU (MAC subPDU), an RLC sub-PDU (RLC subPDU), or a PDCP sub-PDU (PDCP subPDU);
- MAC subPDU MAC sub-PDU
- RLC subPDU RLC sub-PDU
- PDCP subPDU PDCP sub-PDU
- the above-mentioned first subheader can be a target layer subheader, such as a MAC subheader, an RLC subheader, or a PDCP subheader.
- a target layer subheader such as a MAC subheader, an RLC subheader, or a PDCP subheader.
- the above-mentioned content that has not been security processed by the target layer may be content that has not been security processed, or may be content that has been security processed by a higher layer.
- the receiving end can determine that the unindicated content is the content that has not been securely processed by the target layer through the first sub-PDU or the first sub-header. In the case where the first sub-PDU or the first sub-header indicates the content that has not been securely processed by the target layer, the receiving end can determine that the unindicated content is the content that has been securely processed through the first sub-PDU or the first sub-header.
- the first sub-PDU or the first sub-header can enable the receiving end to accurately determine the content of the security processing and the content that has not been security processed by the target layer, so that the target layer of the receiving end only needs to perform security verification on the content of the security processing, so as to save the power consumption of the receiving end or the processing complexity of the receiving end.
- the first sub-PDU or the first sub-header indicates at least one of the following through a position of the first sub-PDU or the first sub-header in the target message:
- the first sub-PDU or the first sub-header in the middle position of the target message may indicate that one side of the position is the content that has been securely processed, or indicate that the other side of the position is the content that has not been securely processed by the target layer.
- the content located on the first side of the first sub-PDU or the first sub-header in the target message includes the security processed content
- the content located at the second side of the first sub-PDU or the first sub-header in the target message includes content that has not been security processed
- the first side and the second side are opposite sides.
- the first side is the left side or the target message is located before the first sub-PDU or the first sub-header
- the second side is the right side or the target message is located after the first sub-PDU or the first sub-header
- the first side is the right side or the target message is located after the first sub-PDU or the first sub-header
- the second side is the left side or the target message is located before the first sub-PDU or the first sub-header.
- At least one of the above items may also be indicated in combination with length, for example: indicating that a certain length of content on the first side is the securely processed content, and the length is the length corresponding to the securely processed content.
- At least one of the above items may also be indicated in combination with length, for example: indicating that a certain length of content on the first side is the content after security processing, and the length is the length corresponding to the content after security processing.
- At least one of the above items is indicated in the middle position of the target message by the above first sub-PDU or the first sub-header to indicate which contents/parts of the target message are to be securely processed by the target layer in the receiving end.
- the first sub-PDU or the first sub-header is further used to indicate at least the following: One:
- the first sub-PDU or the first sub-header indicates the length corresponding to the content of the security processing
- at least one of the following is indicated by the position of the first sub-PDU or the first sub-header in the target message and the length corresponding to the content of the security processing:
- the above parameters may include a serial number (Serial Number, SN);
- the above parameters may include a secret key.
- the above encryption can be based on encryption input parameters (serial number, secret key, etc.) to generate a password (bit) stream; use the password (bit) stream and the target content to perform operations to obtain an encrypted data stream; after the receiving end receives the encrypted data stream, it performs corresponding decryption operations to obtain a decrypted data stream.
- encryption input parameters serial number, secret key, etc.
- the above-mentioned integrity protection can refer to obtaining a bit stream of a preset length (such as 32 bits) based on input parameters (serial number, secret key, data to be integrity protected, etc.), which can be called Message Authentication Code-Integrity (MAC-I). Any change in the input parameters may cause changes in the output MAC-I transmission.
- the sender sends MAC-I (called MAC-I-1) together with the integrity-protected data. After receiving it, the receiver calculates based on the integrity-protected data to obtain MAC-I (MAC-I-2). The receiver compares MAC-I-1 and MAC-I-2. If the two are the same, it is considered that the data to be integrity protected is sent by the expected sender and has not been tampered with, that is, it passes the integrity check.
- the parameters used for encryption and the parameters used for integrity protection may be the same or different.
- the serial number used for encryption and the serial number used for integrity protection may be one serial number, that is, only one serial number is carried for both encryption and integrity protection purposes.
- the length corresponding to the above-mentioned securely processed content may be the length of the target content before the secure processing, or the length of the above-mentioned securely processed content, that is, the length after the secure processing. If it is the length before the secure processing, the receiving end may determine the length after the processing according to the protocol provisions.
- first sub-PDU or first sub-header can explicitly or implicitly indicate at least one of the lengths corresponding to the above-mentioned parameters for encryption, parameters for integrity protection, bit streams for integrity protection and security processed contents.
- the first sub-PDU or the first sub-header is used to explicitly indicate: at least one of the parameters for encryption and the parameters for integrity protection; or
- the first sub-PDU or the first sub-header implicitly indicates, through the transmission resources of the target message, at least one of the parameters for encryption and the parameters for integrity protection.
- the first sub-PDU or the first sub-header implicitly indicates the above-mentioned parameter through the transmission resource of the target message, which may be that the first sub-PDU or the first sub-header does not include the above-mentioned parameter, and the resource time position, resource frequency position, or resource time-frequency position of the wireless resource used for the target message transmission is mapped to the above-mentioned parameter, such as mapping the resource time position, resource frequency position, or resource time-frequency position of the wireless resource used for the target message transmission as a sequence number.
- the specific mapping rule may be agreed upon by the protocol or configured on the network side.
- the overhead of the target message can be saved by implicitly indicating the above parameters.
- the first sub-PDU is a first MAC sub-PDU
- the first MAC sub-PDU includes a first MAC CE
- the first MAC CE is a MAC CE used to indicate at least one of the following:
- the first MAC CE may be a newly defined MAC CE, or the first MAC CE may be a MAC CE in a specific format, and the format of the MAC CE may be indicated by a MAC subheader in the first MAC sub-PDU, such as by a logical channel identifier (LCID) in the MAC subheader.
- the receiving end determines, through the MAC subheader in the first MAC sub-PDU, that the first MAC CE is used to indicate at least one of the following:
- the embodiment of the present application does not limit the identification method of the first MAC CE.
- the first MAC CE or the first MAC sub-PDU may be a MAC CE or MAC sub-PDU agreed by the protocol to indicate at least one of the following:
- the first MAC CE is further used to indicate at least one of the following:
- the first MAC CE indicates the length corresponding to the content of the security processing
- the first MAC CE indicates at least one of the following through the length corresponding to the content of the security processing and the position of the first MAC sub-PDU in the target message:
- bit streams and lengths can refer to the corresponding descriptions of the above implementations, and the specific The indication method also refers to the corresponding description of the above implementation mode, which will not be repeated here.
- FIG5 An embodiment is shown in FIG5 , wherein the first MAC sub-PDU is the X MAC subPDU in FIG5 , and the first MAC CE is the X MAC CE in FIG5 .
- the left side of the X MAC subPDU is the part participating in the security processing of the MAC layer, that is, the content of the security processing; the right side of the X MAC subPDU is the part not participating in the security processing of the MAC layer, that is, the content that the MAC layer has not performed security processing.
- the first MAC sub-PDU is the Y MAC subPDU in FIG6
- the first MAC CE is the Y MAC CE in FIG6
- the Y MAC CE includes the length corresponding to the content of security processing, and the length is represented by L.
- the content on the right side of the Y MAC subPDU and having a length of L is the part participating in the security processing of the MAC layer, that is, the content of the security processing mentioned above;
- the content after the specified length (L) on the left side and the right side of the Y MAC subPDU is the part not participating in the security processing of the MAC layer, that is, the content that the MAC layer has not performed security processing.
- Figures 5 and 6 are for illustration only. In the embodiment of the present application, there is no restriction on the target layer PDU and the sub-header composition of the MAC CE (for example, whether it contains the R/F/L domain), and Figures 5 and 6 are only used as an example to illustrate the target layer as the MAC layer.
- the first subheader is a MAC subheader of a second MAC sub-PDU included in the target message, and the second MAC sub-PDU also includes the content of the security processing.
- the MAC subheader may be a newly defined MAC subheader, and the MAC subheader may be in a specific format or carry specific information to indicate that the MAC subheader is used to indicate at least one of the following:
- the receiving end determines, through the format of the MAC subheader or the information carried by the MAC subheader, that the MAC subheader is used to indicate the at least one position.
- the indication can be achieved through the MAC subheader of the second MAC sub-PDU, so there is no need to modify the format of the target message, thereby reducing the complexity of improving communication security.
- the MAC subheader is further used to indicate at least one of the following:
- a length field where the length field is used to indicate the length of the payload part of the second MAC sub-PDU, where the payload part includes the content of the security processing.
- bit streams and lengths can refer to the corresponding descriptions of the above implementation methods, and the specific indication methods can also refer to the corresponding descriptions of the above implementation methods, which will not be repeated here.
- At least one of the above items is indicated by the above MAC subheader.
- the target message may be as shown in FIG. 7, the second MAC sub-PDU is the MAC super sub-PDU (MAC Super subPDU) in FIG. 6, and the MAC sub-header is the MAC super sub-header (MAC super header), the length field can indicate the length of the MAC super subPDU payload, that is, the length of the remaining part of the MAC super subPDU except the subheader. In this way, the receiving end can know which parts of the received MAC PDU need to be securely processed according to the length field.
- Figure 7 is for illustration only. In the embodiment of the present application, there is no restriction on the target layer PDU and the sub-header composition of the MAC CE (for example, whether it contains the R/F/L domain), and Figure 7 only takes the target layer as the MAC layer for example.
- the method further includes:
- the target layer of the transmitting end receives a processing indication, where the processing indication is used to indicate at least one of the following:
- the above processing instruction can be a processing instruction from the high layer to the target layer. For example, when the high layer delivers the high layer PDU to the MAC layer, it instructs the MAC layer whether the PDU to be transmitted needs to be encrypted and/or integrity protected, that is, for data that has been encrypted and/or integrity protected by PDCP, the high layer does not need to instruct the low layer to perform repeated encryption and/or integrity protection.
- the above step 201 may include at least one of the following:
- the content indicated to be required to be securely processed includes the target content, securely processing the target content;
- security processing is performed on the target content.
- the MAC layer when the target layer is the MAC layer, the MAC layer generates a MAC-I for all data to be integrity protected as indicated by higher layers in a MAC PDU/Transport Block (TB) (i.e., not one MAC-I is generated for each higher layer PDU to be integrity protected, so as to reduce protocol overhead); the sending end carries the first sub-PDU or the first sub-header in the MAC PDU/TB to notify the receiving end of the data to be integrity protected and confirmed, so that the receiving end can perform integrity protection verification, or the sending end indicates that the first sub-PDU or the first sub-header is carried in the MAC PDU/TB to notify the receiving end of the data to be encrypted, so that the receiving end can perform decryption.
- TB MAC PDU/Transport Block
- security processing based on the above processing instructions can be implemented, so that only the content of the instructions needs to be fully processed, thereby saving computing overhead, and can also improve the flexibility of security processing at the target layer, that is, the content of security processing at the target layer can be flexibly configured by the above processing instructions.
- target content may also be pre-configured on the protocol or network side.
- the target layer includes: at least one of the following: a MAC layer, an RLC layer;
- the target message includes a MAC PDU or a MAC transport block TB;
- the target message includes RLC PDU.
- security processing can be implemented in at least one of the MAC layer and the RLC layer.
- the MAC layer performs security processing on the received data and signaling, as well as the signaling generated by the MAC layer.
- the RLC layer performs security processing on the received data and signaling, as well as the signaling generated by the MAC layer. Securely process received data and signaling, as well as signaling generated by the RLC layer.
- the target content includes at least one of the following:
- the MAC SDU includes: at least one of data received by the MAC layer and signaling received by the MAC;
- the second MAC CE is the signaling generated by the MAC layer.
- the above-mentioned MAC SDU can be one or more MAC SDUs
- the above-mentioned second MAC CE can be one or more MAC CEs.
- the target content includes at least one of the above items, which can be understood as the type of the target content including at least one of the following items:
- MAC sub-PDU corresponding to MAC SDU MAC sub-PDU corresponding to the second MAC CE.
- the MAC layer may have the following behaviors:
- security processing can be performed on at least one of the MAC sub-PDU corresponding to the MAC SDU and the MAC sub-PDU corresponding to the second MAC CE to improve communication security.
- the target message may include the following content:
- the target content the target layer content that has not been security processed, and the first sub-PDU or the first sub-header.
- the transmitting end performs security processing on the target content at the target layer
- the target layer includes: a packet data convergence protocol PDCP layer, and/or a protocol layer below the PDCP layer; wherein, in the case where the target layer includes the PDCP layer, the target content includes at least one of the data and signaling generated by the PDCP layer; in the case where the target layer includes the protocol layer below the PDCP layer, the target content includes at least one of the following: upper layer or high layer data received by the target layer, upper layer or high layer signaling received by the target layer, and signaling generated by the target layer; the transmitting end sends a target message, and the target message includes the securely processed content.
- the PDCP layer can perform security processing on at least one of the data and signaling generated by the PDCP layer, and the protocol layer below the PDCP layer can perform security processing on at least one of the received data, received signaling, and generated signaling, thereby improving the security of communication.
- FIG. 8 is a flowchart of a message transmission method provided in an embodiment of the present application. As shown in FIG. 8, the method includes the following steps:
- Step 801 The receiving end receives the target message
- Step 802 When the target message includes security-processed content, the receiving end performs a security verification operation on the security-processed content at the target layer;
- the content of the security processing includes: the content of the security processing performed by the sending end on the target content at the target layer;
- the target layer includes: a Packet Data Convergence Protocol PDCP layer, and/or a protocol layer below the PDCP layer.
- PDCP Packet Data Convergence Protocol
- the method further comprises at least one of the following:
- the target layer of the receiving end discards the content of the security processing
- the target layer of the receiving end delivers the first content obtained by the security verification operation to a higher layer.
- the above security verification operation indicates that a security verification failure may be an integrity protection verification failure.
- the target layer of the receiving end discards the content of the security processing when the security verification operation indicates that the security verification has failed, this can avoid the target layer from submitting the content of the target layer security verification failure to the upper layer, thereby further improving the communication security.
- the method further comprises at least one of the following:
- the target layer of the receiving end notifies the higher layer that the content has failed the security verification
- the target layer of the receiving end delivers the content obtained by the security verification operation to the higher layer
- the target layer of the receiving end notifies the higher layer that the content obtained by the security verification operation has passed the security verification.
- the above notification can improve the interaction performance between the protocol layers in the receiving end.
- the MAC layer of the receiving end performs decryption and/or integrity protection confirmation according to the first sub-PDU or the first sub-header in the TB; and submits the processed data that has passed the integrity protection confirmation to the upper layer, and notifies the upper layer that the data has been decrypted and/or passed the integrity protection confirmation.
- the MAC layer notifies the upper layer, such as: notifying the RLC, PDCP, Radio Resource Control (RRC) layer that one or more layers of integrity protection verification have failed.
- RRC Radio Resource Control
- the method further comprises:
- the target layer of the receiving end submits the second content that has not been security-verified by the target layer to the higher layer;
- the upper layer of the receiving end discards the second content delivered by the target layer, where the second content requires security verification by the target layer.
- the second content may be content known by the higher layer that requires security verification by the target layer, such as content determined by the higher layer through a protocol or network-side configuration that requires security verification by the target layer.
- the upper layer of the receiving end discards the second content submitted by the target layer, which can further improve the communication security.
- the sending end is malicious, and it sends a tampered PDCP control PDU (encapsulated into RLC PDU and transmitted to MAC), but its MAC indication message indicates to the receiving end that the high-level SDU does not need bottom-level security.
- the receiving end MAC will assume that the high-level SDU has been processed by high-level security and will be directly handed over to the upper layer without verification.
- the receiving end PDCP finds that this control PDU does not have the security protection of the PDCP layer and has not undergone bottom-level security verification, and is problematic (i.e., it has not passed the security authentication at all), so it will be discarded.
- the security processing includes at least one of the following:
- the security verification operation includes at least one of the following:
- the target message further includes:
- a first sub-protocol data unit PDU or a first sub-header wherein the first sub-PDU or the first sub-header is used to indicate at least one of the following:
- the receiving end performs a security verification operation on the security-processed content at the target layer, including:
- the receiving end determines that the target message includes security-processed content based on the first PDU or the first subheader, the receiving end performs a security verification operation on the security-processed content at the target layer.
- the first sub-PDU or the first sub-header indicates at least one of the following through a position of the first sub-PDU or the first sub-header in the target message:
- the content located on the first side of the first sub-PDU or the first sub-header in the target message includes the security processed content
- the content located at the second side of the first sub-PDU or the first sub-header in the target message includes content that has not been security processed
- the first side and the second side are opposite sides.
- the first sub-PDU or the first sub-header is further used to indicate at least one of the following:
- the receiving end determines that the target message includes security-processed content based on the first PDU or the first subheader, the receiving end performs a security verification operation on the security-processed content at the target layer, including:
- the receiving end determines that the target message includes security-processed content based on the first PDU or the first subheader, and determines that the security-processed content is located in the target message based on the first PDU or the first subheader, the receiving end performs a security verification operation on the security-processed content at the target layer based on at least one of the parameters for encryption, the parameters for integrity protection, and the bit stream for integrity protection; wherein, when the first sub-PDU or the first subheader indicates the length corresponding to the security-processed content
- the receiving end determines the position of the security processed content in the target message through the position of the first sub-PDU or the first sub-header in the target message and the length corresponding to the security processed content.
- the first sub-PDU is a first media access control MAC sub-protocol data unit PDU
- the first MAC sub-PDU includes a first MAC control element CE
- the first MAC CE is a new MAC CE for indicating at least one of the following:
- the first MAC CE indicates the length corresponding to the content of the security processing
- the first MAC CE indicates at least one of the following through the length corresponding to the content of the security processing and the position of the first MAC sub-PDU in the target message:
- the first subheader is a MAC subheader of a second MAC sub-PDU included in the target message, and the second MAC sub-PDU also includes the content of the security processing.
- the MAC subheader is further used to indicate at least one of the following:
- a length field where the length field is used to indicate the length of the payload part of the second MAC sub-PDU, where the payload part includes the content of the security processing.
- the target layer includes at least one of the following: a MAC layer and an RLC layer;
- the target message includes a MAC PDU or a MAC transport block TB;
- the target message includes RLC PDU.
- the target content includes at least one of the following: a MAC sub-PDU corresponding to a MAC service data unit SDU, and a MAC sub-PDU corresponding to a second MAC CE;
- the MAC SDU includes: at least one of data received by the MAC layer of the transmitting end and signaling received by the MAC;
- the second MAC CE is the signaling generated by the MAC layer of the sending end.
- this embodiment is an implementation method of the receiving end corresponding to the embodiment shown in FIG.
- the implementation method of the embodiment can refer to the relevant description of the embodiment shown in FIG. 2 , and in order to avoid repeated description, this embodiment will not be described in detail.
- the high layer indicates to the MAC layer the data that needs to be processed securely, specifically as follows:
- the MAC layer at the transmitting end receives the high-level PDU and is also instructed whether the PDU needs to be processed securely, such as:
- the security processing refers to encryption and/or integrity protection; the higher layer may indicate to enable encryption or integrity protection separately;
- the high-level PDU that does not require security processing includes: the PDU corresponding to the data that has been encrypted and/or integrity protected by the PDCP layer, wherein the corresponding PDU refers to the PDU containing: the data that has been encrypted and/or integrity protected by the PDCP layer; or the high-level PDU that requires security processing includes: the PDU corresponding to the data that has not been encrypted and/or integrity protected by the PDCP layer, wherein the corresponding PDU refers to the data contained in the PDU: which has not been processed by the PDCP layer or has not been encrypted and/or integrity protected by the PDCP.
- the MAC layer generates a MAC-I (separated by a specific MAC CE) based on a higher layer indication, as follows:
- Step 1 For each MAC SDU X delivered by the higher layer and received by the MAC layer at the transmitting end, the higher layer indicates whether MAC SDU X needs to participate in MAC layer security processing;
- Step 2 The sending MAC layer generates a MAC PDU, including the following operations:
- E. Use X MAC subPDU to separate the data processed in C from other MAC subPDUs that have not been processed securely.
- the left side of X MAC subPDU is the part that participates in the MAC layer security processing; the right side of X MAC subPDU is the part that does not participate in the MAC layer security processing.
- the receiver can determine which parts of the received MAC PDU need to be securely processed: decryption and/or integrity verification by identifying the newly defined specific MAC CE.
- X MAC CE may contain one or more of the following information:
- the resource time position, or resource frequency position, or resource time-frequency position of the wireless resources used for transmission through the MAC PDU can be mapped to the SN (i.e., implicitly carried).
- the MAC layer generates a MAC-I (via a MAC super subPDU) based on the higher layer indication, as follows:
- Step 1 For each MAC SDU X delivered by the higher layer and received by the MAC layer at the transmitting end, the higher layer indicates whether MAC SDU X needs to participate in MAC layer security processing;
- Step 2 The sending MAC layer generates a MAC PDU, including the following operations:
- the super header contains one or more of the following information:
- Length field the length of the MAC super subPDU payload (i.e. the remaining part of the MAC super subPDU excluding the subheader).
- the receiver can know which parts of the received MAC PDU need to be securely processed based on the length field: that is, decryption and/or integrity verification.
- the resource time position, or resource frequency position, or resource time-frequency position of the wireless resources used for transmission through the MAC PDU can be mapped to the SN (i.e., implicitly carried).
- MAC Super subPDU can be located at the head of MAC PDU or after other MAC subPDUs without restriction.
- the MAC layer generates a MAC-I based on a higher layer indication (indicated by a MAC CE), as follows:
- Step 1 For each MAC SDU X delivered by the higher layer and received by the MAC layer at the transmitting end, the higher layer indicates whether MAC SDU X needs to participate in MAC layer security processing;
- Step 2 The sending MAC layer generates a MAC PDU, including the following operations:
- the Y MAC subPDU is located before the data processed in C. As shown in Figure 6, the data after/to the right of the Y MAC subPDU is the data for the MAC layer to provide security services, and the length is L (indicated by the Y MAC CE); the other parts in the MAC PDU are the parts that do not participate in the MAC layer security processing.
- the receiver knows which parts of the received MAC PDU need to be processed securely: i.e. decryption and/or integrity verification.
- Y MAC CE may include one or more of the following information:
- the length of the data for which security services are provided by the MAC layer is the length of the data for which security services are provided by the MAC layer.
- the resource time position, or resource frequency position, or resource time-frequency position of the wireless resources used for transmission through the MAC PDU can be mapped to the SN (i.e., implicitly carried).
- the MAC subPDU corresponding to Y MAC CE can be the first MAC subPDU of the MAC PDU, or it can be located after other MAC subPDUs, without any restriction.
- This embodiment mainly describes the operation of the receiving end, which is as follows:
- Step 1 The MAC layer at the receiving end starts integrity protection verification and/or decryption according to the high-level configuration and/or network-side configuration;
- Step 2 The receiving end receives a MAC PDU and identifies the part for MAC security protection based on the content in the MAC PDU; including:
- Step 3 If decryption is enabled, the receiving end performs decryption
- Step 4 If integrity protection verification is enabled, the receiving end performs integrity protection verification
- Step 5 Submit the high-level data that has completed decryption and/or integrity verification to the high-level layer, and notify the high-level layer of the security operations completed by the MAC layer, such as notifying the high-level layer that the decryption of the MAC SDU has been completed, or notifying the high-level layer that the integrity protection confirmation of the MAC SDU has been completed, or notifying the high-level layer that the integrity protection confirmation and decryption of the MAC SDU have been completed;
- step 5 by notifying the upper layer, the following problems can be avoided:
- the sender is an attacker and sends a PDCP control PDU to the receiver. Since it does not have the integrity protection key, it does not start the underlying security measures (such as integrity protection).
- the receiving MAC will think that the corresponding subPDU in the MAC PDU does not need to start MAC integrity confirmation (that is, the integrity protection is verified by the upper layer); therefore, the MAC layer delivers the data packet without verified integrity protection to the upper layer; when the data packet is processed and reaches PDCP, if PDCP thinks that the control PDU has been verified at the MAC layer; it will cause the PDCP control PDU without verified integrity protection to be applied by the receiving end, causing security risks.
- Step 6 For the received MAC CE: If the MAC CE is not protected, or is unrecognizable, or the integrity verification fails, the MAC CE is discarded.
- the target layer is the RLC layer
- the implementation method of the RLC layer can refer to the implementation method of the MAC, which will not be repeated here.
- the bottom layer starts the bottom layer security (encryption and/or integrity protection) for the high-layer data packet based on the high-layer instruction;
- the underlying layer identifies the data blocks that have been subjected to underlying security processing (encryption and/or integrity protection) so that the receiving end can determine the data blocks that need to be subjected to security processing (decryption and/or integrity protection confirmation);
- the receiving end identifies the part of the received data that has been subjected to the underlying security operation, and performs the corresponding underlying security decryption operation;
- Receiver Identify the part of the received data that needs to be secured at the bottom layer. If the data block fails to pass the integrity protection verification, the bottom layer directly discards it. Optionally, notify the upper layer that a data packet fails the integrity protection verification.
- Receiver For data blocks that have passed integrity protection verification, the lower layer processes them and submits them to the upper layer, notifying the upper layer that the data block has passed integrity protection verification;
- the receiving end For the part of the received data that has not undergone the underlying security operation, after performing other processing specified by the protocol layer that does not include the security operation, it submits it to the upper layer and notifies the upper layer that integrity protection verification is not enabled for this data block;
- the upper layer determines whether the lower layer integrity protection verification is required and has passed. If it is required but fails to pass the lower layer integrity protection verification, the upper layer discards the data packet.
- security functions can be provided at the bottom layer (such as MAC layer, RLC layer) to realize security protection of PDCP/RLC control PDU and MAC CE.
- FIG. 9 is a structural diagram of a message transmission device provided in an embodiment of the present application.
- the message transmission device 900 includes:
- the processing module 901 is used to perform security processing on the target content at the target layer, wherein the target layer includes: a packet data convergence protocol PDCP layer, and/or a protocol layer below the PDCP layer; wherein, in the case where the target layer includes the PDCP layer, the target content includes at least one of data and signaling generated by the PDCP layer; in the case where the target layer includes a protocol layer below the PDCP layer, the target content includes at least one of the following: upper layer or high layer data received by the target layer, upper layer or high layer signaling received by the target layer, and signaling generated by the target layer;
- the sending module 902 is used to send a target message, where the target message includes the security processed content.
- the security processing includes at least one of the following:
- the encrypting includes:
- the integrity protection includes:
- the multiple contents are concatenated, and integrity protection is performed on the concatenated contents.
- the target message further includes:
- a first sub-protocol data unit PDU or a first sub-header wherein the first sub-PDU or the first sub-header is used to indicate at least one of the following:
- the first sub-PDU or the first sub-header indicates at least one of the following through a position of the first sub-PDU or the first sub-header in the target message:
- the content located on the first side of the first sub-PDU or the first sub-header in the target message includes the security processed content
- the content located at the second side of the first sub-PDU or the first sub-header in the target message includes content that has not been security processed
- the first side and the second side are opposite sides.
- the first sub-PDU or the first sub-header is further used to indicate at least one of the following:
- the first sub-PDU or the first sub-header indicates the length corresponding to the content of the security processing
- at least one of the following is indicated by the position of the first sub-PDU or the first sub-header in the target message and the length corresponding to the content of the security processing:
- the first sub-PDU or the first sub-header is used to explicitly indicate: at least one of the parameters for encryption and the parameters for integrity protection; or
- the first sub-PDU or the first sub-header implicitly indicates, through the transmission resources of the target message, at least one of the parameters for encryption and the parameters for integrity protection.
- the parameters include: a serial number.
- the first sub-PDU is a first media access control MAC sub-protocol data unit PDU
- the first MAC sub-PDU includes a first MAC control element CE
- the first MAC CE is a MAC CE used to indicate at least one of the following:
- the first MAC CE is further used to indicate at least one of the following:
- the first MAC CE indicates the length corresponding to the content of the security processing
- the first MAC CE indicates at least one of the following through the length corresponding to the content of the security processing and the position of the first MAC sub-PDU in the target message:
- the first subheader is a MAC subheader of a second MAC sub-PDU included in the target message, and the second MAC sub-PDU also includes the content of the security processing.
- the MAC subheader is further used to indicate at least one of the following:
- a length field where the length field is used to indicate the length of the payload part of the second MAC sub-PDU, where the payload part includes the content of the security processing.
- the device further comprises:
- a receiving module configured for the target layer to receive a processing instruction, wherein the processing instruction is used to indicate at least one of the following:
- the target layer includes at least one of the following: a MAC layer and an RLC layer;
- the target message includes a MAC PDU or a MAC transport block TB;
- the target message includes RLC PDU.
- the target content includes at least one of the following:
- the MAC SDU includes: at least one of data received by the MAC layer and signaling received by the MAC;
- the second MAC CE is the signaling generated by the MAC layer.
- the message transmission device can improve the security of communication.
- the resource indication device in the embodiment of the present application may be an electronic device, such as an electronic device with an operating system, or a component in an electronic device, such as an integrated circuit or a chip.
- the terminal may include but is not limited to the types of terminals listed in the embodiments of the present application, and the other devices may be servers, network attached storage (Network Attached Storage, NAS), etc., which are not specifically limited in the embodiments of the present application.
- NAS Network Attached Storage
- the message transmission device provided in the embodiment of the present application can implement each process implemented by the method embodiment shown in Figure 2 and achieve the same technical effect. To avoid repetition, it will not be repeated here.
- FIG. 10 is a structural diagram of a message transmission device provided in an embodiment of the present application.
- the message transmission device 1000 includes:
- Verification module 1002 configured to, when the target message includes security-processed content, perform security verification operation on the security-processed content at the target layer by the receiving end;
- the content of the security processing includes: the content of the security processing performed by the sending end on the target content at the target layer;
- the target layer includes: a Packet Data Convergence Protocol PDCP layer, and/or a protocol layer below the PDCP layer.
- PDCP Packet Data Convergence Protocol
- the device further comprises at least one of the following:
- a first discarding module configured to, when the security verification operation indicates that the security verification fails, cause the target layer of the receiving end to discard the security processed content
- the first delivery module is used for the target layer of the receiving end to deliver the first content obtained by the security verification operation to the higher layer.
- the device further comprises at least one of the following:
- a first notification module configured to cause the target layer of the receiving end to notify a higher layer that the content has failed security verification when the receiving end discards the content carried in the target message
- the second notification module is used for, when the target layer of the receiving end submits the content obtained by the security verification operation to the higher layer, the target layer of the receiving end notifies the higher layer that the content obtained by the security verification operation has passed the security verification.
- the device further comprises:
- a second delivery module configured to deliver, when the target layer determines that the target message includes content that has not been security-processed, the target layer of the receiving end to a higher layer the second content that has not been security-verified by the target layer;
- the second discarding module is used for the upper layer of the receiving end to discard the second content delivered by the target layer, where the second content requires security verification by the target layer.
- the security processing includes at least one of the following:
- the security verification operation includes at least one of the following:
- the target message further includes:
- the verification module 1002 is used for: when the receiving end determines that the target message includes security-processed content based on the first PDU or the first subheader, the receiving end performs a security verification operation on the security-processed content at the target layer.
- the first sub-PDU or the first sub-header indicates at least one of the following through a position of the first sub-PDU or the first sub-header in the target message:
- the content located on the first side of the first sub-PDU or the first sub-header in the target message includes the security processed content
- the content located at the second side of the first sub-PDU or the first sub-header in the target message includes content that has not been security processed
- the first side and the second side are opposite sides.
- the first sub-PDU or the first sub-header is further used to indicate at least one of the following:
- the verification module 1002 is used for: when the receiving end determines that the target message includes security processed content based on the first PDU or the first subheader, and determines the position of the security processed content in the target message based on the first PDU or the first subheader, the receiving end performs a security verification operation on the security processed content at the target layer based on at least one of the parameters for encryption, the parameters for integrity protection, and the bit stream for integrity protection; wherein, when the first sub-PDU or the first subheader indicates the length corresponding to the security processed content, the receiving end determines the position of the security processed content in the target message through the position of the first sub-PDU or the first subheader in the target message, and the length corresponding to the security processed content.
- the first sub-PDU is a first media access control MAC sub-protocol data unit PDU
- the first MAC sub-PDU includes a first MAC control element CE
- the first MAC CE is a new MAC CE for indicating at least one of the following:
- the first MAC CE is further used to indicate at least one of the following:
- the first MAC CE indicates the length corresponding to the content of the security processing
- the first MAC CE indicates at least one of the following through the length corresponding to the content of the security processing and the position of the first MAC sub-PDU in the target message:
- the first subheader is a MAC subheader of a second MAC sub-PDU included in the target message, and the second MAC sub-PDU also includes the content of the security processing.
- the MAC subheader is further used to indicate at least one of the following:
- a length field where the length field is used to indicate the length of the payload part of the second MAC sub-PDU, where the payload part includes the content of the security processing.
- the target layer includes at least one of the following: a MAC layer and an RLC layer;
- the target message includes a MAC PDU or a MAC transport block TB;
- the target message includes RLC PDU.
- the target content includes at least one of the following: a MAC sub-PDU corresponding to a MAC service data unit SDU, and a MAC sub-PDU corresponding to a second MAC CE;
- the MAC SDU includes: at least one of data received by the MAC layer of the transmitting end and signaling received by the MAC;
- the second MAC CE is the signaling generated by the MAC layer of the sending end.
- the message transmission device can improve the security of communication.
- the message transmission device in the embodiment of the present application may be an electronic device, such as an electronic device with an operating system, or a component in the electronic device, such as an integrated circuit or a chip.
- the electronic device may be a terminal or a network side device.
- the message transmission device provided in the embodiment of the present application can implement each process implemented by the method embodiment shown in Figure 8 and achieve the same technical effect. To avoid repetition, it will not be repeated here.
- an embodiment of the present application further provides a communication device 1100, including a processor 1101 and a memory 1102, wherein the memory 1102 stores a program or instruction that can be run on the processor 1101.
- the communication device 1100 is a transmitting end
- the program or instruction is executed by the processor 1101 to implement the various steps of the message transmission method embodiment of the transmitting end side, and can achieve the same technical effect.
- the communication device 1100 is a receiving end
- the program or instruction is executed by the processor 1101 to implement the various steps of the message transmission method embodiment of the receiving end. And the same technical effect can be achieved, so in order to avoid repetition, it will not be described here.
- the embodiment of the present application also provides a communication device, including a processor and a communication interface, wherein the processor is used to perform security processing on the target content at the target layer, and the target layer includes: a packet data convergence protocol PDCP layer, and/or a protocol layer below the PDCP layer; wherein, in the case where the target layer includes the PDCP layer, the target content includes at least one of the data and signaling generated by the PDCP layer; in the case where the target layer includes the protocol layer below the PDCP layer, the target content includes at least one of the following: upper layer or high layer data received by the target layer, upper layer or high layer signaling received by the target layer, and signaling generated by the target layer; the communication interface is used to send a target message, and the target message includes the content of the security processing.
- the processor is used to perform security processing on the target content at the target layer
- the target layer includes: a packet data convergence protocol PDCP layer, and/or a protocol layer below the PDCP layer
- the target content includes at
- the communication interface is used to receive a target message; the processor is used to perform a security verification operation on the content of the security processing at the target layer by the receiving end when the target message includes the content of the security processing; wherein the content of the security processing includes: the content of the security processing performed by the sending end on the target content at the target layer; the target layer includes: a packet data convergence protocol PDCP layer, and/or a protocol layer below the PDCP layer.
- This communication device embodiment corresponds to the above-mentioned message transmission method embodiment.
- Each implementation process and implementation method of the above-mentioned method embodiment can be applied to this communication device embodiment and can achieve the same technical effect.
- FIG12 is a schematic diagram of the hardware structure of a communication device implementing an embodiment of the present application.
- the communication device 1200 includes but is not limited to: a radio frequency unit 1201, a network module 1202, an audio output unit 1203, an input unit 1204, a sensor 1205, a display unit 1206, a user input unit 1207, an interface unit 1208, a memory 1209 and at least some of the components of a processor 1210.
- the communication device 1200 can also include a power supply (such as a battery) for supplying power to each component, and the power supply can be logically connected to the processor 1210 through a power management system, so as to manage charging, discharging, and power consumption management through the power management system.
- a power supply such as a battery
- the communication device structure shown in FIG12 does not constitute a limitation on the communication device, and the communication device can include more or fewer components than shown in the figure, or combine certain components, or arrange components differently, which will not be described in detail here.
- the input unit 1204 may include a graphics processing unit (GPU) 12041 and a microphone 12042, and the graphics processor 12041 processes the image data of the static picture or video obtained by the image capture device (such as a camera) in the video capture mode or the image capture mode.
- the display unit 1206 may include a display panel 12061, and the display panel 12061 may be configured in the form of a liquid crystal display, an organic light emitting diode, etc.
- the user input unit 1207 includes a touch panel 12071 and at least one of other input devices 12072.
- the touch panel 12071 is also called a touch screen.
- the touch panel 12071 may include two parts: a touch detection device and a touch controller.
- Other input devices 12072 may include, but are not limited to, a physical keyboard, function keys (such as a volume control key, a switch key, etc.), a trackball, a mouse, and a joystick, which will not be repeated here.
- the RF unit 1201 can transmit the data to the processor 1210 for processing; in addition, the RF unit 1201 can send uplink data to the network side device.
- the RF unit 1201 includes but is not limited to an antenna, an amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, etc.
- the memory 1209 can be used to store software programs or instructions and various data.
- the memory 1209 can mainly include storage A first storage area for programs or instructions and a second storage area for storing data, wherein the first storage area may store an operating system, an application program or instructions required for at least one function (such as a sound playback function, an image playback function, etc.), etc.
- the memory 1209 may include a volatile memory or a non-volatile memory, or the memory 1209 may include both volatile and non-volatile memories.
- the non-volatile memory may be a read-only memory (ROM), a programmable read-only memory (PROM), an erasable programmable read-only memory (EPROM), an electrically erasable programmable read-only memory (EEPROM), or a flash memory.
- the volatile memory may be a random access memory (RAM), a static random access memory (SRAM), a dynamic random access memory (DRAM), a synchronous dynamic random access memory (SDRAM), a double data rate synchronous dynamic random access memory (DDRSDRAM), an enhanced synchronous dynamic random access memory (ESDRAM), a synchronous link dynamic random access memory (SLDRAM) and a direct memory bus random access memory (DRRAM).
- the memory 1209 in the embodiment of the present application includes but is not limited to these and any other suitable types of memory.
- the processor 1210 may include one or more processing units; optionally, the processor 1210 integrates an application processor and a modem processor, wherein the application processor mainly processes operations related to an operating system, a user interface, and application programs, and the modem processor mainly processes wireless communication signals, such as a baseband processor. It is understandable that the modem processor may not be integrated into the processor 1210.
- the processor 1210 is used to: perform security processing on the target content at the target layer, the target layer includes: a packet data convergence protocol PDCP layer, and/or a protocol layer below the PDCP layer; wherein, in the case where the target layer includes the PDCP layer, the target content includes at least one of data and signaling generated by the PDCP layer; in the case where the target layer includes a protocol layer below the PDCP layer, the target content includes at least one of the following: upper layer or high layer data received by the target layer, upper layer or high layer signaling received by the target layer, and signaling generated by the target layer;
- the radio frequency unit 1201 is used to send a target message, where the target message includes the content of the security processing.
- the security processing includes at least one of the following:
- the encrypting includes:
- the integrity protection includes:
- the multiple contents are concatenated, and integrity protection is performed on the concatenated contents.
- the target message further includes:
- a first sub-protocol data unit PDU or a first sub-header wherein the first sub-PDU or the first sub-header is used to indicate at least one of the following:
- the first sub-PDU or the first sub-header indicates at least one of the following through a position of the first sub-PDU or the first sub-header in the target message:
- the content located on the first side of the first sub-PDU or the first sub-header in the target message includes the security processed content
- the content located at the second side of the first sub-PDU or the first sub-header in the target message includes content that has not been security processed
- the first side and the second side are opposite sides.
- the first sub-PDU or the first sub-header is further used to indicate at least one of the following:
- the first sub-PDU or the first sub-header indicates the length corresponding to the content of the security processing
- at least one of the following is indicated by the position of the first sub-PDU or the first sub-header in the target message and the length corresponding to the content of the security processing:
- the first sub-PDU or the first sub-header is used to explicitly indicate: at least one of the parameters for encryption and the parameters for integrity protection; or
- the first sub-PDU or the first sub-header implicitly indicates, through the transmission resources of the target message, at least one of the parameters for encryption and the parameters for integrity protection.
- the parameters include: a serial number.
- the first sub-PDU is a first media access control MAC sub-protocol data unit PDU
- the first MAC sub-PDU includes a first MAC control element CE
- the first MAC CE is a MAC CE used to indicate at least one of the following:
- the first MAC CE is further used to indicate at least one of the following:
- the first A MAC CE indicates at least one of the following by a length corresponding to the content of the security processing and a position of the first MAC sub-PDU in the target message:
- the first subheader is a MAC subheader of a second MAC sub-PDU included in the target message, and the second MAC sub-PDU also includes the content of the security processing.
- the MAC subheader is further used to indicate at least one of the following:
- a length field where the length field is used to indicate the length of the payload part of the second MAC sub-PDU, where the payload part includes the content of the security processing.
- processor 1210 is further configured to:
- the target layer receives a processing instruction, where the processing instruction is used to indicate at least one of the following:
- the target layer includes at least one of the following: a MAC layer and an RLC layer;
- the target message includes a MAC PDU or a MAC transport block TB;
- the target message includes RLC PDU.
- the target content includes at least one of the following:
- the MAC SDU includes: at least one of data received by the MAC layer and signaling received by the MAC;
- the second MAC CE is the signaling generated by the MAC layer.
- the above communication equipment can improve the security of communication.
- the communication device 1300 includes: an antenna 1301, a radio frequency device 1302, a baseband device 1303, a processor 1304 and a memory 1305.
- the antenna 1301 is connected to the radio frequency device 1302.
- the radio frequency device 1302 receives information through the antenna 1301 and sends the received information to the baseband device 1303 for processing.
- the baseband device 1303 processes the information to be sent and sends it to the radio frequency device 1302.
- the radio frequency device 1302 processes the received information and sends it out through the antenna 1301.
- the method performed by the communication device in the above embodiment can be implemented in the baseband device 1303, and the baseband device 1303 includes Including baseband processor.
- the baseband device 1303 may include, for example, at least one baseband board, on which multiple chips are arranged, as shown in Figure 13, one of which is, for example, a baseband processor, which is connected to the memory 1305 through a bus interface to call the program in the memory 1305 and execute the network device operations shown in the above method embodiment.
- the communication device may also include a network interface 1306, which is, for example, a common public radio interface (CPRI).
- a network interface 1306, which is, for example, a common public radio interface (CPRI).
- CPRI common public radio interface
- the communication device 1300 of the embodiment of the present application also includes: instructions or programs stored in the memory 1305 and executable on the processor 1304.
- the processor 1304 calls the instructions or programs in the memory 1305 to execute the methods executed by the modules shown in Figure 10 and achieve the same technical effect. To avoid repetition, it will not be repeated here.
- the radio frequency device 1302 is used to receive the target message
- Processor 1304 is configured to perform a security verification operation on the security processed content at a target layer when the target message includes security processed content;
- the content of the security processing includes: the content of the security processing performed by the sending end on the target content at the target layer;
- the target layer includes: a Packet Data Convergence Protocol PDCP layer, and/or a protocol layer below the PDCP layer.
- PDCP Packet Data Convergence Protocol
- processor 1304 is further configured to perform at least one of the following:
- the target layer of the receiving end discards the content of the security processing
- the target layer of the receiving end delivers the first content obtained by the security verification operation to a higher layer.
- processor 1304 is further configured to perform at least one of the following:
- the target layer of the receiving end notifies the higher layer that the content has failed the security verification
- the target layer of the receiving end delivers the content obtained by the security verification operation to the higher layer
- the target layer of the receiving end notifies the higher layer that the content obtained by the security verification operation has passed the security verification.
- the processor 1304 is further configured to:
- the target layer of the receiving end submits the second content that has not been security-verified by the target layer to the higher layer;
- the upper layer of the receiving end discards the second content delivered by the target layer, where the second content requires security verification by the target layer.
- the security processing includes at least one of the following:
- the security verification operation includes at least one of the following:
- the target message further includes:
- performing a security verification operation on the security-processed content at the target layer includes:
- the receiving end determines that the target message includes security-processed content based on the first PDU or the first subheader, a security verification operation is performed on the security-processed content at the target layer.
- the first sub-PDU or the first sub-header indicates at least one of the following through a position of the first sub-PDU or the first sub-header in the target message:
- the content located on the first side of the first sub-PDU or the first sub-header in the target message includes the security processed content
- the content located at the second side of the first sub-PDU or the first sub-header in the target message includes content that has not been security processed
- the first side and the second side are opposite sides.
- the first sub-PDU or the first sub-header is further used to indicate at least one of the following:
- performing a security verification operation on the security-processed content at the target layer includes:
- the receiving end determines that the target message includes security processed content based on the first PDU or the first subheader, and determines the position of the security processed content in the target message based on the first PDU or the first subheader, a security verification operation is performed on the security processed content at the target layer based on at least one of the parameters for encryption, the parameters for integrity protection, and the bit stream for integrity protection; wherein, when the first sub-PDU or the first subheader indicates the length corresponding to the security processed content, the receiving end determines the position of the security processed content in the target message through the position of the first sub-PDU or the first subheader in the target message, and the length corresponding to the security processed content.
- the first sub-PDU is a first media access control MAC sub-protocol data unit PDU
- the first MAC sub-PDU includes a first MAC control element CE
- the first MAC CE is a new MAC CE for indicating at least one of the following:
- the first MAC CE is further used to indicate at least one of the following:
- the first MAC CE indicates the length corresponding to the content of the security processing
- the first MAC CE indicates at least one of the following through the length corresponding to the content of the security processing and the position of the first MAC sub-PDU in the target message:
- the first subheader is a MAC subheader of a second MAC sub-PDU included in the target message, and the second MAC sub-PDU also includes the content of the security processing.
- the MAC subheader is further used to indicate at least one of the following:
- a length field where the length field is used to indicate the length of the payload part of the second MAC sub-PDU, where the payload part includes the content of the security processing.
- the target layer includes at least one of the following: a MAC layer and an RLC layer;
- the target message includes a MAC PDU or a MAC transport block TB;
- the target message includes RLC PDU.
- the target content includes at least one of the following: a MAC sub-PDU corresponding to a MAC service data unit SDU, and a MAC sub-PDU corresponding to a second MAC CE;
- the MAC SDU includes: at least one of data received by the MAC layer of the transmitting end and signaling received by the MAC;
- the second MAC CE is the signaling generated by the MAC layer of the sending end.
- the receiving end is taken as an example of a network side device.
- the above communication equipment can improve the security of communication.
- An embodiment of the present application also provides a readable storage medium, which may be volatile or non-volatile.
- the readable storage medium stores programs or instructions, and when the programs or instructions are executed by the processor, the steps of the above-mentioned message transmission method provided in the embodiment of the present application are implemented.
- the processor is the processor in the terminal described in the above embodiment.
- the readable storage medium includes a computer readable storage medium, such as a computer read-only memory ROM, a random access memory RAM, a magnetic disk or an optical disk.
- An embodiment of the present application further provides a chip, which includes a processor and a communication interface, wherein the communication interface is coupled to the processor, and the processor is used to run programs or instructions to implement the various processes of the above-mentioned message transmission method embodiment, and can achieve the same technical effect. To avoid repetition, it will not be repeated here.
- the chip mentioned in the embodiments of the present application can also be called a system-level chip, a system chip, a chip system or a system-on-chip chip, etc.
- the embodiment of the present application further provides a computer program/program product, which is stored in a storage medium, and is executed by at least one processor to implement the various processes of the above-mentioned message transmission method embodiment, and can achieve the same technical effect. To avoid repetition, it will not be repeated here.
- An embodiment of the present application also provides a message transmission system, including: a sending end and a receiving end, wherein the sending end can be used to execute the steps of the message transmission method on the sending end side provided in the embodiment of the present application, and the network side device can be used to execute the steps of the message transmission method on the receiving end side provided in the embodiment of the present application.
- the technical solution of the present application can be embodied in the form of a computer software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk), and includes a number of instructions for a terminal (which can be a mobile phone, computer, server, air conditioner, or network equipment, etc.) to execute the methods described in each embodiment of the present application.
- a storage medium such as ROM/RAM, magnetic disk, optical disk
- a terminal which can be a mobile phone, computer, server, air conditioner, or network equipment, etc.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
本申请公开了一种消息传输方法、装置及设备,属于通信技术领域,本申请实施例的消息传输方法包括:发送端在目标层对目标内容进行安全处理,所述目标层包括:PDCP层,和/或,PDCP层以下的协议层;其中,在所述目标层包括所述PDCP层的情况下,所述目标内容包括所述PDCP层产生的数据和信令中的至少一项;在所述目标层包括所述PDCP层以下的协议层的情况下,所述目标内容包括如下至少一项:所述目标层接收到的上层或高层数据、所述目标层接收到的上层或高层信令、所述目标层产生的信令;所述发送端发送目标消息,所述目标消息包括所述安全处理的内容。
Description
相关申请的交叉引用
本申请主张在2023年1月19日在中国提交的中国专利申请No.202310086350.3的优先权,其全部内容通过引用包含于此。
本申请属于通信技术领域,具体涉及一种消息传输方法、装置及设备。
在一些通信系统中,发送端支持对数据和信令进行安全处理,具体为分组数据汇聚协议(Packet Data Convergence Protocol,PDCP)层对接收的高层的数据和信令进行加密和完整性保护,接收端的PDCP层进行相应的解密和完整性保护验证后递交高层。目前,由于只有PDCP层对接收的高层的数据和信令进行安全处理,导致通信的安全性比较差。
发明内容
本申请实施例提供一种消息传输方法、装置及设备,能够解决通信的安全性比较差的问题。
第一方面,提供了一种消息传输方法,包括:
发送端在目标层对目标内容进行安全处理,所述目标层包括:PDCP层,和/或,PDCP层以下的协议层;其中,在所述目标层包括所述PDCP层的情况下,所述目标内容包括所述PDCP层产生的数据和信令中的至少一项;在所述目标层包括所述PDCP层以下的协议层的情况下,所述目标内容包括如下至少一项:所述目标层接收到的上层或高层数据、所述目标层接收到的上层或高层信令、所述目标层产生的信令;
所述发送端发送目标消息,所述目标消息包括所述安全处理的内容。
第二方面,提供了一种消息传输方法,包括:
接收端接收目标消息;
在所述目标消息包括安全处理的内容的情况下,所述接收端在目标层对所述安全处理的内容进行安全验证操作;
其中,所述安全处理的内容包括:发送端在所述目标层对目标内容进行安全处理的内容;
所述目标层包括:分组数据汇聚协议PDCP层,和/或,PDCP层以下的协议层。
第三方面,提供了一种消息传输装置,包括:
处理模块,用于在目标层对目标内容进行安全处理,所述目标层包括:分组数据汇聚协议PDCP层,和/或,PDCP层以下的协议层;其中,在所述目标层包括所述PDCP层的情况下,所述目标内容包括所述PDCP层产生的数据和信令中的至少一项;在所述目标层包括所述PDCP层以下的协议层的情况下,所述目标内容包括如下至少一项:所述目标层接收到的上层或高层数据、所述目标层接收到的上层或高层信令、所述目标层产生的信令;
发送模块,用于发送目标消息,所述目标消息包括所述安全处理的内容。
第四方面,提供了一种消息传输装置,包括:
接收模块,用于接收目标消息;
验证模块,用于在所述目标消息包括安全处理的内容的情况下,所述接收端在目标层对所述安全处理的内容进行安全验证操作;
其中,所述安全处理的内容包括:发送端在所述目标层对目标内容进行安全处理的内容;
所述目标层包括:分组数据汇聚协议PDCP层,和/或,PDCP层以下的协议层。
第五方面,提供了一种通信设备,该通信设备包括处理器和存储器,所述存储器存储可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现如本申请实施例提供的发送端侧的消息传输方法的步骤,或者,所述程序或指令被所述处理器执行时实现如本申请实施例提供的接收端侧的消息传输方法的步骤。
第六方面,提供了一种通信设备,包括处理器及通信接口,其中,所述处理器用于在目标层对目标内容进行安全处理,所述目标层包括:分组数据汇聚协议PDCP层,和/或,PDCP层以下的协议层;其中,在所述目标层包括所述PDCP层的情况下,所述目标内容包括所述PDCP层产生的数据和信令中的至少一项;在所述目标层包括所述PDCP层以下的协议层的情况下,所述目标内容包括如下至少一项:所述目标层接收到的上层或高层数据、所述目标层接收到的上层或高层信令、所述目标层产生的信令;所述通信接口用于发送目标消息,所述目标消息包括所述安全处理的内容。或者,所述通信接口用于接收目标消息;所述处理器用于在所述目标消息包括安全处理的内容的情况下,所述接收端在目标层对所述安全处理的内容进行安全验证操作;其中,所述安全处理的内容包括:发送端在所述目标层对目标内容进行安全处理的内容;所述目标层包括:分组数据汇聚协议PDCP层,和/或,PDCP层以下的协议层。
第七方面,提供了一种消息传输系统,包括:发送端及接收端,所述发送端可用于执行如本申请实施例提供的发送端侧的消息传输方法的步骤,所述接收端可用于执行如本申请实施例提供的接收端侧的消息传输方法的步骤。
第八方面,提供了一种可读存储介质,所述可读存储介质上存储程序或指令,所述程序或指令被处理器执行时实现如本申请实施例提供的发送端侧的消息传输方法的步骤,或者实现如本申请实施例提供的接收端侧的消息传输方法的步骤。
第九方面,提供了一种芯片,所述芯片包括处理器和通信接口,所述通信接口和所述处理器耦合,所述处理器用于运行程序或指令,实现如本申请实施例提供的发送端侧的消息传输方法,或实现如本申请实施例提供的接收端侧的消息传输方法。
第十方面,提供了一种计算机程序/程序产品,所述计算机程序/程序产品被存储在存储介质中,所述计算机程序/程序产品被至少一个处理器执行以实现如本申请实施例提供的发送端侧的消息传输方法的步骤,或者,所述计算机程序/程序产品被至少一个处理器执行以实现如本申请实施例提供的接收端侧的消息传输方法的步骤。
在本申请实施例中,发送端在目标层对目标内容进行安全处理,所述目标层包括:分组数据汇聚协议PDCP层,和/或,PDCP层以下的协议层;其中,在所述目标层包括所述PDCP层的情况下,所述目标内容包括所述PDCP层产生的数据和信令中的至少一项;在所述目标层包括所述PDCP层以下的协议层的情况下,所述目标内容包括如下至少一项:所述目标层接收到的上层或高层数据、所述目标层接收到的上层或高层信令、所述目标层产生的信令;所述发送端发送目标消息,所述目标消息包括所述安全处理的内容。这样可以实现PDCP层对PDCP层产生的数据和信令中的至少一项进行安全处理,也可以实现PDCP层以下的协议层对接收到的数据、接收到的信令和产生的信令中的至少一项进行安全处理,从而可以提高通信的安全性。
图1是本申请实施例可应用的一种无线通信系统的框图;
图2是本申请实施例提供的一种消息传输方法的流程图之一;
图3是本申请实施例提供的一种协议栈的示意图之一;
图4是本申请实施例提供的一种协议栈的示意图之二;
图5是本申请实施例提供的一种目标消息的示意图之一;
图6是本申请实施例提供的一种目标消息的示意图之二;
图7是本申请实施例提供的一种目标消息的示意图之三;
图8是本申请实施例提供的一种消息传输方法的流程图之二;
图9是本申请实施例提供的一种消息传输装置的结构图之一;
图10是本申请实施例提供的一种消息传输装置的结构图之二;
图11是本申请实施例提供的一种通信设备的结构图之一;
图12是本申请实施例提供的一种通信设备的结构图之二;
图13是本申请实施例提供的一种通信设备的结构图之三。
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚描述,显
然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员所获得的所有其他实施例,都属于本申请保护的范围。
本申请的说明书和权利要求书中的术语“第一”、“第二”等是用于区别类似的对象,而不用于描述特定的顺序或先后次序。应该理解这样使用的术语在适当情况下可以互换,以便本申请的实施例能够以除了在这里图示或描述的那些以外的顺序实施,且“第一”、“第二”所区别的对象通常为一类,并不限定对象的个数,例如第一对象可以是一个,也可以是多个。此外,说明书以及权利要求中“和/或”表示所连接对象的至少其中之一,字符“/”一般表示前后关联对象是一种“或”的关系。
本申请的说明书和权利要求书中的术语“指示”既可以是一个明确的指示,也可以是一个隐含的指示。其中,明确的指示可以理解为,发送方在发送的指示中明确告知了接收方需要执行的操作或请求结果;隐含的指示可以理解为,接收方根据发送方发送的指示进行判断,根据判断结果确定需要执行的操作或请求结果。
值得指出的是,本申请实施例所描述的技术不限于长期演进型(Long Term Evolution,LTE)/LTE的演进(LTE-Advanced,LTE-A)系统,还可用于其他无线通信系统,诸如码分多址(Code Division Multiple Access,CDMA)、时分多址(Time Division Multiple Access,TDMA)、频分多址(Frequency Division Multiple Access,FDMA)、正交频分多址(Orthogonal Frequency Division Multiple Access,OFDMA)、单载波频分多址(Single-carrier Frequency Division Multiple Access,SC-FDMA)和其他系统。本申请实施例中的术语“系统”和“网络”常被可互换地使用,所描述的技术既可用于以上提及的系统和无线电技术,也可用于其他系统和无线电技术。以下描述出于示例目的描述了新空口(New Radio,NR)系统,并且在以下大部分描述中使用NR术语,但是这些技术也可应用于NR系统应用以外的应用,如第6代(6th Generation,6G)通信系统。
图1示出本申请实施例可应用的一种无线通信系统的框图。无线通信系统包括终端11和网络侧设备12。其中,终端11可以是手机、平板电脑(Tablet Personal Computer)、膝上型电脑(Laptop Computer)或称为笔记本电脑、个人数字助理(Personal Digital Assistant,PDA)、掌上电脑、上网本、超级移动个人计算机(ultra-mobile personal computer,UMPC)、移动上网装置(Mobile Internet Device,MID)、增强现实(augmented reality,AR)/虚拟现实(virtual reality,VR)设备、机器人、可穿戴式设备(Wearable Device)、车载设备(Vehicle User Equipment,VUE)、行人终端(Pedestrian User Equipment,PUE)、智能家居(具有无线通信功能的家居设备,如冰箱、电视、洗衣机或者家具等)、游戏机、个人计算机(personal computer,PC)、柜员机或者自助机等终端侧设备,可穿戴式设备包括:智能手表、智能手环、智能耳机、智能眼镜、智能首饰(智能手镯、智能手链、智能戒指、智能项链、智能脚镯、智能脚链等)、智能腕带、智能服装等。需要说明的是,在本申请实施例并不限定终端11的具体类型。网络侧设备12可以包括接入网设备或核心网设备,其中,接入网设备也可以称为无线接入网设备、无线接入网(Radio Access Network,RAN)、无线接入
网功能或无线接入网单元。接入网设备可以包括基站、无线局域网(Wireless Local Area Network,WLAN)接入点或无线保真(Wireless Fidelity,WiFi)节点等,基站可被称为节点B、演进节点B(Evolved Node B,eNB)、接入点、基收发机站(Base Transceiver Station,BTS)、无线电基站、无线电收发机、基本服务集(Basic Service Set,BSS)、扩展服务集(Extended Service Set,ESS)、家用B节点、家用演进型B节点、发送接收点(Transmission Reception Point,TRP)或所述领域中其他某个合适的术语,只要达到相同的技术效果,所述基站不限于特定技术词汇,需要说明的是,在本申请实施例中仅以NR系统中的基站为例进行介绍,并不限定基站的具体类型。核心网设备可以包含但不限于如下至少一项:核心网节点、核心网功能、移动管理实体(Mobility Management Entity,MME)、接入移动管理功能(Access and Mobility Management Function,AMF)、会话管理功能(Session Management Function,SMF)、用户平面功能(User Plane Function,UPF)、策略控制功能(Policy Control Function,PCF)、策略与计费规则功能单元(Policy and Charging Rules Function,PCRF)、边缘应用服务发现功能(Edge Application Server Discovery Function,EASDF)、统一数据管理(Unified Data Management,UDM)、统一数据仓储(Unified Data Repository,UDR)、归属用户服务器(Home Subscriber Server,HSS)、集中式网络配置(Centralized network configuration,CNC)、网络存储功能(Network Repository Function,NRF)、网络开放功能(Network Exposure Function,NEF)、本地NEF(Local NEF,或L-NEF)、绑定支持功能(Binding Support Function,BSF)、应用功能(Application Function,AF)等。需要说明的是,在本申请实施例中仅以NR系统中的核心网设备为例进行介绍,并不限定核心网设备的具体类型。
下面结合附图,通过一些实施例及其应用场景对本申请实施例提供的一种消息传输方法、装置及设备进行详细地说明。
请参见图2,图2是本申请实施例提供的一种消息传输方法的流程图,如图2所示,包括以下步骤:
步骤201、发送端在目标层对目标内容进行安全处理,所述目标层包括:PDCP层,和/或,PDCP层以下的协议层;其中,在所述目标层包括所述PDCP层的情况下,所述目标内容包括所述PDCP层产生的数据和信令中的至少一项;在所述目标层包括所述PDCP层以下的协议层的情况下,所述目标内容包括如下至少一项:所述目标层接收到的上层或高层数据、所述目标层接收到的上层或高层信令、所述目标层产生的信令。
其中,上述PDCP层以下的协议层可以是,上述PDCP层以下一个或者多个协议层,例如:上述PDCP层以下的协议层可以包括媒体接入控制(Media Access Control,MAC)层和无线链路层控制(Radio Link Control,RLC)层中的至少一项。
上述目标层包括:PDCP层,和/或,PDCP层以下的协议层可以理解为如下一项,
目标层包括:PDCP层,或者,PDCP层以下的协议层;或者
目标层包括:PDCP层和PDCP层以下的协议层。
上述PDCP层产生的信令可以包括PDCP控制协议数据单元(Protocol Data Unit,PDU)。
上述目标层接收到的数据可以是,PDCP层以下的协议层接收到的数据,该数据可以是高层产生的数据;例如:从高层接收到的数据包括高层产生的信令,该数据作为PDCP层以下的协议层的承载数据(payload)。
上述目标层接收到的信令可以是,PDCP层以下的协议层接收到的信令,该数据可以是高层产生的信令。
上述目标层产生的信令可以是,PDCP层以下的协议层产生的信令,例如:RLC层产生的RLC控制PDU,或者MAC层产生的媒体接入控制控制单元(Media Access Control Control Element,MAC CE)。
在一些实施方式中,PDCP层对PDCP层产生信令进行安全处理;
在一些实施方式中,MAC层对MAC层产生的信令进行安全处理,MAC层对接收到的数据进行安全处理;
在一些实施方式中,RLC层对RLC层产生的信令进行安全处理,RLC层对接收到的数据进行安全处理;
在一些实施方式中,PDCP层对PDCP层产生信令进行安全处理,MAC层对MAC层产生的信令进行安全处理,MAC层对接收到的数据进行安全处理,RLC层对RLC层产生的信令进行安全处理;
在一些实施方式中,PDCP层对PDCP层产生信令进行安全处理,MAC层对MAC层产生的信令进行安全处理,RLC层对RLC层产生的信令进行安全处理,RLC层对接收到的数据进行安全处理;
在一些实施方式中,MAC层对MAC层产生的信令进行安全处理,MAC层对接收到的数据进行安全处理,RLC层对RLC层产生的信令进行安全处理;
在一些实施方式中,MAC层对MAC层产生的信令进行安全处理,RLC层对RLC层产生的信令进行安全处理,RLC层对接收到的数据进行安全处理。
需要说明的是,本申请实施例中产生也可以称作生成。
上述发送端可以是终端或者网络侧设备,对应的接收端可以是网络侧设备或者终端。
在一些实施方式中,发送端和接收端之间的用户面协议栈可以如图3所示,发送端和接收端之间的控制协议栈可以如图4所示,需要说明的是,图3和图4是仅以5G通信系统进行的举例说明,本申请实施例中,对协议栈不作限定。
步骤202、所述发送端发送目标消息,所述目标消息包括所述安全处理的内容。
一些实施方式中,上述目标消息可以是,目标层的PDU,如MAC PDU、RLC PDU、PDCP PDU。
一些实施方式中,上述目标消息可以是,目标层传输块(Transport Block,TB),如MAC TB。
一些实施方式中,上述目标消息可以是向接收端发送的消息,该消息包括目标层的
PDU或TB。
上述安全处理的内容为步骤201中的安全处理得到的内容,或者经过安全处理的内容,或者安全处理后的内容,或者,安全处理后形成的内容。例如:包括如下至少一项:
加密后的密文;
为了验证完整性而生成的校验码;
被完整性保护的数据。
在本申请实施例中,通过上述步骤可以实现PDCP层对PDCP层产生的数据和信令中的至少一项进行安全处理,也可以实现PDCP层以下的协议层对接收到的数据、接收到的信令和产生的信令中的至少一项进行安全处理,从而可以提高通信的安全性。
作为一种可选的实施方式,所述安全处理包括如下至少一项:
加密、完整性保护。
该实施方式中,可以针对不同的数据或者信令采用相同的加密和完整性保护,或者,针对一些数据或者信令采用加密处理,针对另一个数据或者信令采用完整性保护处理,或者,针对多个数据或者信令进行串接,再对串接的内容进行加密和完整性保护中的至少一项处理。
需要说明的是,本申请实施例中,加密和完整性保护可以采用协议中定义的加密和完整性保护,对此不作限定。
该实施方式中,通过上述加密、完整性保护可以提高通信安全。
可选地,在所述目标内容包括多个内容的情况下,所述加密包括:
将所述多个内容进行串接,并对所述串接的内容进行加密;
和/或,在所述目标内容包括多个内容的情况下,所述完整性保护包括:
将所述多个内容进行串接,并对所述串接的内容进行完整性保护。
其中,多个内容可以是多个数据、多个信令,或者,至少一个数据和至少一个信令,如多个服务数据单元(Service Data Unit,SDU)、多个控制信令。需要说明的是,多个内容中的一个内容可以是数据或信令。另外,SDU可以是PDCP SDU、RLC SDU或MAC SDU。控制信令可以是PDCP控制PDU、RLC控制PDU,或者MAC CE。
该实施方式中,由于对多个内容进行串接再安全处理,这样可以降低计算开销,另外,多个内容进行串接再安全处理,这样使得安全处理的内容安全更高。
需要说明的是,本申请实施例中,针对多个内容也可以单独进行安全处理,对此不作限定。
作为一种可选的实施方式,所述目标消息还包括:
第一子PDU或者第一子头,所述第一子PDU或者所述第一子头用于指示如下至少一项:
所述安全处理的内容在所述目标消息中的位置;
所述目标层未进行安全处理的内容在所述目标消息中的位置。
在一些实施方式中,上述第一子PDU可以是目标层子PDU,如MAC子PDU(MAC subPDU)、RLC子PDU(RLC subPDU)、PDCP子PDU(PDCP subPDU);
上述第一子头可以是目标层子头,如MAC子头、RLC子头、PDCP子头。
上述目标层未进行安全处理的内容可以是,没有进行安全处理的内容,也可以是高层已经进行安全处理的内容。
需要说明的是,在上述第一子PDU或者第一子头指示上述目标消息中包括的所述安全处理的内容的情况下,接收端通过上述第一子PDU或者第一子头可以确定未指示的内容为上述目标层未进行安全处理的内容。在上述第一子PDU或者第一子头指示上述目标层未进行安全处理的内容的情况下,接收端通过上述第一子PDU或者第一子头可以确定未指示的内容为上述安全处理的内容。
该实施方式中,通过上述第一子PDU或者第一子头可以使得接收端能够准确地确定上述安全处理的内容和目标层未进行安全处理的内容,从而接收端的目标层只需要对上述安全处理的内容进行安全验证,以节约接收端的功耗或接收端的处理复杂度。
可选地,所述第一子PDU或者所述第一子头通过所述第一子PDU或者所述第一子头在所述目标消息中的位置指示如下至少一项:
所述安全处理的内容在所述目标消息中的位置;
所述目标层未进行安全处理的内容在所述目标消息中的位置。
上述第一子PDU或者第一子头在所述目标消息的中位置可以指示该位置的一侧为上述安全处理的内容,或者,指示该位置另一侧为目标层未进行安全处理的内容。
在一些实施方式中,在所述目标消息中位于所述第一子PDU或者所述第一子头的第一侧的内容包括所述安全处理的内容;
和/或,在所述目标消息中位于所述第一子PDU或者所述第一子头的第二侧的内容包括未进行安全处理的内容;
所述第一侧和所述第二侧为相对的两侧。
例如,上述第一侧为左侧或者上述目标消息位于上述第一子PDU或者第一子头之前,上述第二侧为右侧或者上述目标消息位于上述第一子PDU或者第一子头之后,上述第一侧为右侧或者上述目标消息位于上述第一子PDU或者第一子头之后,上述第二侧为左侧或者上述目标消息位于上述第一子PDU或者第一子头之前。
在一些实施方式中,还可以结合长度来指示上述至少一项,例如:指示上述第一侧的某一长度的内容为上述安全处理的内容,该长度为上述安全处理的内容对应的长度。
在一些实施方式中,还可以结合长度来指示上述至少一项,例如:指示上述第一侧的某一长度的内容为上述安全处理后的内容,该长度为上述安全处理后的内容对应的长度。
上述实施方式中,通过上述第一子PDU或者第一子头在目标消息的中位置指示上述至少一项,以指示接收端中目标层对目标消息的哪些内容/部分进行安全处理。
作为一种可选的实施方式,所述第一子PDU或者所述第一子头还用于指示如下至少
一项:
用于加密的参数;
用于完整性保护的参数;
用于完整性保护的比特流;
所述安全处理的内容对应的长度;
其中,在所述第一子PDU或者所述第一子头指示所述安全处理的内容对应的长度的情况下,通过所述第一子PDU或者所述第一子头在所述目标消息中的位置,以及所述安全处理的内容对应的长度指示如下至少一项:
所述安全处理的内容在所述目标消息中的位置;
所述目标层未进行安全处理的内容在所述目标消息中的位置。
在一些实施方式中,上述参数可以包括序列号(Serial Number,SN);
在一些实施方式中,上述参数可以包括秘钥。
例如:上述加密可以是基于加密输入参数(序列号、秘钥等),生成密码(比特)流;用密码(比特)流与目标内容进行运算,得到加密后数据流;接收端收到加密数据流后,进行相应的解密操作,得到解密后的数据流。
又例如:上述完整性保护可以是指基于输入参数(序列号,秘钥,待完整性保护的数据等),得到一个预设长度(如32位)的比特流,该比特流可以称作消息验证码-完整性(Message Authentication Code–Integrity,MAC-I)。任何输入参数的变更,都可能导致输出的MAC-I发送变化。发送端将MAC-I(称为MAC-I-1)随被完整性保护的数据一起发送,接收端收到后,基于被完整性保护的数据计算,得到MAC-I(MAC-I-2)。接收端对比MAC-I-1和MAC-I-2,如果两者相同,则认为待完整性保护的数据是由预期的发送端发出且未被篡改过,即通过完整性校验。
在一些实施方式中,上述用于加密的参数和用于完整性保护的参数可以相同或者不同,例如:用于加密的序列号和用于完整性保护的序列号可以是一个序列号,即只携带一个序列号,用于加密和完整性保护两个目的。
上述安全处理的内容对应的长度可以是,目标内容安全处理前的长度,也可以是上述安全处理的内容的长度,即安全处理后的长度。如果是安全处理前的长度,接收端可以根据协议规定,确定处理后的长度。
需要说明的是,上述第一子PDU或者第一子头可以显式或者隐式指示上述用于加密的参数、用于完整性保护的参数、用于完整性保护的比特流和安全处理的内容对应的长度中的至少一项。
在一些实施方式中,所述第一子PDU或者所述第一子头用于显式指示:所述用于加密的参数和用于完整性保护的参数中的至少一项;或者
所述第一子PDU或者所述第一子头通过所述目标消息的传输资源隐式指示:所述用于加密的参数和用于完整性保护的参数中的至少一项。
上述第一子PDU或者第一子头通过所述目标消息的传输资源隐式指示上述参数可以是,第一子PDU或者第一子头中不包括上述参数,将目标消息传输所使用的无线资源的资源时间位置,或资源频率位置,或资源时频位置映射为上述参数,如将目标消息传输所使用的无线资源的资源时间位置,或资源频率位置,或资源时频位置映射作为序列号使用。具体映射规则可以协议约定或者网络侧配置。
该实施方式中,通过隐式指示上述参数可以节约目标消息的开销。
作为一种可选的实施方式,所述第一子PDU为第一MAC子PDU,所述第一MAC子PDU包括第一MAC CE,所述第一MAC CE为用于指示如下至少一项的MAC CE:
所述安全处理的内容在所述目标消息中的位置;
所述目标层未进行安全处理的内容在所述目标消息中的位置。
其中,上述第一MAC CE可以是新定义的MAC CE,或者上述第一MAC CE为特定格式的MAC CE,该MAC CE的格式可以通过上述第一MAC子PDU中的MAC子头来指示,如通过MAC子头中的逻辑信道标识(logical Channel Identity,LCID)指示该格式。接收端通过该第一MAC子PDU中的MAC子头确定上述第一MAC CE是用于指示如下至少一项:
所述安全处理的内容在所述目标消息中的位置;
所述目标层未进行安全处理的内容在所述目标消息中的位置。
需要说明的是,本申请实施例并不限定上述第一MAC CE的标识方式,例如:上述第一MAC CE或者上述第一MAC子PDU可以是协议约定的用于指示如下至少一项的MAC CE或者MAC子PDU:
所述安全处理的内容在所述目标消息中的位置;
所述目标层未进行安全处理的内容在所述目标消息中的位置。
该实施方式中,由于通过新引入MAC subPDU进行指示,从而不需要修改目标消息其他部分的格式,以降低提高通信安全的复杂度。
可选地,其中,所述第一MAC CE还用于指示如下至少一项:
用于加密的参数;
用于完整性保护的参数;
用于完整性保护的比特流;
所述安全处理的内容对应的长度;
其中,在所述第一MAC CE指示所述安全处理的内容对应的长度的情况下,所述第一MAC CE通过所述安全处理的内容对应的长度和所述第一MAC子PDU在所述目标消息中的位置指示如下至少一项:
所述安全处理的内容在所述目标消息中的位置;
所述目标层未进行安全处理的内容在所述目标消息中的位置。
需要说明的是,上述参数、比特流和长度可以参见上述实施方式的相应描述,且具体
指示方式也参见上述实施方式的相应描述,此处不作赘述。
该实施方式中,可以实现通过上述第一MAC CE指示上述至少一项。
一个实施例,如图5所示,其中,上述第一MAC子PDU为图5中的X MAC subPDU,上述第一MAC CE为图5中的X MAC CE。如图5所示,X MAC subPDU左侧为参与MAC层安全处理的部分,即上述安全处理的内容;X MAC subPDU右侧为不参与MAC层安全处理的部分,即MAC层未进行安全处理的内容。
另一个实施例,如图6所示,其中,上述第一MAC子PDU为图6中的Y MAC subPDU,上述第一MAC CE为图6中的Y MAC CE,Y MAC CE包括安全处理的内容对应的长度,长度表示为L。如图6所示,Y MAC subPDU右侧,且长度为L的内容为参与MAC层安全处理的部分,即上述安全处理的内容;Y MAC subPDU左侧以及右侧指定长度(L)之后的内容为不参与MAC层安全处理的部分,即MAC层未进行安全处理的内容。
需要说明的是,图5和图6仅作为示意,本申请实施例中,不对目标层PDU,以及MAC CE的子头组成(例如是否包含R/F/L域)进行限制,且图5和图6仅是以目标层为MAC层进行举例说明。
作为一种可选的实施方式,所述第一子头为所述目标消息包括的第二MAC子PDU的MAC子头,所述第二MAC子PDU还包括所述安全处理的内容。
上述MAC子头可以是新定义的MAC子头,该MAC子头可以是特定格式或者承载的特定的信息,以表示该MAC子头用于指示如下至少一项:
所述安全处理的内容在所述目标消息中的位置;
所述目标层未进行安全处理的内容在所述目标消息中的位置。
接收端通过上述MAC子头的格式或者承载的信息确定该MAC子头是用于指示上述至少一项位置。
该实施方式中,可以实现通过第二MAC子PDU的MAC子头进行指示,从而不需要修改目标消息的格式,以降低提高通信安全的复杂度。
可选地,所述MAC子头还用于指示如下至少一项:
用于加密的参数;
用于完整性保护的参数;
用于完整性保护的比特流;
长度域,所述长度域用于指示所述第二MAC子PDU的载荷部分的长度,所述载荷部分包括所述安全处理的内容。
需要说明的是,上述参数、比特流和长度可以参见上述实施方式的相应描述,且具体指示方式也参见上述实施方式的相应描述,此处不作赘述。
该实施方式中,可以实现通过上述MAC子头指示上述至少一项。
在一个实施例中,上述目标消息可以如图7所示,上述第二MAC子PDU为图6中的MAC超级子PDU(MAC Super subPDU),上述MAC子头为MAC超级子头(MAC super
header),上述长度域可以指示MAC super subPDU载荷部分(payload)部分的长度,即MAC super subPDU除了子头之外的剩余部分的长度。这样接收端就可以根据长度域知道需要对收到的MAC PDU中的哪些部分进行安全处理。
需要说明的是,图7仅作为示意,本申请实施例中,不对目标层PDU,以及MAC CE的子头组成(例如是否包含R/F/L域)进行限制,且图7仅是以目标层为MAC层进行举例说明。
作为一种可选的实施方式,所述方法还包括:
所述发送端的所述目标层接收处理指示,所述处理指示用于指示如下至少一项:
对所述目标内容进行安全处理,或者,不对所述目标内容进行安全处理;
需要安全处理的内容;
不需要安全处理的内容。
上述处理指示可以是高层给目标层的处理指示。例如:高层在递交高层PDU给MAC层时,指示MAC层:待传PDU是否需要进行加密和/或完整性保护,即对于PDCP已经进行过加密和/或完整性保护的数据,高层无需指示底层再进行重复加密和/或完整性保护。
该实施方式中,上述步骤201可以包括如下至少一项:
在指示对所述目标内容进行安全处理的情况下,对目标内容进行安全处理;
在指示需要安全处理的内容包括上述目标内容的情况下,对目标内容进行安全处理;
在指示不需要安全处理的内容不包括上述目标内容的情况下,对目标内容进行安全处理。
例如:在上述目标层为MAC层的情况下,对一个MAC PDU/传输块(Transport Block,TB)内,所有高层指示待完整性保护的数据,MAC层生成一个MAC-I(即不是每个高层待完保的PDU生成一个MAC-I,以降低协议开销);发送端在MAC PDU/TB中携带上述第一子PDU或者第一子头,以通知接收端待完整性保护确认的数据,以便接收端进行完整性保护验证,或者,发送端指示在MAC PDU/TB中携带上述第一子PDU或者第一子头,以通知接收端待加密的数据,以便接收端进行解密。
上述实施方式中,由于接收到上述处理指示,这样可以实现基于上述处理指示对安全处理,这样可以只需要对指示的内容进行完全处理,进而节约计算开销,且还可以提高目标层安全处理的灵活性,即目标层进行安全处理的内容可以由上述处理指示灵活配置。
需要说明的是,上述目标内容也可以是协议或者网络侧预先配置的。
作为一种可选的实施方式,所述目标层包括:如下至少一项:MAC层、RLC层;
在所述目标层包括所述MAC层的情况下,所述目标消息包括MAC PDU或者MAC传输块TB;
在所述目标层包括所述RLC层的情况下,所述目标消息包括RLC PDU。
该实施方式中,可以实现在MAC层、RLC层中至少一项进行安全处理,例如:MAC层对接收到的数据、信令,以及MAC层产生的信令进行安全处理,又例如:RLC层对接
收到的数据、信令,以及对RLC层产生的信令进行安全处理。
可选地,在所述目标层包括所述MAC层的情况下,所述目标内容包括如下至少一项:
MAC SDU对应的MAC子PDU、第二MAC CE对应的MAC子PDU;
其中,所述MAC SDU包括:所述MAC层接收到的数据和所述MAC接收到的信令中的至少一项;
所述第二MAC CE为所述MAC层产生的信令。
上述MAC SDU可以是一个或者多个MAC SDU,上述第二MAC CE可以是一个或者多个MAC CE。
上述目标内容包括上述至少一项可以理解为,目标内容的类型可以包括如下至少一项:
MAC SDU对应的MAC子PDU、第二MAC CE对应的MAC子PDU。
该实施方式中,MAC层可以存在如下行为:
将收到的MAC SDU X,生成对应的MAC subPDU;
将生成的第二MAC CE,生成对应的MAC subPDU;
将包含需要进行MAC层安全处理的MAC SDU X和第二MAC CE的MAC subPDU串接在一起,进行完整性保护(对所有MAC subPDU生成一个MAC-I)和/或加密;
生成上述第一MAC CE(如上述X MAC CE)对应的上述第一MAC subPDU。
该实施方式中,可以实现对MAC SDU对应的MAC子PDU、第二MAC CE对应的MAC子PDU中的至少一项进行安全处理,以提高通信安全性。
在一些实施方式中,上述目标消息可以包括如下内容:
上述目标内容、上述目标层未进行安全处理的内容,以及上述第一子PDU或者第一子头。
在本申请实施例中,发送端在目标层对目标内容进行安全处理,所述目标层包括:分组数据汇聚协议PDCP层,和/或,PDCP层以下的协议层;其中,在所述目标层包括所述PDCP层的情况下,所述目标内容包括所述PDCP层产生的数据和信令中的至少一项;在所述目标层包括所述PDCP层以下的协议层的情况下,所述目标内容包括如下至少一项:所述目标层接收到的上层或高层数据、所述目标层接收到的上层或高层信令、所述目标层产生的信令;所述发送端发送目标消息,所述目标消息包括所述安全处理的内容。这样可以实现PDCP层对PDCP层产生的数据和信令中的至少一项进行安全处理,也可以实现PDCP层以下的协议层对接收到的数据、接收到的信令和产生的信令中的至少一项进行安全处理,从而可以提高通信的安全性。
请参见图8,图8是本申请实施例提供的一种消息传输方法的流程图,如图8所示,包括以下步骤:
步骤801、接收端接收目标消息;
步骤802、在所述目标消息包括安全处理的内容的情况下,所述接收端在目标层对所述安全处理的内容进行安全验证操作;
其中,所述安全处理的内容包括:发送端在所述目标层对目标内容进行安全处理的内容;
所述目标层包括:分组数据汇聚协议PDCP层,和/或,PDCP层以下的协议层。
可选地,所述方法还包括如下至少一项:
在所述安全验证操作表示安全验证失败的情况下,所述接收端的所述目标层丢弃所述安全处理的内容;
所述接收端的所述目标层向高层递交所述安全验证操作得到的第一内容。
上述安全验证操作表示安全验证失败可以是完整性保护验证失败。
由于在所述安全验证操作表示安全验证失败的情况下,所述接收端的所述目标层丢弃所述安全处理的内容,这样可以避免目标层向高层递交目标层安全验证失败的内容,进一上提高通信安全性。
可选地,所述方法还包括如下至少一项:
在所述接收端丢弃所述目标消息中的携带的内容的情况下,所述接收端的所述目标层通知高层有内容未通过安全验证;
在所述接收端的所述目标层向高层递交所述安全验证操作得到的内容的情况下,所述接收端的所述目标层通知高层所述安全验证操作得到的内容已通过安全验证。
该实施方式中,通过上述通知可以提高接收端内各协议层之前的交互性能。例如:接收端MAC层根据TB中的第一子PDU或者第一子头,进行解密和/或完整性保护确认;并将通过完整性保护确认的处理后的数据,递交给高层,并通知高层该数据进行了解密和/或通过了完整性保护确认,而对于未通过完整性保护确认的数据包,MAC层通知高层,如:通知RLC,PDCP,无线资源控制(Radio Resource Control,RRC)层中的一层或多层完整性保护验证失败。
可选地,所述方法还包括:
在所述目标层确定所述目标消息包括未进行安全处理的内容的情况下,所述接收端的所述目标层向高层递交所述目标层未进行安全验证的第二内容;
所述接收端的高层对于所述目标层递交的所述第二内容进行丢弃,所述第二内容为需要所述目标层进行安全验证的内容。
其中,上述第二内容可以是高层已知的需要目标层进行安全验证的内容,如高层通过协议或者网络侧配置确定需要所述目标层进行安全验证的内容。
该实施方式中,接收端的高层对于所述目标层递交的所述第二内容进行丢弃,这样可以进一步提高通信安全性。例如:发送端是恶意的,其发送篡改的PDCP控制PDU(封装成RLC PDU传给MAC),但其MAC指示消息中指示接收端,该高层SDU无需底层安全,接收端MAC会假设该高层SDU已经进行了高层安全处理;不进行验证直接交给高层。接收端PDCP发现这个控制PDU没有PDCP层的安全保护,也没有进行底层安全验证,是有问题的(即完全没有通过安全认证),就丢弃。
可选地,所述安全处理包括如下至少一项:
加密、完整性保护;
所述安全验证操作包括如下至少一项:
解密、完整性保护验证。
可选地,所述目标消息还包括:
第一子协议数据单元PDU或者第一子头,所述第一子PDU或者所述第一子头用于指示如下至少一项:
所述安全处理的内容在所述目标消息中的位置;
所述目标层未进行安全处理的内容在所述目标消息中的位置;
所述在所述目标消息包括安全处理的内容的情况下,所述接收端在目标层对所述安全处理的内容进行安全验证操作,包括:
在所述接收端基于所述第一PDU或者所述第一子头确定所述目标消息包括安全处理的内容的情况下,所述接收端在目标层对所述安全处理的内容进行安全验证操作。
可选地,所述第一子PDU或者所述第一子头通过所述第一子PDU或者所述第一子头在所述目标消息中的位置指示如下至少一项:
所述安全处理的内容在所述目标消息中的位置;
所述目标层未进行安全处理的内容在所述目标消息中的位置。
可选地,在所述目标消息中位于所述第一子PDU或者所述第一子头的第一侧的内容包括所述安全处理的内容;
和/或,在所述目标消息中位于所述第一子PDU或者所述第一子头的第二侧的内容包括未进行安全处理的内容;
所述第一侧和所述第二侧为相对的两侧。
可选地,所述第一子PDU或者所述第一子头还用于指示如下至少一项:
用于加密的参数;
用于完整性保护的参数;
用于完整性保护的比特流;
所述安全处理的内容对应的长度;
所述在所述接收端基于所述第一PDU或者所述第一子头确定所述目标消息包括安全处理的内容的情况下,所述接收端在目标层对所述安全处理的内容进行安全验证操作,包括:
在所述接收端基于所述第一PDU或者所述第一子头确定所述目标消息包括安全处理的内容,以及基于所述第一PDU或者所述第一子头确定所述安全处理的内容在所述目标消息的位置的情况下,所述接收端基于所述用于加密的参数、用于完整性保护的参数和用于完整性保护的比特流中的至少一项,在目标层对所述安全处理的内容进行安全验证操作;其中,在所述第一子PDU或者所述第一子头指示所述安全处理的内容对应的长度的情况
下,所述接收端通过所述第一子PDU或者所述第一子头在所述目标消息中的位置,以及所述安全处理的内容对应的长度确定所述安全处理的内容在所述目标消息中的位置。
可选地,所述第一子PDU为第一媒体接入控制MAC子协议数据单元PDU,所述第一MAC子PDU包括第一MAC控制单元CE,所述第一MAC CE为用于指示如下至少一项的新MAC CE:
所述安全处理的内容在所述目标消息中的位置;
所述目标层未进行安全处理的内容在所述目标消息中的位置。
可选地,所述第一MAC CE还用于指示如下至少一项:
用于加密的参数;
用于完整性保护的参数;
用于完整性保护的比特流
所述安全处理的内容对应的长度;
其中,在所述第一MAC CE指示所述安全处理的内容对应的长度的情况下,所述第一MAC CE通过所述安全处理的内容对应的长度和所述第一MAC子PDU在所述目标消息中的位置指示如下至少一项:
所述安全处理的内容在所述目标消息中的位置;
所述目标层未进行安全处理的内容在所述目标消息中的位置。
可选地,所述第一子头为所述目标消息包括的第二MAC子PDU的MAC子头,所述第二MAC子PDU还包括所述安全处理的内容。
可选地,所述MAC子头还用于指示如下至少一项:
用于加密的参数;
用于完整性保护的参数;
用于完整性保护的比特流;
长度域,所述长度域用于指示所述第二MAC子PDU的载荷部分的长度,所述载荷部分包括所述安全处理的内容。
可选地,所述目标层包括如下至少一项:MAC层、RLC层;
在所述目标层包括所述MAC层的情况下,所述目标消息包括MAC PDU或者MAC传输块TB;
在所述目标层包括所述RLC层的情况下,所述目标消息包括RLC PDU。
可选地,所述目标内容包括如下至少一项:MAC服务数据单元SDU对应的MAC子PDU、第二MAC CE对应的MAC子PDU;
其中,所述MAC SDU包括:所述发送端的MAC层接收到的数据和所述MAC接收到的信令中的至少一项;
所述第二MAC CE为所述发送端的MAC层产生的信令。
需要说明的是,本实施例作为与图2所示的实施例中对应的接收端的实施方式,其具
体的实施方式可以参见图2所示的实施例的相关说明,以为避免重复说明,本实施例不再赘述。
下面通过多个实施例对本申请实施例提供的消息传输方法进行举例说明:
实施例一
该实施例中,高层指示MAC层需要进行安全处理的数据,具体如下:
发送端MAC层接收高层PDU,同时被指示该PDU是否需要进行安全处理,如:
高层指示需要进行安全处理的高层PDU,或指示不需要进行安全处理的高层PDU;
所述安全处理指加密和/或完整性保护;高层可以指示单独启用加密或完整性保护;
不需要进行安全处理的高层PDU包括:PDCP层已经进行了加密和/或完整性保护的数据对应的PDU,其中,对应的PDU指该PDU中包含:PDCP层已经进行了加密和/或完整性保护的数据;或需要进行安全处理的高层PDU包括:未经过PDCP层加密和/或完整性保护的数据对应的PDU,其中,对应的PDU指该PDU中包含的数据:未经过PDCP层处理或未经过PDCP加密和/或完整性保护。
实施例二
该实施例中,如图5所示,MAC层基于高层指示生成MAC-I(通过特定MAC CE分隔),具体如下:
步骤1.对于发送端MAC层接收的每一个高层递交的MAC SDU X,高层指示:MAC SDU X是否需要参与MAC层安全处理;
步骤2.发送端MAC层生成MAC PDU,包括以下操作:
A.将收到的MAC SDU X,生成对应的MAC subPDU;
B.将生成的MAC CE,生成对应的MAC subPDU;
C.将包含需要进行MAC层安全处理的MAC SDU X和MAC CE的MAC subPDU串接在一起,进行完整性保护(对所有MAC subPDU生成一个MAC-I)和/或加密;
D.生成新定义的特定MAC CE(X MAC CE)对应的X MAC subPDU;
E.用X MAC subPDU将C中处理后的数据和其他未进行安全处理的MAC subPDU隔开。如图5所示,X MAC subPDU左侧为参与MAC层安全处理的部分;X MAC subPDU右侧为不参与MAC层安全处理的部分。
这样,接收端就可以通过识别出新定义的特定MAC CE而确定需要对收到的MAC PDU中的哪些部分进行安全处理:即解密和/或完整性验证。
另外,X MAC CE中可以包含以下信息中的一种或多种:
显式携带的SN:用于加密和/或完整性保护的序列号;
用于完整性保护的MAC-I;
如果MAC PDU中不显式携带的SN,可以通过该MAC PDU传输所使用的无线资源的资源时间位置,或资源频率位置,或资源时频位置映射为SN(即隐式携带)。
实施例三
该实施例中,如图7所示,MAC层基于高层指示生成MAC-I(通过MAC super subPDU),具体如下:
步骤1.对于发送端MAC层接收的每一个高层递交的MAC SDU X,高层指示:MAC SDU X是否需要参与MAC层安全处理;
步骤2.发送端MAC层生成MAC PDU,包括以下操作:
A.将收到的MAC SDU X,生成对应的MAC subPDU;
B.将生成的MAC CE,生成对应的MAC subPDU;
C.将包含需要进行MAC层安全处理的MAC SDU X和MAC CE的MAC subPDU串接在一起,进行完整性保护(对所有MAC subPDU生成一个MAC-I)和/或加密;
D.生成MAC Super subPDU(如图7所示),包含:
生成参与MAC层安全处理的部分(包括:高层MAC SDU以及MAC CE)公共的super header;
其中,super header中包含以下信息中的一种或多种:
显式携带的SN:用于加密和/或完整性保护的序列号
用于完整性保护的MAC-I(仅完整性保护开启时携带)
长度域:MAC super subPDU payload(即MAC super subPDU除了子头之外的剩余部分)部分的长度。
这样,接收端就可以根据长度域知道需要对收到的MAC PDU中的哪些部分进行安全处理:即解密和/或完整性验证。
另外,如果MAC Super header中不显式携带的SN,可以通过该MAC PDU传输所使用的无线资源的资源时间位置,或资源频率位置,或资源时频位置映射为SN(即隐式携带)。
MAC Super subPDU可以位于MAC PDU的首部,也可以位于其他MAC subPDU之后,不做限制。
实施例四
该实施例中,如图6所示,MAC层基于高层指示生成MAC-I(通过MAC CE指示),具体如下:
步骤1.对于发送端MAC层接收的每一个高层递交的MAC SDU X,高层指示:MAC SDU X是否需要参与MAC层安全处理;
步骤2.发送端MAC层生成MAC PDU,包括以下操作:
A.将收到的MAC SDU X,生成对应的MAC subPDU;
B.将生成的MAC CE,生成对应的MAC subPDU;
C.将包含需要进行MAC层安全处理的MAC SDU X和MAC CE的MAC subPDU串接在一起,进行完整性保护(对所有MAC subPDU生成一个MAC-I)和/或加密;
D.生成新定义的MAC CE(Y MAC CE)对应的Y MAC subPDU;
E.用Y MAC subPDU位于C中处理后的数据之前。如图6所示,Y MAC subPDU之后/右侧为MAC层提供安全服务的数据,长度为L(由Y MAC CE进行指示);MAC PDU中的其他部分为不参与MAC层安全处理的部分。
这样,接收端就可以知道需要对收到的MAC PDU中的哪些部分进行安全处理:即解密和/或完整性验证。
另外,Y MAC CE中可以包含以下信息中的一种或多种:
显式携带的SN:用于加密和/或完整性保护的序列号
用于完整性保护的MAC-I
由MAC层提供安全服务的数据的长度。
如果MAC PDU中不显式携带的SN,可以通过该MAC PDU传输所使用的无线资源的资源时间位置,或资源频率位置,或资源时频位置映射为SN(即隐式携带)。
另外,Y MAC CE对应的MAC subPDU可以为MAC PDU的第一个MAC subPDU,也可以位于其他MAC subPDU之后,不做限制。
实施例五
该实施例主要描述接收端操作,具体如下:
步骤1.接收端MAC层根据高层配置和/或网络侧配置,启动完整性保护验证和/或解密;
步骤2.接收端收到一个MAC PDU,根据MAC PDU中的内容,识别出进行MAC安全保护的部分;包括:
(1)通过新MAC CE在MAC PDU中的位置(如实施例二所示);或
(2)通过super MAC subPDU的payload部分(如实施例三所示);或
(3)通过新MAC CE的位置以及其包含的指示信息,如长度域(如实施例四所示);
步骤3.如果启动了解密,则接收端进行解密;
步骤4.如果启动了完整性保护验证,则接收端进行完整性保护验证;
步骤5.对于完成了解密和/或完整性校验的高层数据,递交高层,并通知高层:MAC层所完成的安全操作,如通知高层完成了该MAC SDU的解密,或通知高层完成了该MAC SDU的完整性保护确认,或通知高层完成了该MAC SDU的完整性保护确认和解密;
在步骤5中由于通知高层,可以避免以下问题:
假设发送端是一个攻击者,其给接收端发送了一个PDCP控制PDU;由于其没有完整性保护秘钥,其不启动底层的安全措施(如:完整性保护);
这样,接收端MAC收到MAC PDU后,会认为该MAC PDU中对应的subPDU无需启动MAC完整性确认(即由高层验证完整性保护);因此,MAC层将未验证完整性保护的数据包递交给高层;当该数据包经过处理到达PDCP后,PDCP如果以为该控制PDU已经在MAC层做过验证;将导致未被验证完整性保护的PDCP控制PDU被接收端应用,造成安全隐患。
步骤6.对于收到的MAC CE:如果MAC CE没有被保护,或不可识别,或完整性验证失败,则丢弃该MAC CE。
需要说明的是,上述多个实施例中仅是以目标层为MAC层进行举例说明,在本申请实施例中,目标层为RLC层时,RLC层的实现方式可以参见MAC的实现方式,此处不作赘述。
本申请实施例中,可以实现如下:
1.发送端:底层基于高层指示,对高层数据包启动底层安全(加密和/或完整性保护);
2.发送端:底层标识进行了底层安全处理(加密和/或完整性保护)的数据块,以便接收端确定需要进行安全处理(解密和/或完整性保护确认)的数据块;
3.接收端:识别出接收的数据中,已进行了底层安全操作的部分;并进行对应的底层解安全操作;
4接收端:识别出接收的数据中,需要进行底层安全的部分,如果其未通过完整性保护确认的数据块,底层直接丢弃;可选地,通知高层有数据包未通过完整性保护验证;
5.接收端:对于通过完整性保护确认的数据块,底层处理后递交高层,并通知高层该数据块通过了完整性保护验证;
6.接收端:对于接收的数据中未进行了底层安全操作的部分,进行不含解安全操作的其他该协议层规定的处理后,递交高层,并通知高层该数据块未启用完整性保护验证;
7.接收端:高层在应用对应的底层递交的数据时,确定是否需要且通过了底层完整性保护验证,如果需要但未通过底层完整性保护验证,高层丢弃该数据包。
本申请实施例中,可以实现在底层(如MAC层、RLC层)提供安全功能,实现PDCP/RLC控制PDU,MAC CE的安全保护。
请参见图9,图9是本申请实施例提供的一种消息传输装置的结构图,如图9所示,消息传输装置900包括:
处理模块901,用于在目标层对目标内容进行安全处理,所述目标层包括:分组数据汇聚协议PDCP层,和/或,PDCP层以下的协议层;其中,在所述目标层包括所述PDCP层的情况下,所述目标内容包括所述PDCP层产生的数据和信令中的至少一项;在所述目标层包括所述PDCP层以下的协议层的情况下,所述目标内容包括如下至少一项:所述目标层接收到的上层或高层数据、所述目标层接收到的上层或高层信令、所述目标层产生的信令;
发送模块902,用于发送目标消息,所述目标消息包括所述安全处理的内容。
可选地,所述安全处理包括如下至少一项:
加密、完整性保护。
可选地,在所述目标内容包括多个内容的情况下,所述加密包括:
将所述多个内容进行串接,并对所述串接的内容进行加密;
和/或,在所述目标内容包括多个内容的情况下,所述完整性保护包括:
将所述多个内容进行串接,并对所述串接的内容进行完整性保护。
可选地,所述目标消息还包括:
第一子协议数据单元PDU或者第一子头,所述第一子PDU或者所述第一子头用于指示如下至少一项:
所述安全处理的内容在所述目标消息中的位置;
所述目标层未进行安全处理的内容在所述目标消息中的位置。
可选地,所述第一子PDU或者所述第一子头通过所述第一子PDU或者所述第一子头在所述目标消息中的位置指示如下至少一项:
所述安全处理的内容在所述目标消息中的位置;
所述目标层未进行安全处理的内容在所述目标消息中的位置。
可选地,在所述目标消息中位于所述第一子PDU或者所述第一子头的第一侧的内容包括所述安全处理的内容;
和/或,在所述目标消息中位于所述第一子PDU或者所述第一子头的第二侧的内容包括未进行安全处理的内容;
所述第一侧和所述第二侧为相对的两侧。
可选地,所述第一子PDU或者所述第一子头还用于指示如下至少一项:
用于加密的参数;
用于完整性保护的参数;
用于完整性保护的比特流;
所述安全处理的内容对应的长度;
其中,在所述第一子PDU或者所述第一子头指示所述安全处理的内容对应的长度的情况下,通过所述第一子PDU或者所述第一子头在所述目标消息中的位置,以及所述安全处理的内容对应的长度指示如下至少一项:
所述安全处理的内容在所述目标消息中的位置;
所述目标层未进行安全处理的内容在所述目标消息中的位置。
可选地,所述第一子PDU或者所述第一子头用于显式指示:所述用于加密的参数和用于完整性保护的参数中的至少一项;或者
所述第一子PDU或者所述第一子头通过所述目标消息的传输资源隐式指示:所述用于加密的参数和用于完整性保护的参数中的至少一项。
可选地,所述参数包括:序列号。
可选地,所述第一子PDU为第一媒体接入控制MAC子协议数据单元PDU,所述第一MAC子PDU包括第一MAC控制单元CE,所述第一MAC CE为用于指示如下至少一项的MAC CE:
所述安全处理的内容在所述目标消息中的位置;
所述目标层未进行安全处理的内容在所述目标消息中的位置。
可选地,所述第一MAC CE还用于指示如下至少一项:
用于加密的参数;
用于完整性保护的参数;
用于完整性保护的比特流
所述安全处理的内容对应的长度;
其中,在所述第一MAC CE指示所述安全处理的内容对应的长度的情况下,所述第一MAC CE通过所述安全处理的内容对应的长度和所述第一MAC子PDU在所述目标消息中的位置指示如下至少一项:
所述安全处理的内容在所述目标消息中的位置;
所述目标层未进行安全处理的内容在所述目标消息中的位置。
可选地,所述第一子头为所述目标消息包括的第二MAC子PDU的MAC子头,所述第二MAC子PDU还包括所述安全处理的内容。
可选地,所述MAC子头还用于指示如下至少一项:
用于加密的参数;
用于完整性保护的参数;
用于完整性保护的比特流;
长度域,所述长度域用于指示所述第二MAC子PDU的载荷部分的长度,所述载荷部分包括所述安全处理的内容。
可选地,所述装置还包括:
接收模块,用于所述目标层接收处理指示,所述处理指示用于指示如下至少一项:
对所述目标内容进行安全处理,或者,不对所述目标内容进行安全处理;
需要安全处理的内容;
不需要安全处理的内容。
可选地,所述目标层包括如下至少一项:MAC层、RLC层;
在所述目标层包括所述MAC层的情况下,所述目标消息包括MAC PDU或者MAC传输块TB;
在所述目标层包括所述RLC层的情况下,所述目标消息包括RLC PDU。
可选地,在所述目标层包括所述MAC层的情况下,所述目标内容包括如下至少一项:
MAC服务数据单元SDU对应的MAC子PDU、第二MAC CE对应的MAC子PDU;
其中,所述MAC SDU包括:所述MAC层接收到的数据和所述MAC接收到的信令中的至少一项;
所述第二MAC CE为所述MAC层产生的信令。
上述消息传输装置可以提高通信的安全性。
本申请实施例中的资源指示装置可以是电子设备,例如具有操作系统的电子设备,也可以是电子设备中的部件,例如集成电路或芯片。例如:该电子设备可以是终端,也可以
为除终端之外的其他设备。示例性的,终端可以包括但不限于本申请实施例所列举的终端的类型,其他设备可以为服务器、网络附属存储器(Network Attached Storage,NAS)等,本申请实施例不作具体限定。
本申请实施例提供的消息传输装置能够实现图2所示的方法实施例实现的各个过程,并达到相同的技术效果,为避免重复,这里不再赘述。
请参见图10,图10是本申请实施例提供的一种消息传输装置的结构图,如图10所示,消息传输装置1000包括:
接收模块1001,用于接收目标消息;
验证模块1002,用于在所述目标消息包括安全处理的内容的情况下,所述接收端在目标层对所述安全处理的内容进行安全验证操作;
其中,所述安全处理的内容包括:发送端在所述目标层对目标内容进行安全处理的内容;
所述目标层包括:分组数据汇聚协议PDCP层,和/或,PDCP层以下的协议层。
可选地,所述装置还包括如下至少一项:
第一丢弃模块,用于在所述安全验证操作表示安全验证失败的情况下,所述接收端的所述目标层丢弃所述安全处理的内容;
第一递交模块,用于所述接收端的所述目标层向高层递交所述安全验证操作得到的第一内容。
可选地,所述装置还包括如下至少一项:
第一通知模块,用于在所述接收端丢弃所述目标消息中的携带的内容的情况下,所述接收端的所述目标层通知高层有内容未通过安全验证;
第二通知模块,用于在所述接收端的所述目标层向高层递交所述安全验证操作得到的内容的情况下,所述接收端的所述目标层通知高层所述安全验证操作得到的内容已通过安全验证。
可选地,所述装置还包括:
第二递交模块,用于在所述目标层确定所述目标消息包括未进行安全处理的内容的情况下,所述接收端的所述目标层向高层递交所述目标层未进行安全验证的第二内容;
第二丢弃模块,用于所述接收端的高层对于所述目标层递交的所述第二内容进行丢弃,所述第二内容为需要所述目标层进行安全验证的内容。
可选地,所述安全处理包括如下至少一项:
加密、完整性保护;
所述安全验证操作包括如下至少一项:
解密、完整性保护验证。
可选地,所述目标消息还包括:
第一子协议数据单元PDU或者第一子头,所述第一子PDU或者所述第一子头用于指
示如下至少一项:
所述安全处理的内容在所述目标消息中的位置;
所述目标层未进行安全处理的内容在所述目标消息中的位置;
验证模块1002用于:在所述接收端基于所述第一PDU或者所述第一子头确定所述目标消息包括安全处理的内容的情况下,所述接收端在目标层对所述安全处理的内容进行安全验证操作。
可选地,所述第一子PDU或者所述第一子头通过所述第一子PDU或者所述第一子头在所述目标消息中的位置指示如下至少一项:
所述安全处理的内容在所述目标消息中的位置;
所述目标层未进行安全处理的内容在所述目标消息中的位置。
可选地,在所述目标消息中位于所述第一子PDU或者所述第一子头的第一侧的内容包括所述安全处理的内容;
和/或,在所述目标消息中位于所述第一子PDU或者所述第一子头的第二侧的内容包括未进行安全处理的内容;
所述第一侧和所述第二侧为相对的两侧。
可选地,所述第一子PDU或者所述第一子头还用于指示如下至少一项:
用于加密的参数;
用于完整性保护的参数;
用于完整性保护的比特流;
所述安全处理的内容对应的长度;
验证模块1002用于:在所述接收端基于所述第一PDU或者所述第一子头确定所述目标消息包括安全处理的内容,以及基于所述第一PDU或者所述第一子头确定所述安全处理的内容在所述目标消息的位置的情况下,所述接收端基于所述用于加密的参数、用于完整性保护的参数和用于完整性保护的比特流中的至少一项,在目标层对所述安全处理的内容进行安全验证操作;其中,在所述第一子PDU或者所述第一子头指示所述安全处理的内容对应的长度的情况下,所述接收端通过所述第一子PDU或者所述第一子头在所述目标消息中的位置,以及所述安全处理的内容对应的长度确定所述安全处理的内容在所述目标消息中的位置。
可选地,所述第一子PDU为第一媒体接入控制MAC子协议数据单元PDU,所述第一MAC子PDU包括第一MAC控制单元CE,所述第一MAC CE为用于指示如下至少一项的新MAC CE:
所述安全处理的内容在所述目标消息中的位置;
所述目标层未进行安全处理的内容在所述目标消息中的位置。
可选地,所述第一MAC CE还用于指示如下至少一项:
用于加密的参数;
用于完整性保护的参数;
用于完整性保护的比特流
所述安全处理的内容对应的长度;
其中,在所述第一MAC CE指示所述安全处理的内容对应的长度的情况下,所述第一MAC CE通过所述安全处理的内容对应的长度和所述第一MAC子PDU在所述目标消息中的位置指示如下至少一项:
所述安全处理的内容在所述目标消息中的位置;
所述目标层未进行安全处理的内容在所述目标消息中的位置。
可选地,所述第一子头为所述目标消息包括的第二MAC子PDU的MAC子头,所述第二MAC子PDU还包括所述安全处理的内容。
可选地,所述MAC子头还用于指示如下至少一项:
用于加密的参数;
用于完整性保护的参数;
用于完整性保护的比特流;
长度域,所述长度域用于指示所述第二MAC子PDU的载荷部分的长度,所述载荷部分包括所述安全处理的内容。
可选地,所述目标层包括如下至少一项:MAC层、RLC层;
在所述目标层包括所述MAC层的情况下,所述目标消息包括MAC PDU或者MAC传输块TB;
在所述目标层包括所述RLC层的情况下,所述目标消息包括RLC PDU。
可选地,在所述目标层包括所述MAC层的情况下,所述目标内容包括如下至少一项:MAC服务数据单元SDU对应的MAC子PDU、第二MAC CE对应的MAC子PDU;
其中,所述MAC SDU包括:所述发送端的MAC层接收到的数据和所述MAC接收到的信令中的至少一项;
所述第二MAC CE为所述发送端的MAC层产生的信令。
上述消息传输装置可以提高通信的安全性。
本申请实施例中的消息传输装置可以是电子设备,例如具有操作系统的电子设备,也可以是电子设备中的部件,例如集成电路或芯片。该电子设备可以是终端或网络侧设备。
本申请实施例提供的消息传输装置能够实现图8所示的方法实施例实现的各个过程,并达到相同的技术效果,为避免重复,这里不再赘述。
可选地,如图11所示,本申请实施例还提供一种通信设备1100,包括处理器1101和存储器1102,存储器1102上存储有可在所述处理器1101上运行的程序或指令,例如,该通信设备1100为发送端时,该程序或指令被处理器1101执行时实现上述发送端侧的消息传输方法实施例的各个步骤,且能达到相同的技术效果。该通信设备1100为接收端时,该程序或指令被处理器1101执行时实现上述接收端的消息传输方法实施例的各个步骤,
且能达到相同的技术效果,为避免重复,这里不再赘述。
本申请实施例还提供一种通信设备,包括处理器及通信接口,其中,所述处理器用于在目标层对目标内容进行安全处理,所述目标层包括:分组数据汇聚协议PDCP层,和/或,PDCP层以下的协议层;其中,在所述目标层包括所述PDCP层的情况下,所述目标内容包括所述PDCP层产生的数据和信令中的至少一项;在所述目标层包括所述PDCP层以下的协议层的情况下,所述目标内容包括如下至少一项:所述目标层接收到的上层或高层数据、所述目标层接收到的上层或高层信令、所述目标层产生的信令;所述通信接口用于发送目标消息,所述目标消息包括所述安全处理的内容。或者,所述通信接口用于接收目标消息;所述处理器用于在所述目标消息包括安全处理的内容的情况下,所述接收端在目标层对所述安全处理的内容进行安全验证操作;其中,所述安全处理的内容包括:发送端在所述目标层对目标内容进行安全处理的内容;所述目标层包括:分组数据汇聚协议PDCP层,和/或,PDCP层以下的协议层。该通信设备实施例与上述消息传输方法实施例对应,上述方法实施例的各个实施过程和实现方式均可适用于该通信设备实施例中,且能达到相同的技术效果。
具体地,图12为实现本申请实施例的一种通信设备的硬件结构示意图。
该通信设备1200包括但不限于:射频单元1201、网络模块1202、音频输出单元1203、输入单元1204、传感器1205、显示单元1206、用户输入单元1207、接口单元1208、存储器1209以及处理器1210等中的至少部分部件。
本领域技术人员可以理解,通信设备1200还可以包括给各个部件供电的电源(比如电池),电源可以通过电源管理系统与处理器1210逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。图12中示出的通信设备结构并不构成对通信设备的限定,通信设备可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置,在此不再赘述。
应理解的是,本申请实施例中,输入单元1204可以包括图形处理器(Graphics Processing Unit,GPU)12041和麦克风12042,图形处理器12041对在视频捕获模式或图像捕获模式中由图像捕获装置(如摄像头)获得的静态图片或视频的图像数据进行处理。显示单元1206可包括显示面板12061,可以采用液晶显示器、有机发光二极管等形式来配置显示面板12061。用户输入单元1207包括触控面板12071以及其他输入设备12072中的至少一种。触控面板12071,也称为触摸屏。触控面板12071可包括触摸检测装置和触摸控制器两个部分。其他输入设备12072可以包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆,在此不再赘述。
本申请实施例中,射频单元1201接收来自网络侧设备的下行数据后,可以传输给处理器1210进行处理;另外,射频单元1201可以向网络侧设备发送上行数据。通常,射频单元1201包括但不限于天线、放大器、收发信机、耦合器、低噪声放大器、双工器等。
存储器1209可用于存储软件程序或指令以及各种数据。存储器1209可主要包括存储
程序或指令的第一存储区和存储数据的第二存储区,其中,第一存储区可存储操作系统、至少一个功能所需的应用程序或指令(比如声音播放功能、图像播放功能等)等。此外,存储器1209可以包括易失性存储器或非易失性存储器,或者,存储器1209可以包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(Read-Only Memory,ROM)、可编程只读存储器(Programmable ROM,PROM)、可擦除可编程只读存储器(Erasable PROM,EPROM)、电可擦除可编程只读存储器(Electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(Random Access Memory,RAM),静态随机存取存储器(Static RAM,SRAM)、动态随机存取存储器(Dynamic RAM,DRAM)、同步动态随机存取存储器(Synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(Double Data Rate SDRAM,DDRSDRAM)、增强型同步动态随机存取存储器(Enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(Synch link DRAM,SLDRAM)和直接内存总线随机存取存储器(Direct Rambus RAM,DRRAM)。本申请实施例中的存储器1209包括但不限于这些和任意其它适合类型的存储器。
处理器1210可包括一个或多个处理单元;可选地,处理器1210集成应用处理器和调制解调处理器,其中,应用处理器主要处理涉及操作系统、用户界面和应用程序等的操作,调制解调处理器主要处理无线通信信号,如基带处理器。可以理解的是,上述调制解调处理器也可以不集成到处理器1210中。
其中,处理器1210用于:在目标层对目标内容进行安全处理,所述目标层包括:分组数据汇聚协议PDCP层,和/或,PDCP层以下的协议层;其中,在所述目标层包括所述PDCP层的情况下,所述目标内容包括所述PDCP层产生的数据和信令中的至少一项;在所述目标层包括所述PDCP层以下的协议层的情况下,所述目标内容包括如下至少一项:所述目标层接收到的上层或高层数据、所述目标层接收到的上层或高层信令、所述目标层产生的信令;
射频单元1201,用于发送目标消息,所述目标消息包括所述安全处理的内容。
可选地,所述安全处理包括如下至少一项:
加密、完整性保护。
可选地,在所述目标内容包括多个内容的情况下,所述加密包括:
将所述多个内容进行串接,并对所述串接的内容进行加密;
和/或,在所述目标内容包括多个内容的情况下,所述完整性保护包括:
将所述多个内容进行串接,并对所述串接的内容进行完整性保护。
可选地,所述目标消息还包括:
第一子协议数据单元PDU或者第一子头,所述第一子PDU或者所述第一子头用于指示如下至少一项:
所述安全处理的内容在所述目标消息中的位置;
所述目标层未进行安全处理的内容在所述目标消息中的位置。
可选地,所述第一子PDU或者所述第一子头通过所述第一子PDU或者所述第一子头在所述目标消息中的位置指示如下至少一项:
所述安全处理的内容在所述目标消息中的位置;
所述目标层未进行安全处理的内容在所述目标消息中的位置。
可选地,在所述目标消息中位于所述第一子PDU或者所述第一子头的第一侧的内容包括所述安全处理的内容;
和/或,在所述目标消息中位于所述第一子PDU或者所述第一子头的第二侧的内容包括未进行安全处理的内容;
所述第一侧和所述第二侧为相对的两侧。
可选地,所述第一子PDU或者所述第一子头还用于指示如下至少一项:
用于加密的参数;
用于完整性保护的参数;
用于完整性保护的比特流;
所述安全处理的内容对应的长度;
其中,在所述第一子PDU或者所述第一子头指示所述安全处理的内容对应的长度的情况下,通过所述第一子PDU或者所述第一子头在所述目标消息中的位置,以及所述安全处理的内容对应的长度指示如下至少一项:
所述安全处理的内容在所述目标消息中的位置;
所述目标层未进行安全处理的内容在所述目标消息中的位置。
可选地,所述第一子PDU或者所述第一子头用于显式指示:所述用于加密的参数和用于完整性保护的参数中的至少一项;或者
所述第一子PDU或者所述第一子头通过所述目标消息的传输资源隐式指示:所述用于加密的参数和用于完整性保护的参数中的至少一项。
可选地,所述参数包括:序列号。
可选地,所述第一子PDU为第一媒体接入控制MAC子协议数据单元PDU,所述第一MAC子PDU包括第一MAC控制单元CE,所述第一MAC CE为用于指示如下至少一项的MAC CE:
所述安全处理的内容在所述目标消息中的位置;
所述目标层未进行安全处理的内容在所述目标消息中的位置。
可选地,所述第一MAC CE还用于指示如下至少一项:
用于加密的参数;
用于完整性保护的参数;
用于完整性保护的比特流
所述安全处理的内容对应的长度;
其中,在所述第一MAC CE指示所述安全处理的内容对应的长度的情况下,所述第
一MAC CE通过所述安全处理的内容对应的长度和所述第一MAC子PDU在所述目标消息中的位置指示如下至少一项:
所述安全处理的内容在所述目标消息中的位置;
所述目标层未进行安全处理的内容在所述目标消息中的位置。
可选地,所述第一子头为所述目标消息包括的第二MAC子PDU的MAC子头,所述第二MAC子PDU还包括所述安全处理的内容。
可选地,所述MAC子头还用于指示如下至少一项:
用于加密的参数;
用于完整性保护的参数;
用于完整性保护的比特流;
长度域,所述长度域用于指示所述第二MAC子PDU的载荷部分的长度,所述载荷部分包括所述安全处理的内容。
可选地,处理器1210还用于:
所述目标层接收处理指示,所述处理指示用于指示如下至少一项:
对所述目标内容进行安全处理,或者,不对所述目标内容进行安全处理;
需要安全处理的内容;
不需要安全处理的内容。
可选地,所述目标层包括如下至少一项:MAC层、RLC层;
在所述目标层包括所述MAC层的情况下,所述目标消息包括MAC PDU或者MAC传输块TB;
在所述目标层包括所述RLC层的情况下,所述目标消息包括RLC PDU。
可选地,在所述目标层包括所述MAC层的情况下,所述目标内容包括如下至少一项:
MAC服务数据单元SDU对应的MAC子PDU、第二MAC CE对应的MAC子PDU;
其中,所述MAC SDU包括:所述MAC层接收到的数据和所述MAC接收到的信令中的至少一项;
所述第二MAC CE为所述MAC层产生的信令。
需要说明的是,本实施例中以是发送端为终端进行举例说明。
上述通信设备可以提高通信的安全性。
具体地,本申请实施例还提供了一种通信设备。如图13所示,该通信设备1300包括:天线1301、射频装置1302、基带装置1303、处理器1304和存储器1305。天线1301与射频装置1302连接。在上行方向上,射频装置1302通过天线1301接收信息,将接收的信息发送给基带装置1303进行处理。在下行方向上,基带装置1303对要发送的信息进行处理,并发送给射频装置1302,射频装置1302对收到的信息进行处理后经过天线1301发送出去。
以上实施例中通信设备执行的方法可以在基带装置1303中实现,该基带装置1303包
括基带处理器。
基带装置1303例如可以包括至少一个基带板,该基带板上设置有多个芯片,如图13所示,其中一个芯片例如为基带处理器,通过总线接口与存储器1305连接,以调用存储器1305中的程序,执行以上方法实施例中所示的网络设备操作。
该通信设备还可以包括网络接口1306,该接口例如为通用公共无线接口(common public radio interface,CPRI)。
具体地,本申请实施例的通信设备1300还包括:存储在存储器1305上并可在处理器1304上运行的指令或程序,处理器1304调用存储器1305中的指令或程序执行图10所示各模块执行的方法,并达到相同的技术效果,为避免重复,故不在此赘述。
其中,射频装置1302,用于接收目标消息;
处理器1304,用于在所述目标消息包括安全处理的内容的情况下,在目标层对所述安全处理的内容进行安全验证操作;
其中,所述安全处理的内容包括:发送端在所述目标层对目标内容进行安全处理的内容;
所述目标层包括:分组数据汇聚协议PDCP层,和/或,PDCP层以下的协议层。
可选地,处理器1304还用于如下至少一项:
在所述安全验证操作表示安全验证失败的情况下,所述接收端的所述目标层丢弃所述安全处理的内容;
所述接收端的所述目标层向高层递交所述安全验证操作得到的第一内容。
可选地,处理器1304还用于如下至少一项:
在所述接收端丢弃所述目标消息中的携带的内容的情况下,所述接收端的所述目标层通知高层有内容未通过安全验证;
在所述接收端的所述目标层向高层递交所述安全验证操作得到的内容的情况下,所述接收端的所述目标层通知高层所述安全验证操作得到的内容已通过安全验证。
可选地,处理器1304还用于:
在所述目标层确定所述目标消息包括未进行安全处理的内容的情况下,所述接收端的所述目标层向高层递交所述目标层未进行安全验证的第二内容;
所述接收端的高层对于所述目标层递交的所述第二内容进行丢弃,所述第二内容为需要所述目标层进行安全验证的内容。
可选地,所述安全处理包括如下至少一项:
加密、完整性保护;
所述安全验证操作包括如下至少一项:
解密、完整性保护验证。
可选地,所述目标消息还包括:
第一子协议数据单元PDU或者第一子头,所述第一子PDU或者所述第一子头用于指
示如下至少一项:
所述安全处理的内容在所述目标消息中的位置;
所述目标层未进行安全处理的内容在所述目标消息中的位置;
所述在所述目标消息包括安全处理的内容的情况下,在目标层对所述安全处理的内容进行安全验证操作,包括:
在所述接收端基于所述第一PDU或者所述第一子头确定所述目标消息包括安全处理的内容的情况下,在目标层对所述安全处理的内容进行安全验证操作。
可选地,所述第一子PDU或者所述第一子头通过所述第一子PDU或者所述第一子头在所述目标消息中的位置指示如下至少一项:
所述安全处理的内容在所述目标消息中的位置;
所述目标层未进行安全处理的内容在所述目标消息中的位置。
可选地,在所述目标消息中位于所述第一子PDU或者所述第一子头的第一侧的内容包括所述安全处理的内容;
和/或,在所述目标消息中位于所述第一子PDU或者所述第一子头的第二侧的内容包括未进行安全处理的内容;
所述第一侧和所述第二侧为相对的两侧。
可选地,所述第一子PDU或者所述第一子头还用于指示如下至少一项:
用于加密的参数;
用于完整性保护的参数;
用于完整性保护的比特流;
所述安全处理的内容对应的长度;
所述在所述接收端基于所述第一PDU或者所述第一子头确定所述目标消息包括安全处理的内容的情况下,在目标层对所述安全处理的内容进行安全验证操作,包括:
在所述接收端基于所述第一PDU或者所述第一子头确定所述目标消息包括安全处理的内容,以及基于所述第一PDU或者所述第一子头确定所述安全处理的内容在所述目标消息的位置的情况下,基于所述用于加密的参数、用于完整性保护的参数和用于完整性保护的比特流中的至少一项,在目标层对所述安全处理的内容进行安全验证操作;其中,在所述第一子PDU或者所述第一子头指示所述安全处理的内容对应的长度的情况下,所述接收端通过所述第一子PDU或者所述第一子头在所述目标消息中的位置,以及所述安全处理的内容对应的长度确定所述安全处理的内容在所述目标消息中的位置。
可选地,所述第一子PDU为第一媒体接入控制MAC子协议数据单元PDU,所述第一MAC子PDU包括第一MAC控制单元CE,所述第一MAC CE为用于指示如下至少一项的新MAC CE:
所述安全处理的内容在所述目标消息中的位置;
所述目标层未进行安全处理的内容在所述目标消息中的位置。
可选地,所述第一MAC CE还用于指示如下至少一项:
用于加密的参数;
用于完整性保护的参数;
用于完整性保护的比特流
所述安全处理的内容对应的长度;
其中,在所述第一MAC CE指示所述安全处理的内容对应的长度的情况下,所述第一MAC CE通过所述安全处理的内容对应的长度和所述第一MAC子PDU在所述目标消息中的位置指示如下至少一项:
所述安全处理的内容在所述目标消息中的位置;
所述目标层未进行安全处理的内容在所述目标消息中的位置。
可选地,所述第一子头为所述目标消息包括的第二MAC子PDU的MAC子头,所述第二MAC子PDU还包括所述安全处理的内容。
可选地,所述MAC子头还用于指示如下至少一项:
用于加密的参数;
用于完整性保护的参数;
用于完整性保护的比特流;
长度域,所述长度域用于指示所述第二MAC子PDU的载荷部分的长度,所述载荷部分包括所述安全处理的内容。
可选地,所述目标层包括如下至少一项:MAC层、RLC层;
在所述目标层包括所述MAC层的情况下,所述目标消息包括MAC PDU或者MAC传输块TB;
在所述目标层包括所述RLC层的情况下,所述目标消息包括RLC PDU。
可选地,在所述目标层包括所述MAC层的情况下,所述目标内容包括如下至少一项:MAC服务数据单元SDU对应的MAC子PDU、第二MAC CE对应的MAC子PDU;
其中,所述MAC SDU包括:所述发送端的MAC层接收到的数据和所述MAC接收到的信令中的至少一项;
所述第二MAC CE为所述发送端的MAC层产生的信令。
需要说明的是,本实施例中以是接收端为网络侧设备进行举例说明。
上述通信设备可以提高通信的安全性。
本申请实施例还提供了一种可读存储介质,该存储介质可以是易失的或非易失的,所述可读存储介质上存储程序或指令,所述程序或指令被处理器执行时实现本申请实施例提供的上述消息传输方法的步骤。
其中,所述处理器为上述实施例中所述的终端中的处理器。所述可读存储介质,包括计算机可读存储介质,如计算机只读存储器ROM、随机存取存储器RAM、磁碟或者光盘等。
本申请实施例另提供了一种芯片,所述芯片包括处理器和通信接口,所述通信接口和所述处理器耦合,所述处理器用于运行程序或指令,实现上述消息传输方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。
应理解,本申请实施例提到的芯片还可以称为系统级芯片,系统芯片,芯片系统或片上系统芯片等。
本申请实施例另提供了一种计算机程序/程序产品,所述计算机程序/程序产品被存储在存储介质中,所述计算机程序/程序产品被至少一个处理器执行以实现上述消息传输方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。
本申请实施例还提供了一种消息传输系统,包括:发送端及接收端,所述发送端可用于执行如本申请实施例提供的发送端侧的消息传输方法的步骤,所述网络侧设备可用于执行如本申请实施例提供的接收端侧的消息传输方法的步骤。
需要说明的是,在本文中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者装置不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者装置所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的过程、方法、物品或者装置中还存在另外的相同要素。此外,需要指出的是,本申请实施方式中的方法和装置的范围不限按示出或讨论的顺序来执行功能,还可包括根据所涉及的功能按基本同时的方式或按相反的顺序来执行功能,例如,可以按不同于所描述的次序来执行所描述的方法,并且还可以添加、省去、或组合各种步骤。另外,参照某些示例所描述的特征可在其他示例中被组合。
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到上述实施例方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本申请的技术方案本质上或者说对相关技术做出贡献的部分可以以计算机软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端(可以是手机,计算机,服务器,空调器,或者网络设备等)执行本申请各个实施例所述的方法。
上面结合附图对本申请的实施例进行了描述,但是本申请并不局限于上述的具体实施方式,上述的具体实施方式仅仅是示意性的,而不是限制性的,本领域的普通技术人员在本申请的启示下,在不脱离本申请宗旨和权利要求所保护的范围情况下,还可做出很多形式,均属于本申请的保护之内。
Claims (35)
- 一种消息传输方法,包括:发送端在目标层对目标内容进行安全处理,所述目标层包括:分组数据汇聚协议PDCP层,和/或,PDCP层以下的协议层;其中,在所述目标层包括所述PDCP层的情况下,所述目标内容包括所述PDCP层产生的数据和信令中的至少一项;在所述目标层包括所述PDCP层以下的协议层的情况下,所述目标内容包括如下至少一项:所述目标层接收到的上层或高层数据、所述目标层接收到的上层或高层信令、所述目标层产生的信令;所述发送端发送目标消息,所述目标消息包括所述安全处理的内容。
- 如权利要求1所述的方法,其中,所述安全处理包括如下至少一项:加密、完整性保护。
- 如权利要求2所述的方法,其中,在所述目标内容包括多个内容的情况下,所述加密包括:将所述多个内容进行串接,并对所述串接的内容进行加密;和/或,在所述目标内容包括多个内容的情况下,所述完整性保护包括:将所述多个内容进行串接,并对所述串接的内容进行完整性保护。
- 如权利要求1至3中任一项所述的方法,其中,所述目标消息还包括:第一子协议数据单元PDU或者第一子头,所述第一子PDU或者所述第一子头用于指示如下至少一项:所述安全处理的内容在所述目标消息中的位置;所述目标层未进行安全处理的内容在所述目标消息中的位置。
- 如权利要求4所述的方法,其中,所述第一子PDU或者所述第一子头通过所述第一子PDU或者所述第一子头在所述目标消息中的位置指示如下至少一项:所述安全处理的内容在所述目标消息中的位置;所述目标层未进行安全处理的内容在所述目标消息中的位置。
- 如权利要求4或5所述的方法,其中,在所述目标消息中位于所述第一子PDU或者所述第一子头的第一侧的内容包括所述安全处理的内容;和/或,在所述目标消息中位于所述第一子PDU或者所述第一子头的第二侧的内容包括未进行安全处理的内容;所述第一侧和所述第二侧为相对的两侧。
- 如权利要求4至6中任一项所述的方法,其中,所述第一子PDU或者所述第一子头还用于指示如下至少一项:用于加密的参数;用于完整性保护的参数;用于完整性保护的比特流;所述安全处理的内容对应的长度;其中,在所述第一子PDU或者所述第一子头指示所述安全处理的内容对应的长度的情况下,通过所述第一子PDU或者所述第一子头在所述目标消息中的位置,以及所述安全处理的内容对应的长度指示如下至少一项:所述安全处理的内容在所述目标消息中的位置;所述目标层未进行安全处理的内容在所述目标消息中的位置。
- 如权利要求7所述的方法,其中,所述第一子PDU或者所述第一子头用于显式指示:所述用于加密的参数和用于完整性保护的参数中的至少一项;或者所述第一子PDU或者所述第一子头通过所述目标消息的传输资源隐式指示:所述用于加密的参数和用于完整性保护的参数中的至少一项。
- 如权利要求7所述的方法,其中,所述参数包括:序列号。
- 如权利要求4至9中任一项所述的方法,其中,所述第一子PDU为第一媒体接入控制MAC子协议数据单元PDU,所述第一MAC子PDU包括第一MAC控制单元CE,所述第一MAC CE为用于指示如下至少一项的MAC CE:所述安全处理的内容在所述目标消息中的位置;所述目标层未进行安全处理的内容在所述目标消息中的位置。
- 如权利要求10所述的方法,其中,所述第一MAC CE还用于指示如下至少一项:用于加密的参数;用于完整性保护的参数;用于完整性保护的比特流所述安全处理的内容对应的长度;其中,在所述第一MAC CE指示所述安全处理的内容对应的长度的情况下,所述第一MAC CE通过所述安全处理的内容对应的长度和所述第一MAC子PDU在所述目标消息中的位置指示如下至少一项:所述安全处理的内容在所述目标消息中的位置;所述目标层未进行安全处理的内容在所述目标消息中的位置。
- 如权利要求4至9中任一项所述的方法,其中,所述第一子头为所述目标消息包括的第二MAC子PDU的MAC子头,所述第二MAC子PDU还包括所述安全处理的内容。
- 如权利要求12所述的方法,其中,所述MAC子头还用于指示如下至少一项:用于加密的参数;用于完整性保护的参数;用于完整性保护的比特流;长度域,所述长度域用于指示所述第二MAC子PDU的载荷部分的长度,所述载荷部分包括所述安全处理的内容。
- 如权利要求1至13中任一项所述的方法,还包括:所述发送端的所述目标层接收处理指示,所述处理指示用于指示如下至少一项:对所述目标内容进行安全处理,或者,不对所述目标内容进行安全处理;需要安全处理的内容;不需要安全处理的内容。
- 如权利要求1至14中任一项所述的方法,其中,所述目标层包括如下至少一项:MAC层、RLC层;在所述目标层包括所述MAC层的情况下,所述目标消息包括MAC PDU或者MAC传输块TB;在所述目标层包括所述RLC层的情况下,所述目标消息包括RLC PDU。
- 如权利要求15所述的方法,其中,在所述目标层包括所述MAC层的情况下,所述目标内容包括如下至少一项:MAC服务数据单元SDU对应的MAC子PDU、第二MAC CE对应的MAC子PDU;其中,所述MAC SDU包括:所述MAC层接收到的数据和所述MAC接收到的信令中的至少一项;所述第二MAC CE为所述MAC层产生的信令。
- 一种消息传输方法,包括:接收端接收目标消息;在所述目标消息包括安全处理的内容的情况下,所述接收端在目标层对所述安全处理的内容进行安全验证操作;其中,所述安全处理的内容包括:发送端在所述目标层对目标内容进行安全处理的内容;所述目标层包括:分组数据汇聚协议PDCP层,和/或,PDCP层以下的协议层。
- 如权利要求17所述的方法,还包括如下至少一项:在所述安全验证操作表示安全验证失败的情况下,所述接收端的所述目标层丢弃所述安全处理的内容;所述接收端的所述目标层向高层递交所述安全验证操作得到的第一内容。
- 如权利要求18所述的方法,还包括如下至少一项:在所述接收端丢弃所述目标消息中的携带的内容的情况下,所述接收端的所述目标层通知高层有内容未通过安全验证;在所述接收端的所述目标层向高层递交所述安全验证操作得到的内容的情况下,所述接收端的所述目标层通知高层所述安全验证操作得到的内容已通过安全验证。
- 如权利要求17至19中任一项所述的方法,还包括:在所述目标层确定所述目标消息包括未进行安全处理的内容的情况下,所述接收端的所述目标层向高层递交所述目标层未进行安全验证的第二内容;所述接收端的高层对于所述目标层递交的所述第二内容进行丢弃,所述第二内容为需 要所述目标层进行安全验证的内容。
- 如权利要求17至20中任一项所述的方法,其中,所述安全处理包括如下至少一项:加密、完整性保护;所述安全验证操作包括如下至少一项:解密、完整性保护验证。
- 如权利要求17至21中任一项所述的方法,其中,所述目标消息还包括:第一子协议数据单元PDU或者第一子头,所述第一子PDU或者所述第一子头用于指示如下至少一项:所述安全处理的内容在所述目标消息中的位置;所述目标层未进行安全处理的内容在所述目标消息中的位置;所述在所述目标消息包括安全处理的内容的情况下,所述接收端在目标层对所述安全处理的内容进行安全验证操作,包括:在所述接收端基于所述第一PDU或者所述第一子头确定所述目标消息包括安全处理的内容的情况下,所述接收端在目标层对所述安全处理的内容进行安全验证操作。
- 如权利要求22所述的方法,其中,所述第一子PDU或者所述第一子头通过所述第一子PDU或者所述第一子头在所述目标消息中的位置指示如下至少一项:所述安全处理的内容在所述目标消息中的位置;所述目标层未进行安全处理的内容在所述目标消息中的位置。
- 如权利要求23所述的方法,其中,在所述目标消息中位于所述第一子PDU或者所述第一子头的第一侧的内容包括所述安全处理的内容;和/或,在所述目标消息中位于所述第一子PDU或者所述第一子头的第二侧的内容包括未进行安全处理的内容;所述第一侧和所述第二侧为相对的两侧。
- 如权利要求22至24中任一项所述的方法,其中,所述第一子PDU或者所述第一子头还用于指示如下至少一项:用于加密的参数;用于完整性保护的参数;用于完整性保护的比特流;所述安全处理的内容对应的长度;所述在所述接收端基于所述第一PDU或者所述第一子头确定所述目标消息包括安全处理的内容的情况下,所述接收端在目标层对所述安全处理的内容进行安全验证操作,包括:在所述接收端基于所述第一PDU或者所述第一子头确定所述目标消息包括安全处理的内容,以及基于所述第一PDU或者所述第一子头确定所述安全处理的内容在所述目标 消息的位置的情况下,所述接收端基于所述用于加密的参数、用于完整性保护的参数和用于完整性保护的比特流中的至少一项,在目标层对所述安全处理的内容进行安全验证操作;其中,在所述第一子PDU或者所述第一子头指示所述安全处理的内容对应的长度的情况下,所述接收端通过所述第一子PDU或者所述第一子头在所述目标消息中的位置,以及所述安全处理的内容对应的长度确定所述安全处理的内容在所述目标消息中的位置。
- 如权利要求22至25中任一项所述的方法,其中,所述第一子PDU为第一媒体接入控制MAC子协议数据单元PDU,所述第一MAC子PDU包括第一MAC控制单元CE,所述第一MAC CE为用于指示如下至少一项的新MAC CE:所述安全处理的内容在所述目标消息中的位置;所述目标层未进行安全处理的内容在所述目标消息中的位置。
- 如权利要求26所述的方法,其中,所述第一MAC CE还用于指示如下至少一项:用于加密的参数;用于完整性保护的参数;用于完整性保护的比特流所述安全处理的内容对应的长度;其中,在所述第一MAC CE指示所述安全处理的内容对应的长度的情况下,所述第一MAC CE通过所述安全处理的内容对应的长度和所述第一MAC子PDU在所述目标消息中的位置指示如下至少一项:所述安全处理的内容在所述目标消息中的位置;所述目标层未进行安全处理的内容在所述目标消息中的位置。
- 如权利要求22至27中任一项所述的方法,其中,所述第一子头为所述目标消息包括的第二MAC子PDU的MAC子头,所述第二MAC子PDU还包括所述安全处理的内容。
- 如权利要求28所述的方法,其中,所述MAC子头还用于指示如下至少一项:用于加密的参数;用于完整性保护的参数;用于完整性保护的比特流;长度域,所述长度域用于指示所述第二MAC子PDU的载荷部分的长度,所述载荷部分包括所述安全处理的内容。
- 如权利要求17至29中任一项所述的方法,其中,所述目标层包括如下至少一项:MAC层、RLC层;在所述目标层包括所述MAC层的情况下,所述目标消息包括MAC PDU或者MAC传输块TB;在所述目标层包括所述RLC层的情况下,所述目标消息包括RLC PDU。
- 如权利要求30所述的方法,其中,在所述目标层包括所述MAC层的情况下,所 述目标内容包括如下至少一项:MAC服务数据单元SDU对应的MAC子PDU、第二MAC CE对应的MAC子PDU;其中,所述MAC SDU包括:所述发送端的MAC层接收到的数据和所述MAC接收到的信令中的至少一项;所述第二MAC CE为所述发送端的MAC层产生的信令。
- 一种消息传输装置,包括:处理模块,用于在目标层对目标内容进行安全处理,所述目标层包括:分组数据汇聚协议PDCP层,和/或,PDCP层以下的协议层;其中,在所述目标层包括所述PDCP层的情况下,所述目标内容包括所述PDCP层产生的数据和信令中的至少一项;在所述目标层包括所述PDCP层以下的协议层的情况下,所述目标内容包括如下至少一项:所述目标层接收到的上层或高层数据、所述目标层接收到的上层或高层信令、所述目标层产生的信令;发送模块,用于发送目标消息,所述目标消息包括所述安全处理的内容。
- 一种消息传输装置,包括:接收模块,用于接收目标消息;验证模块,用于在所述目标消息包括安全处理的内容的情况下,在目标层对所述安全处理的内容进行安全验证操作;其中,所述安全处理的内容包括:发送端在所述目标层对目标内容进行安全处理的内容;所述目标层包括:分组数据汇聚协议PDCP层,和/或,PDCP层以下的协议层。
- 一种通信设备,包括处理器和存储器,所述存储器存储可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现如权利要求1至16任一项所述的消息传输方法的步骤,或者,所述程序或指令被所述处理器执行时实现如权利要求17至31任一项所述的消息传输方法的步骤。
- 一种可读存储介质,所述可读存储介质上存储程序或指令,所述程序或指令被处理器执行时实现如权利要求1至16任一项所述的消息传输方法的步骤,或者,所述程序或指令被处理器执行时实现如权利要求17至31任一项所述的消息传输方法的步骤。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310086350.3A CN118368616A (zh) | 2023-01-19 | 2023-01-19 | 消息传输方法、装置及设备 |
CN202310086350.3 | 2023-01-19 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2024153014A1 true WO2024153014A1 (zh) | 2024-07-25 |
Family
ID=91875289
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2024/072233 WO2024153014A1 (zh) | 2023-01-19 | 2024-01-15 | 消息传输方法、装置及设备 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN118368616A (zh) |
WO (1) | WO2024153014A1 (zh) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106330763A (zh) * | 2015-06-30 | 2017-01-11 | 中兴通讯股份有限公司 | 数据处理方法及装置 |
CN110035042A (zh) * | 2018-01-12 | 2019-07-19 | 华为技术有限公司 | 一种数据传输方法及装置 |
US20200028626A1 (en) * | 2017-04-01 | 2020-01-23 | Huawei Technologies Co., Ltd. | Data Processing Method And Device |
WO2021195894A1 (zh) * | 2020-03-30 | 2021-10-07 | Oppo广东移动通信有限公司 | 完整性保护方法和通信设备 |
-
2023
- 2023-01-19 CN CN202310086350.3A patent/CN118368616A/zh active Pending
-
2024
- 2024-01-15 WO PCT/CN2024/072233 patent/WO2024153014A1/zh unknown
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106330763A (zh) * | 2015-06-30 | 2017-01-11 | 中兴通讯股份有限公司 | 数据处理方法及装置 |
US20200028626A1 (en) * | 2017-04-01 | 2020-01-23 | Huawei Technologies Co., Ltd. | Data Processing Method And Device |
CN110035042A (zh) * | 2018-01-12 | 2019-07-19 | 华为技术有限公司 | 一种数据传输方法及装置 |
CN112039944A (zh) * | 2018-01-12 | 2020-12-04 | 华为技术有限公司 | 一种数据传输方法及装置 |
WO2021195894A1 (zh) * | 2020-03-30 | 2021-10-07 | Oppo广东移动通信有限公司 | 完整性保护方法和通信设备 |
Also Published As
Publication number | Publication date |
---|---|
CN118368616A (zh) | 2024-07-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR100865357B1 (ko) | 무선 통신 시스템의 이동 사용자 장치에서 무결성 보호구성을 수정하는 방법 및 장치 | |
KR101159441B1 (ko) | Lte 모바일 유닛에서의 비접속 계층(nas) 보안을 가능하게 하는 방법 및 장치 | |
US8838972B2 (en) | Exchange of key material | |
WO2020052414A1 (zh) | 一种数据保护方法、设备及系统 | |
KR102588139B1 (ko) | 이용되는 보안 키들에 영향을 주는 연결 재구성의 일부로서 베어러 특정 변경들을 구현하기 위한 방법 및 장치 | |
EP3840518A1 (en) | Rrc connection method, device, and system | |
US20080120728A1 (en) | Method and apparatus for performing integrity protection in a wireless communications system | |
US20070155339A1 (en) | Method and apparatus for initialization of integrity protection | |
US20080181149A1 (en) | Method and apparatus for handling packets in a wireless communications system | |
EP1942625B1 (en) | Method and apparatus for performing ciphering in a wireless communications system | |
US20210168614A1 (en) | Data Transmission Method and Device | |
US10880737B2 (en) | Method and apparatus for refreshing the security keys of a subset of configured radio bearers | |
WO2022134089A1 (zh) | 一种安全上下文生成方法、装置及计算机可读存储介质 | |
WO2021062809A1 (zh) | 一种时刻信息的通知方法和装置 | |
WO2024153014A1 (zh) | 消息传输方法、装置及设备 | |
WO2024193512A1 (zh) | 数据处理方法、装置、网络侧设备及终端设备 | |
US9237441B2 (en) | Method and apparatus for configuring signaling radio bearer in a wireless communications system | |
US20080118067A1 (en) | Method and apparatus for performing ciphering in a wireless communications system | |
US20240284172A1 (en) | Secure communication method and related device | |
WO2023131044A1 (zh) | 认证与安全方法、装置及存储介质 | |
WO2024114642A2 (zh) | 数据包的处理方法及通信设备 | |
CN109451493B (zh) | 基于wpa的密钥配置方法及装置 | |
WO2024198962A1 (zh) | 应用鉴权方法和装置 | |
US20230328532A1 (en) | Communication method and apparatus for trusted or untrusted relay, terminal, and network side device | |
WO2021239076A1 (zh) | 密钥获取方法、装置、用户设备及网络侧设备 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 24744190 Country of ref document: EP Kind code of ref document: A1 |