CN112019489A - Verification method and device - Google Patents
Verification method and device Download PDFInfo
- Publication number
- CN112019489A CN112019489A CN201910472664.0A CN201910472664A CN112019489A CN 112019489 A CN112019489 A CN 112019489A CN 201910472664 A CN201910472664 A CN 201910472664A CN 112019489 A CN112019489 A CN 112019489A
- Authority
- CN
- China
- Prior art keywords
- node
- terminal
- access network
- verification code
- network device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000012795 verification Methods 0.000 title claims abstract description 413
- 238000000034 method Methods 0.000 title claims abstract description 207
- 238000004891 communication Methods 0.000 claims abstract description 116
- 230000005540 biological transmission Effects 0.000 claims description 66
- 230000015654 memory Effects 0.000 claims description 39
- 238000004590 computer program Methods 0.000 claims description 11
- 238000012545 processing Methods 0.000 description 60
- 230000004044 response Effects 0.000 description 53
- 230000009471 action Effects 0.000 description 40
- 230000006870 function Effects 0.000 description 32
- 230000008569 process Effects 0.000 description 31
- 238000010586 diagram Methods 0.000 description 28
- 230000001413 cellular effect Effects 0.000 description 15
- 238000005516 engineering process Methods 0.000 description 5
- 238000012986 modification Methods 0.000 description 5
- 230000004048 modification Effects 0.000 description 5
- 230000003287 optical effect Effects 0.000 description 5
- 108091005487 SCARB1 Proteins 0.000 description 4
- 102100037118 Scavenger receptor class B member 1 Human genes 0.000 description 4
- 230000011664 signaling Effects 0.000 description 4
- 230000000694 effects Effects 0.000 description 3
- 239000000969 carrier Substances 0.000 description 2
- 230000008094 contradictory effect Effects 0.000 description 2
- 230000007774 longterm Effects 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 230000008901 benefit Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 239000003795 chemical substances by application Substances 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 238000005259 measurement Methods 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 230000002085 persistent effect Effects 0.000 description 1
- 238000013468 resource allocation Methods 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 230000001568 sexual effect Effects 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 238000001228 spectrum Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0807—Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/085—Secret sharing or secret splitting, e.g. threshold schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
本申请提供了一种验证方法及装置,涉及通信技术领域。在该方法中,终端从第一节点接收根据第一根密钥和第一节点的标识生成的第一验证码和第一节点的标识,并根据第一节点的标识、第一根密钥和第一验证码验证第一节点的合法性。其中,第一根密钥为终端与接入网设备之间通信所使用的根密钥。
The present application provides a verification method and device, which relate to the technical field of communications. In this method, the terminal receives the first verification code and the first node's identification generated according to the first root key and the first node's identification from the first node, and generates the first verification code according to the first node's identification, the first root key and the first node's identification The first verification code verifies the legitimacy of the first node. The first root key is a root key used for communication between the terminal and the access network device.
Description
技术领域technical field
本申请涉及通信技术领域,尤其涉及一种验证方法及装置。The present application relates to the field of communication technologies, and in particular, to a verification method and device.
背景技术Background technique
对于设备到设备(device-to-device,简称D2D)通信、车联网(vehicle toeverything,简称V2X)通信(一种特殊的D2D通信),均是发送端和接收端分别从服务器(例如,近场通信(proximity service,简称ProSe)功能(function))获取共享密钥,然后再基于共享密钥进行双方握手,从而实现互相验证的目的。这种方法主要适用于角色对称(即功能相同)的两个终端之间进行互相验证。此外,由于服务器位于核心网的数据网络(datanetwork,简称DN)中,因此,发送端或接收端获取共享密钥的耗时比较久,从而导致发送端(或接收端)验证接收端(或发送端)的时间较长。For device-to-device (D2D for short) communication and vehicle toeverything (V2X for short) communication (a special D2D communication), the sender and receiver The communication (proximity service, ProSe for short) function (function) obtains the shared key, and then handshakes both parties based on the shared key, so as to achieve the purpose of mutual authentication. This method is mainly suitable for mutual authentication between two terminals with symmetrical roles (that is, with the same function). In addition, since the server is located in the data network (DN) of the core network, it takes a long time for the sender or receiver to obtain the shared key, which causes the sender (or receiver) to verify the receiver (or sender). end) for a longer time.
发明内容SUMMARY OF THE INVENTION
本申请实施例提供了一种验证方法及装置,用于降低发送端(或接收端)验证接收端(或发送端)的时间。Embodiments of the present application provide a verification method and apparatus, which are used to reduce the time for a sender (or receiver) to verify the receiver (or sender).
为达到上述目的,本申请实施例提供如下技术方案:To achieve the above purpose, the embodiments of the present application provide the following technical solutions:
第一方面,提供了一种验证方法,该方法可以由终端或者终端中的芯片执行,包括:终端从第一节点接收根据第一根密钥和第一节点的标识生成的第一验证码和第一节点的标识,并根据第一节点的标识、第一根密钥和第一验证码验证第一节点的合法性。其中,第一根密钥为终端与接入网设备之间通信所使用的根密钥。现有技术中,由于服务器位于DN中。因此,终端从服务器获取共享密钥时,需要较长的时间。第一方面提供的方法,在验证第一节点的合法性时,终端根据第一根密钥、接收到的第一节点的标识以及第一验证码就可以对第一节点的合法性进行验证,而不需要从服务器中获取共享密钥,因此,可以缩短终端验证第一节点的合法性的时间。A first aspect provides a verification method, which can be executed by a terminal or a chip in the terminal, including: the terminal receiving from a first node a first verification code and The identity of the first node, and the validity of the first node is verified according to the identity of the first node, the first root key and the first verification code. The first root key is a root key used for communication between the terminal and the access network device. In the prior art, since the server is located in the DN. Therefore, it takes a long time for the terminal to obtain the shared key from the server. In the method provided in the first aspect, when verifying the legality of the first node, the terminal can verify the legality of the first node according to the first root key, the received identifier of the first node and the first verification code, There is no need to obtain the shared key from the server, therefore, the time for the terminal to verify the legitimacy of the first node can be shortened.
在一种可能的实现方式中,终端和第一节点通过侧链路通信。In a possible implementation manner, the terminal communicates with the first node through a side link.
在一种可能的实现方式中,该方法还包括:终端向第一节点发送用于请求关联到第一节点的第一请求消息,第一节点负责分配侧链路的传输资源,第一请求消息中包括终端发送给接入网设备的RRC消息。现有技术中,由于服务器位于DN中。因此,第一节点从服务器获取共享密钥时,需要较长的时间。该种可能的实现方式,在验证终端的合法性时,接入网设备可以根据RRC消息对终端的合法性验证,而不需要第一节点从服务器中获取共享密钥,因此,可以缩短验证终端的合法性的时间。In a possible implementation manner, the method further includes: the terminal sends a first request message for requesting association with the first node to the first node, the first node is responsible for allocating transmission resources of the side link, and the first request message It includes the RRC message sent by the terminal to the access network device. In the prior art, since the server is located in the DN. Therefore, it takes a long time for the first node to obtain the shared key from the server. In this possible implementation manner, when verifying the legitimacy of the terminal, the access network device can verify the legitimacy of the terminal according to the RRC message without requiring the first node to obtain the shared key from the server. Therefore, the verification of the terminal can be shortened. time of legitimacy.
在一种可能的实现方式中,该方法还包括:终端向第一节点发送用于请求关联到第一节点的第一请求消息,第一节点负责分配侧链路的传输资源,第一请求消息中包括第三验证码,第三验证码用于验证终端的合法性。现有技术中,由于服务器位于DN中。因此,第一节点从服务器获取共享密钥时,需要较长的时间。该种可能的实现方式,在验证终端的合法性时,接入网设备可以根据终端发送的由第一根密钥生成的第三验证码验证终端的合法性,而不需要第一节点从服务器中获取共享密钥,因此,可以缩短验证终端的合法性的时间。In a possible implementation manner, the method further includes: the terminal sends a first request message for requesting association with the first node to the first node, the first node is responsible for allocating transmission resources of the side link, and the first request message It includes a third verification code, and the third verification code is used to verify the legitimacy of the terminal. In the prior art, since the server is located in the DN. Therefore, it takes a long time for the first node to obtain the shared key from the server. In this possible implementation manner, when verifying the legitimacy of the terminal, the access network device can verify the legitimacy of the terminal according to the third verification code generated by the first root key sent by the terminal, without requiring the first node from the server Therefore, the time to verify the legitimacy of the terminal can be shortened.
在一种可能的实现方式中,终端向第一节点发送第一请求消息,包括:终端接收第一节点在侧链路广播的通知消息,并根据通知消息向第一节点发送第一请求消息。其中,通知消息中包括用于指示第一节点是负责分配侧链路的传输资源的节点的指示信息。In a possible implementation manner, the terminal sending the first request message to the first node includes: the terminal receiving a notification message broadcast by the first node on the side link, and sending the first request message to the first node according to the notification message. Wherein, the notification message includes indication information for indicating that the first node is the node responsible for allocating transmission resources of the side link.
在一种可能的实现方式中,终端根据第一节点的标识、第一根密钥和第一验证码验证第一节点的合法性,包括:终端根据第一节点的标识和第一根密钥生成第二验证码,并根据第二验证码和第一验证码验证第一节点的合法性。In a possible implementation manner, the terminal verifies the legitimacy of the first node according to the identifier of the first node, the first root key and the first verification code, including: the terminal verifies the legitimacy of the first node according to the identifier of the first node and the first root key A second verification code is generated, and the legitimacy of the first node is verified according to the second verification code and the first verification code.
第二方面,提供了一种验证方法,包括:第一节点从接入网设备接收根据第一根密钥和第一节点的标识生成的第一验证码,并向终端发送第一验证码和第一节点的标识,第一节点的标识和第一验证码用于验证第一节点的合法性。其中,第一根密钥为终端与接入网设备之间通信所使用的根密钥。现有技术中,由于服务器位于DN中。因此,终端从服务器获取共享密钥时,需要较长的时间。第二方面提供的方法,在验证第一节点的合法性时,终端根据第一根密钥、接收到的第一节点的标识以及第一验证码就可以对第一节点的合法性验证,而不需要从服务器中获取共享密钥,因此,可以缩短终端验证第一节点的合法性的时间。In a second aspect, a verification method is provided, comprising: a first node receiving a first verification code generated according to a first root key and an identification of the first node from an access network device, and sending the first verification code and The identifier of the first node, the identifier of the first node and the first verification code are used to verify the legitimacy of the first node. The first root key is a root key used for communication between the terminal and the access network device. In the prior art, since the server is located in the DN. Therefore, it takes a long time for the terminal to obtain the shared key from the server. In the method provided in the second aspect, when verifying the legality of the first node, the terminal can verify the legality of the first node according to the first root key, the received identifier of the first node and the first verification code, and There is no need to obtain the shared key from the server, therefore, the time for the terminal to verify the legitimacy of the first node can be shortened.
在一种可能的实现方式中,终端和第一节点通过侧链路通信。In a possible implementation manner, the terminal communicates with the first node through a side link.
在一种可能的实现方式中,该方法还包括:第一节点从终端接收用于请求关联到第一节点的第一请求消息,第一节点负责分配侧链路的传输资源,第一请求消息中包括终端发送给接入网设备的RRC消息;第一节点根据第一请求消息向接入网设备发送包括RRC消息的第二请求消息,RRC消息用于接入网设备验证终端的合法性。现有技术中,由于服务器位于DN中。因此,第一节点从服务器获取共享密钥时,需要较长的时间。该种可能的实现方式,在验证终端的合法性时,接入网设备可以根据RRC消息对终端的合法性验证,而不需要第一节点从服务器中获取共享密钥,因此,可以缩短验证终端的合法性的时间。In a possible implementation manner, the method further includes: the first node receives from the terminal a first request message for requesting association with the first node, the first node is responsible for allocating transmission resources of the side link, and the first request message includes an RRC message sent by the terminal to the access network device; the first node sends a second request message including an RRC message to the access network device according to the first request message, and the RRC message is used by the access network device to verify the legitimacy of the terminal. In the prior art, since the server is located in the DN. Therefore, it takes a long time for the first node to obtain the shared key from the server. In this possible implementation manner, when verifying the legitimacy of the terminal, the access network device can verify the legitimacy of the terminal according to the RRC message without requiring the first node to obtain the shared key from the server. Therefore, the verification of the terminal can be shortened. time of legitimacy.
在一种可能的实现方式中,该方法还包括:第一节点从终端接收用于请求关联到第一节点的第一请求消息,第一节点负责分配侧链路的传输资源,第一请求消息中包括第三验证码,第三验证码用于验证终端的合法性;第一节点根据第一请求消息向接入网设备发送包括第三验证码的第二请求消息。现有技术中,由于服务器位于DN中。因此,第一节点从服务器获取共享密钥时,需要较长的时间。该种可能的实现方式,在验证终端的合法性时,接入网设备可以根据终端发送的由第一根密钥生成的第三验证码验证终端的合法性,而不需要第一节点从服务器中获取共享密钥,因此,可以缩短验证终端的合法性的时间。In a possible implementation manner, the method further includes: the first node receives from the terminal a first request message for requesting association with the first node, the first node is responsible for allocating transmission resources of the side link, and the first request message The third verification code is used to verify the legitimacy of the terminal; the first node sends a second request message including the third verification code to the access network device according to the first request message. In the prior art, since the server is located in the DN. Therefore, it takes a long time for the first node to obtain the shared key from the server. In this possible implementation manner, when verifying the legitimacy of the terminal, the access network device can verify the legitimacy of the terminal according to the third verification code generated by the first root key sent by the terminal, without requiring the first node from the server Therefore, the time to verify the legitimacy of the terminal can be shortened.
在一种可能的实现方式中,该方法还包括:第一节点在侧链路广播通知消息,通知消息中包括用于指示第一节点是负责分配侧链路的传输资源的节点的指示信息。In a possible implementation manner, the method further includes: the first node broadcasts a notification message on the side link, where the notification message includes indication information for indicating that the first node is a node responsible for allocating transmission resources of the side link.
第三方面,提供了一种验证方法,该方法可以由接入网设备或者接入网设备中的芯片执行,包括:接入网设备从第一节点接收包括终端发送给接入网设备的RRC消息的第二请求消息,并对RRC消息进行解码;若解码成功,接入网设备确定终端合法;若解码不成功,接入网设备确定终端不合法。现有技术中,由于服务器位于DN中。因此,第一节点从服务器获取共享密钥时,需要较长的时间。第三方面提供的方法,在验证终端的合法性时,接入网设备可以根据RRC消息对终端的合法性验证,而不需要第一节点从服务器中获取共享密钥,因此,可以缩短验证终端的合法性的时间。In a third aspect, a verification method is provided. The method can be performed by an access network device or a chip in the access network device, including: the access network device receives from a first node an RRC including an RRC sent by the terminal to the access network device The second request message of the message, and decode the RRC message; if the decoding is successful, the access network device determines that the terminal is legal; if the decoding is unsuccessful, the access network device determines that the terminal is illegal. In the prior art, since the server is located in the DN. Therefore, it takes a long time for the first node to obtain the shared key from the server. In the method provided by the third aspect, when verifying the legitimacy of the terminal, the access network device can verify the legitimacy of the terminal according to the RRC message, without the need for the first node to obtain the shared key from the server. Therefore, the verification of the terminal can be shortened. time of legitimacy.
在一种可能的实现方式中,该方法还包括:接入网设备向第一节点发送用于验证第一节点的合法性的第一验证码。In a possible implementation manner, the method further includes: the access network device sends a first verification code for verifying the legitimacy of the first node to the first node.
第四方面,提供了一种验证方法,该方法可以由接入网设备或者接入网设备中的芯片执行,包括:接入网设备从第一节点接收包括第三验证码的第二请求消息,并根据第一节点的标识、第一根密钥和第三验证码对终端的合法性进行验证。其中,第三验证码用于验证终端的合法性,第三验证码根据第一节点的标识和第一根密钥生成,第一根密钥为终端与接入网设备之间通信所使用的根密钥。现有技术中,由于服务器位于DN中。因此,第一节点从服务器获取共享密钥时,需要较长的时间。第四方面提供的方法,在验证终端的合法性时,接入网设备可以根据终端发送的由第一根密钥生成的第三验证码验证终端的合法性,而不需要第一节点从服务器中获取共享密钥,因此,可以缩短验证终端的合法性的时间。In a fourth aspect, a verification method is provided, the method can be executed by an access network device or a chip in the access network device, and includes: the access network device receives a second request message including a third verification code from the first node , and verify the legitimacy of the terminal according to the identifier of the first node, the first root key and the third verification code. Wherein, the third verification code is used to verify the legitimacy of the terminal, the third verification code is generated according to the identity of the first node and the first root key, and the first root key is used for communication between the terminal and the access network device. root key. In the prior art, since the server is located in the DN. Therefore, it takes a long time for the first node to obtain the shared key from the server. In the method provided by the fourth aspect, when verifying the legitimacy of the terminal, the access network device can verify the legitimacy of the terminal according to the third verification code generated by the first root key sent by the terminal, without the need for the first node from the server. Therefore, the time to verify the legitimacy of the terminal can be shortened.
在一种可能的实现方式中,接入网设备根据第一节点的标识、第一根密钥和第三验证码对终端的合法性进行验证,包括:接入网设备根据第一节点的标识和第一根密钥生成第四验证码,并根据第四验证码和第三验证码验证第一节点的合法性。In a possible implementation manner, the access network device verifies the legitimacy of the terminal according to the identity of the first node, the first root key and the third verification code, including: the access network device verifies the validity of the terminal according to the identity of the first node Generate a fourth verification code with the first root key, and verify the legitimacy of the first node according to the fourth verification code and the third verification code.
在一种可能的实现方式中,该方法还包括:接入网设备向第一节点发送用于验证第一节点的合法性的第一验证码。In a possible implementation manner, the method further includes: the access network device sends a first verification code for verifying the legitimacy of the first node to the first node.
第五方面,提供了一种验证方法,该方法可以由终端或者终端中的芯片执行,包括:终端从接入网设备接收第一节点的标识和第一密钥新鲜性参数,所述第一节点为所述终端的应用层数据的终结点;所述终端从所述第一节点接收第一验证码,所述第一验证码根据第二根密钥生成,所述第二根密钥为所述终端与所述第一节点之间通信所使用的根密钥;所述终端根据所述第一节点的标识、所述第一密钥新鲜性参数和所述第一验证码验证所述第一节点的合法性。现有技术中,由于服务器位于DN中。因此,终端从服务器获取共享密钥时,需要较长的时间。而第五方面提供的方法,在验证第一节点的合法性时,终端根据从接入网设备获取的第一节点的标识和第一密钥新鲜性参数对第一节点的合法性进行验证即可。终端不需要从服务器中获取共享密钥就可以实现第一节点的合法性验证,因此,可以缩短终端验证第一节点的合法性的时间。In a fifth aspect, a verification method is provided, the method can be executed by a terminal or a chip in the terminal, including: the terminal receives an identifier of a first node and a first key freshness parameter from an access network device, the first The node is the termination point of the application layer data of the terminal; the terminal receives the first verification code from the first node, and the first verification code is generated according to the second root key, and the second root key is the root key used for communication between the terminal and the first node; the terminal verifies the The legitimacy of the first node. In the prior art, since the server is located in the DN. Therefore, it takes a long time for the terminal to obtain the shared key from the server. In the method provided by the fifth aspect, when verifying the legality of the first node, the terminal verifies the legality of the first node according to the identifier of the first node and the freshness parameter of the first key obtained from the access network device, that is, Can. The terminal can realize the validity verification of the first node without acquiring the shared key from the server, so the time for the terminal to verify the validity of the first node can be shortened.
在一种可能的实现方式中,所述终端和所述第一节点通过侧链路通信。In a possible implementation manner, the terminal communicates with the first node through a side link.
在一种可能的实现方式中,所述方法还包括:所述终端向所述第一节点发送第一请求消息,所述第一请求消息用于请求关联到所述第一节点,所述第一节点负责分配侧链路的传输资源,所述第一请求消息中包括第三验证码,所述第三验证码用于验证所述终端的合法性。现有技术中,由于服务器位于DN中。因此,第一节点从服务器获取共享密钥时,需要较长的时间。该种可能的实现方式,终端可以向第一节点发送第一验证码,在验证终端的合法性时,第一节点可以根据终端发送的第一验证码对终端的合法性进行验证,而不需要从服务器中获取共享密钥,因此,可以缩短第一节点验证终端的合法性的时间。In a possible implementation manner, the method further includes: the terminal sends a first request message to the first node, where the first request message is used to request association with the first node, and the first request message is used to request association with the first node. A node is responsible for allocating transmission resources of the side link, the first request message includes a third verification code, and the third verification code is used to verify the legitimacy of the terminal. In the prior art, since the server is located in the DN. Therefore, it takes a long time for the first node to obtain the shared key from the server. In this possible implementation, the terminal can send the first verification code to the first node, and when verifying the legitimacy of the terminal, the first node can verify the legitimacy of the terminal according to the first verification code sent by the terminal, without the need for The shared key is obtained from the server, therefore, the time for the first node to verify the legitimacy of the terminal can be shortened.
在一种可能的实现方式中,所述终端根据所述第一节点的标识、所述第一密钥新鲜性参数和所述第一验证码验证所述第一节点的合法性,包括:所述终端根据第一根密钥、所述第一节点的标识和所述第一密钥新鲜性参数生成所述第二根密钥,所述第一根密钥为所述终端与所述接入网设备之间通信所使用的根密钥;所述终端根据所述第二根密钥生成第二验证码;所述终端根据所述第二验证码和所述第一验证码验证所述第一节点的合法性。In a possible implementation manner, the terminal verifies the legitimacy of the first node according to the identifier of the first node, the first key freshness parameter and the first verification code, including: The terminal generates the second root key according to the first root key, the identifier of the first node, and the first key freshness parameter, where the first root key is the connection between the terminal and the interface. The root key used for communication between network access devices; the terminal generates a second verification code according to the second root key; the terminal verifies the second verification code according to the second verification code and the first verification code The legitimacy of the first node.
在一种可能的实现方式中,所述终端向所述第一节点发送第一请求消息,包括:所述终端接收所述第一节点在侧链路广播的通知消息,所述通知消息中包括指示信息,所述指示信息用于指示所述第一节点是负责分配侧链路的传输资源的节点;所述终端根据所述通知消息向所述第一节点发送所述第一请求消息。In a possible implementation manner, the sending, by the terminal, the first request message to the first node includes: the terminal receiving, by the terminal, a notification message broadcast by the first node on the side link, where the notification message includes indication information, where the indication information is used to indicate that the first node is a node responsible for allocating transmission resources of a side link; the terminal sends the first request message to the first node according to the notification message.
在一种可能的实现方式中,所述第一请求消息中还包括所述终端的标识。In a possible implementation manner, the first request message further includes the identifier of the terminal.
在一种可能的实现方式中,所述方法还包括:所述终端根据所述第二根密钥生成与所述第一节点之间的数据的安全保护密钥;所述终端根据所述安全保护密钥与所述第一节点之间进行数据传输。In a possible implementation manner, the method further includes: generating, by the terminal, a security protection key for data between the terminal and the first node according to the second root key; Data transmission is performed between the protection key and the first node.
第六方面,提供了一种验证方法,该方法可以由第一节点或者第一节点中的芯片执行,包括:第一节点根据第二根密钥生成第一验证码,所述第二根密钥为所述终端与所述第一节点之间通信所使用的根密钥,所述第一节点为所述终端的应用层数据的终结点;所述第一节点向所述终端发送所述第一验证码。现有技术中,由于服务器位于DN中。因此,终端从服务器获取共享密钥时,需要较长的时间。而第六方面提供的方法,接入网设备可以向终端发送第一节点的标识和第一密钥新鲜性参数,在验证第一节点的合法性时,终端可以根据从接入网设备获取的第一节点的标识和第一密钥新鲜性参数对第一节点的合法性进行验证即可。终端不需要从服务器中获取共享密钥就可以实现第一节点的合法性验证,因此,可以缩短终端验证第一节点的合法性的时间。In a sixth aspect, a verification method is provided, which can be executed by a first node or a chip in the first node, including: the first node generates a first verification code according to a second root key, the second root key The key is the root key used for communication between the terminal and the first node, and the first node is the termination point of the application layer data of the terminal; the first node sends the terminal to the terminal. The first verification code. In the prior art, since the server is located in the DN. Therefore, it takes a long time for the terminal to obtain the shared key from the server. In the method provided in the sixth aspect, the access network device can send the identifier of the first node and the freshness parameter of the first key to the terminal, and when verifying the validity of the first node, the terminal can The identity of the first node and the freshness parameter of the first key can be used to verify the legitimacy of the first node. The terminal can realize the validity verification of the first node without acquiring the shared key from the server, so the time for the terminal to verify the validity of the first node can be shortened.
在一种可能的实现方式中,所述终端和所述第一节点通过侧链路通信。In a possible implementation manner, the terminal communicates with the first node through a side link.
在一种可能的实现方式中,所述方法还包括:所述第一节点从所述终端接收第一请求消息,所述第一请求消息用于请求关联到所述第一节点,所述第一节点负责分配侧链路的传输资源,所述第一请求消息中包括第三验证码,所述第三验证码用于验证所述终端的合法性,所述第三验证码根据所述第二根密钥生成;所述第一节点根据所述第二根密钥和所述第三验证码验证所述终端的合法性。现有技术中,由于服务器位于DN中。因此,第一节点从服务器获取共享密钥时,需要较长的时间。该种可能的实现方式,在验证终端的合法性时,第一节点可以根据终端发送的第一验证码对终端的合法性进行验证,而不需要从服务器中获取共享密钥,因此,可以缩短第一节点验证终端的合法性的时间。In a possible implementation manner, the method further includes: the first node receiving a first request message from the terminal, where the first request message is used to request association with the first node, the first request message A node is responsible for allocating transmission resources of the side link, the first request message includes a third verification code, the third verification code is used to verify the legitimacy of the terminal, and the third verification code is based on the third verification code. A second root key is generated; the first node verifies the legitimacy of the terminal according to the second root key and the third verification code. In the prior art, since the server is located in the DN. Therefore, it takes a long time for the first node to obtain the shared key from the server. In this possible implementation manner, when verifying the legitimacy of the terminal, the first node can verify the legitimacy of the terminal according to the first verification code sent by the terminal without acquiring the shared key from the server. The time when the first node verifies the legitimacy of the terminal.
在一种可能的实现方式中,所述第一请求消息中包括所述终端的标识,在所述第一节点根据所述第二根密钥和所述第三验证码验证所述终端的合法性之前,所述方法还包括:所述第一节点根据所述终端的标识获取所述第二根密钥。In a possible implementation manner, the first request message includes an identifier of the terminal, and the first node verifies the validity of the terminal according to the second root key and the third verification code The method further includes: acquiring, by the first node, the second root key according to the identifier of the terminal.
在一种可能的实现方式中,所述方法还包括:所述第一节点从所述接入网设备接收所述终端的标识和所述第二根密钥。In a possible implementation manner, the method further includes: receiving, by the first node, the identifier of the terminal and the second root key from the access network device.
在一种可能的实现方式中,所述方法还包括:所述第一节点在侧链路广播通知消息,所述通知消息中包括指示信息,所述指示信息用于指示所述第一节点是负责分配侧链路的传输资源的节点。In a possible implementation manner, the method further includes: the first node broadcasts a notification message on a side link, where the notification message includes indication information, where the indication information is used to indicate that the first node is a A node responsible for allocating transmission resources for a side link.
在一种可能的实现方式中,所述方法还包括:所述第一节点根据所述第二根密钥生成与所述终端之间的数据的安全保护密钥;所述第一节点根据所述安全保护密钥与所述终端之间进行数据传输。In a possible implementation manner, the method further includes: generating, by the first node, a security protection key for data with the terminal according to the second root key; data transmission between the security protection key and the terminal.
第七方面,提供了一种验证方法,该方法可以由第一接入网设备或者第一接入网设备中的芯片执行,包括:第一接入网设备向第二接入网设备发送切换请求消息,所述切换请求消息用于向所述第二接入网设备请求终端从所述第一接入网设备切换至所述第二接入网设备,所述切换请求消息中包括所述终端的标识;所述第一接入网设备从所述第二接入网设备接收切换回复消息,所述切换回复消息中包括第二节点的标识和第二密钥新鲜性参数,所述第二节点为所述终端切换后待关联的负责为终端分配侧链路的资源的节点,所述第二节点的标识和所述第二密钥新鲜性参数用于验证所述终端和/或所述第二节点的合法性;所述第一接入网设备向所述终端发送所述第二节点的标识和所述第二密钥新鲜性参数。第七方面提供的方法,在终端从第一接入网设备切换到第二接入网设备的场景下,通过第一接入网设备向终端发送第二节点的标识和第二密钥新鲜性参数,从而保证终端在切换到第二接入网设备后可以顺利的与第二节点进行合法性验证。In a seventh aspect, a verification method is provided, and the method can be executed by a first access network device or a chip in the first access network device, including: the first access network device sends a switch to the second access network device request message, the handover request message is used to request the second access network device to switch the terminal from the first access network device to the second access network device, and the handover request message includes the The identifier of the terminal; the first access network device receives a handover reply message from the second access network device, and the handover reply message includes the identifier of the second node and the second key freshness parameter, and the first access network device receives a handover reply message from the second access network device. The second node is the node responsible for allocating side link resources for the terminal to be associated after the terminal is switched, and the identifier of the second node and the second key freshness parameter are used to verify the terminal and/or the the validity of the second node; the first access network device sends the identifier of the second node and the second key freshness parameter to the terminal. In the method provided by the seventh aspect, in a scenario where the terminal switches from the first access network device to the second access network device, the first access network device sends the identifier of the second node and the freshness of the second key to the terminal through the first access network device parameters, thereby ensuring that the terminal can successfully perform legality verification with the second node after switching to the second access network device.
第八方面,提供了一种验证方法,该方法可以由第二接入网设备或者第二接入网设备中的芯片执行,包括:第二接入网设备从第一接入网设备接收切换请求消息,所述切换请求消息用于向所述第二接入网设备请求终端从所述第一接入网设备切换至所述第二接入网设备,所述切换请求消息中包括所述终端的标识;所述第二接入网设备向所述第一接入网设备发送切换回复消息,所述切换回复消息中包括第二节点的标识和第二密钥新鲜性参数,所述第二节点为所述终端切换后待关联的负责为终端分配侧链路的资源的节点,所述第二节点的标识和所述第二密钥新鲜性参数用于验证所述终端和/或所述第二节点的合法性;所述第二接入网设备向所述第二节点发送所述终端的标识和第三根密钥,所述第三根密钥为所述终端与所述第二节点之间通信的根密钥,所述第三根密钥用于验证所述终端和/或所述第二节点的合法性。第八方面提供的方法,在终端从第一接入网设备切换到第二接入网设备的场景下,通过第一接入网设备向终端发送第二节点的标识和第二密钥新鲜性参数,从而保证终端在切换到第二接入网设备后可以顺利的与第二节点进行合法性验证。In an eighth aspect, a verification method is provided, and the method can be executed by a second access network device or a chip in the second access network device, including: the second access network device receives a handover from the first access network device request message, the handover request message is used to request the second access network device to switch the terminal from the first access network device to the second access network device, and the handover request message includes the The identifier of the terminal; the second access network device sends a handover reply message to the first access network device, and the handover reply message includes the identifier of the second node and the second key freshness parameter, the first access network device The second node is the node responsible for allocating side link resources for the terminal to be associated after the terminal is switched, and the identifier of the second node and the second key freshness parameter are used to verify the terminal and/or the the validity of the second node; the second access network device sends the identification of the terminal and the third root key to the second node, where the third root key is the connection between the terminal and the third root. The root key for communication between two nodes, and the third root key is used to verify the legitimacy of the terminal and/or the second node. In the method provided by the eighth aspect, in a scenario where the terminal switches from the first access network device to the second access network device, the first access network device sends the identifier of the second node and the freshness of the second key to the terminal through the first access network device parameters, thereby ensuring that the terminal can successfully perform legality verification with the second node after switching to the second access network device.
第九方面,提供了一种验证装置,包括:通信单元和处理单元;所述通信单元,用于从第一节点接收第一验证码和所述第一节点的标识,所述第一验证码根据第一根密钥和所述第一节点的标识生成,所述第一根密钥为所述验证装置与接入网设备之间通信所使用的根密钥;所述处理单元,用于根据所述第一节点的标识、所述第一根密钥和所述第一验证码验证所述第一节点的合法性。In a ninth aspect, a verification device is provided, comprising: a communication unit and a processing unit; the communication unit is configured to receive a first verification code and an identifier of the first node from a first node, the first verification code Generated according to the first root key and the identifier of the first node, where the first root key is the root key used for communication between the verification apparatus and the access network device; the processing unit, configured to The validity of the first node is verified according to the identifier of the first node, the first root key and the first verification code.
在一种可能的实现方式中,所述验证装置和所述第一节点通过侧链路通信。In a possible implementation manner, the verification apparatus communicates with the first node through a side link.
在一种可能的实现方式中,所述通信单元,还用于向所述第一节点发送第一请求消息,所述第一请求消息用于请求关联到所述第一节点,所述第一节点负责分配侧链路的传输资源,所述第一请求消息中包括所述验证装置发送给所述接入网设备的无线资源控制RRC消息。In a possible implementation manner, the communication unit is further configured to send a first request message to the first node, where the first request message is used to request association with the first node, the first request message The node is responsible for allocating transmission resources of the side link, and the first request message includes a radio resource control RRC message sent by the verification apparatus to the access network device.
在一种可能的实现方式中,所述通信单元,还用于向所述第一节点发送第一请求消息,所述第一请求消息用于请求关联到所述第一节点,所述第一节点负责分配侧链路的传输资源,所述第一请求消息中包括第三验证码,所述第三验证码用于验证所述验证装置的合法性。In a possible implementation manner, the communication unit is further configured to send a first request message to the first node, where the first request message is used to request association with the first node, the first request message The node is responsible for allocating transmission resources of the side link, the first request message includes a third verification code, and the third verification code is used to verify the legitimacy of the verification device.
在一种可能的实现方式中,所述通信单元,还用于接收所述第一节点在侧链路广播的通知消息,所述通知消息中包括指示信息,所述指示信息用于指示所述第一节点是负责分配侧链路的传输资源的节点;所述通信单元,还用于根据所述通知消息向所述第一节点发送所述第一请求消息。In a possible implementation manner, the communication unit is further configured to receive a notification message broadcast by the first node on the side link, where the notification message includes indication information, where the indication information is used to indicate the The first node is a node responsible for allocating transmission resources of the side link; the communication unit is further configured to send the first request message to the first node according to the notification message.
在一种可能的实现方式中,所述处理单元,具体用于:根据所述第一节点的标识和所述第一根密钥生成第二验证码;根据所述第二验证码和所述第一验证码验证所述第一节点的合法性。In a possible implementation manner, the processing unit is specifically configured to: generate a second verification code according to the identifier of the first node and the first root key; The first verification code verifies the legitimacy of the first node.
第十方面,提供了一种验证装置,包括:通信单元和处理单元;所述处理单元,用于通过所述通信单元从接入网设备接收第一验证码,所述第一验证码根据第一根密钥和所述验证装置的标识生成,所述第一根密钥为终端与所述接入网设备之间通信所使用的根密钥;所述处理单元,还用于通过所述通信单元向所述终端发送所述第一验证码和所述验证装置的标识,所述验证装置的标识和所述第一验证码用于验证所述验证装置的合法性。In a tenth aspect, a verification apparatus is provided, comprising: a communication unit and a processing unit; the processing unit is configured to receive a first verification code from an access network device through the communication unit, the first verification code according to the first verification code generating a key and the identification of the verification device, the first root key is the root key used for communication between the terminal and the access network device; the processing unit is further configured to pass the The communication unit sends the first verification code and the identification of the verification device to the terminal, where the identification of the verification device and the first verification code are used to verify the legitimacy of the verification device.
在一种可能的实现方式中,所述终端和所述验证装置通过侧链路通信。In a possible implementation manner, the terminal and the verification apparatus communicate through a side link.
在一种可能的实现方式中,所述处理单元,还用于通过所述通信单元从所述终端接收第一请求消息,所述第一请求消息用于请求关联到所述验证装置,所述验证装置负责分配侧链路的传输资源,所述第一请求消息中包括所述终端发送给所述接入网设备的RRC消息;所述处理单元,还用于根据所述第一请求消息通过所述通信单元向所述接入网设备发送第二请求消息,所述第二请求消息中包括所述RRC消息,所述RRC消息用于所述接入网设备验证所述终端的合法性。In a possible implementation manner, the processing unit is further configured to receive a first request message from the terminal through the communication unit, where the first request message is used to request association with the verification apparatus, the The verification apparatus is responsible for allocating transmission resources of the side link, and the first request message includes an RRC message sent by the terminal to the access network device; the processing unit is further configured to pass the The communication unit sends a second request message to the access network device, where the second request message includes the RRC message, and the RRC message is used by the access network device to verify the legitimacy of the terminal.
在一种可能的实现方式中,所述处理单元,还用于通过所述通信单元从所述终端接收第一请求消息,所述第一请求消息用于请求关联到所述验证装置,所述验证装置负责分配侧链路的传输资源,所述第一请求消息中包括第三验证码,所述第三验证码用于验证所述终端的合法性;所述处理单元,还用于根据所述第一请求消息通过所述通信单元向所述接入网设备发送第二请求消息,所述第二请求消息中包括所述第三验证码。In a possible implementation manner, the processing unit is further configured to receive a first request message from the terminal through the communication unit, where the first request message is used to request association with the verification apparatus, the The verification device is responsible for allocating transmission resources of the side link, the first request message includes a third verification code, and the third verification code is used to verify the legitimacy of the terminal; the processing unit is further configured to The first request message sends a second request message to the access network device through the communication unit, where the second request message includes the third verification code.
在一种可能的实现方式中,所述处理单元,还用于通过所述通信单元在侧链路广播通知消息,所述通知消息中包括指示信息,所述指示信息用于指示所述验证装置是负责分配侧链路的传输资源的节点。In a possible implementation manner, the processing unit is further configured to broadcast a notification message on the side link through the communication unit, where the notification message includes indication information, where the indication information is used to instruct the verification apparatus is the node responsible for allocating the transmission resources of the side link.
第十一方面,提供了一种验证装置,包括:通信单元和处理单元;所述通信单元,用于从第一节点接收第二请求消息,所述第二请求消息中包括终端发送给所述验证装置的RRC消息;所述处理单元,用于对所述RRC消息进行解码;若解码成功,所述处理单元确定所述终端合法;若解码不成功,所述处理单元确定所述终端不合法。In an eleventh aspect, a verification device is provided, comprising: a communication unit and a processing unit; the communication unit is configured to receive a second request message from a first node, where the second request message includes a terminal sent to the The RRC message of the verification device; the processing unit is configured to decode the RRC message; if the decoding is successful, the processing unit determines that the terminal is legal; if the decoding is unsuccessful, the processing unit determines that the terminal is illegal .
在一种可能的实现方式中,所述通信单元,还用于向所述第一节点发送第一验证码,所述第一验证码用于验证所述第一节点的合法性。In a possible implementation manner, the communication unit is further configured to send a first verification code to the first node, where the first verification code is used to verify the legitimacy of the first node.
第十二方面,提供了一种验证装置,包括:通信单元和处理单元;所述通信单元,用于从第一节点接收第二请求消息,所述第二请求消息中包括第三验证码,所述第三验证码用于验证终端的合法性,所述第三验证码根据所述第一节点的标识和第一根密钥生成,所述第一根密钥为所述终端与所述验证装置之间通信所使用的根密钥;所述处理单元,用于根据所述第一节点的标识、所述第一根密钥和所述第三验证码对所述终端的合法性进行验证。A twelfth aspect provides a verification device, comprising: a communication unit and a processing unit; the communication unit is configured to receive a second request message from a first node, where the second request message includes a third verification code, The third verification code is used to verify the legitimacy of the terminal, and the third verification code is generated according to the identifier of the first node and the first root key, and the first root key is the terminal and the The root key used for communication between the verification devices; the processing unit is configured to verify the validity of the terminal according to the identifier of the first node, the first root key and the third verification code verify.
在一种可能的实现方式中,所述处理单元,具体用于:根据所述第一节点的标识和所述第一根密钥生成第四验证码;根据所述第四验证码和所述第三验证码验证所述第一节点的合法性。In a possible implementation manner, the processing unit is specifically configured to: generate a fourth verification code according to the identifier of the first node and the first root key; The third verification code verifies the legitimacy of the first node.
在一种可能的实现方式中,所述通信单元,还用于向所述第一节点发送第一验证码,所述第一验证码用于验证所述第一节点的合法性。In a possible implementation manner, the communication unit is further configured to send a first verification code to the first node, where the first verification code is used to verify the legitimacy of the first node.
第十三方面,提供了一种验证装置,该装置具有实现第五方面、第六方面、第七方面或第八方面提供的任意一种方法的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的单元。例如,该装置可以包括通信单元和处理单元,处理单元用于执行第五方面、第六方面、第七方面或第八方面中的处理的动作(例如,发送和/或接收之外的动作),通信单元用于执行第五方面、第六方面、第七方面或第八方面中的发送和/或接收的动作。可选的,通信单元执行的动作是在处理单元的控制下执行的。可选的,通信单元包括发送单元和接收单元,该情况下,发送单元用于执行第五方面、第六方面、第七方面或第八方面中的发送的动作,接收单元用于执行第五方面、第六方面、第七方面或第八方面中的接收的动作。该装置可以以芯片的产品形态存在。A thirteenth aspect provides a verification device, the device having the function of implementing any one of the methods provided in the fifth aspect, the sixth aspect, the seventh aspect or the eighth aspect. This function can be implemented by hardware or by executing corresponding software by hardware. The hardware or software includes one or more units corresponding to the above-mentioned functions. For example, the apparatus may comprise a communication unit and a processing unit for performing actions of the processing in the fifth, sixth, seventh or eighth aspects (eg actions other than sending and/or receiving) , the communication unit is configured to perform the actions of sending and/or receiving in the fifth aspect, the sixth aspect, the seventh aspect or the eighth aspect. Optionally, the actions performed by the communication unit are performed under the control of the processing unit. Optionally, the communication unit includes a sending unit and a receiving unit, in this case, the sending unit is configured to perform the sending action in the fifth aspect, the sixth aspect, the seventh aspect or the eighth aspect, and the receiving unit is configured to perform the fifth aspect. The act of receiving in the aspect, sixth aspect, seventh aspect or eighth aspect. The device may exist in the form of a chip product.
第十四方面,提供了一种验证装置,包括:处理器。处理器与存储器连接,存储器用于存储计算机执行指令,处理器执行存储器存储的计算机执行指令,从而实现第一方面至第八方面中的任意一个方面提供的任意一种方法。其中,存储器和处理器可以集成在一起,也可以为独立的器件。若为后者,存储器可以位于验证装置内,也可以位于验证装置外。A fourteenth aspect provides a verification apparatus, comprising: a processor. The processor is connected to the memory, the memory is used for storing computer-executed instructions, and the processor executes the computer-executed instructions stored in the memory, thereby implementing any one of the methods provided in any one of the first to eighth aspects. Among them, the memory and the processor can be integrated together or can be independent devices. In the latter case, the memory may be located in the verification device or outside the verification device.
在一种可能的实现方式中,处理器包括逻辑电路以及输入接口和/或输出接口。其中,输出接口用于执行相应方法中的发送的动作,输入接口用于执行相应方法中的接收的动作。In one possible implementation, the processor includes logic circuits and an input interface and/or an output interface. Wherein, the output interface is used for executing the sending action in the corresponding method, and the input interface is used for executing the receiving action in the corresponding method.
在一种可能的实现方式中,验证装置还包括通信接口和通信总线,处理器、存储器和通信接口通过通信总线连接。通信接口用于执行相应方法中的收发的动作。通信接口也可以称为收发器。可选的,通信接口包括发送器和接收器,该情况下,发送器用于执行相应方法中的发送的动作,接收器用于执行相应方法中的接收的动作。In a possible implementation manner, the verification apparatus further includes a communication interface and a communication bus, and the processor, the memory and the communication interface are connected through the communication bus. The communication interface is used to perform the actions of transceiving in the corresponding method. The communication interface may also be referred to as a transceiver. Optionally, the communication interface includes a transmitter and a receiver. In this case, the transmitter is configured to perform the sending action in the corresponding method, and the receiver is configured to perform the receiving action in the corresponding method.
在一种可能的实现方式中,验证装置以芯片的产品形态存在。In a possible implementation manner, the verification device exists in the form of a chip product.
第十五方面,提供了一种计算机可读存储介质,包括指令,当该指令在计算机上运行时,使得计算机执行第一方面至第八方面中的任意一个方面提供的任意一种方法。A fifteenth aspect provides a computer-readable storage medium, comprising instructions, which, when executed on a computer, cause the computer to perform any one of the methods provided in any one of the first to eighth aspects.
第十六方面,提供了一种包含指令的计算机程序产品,当该指令在计算机上运行时,使得计算机执行第一方面至第八方面中的任意一个方面提供的任意一种方法。A sixteenth aspect provides a computer program product comprising instructions that, when the instructions are run on a computer, cause the computer to perform any one of the methods provided in any one of the first to eighth aspects.
第九方面至第十六方面中的任一种实现方式所带来的技术效果可参见第一方面至第八方面中对应实现方式所带来的技术效果,此处不再赘述。For the technical effects brought about by any one of the implementation manners of the ninth aspect to the sixteenth aspect, reference may be made to the technical effects brought about by the corresponding implementation manners in the first aspect to the eighth aspect, which will not be repeated here.
其中,需要说明的是,上述各个方面中的任意一个方面的各种可能的实现方式,在方案不矛盾的前提下,均可以进行组合。It should be noted that various possible implementation manners of any one of the above aspects can be combined on the premise that the solutions are not contradictory.
附图说明Description of drawings
图1为本申请实施例提供的一种网络架构示意图;FIG. 1 is a schematic diagram of a network architecture provided by an embodiment of the present application;
图2为本申请实施例提供的一种通信协议栈组成示意图;2 is a schematic diagram of the composition of a communication protocol stack provided by an embodiment of the present application;
图3至图10分别为本申请实施例提供的一种验证方法的交互流程图;3 to 10 are respectively interactive flowcharts of a verification method provided by an embodiment of the present application;
图11为本申请实施例提供的一种验证装置的组成示意图;11 is a schematic diagram of the composition of a verification device provided by an embodiment of the present application;
图12和图13分别为本申请实施例提供的一种验证装置的硬件结构示意图;FIG. 12 and FIG. 13 are schematic diagrams of the hardware structure of a verification device provided by an embodiment of the present application respectively;
图14为本申请实施例提供的一种终端的硬件结构示意图;FIG. 14 is a schematic diagram of a hardware structure of a terminal according to an embodiment of the present application;
图15为本申请实施例提供的一种网络设备的硬件结构示意图。FIG. 15 is a schematic diagram of a hardware structure of a network device according to an embodiment of the present application.
具体实施方式Detailed ways
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行描述。其中,在本申请的描述中,除非另有说明,“/”表示或的意思,例如,A/B可以表示A或B。本文中的“和/或”仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。并且,在本申请的描述中,除非另有说明,“多个”是指两个或多于两个,“至少一个”是指一个或多个。The technical solutions in the embodiments of the present application will be described below with reference to the accompanying drawings in the embodiments of the present application. Wherein, in the description of this application, unless otherwise specified, "/" means or means, for example, A/B can mean A or B. In this article, "and/or" is only an association relationship to describe the associated objects, which means that there can be three kinds of relationships, for example, A and/or B, which can mean that A exists alone, A and B exist at the same time, and B exists alone these three situations. Also, in the description of this application, unless stated otherwise, "a plurality" means two or more than two, and "at least one" means one or more.
另外,为了便于清楚描述本申请实施例的技术方案,在本申请的实施例中,采用了“第一”、“第二”等字样对功能和作用基本相同的相同项或相似项进行区分。本领域技术人员可以理解“第一”、“第二”等字样并不对数量和执行次序进行限定,并且“第一”、“第二”等字样也并不限定一定不同。In addition, in order to clearly describe the technical solutions of the embodiments of the present application, in the embodiments of the present application, words such as "first" and "second" are used to distinguish the same or similar items with basically the same function and effect. Those skilled in the art can understand that the words "first", "second" and the like do not limit the quantity and execution order, and the words "first", "second" and the like are not necessarily different.
本申请实施例的技术方案可以应用于各种通信系统。例如:正交频分多址(orthogonal frequency-division multiple access,简称OFDMA)、单载波频分多址(single carrier frequency-division multiple access,简称SC-FDMA)和其它系统等。术语“系统”可以和“网络”相互替换。其中,OFDMA系统可以实现诸如演进通用无线陆地接入(evolved universal terrestrial radio access,简称E-UTRA)、超级移动宽带(ultramobile broadband,简称UMB)等无线技术。E-UTRA是通用移动通信系统(universal mobiletelecommunications system,简称UMTS)演进版本。第三代合作伙伴计划(3rd generationpartnership project,简称3GPP)在长期演进(long term evolution,简称LTE)和基于LTE演进的各种版本是使用E-UTRA的新版本。第五代(5th-generation,简称5G)通信系统、新空口(new radio,简称NR)通信系统是正在研究当中的下一代通信系统。此外,通信系统还可以适用于面向未来的通信技术,都适用本申请实施例提供的技术方案。The technical solutions of the embodiments of the present application can be applied to various communication systems. For example, orthogonal frequency-division multiple access (OFDMA for short), single carrier frequency-division multiple access (SC-FDMA for short), and other systems. The term "system" is interchangeable with "network". The OFDMA system can implement wireless technologies such as evolved universal terrestrial radio access (E-UTRA for short), ultra mobile broadband (UMB for short). E-UTRA is an evolved version of a universal mobile telecommunications system (universal mobile telecommunications system, UMTS for short). The 3rd generation partnership project (3GPP for short) is a new version using E-UTRA in long term evolution (long term evolution, LTE for short) and various versions based on LTE evolution. The 5th-generation (5G for short) communication system and the new radio (NR for short) communication system are the next generation communication systems under study. In addition, the communication system may also be applicable to future-oriented communication technologies, and the technical solutions provided by the embodiments of the present application are all applicable.
本申请实施例提供的方法可以应用于各种业务场景,例如,增强移动带宽(enhanced mobile broadband,简称eMBB)业务场景、超可靠低延迟通信(ultra-reliableand low latency communication,简称URLLC)业务场景、物联网(internet of things,简称IoT)业务场景,工业物联网(industry IoT,简称IIoT)等。The methods provided in the embodiments of the present application can be applied to various service scenarios, for example, enhanced mobile broadband (eMBB for short) service scenarios, ultra-reliable and low latency communication (ultra-reliable and low latency communication, URLLC for short) service scenarios, Internet of Things (IoT) business scenarios, Industrial IoT (IIoT), etc.
传统的蜂窝网通信主要包含接入网设备和终端之间的通信,终端和接入网设备之间进行通信时,终端的数据可以通过接入网设备传递到核心网设备中。随着D2D通信的引入,增加了终端之间的通信。终端之间进行通信时,两个终端之间具有端到端对等的应用层,一个终端(记为终端A)的用户面数据可以终结在另一个终端(记为终端B),也就是说,终端A的用户面数据发送到终端B后,在终端B的应用层进行处理即可,不需要再发送给其他设备。后续又引入了V2X这种特殊的D2D通信方式。针对D2D通信或V2X通信,终端所使用的传输(这里传输可以理解为发送和/或接收)资源,可以通过以下任意一种方法获取:方法1、接入网设备为终端半静态调度(semi-persistent scheduling,简称SPS)的或者动态分配传输资源;方法2、终端根据接入网设备广播的一个或多个载波上的一个或多个传输资源池,从传输资源池中选择传输资源,例如终端可以自行进行信道感知后根据资源池的信道忙比例选择传输资源;方法3、在服务器(例如,V2X控制功能(control function))预先配置的传输资源池中选择传输资源。其中,在上述方法2和方法3中,传输资源池可以包括时域资源和/或频域资源,例如,传输资源池可以包括一个或多个无线资源块(resource block,简称RB)组成的频域资源,和/或,特定时隙或时隙集合上的一个或多个RB组成的时频资源。The traditional cellular network communication mainly includes the communication between the access network device and the terminal. During the communication between the terminal and the access network device, the data of the terminal can be transmitted to the core network device through the access network device. With the introduction of D2D communication, communication between terminals is increased. When communicating between terminals, there is an end-to-end peer-to-peer application layer between the two terminals, and the user plane data of one terminal (denoted as terminal A) can be terminated at the other terminal (denoted as terminal B), that is to say , after the user plane data of terminal A is sent to terminal B, it can be processed at the application layer of terminal B, and does not need to be sent to other devices. Subsequently, V2X, a special D2D communication method, was introduced. For D2D communication or V2X communication, the transmission (transmission can be understood as sending and/or receiving) resources used by the terminal can be obtained by any of the following methods: Method 1. The access network equipment is semi-static scheduling (semi- Persistent scheduling (SPS for short) or dynamic allocation of transmission resources; method 2, the terminal selects transmission resources from the transmission resource pool according to one or more transmission resource pools on one or more carriers broadcast by the access network device, such as the terminal The transmission resource can be selected according to the channel busy ratio of the resource pool after performing channel sensing by itself; method 3, select the transmission resource in the transmission resource pool preconfigured by the server (eg, a V2X control function). Wherein, in the above method 2 and method 3, the transmission resource pool may include time domain resources and/or frequency domain resources. Domain resources, and/or time-frequency resources composed of one or more RBs on a specific time slot or set of time slots.
目前,为了提高资源分配的效率,有方案提出采用局部资源协调者(localresource coordinator,简称LRC)节点分配侧链路的传输资源,LRC节点是指在局部区域(例如,比小区更小的区域)内调度局部资源(例如,资源池)的功能的节点,例如,LRC节点可以分配终端和LRC节点之间的侧链路的传输资源,或者分配终端和终端之间的侧链路的传输资源等。LRC节点负责的局部资源可以是接入网设备分配的,也可以是自己进行信道感知而感知到的(例如,接入网设备在一个或多个载波上广播一个或多个传输资源池,LRC节点从传输资源池中选择传输资源,比如,LRC节点自行进行信道感知后根据资源池的信道忙比例选择传输资源)。At present, in order to improve the efficiency of resource allocation, some schemes propose to use a local resource coordinator (LRC) node to allocate the transmission resources of the side link. The LRC node refers to a local area (for example, an area smaller than a cell) A node that internally schedules local resources (eg, resource pools), for example, an LRC node can allocate transmission resources for side links between terminals and LRC nodes, or allocate transmission resources for side links between terminals and terminals, etc. . The local resources that the LRC node is responsible for can be allocated by the access network equipment, or can be sensed by its own channel sensing (for example, the access network equipment broadcasts one or more transmission resource pools on one or more carriers, LRC The node selects the transmission resource from the transmission resource pool, for example, the LRC node selects the transmission resource according to the channel busy ratio of the resource pool after performing channel sensing by itself).
图1是本申请提供的一种通信系统的示意图。其中,参见图1,终端和接入网设备之间可以通过蜂窝网无线链路(即Uu口)通信,LRC节点和接入网设备之间可以通过蜂窝网无线链路(即Uu口)通信,终端和LRC节点之间可以通过侧链路无线链路(即PC5口)通信。终端和接入网设备之间可以通过三种方式进行通信。第一种方式为:终端仅可以直接和接入网设备通信。第二种方式为:终端仅可以通过LRC节点和接入网设备通信。第三种方式为:终端既可以直接和接入网设备通信,也可以通过LRC节点和接入网设备通信。FIG. 1 is a schematic diagram of a communication system provided by the present application. 1, the terminal and the access network device can communicate through the cellular network wireless link (ie Uu port), and the LRC node and the access network device can communicate through the cellular network wireless link (ie Uu interface) , the terminal and the LRC node can communicate through the side link wireless link (ie the PC5 port). There are three ways to communicate between a terminal and an access network device. The first way is: the terminal can only communicate directly with the access network device. The second way is: the terminal can communicate with the access network device only through the LRC node. The third way is: the terminal can directly communicate with the access network device, or can communicate with the access network device through the LRC node.
在第一种方式下,终端可以和接入网设备建立无线资源控制(radio resourcecontrol,简称RRC)连接(后续称为Uu-RRC连接)。在第二种方式和第三种方式下,终端可以先和接入网设备建立Uu-RRC连接,终端再与LRC节点建立连接,也可以先和LRC节点建立连接,再通过LRC节点(此时,LRC节点为中继)和接入网设备建立Uu-RRC连接。其中,终端和LRC节点之间的连接可以为侧链路RRC连接(也可以称为PC5-RRC连接),也可以为其他连接(例如,下文中的建立关联即建立一种连接)。In the first manner, the terminal may establish a radio resource control (radio resource control, RRC for short) connection (hereinafter referred to as a Uu-RRC connection) with an access network device. In the second and third modes, the terminal can first establish a Uu-RRC connection with the access network equipment, and then the terminal can establish a connection with the LRC node, or it can first establish a connection with the LRC node, and then pass the LRC node (at this time , the LRC node is a relay) and the access network device establishes a Uu-RRC connection. The connection between the terminal and the LRC node may be a side link RRC connection (also referred to as a PC5-RRC connection), or may be other connections (for example, establishing an association hereinafter refers to establishing a connection).
对于LRC节点和终端之间的传输,一种情况下,接入网设备的控制面信令和/或用户面数据需要经过LRC节点发往终端,终端的控制面信令和/或用户面数据需要经过LRC节点发往接入网设备。此时,LRC节点可能作为终端和接入网设备之间的中继。另一种情况下,终端的用户面数据可能终结在LRC节点,即终端和LRC节点之间可以具有端到端对等的应用层,终端的用户面数据发送到LRC节点后,在LRC节点的应用层进行处理即可,不需要再发送给其他设备。For the transmission between the LRC node and the terminal, in one case, the control plane signaling and/or user plane data of the access network equipment need to be sent to the terminal through the LRC node, and the control plane signaling and/or user plane data of the terminal It needs to be sent to the access network device through the LRC node. At this time, the LRC node may act as a relay between the terminal and the access network equipment. In another case, the user plane data of the terminal may be terminated at the LRC node, that is, there may be an end-to-end peer-to-peer application layer between the terminal and the LRC node. The application layer can process it, and it does not need to be sent to other devices.
需要说明的是,本申请实施例中的用户面数据也可以称为应用层数据。It should be noted that the user plane data in this embodiment of the present application may also be referred to as application layer data.
需要说明的是,LRC节点上可以有与终端对等的RRC层(称为PC5-RRC层)和与接入网设备对等的RRC层(称为Uu-RRC层),该情况下,终端和LRC节点之间交互的RRC消息可以称为PC5-RRC消息,LRC节点和接入网设备之间交互的RRC消息可以称为Uu-RRCLRC消息,终端和接入网设备之间交互的RRC消息可以称为Uu-RRCUE消息。或者,LRC节点上可以没有与终端对等的PC5-RRC层和与接入网设备对等的Uu-RRC层,该情况下,只有终端和接入网设备之间可以交互RRC消息,终端和接入网设备之间交互的RRC消息也可以称为Uu-RRCUE消息。或者,LRC节点上可以没有与终端对等的PC5-RRC层,但是有与接入网设备对等的Uu-RRC层,该情况下,LRC节点和接入网设备之间交互的RRC消息可以称为Uu-RRCLRC消息,终端和接入网设备之间交互的RRC消息也可以称为Uu-RRCUE消息。It should be noted that the LRC node may have an RRC layer (called the PC5-RRC layer) equivalent to the terminal and an RRC layer (called the Uu-RRC layer) equivalent to the access network equipment. In this case, the terminal RRC messages exchanged with LRC nodes can be called PC5-RRC messages, RRC messages exchanged between LRC nodes and access network devices can be called Uu-RRC LRC messages, and RRC messages exchanged between terminals and access network devices The messages may be referred to as Uu-RRC UE messages. Alternatively, the LRC node may not have the PC5-RRC layer that is equivalent to the terminal and the Uu-RRC layer that is equivalent to the access network device. In this case, only the terminal and the access network device can exchange RRC messages, and the terminal and the access network device can exchange RRC messages. RRC messages exchanged between access network devices may also be referred to as Uu-RRC UE messages. Alternatively, the LRC node may not have a PC5-RRC layer that is equivalent to the terminal, but has a Uu-RRC layer that is equivalent to the access network device. In this case, the RRC messages exchanged between the LRC node and the access network device may be It is called a Uu-RRC LRC message, and the RRC message exchanged between the terminal and the access network device may also be called a Uu-RRC UE message.
示例性的,参见图2,图2示出了一种终端、LRC节点和接入网设备的协议栈架构示意图。该示例以LRC节点上没有PC5-RRC层和Uu-RRC层为例进行绘制。其中,终端的协议栈从上至下包括:与接入网设备对等的RRC层、与接入网设备对等的分组数据汇聚协议(packetdata convergence protocol,简称PDCP)层、与LRC节点对等的无线链路控制(radio linkcontrol,简称RLC)层、与LRC节点对等的媒介接入控制(medium access control,简称MAC)层和与LRC节点对等的物理(physical,简称PHY)层。在PC5口,LRC节点的协议栈从上至下包括:与终端对等的RLC层、与终端对等的MAC层和与终端对等的PHY层。在Uu口,LRC节点的协议栈从上至下包括:与接入网设备对等的适配(Adapt)层、与接入网设备对等的RLC层、与接入网设备对等的MAC层和与接入网设备对等的PHY层。接入网设备的协议栈从上至下包括:与终端对等的RRC层、与终端对等的PDCP层、与LRC节点对等的Adapt层、与LRC节点对等的RLC层、与LRC节点对等的MAC层和与LRC节点对等的PHY层。Exemplarily, see FIG. 2 , which shows a schematic diagram of a protocol stack architecture of a terminal, an LRC node, and an access network device. This example is drawn by taking as an example that there is no PC5-RRC layer and Uu-RRC layer on the LRC node. Wherein, the protocol stack of the terminal includes from top to bottom: an RRC layer peering with the access network equipment, a packet data convergence protocol (PDCP) layer peering with the access network equipment, and peering with the LRC node A radio link control (RLC) layer, a medium access control (MAC) layer equivalent to the LRC node, and a physical (PHY) layer equivalent to the LRC node. On the PC5 port, the protocol stack of the LRC node includes from top to bottom: the RLC layer equivalent to the terminal, the MAC layer equivalent to the terminal, and the PHY layer equivalent to the terminal. On the Uu interface, the protocol stack of the LRC node includes from top to bottom: the Adapt layer equivalent to the access network device, the RLC layer equivalent to the access network device, and the MAC equivalent to the access network device layer and the PHY layer that is equivalent to the access network equipment. The protocol stack of the access network equipment includes from top to bottom: the RRC layer equivalent to the terminal, the PDCP layer equivalent to the terminal, the Adapt layer equivalent to the LRC node, the RLC layer equivalent to the LRC node, and the LRC node. A peer MAC layer and a PHY layer peer to the LRC node.
LRC节点主要负责分配侧链路(Sidelink)的传输资源。分配侧链路的传输资源包括以下内容中的一种或多种:为终端和终端之间分配侧链路的传输资源,为LRC节点和终端之间分配侧链路的传输资源,以及将接入网设备给终端配置的侧链路的传输资源转发给终端。The LRC node is mainly responsible for allocating transmission resources of the side link (Sidelink). Allocating the transmission resources of the side link includes one or more of the following: allocating the transmission resources of the side link between the terminal and the terminal, allocating the transmission resources of the side link between the LRC node and the terminal, and assigning the transmission resources of the side link between the terminal and the terminal. The transmission resources of the side link configured by the network access device for the terminal are forwarded to the terminal.
在接入网设备给终端配置侧链路的传输资源的情况下,一种可能的实现方式,接入网设备给终端配置侧链路资源池,终端后续可以对侧链路资源池中的资源进行信道感知,然后自行从该侧链路资源池中选择资源进行侧链路的数据传输。另一种可能的实现方式,接入网设备给终端配置侧链路资源,终端在给定的侧链路资源上进行侧链路的数据传输。In the case where the access network device configures the terminal with the transmission resources of the side link, a possible implementation manner is that the access network device configures the terminal with a side link resource pool, and the terminal can subsequently access the resources in the side link resource pool. Perform channel awareness, and then select resources from the side link resource pool for data transmission on the side link. In another possible implementation manner, the access network device configures side link resources for the terminal, and the terminal performs side link data transmission on the given side link resources.
LRC节点可以为物联网终端、中继节点(relay node,简称RN)、接入回传一体化(integrated access and backhaul,简称IAB)节点、IIoT中的控制器、车联网终端等。LRC节点也可以称为局部管理器(local manager)、局部控制节点、用户组头(UE header或header UE)、调度用户(scheduling UE)等。本申请实施例中的LRC节点可以是接入网设备指定的,也可以是终端选举出来的,还可以是预先配置的(例如,预先配置某些终端为LRC节点),本申请实施例对此不作具体限定。The LRC node may be an IoT terminal, a relay node (RN for short), an integrated access and backhaul (IAB for short) node, a controller in the IIoT, a terminal for the Internet of Vehicles, and the like. The LRC node may also be referred to as a local manager, a local control node, a user group header (UE header or header UE), a scheduling user (scheduling UE), and the like. The LRC node in the embodiment of the present application may be designated by the access network device, may also be elected by the terminal, or may be pre-configured (for example, some terminals are pre-configured as LRC nodes). There is no specific limitation.
接入网设备为网络侧的一种用于发送信号,接收信号,或者,发送信号和接收信号的实体。接入网设备可以为部署在无线接入网(radio access network,简称RAN)中为终端提供无线通信功能的装置,例如可以为基站。接入网设备可以为各种形式的宏基站,微基站(也称为小站),中继站,接入点(access point,简称AP)等,也可以包括各种形式的控制节点,如网络控制器。所述控制节点可以连接多个基站,并为所述多个基站覆盖下的多个终端配置资源。在采用不同的无线接入技术的系统中,具备基站功能的设备的名称可能会有所不同。例如,全球移动通信系统(global system for mobile communication,简称GSM)或码分多址(code division multiple access,简称CDMA)网络中可以称为基站收发信台(base transceiver station,简称BTS),宽带码分多址(wideband code divisionmultiple access,简称WCDMA)中可以称为基站(NodeB),LTE系统中可以称为演进型基站(evolved NodeB,简称eNB或eNodeB),5G通信系统或NR通信系统中可以称为下一代基站节点(next generation node base station,简称gNB),本申请对基站的具体名称不作限定。接入网设备还可以是云无线接入网络(cloud radio access network,简称CRAN)场景下的无线控制器、未来演进的公共陆地移动网络(public land mobile network,简称PLMN)网络中的接入网设备、传输接收节点(transmission and reception point,简称TRP)等。The access network device is an entity on the network side that is used for sending signals, receiving signals, or sending and receiving signals. The access network device may be a device deployed in a radio access network (radio access network, RAN for short) to provide a wireless communication function for a terminal, for example, a base station. The access network equipment can be various forms of macro base station, micro base station (also called small station), relay station, access point (AP for short), etc., and can also include various forms of control nodes, such as network control device. The control node can be connected to multiple base stations, and configure resources for multiple terminals covered by the multiple base stations. In systems using different radio access technologies, the names of devices with base station functions may vary. For example, a global system for mobile communication (GSM for short) or a code division multiple access (CDMA for short) network may be called a base transceiver station (BTS for short), a wideband code It can be called a base station (NodeB) in wideband code division multiple access (WCDMA for short), an evolved base station (evolved NodeB, eNB or eNodeB for short) in an LTE system, and a 5G communication system or an NR communication system. It is a next generation node base station (gNB for short), and the specific name of the base station is not limited in this application. The access network device may also be a wireless controller in a cloud radio access network (cloud radio access network, referred to as CRAN) scenario, or an access network in a future evolved public land mobile network (public land mobile network, referred to as PLMN) network Equipment, transmission and reception point (transmission and reception point, TRP for short), etc.
终端是用户侧的一种用于接收信号,或者,发送信号,或者,接收信号和发送信号的实体。终端用于向用户提供语音服务和数据连通性服务中的一种或多种。终端可以称为用户设备(user equipment,简称UE)、终端设备、接入终端、用户单元、用户站、移动站、远方站、远程终端、移动设备、用户终端、无线通信设备、用户代理或用户装置。终端可以是移动站(mobile station,简称MS)、用户单元(subscriber unit)、无人机、IoT设备、无线局域网(wireless local area networks,简称WLAN)中的站点(station,简称ST)、蜂窝电话(cellular phone)、智能电话(smart phone)、无绳电话、无线数据卡、平板型电脑、会话启动协议(session initiation protocol,简称SIP)电话、无线本地环路(wireless localloop,简称WLL)站、个人数字处理(personal digital assistant,简称PDA)设备、膝上型电脑(laptop computer)、机器类型通信(machine type communication,简称MTC)终端、具有无线通信功能的手持设备、计算设备或连接到无线调制解调器的其它处理设备、车载设备、可穿戴设备(也可以称为穿戴式智能设备)。终端还可以为下一代通信系统中的终端,例如,5G通信系统中的终端或者未来演进的PLMN中的终端,NR通信系统中的终端等。A terminal is an entity on the user side that is used to receive signals, or send signals, or receive and send signals. The terminal is used to provide one or more of voice service and data connectivity service to the user. A terminal may be referred to as user equipment (UE for short), terminal equipment, access terminal, subscriber unit, subscriber station, mobile station, remote station, remote terminal, mobile device, user terminal, wireless communication device, user agent or user device. The terminal may be a mobile station (mobile station, referred to as MS), a subscriber unit (subscriber unit), a drone, an IoT device, a station in a wireless local area network (referred to as WLAN) (station, referred to as ST), a cellular phone (cellular phone), smart phone (smart phone), cordless phone, wireless data card, tablet computer, session initiation protocol (SIP) phone, wireless local loop (WLL) station, personal Personal digital assistant (PDA) equipment, laptop computer (laptop computer), machine type communication (MTC) terminal, handheld device with wireless communication capabilities, computing device or connected to a wireless modem Other processing devices, in-vehicle devices, wearable devices (also known as wearable smart devices). The terminal may also be a terminal in a next-generation communication system, for example, a terminal in a 5G communication system or a terminal in a future evolved PLMN, a terminal in an NR communication system, and the like.
针对图1所示的通信系统,终端和LRC节点之间在进行合法性验证时,若采用现有技术中的方法,则终端和LRC节点均需要从服务器(例如,ProSe function)获取共享密钥,然后再基于共享密钥进行双方握手,从而实现互相验证的目的。由于服务器位于核心网的DN中,因此,终端和LRC节点获取共享密钥的耗时比较久,从而导致终端验证LRC节点的合法性,或,LRC节点验证终端的合法性的时间较长。为了解决该问题,本申请实施例提供了多种验证方法,这些验证方法中,LRC节点和终端不需要从服务器中获取共享密钥,因此,可以缩短对第一节点和/或对终端的合法性验证的时间。For the communication system shown in FIG. 1, when the legality verification between the terminal and the LRC node is performed, if the method in the prior art is adopted, both the terminal and the LRC node need to obtain the shared key from the server (for example, the ProSe function). , and then perform a handshake between the two parties based on the shared key to achieve the purpose of mutual authentication. Since the server is located in the DN of the core network, it takes a long time for the terminal and the LRC node to obtain the shared key, which causes the terminal to verify the legitimacy of the LRC node, or it takes a long time for the LRC node to verify the legitimacy of the terminal. In order to solve this problem, the embodiments of the present application provide a variety of verification methods. In these verification methods, the LRC node and the terminal do not need to obtain a shared key from the server. Therefore, the validity of the first node and/or the terminal can be shortened. time for sexual verification.
为了使得本申请实施例更加的清楚,首先对本申请实施例中提到的部分概念作简单介绍。In order to make the embodiments of the present application clearer, first, some concepts mentioned in the embodiments of the present application are briefly introduced.
(1)安全保护密钥(1) Security protection key
安全保护密钥是指可以用于实现数据的安全保护的密钥。The security protection key refers to a key that can be used to realize the security protection of data.
安全保护密钥可以包括以下中的一个或多个:加密密钥、解密密钥、完整性保护密钥等。Security protection keys may include one or more of the following: encryption keys, decryption keys, integrity protection keys, and the like.
其中,发送端根据加密密钥和加密算法对明文进行加密以生成密文。接收端根据解密密钥和解密算法对密文进行解密生成明文。若使用对称加密的方法,加密密钥和解密密钥是相同的。发送端采用一个密钥去加密(此时,该密钥为加密密钥),接收端采用该密钥去解密(此时,该密钥为解密密钥)。The sender encrypts the plaintext according to the encryption key and the encryption algorithm to generate the ciphertext. The receiving end decrypts the ciphertext according to the decryption key and the decryption algorithm to generate the plaintext. If symmetric encryption is used, the encryption key and decryption key are the same. The sender uses a key to encrypt (at this time, the key is the encryption key), and the receiver uses the key to decrypt (at this time, the key is the decryption key).
完整性保护密钥为发送端根据完整性保护算法对明文或密文进行完整性保护时输入的参数。接收端可以根据相同的完整性保护算法和完整性保护密钥对进行了完整性保护的数据进行完整性验证。The integrity protection key is a parameter input by the sender when the plaintext or ciphertext is integrity protected according to the integrity protection algorithm. The receiving end can perform integrity verification on the integrity-protected data according to the same integrity-protection algorithm and integrity-protection key.
其中,加密密钥可以包括控制面的加密密钥和用户面的加密密钥。解密密钥可以包括控制面的解密密钥和用户面的解密密钥。完整性保护密钥可以包括控制面的完整性保护密钥和用户面的完整性保护密钥。Wherein, the encryption key may include the encryption key of the control plane and the encryption key of the user plane. The decryption keys may include a control plane decryption key and a user plane decryption key. The integrity protection keys may include the integrity protection keys of the control plane and the integrity protection keys of the user plane.
(2)根密钥(2) Root key
本申请实施例中的根密钥是指接入网侧的用于生成终端与其他设备之间的用于合法性验证的验证码,和/或,用于生成终端与其他设备之间的安全保护密钥的密钥。该其他设备可以为LRC节点,也可以为接入网设备。The root key in this embodiment of the present application refers to a verification code on the access network side that is used to generate a verification code between the terminal and other devices for legality verification, and/or is used to generate a security code between the terminal and other devices The key that protects the key. The other device may be an LRC node or an access network device.
本申请实施例中涉及到的根密钥包括终端和接入网设备之间通信所使用的根密钥(例如,下文中的第一根密钥),以及终端和LRC节点之间通信所使用的根密钥(例如,下文中的第二根密钥和第三根密钥)。The root key involved in the embodiments of the present application includes the root key used for communication between the terminal and the access network device (for example, the first root key hereinafter), and the root key used for communication between the terminal and the LRC node (eg, the second root key and the third root key below).
终端和接入网设备之间通信所使用的根密钥可以记为KeNB/KgNB,终端和LRC节点之间通信所使用的根密钥可以记为KLRC。KLRC可以根据KeNB/KgNB生成。另外,基于KLRC可以生成终端和LRC节点之间的控制面的加密密钥和控制面的完整性保护密钥。The root key used for the communication between the terminal and the access network device may be recorded as K eNB /K gNB , and the root key used for the communication between the terminal and the LRC node may be recorded as K LRC . K LRC may be generated according to K eNB /K gNB . In addition, the encryption key of the control plane and the integrity protection key of the control plane between the terminal and the LRC node can be generated based on K LRC .
(3)密钥新鲜性参数(3) Key freshness parameter
密钥新鲜性参数是指用于更新密钥的新鲜性参数。例如,密钥新鲜性参数可以是用于更新根密钥的新鲜性参数。The key freshness parameter refers to the freshness parameter used to update the key. For example, the key freshness parameter may be the freshness parameter used to update the root key.
(4)侧链路(sidelink)(4) side link (sidelink)
侧链路是指终端和LRC节点之间通信的链路,或者,终端和终端之间通信的链路。侧链路也可以称为PC5口链路。The side link refers to a link for communication between a terminal and an LRC node, or a link for communication between a terminal and a terminal. The side link can also be called a PC5 port link.
(5)终端的标识(5) Identification of the terminal
本申请实施例中的终端的标识可以为终端在蜂窝网的小区无线网络临时标识(cell radio network temporary identifier,简称C-RNTI),或,C-RNTI+小区标识,或,终端在侧链路的标识等。The identifier of the terminal in this embodiment of the present application may be a cell radio network temporary identifier (C-RNTI for short) of the terminal in the cellular network, or, C-RNTI+cell identifier, or, the terminal on the side link identification, etc.
终端在侧链路的标识是指用于LRC节点在侧链路识别终端的标识。终端在侧链路的标识也可以称为近场通信用户标识(ProSe UE ID)或终端在PC5口的标识。The identifier of the terminal on the side link refers to the identifier used by the LRC node to identify the terminal on the side link. The identifier of the terminal on the side link may also be called a near field communication user identifier (ProSe UE ID) or the identifier of the terminal on the PC5 port.
示例性的,参见图2,终端在侧链路的标识可以携带在MAC层头中,也可以携带在MAC层头和PHY层头中。例如,ProSe UE ID长度为24比特,该24比特可以全部包含在MAC层头,此时,终端在侧链路的标识也可以称为终端的层2标识(可以记为UE L2ID)。或者其中8比特包含在PHY层头,剩余16比特包含在MAC层头。Exemplarily, referring to FIG. 2 , the identifier of the terminal on the side link may be carried in the MAC layer header, and may also be carried in the MAC layer header and the PHY layer header. For example, the length of the ProSe UE ID is 24 bits, and all of the 24 bits can be included in the MAC layer header. At this time, the identifier of the terminal on the side link can also be called the layer 2 identifier of the terminal (which can be recorded as UE L2ID). Or 8 bits are included in the PHY layer header and the remaining 16 bits are included in the MAC layer header.
(6)LRC节点的标识(6) Identification of LRC nodes
在本申请实施例中,LRC节点的标识可以为接入网设备为第一节点分配的,也可以为自己生成的。In this embodiment of the present application, the identifier of the LRC node may be allocated by the access network device for the first node, or may be generated by itself.
LRC节点(例如,下文中的第一节点、第二节点)的标识可以是LRC节点在侧链路的标识,此时,LRC节点的标识用于在侧链路上识别LRC节点(此时,LRC节点的标识携带在MAC层头中,或,携带在MAC层头和PHY层头中,具体的,当LRC节点作为发送端时,LRC节点的标识或标识的一部分可以携带在MAC层头的源(Source,简称SRC)地址域中)。示例性的,LRC节点在侧链路的标识可以为LRC节点的C-RNTI。The identifier of the LRC node (for example, the first node and the second node in the following) may be the identifier of the LRC node on the side link, and in this case, the identifier of the LRC node is used to identify the LRC node on the side link (in this case, The identifier of the LRC node is carried in the MAC layer header, or carried in the MAC layer header and the PHY layer header. Specifically, when the LRC node acts as the sender, the identifier of the LRC node or a part of the identifier can be carried in the MAC layer header. Source (Source, SRC for short) address field). Exemplarily, the identifier of the LRC node on the side link may be the C-RNTI of the LRC node.
LRC节点的标识也可以为LRC节点在蜂窝网的标识(例如,C-RNTI)。The identity of the LRC node may also be the identity of the LRC node in the cellular network (eg, C-RNTI).
LRC节点的标识还可以为LRC节点在路由过程中使用的标识,例如,LRC节点的MAC地址或LRC节点的网络互连协议(internet protocol,简称IP)地址等。The identifier of the LRC node may also be an identifier used by the LRC node in the routing process, for example, the MAC address of the LRC node or the internet protocol (IP) address of the LRC node.
(7)通知(notification)消息(7) Notification message
本申请实施例中的通知消息是由第一节点(例如,LRC节点)在侧链路广播的一种消息。通知消息中包括指示信息(记为第一指示信息),第一指示信息用于指示第一节点是负责分配侧链路的传输资源的节点(或者可以理解为第一指示信息用于指示第一节点为LRC节点),例如,通知消息中包含调度组头指示(scheduling header indication),当调度组头指示的值配置为1时,即表示第一节点是负责分配侧链路的传输资源的节点。再例如,第一指示信息可以通过通知消息中包含的消息类型(message type)实现,例如,消息类型为某一种消息类型时,该消息类型指示发送通知消息的节点(即第一节点)是负责分配侧链路的传输资源的节点(或者可以理解为第一指示信息用于指示第一节点为LRC节点)。The notification message in the embodiment of the present application is a kind of message broadcast by the first node (for example, the LRC node) on the side link. The notification message includes indication information (referred to as first indication information), and the first indication information is used to indicate that the first node is the node responsible for allocating transmission resources of the side link (or it can be understood that the first indication information is used to indicate that the first node is an LRC node), for example, the notification message includes a scheduling header indication, and when the value of the scheduling header indication is set to 1, it means that the first node is the node responsible for allocating transmission resources of the side link . For another example, the first indication information may be implemented by a message type (message type) included in the notification message. For example, when the message type is a certain message type, the message type indicates that the node sending the notification message (ie, the first node) is The node responsible for allocating transmission resources of the side link (or it can be understood that the first indication information is used to indicate that the first node is an LRC node).
可选的,通知消息中还可以包括用于指示第一节点的信息,用于指示第一节点的信息可以包括以下一项或多项:第一节点的标识(可以参考上述LRC节点的标识的相关内容)和区域信息。Optionally, the notification message may also include information used to indicate the first node, and the information used to indicate the first node may include one or more of the following: the identifier of the first node (refer to the identifier of the LRC node above). related content) and regional information.
区域标识为第一节点所服务的区域的标识。第一节点与所服务的区域的区域标识之间具有对应关系,终端可以具有该对应关系,终端可以根据区域标识确定第一节点。终端中的第一节点与所服务的区域的区域标识之间的对应关系可以为接入网设备发送(或广播)给终端的。The area identifier is the identifier of the area served by the first node. There is a corresponding relationship between the first node and the area identifier of the area to be served, the terminal may have the corresponding relationship, and the terminal may determine the first node according to the area identifier. The correspondence between the first node in the terminal and the area identifier of the area to be served may be sent (or broadcast) to the terminal by the access network device.
区域信息为用于指示第一节点所服务的区域的信息。区域信息可以包括区域标识和/或区域的位置信息(例如区域的经度、纬度、半径、长度、宽度等信息)。终端可以根据区域信息确定第一节点。例如,第一节点与所服务的区域的区域信息之间具有对应关系,终端可以根据第一节点与所服务的区域的区域信息之间的对应关系确定第一节点。该情况下,终端中的第一节点与所服务的区域的区域信息之间的对应关系可以为接入网设备发送(或广播)给终端的。再例如,终端可以根据区域的位置信息确定区域标识,根据区域标识确定第一节点,例如,终端可以根据第一节点与所服务的区域的区域标识之间的对应关系、以及区域的区域标识与区域的位置信息之间的对应关系确定第一节点。该情况下,终端中的第一节点与所服务的区域的区域标识之间的对应关系、以及区域的区域标识与区域的位置信息之间的对应关系可以为接入网设备发送(或广播)给终端的。The area information is information for indicating the area served by the first node. The area information may include area identification and/or location information of the area (eg, information such as longitude, latitude, radius, length, width, etc. of the area). The terminal may determine the first node according to the area information. For example, there is a correspondence between the first node and the area information of the served area, and the terminal may determine the first node according to the correspondence between the first node and the area information of the served area. In this case, the correspondence between the first node in the terminal and the area information of the area to be served may be sent (or broadcast) to the terminal by the access network device. For another example, the terminal may determine the area identifier according to the location information of the area, and determine the first node according to the area identifier. The correspondence between the location information of the regions determines the first node. In this case, the correspondence between the first node in the terminal and the area identifier of the served area, and the correspondence between the area identifier of the area and the location information of the area may be sent (or broadcast) by the access network device for the terminal.
(8)信令无线承载(signalling radio bearer,简称SRB)(8) Signaling radio bearer (signalling radio bearer, SRB for short)
SRB包括SRB0和SRB1。SRB0是默认SRB,终端初始接入蜂窝网时,通过SRB0发送RRC连接建立请求消息,例如,RRC建立请求(RRC Setup request),RRC重建立请求(RRCreestablishment request),RRC恢复请求(RRC resume request)等。SRB1是在终端和接入网设备之间建立Uu-RRC连接的过程中建立的SRB,可以用于传输Uu-RRCUE消息。SRBs include SRB0 and SRB1. SRB0 is the default SRB. When the terminal initially accesses the cellular network, it sends an RRC connection establishment request message through SRB0, for example, RRC setup request (RRC Setup request), RRC reestablishment request (RRCreestablishment request), RRC resume request (RRC resume request) Wait. SRB1 is an SRB established in the process of establishing a Uu-RRC connection between a terminal and an access network device, and can be used to transmit Uu-RRC UE messages.
需要说明的是,本申请各个实施例中,关于第一根密钥和第二根密钥的含义以及获取方法可以相互参考,不作限制。另外,下文各实施例中,以终端的标识为终端在侧链路的标识为例进行说明,在具体实现时,终端的标识也可以为终端在蜂窝网的标识。It should be noted that, in the various embodiments of the present application, the meanings and acquisition methods of the first root key and the second root key may be referred to each other, and are not limited. In addition, in the following embodiments, the identification of the terminal is taken as an example of the identification of the terminal on the side link for description. In specific implementation, the identification of the terminal may also be the identification of the terminal in the cellular network.
实施例一Example 1
终端与接入网设备建立Uu-RRC连接之后,核心网会对终端进行鉴权。在鉴权成功后会产生终端与接入网设备之间通信所使用的根密钥(记为第一根密钥),第一根密钥保存在终端和接入网设备中。实施例一提供了一种验证方法,该验证方法中,终端基于第一根密钥对第一节点的合法性进行验证,接入网设备基于第一根密钥或终端发送的Uu-RRCUE消息对终端的合法性进行验证。其中,合法性也可以称为可信性。本申请各实施例中的合法可以认为是可信,不合法可以认为是不可信,后续不再赘述。After the terminal establishes a Uu-RRC connection with the access network device, the core network will authenticate the terminal. After the authentication is successful, a root key (referred to as the first root key) used for communication between the terminal and the access network device is generated, and the first root key is stored in the terminal and the access network device. Embodiment 1 provides a verification method. In the verification method, the terminal verifies the legitimacy of the first node based on the first root key, and the access network device verifies the validity of the first node based on the first root key or the Uu-RRC UE sent by the terminal. The message verifies the legitimacy of the terminal. Among them, legitimacy can also be called credibility. Legal in each embodiment of the present application may be considered credible, and illegality may be considered unreliable, and details will not be described in the following.
如图3所示,该验证方法包括:As shown in Figure 3, the verification method includes:
301、终端向第一节点发送第一请求消息。相应的,第一节点从终端接收第一请求消息。301. A terminal sends a first request message to a first node. Correspondingly, the first node receives the first request message from the terminal.
其中,第一请求消息用于请求关联到第一节点。在第一节点的协议栈中存在与终端对等的PC5-RRC层的情况下,第一请求消息可以为PC5-RRC消息。Wherein, the first request message is used for requesting to associate with the first node. In the case that a PC5-RRC layer equivalent to the terminal exists in the protocol stack of the first node, the first request message may be a PC5-RRC message.
可选的,第一请求消息包含终端在侧链路的标识,第一节点可以根据终端在侧链路的标识确定请求关联的终端。其中,终端在侧链路的标识可以携带在第一请求消息的MAC层头的SRC地址域中。本申请各实施例中,关于终端在侧链路的标识的描述可参见上文,不再赘述。Optionally, the first request message includes an identifier of the terminal on the side link, and the first node may determine the terminal requesting association according to the identifier of the terminal on the side link. The identifier of the terminal on the side link may be carried in the SRC address field of the MAC layer header of the first request message. In each embodiment of the present application, reference may be made to the above description for the identification of the terminal on the side link, and details are not repeated here.
可选的,第一节点是负责分配侧链路的传输资源的节点,即第一节点为LRC节点。Optionally, the first node is a node responsible for allocating transmission resources of the side link, that is, the first node is an LRC node.
可选的,终端和第一节点通过侧链路通信。Optionally, the terminal communicates with the first node through a side link.
可选的,第一节点为终端的应用层数据的终结点,即终端的应用层数据终结在第一节点。Optionally, the first node is the termination point of the application layer data of the terminal, that is, the application layer data of the terminal is terminated in the first node.
终端确定执行步骤301的场景可以为以下场景1或场景2。The terminal determines that the scenario in which step 301 is executed may be the following scenario 1 or scenario 2.
场景1、scene 1,
在步骤301之前,接入网设备根据终端的测量报告或终端上报的位置信息等判断终端位于第一节点的通信距离内时,接入网设备可以通过Uu-RRCUE消息通知终端关联到第一节点。终端可以在该Uu-RRCUE消息的触发下执行步骤301。该Uu-RRCUE消息中包含第一节点的标识,还可以包含关联指示。终端根据该关联指示和第一节点的标识确定关联到第一节点。本申请各实施例中关于第一节点的标识的描述可参见上文,不再赘述。Before step 301, when the access network device determines that the terminal is located within the communication distance of the first node according to the measurement report of the terminal or the location information reported by the terminal, the access network device may notify the terminal to associate with the first node through a Uu-RRC UE message. node. The terminal may perform step 301 under the trigger of the Uu-RRC UE message. The Uu-RRC UE message includes the identity of the first node, and may also include an association indication. The terminal determines to associate with the first node according to the association indication and the identifier of the first node. For the description of the identifier of the first node in each embodiment of the present application, reference may be made to the above description, and details are not repeated here.
在场景1下,接入网设备在发送第一节点的标识时,发送的可以为第一节点在侧链路的标识,以便终端在侧链路识别第一节点。In scenario 1, when the access network device sends the identifier of the first node, it may send the identifier of the first node on the side link, so that the terminal can identify the first node on the side link.
在第一种情况下,第一节点在侧链路的标识可以自己生成,该情况下,接入网设备获取第一节点在侧链路的标识的过程可以包括:LRC节点作为终端接入接入网设备时,接入网设备会为LRC节点分配在蜂窝网的标识,LRC节点作为终端在与接入网设备建立Uu-RRC连接之后,可以通过Uu-RRCLRC消息向接入网设备上报LRC节点在侧链路的标识。接入网设备接收到该Uu-RRCLRC消息后获取LRC节点在侧链路的标识,并建立LRC节点在侧链路的标识与LRC节点在蜂窝网的标识之间的对应关系。该情况下,若后续第一节点向接入网设备发送Uu-RRCLRC消息,则接入网设备可以根据之前给第一节点分配的上行授权中包含的时频资源,确定第一节点在蜂窝网的标识,接着根据第一节点在蜂窝网的标识确定第一节点在侧链路的标识。其中,需要说明的是,该方法中,接入网设备为LRC节点分配的时频资源与LRC节点之间存在对应关系。In the first case, the identifier of the first node on the side link may be generated by itself. In this case, the process of acquiring the identifier of the first node on the side link by the access network device may include: the LRC node acts as a terminal access connection When accessing a network device, the access network device will assign the LRC node an identity in the cellular network. After the LRC node, as a terminal, establishes a Uu-RRC connection with the access network device, it can report to the access network device through a Uu-RRC LRC message. The identifier of the LRC node on the side link. After receiving the Uu-RRC LRC message, the access network device obtains the identity of the LRC node on the side link, and establishes a correspondence between the identity of the LRC node on the side link and the identity of the LRC node on the cellular network. In this case, if the first node subsequently sends a Uu-RRC LRC message to the access network device, the access network device may determine that the first node is in the cellular The identification of the network, and then the identification of the first node in the side link is determined according to the identification of the first node in the cellular network. It should be noted that, in this method, there is a corresponding relationship between the time-frequency resources allocated by the access network device for the LRC node and the LRC node.
在第二种情况下,第一节点在侧链路的标识可以由接入网设备分配,例如,第一节点在侧链路的标识可以为接入网设备为第一节点分配的C-RNTI。该情况下,接入网设备可以直接获取第一节点在侧链路的标识。In the second case, the identifier of the first node on the side link may be allocated by the access network device, for example, the identifier of the first node on the side link may be the C-RNTI allocated by the access network device for the first node . In this case, the access network device can directly obtain the identifier of the first node on the side link.
场景2、scene 2,
第一节点在侧链路广播通知消息,通知消息中包括第一指示信息,第一指示信息用于指示第一节点是负责分配侧链路的传输资源的节点。第一指示信息的实现方法可参见上文,在此不再赘述。该情况下,步骤301在具体实现时可以包括:终端接收第一节点在侧链路广播的通知消息,并根据通知消息向第一节点发送第一请求消息。The first node broadcasts a notification message on the side link, and the notification message includes first indication information, where the first indication information is used to indicate that the first node is a node responsible for allocating transmission resources of the side link. For the implementation method of the first indication information, reference may be made to the above, and details are not described herein again. In this case, the specific implementation of step 301 may include: the terminal receives a notification message broadcast by the first node on the side link, and sends a first request message to the first node according to the notification message.
在场景2下,一种可能的实现方式,终端若接收到第一节点广播的通知消息,则说明终端位于第一节点的覆盖范围或者通信范围中,该情况下,终端可以向第一节点发送第一请求消息。另一种可能的实现方式,通知消息中还可以包括用于指示第一节点的信息。在该另一种实现方式下,在步骤301之前,接入网设备可以向终端指示允许终端关联的一个或多个LRC节点,此时,若终端接收到的通知消息中包含的信息指示第一节点为允许终端关联的一个或多个LRC节点中的节点时,即若终端发现第一节点为接入网设备允许自己关联的LRC节点时,终端向第一节点发送第一请求消息。In scenario 2, in a possible implementation manner, if the terminal receives the notification message broadcast by the first node, it means that the terminal is located in the coverage or communication range of the first node. In this case, the terminal may send a message to the first node. The first request message. In another possible implementation manner, the notification message may further include information used to indicate the first node. In this other implementation manner, before step 301, the access network device may indicate to the terminal one or more LRC nodes that the terminal is allowed to associate with. At this time, if the information contained in the notification message received by the terminal indicates the first When the node is a node among one or more LRC nodes that allow the terminal to associate, that is, if the terminal finds that the first node is an LRC node that the access network device allows itself to associate, the terminal sends a first request message to the first node.
302、第一节点根据第一请求消息向接入网设备发送第二请求消息。302. The first node sends a second request message to the access network device according to the first request message.
相应的,接入网设备从第一节点接收第二请求消息。Correspondingly, the access network device receives the second request message from the first node.
其中,第二请求消息用于接入网设备验证终端的合法性。可选的,第二请求消息中包括终端在侧链路的标识,接入网设备可以根据终端在侧链路的标识确定验证哪个终端的合法性。Wherein, the second request message is used for the access network device to verify the legitimacy of the terminal. Optionally, the second request message includes an identifier of the terminal on the side link, and the access network device may determine the validity of which terminal to verify according to the identifier of the terminal on the side link.
303、接入网设备根据第二请求消息验证终端的合法性。303. The access network device verifies the validity of the terminal according to the second request message.
对终端的合法性进行验证可以有两种可能的实现方式,记为实现方式1和实现方式2,以下对实现方式1和实现方式2分别进行描述。There are two possible implementation manners for verifying the legitimacy of the terminal, which are denoted as implementation manner 1 and implementation manner 2, and implementation manner 1 and implementation manner 2 are respectively described below.
实现方式1、Implementation 1.
第一请求消息中包括终端发送给接入网设备的Uu-RRCUE消息。例如,终端发送给接入网设备的Uu-RRCUE消息可以封装在第一请求消息中。第一节点在接收到第一请求消息后,将第一请求消息中的Uu-RRCUE消息携带在第二请求消息中向接入网设备发送。另外,第一节点在将Uu-RRCUE消息携带在第二请求消息中向接入网设备发送时,可以在第一请求消息中获取终端在侧链路的标识,并将终端在侧链路的标识携带在第二请求消息的Adapt层头中。该情况下,步骤303在具体实现时可以包括:接入网设备对Uu-RRCUE消息进行解码,若解码成功,接入网设备确定终端合法;若解码不成功,接入网设备确定终端不合法。具体地,接入网设备根据第二请求消息的Adapt层中包含的终端在侧链路的标识,将Uu-RRCUE消息送往终端的SRB1对应的PDCP层实体进行处理。特别地,当Adapt层中包含的是终端在侧链路的标识时(假设终端在此之前向接入网设备上报过自己在侧链路的标识),则接入网设备可以根据该终端在侧链路的标识,找到该终端的SRB1对应的PDCP实体,接入网设备将Uu-RRCUE消息送到PDCP实体进行解码,若解码成功,接入网设备确定终端合法;反之则认为终端不合法。The first request message includes a Uu-RRC UE message sent by the terminal to the access network device. For example, the Uu-RRC UE message sent by the terminal to the access network device may be encapsulated in the first request message. After receiving the first request message, the first node carries the Uu-RRC UE message in the first request message in the second request message and sends it to the access network device. In addition, when the first node carries the Uu-RRC UE message in the second request message and sends it to the access network device, the first node may obtain the identifier of the terminal on the side link in the first request message, and send the terminal on the side link The identifier of the second request message is carried in the Adapt layer header of the second request message. In this case, the specific implementation of step 303 may include: the access network device decodes the Uu-RRC UE message, and if the decoding is successful, the access network device determines that the terminal is legal; if the decoding is unsuccessful, the access network device determines that the terminal is not legitimate. Specifically, the access network device sends the Uu-RRC UE message to the PDCP layer entity corresponding to the SRB1 of the terminal according to the identifier of the terminal on the side link contained in the Adapt layer of the second request message for processing. In particular, when the Adapt layer contains the identifier of the terminal on the side link (assuming that the terminal has reported its identifier on the side link to the access network device before), the access network device can The identification of the side link, find the PDCP entity corresponding to the SRB1 of the terminal, and the access network device sends the Uu-RRC UE message to the PDCP entity for decoding. If the decoding is successful, the access network device determines that the terminal is legal; otherwise, it is considered that the terminal is not. legitimate.
在实现方式1下,需要说明的是,在终端和接入网设备建立Uu-RRC连接之后,终端和接入网设备之间的Uu-RRCUE消息本身通过终端和接入网设备之间的控制面密钥加密的。因此,当终端的Uu-RRCUE消息通过第一节点转发至接入网设备,接入网设备对终端发送的Uu-RRCUE消息解码成功,则说明终端是合法的。In implementation mode 1, it should be noted that after the terminal and the access network device establish a Uu-RRC connection, the Uu-RRC UE message between the terminal and the access network device itself passes through the communication between the terminal and the access network device. The control plane key is encrypted. Therefore, when the Uu-RRC UE message of the terminal is forwarded to the access network device through the first node, and the access network device successfully decodes the Uu-RRC UE message sent by the terminal, the terminal is legal.
在实现方式1下,该方法还包括:终端向第一节点发送指示信息(记为第二指示信息),第二指示信息用于指示第一请求消息中的Uu-RRCUE消息为发给接入网设备的Uu-RRC消息。In implementation mode 1, the method further includes: the terminal sends indication information (referred to as second indication information) to the first node, where the second indication information is used to indicate that the Uu-RRC UE message in the first request message is sent to the receiving node Uu-RRC message of the network access device.
一种情况下,第二指示信息可以携带在第一请求消息中。示例性的,可以携带在第一请求消息的MAC层头中。具体的,第二指示信息的功能可以通过第一请求消息中的MAC层头中的逻辑信道标识(logical channel identity,简称LCID)参数实现。例如,当LCID参数的值为0(或1)时,LCID参数可以指示第一请求消息中的Uu-RRCUE消息为发给接入网设备的Uu-RRC消息。In one case, the second indication information may be carried in the first request message. Exemplarily, it may be carried in the MAC layer header of the first request message. Specifically, the function of the second indication information may be implemented by a logical channel identity (logical channel identity, LCID for short) parameter in the MAC layer header in the first request message. For example, when the value of the LCID parameter is 0 (or 1), the LCID parameter may indicate that the Uu-RRC UE message in the first request message is a Uu-RRC message sent to the access network device.
另一种情况下,第二指示信息可以不携带在第一请求消息中,第二指示信息可以携带在侧链路控制指示(sidelink control indicator,简称SCI)中。In another case, the second indication information may not be carried in the first request message, and the second indication information may be carried in a sidelink control indicator (sidelink control indicator, SCI for short).
实现方式2、Implementation 2,
第一请求消息中包括第三验证码,第三验证码用于验证终端的合法性。终端可以根据第一根密钥,以及第一节点的标识和终端在侧链路的标识中的至少一个生成第三验证码。第一节点在接收到第一请求消息后,可以将第一请求消息中的第三验证码携带在第二请求消息中向接入网设备发送。该情况下,步骤303在具体实现时可以包括:接入网设备根据第一节点的标识和终端在侧链路的标识中的至少一个,以及第一根密钥和第三验证码验证终端的合法性。The first request message includes a third verification code, and the third verification code is used to verify the legitimacy of the terminal. The terminal may generate the third verification code according to the first root key, and at least one of the identity of the first node and the identity of the terminal on the side link. After receiving the first request message, the first node may carry the third verification code in the first request message in the second request message and send it to the access network device. In this case, step 303 may include: the access network device verifies the terminal's identity according to at least one of the identity of the first node and the identity of the terminal on the side link, as well as the first root key and the third verification code. legality.
在实现方式2下,步骤303在具体实现时,可以包括:接入网设备根据第一根密钥,以及第一节点的标识和终端在侧链路的标识中的至少一个生成第四验证码,接入网设备根据第三验证码和第四验证码验证终端的合法性。其中,接入网设备生成第四验证码和终端生成第三验证码的方法相同,可选的,终端和接入网设备之间可以预配置或者协商终端生成第三验证码和接入网设备生成第四验证码的方法,例如,终端和接入网设备之间可以预配置终端根据第一根密钥和第一节点的标识生成第三验证码,预配置接入网设备根据第一根密钥和第一节点的标识生成第四验证码。当接入网设备确定第三验证码和第四验证码相同时,确定终端是合法的,否则,确定终端是不合法的。In implementation mode 2, when step 303 is specifically implemented, the access network device may generate a fourth verification code according to the first root key, and at least one of the identifier of the first node and the identifier of the terminal on the side link , the access network device verifies the legitimacy of the terminal according to the third verification code and the fourth verification code. The methods for generating the fourth verification code by the access network device and the terminal generating the third verification code are the same. Optionally, the terminal and the access network device may pre-configure or negotiate between the terminal and the access network device to generate the third verification code and the access network device. The method for generating the fourth verification code, for example, between the terminal and the access network device, the terminal may be preconfigured to generate the third verification code according to the first root key and the identifier of the first node, and the access network device may be preconfigured to generate the third verification code according to the first root key. The key and the identity of the first node generate a fourth verification code. When the access network device determines that the third verification code and the fourth verification code are the same, the terminal is determined to be legal; otherwise, the terminal is determined to be illegal.
在步骤303的具体实现中,接入网设备在生成第四验证码的过程中需要采用第一节点的标识时,第一节点的标识为终端请求关联的LRC节点(在本申请实施例中终端请求关联的LRC节点即第一节点)的标识,那么接入网设备还需要确定终端请求关联的节点,具体可以通过以下任意一种方法获取:方法1、接入网设备可以确定终端请求关联的节点为发送第二请求消息的节点(即第一节点)。方法2、第二请求消息中还可以包括终端请求关联的节点的标识(即第一节点的标识),接入网设备根据该标识确定终端请求关联的节点。In the specific implementation of step 303, when the access network device needs to use the identifier of the first node in the process of generating the fourth verification code, the identifier of the first node is the LRC node that the terminal requests to associate (in the embodiment of the present application, the terminal The identification of the LRC node that requests association is the first node), then the access network device also needs to determine the node that the terminal requests to associate. The node is the node that sends the second request message (ie, the first node). In method 2, the second request message may further include the identifier of the node that the terminal requests to associate (ie, the identifier of the first node), and the access network device determines the node that the terminal requests to associate according to the identifier.
在实现方式2下,第二请求消息中可以包括终端在侧链路的标识,在步骤303之前,接入网设备可以根据第二请求消息中包含的终端在侧链路的标识获取第一根密钥,以便根据第一根密钥对终端的合法性进行验证。In implementation mode 2, the second request message may include the identifier of the terminal on the side link, and before step 303, the access network device may obtain the first root root according to the identifier of the terminal on the side link included in the second request message key to verify the legitimacy of the terminal according to the first root key.
接入网设备获取第一根密钥的方式可以包括第一种可能的实现方式和第二种可能的实现方式。其中,第一种可能的实现方式为终端和接入网设备之间建立Uu-RRC连接之后获取第一根密钥的方式,第二种可能的实现方式为终端和接入网设备之间未建立Uu-RRC连接时获取第一根密钥的方式。具体的:The manner in which the access network device obtains the first root key may include the first possible implementation manner and the second possible implementation manner. Among them, the first possible implementation manner is to obtain the first root key after establishing a Uu-RRC connection between the terminal and the access network device, and the second possible implementation manner is that there is no connection between the terminal and the access network device. The method of obtaining the first root key when establishing a Uu-RRC connection. specific:
在第一种可能的实现方式中,终端和接入网设备之间已经建立了Uu-RRC连接,接入网设备保存了终端的上下文,终端的上下文中包括第一根密钥。接入网设备可以根据终端在侧链路的标识确定终端的上下文,从终端的上下文中获取第一根密钥。In a first possible implementation manner, a Uu-RRC connection has been established between the terminal and the access network device, the access network device saves the context of the terminal, and the context of the terminal includes the first root key. The access network device may determine the context of the terminal according to the identifier of the terminal on the side link, and obtain the first root key from the context of the terminal.
在第二种可能的实现方式中,终端和接入网设备之间还未建立Uu-RRC连接,终端可以给第一节点发送申请建立Uu-RRC连接的Uu-RRCUE消息。第一节点将该Uu-RRCUE消息(例如Uu-RRCUE连接建立请求消息,即终端向接入网设备发送的RRC连接建立请求消息)转发给接入网设备,接入网设备通过第一节点给终端回复Uu-RRCUE消息(例如,Uu-RRCUE连接建立消息,即接入网设备向终端发送的RRC连接建立消息),从而建立了接入网设备和终端之间的Uu-RRC连接。后续核心网可以通过终端和接入网设备之间的Uu-RRC连接,对终端进行鉴权。最终接入网设备可以从核心网处获得第一根密钥。关于第一节点判断终端发送的Uu-RRC消息是否为发送给接入网设备的Uu-RRC消息的方法可参见实现方式1中的相关部分的描述,在此不再赘述。In the second possible implementation manner, a Uu-RRC connection has not been established between the terminal and the access network device, and the terminal may send a Uu-RRC UE message for applying for establishing a Uu-RRC connection to the first node. The first node forwards the Uu-RRC UE message (for example, the Uu-RRC UE connection establishment request message, that is, the RRC connection establishment request message sent by the terminal to the access network device) to the access network device, and the access network device passes the first The node replies a Uu-RRC UE message (for example, a Uu-RRC UE connection establishment message, that is, an RRC connection establishment message sent by the access network device to the terminal) to the terminal, thereby establishing a Uu-RRC between the access network device and the terminal connect. The subsequent core network can authenticate the terminal through the Uu-RRC connection between the terminal and the access network device. The final access network device can obtain the first root key from the core network. For the method for the first node to determine whether the Uu-RRC message sent by the terminal is a Uu-RRC message sent to the access network device, reference may be made to the description of the relevant part in Implementation Mode 1, and details are not repeated here.
在实现方式2下,可选的,第二请求消息中还包括节点关联信息(例如,第一节点的标识),该节点关联信息用于告知接入网设备有一个终端请求关联到第一节点,从而触发接入网设备对终端进行认证。在实现方式2下,第二请求消息可以为Uu-RRCLRC消息。In implementation mode 2, optionally, the second request message further includes node association information (for example, the identifier of the first node), where the node association information is used to inform the access network device that there is a terminal requesting association with the first node , thereby triggering the access network device to authenticate the terminal. In implementation mode 2, the second request message may be a Uu-RRC LRC message.
304、接入网设备向第一节点发送第二响应消息,第二响应消息用于指示验证结果或关联结果。相应的,第一节点从接入网设备接收第二响应消息。304. The access network device sends a second response message to the first node, where the second response message is used to indicate a verification result or an association result. Correspondingly, the first node receives the second response message from the access network device.
其中,第二响应消息可以为Uu-RRCLRC消息(例如,Uu-RRCLRC重配置消息,即接入网设备向第一节点发送的RRC重配置消息)。验证结果用于指示终端的合法性的验证结果,可以为成功或失败,成功代表终端是合法的,失败代表终端是不合法的。关联结果用于指示是否允许终端关联到第一节点。The second response message may be a Uu-RRC LRC message (for example, a Uu-RRC LRC reconfiguration message, that is, an RRC reconfiguration message sent by the access network device to the first node). The verification result is used to indicate the verification result of the legitimacy of the terminal, which can be success or failure. Success means that the terminal is legal, and failure means that the terminal is illegal. The association result is used to indicate whether the terminal is allowed to associate with the first node.
验证结果或关联结果可以通过第二响应消息的消息类型指示,例如,若关联结果为允许终端关联到第一节点,则第二响应消息可以为允许关联消息,若关联结果为不允许终端关联到第一节点,则第二响应消息可以为不允许关联消息。The verification result or the association result can be indicated by the message type of the second response message. For example, if the association result is that the terminal is allowed to associate with the first node, the second response message can be the association permit message. If the association result is that the terminal is not allowed to associate with the first node. the first node, the second response message may be an association not allowed message.
验证结果或关联结果也可以通过第二响应消息中的一个指示信息指示。例如,关联结果对应的指示信息为true(或1)时,表示允许终端关联到第一节点,关联结果对应的指示信息为false(或0)时,表示不允许终端关联到第一节点。The verification result or the association result may also be indicated by an indication information in the second response message. For example, when the indication information corresponding to the association result is true (or 1), it means that the terminal is allowed to associate with the first node, and when the indication information corresponding to the association result is false (or 0), it means that the terminal is not allowed to associate with the first node.
需要说明的是,在本申请各实施例中,由于第一节点已经接入了接入网设备,因此,第一节点是信任接入网设备的。在接入网设备对终端的合法性进行验证的情况下,若接入网设备向第一节点指示终端是合法的,那么第一节点就认为终端是合法的。It should be noted that, in each embodiment of the present application, since the first node has accessed the access network device, the first node trusts the access network device. When the access network device verifies the validity of the terminal, if the access network device indicates to the first node that the terminal is legal, the first node considers the terminal to be legal.
305、第一节点根据第二响应消息向终端发送第一响应消息,第一响应消息用于指示关联结果。305. The first node sends a first response message to the terminal according to the second response message, where the first response message is used to indicate the association result.
关联结果可以通过第一响应消息的消息类型指示,例如,若关联结果为允许终端关联到第一节点,则第一响应消息可以为关联成功消息,若关联结果为不允许终端关联到第一节点,则第一响应消息可以为关联失败消息。The association result can be indicated by the message type of the first response message. For example, if the association result is that the terminal is allowed to associate with the first node, the first response message can be an association success message. If the association result is that the terminal is not allowed to associate with the first node , the first response message may be an association failure message.
关联结果也可以通过第一响应消息中的一个指示信息指示。例如,关联结果对应的指示信息为true(或1)时,表示终端成功关联到第一节点,关联结果对应的指示信息为false(或0)时,表示终端未成功关联到第一节点。The association result may also be indicated by an indication information in the first response message. For example, when the indication information corresponding to the association result is true (or 1), it means that the terminal is successfully associated with the first node, and when the indication information corresponding to the association result is false (or 0), it means that the terminal is not successfully associated with the first node.
其中,在第一节点的协议栈中存在与终端对等的PC5-RRC层的情况下,第一响应消息可以为PC5-RRC消息。Wherein, in the case that a PC5-RRC layer equivalent to the terminal exists in the protocol stack of the first node, the first response message may be a PC5-RRC message.
上述步骤301至步骤305为可选步骤。The above steps 301 to 305 are optional steps.
306、接入网设备向第一节点发送第一验证码。306. The access network device sends the first verification code to the first node.
相应的,第一节点从接入网设备接收第一验证码。Correspondingly, the first node receives the first verification code from the access network device.
其中,第一验证码用于终端验证第一节点的合法性。第一验证码根据第一根密钥,以及第一节点的标识和终端在侧链路的标识中的至少一个生成。The first verification code is used by the terminal to verify the legitimacy of the first node. The first verification code is generated according to the first root key and at least one of the identity of the first node and the identity of the terminal on the side link.
需要说明的是,接入网设备可以将第一验证码携带在上述第二响应消息中向第一节点发送。此时,步骤304和步骤306可以合并为同一个步骤。该情况下,针对第二响应消息,一种可能的实现方式,不论步骤303中接入网设备对终端的合法性是否验证成功,第二响应消息中包含终端在侧链路的标识、第一验证码以及验证结果(或关联结果)。另一种可能的实现方式,当步骤303中验证结果为失败或关联结果为不允许时,第二响应消息中仅包含验证结果或关联结果;当步骤303中验证结果为成功或关联结果为允许时,第二响应消息中可以仅包含终端在侧链路的标识和第一验证码。It should be noted that the access network device may carry the first verification code in the second response message and send it to the first node. At this time, step 304 and step 306 may be combined into the same step. In this case, for the second response message, a possible implementation manner, regardless of whether the access network device successfully verifies the legitimacy of the terminal in step 303, the second response message includes the identifier of the terminal on the side link, the first Verification code and verification result (or association result). In another possible implementation manner, when the verification result in step 303 is failure or the association result is not allowed, the second response message only contains the verification result or the association result; when the verification result in step 303 is successful or the association result is allowed , the second response message may only include the side-link identifier of the terminal and the first verification code.
307、第一节点向终端发送第一验证码和第一节点的标识。307. The first node sends the first verification code and the identifier of the first node to the terminal.
相应的,终端从第一节点接收第一验证码和第一节点的标识。Correspondingly, the terminal receives the first verification code and the identifier of the first node from the first node.
其中,第一节点向终端发送的第一验证码和第一节点的标识用于终端验证第一节点的合法性。The first verification code and the identifier of the first node sent by the first node to the terminal are used for the terminal to verify the legitimacy of the first node.
本申请实施例中由接入网设备生成第一验证码后向第一节点发送,第一节点再将第一验证码和第一节点的标识向终端发送,以便终端验证第一节点的合法性。In the embodiment of this application, the access network device generates the first verification code and sends it to the first node, and the first node sends the first verification code and the identifier of the first node to the terminal, so that the terminal can verify the legitimacy of the first node .
需要说明的是,第一节点可以将第一验证码和第一节点的标识携带在上述第一响应消息中向终端发送。此时,步骤305和步骤307可以合并为同一个步骤。该情况下,第一节点的标识可以携带在第一响应消息的MAC层头的SRC地址域。第一验证码可以携带在第一响应消息的MAC层头中,也可以携带在第一响应消息的净荷中。It should be noted that the first node may carry the first verification code and the identifier of the first node in the above-mentioned first response message and send it to the terminal. At this time, step 305 and step 307 can be combined into the same step. In this case, the identifier of the first node may be carried in the SRC address field of the MAC layer header of the first response message. The first verification code may be carried in the MAC layer header of the first response message, or may be carried in the payload of the first response message.
308、终端根据第一根密钥、第一验证码,以及第一节点的标识和终端在侧链路的标识中的至少一个验证第一节点的合法性。308. The terminal verifies the legitimacy of the first node according to the first root key, the first verification code, and at least one of the identifier of the first node and the identifier of the terminal on the side link.
可选的,步骤308在具体实现时包括:Optionally, step 308 includes:
11)终端根据第一根密钥,以及第一节点的标识和终端在侧链路的标识中的至少一个生成第二验证码。11) The terminal generates a second verification code according to the first root key and at least one of the identity of the first node and the identity of the terminal on the side link.
12)终端根据第二验证码和第一验证码验证第一节点的合法性。12) The terminal verifies the legitimacy of the first node according to the second verification code and the first verification code.
其中,接入网设备生成第一验证码的方法与终端生成第二验证码的方法相同。可选的,终端和接入网设备之间可以预配置或者协商接入网设备生成第一验证码和终端生成第二验证码的方法,例如,可以预配置接入网设备根据第一根密钥和第一节点的标识生成第一验证码,预配置终端根据第一根密钥和第一节点的标识生成第二验证码。步骤12)在具体实现时,若终端确定第一验证码和第二验证码相同,则终端确定第一节点是合法的,否则,终端确定第一节点是不合法的。The method for generating the first verification code by the access network device is the same as the method for generating the second verification code by the terminal. Optionally, the terminal and the access network device may preconfigure or negotiate the method for the access network device to generate the first verification code and the terminal to generate the second verification code. The key and the identifier of the first node generate the first verification code, and the pre-configured terminal generates the second verification code according to the first root key and the identifier of the first node. Step 12) During specific implementation, if the terminal determines that the first verification code and the second verification code are the same, the terminal determines that the first node is legal; otherwise, the terminal determines that the first node is illegal.
现有技术中,由于服务器位于DN中。因此,终端从服务器获取共享密钥时,需要较长的时间。而实施例一提供的方法,在验证第一节点的合法性时,终端根据第一根密钥、接收到的第一节点的标识以及第一验证码就可以对第一节点的合法性验证,而不需要从服务器中获取共享密钥,因此,可以缩短终端验证第一节点的合法性的时间。在验证终端的合法性时,接入网设备根据Uu-RRCUE消息,或,接入网设备根据由第一根密钥生成的第三验证码和第四验证码对终端的合法性进行验证,并通知第一节点,而不需要第一节点从服务器中获取共享密钥,因此,可以缩短第一节点验证终端的合法性的时间。另外,实施例一中,由于第一根密钥保存在接入网设备和终端中,因此,终端和接入网设备之间可以方便快捷的对终端和第一节点的合法性进行验证。In the prior art, since the server is located in the DN. Therefore, it takes a long time for the terminal to obtain the shared key from the server. In the method provided in the first embodiment, when verifying the legality of the first node, the terminal can verify the legality of the first node according to the first root key, the received identifier of the first node and the first verification code, There is no need to obtain the shared key from the server, therefore, the time for the terminal to verify the legitimacy of the first node can be shortened. When verifying the legitimacy of the terminal, the access network device verifies the legitimacy of the terminal according to the Uu-RRC UE message, or the access network device according to the third verification code and the fourth verification code generated by the first root key , and notify the first node without needing the first node to obtain the shared key from the server, therefore, the time for the first node to verify the legitimacy of the terminal can be shortened. In addition, in the first embodiment, since the first root key is stored in the access network device and the terminal, the terminal and the access network device can conveniently and quickly verify the legitimacy of the terminal and the first node.
需要说明的是,实施例一中在验证终端和第一节点的合法性时,可以先验证终端的合法性,也可以先验证第一节点的合法性(该情况下,步骤306至步骤308可以执行在步骤301之前)。本申请实施例对此不作具体限定。It should be noted that, when verifying the legality of the terminal and the first node in the first embodiment, the legality of the terminal may be verified first, or the legality of the first node may be verified first (in this case, steps 306 to 308 may be performed before step 301). This embodiment of the present application does not specifically limit this.
实施例二Embodiment 2
实施例二提供了一种验证方法,与实施例一提供的验证方法的主要区别包括但不限于:1、对终端的合法性验证不再由接入网设备执行,而是由第一节点执行;2、第一节点对终端的合法性的验证和终端对第一节点的合法性的验证不再基于第一根密钥,而是基于第二根密钥。其中,第二根密钥为终端和第一节点之间通信所使用的根密钥,第二根密钥可以根据第一根密钥生成。关于与第一根密钥的相关描述可参见实施例一,在此不再赘述。The second embodiment provides a verification method, and the main differences from the verification method provided by the first embodiment include but are not limited to: 1. The validity verification of the terminal is no longer performed by the access network device, but by the first node. 2. The verification of the legitimacy of the terminal by the first node and the verification of the legitimacy of the first node by the terminal are no longer based on the first root key, but on the second root key. The second root key is a root key used for communication between the terminal and the first node, and the second root key may be generated according to the first root key. For a description related to the first root key, reference may be made to Embodiment 1, and details are not repeated here.
如图4所示,实施例二提供的验证方法包括:As shown in Figure 4, the verification method provided by the second embodiment includes:
400、接入网设备向第一节点发送终端在侧链路的标识和第二根密钥。相应的,第一节点从接入网设备接收终端在侧链路的标识和第二根密钥。第一节点可以根据终端在侧链路的标识确定采用第二根密钥与第一节点通信的终端。400. The access network device sends the identifier of the terminal on the side link and the second root key to the first node. Correspondingly, the first node receives the identifier of the terminal on the side link and the second root key from the access network device. The first node may determine the terminal that uses the second root key to communicate with the first node according to the identification of the terminal on the side link.
其中,在步骤400之前,接入网设备可以根据第一根密钥和第一密钥新鲜性参数生成第二根密钥。接入网设备具体可以通过以下方式1或方式2或方式3实现。Wherein, before step 400, the access network device may generate the second root key according to the first root key and the first key freshness parameter. The access network device may be specifically implemented through the following manner 1 or manner 2 or manner 3.
方式1、根据第一根密钥、第一节点的标识和第一密钥新鲜性参数生成第二根密钥。Manner 1: Generate the second root key according to the first root key, the identifier of the first node, and the first key freshness parameter.
方式2、根据第一根密钥、第一节点的标识、第一密钥新鲜性参数和终端在侧链路的标识生成第二根密钥。Manner 2: Generate the second root key according to the first root key, the identifier of the first node, the freshness parameter of the first key, and the identifier of the terminal on the side link.
方式3、根据第一根密钥、第一密钥新鲜性参数和终端在侧链路的标识生成第二根密钥。Manner 3: Generate the second root key according to the first root key, the freshness parameter of the first key, and the identifier of the terminal on the side link.
可选的,第一节点是负责分配侧链路的传输资源的节点,即第一节点为LRC节点。Optionally, the first node is a node responsible for allocating transmission resources of the side link, that is, the first node is an LRC node.
可选的,第一节点为终端的应用层数据的终结点,即终端的应用层数据终结在第一节点。Optionally, the first node is the termination point of the application layer data of the terminal, that is, the application layer data of the terminal is terminated in the first node.
401、接入网设备向终端发送第一节点的标识和第一密钥新鲜性参数。401. The access network device sends the identifier of the first node and the first key freshness parameter to the terminal.
相应的,终端从接入网设备接收第一节点的标识和第一密钥新鲜性参数。Correspondingly, the terminal receives the identifier of the first node and the first key freshness parameter from the access network device.
示例性的,第一节点的标识和第一密钥新鲜性参数可以携带在Uu-RRCUE消息(例如,Uu-RRCUE重配置消息,即接入网设备向终端发送的RRC重配置消息)中。Exemplarily, the identity of the first node and the freshness parameter of the first key may be carried in a Uu-RRC UE message (for example, a Uu-RRC UE reconfiguration message, that is, an RRC reconfiguration message sent by the access network device to the terminal) middle.
在步骤401之前,若接入网设备接收到终端发送的携带终端在侧链路的标识的Uu-RRCUE消息,接入网设备可以根据终端在侧链路的标识找到终端的上下文,终端的上下文中包括第一密钥新鲜性参数,接入网设备可以将第一密钥新鲜性参数携带在Uu-RRCUE消息中发送给终端。示例性的,该Uu-RRCUE消息可以为Uu-RRCUE重配置消息。Before step 401, if the access network device receives the Uu-RRC UE message that is sent by the terminal and carries the identifier of the terminal on the side link, the access network device can find the context of the terminal according to the identifier of the terminal on the side link. The context includes the first key freshness parameter, and the access network device may carry the first key freshness parameter in the Uu-RRC UE message and send it to the terminal. Exemplarily, the Uu-RRC UE message may be a Uu-RRC UE reconfiguration message.
终端可以根据第一根密钥和第一密钥新鲜性参数生成第二根密钥。终端生成第二根密钥的方法与接入网设备生成第二根密钥的方法相同,例如,终端和接入网设备可以均采用上述方式1或方式2或方式3生成第二根密钥,具体采用哪种方式可以为预配置的或接入网设备和终端协商确定的。The terminal may generate the second root key according to the first root key and the first key freshness parameter. The method for the terminal to generate the second root key is the same as the method for the access network device to generate the second root key. For example, both the terminal and the access network device can use the above method 1 or method 2 or method 3 to generate the second root key , the specific mode to be adopted may be pre-configured or determined through negotiation between the access network device and the terminal.
其中,步骤401和步骤400的执行顺序不分先后。Wherein, the execution order of step 401 and step 400 is in no particular order.
402、终端向第一节点发送第一请求消息。相应的,第一节点从终端接收第一请求消息。402. The terminal sends a first request message to the first node. Correspondingly, the first node receives the first request message from the terminal.
其中,第一请求消息用于请求关联到第一节点,第一请求消息中包括第三验证码,第三验证码用于验证终端的合法性。The first request message is used for requesting to associate with the first node, the first request message includes a third verification code, and the third verification code is used to verify the legitimacy of the terminal.
终端可以根据第二根密钥、以及终端在侧链路的标识和第一节点的标识中的一个或多个生成第三验证码。具体可以通过以下方式一或方式二或方式三实现。The terminal may generate the third verification code according to the second root key, and one or more of the identification of the terminal on the side link and the identification of the first node. Specifically, it can be implemented in the following manner 1 or manner 2 or manner 3.
方式一、终端直接根据第二根密钥、以及终端在侧链路的标识和第一节点的标识中的一个或多个生成第三验证码。Manner 1: The terminal directly generates the third verification code according to the second root key, and one or more of the identifier of the terminal on the side link and the identifier of the first node.
方式二、终端先根据第二根密钥生成终端和LRC节点之间的控制面的加密密钥,再根据终端和LRC节点之间的控制面的加密密钥、以及终端在侧链路的标识和第一节点的标识中的一个或多个生成第三验证码。Mode 2: The terminal first generates the encryption key of the control plane between the terminal and the LRC node according to the second root key, and then according to the encryption key of the control plane between the terminal and the LRC node, and the identification of the terminal on the side link and one or more of the identification of the first node to generate a third verification code.
方式三、终端先根据第二根密钥生成终端和LRC节点之间的控制面的完整性保护密钥,再根据终端和LRC节点之间的控制面的完整性保护密钥、以及终端在侧链路的标识和第一节点的标识中的一个或多个生成第三验证码。Mode 3: The terminal first generates the integrity protection key of the control plane between the terminal and the LRC node according to the second root key, and then according to the integrity protection key of the control plane between the terminal and the LRC node, and the terminal is on the side One or more of the identification of the link and the identification of the first node generates a third verification code.
可选的,第一请求消息中还包括终端在侧链路的标识、关联请求信息和第一节点的标识中的一个或多个。Optionally, the first request message further includes one or more of the identifier of the terminal on the side link, the association request information and the identifier of the first node.
需要说明的是,第一请求消息的作用可以通过第一请求消息中的关联请求信息来表征,也可以通过第一请求消息的消息类型来表征。若为后者,第一请求消息可以为关联请求(此时,第一请求消息中不包括关联请求信息)。终端在侧链路的标识用于接收第一请求消息的节点确定请求关联的终端。第一节点的标识用于指示终端请求关联的节点。It should be noted that the role of the first request message may be characterized by association request information in the first request message, or may be characterized by the message type of the first request message. If it is the latter, the first request message may be an association request (in this case, the first request message does not include association request information). The identifier of the terminal on the side link is used for the node receiving the first request message to determine the terminal requesting association. The identifier of the first node is used to indicate the node to which the terminal requests association.
403、第一节点根据第二根密钥和第三验证码验证终端的合法性。403. The first node verifies the legitimacy of the terminal according to the second root key and the third verification code.
步骤403在具体实现时可以包括:第一节点根据第二根密钥生成第四验证码,第一节点根据第四验证码和第三验证码验证终端的合法性。The specific implementation of step 403 may include: the first node generates a fourth verification code according to the second root key, and the first node verifies the legitimacy of the terminal according to the fourth verification code and the third verification code.
第一节点生成第四验证码的方法与终端生成第三验证码的方法相同。可选的,终端和第一节点之间可以预配置或者协商终端生成第三验证码和第一节点生成第四验证码的方法,例如,终端和第一节点之间可以预配置终端根据第二根密钥和第一节点的标识生成第三验证码,预配置第一节点根据第二根密钥和第一节点的标识生成第四验证码。若第一节点确定第四验证码和第三验证码相同,则确定终端是合法的,否则,确定终端是不合法的。The method for generating the fourth verification code by the first node is the same as the method for generating the third verification code by the terminal. Optionally, the terminal and the first node may preconfigure or negotiate a method for the terminal to generate the third verification code and the first node to generate the fourth verification code. For example, the terminal and the first node may preconfigure the terminal according to the second verification code. The root key and the identifier of the first node generate a third verification code, and the preconfigured first node generates a fourth verification code according to the second root key and the identifier of the first node. If the first node determines that the fourth verification code and the third verification code are the same, it determines that the terminal is legal; otherwise, it determines that the terminal is illegal.
其中,在步骤403之前,可选的,该方法还包括:第一节点根据终端在侧链路的标识获取第二根密钥。Wherein, before step 403, optionally, the method further includes: the first node obtains the second root key according to the identification of the terminal on the side link.
404、第一节点向终端发送第一响应消息,第一响应消息用于指示关联结果。404. The first node sends a first response message to the terminal, where the first response message is used to indicate an association result.
其中,当第一节点验证终端合法时,关联结果为关联成功。当第一节点验证终端不合法时,关联结果为关联失败。Wherein, when the first node verifies that the terminal is legal, the association result is that the association is successful. When the first node verifies that the terminal is invalid, the association result is association failure.
关联结果可以通过第一响应消息的消息类型指示,也可以通过第一响应消息中的一个指示信息指示。具体可参见实施例一中的步骤305中的相关描述,在此不再赘述。The association result may be indicated by the message type of the first response message, or may be indicated by a piece of indication information in the first response message. For details, reference may be made to the relevant description in step 305 in the first embodiment, and details are not repeated here.
405、第一节点根据第二根密钥生成第一验证码。405. The first node generates a first verification code according to the second root key.
其中,第一验证码用于终端验证第一节点的合法性。The first verification code is used by the terminal to verify the legitimacy of the first node.
406、第一节点向终端发送第一验证码。相应的,终端从第一节点接收第一验证码。406. The first node sends the first verification code to the terminal. Correspondingly, the terminal receives the first verification code from the first node.
可选的,终端和第一节点通过侧链路通信。Optionally, the terminal communicates with the first node through a side link.
第一节点可以将第一验证码携带在步骤404中的第一响应消息中发送给终端。该情况下,步骤404和步骤406可以合并为同一个步骤。The first node may carry the first verification code in the first response message in step 404 and send it to the terminal. In this case, step 404 and step 406 may be combined into the same step.
407、终端根据第二根密钥验证第一节点的合法性。407. The terminal verifies the legitimacy of the first node according to the second root key.
步骤407在具体实现时,终端可以根据第二根密钥生成第二验证码,并根据第二验证码和第一验证码验证第一节点的合法性。When step 407 is specifically implemented, the terminal may generate a second verification code according to the second root key, and verify the legitimacy of the first node according to the second verification code and the first verification code.
其中,第一节点生成第一验证码的方法与终端生成第二验证码的方法相同。可选的,终端和第一节点之间可以预配置或者协商终端生成第二验证码和第一节点生成第一验证码的方法,例如,终端和第一节点之间可以预配置终端根据第二根密钥和第一节点的标识生成第二验证码,预配置第一节点根据第二根密钥和第一节点的标识生成第一验证码。步骤407在具体实现时,若终端确定第一验证码和第二验证码相同,则终端确定第一节点是合法的,否则,终端确定第一节点是不合法的。The method for generating the first verification code by the first node is the same as the method for generating the second verification code by the terminal. Optionally, the terminal and the first node may preconfigure or negotiate a method for the terminal to generate the second verification code and the first node to generate the first verification code. For example, the terminal and the first node may preconfigure the terminal according to the second verification code. The root key and the identifier of the first node generate the second verification code, and the preconfigured first node generates the first verification code according to the second root key and the identifier of the first node. When step 407 is specifically implemented, if the terminal determines that the first verification code and the second verification code are the same, the terminal determines that the first node is legal; otherwise, the terminal determines that the first node is illegal.
在图4所示的实施例中,步骤400、步骤402、步骤403和步骤404均为可选步骤。In the embodiment shown in FIG. 4 , step 400 , step 402 , step 403 and step 404 are all optional steps.
需要说明的是,实施例二中在验证终端和第一节点的合法性时,可以先验证终端的合法性,也可以先验证第一节点的合法性(该情况下,步骤405、步骤406和步骤407可以执行在步骤402之前)。本申请实施例对此不作具体限定。It should be noted that, when verifying the legality of the terminal and the first node in the second embodiment, the legality of the terminal may be verified first, and the legality of the first node may also be verified first (in this case, steps 405, 406 and Step 407 may be performed before step 402). This embodiment of the present application does not specifically limit this.
现有技术中,由于服务器位于DN中。因此,终端从服务器获取共享密钥时,需要较长的时间。而实施例二提供的方法,在验证第一节点的合法性时,终端根据第一根密钥以及从接入网设备获取的第一节点的标识和第一密钥新鲜性参数生成第二验证码,再根据第一验证码和第二验证码对第一节点的合法性进行验证即可。终端不需要从服务器中获取共享密钥就可以实现第一节点的合法性验证,因此,可以缩短终端验证第一节点的合法性的时间。在验证终端的合法性时,第一节点可以根据接入网设备发送的第二根密钥生成第四验证码,再根据终端发送的第三验证码和第四验证对终端的合法性验证,而不需要从服务器中获取共享密钥,因此,可以缩短第一节点验证终端的合法性的时间。In the prior art, since the server is located in the DN. Therefore, it takes a long time for the terminal to obtain the shared key from the server. However, in the method provided in the second embodiment, when verifying the legitimacy of the first node, the terminal generates a second verification method according to the first root key, the identifier of the first node obtained from the access network device, and the freshness parameter of the first key. code, and then verify the legitimacy of the first node according to the first verification code and the second verification code. The terminal can realize the validity verification of the first node without acquiring the shared key from the server, so the time for the terminal to verify the validity of the first node can be shortened. When verifying the legitimacy of the terminal, the first node can generate a fourth verification code according to the second root key sent by the access network device, and then verify the legitimacy of the terminal according to the third verification code and the fourth verification sent by the terminal, It is not necessary to obtain the shared key from the server, therefore, the time for the first node to verify the legitimacy of the terminal can be shortened.
可选的,上述方法还包括:终端根据第二根密钥生成与第一节点之间的数据的安全保护密钥;终端根据安全保护密钥与第一节点之间进行数据传输。Optionally, the above method further includes: generating a security protection key for data between the terminal and the first node according to the second root key; and performing data transmission between the terminal and the first node according to the security protection key.
可选的,上述方法还包括:第一节点根据第二根密钥生成与终端之间的数据的安全保护密钥;第一节点根据安全保护密钥与终端之间进行数据传输。Optionally, the above method further includes: the first node generates a security protection key for data with the terminal according to the second root key; the first node performs data transmission with the terminal according to the security protection key.
其中,第一节点与终端之间的数据的安全保护密钥可以包括用户面数据和/或控制面数据的安全保护密钥,终端和第一节点之间通过用户面数据的安全保护密钥进行用户面数据传输,通过控制面数据的安全保护密钥进行控制面数据传输,从而保证数据的安全。Wherein, the security protection key of the data between the first node and the terminal may include the security protection key of the user plane data and/or the control plane data, and the communication between the terminal and the first node is performed by the security protection key of the user plane data For user plane data transmission, the control plane data transmission is performed through the security protection key of the control plane data, thereby ensuring data security.
实施例三Embodiment 3
该实施例提供了一种验证方法,对第一节点的合法性的验证过程与实施例二中对第一节点的合法性的验证过程相同。对终端的合法性验证可以有三种实现方式,三种实现方式中有两种实现方式与实施例一中的实现方式一和实现方式二分别相同。如图5所示,以下对实施例三提供的验证方法具体进行描述,该验证方法包括:This embodiment provides a verification method, and the verification process of the legality of the first node is the same as the verification process of the legality of the first node in the second embodiment. The validity verification of the terminal can be implemented in three manners, and two of the three implementation manners are the same as the implementation manners 1 and 2 in the first embodiment, respectively. As shown in Figure 5, the verification method provided by the third embodiment is specifically described below, and the verification method includes:
501、与上述步骤402相同。501. It is the same as step 402 above.
502、与上述步骤301相同。502. It is the same as step 301 above.
503、与上述步骤302相同。503. It is the same as step 302 above.
504、与上述步骤303相同。504. It is the same as step 303 above.
505、与上述步骤304相同。505. It is the same as step 304 above.
506、与上述步骤305相同。506. It is the same as step 305 above.
步骤502至步骤506中对终端的合法性进行验证可以有三种实现方式。三种实现方式中的第一种实现方式与实施例一中的实现方式1相同。三种实现方式中的第二种实现方式与实施例一中的实现方式2相同。三种实现方式中的第三种实现方式中,终端可以根据第一根密钥生成第二根密钥(具体生成方式可参见实施例二中的相关部分的描述),根据第二根密钥生成第三验证码,并将第三验证码携带在第一请求消息中向第一节点发送,第一节点将第一请求消息中的第三验证码包含在第二请求消息中向接入网设备发送,接入网设备根据接收到的第三验证码,以及根据第二根密钥生成的第四验证码进行比较,若相同,确定终端是合法的,若不同,确定终端是不合法的。其中,在第三种实现方式中,终端生成第三验证码和接入网设备生成第四验证码的方法相同,该方法可以是预配置的,也可以是接入网设备和终端协商确定的,例如,可以预配置终端根据第二根密钥和第一节点的标识生成第三验证码,预配置接入网设备也根据第二根密钥和第一节点的标识生成第四验证码。There may be three implementation manners for verifying the legitimacy of the terminal in steps 502 to 506 . The first implementation manner among the three implementation manners is the same as the implementation manner 1 in the first embodiment. The second implementation manner among the three implementation manners is the same as the implementation manner 2 in the first embodiment. In the third implementation manner of the three implementation manners, the terminal may generate the second root key according to the first root key (for the specific generation method, please refer to the description of the relevant part in Embodiment 2), and according to the second root key Generate a third verification code, carry the third verification code in the first request message and send it to the first node, and the first node includes the third verification code in the first request message in the second request message to the access network The device sends, and the access network device compares the received third verification code and the fourth verification code generated according to the second root key. If they are the same, it is determined that the terminal is legal. If they are different, it is determined that the terminal is illegal. . Wherein, in the third implementation manner, the method for the terminal to generate the third verification code and the method for the access network device to generate the fourth verification code are the same, and the method may be pre-configured or determined through negotiation between the access network device and the terminal For example, the terminal can be preconfigured to generate the third verification code according to the second root key and the identifier of the first node, and the preconfigured access network device can also generate the fourth verification code according to the second root key and the identifier of the first node.
507、与上述步骤400相同。507. It is the same as step 400 above.
其中,在步骤507之前,接入网设备可以生成第二根密钥,生成方法可以参见实施例二中的相关部分的描述,在此不再赘述。其中,接入网设备可以将终端在侧链路的标识和第二根密钥携带在步骤505中的第二响应消息中发送给第一节点。该情况下,步骤505和步骤507可以合并为同一个步骤。Wherein, before step 507, the access network device may generate the second root key, and the generation method may refer to the description of the relevant part in the second embodiment, which will not be repeated here. The access network device may carry the identifier of the terminal on the side link and the second root key in the second response message in step 505 and send it to the first node. In this case, step 505 and step 507 can be combined into the same step.
508、与上述步骤405相同。508. It is the same as step 405 above.
步骤507和步骤508可以执行在步骤501至步骤506中的任意一个步骤之前。Steps 507 and 508 may be performed before any one of steps 501 to 506 .
509、与上述步骤406相同。509. Same as step 406 above.
其中,在步骤507和步骤508执行在步骤506之前的情况下,接入网设备可以将第一验证码携带在步骤506中的第一响应消息中发送给第一节点。该情况下,步骤506和步骤509可以合并为同一个步骤。Wherein, in the case that steps 507 and 508 are performed before step 506, the access network device may send the first verification code to the first node by carrying the first verification code in the first response message in step 506. In this case, step 506 and step 509 may be combined into the same step.
510、与上述步骤407相同。510. It is the same as step 407 above.
其中,若步骤502至步骤506中对终端的合法性的验证采用第一种实现方式或第二种实现方式,步骤501执行在步骤510之前即可,与步骤502至步骤509中的步骤的执行顺序不分先后。示例性的,步骤501中的第一节点的标识和第一密钥新鲜性参数,可以通过第一节点转发给终端,例如,携带在第二响应消息和第一响应消息中发送给终端。Wherein, if the verification of the legitimacy of the terminal in steps 502 to 506 adopts the first implementation manner or the second implementation manner, step 501 may be executed before step 510, and the execution of the steps in steps 502 to 509 In no particular order. Exemplarily, the identifier of the first node and the first key freshness parameter in step 501 may be forwarded to the terminal by the first node, for example, carried in the second response message and the first response message and sent to the terminal.
需要说明的是,实施例三中在验证终端和第一节点的合法性时,可以先验证终端的合法性,也可以先验证第一节点的合法性(该情况下,步骤508至步骤510可以执行在步骤504之前)。本申请实施例对此不作具体限定。It should be noted that, when verifying the legality of the terminal and the first node in the third embodiment, the legality of the terminal may be verified first, and the legality of the first node may also be verified first (in this case, steps 508 to 510 may be performed before step 504). This embodiment of the present application does not specifically limit this.
在图5所示的实施例中,步骤502至步骤507均为可选步骤。In the embodiment shown in FIG. 5 , steps 502 to 507 are all optional steps.
现有技术中,由于服务器位于DN中。因此,终端从服务器获取共享密钥时,需要较长的时间。而实施例三提供的方法,在验证第一节点的合法性时,终端根据第一根密钥以及从接入网设备获取的第一节点的标识和第一密钥新鲜性参数生成第二验证码,再根据第一验证码和第二验证码对第一节点的合法性进行验证即可。终端不需要从服务器中获取共享密钥就可以实现第一节点的合法性验证,因此,可以缩短终端验证第一节点的合法性的时间。在验证终端的合法性时,接入网设备根据Uu-RRCUE消息,或,接入网设备根据由第一根密钥生成的第三验证码和第四验证码,或,接入网设备根据由第二根密钥生成的第三验证码和第四验证码对终端的合法性进行验证,并通知第一节点,而不需要第一节点从服务器中获取共享密钥,因此,可以缩短第一节点验证终端的合法性的时间。In the prior art, since the server is located in the DN. Therefore, it takes a long time for the terminal to obtain the shared key from the server. However, in the method provided by the third embodiment, when verifying the validity of the first node, the terminal generates a second verification method according to the first root key, the identifier of the first node obtained from the access network device, and the freshness parameter of the first key. code, and then verify the legitimacy of the first node according to the first verification code and the second verification code. The terminal can realize the validity verification of the first node without acquiring the shared key from the server, so the time for the terminal to verify the validity of the first node can be shortened. When verifying the legitimacy of the terminal, the access network device according to the Uu-RRC UE message, or the access network device according to the third verification code and the fourth verification code generated by the first root key, or, the access network device The legitimacy of the terminal is verified according to the third verification code and the fourth verification code generated by the second root key, and the first node is notified without the first node needing to obtain the shared key from the server. Therefore, it can shorten the The time when the first node verifies the legitimacy of the terminal.
可选的,上述方法还包括:终端根据第二根密钥生成与第一节点之间的数据的安全保护密钥;终端根据安全保护密钥与第一节点之间进行数据传输。关于该可选的方法的具体描述可参见实施例二中的相关描述,在此不再赘述。Optionally, the above method further includes: generating a security protection key for data between the terminal and the first node according to the second root key; and performing data transmission between the terminal and the first node according to the security protection key. For a specific description of the optional method, reference may be made to the relevant description in Embodiment 2, and details are not repeated here.
可选的,上述方法还包括:第一节点根据第二根密钥生成与终端之间的数据的安全保护密钥;第一节点根据安全保护密钥与终端之间进行数据传输。关于该可选的方法的具体描述可参见实施例二中的相关描述,在此不再赘述。Optionally, the above method further includes: the first node generates a security protection key for data with the terminal according to the second root key; the first node performs data transmission with the terminal according to the security protection key. For a specific description of the optional method, reference may be made to the relevant description in Embodiment 2, and details are not repeated here.
实施例四Embodiment 4
若终端需要从一个接入网设备(记为第一接入网设备)切换到另一接入网设备(记为第二接入网设备)。为了保证终端在切换之后,顺利的和LRC节点之间进行合法性验证,实施例四提供了一种验证方法,如图6所示,包括:If the terminal needs to switch from one access network device (referred to as the first access network device) to another access network device (referred to as the second access network device). In order to ensure that the terminal successfully performs legality verification with the LRC node after the handover, Embodiment 4 provides a verification method, as shown in FIG. 6 , including:
601、第一接入网设备向第二接入网设备发送切换请求消息。601. The first access network device sends a handover request message to the second access network device.
相应的,第二接入网设备从第一接入网设备接收切换请求消息。Correspondingly, the second access network device receives the handover request message from the first access network device.
其中,切换请求消息用于向第二接入网设备请求终端从第一接入网设备切换至第二接入网设备,切换请求消息中包括终端的标识。The handover request message is used to request the second access network device to switch the terminal from the first access network device to the second access network device, and the handover request message includes the identifier of the terminal.
602、第二接入网设备向第一接入网设备发送切换回复消息。602. The second access network device sends a handover reply message to the first access network device.
相应的,第一接入网设备从第二接入网设备接收切换回复消息。Correspondingly, the first access network device receives the handover reply message from the second access network device.
其中,切换回复消息包括第二节点的标识和第二密钥新鲜性参数。第二节点为LRC节点,第二节点为终端切换后负责分配侧链路的传输资源的节点,例如切换完成后,终端与第二节点关联后,第二节点可以为终端分配侧链路的传输资源。第二节点与第一节点可以为同一个节点,也可以为不同的节点。其中,第二密钥新鲜性参数用于更新第三根密钥。第三根密钥为终端与第二节点之间通信的根密钥,第三根密钥用于验证终端和/或第二节点的合法性。Wherein, the handover reply message includes the identifier of the second node and the second key freshness parameter. The second node is the LRC node, and the second node is the node responsible for allocating transmission resources of the side link after the terminal is handed over. For example, after the handover is completed, after the terminal is associated with the second node, the second node can allocate the transmission of the side link to the terminal. resource. The second node and the first node may be the same node, or may be different nodes. The second key freshness parameter is used to update the third root key. The third root key is the root key for communication between the terminal and the second node, and the third root key is used to verify the legitimacy of the terminal and/or the second node.
在步骤602之前,第二接入网设备可以确定第二节点。Before step 602, the second access network device may determine the second node.
603、第一接入网设备向终端发送第二节点的标识和第二密钥新鲜性参数。603. The first access network device sends the identifier of the second node and the second key freshness parameter to the terminal.
相应的,终端从第一接入网设备接收第二节点的标识和第二密钥新鲜性参数。Correspondingly, the terminal receives the identifier of the second node and the second key freshness parameter from the first access network device.
在终端从第一接入网设备切换到第二接入网设备后,当第二接入网设备为上述实施例二和实施例三中的接入网设备时,第二接入网设备可以采用图4或图5中所示的方法对终端和第二节点的合法性进行验证,在具体实现时,仅需将图4或图5中的第一节点替换为第二节点,第二根密钥替换为第三根密钥即可。另外,图4中的步骤401可以不执行,图5中的步骤501可以不执行。After the terminal switches from the first access network device to the second access network device, when the second access network device is the access network device in the foregoing second and third embodiments, the second access network device may Use the method shown in FIG. 4 or FIG. 5 to verify the legitimacy of the terminal and the second node. In specific implementation, only the first node in FIG. 4 or FIG. 5 needs to be replaced with the second node, and the second root Just replace the key with the third root key. In addition, step 401 in FIG. 4 may not be executed, and step 501 in FIG. 5 may not be executed.
实施例四提供的方法,可以在终端从第一接入网设备切换到第二接入网设备的场景下,通过第一接入网设备向终端发送第二节点的标识和第二密钥新鲜性参数,从而保证终端在切换到第二接入网设备后可以顺利的与第二节点进行合法性验证。In the method provided in Embodiment 4, in a scenario where the terminal switches from the first access network device to the second access network device, the first access network device can send the identifier of the second node and the fresh second key to the terminal. parameters, so as to ensure that the terminal can successfully perform legality verification with the second node after switching to the second access network device.
实施例五Embodiment 5
该实施例提供了一种验证方法,其中,对终端的合法性的验证的过程与实施例二中的相同。对第一节点的合法性的验证,与实施例一、实施例二和实施例三的区别在于,实施例一、实施例二和实施例三中终端均需要生成验证码,而该实施例中终端不需要生成验证码,终端可以直接采用接入网设备和第一节点发送的验证码对第一节点的合法性进行验证。This embodiment provides a verification method, wherein the process of verifying the legitimacy of the terminal is the same as that in the second embodiment. The difference between the verification of the legitimacy of the first node and the first embodiment, the second embodiment and the third embodiment is that in the first embodiment, the second embodiment and the third embodiment, the terminal needs to generate a verification code. The terminal does not need to generate a verification code, and the terminal can directly use the verification code sent by the access network device and the first node to verify the legitimacy of the first node.
如图7所示,该验证方法包括:As shown in Figure 7, the verification method includes:
701、接入网设备向终端发送第一节点的标识、第一验证码和第三验证码。701. The access network device sends the identifier of the first node, the first verification code, and the third verification code to the terminal.
其中,第一验证码用于验证第一节点的合法性,第三验证码用于验证终端的合法性。第一验证码和第二验证码均可以根据第二根密钥生成,具体可参见实施例二中的相关部分的描述。The first verification code is used to verify the legitimacy of the first node, and the third verification code is used to verify the legitimacy of the terminal. Both the first verification code and the second verification code may be generated according to the second root key. For details, please refer to the description of the relevant part in the second embodiment.
可选的,第一节点为负责分配侧链路的传输资源的节点,即第一节点为LRC节点。Optionally, the first node is a node responsible for allocating transmission resources of the side link, that is, the first node is an LRC node.
702、终端向第一节点发送第一请求消息。702. The terminal sends a first request message to the first node.
相应的,第一节点从终端接收第一请求消息。Correspondingly, the first node receives the first request message from the terminal.
其中,第一请求消息用于请求关联到第一节点。第一请求消息中包含第三验证码。Wherein, the first request message is used for requesting to associate with the first node. The first request message includes a third verification code.
可选的,第一请求消息中还可以包括终端在侧链路的标识。Optionally, the first request message may further include an identifier of the terminal on the side link.
可选的,终端和第一节点通过侧链路通信。第一节点为终端的应用层数据的终结点,即终端的应用层数据终结在第一节点。Optionally, the terminal communicates with the first node through a side link. The first node is the termination point of the application layer data of the terminal, that is, the application layer data of the terminal is terminated in the first node.
终端确定执行步骤702的场景也可以为实施例一中的场景1或场景2,在此不再赘述。The scenario where the terminal determines to perform step 702 may also be scenario 1 or scenario 2 in the first embodiment, and details are not described herein again.
703、第一节点根据第二根密钥和第三验证码验证终端的合法性。703. The first node verifies the legitimacy of the terminal according to the second root key and the third verification code.
在步骤703之前,该方法还可以包括:接入网设备向第一节点发送第二根密钥,相应的,第一节点从接入网设备接收第二根密钥。Before step 703, the method may further include: the access network device sends the second root key to the first node, and correspondingly, the first node receives the second root key from the access network device.
步骤703的相关描述可参见实施例二中的与步骤403相关的描述,在此不再赘述。For the related description of step 703, reference may be made to the description related to step 403 in the second embodiment, and details are not repeated here.
704、第一节点向终端发送第一响应消息。704. The first node sends a first response message to the terminal.
相应的,终端从第一节点接收第一响应消息。Correspondingly, the terminal receives the first response message from the first node.
第一响应消息用于指示关联结果,具体实现可参见实施例二中的步骤404。第一响应消息中包括第二验证码。第二验证码为第一节点生成的,第一节点生成第二验证码的方法与接入网设备生成第一验证码的方法相同,具体可参见实施例二中的相关部分的描述,此处不再赘述。The first response message is used to indicate the association result, and the specific implementation can refer to step 404 in the second embodiment. The first response message includes the second verification code. The second verification code is generated by the first node. The method for the first node to generate the second verification code is the same as the method for the access network device to generate the first verification code. For details, please refer to the description of the relevant part in the second embodiment, here No longer.
705、终端根据第一验证码和第二验证码验证第一节点的合法性。705. The terminal verifies the legitimacy of the first node according to the first verification code and the second verification code.
步骤705的相关描述可参见实施例二中的与步骤407相关的描述,在此不再赘述。For the related description of step 705, reference may be made to the description related to step 407 in the second embodiment, which will not be repeated here.
在步骤705之后,第一节点和终端还可以根据第二根密钥生成第一节点和终端之间通信的安全保护密钥。具体可参见实施例二中的相关部分的描述,在此不再赘述。After step 705, the first node and the terminal may further generate a security protection key for communication between the first node and the terminal according to the second root key. For details, reference may be made to the description of the relevant part in the second embodiment, which will not be repeated here.
实施例五中在验证终端和第一节点的合法性时,可以先验证终端的合法性,也可以先验证第一节点的合法性(该情况下,步骤704和步骤705可以执行在步骤702之前)。本申请实施例对此不作具体限定。In the fifth embodiment, when verifying the legality of the terminal and the first node, the legality of the terminal may be verified first, and the legality of the first node may also be verified first (in this case, steps 704 and 705 may be performed before step 702. ). This embodiment of the present application does not specifically limit this.
需要说明的是,图7中以既对第一节点的合法性进行验证,也对终端的合法性进行验证进行绘制。在实际实现时,可以仅验证终端的合法性,该情况下,步骤704和步骤705为可选步骤,也可以仅验证第一节点的合法性,该情况下,步骤702和步骤703为可选步骤。It should be noted that, in FIG. 7 , both the legality of the first node and the legality of the terminal are verified for drawing. In actual implementation, only the legitimacy of the terminal may be verified. In this case, step 704 and step 705 are optional steps, or only the legitimacy of the first node may be verified. In this case, step 702 and step 703 are optional. step.
需要说明的是,除了采用上述实施例二中的方法生成第一验证码和第三验证码之外,第一验证码和第三验证码也可以根据第一节点和接入网设备之间通信所使用的根密钥生成,此时,验证码生成的方法与实施例一或实施例二中的验证码生成的方法类似,唯一的区别是将第一根密钥或第二根密钥替换为第一节点和接入网设备之间通信所使用的根密钥,此处不再赘述。It should be noted that, in addition to using the method in the second embodiment to generate the first verification code and the third verification code, the first verification code and the third verification code can also be based on the communication between the first node and the access network device. The root key used is generated. At this time, the method for generating the verification code is similar to the method for generating the verification code in Embodiment 1 or Embodiment 2. The only difference is to replace the first root key or the second root key. The root key used for the communication between the first node and the access network device will not be repeated here.
现有技术中,由于服务器位于DN中。因此,终端从服务器获取共享密钥时,需要较长的时间。而实施例五提供的方法,第一节点和终端之间可以直接基于接入网设备发送的验证码互相进行合法性验证,不需要从服务器中获取共享密钥,因此,可以缩短第一节点和终端的合法性验证的时间。另外,终端不需要生成验证码,因此,可以避免增加终端的实现复杂度,进而避免增加终端的功耗。In the prior art, since the server is located in the DN. Therefore, it takes a long time for the terminal to obtain the shared key from the server. In the method provided in the fifth embodiment, the first node and the terminal can directly perform legality verification with each other based on the verification code sent by the access network device, and do not need to obtain the shared key from the server. Therefore, the first node and the terminal can be shortened. The validity verification time of the terminal. In addition, the terminal does not need to generate a verification code, so it can avoid increasing the implementation complexity of the terminal and thus avoid increasing the power consumption of the terminal.
实施例六Embodiment 6
该实施例提供了一种验证方法,与实施例五的相同之处在于,终端不需要生成验证码,与实施例五的区别在于,实施例五中第一节点需要生成验证码,而该实施例中第一节点不需要生成验证码,终端和第一节点中的验证码均可以由接入网设备发送,终端和第一节点可以基于接入网设备发送的验证码对终端和第一节点进行合法性验证。This embodiment provides a verification method, which is the same as the fifth embodiment in that the terminal does not need to generate a verification code. The difference from the fifth embodiment is that in the fifth embodiment, the first node needs to generate a verification code, while this implementation In the example, the first node does not need to generate a verification code, the verification codes in the terminal and the first node can be sent by the access network device, and the terminal and the first node can verify the terminal and the first node based on the verification code sent by the access network device. Verify legality.
如图8所示,该验证方法包括:As shown in Figure 8, the verification method includes:
801、接入网设备向终端发送第一验证码和第三验证码。相应的,终端从接入网设备接收第一验证码和第三验证码。801. The access network device sends the first verification code and the third verification code to the terminal. Correspondingly, the terminal receives the first verification code and the third verification code from the access network device.
其中,第一验证码用于验证第一节点的合法性,第三验证码用于验证终端的合法性。The first verification code is used to verify the legitimacy of the first node, and the third verification code is used to verify the legitimacy of the terminal.
第一验证码可以根据第一根密钥或第二根密钥生成,具体可参见实施例一或实施例二中的相关部分的描述。The first verification code may be generated according to the first root key or the second root key. For details, refer to the description of the relevant part in Embodiment 1 or Embodiment 2.
第三验证码可以是接入网设备给终端分配的,用于接入网设备和第一节点之间识别该终端的标识(例如,局部标识)。或者,第三验证码也可以是第一节点给终端分配的,用于接入网设备和第一节点之间识别该终端的标识。或者,第三验证码由接入网设备根据第一根密钥或第二根密钥生成的,具体可参见实施例一或实施例二中的相关部分的描述。The third verification code may be allocated by the access network device to the terminal, and used for identifying the terminal identifier (eg, a local identifier) between the access network device and the first node. Alternatively, the third verification code may also be allocated by the first node to the terminal, and used for identifying the terminal identifier between the access network device and the first node. Alternatively, the third verification code is generated by the access network device according to the first root key or the second root key. For details, refer to the description of the relevant part in Embodiment 1 or Embodiment 2.
可选的,终端可以先向第一节点发送用于请求第一验证码和第三验证码的验证码请求消息1,接着第一节点向接入网设备发送用于请求第一验证码和第三验证码的验证码请求消息2,验证码请求消息2中包含终端在侧链路的标识(或终端在蜂窝网的标识)。接入网设备根据终端在侧链路的标识(或终端在蜂窝网的标识)找到该终端,通过Uu-RRCUE消息向终端发送第一验证码和第三验证码。在第一节点为终端分配了标识的情况下,验证码请求消息2中可以包含第一节点给终端分配的标识,在第一节点没有为终端分配标识的情况下,验证码请求消息2中不包含第一节点给终端分配的标识。Optionally, the terminal may first send a verification code request message 1 for requesting the first verification code and the third verification code to the first node, and then the first node sends a verification code request message 1 for requesting the first verification code and the third verification code to the access network device. The verification code request message 2 of the three verification codes, the verification code request message 2 contains the identification of the terminal in the side link (or the identification of the terminal in the cellular network). The access network device finds the terminal according to the identifier of the terminal on the side link (or the identifier of the terminal on the cellular network), and sends the first verification code and the third verification code to the terminal through the Uu-RRC UE message. In the case where the first node assigns an identifier to the terminal, the verification code request message 2 may include the identifier assigned to the terminal by the first node. In the case where the first node does not assign an identifier to the terminal, the verification code request message 2 does not contain an identifier Contains the identifier assigned to the terminal by the first node.
可选的,接入网设备还向终端发送第一节点的标识,以便终端确定需要关联的节点。Optionally, the access network device also sends the identifier of the first node to the terminal, so that the terminal can determine the node to be associated.
802、接入网设备向第一节点发送第一验证码和第三验证码。相应的,第一节点从接入网设备接收第一验证码和第三验证码。802. The access network device sends the first verification code and the third verification code to the first node. Correspondingly, the first node receives the first verification code and the third verification code from the access network device.
可选的,第一节点为负责分配侧链路的传输资源的节点,即第一节点为LRC节点。Optionally, the first node is a node responsible for allocating transmission resources of the side link, that is, the first node is an LRC node.
步骤801和步骤802的执行顺序不分先后。The execution order of step 801 and step 802 is not specific.
803、终端向第一节点发送第三验证码。相应的,第一节点从终端接收第三验证码。803. The terminal sends a third verification code to the first node. Correspondingly, the first node receives the third verification code from the terminal.
其中,第三验证码可以携带在第一请求消息中,第一请求消息用于请求关联到第一节点。The third verification code may be carried in the first request message, and the first request message is used to request association with the first node.
可选的,终端和第一节点通过侧链路通信。第一节点为终端的应用层数据的终结点,即终端的应用层数据终结在第一节点。Optionally, the terminal communicates with the first node through a side link. The first node is the termination point of the application layer data of the terminal, that is, the application layer data of the terminal is terminated in the first node.
终端确定执行步骤803的场景也可以为实施例一中的场景1或场景2,在此不再赘述。The scenario where the terminal determines to perform step 803 may also be scenario 1 or scenario 2 in the first embodiment, and details are not described herein again.
804、第一节点确定从接入网设备接收到的第三验证码和从终端接收的第三验证码是否相同,若是,第一节点确定终端是合法的,否则,确定终端是不合法的。804. The first node determines whether the third verification code received from the access network device is the same as the third verification code received from the terminal, and if so, the first node determines that the terminal is legal, otherwise, determines that the terminal is illegal.
805、第一节点向终端发送第一验证码。相应的,终端从第一节点接收第一验证码。805. The first node sends the first verification code to the terminal. Correspondingly, the terminal receives the first verification code from the first node.
可选的,第一验证码可以携带在第一节点向终端发送的第一请求消息的回复消息中。Optionally, the first verification code may be carried in a reply message of the first request message sent by the first node to the terminal.
806、终端确定从接入网设备接收到的第一验证码和从第一节点接收的第一验证码是否相同,若是,终端确定第一节点是合法的,否则,确定第一节点是不合法的。806. The terminal determines whether the first verification code received from the access network device is the same as the first verification code received from the first node, and if so, the terminal determines that the first node is legal, otherwise, determines that the first node is illegal of.
实施例六中在验证终端和第一节点的合法性时,可以先验证终端的合法性,也可以先验证第一节点的合法性(该情况下,步骤805和步骤806可以执行在步骤803之前)。本申请实施例对此不作具体限定。In the sixth embodiment, when verifying the legality of the terminal and the first node, the legality of the terminal may be verified first, and the legality of the first node may also be verified first (in this case, step 805 and step 806 may be performed before step 803. ). This embodiment of the present application does not specifically limit this.
需要说明的是,图8中以既对第一节点的合法性进行验证,也对终端的合法性进行验证进行绘制。在实际实现时,可以仅验证终端的合法性,该情况下,步骤805和步骤806为可选步骤。也可以仅验证第一节点的合法性,该情况下,步骤803至步骤804为可选步骤。It should be noted that, in FIG. 8 , both the legality of the first node and the legality of the terminal are verified for drawing. In actual implementation, only the legitimacy of the terminal may be verified. In this case, step 805 and step 806 are optional steps. It is also possible to only verify the legitimacy of the first node. In this case, steps 803 to 804 are optional steps.
现有技术中,由于服务器位于DN中。因此,终端从服务器获取共享密钥时,需要较长的时间。而实施例六提供的方法,第一节点和终端之间可以直接基于接入网设备发送的验证码互相进行合法性验证,不需要从服务器中获取共享密钥,因此,可以缩短第一节点和终端的合法性验证的时间。另外,终端和第一节点不需要生成验证码,因此,可以避免增加终端和第一节点的实现复杂度,进而避免增加终端的功耗。In the prior art, since the server is located in the DN. Therefore, it takes a long time for the terminal to obtain the shared key from the server. However, in the method provided in the sixth embodiment, the first node and the terminal can directly verify the validity of each other based on the verification code sent by the access network device, and do not need to obtain the shared key from the server. Therefore, the first node and the terminal can be shortened. The validity verification time of the terminal. In addition, the terminal and the first node do not need to generate a verification code, therefore, it is possible to avoid increasing the implementation complexity of the terminal and the first node, thereby avoiding increasing the power consumption of the terminal.
实施例七Embodiment 7
该实施例提供了一种验证方法,与实施例六的相同之处在于,终端和第一节点不需要生成验证码,与实施例六的区别在于,第一节点和终端也不需要获取验证码,终端和第一节点通过信息的传递将信任进行传递,从而对第一节点和终端的合法性进行验证。如图9所示,该验证方法包括:This embodiment provides a verification method, which is the same as the sixth embodiment in that the terminal and the first node do not need to generate a verification code, and the difference from the sixth embodiment is that the first node and the terminal do not need to obtain the verification code either. , the terminal and the first node transmit the trust through information transmission, so as to verify the legitimacy of the first node and the terminal. As shown in Figure 9, the verification method includes:
901、终端向第一节点发送第一请求消息。901. A terminal sends a first request message to a first node.
相应的,第一节点从终端接收第一请求消息。Correspondingly, the first node receives the first request message from the terminal.
第一请求消息用于请求关联到第一节点,第一请求消息中包含终端给接入网设备的第一Uu-RRCUE消息。The first request message is used for requesting to associate with the first node, and the first request message includes a first Uu-RRC UE message from the terminal to the access network device.
终端确定执行步骤901的场景也可以为实施例一中的场景1或场景2,在此不再赘述。The scenario where the terminal determines to perform step 901 may also be scenario 1 or scenario 2 in the first embodiment, and details are not described herein again.
902、第一节点将第一请求消息中的第一Uu-RRCUE消息向接入网设备发送。902. The first node sends the first Uu-RRC UE message in the first request message to the access network device.
相应的,接入网设备从第一节点接收终端发送的第一Uu-RRCUE消息。Correspondingly, the access network device receives the first Uu-RRC UE message sent by the terminal from the first node.
示例性的,第一Uu-RRCUE消息可以携带在第二请求消息中。Exemplarily, the first Uu-RRC UE message may be carried in the second request message.
903、接入网设备根据第一节点发送的第一Uu-RRCUE消息验证终端的合法性。903. The access network device verifies the validity of the terminal according to the first Uu-RRC UE message sent by the first node.
步骤903在具体实现时,验证终端的合法性的方法可参见实施例一中的实现方式1中的相关描述,在此不再赘述。When step 903 is specifically implemented, for a method for verifying the legitimacy of the terminal, reference may be made to the relevant description in the implementation manner 1 in the first embodiment, and details are not repeated here.
904、若终端合法,接入网设备向第一节点发送第二根密钥,或者,发送第二根密钥和终端在侧链路的标识。904. If the terminal is valid, the access network device sends the second root key to the first node, or sends the second root key and the identifier of the terminal on the side link.
相应的,第一节点从接入网设备接收第二根密钥,或者,接收第二根密钥和终端在侧链路的标识。Correspondingly, the first node receives the second root key from the access network device, or receives the second root key and the identifier of the terminal on the side link.
示例性的,第二根密钥,或者,第二根密钥和终端在侧链路的标识可以携带在第二响应消息中,第二响应消息为第二请求消息的响应消息。Exemplarily, the second root key, or, the second root key and the identifier of the terminal on the side link may be carried in the second response message, where the second response message is a response message of the second request message.
905、第一节点根据第二根密钥,或者,根据第二根密钥和终端在侧链路的标识确定终端合法。905. The first node determines that the terminal is legal according to the second root key, or according to the second root key and the identifier of the terminal on the side link.
需要说明的是,接入网设备验证终端合法后,将第二根密钥,或者,第二根密钥和终端在侧链路的标识发送给第一节点,相当于将对终端的信任传递给第一节点,第一节点只要接收到第二根密钥,或者,第二根密钥和终端在侧链路的标识,就认可终端的合法性。It should be noted that, after the access network device verifies that the terminal is legal, it sends the second root key, or the second root key and the identification of the terminal on the side link to the first node, which is equivalent to transmitting trust to the terminal. For the first node, the first node recognizes the legitimacy of the terminal as long as it receives the second root key, or the second root key and the identifier of the terminal on the side link.
在步骤905之后,第一节点可以向终端发送关联结果。相应的,终端从第一节点接收关联结果,终端可以根据关联结果确定是否成功关联到第一节点。具体的,若关联结果为关联成功时,终端根据关联结果确定成功关联到第一节点,否则,终端确定未关联到第一节点。关于关联结果的描述可参见实施例一中的相关描述,在此不再赘述。After step 905, the first node may send the association result to the terminal. Correspondingly, the terminal receives the association result from the first node, and the terminal can determine whether to successfully associate with the first node according to the association result. Specifically, if the association result is that the association is successful, the terminal determines that it is successfully associated with the first node according to the association result; otherwise, the terminal determines that it is not associated to the first node. For the description of the association result, reference may be made to the relevant description in Embodiment 1, and details are not repeated here.
906、若终端合法,接入网设备通过第一节点向终端发送第二Uu-RRCUE消息。相应的,终端通过第一节点从接入网设备接收终端发送的第二Uu-RRCUE消息。906. If the terminal is valid, the access network device sends a second Uu-RRC UE message to the terminal through the first node. Correspondingly, the terminal receives the second Uu-RRC UE message sent by the terminal from the access network device through the first node.
其中,第二Uu-RRCUE消息为第一Uu-RRCUE消息的回复消息。第二Uu-RRCUE消息中可以包含第一节点的标识。Wherein, the second Uu-RRC UE message is a reply message of the first Uu-RRC UE message. The second Uu-RRC UE message may include the identity of the first node.
步骤904中接入网设备向第一节点发送的信息(第二根密钥,或者,第二根密钥和终端在侧链路的标识)和步骤906中接入网设备向第一节点发送的信息(第二Uu-RRCUE消息)可以携带在同一条消息中发送,也可以携带在不同的消息中发送,本申请实施例对此不作具体限定。例如,步骤904中接入网设备向第一节点发送的信息和步骤906中接入网设备向第一节点发送的信息可以均携带在第二响应消息中发送,第二响应消息为第二请求消息的响应消息。The information sent by the access network device to the first node in step 904 (the second root key, or the second root key and the identifier of the terminal on the side link) and the information sent by the access network device to the first node in step 906 The information (the second Uu-RRC UE message) may be carried in the same message for sending, or may be carried in different messages and sent, which is not specifically limited in this embodiment of the present application. For example, the information sent by the access network device to the first node in step 904 and the information sent by the access network device to the first node in step 906 may both be sent in a second response message, and the second response message is the second request The response message for the message.
第一节点向终端发送的关联结果和第二Uu-RRCUE消息可以携带在同一条消息中发送,也可以携带在不同的消息中发送。例如,第一节点向终端发送的关联结果和第二Uu-RRCUE消息可以均携带在第一响应消息中发送,第一响应消息为第一请求消息的响应消息。The association result sent by the first node to the terminal and the second Uu-RRC UE message may be sent in the same message, or may be sent in different messages. For example, the association result and the second Uu-RRC UE message sent by the first node to the terminal may both be carried in a first response message and sent, where the first response message is a response message of the first request message.
907、终端根据从接入网设备接收的第二Uu-RRCUE消息确定第一节点的合法性。907. The terminal determines the validity of the first node according to the second Uu-RRC UE message received from the access network device.
需要说明的是,接入网设备将第二Uu-RRCUE消息通过第一节点发送给终端,相当于将对第一节点的信任传递给终端,终端成功解析第一节点转发的第二Uu-RRCUE消息后,则确定第一节点是合法的,否则确定第一节点是不合法的。It should be noted that the access network device sends the second Uu-RRC UE message to the terminal through the first node, which is equivalent to passing the trust to the first node to the terminal, and the terminal successfully parses the second Uu-RRC UE message forwarded by the first node. After the RRC UE message, it is determined that the first node is legal; otherwise, it is determined that the first node is illegal.
在实施例七中,需要说明的是,第一请求消息也可以不是用于请求关联到第一节点的请求,该情况下,终端可以在步骤905之后向第一节点发送用于请求关联到第一节点的请求。此时,当第一节点收到来自于终端在侧链路发送的用于请求关联到第一节点的请求时,第一节点认可终端的合法性。In Embodiment 7, it should be noted that the first request message may not be a request for requesting association with the first node. In this case, the terminal may send a request for association with the first node to the first node after step 905. A node request. At this time, when the first node receives a request sent by the terminal on the side link for requesting to associate with the first node, the first node recognizes the legitimacy of the terminal.
实施例七中在验证终端和第一节点的合法性时,可以先验证终端的合法性,也可以先验证第一节点的合法性(该情况下,步骤906和步骤907可以执行在步骤901之前)。本申请实施例对此不作具体限定。In the seventh embodiment, when verifying the legality of the terminal and the first node, the legality of the terminal may be verified first, and the legality of the first node may also be verified first (in this case, steps 906 and 907 may be performed before step 901. ). This embodiment of the present application does not specifically limit this.
需要说明的是,图9中以既对第一节点的合法性进行验证,也对终端的合法性进行验证进行绘制。在实际实现时,可以仅验证终端的合法性,该情况下,步骤906和步骤907为可选步骤,也可以仅验证第一节点的合法性,该情况下,步骤901至步骤905为可选步骤。It should be noted that, in FIG. 9 , both the legality of the first node and the legality of the terminal are verified for drawing. In actual implementation, only the legitimacy of the terminal may be verified. In this case, steps 906 and 907 are optional steps, or only the legitimacy of the first node may be verified. In this case, steps 901 to 905 are optional. step.
现有技术中,由于服务器位于DN中。因此,终端从服务器获取共享密钥时,需要较长的时间。而实施例七提供的方法,第一节点和终端之间可以直接基于接入网设备发送的信息互相进行合法性验证,不需要从服务器中获取共享密钥,因此,可以缩短第一节点和终端的合法性验证的时间。另外,终端和第一节点不需要生成验证码,因此,可以避免增加终端和第一节点的实现复杂度,进而避免增加终端的功耗。In the prior art, since the server is located in the DN. Therefore, it takes a long time for the terminal to obtain the shared key from the server. However, in the method provided in the seventh embodiment, the first node and the terminal can directly perform mutual legality verification based on the information sent by the access network device, and there is no need to obtain the shared key from the server. Therefore, the first node and the terminal can be shortened. the time of legality verification. In addition, the terminal and the first node do not need to generate a verification code, therefore, it is possible to avoid increasing the implementation complexity of the terminal and the first node, thereby avoiding increasing the power consumption of the terminal.
实施例八Embodiment 8
该实施例提供了一种验证方法,该实施例中,接入网设备验证终端的合法性的过程以及终端验证第一节点的合法性的过程与实施例七中相同,该实施例与实施例七的区别在于,第一节点不基于第二根密钥,或者,第二根密钥和终端在侧链路的标识对终端的合法性进行验证,而是基于接入网设备发送的关联结果或验证结果对终端的合法性进行验证。如图10所示,该验证方法包括:This embodiment provides a verification method. In this embodiment, the process for the access network device to verify the legitimacy of the terminal and the process for the terminal to verify the legitimacy of the first node are the same as those in Embodiment 7, and this embodiment is the same as Embodiment 7. The difference is that the first node does not verify the legitimacy of the terminal based on the second root key, or the second root key and the identification of the terminal on the side link, but based on the association result sent by the access network device. Or the verification result verifies the legitimacy of the terminal. As shown in Figure 10, the verification method includes:
1001、与步骤901相同。1001, which is the same as step 901.
1002、第一节点向接入网设备发送第二请求消息,所述第二请求消息中包括第一Uu-RRCUE消息。1002. The first node sends a second request message to an access network device, where the second request message includes a first Uu-RRC UE message.
相应的,接入网设备从第一节点接收第二请求消息。Correspondingly, the access network device receives the second request message from the first node.
可选的,第二请求消息中还包括节点关联信息,接入网设备可以根据节点关联信息确定有一个终端请求关联到第一节点。关于节点关联信息的描述可参见实施例一的相关描述,在此不再赘述。Optionally, the second request message further includes node association information, and the access network device may determine, according to the node association information, that there is a terminal requesting association with the first node. For the description of the node association information, reference may be made to the relevant description of Embodiment 1, and details are not repeated here.
1003、与步骤903相同。1003, the same as step 903.
1004、接入网设备向第一节点发送关联结果(或验证结果)。相应的,第一节点从接入网设备接收关联结果(或验证结果)。1004. The access network device sends the association result (or the verification result) to the first node. Correspondingly, the first node receives the association result (or verification result) from the access network device.
关于关联结果和验证结果的描述可参见实施例一中的相关描述,在此不再赘述。For the description of the association result and the verification result, reference may be made to the relevant description in Embodiment 1, and details are not repeated here.
1005、第一节点根据关联结果(或验证结果)确定终端是否合法。1005. The first node determines whether the terminal is legal according to the association result (or the verification result).
步骤1005在具体实现时,若关联结果为允许关联(或验证结果为验证成功)时,第一节点确定终端合法,否则,第一节点确定终端不合法。When step 1005 is specifically implemented, if the association result is that the association is allowed (or the verification result is that the verification is successful), the first node determines that the terminal is legal; otherwise, the first node determines that the terminal is illegal.
在步骤1005之后,第一节点可以向终端发送关联结果。相应的,终端从第一节点接收关联结果,终端可以根据关联结果确定是否成功关联到第一节点。具体的,若关联结果为关联成功时,终端根据关联结果确定成功关联到第一节点,否则,终端确定未关联到第一节点。关于关联结果的描述可参见实施例一中的相关描述,在此不再赘述。After step 1005, the first node may send the association result to the terminal. Correspondingly, the terminal receives the association result from the first node, and the terminal can determine whether to successfully associate with the first node according to the association result. Specifically, if the association result is that the association is successful, the terminal determines that it is successfully associated with the first node according to the association result; otherwise, the terminal determines that it is not associated to the first node. For the description of the association result, reference may be made to the relevant description in Embodiment 1, and details are not repeated here.
1006、若终端合法,接入网设备通过第一节点向终端发送第二Uu-RRCUE消息。相应的,终端通过第一节点从接入网设备接收终端发送的第二Uu-RRCUE消息。1006. If the terminal is valid, the access network device sends a second Uu-RRC UE message to the terminal through the first node. Correspondingly, the terminal receives the second Uu-RRC UE message sent by the terminal from the access network device through the first node.
其中,第二Uu-RRCUE消息为第一Uu-RRCUE消息的回复消息。第二Uu-RRCUE消息中可以包含第一节点的标识。Wherein, the second Uu-RRC UE message is a reply message of the first Uu-RRC UE message. The second Uu-RRC UE message may include the identity of the first node.
步骤1004中接入网设备向第一节点发送的信息(关联结果或验证结果)和步骤1006中接入网设备向第一节点发送的信息(第二Uu-RRCUE消息)可以携带在同一条消息中发送,也可以携带在不同的消息中发送,本申请实施例对此不作具体限定。例如,步骤1004中接入网设备向第一节点发送的信息和步骤1006中接入网设备向第一节点发送的信息可以均携带在第二响应消息中发送,第二响应消息为第二请求消息的响应消息。The information (association result or verification result) sent by the access network device to the first node in step 1004 and the information (second Uu-RRC UE message) sent by the access network device to the first node in step 1006 can be carried in the same message. It may be sent in a message, or may be carried in a different message and sent, which is not specifically limited in this embodiment of the present application. For example, the information sent by the access network device to the first node in step 1004 and the information sent by the access network device to the first node in step 1006 may both be carried in the second response message, and the second response message is the second request The response message for the message.
第一节点向终端发送的关联结果和第二Uu-RRCUE消息可以携带在同一条消息中发送,也可以携带在不同的消息中发送。例如,第一节点向终端发送的关联结果和第二Uu-RRCUE消息可以均携带在第一响应消息中发送,第一响应消息为第一请求消息的响应消息。The association result sent by the first node to the terminal and the second Uu-RRC UE message may be sent in the same message, or may be sent in different messages. For example, the association result and the second Uu-RRC UE message sent by the first node to the terminal may both be carried in a first response message and sent, where the first response message is a response message of the first request message.
1007、与步骤907相同。1007, which is the same as step 907.
在实施例八中,需要说明的是,第一请求消息也可以不是用于请求关联到第一节点的请求,该情况下,终端可以在步骤1005之后向第一节点发送用于请求关联到第一节点的请求。此时,当第一节点收到来自于终端在侧链路发送的用于请求关联到第一节点的请求时,第一节点认可终端的合法性。In Embodiment 8, it should be noted that the first request message may not be a request for requesting association to the first node. In this case, the terminal may send a request to the first node after step 1005 for requesting association to the first node. A node request. At this time, when the first node receives a request sent by the terminal on the side link for requesting to associate with the first node, the first node recognizes the legitimacy of the terminal.
实施例八中在验证终端和第一节点的合法性时,可以先验证终端的合法性,也可以先验证第一节点的合法性(该情况下,步骤1006和步骤1007可以执行在步骤1001之前)。本申请实施例对此不作具体限定。In the eighth embodiment, when verifying the legality of the terminal and the first node, the legality of the terminal may be verified first, and the legality of the first node may also be verified first (in this case, steps 1006 and 1007 may be performed before step 1001. ). This embodiment of the present application does not specifically limit this.
需要说明的是,图10中以既对第一节点的合法性进行验证,也对终端的合法性进行验证进行绘制。在实际实现时,可以仅验证终端的合法性,该情况下,步骤1006和步骤1007为可选步骤,也可以仅验证第一节点的合法性,该情况下,步骤1001至步骤1005为可选步骤。It should be noted that, in FIG. 10 , both the legality of the first node and the legality of the terminal are verified for drawing. In actual implementation, only the legitimacy of the terminal may be verified. In this case, steps 1006 and 1007 are optional steps, or only the legitimacy of the first node may be verified. In this case, steps 1001 to 1005 are optional. step.
现有技术中,由于服务器位于DN中。因此,终端从服务器获取共享密钥时,需要较长的时间。而实施例八提供的方法,第一节点和终端之间可以直接基于接入网设备发送的信息互相进行合法性验证,不需要从服务器中获取共享密钥,因此,可以缩短第一节点和终端的合法性验证的时间。另外,终端和第一节点不需要生成验证码,因此,可以避免增加终端和第一节点的实现复杂度,进而避免增加终端的功耗。In the prior art, since the server is located in the DN. Therefore, it takes a long time for the terminal to obtain the shared key from the server. However, in the method provided in the eighth embodiment, the first node and the terminal can directly perform mutual legality verification based on the information sent by the access network device, and do not need to obtain the shared key from the server. Therefore, the first node and the terminal can be shortened. the time of legality verification. In addition, the terminal and the first node do not need to generate a verification code, therefore, it is possible to avoid increasing the implementation complexity of the terminal and the first node, thereby avoiding increasing the power consumption of the terminal.
需要说明的是,本申请各实施例中示出的各个方案或技术特征,在不矛盾的前提下,均可以进行结合。It should be noted that, each solution or technical feature shown in each embodiment of the present application can be combined on the premise of not contradicting each other.
上述主要从各个网元之间交互的角度对本申请实施例的方案进行了介绍。可以理解的是,各个网元,例如,接入网设备、第一节点和终端为了实现上述功能,其包含了执行各个功能相应的硬件结构和软件模块中的至少一个。本领域技术人员应该很容易意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,本申请能够以硬件或硬件和计算机软件的结合形式来实现。某个功能究竟以硬件还是计算机软件驱动硬件的方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。The foregoing mainly introduces the solutions of the embodiments of the present application from the perspective of interaction between various network elements. It can be understood that each network element, for example, an access network device, a first node, and a terminal, includes at least one of a hardware structure and a software module corresponding to performing each function in order to implement the above-mentioned functions. Those skilled in the art should easily realize that the present application can be implemented in hardware or a combination of hardware and computer software with the units and algorithm steps of each example described in conjunction with the embodiments disclosed herein. Whether a function is performed by hardware or computer software driving hardware depends on the specific application and design constraints of the technical solution. Skilled artisans may implement the described functionality using different methods for each particular application, but such implementations should not be considered beyond the scope of this application.
本申请实施例可以根据上述方法示例对接入网设备、第一节点和终端进行功能单元的划分,例如,可以对应各个功能划分各个功能单元,也可以将两个或两个以上的功能集成在一个处理单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。需要说明的是,本申请实施例中对单元的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式。In this embodiment of the present application, the access network device, the first node, and the terminal may be divided into functional units according to the foregoing method examples. For example, each functional unit may be divided corresponding to each function, or two or more functions may be integrated in in a processing unit. The above-mentioned integrated units may be implemented in the form of hardware, or may be implemented in the form of software functional units. It should be noted that the division of units in the embodiments of the present application is illustrative, and is only a logical function division, and other division methods may be used in actual implementation.
在采用集成的单元的情况下,图11示出了上述实施例中所涉及的验证装置(记为验证装置110)的一种可能的结构示意图,该验证装置110包括处理单元1101和通信单元1102,还可以包括存储单元1103。图11所示的结构示意图可以用于示意上述实施例中所涉及的接入网设备、第一节点和终端的结构。In the case of using an integrated unit, FIG. 11 shows a possible schematic structural diagram of the verification device (referred to as verification device 110 ) involved in the above embodiment, and the verification device 110 includes a processing unit 1101 and a communication unit 1102 , and may also include a storage unit 1103 . The schematic structural diagram shown in FIG. 11 may be used to illustrate the structures of the access network device, the first node, and the terminal involved in the foregoing embodiment.
当图11所示的结构示意图用于示意上述实施例中所涉及的终端的结构时,处理单元1101用于对终端的动作进行控制管理,例如,处理单元1101用于执行图3中的301、305、307和308,图4中的401、402、404、406和407,图5中的501、502、506、509和510,图6中的603,图7中的701、702、704和705,图8中的801、803、805和806,图9中的901、906和907,图10中的1001,1006和1007,和/或本申请实施例中所描述的其他过程中的终端执行的动作。处理单元1101可以通过通信单元1102与其他网络实体通信,例如,与图3中示出的第一节点通信。存储单元1103用于存储终端的程序代码和数据。When the schematic structural diagram shown in FIG. 11 is used to illustrate the structure of the terminal involved in the above embodiment, the processing unit 1101 is used to control and manage the actions of the terminal. For example, the processing unit 1101 is used to execute 301, 305, 307 and 308, 401, 402, 404, 406 and 407 in Figure 4, 501, 502, 506, 509 and 510 in Figure 5, 603 in Figure 6, 701, 702, 704 and 705, 801, 803, 805, and 806 in FIG. 8, 901, 906, and 907 in FIG. 9, 1001, 1006, and 1007 in FIG. 10, and/or terminals in other processes described in the embodiments of this application Action performed. The processing unit 1101 may communicate with other network entities through the communication unit 1102, for example, with the first node shown in FIG. 3 . The storage unit 1103 is used to store program codes and data of the terminal.
当图11所示的结构示意图用于示意上述实施例中所涉及的终端的结构时,验证装置110可以是终端,也可以是终端内的芯片。When the schematic structural diagram shown in FIG. 11 is used to illustrate the structure of the terminal involved in the foregoing embodiment, the verification apparatus 110 may be a terminal or a chip in the terminal.
当图11所示的结构示意图用于示意上述实施例中所涉及的接入网设备的结构时,处理单元1101用于对接入网设备的动作进行控制管理,例如,处理单元1101用于执行图3中的302-304、306,图4中的400-401,图5中的501、503-505、507,图6中的601-602,图7中的701,图8中的801-802,图9中的902-904和906,图10中的1002-1004和1006,和/或本申请实施例中所描述的其他过程中的接入网设备执行的动作。处理单元1101可以通过通信单元1102与其他网络实体通信,例如,与图3中示出的第一节点通信。存储单元1103用于存储接入网设备的程序代码和数据。When the schematic structural diagram shown in FIG. 11 is used to illustrate the structure of the access network equipment involved in the above embodiment, the processing unit 1101 is used to control and manage the actions of the access network equipment, for example, the processing unit 1101 is used to execute 302-304, 306 in Figure 3, 400-401 in Figure 4, 501, 503-505, 507 in Figure 5, 601-602 in Figure 6, 701 in Figure 7, 801- in Figure 8 802, 902-904 and 906 in FIG. 9, 1002-1004 and 1006 in FIG. 10, and/or actions performed by the access network device in other processes described in the embodiments of this application. The processing unit 1101 may communicate with other network entities through the communication unit 1102, for example, with the first node shown in FIG. 3 . The storage unit 1103 is used for storing program codes and data of the access network device.
当图11所示的结构示意图用于示意上述实施例中所涉及的接入网设备的结构时,验证装置110可以是接入网设备,也可以是接入网设备内的芯片。When the schematic structural diagram shown in FIG. 11 is used to illustrate the structure of the access network equipment involved in the foregoing embodiment, the verification apparatus 110 may be the access network equipment, or may be a chip in the access network equipment.
当图11所示的结构示意图用于示意上述实施例中所涉及的第一节点的结构时,处理单元1101用于对第一节点的动作进行控制管理,例如,处理单元1101用于执行图3中的301-302、304-307,图4中的400、402-406,图5中的502-503、505-509,图6中的601-603,图7中的702-704,图8中的802-805,图9中的901-902、904-906,图10中的1001-1002、1004-1006,和/或本申请实施例中所描述的其他过程中的第一节点执行的动作。处理单元1101可以通过通信单元1102与其他网络实体通信,例如,与图3中示出的终端通信。存储单元1103用于存储第一节点的程序代码和数据。When the schematic structural diagram shown in FIG. 11 is used to illustrate the structure of the first node involved in the above embodiment, the processing unit 1101 is used to control and manage the actions of the first node, for example, the processing unit 1101 is used to execute the operation of FIG. 3 301-302, 304-307 in Fig. 4, 400, 402-406 in Fig. 4, 502-503, 505-509 in Fig. 5, 601-603 in Fig. 6, 702-704 in Fig. 7, Fig. 8 802-805 in FIG. 9, 901-902, 904-906 in FIG. 9, 1001-1002, 1004-1006 in FIG. 10, and/or performed by the first node in other processes described in the embodiments of the present application action. The processing unit 1101 may communicate with other network entities through the communication unit 1102, for example, with the terminal shown in FIG. 3 . The storage unit 1103 is used to store program codes and data of the first node.
当图11所示的结构示意图用于示意上述实施例中所涉及的第一节点的结构时,验证装置110可以是第一节点,也可以是第一节点内的芯片。When the schematic structural diagram shown in FIG. 11 is used to illustrate the structure of the first node involved in the foregoing embodiment, the verification apparatus 110 may be the first node, or may be a chip in the first node.
其中,当验证装置110为终端、第一节点或接入网设备时,处理单元1101可以是处理器或控制器,通信单元1102可以是通信接口、收发器、收发机、收发电路、收发装置等。其中,通信接口是统称,可以包括一个或多个接口。存储单元1103可以是存储器。当验证装置110为终端、第一节点或接入网设备内的芯片时,处理单元1101可以是处理器或控制器,通信单元1102可以是输入/输出接口、管脚或电路等。存储单元1103可以是该芯片内的存储单元(例如,寄存器、缓存等),也可以是终端或接入网设备内的位于该芯片外部的存储单元(例如,只读存储器(read-onlymemory,简称ROM)、随机存取存储器(random accessmemory,简称RAM)等)。Wherein, when the verification device 110 is a terminal, a first node or an access network device, the processing unit 1101 may be a processor or a controller, and the communication unit 1102 may be a communication interface, a transceiver, a transceiver, a transceiver circuit, a transceiver, etc. . Among them, the communication interface is a general term, which may include one or more interfaces. The storage unit 1103 may be a memory. When the verification apparatus 110 is a terminal, a first node or a chip in an access network device, the processing unit 1101 may be a processor or a controller, and the communication unit 1102 may be an input/output interface, a pin or a circuit. The storage unit 1103 may be a storage unit (for example, a register, a cache, etc.) in the chip, or a storage unit (for example, a read-only memory, abbreviated as a read-only memory) located outside the chip in a terminal or an access network device. ROM), random access memory (random access memory, RAM for short), etc.).
其中,通信单元也可以称为收发单元。验证装置110中的具有收发功能的天线和控制电路可以视为验证装置110的通信单元1102,具有处理功能的处理器可以视为验证装置110的处理单元1101。可选的,通信单元1102中用于实现接收功能的器件可以视为接收单元,接收单元用于执行本申请实施例中的接收的步骤,接收单元可以为接收机、接收器、接收电路等。通信单元1102中用于实现发送功能的器件可以视为发送单元,发送单元用于执行本申请实施例中的发送的步骤,发送单元可以为发送机、发送器、发送电路等。The communication unit may also be referred to as a transceiver unit. The antenna and control circuit with the transceiver function in the verification device 110 can be regarded as the communication unit 1102 of the verification device 110 , and the processor with the processing function can be regarded as the processing unit 1101 of the verification device 110 . Optionally, the device in the communication unit 1102 for implementing the receiving function may be regarded as a receiving unit, the receiving unit is used to perform the receiving steps in the embodiments of the present application, and the receiving unit may be a receiver, a receiver, a receiving circuit, or the like. The device in the communication unit 1102 for implementing the sending function may be regarded as a sending unit, the sending unit is used to perform the sending step in the embodiments of the present application, and the sending unit may be a transmitter, a transmitter, a sending circuit, or the like.
图11中的集成的单元如果以软件功能模块的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请实施例的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者接入网设备等)或处理器(processor)执行本申请各个实施例所述方法的全部或部分步骤。存储计算机软件产品的存储介质包括:U盘、移动硬盘、只读存储器、随机存取存储器、磁碟或者光盘等各种可以存储程序代码的介质。The integrated units in FIG. 11 can be stored in a computer-readable storage medium if implemented in the form of software functional modules and sold or used as independent products. Based on this understanding, the technical solutions of the embodiments of the present application can be embodied in the form of software products in essence, or the parts that contribute to the prior art, or all or part of the technical solutions, and the computer software products are stored in a storage The medium includes several instructions to cause a computer device (which may be a personal computer, a server, or an access network device, etc.) or a processor (processor) to execute all or part of the steps of the methods described in the various embodiments of the present application. Storage media for storing computer software products include: U disk, removable hard disk, read-only memory, random access memory, magnetic disk or optical disk and other media that can store program codes.
图11中的单元也可以称为模块,例如,处理单元可以称为处理模块。The units in FIG. 11 may also be referred to as modules, eg, a processing unit may be referred to as a processing module.
本申请实施例还提供了一种验证装置(记为验证装置120)的硬件结构示意图,参见图12或图13,该验证装置120包括处理器1201,可选的,还包括与处理器1201连接的存储器1202。This embodiment of the present application also provides a schematic diagram of the hardware structure of a verification apparatus (referred to as verification apparatus 120 ). Referring to FIG. 12 or FIG. 13 , the verification apparatus 120 includes a processor 1201 , and optionally, also includes a connection with the processor 1201 memory 1202.
处理器1201可以是一个通用中央处理器(central processing unit,简称CPU)、微处理器、特定应用集成电路(application-specific integrated circuit,简称ASIC),或者一个或多个用于控制本申请方案程序执行的集成电路。处理器1201也可以包括多个CPU,并且处理器1201可以是一个单核(single-CPU)处理器,也可以是多核(multi-CPU)处理器。这里的处理器可以指一个或多个设备、电路或用于处理数据(例如计算机程序指令)的处理核。The processor 1201 may be a general-purpose central processing unit (CPU for short), a microprocessor, an application-specific integrated circuit (ASIC for short), or one or more programs for controlling the solution of the present application implemented integrated circuits. The processor 1201 may also include multiple CPUs, and the processor 1201 may be a single-core (single-CPU) processor or a multi-core (multi-CPU) processor. A processor herein may refer to one or more devices, circuits, or processing cores for processing data (eg, computer program instructions).
存储器1202可以是ROM或可存储静态信息和指令的其他类型的静态存储设备、RAM或者可存储信息和指令的其他类型的动态存储设备,也可以是电可擦可编程只读存储器(electrically erasable programmable read-only memory,简称EEPROM)、只读光盘(compact disc read-only memory,简称CD-ROM)或其他光盘存储、光碟存储(包括压缩光碟、激光碟、光碟、数字通用光碟、蓝光光碟等)、磁盘存储介质或者其他磁存储设备、或者能够用于携带或存储具有指令或数据结构形式的期望的程序代码并能够由计算机存取的任何其他介质,本申请实施例对此不作任何限制。存储器1202可以是独立存在,也可以和处理器1201集成在一起。其中,存储器1202中可以包含计算机程序代码。处理器1201用于执行存储器1202中存储的计算机程序代码,从而实现本申请实施例提供的方法。The memory 1202 can be a ROM or other type of static storage device that can store static information and instructions, a RAM or other type of dynamic storage device that can store information and instructions, or an electrically erasable programmable read-only memory. read-only memory, referred to as EEPROM), compact disc read-only memory (referred to as CD-ROM) or other optical disk storage, optical disk storage (including compact disc, laser disc, optical disc, digital versatile disc, Blu-ray disc, etc.) , a magnetic disk storage medium or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer, which is not limited by the embodiments of the present application. The memory 1202 may exist independently, or may be integrated with the processor 1201 . Among them, the memory 1202 may contain computer program code. The processor 1201 is configured to execute the computer program codes stored in the memory 1202, so as to implement the methods provided by the embodiments of the present application.
在第一种可能的实现方式中,参见图12,验证装置120还包括收发器1203。处理器1201、存储器1202和收发器1203通过总线相连接。收发器1203用于与其他设备或通信网络通信。可选的,收发器1203可以包括发射机和接收机。收发器1203中用于实现接收功能的器件可以视为接收机,接收机用于执行本申请实施例中的接收的步骤。收发器1203中用于实现发送功能的器件可以视为发射机,发射机用于执行本申请实施例中的发送的步骤。In a first possible implementation manner, referring to FIG. 12 , the verification apparatus 120 further includes a transceiver 1203 . The processor 1201, the memory 1202 and the transceiver 1203 are connected by a bus. The transceiver 1203 is used to communicate with other devices or communication networks. Optionally, the transceiver 1203 may include a transmitter and a receiver. A device in the transceiver 1203 for implementing the receiving function may be regarded as a receiver, and the receiver is configured to perform the receiving steps in the embodiments of the present application. A device in the transceiver 1203 for implementing the sending function may be regarded as a transmitter, and the transmitter is used to perform the sending step in the embodiment of the present application.
基于第一种可能的实现方式,图12所示的结构示意图可以用于示意上述实施例中所涉及的接入网设备、第一节点或终端的结构。Based on the first possible implementation manner, the schematic structural diagram shown in FIG. 12 may be used to illustrate the structure of the access network device, the first node or the terminal involved in the foregoing embodiment.
当图12所示的结构示意图用于示意上述实施例中所涉及的终端的结构时,处理器1201用于对终端的动作进行控制管理,例如,处理器1201用于支持终端执行图3中的301、305、307和308,图4中的401、402、404、406和407,图5中的501、502、506、509和510,图6中的603,图7中的701、702、704和705,图8中的801、803、805和806,图9中的901、906和907,图10中的1001,1006和1007,和/或本申请实施例中所描述的其他过程中的终端执行的动作。处理器1201可以通过收发器1203与其他网络实体通信,例如,与图3中示出的第一节点通信。存储器1202用于存储终端的程序代码和数据。When the schematic structural diagram shown in FIG. 12 is used to illustrate the structure of the terminal involved in the above embodiment, the processor 1201 is used to control and manage the actions of the terminal. For example, the processor 1201 is used to support the terminal to execute the 301, 305, 307 and 308, 401, 402, 404, 406 and 407 in Fig. 4, 501, 502, 506, 509 and 510 in Fig. 5, 603 in Fig. 6, 701, 702, 704 and 705, 801, 803, 805, and 806 in FIG. 8, 901, 906, and 907 in FIG. 9, 1001, 1006, and 1007 in FIG. 10, and/or in other processes described in the embodiments of the present application The action performed by the terminal. The processor 1201 may communicate with other network entities through the transceiver 1203, eg, with the first node shown in FIG. 3 . The memory 1202 is used to store program codes and data of the terminal.
当图12所示的结构示意图用于示意上述实施例中所涉及的接入网设备的结构时,处理器1201用于对接入网设备的动作进行控制管理,例如,处理器1201用于支持接入网设备执行图3中的302-304、306,图4中的400-401,图5中的501、503-505、507,图6中的601-602,图7中的701,图8中的801-802,图9中的902-904和906,图10中的1002-1004和1006,和/或本申请实施例中所描述的其他过程中的接入网设备执行的动作。处理器1201可以通过收发器1203与其他网络实体通信,例如,与图3中示出的第一节点通信。存储器1202用于存储接入网设备的程序代码和数据。When the schematic structural diagram shown in FIG. 12 is used to illustrate the structure of the access network equipment involved in the above embodiment, the processor 1201 is used to control and manage the actions of the access network equipment, for example, the processor 1201 is used to support The access network equipment executes 302-304, 306 in Fig. 3, 400-401 in Fig. 4, 501, 503-505, 507 in Fig. 5, 601-602 in Fig. 6, 701 in Fig. 7, and Fig. 801-802 in FIG. 8, 902-904 and 906 in FIG. 9, 1002-1004 and 1006 in FIG. 10, and/or actions performed by the access network device in other processes described in the embodiments of this application. The processor 1201 may communicate with other network entities through the transceiver 1203, eg, with the first node shown in FIG. 3 . The memory 1202 is used to store program codes and data of the access network equipment.
当图12所示的结构示意图用于示意上述实施例中所涉及的第一节点的结构时,处理器1201用于对第一节点的动作进行控制管理,例如,处理器1201用于支持第一节点执行图3中的301-302、304-307,图4中的400、402-406,图5中的502-503、505-509,图6中的601-603,图7中的702-704,图8中的802-805,图9中的901-902、904-906,图10中的1001-1002、1004-1006,和/或本申请实施例中所描述的其他过程中的第一节点执行的动作。处理器1201可以通过收发器1203与其他网络实体通信,例如,与图3中示出的终端通信。存储器1202用于存储第一节点的程序代码和数据。When the schematic structural diagram shown in FIG. 12 is used to illustrate the structure of the first node involved in the above embodiment, the processor 1201 is used to control and manage the actions of the first node, for example, the processor 1201 is used to support the first node The node executes 301-302, 304-307 in Figure 3, 400, 402-406 in Figure 4, 502-503, 505-509 in Figure 5, 601-603 in Figure 6, and 702- in Figure 7 704, 802-805 in FIG. 8, 901-902, 904-906 in FIG. 9, 1001-1002, 1004-1006 in FIG. 10, and/or No. 1 in other processes described in the embodiments of the present application An action performed by a node. The processor 1201 may communicate with other network entities through the transceiver 1203, eg, with the terminal shown in FIG. 3 . The memory 1202 is used to store program codes and data of the first node.
在第二种可能的实现方式中,处理器1201包括逻辑电路以及输入接口和输出接口中的至少一个。其中,输出接口用于执行相应方法中的发送的动作,输入接口用于执行相应方法中的接收的动作。In a second possible implementation, the processor 1201 includes a logic circuit and at least one of an input interface and an output interface. Wherein, the output interface is used for executing the sending action in the corresponding method, and the input interface is used for executing the receiving action in the corresponding method.
基于第二种可能的实现方式,参见图13,图13所示的结构示意图可以用于示意上述实施例中所涉及的接入网设备、第一节点或终端的结构。Based on the second possible implementation manner, see FIG. 13 . The schematic structural diagram shown in FIG. 13 may be used to illustrate the structure of the access network device, the first node, or the terminal involved in the foregoing embodiment.
当图13所示的结构示意图用于示意上述实施例中所涉及的终端的结构时,处理器1201用于对终端的动作进行控制管理,例如,处理器1201用于支持终端执行图3中的301、305、307和308,图4中的401、402、404、406和407,图5中的501、502、506、509和510,图6中的603,图7中的701、702、704和705,图8中的801、803、805和806,图9中的901、906和907,图10中的1001,1006和1007,和/或本申请实施例中所描述的其他过程中的终端执行的动作。处理器1201可以通过输入接口和输出接口中的至少一个与其他网络实体通信,例如,与图3中示出的第一节点通信。存储器1202用于存储终端的程序代码和数据。When the schematic structural diagram shown in FIG. 13 is used to illustrate the structure of the terminal involved in the above embodiment, the processor 1201 is used to control and manage the actions of the terminal, for example, the processor 1201 is used to support the terminal to perform the 301, 305, 307 and 308, 401, 402, 404, 406 and 407 in Fig. 4, 501, 502, 506, 509 and 510 in Fig. 5, 603 in Fig. 6, 701, 702, 704 and 705, 801, 803, 805, and 806 in FIG. 8, 901, 906, and 907 in FIG. 9, 1001, 1006, and 1007 in FIG. 10, and/or in other processes described in the embodiments of the present application The action performed by the terminal. The processor 1201 may communicate with other network entities, eg, with the first node shown in FIG. 3 , through at least one of an input interface and an output interface. The memory 1202 is used to store program codes and data of the terminal.
当图13所示的结构示意图用于示意上述实施例中所涉及的接入网设备的结构时,处理器1201用于对接入网设备的动作进行控制管理,例如,处理器1201用于支持接入网设备执行图3中的302-304、306,图4中的400-401,图5中的501、503-505、507,图6中的601-602,图7中的701,图8中的801-802,图9中的902-904和906,图10中的1002-1004和1006,和/或本申请实施例中所描述的其他过程中的接入网设备执行的动作。处理器1201可以通过输入接口和输出接口中的至少一个与其他网络实体通信,例如,与图3中示出的第一节点通信。存储器1202用于存储接入网设备的程序代码和数据。When the schematic structural diagram shown in FIG. 13 is used to illustrate the structure of the access network equipment involved in the above embodiment, the processor 1201 is used to control and manage the actions of the access network equipment, for example, the processor 1201 is used to support The access network equipment executes 302-304, 306 in Fig. 3, 400-401 in Fig. 4, 501, 503-505, 507 in Fig. 5, 601-602 in Fig. 6, 701 in Fig. 7, and Fig. 801-802 in FIG. 8, 902-904 and 906 in FIG. 9, 1002-1004 and 1006 in FIG. 10, and/or actions performed by the access network device in other processes described in the embodiments of this application. The processor 1201 may communicate with other network entities, eg, with the first node shown in FIG. 3 , through at least one of an input interface and an output interface. The memory 1202 is used to store program codes and data of the access network equipment.
当图13所示的结构示意图用于示意上述实施例中所涉及的第一节点的结构时,处理器1201用于对第一节点的动作进行控制管理,例如,处理器1201用于支持第一节点执行图3中的301-302、304-307,图4中的400、402-406,图5中的502-503、505-509,图6中的601-603,图7中的702-704,图8中的802-805,图9中的901-902、904-906,图10中的1001-1002、1004-1006,和/或本申请实施例中所描述的其他过程中的第一节点执行的动作。处理器1201可以通过输入接口和输出接口中的至少一个与其他网络实体通信,例如,与图3中示出的终端通信。存储器1202用于存储第一节点的程序代码和数据。When the schematic structural diagram shown in FIG. 13 is used to illustrate the structure of the first node involved in the above embodiment, the processor 1201 is used to control and manage the actions of the first node, for example, the processor 1201 is used to support the first node The node executes 301-302, 304-307 in Figure 3, 400, 402-406 in Figure 4, 502-503, 505-509 in Figure 5, 601-603 in Figure 6, and 702- in Figure 7 704, 802-805 in FIG. 8, 901-902, 904-906 in FIG. 9, 1001-1002, 1004-1006 in FIG. 10, and/or No. 1 in other processes described in the embodiments of the present application An action performed by a node. The processor 1201 may communicate with other network entities, eg, with the terminal shown in FIG. 3 , through at least one of the input interface and the output interface. The memory 1202 is used to store program codes and data of the first node.
其中,图12和图13也可以示意接入网设备中的系统芯片。该情况下,上述接入网设备执行的动作可以由该系统芯片实现,具体所执行的动作可参见上文,在此不再赘述。图12和图13也可以示意终端中的系统芯片。该情况下,上述终端执行的动作可以由该系统芯片实现,具体所执行的动作可参见上文,在此不再赘述。图12和图13也可以示意第一节点中的系统芯片。该情况下,上述第一节点执行的动作可以由该系统芯片实现,具体所执行的动作可参见上文,在此不再赘述。12 and 13 may also illustrate a system chip in an access network device. In this case, the above-mentioned actions performed by the access network device may be implemented by the system chip, and the specific actions performed may refer to the above, which will not be repeated here. FIG. 12 and FIG. 13 may also illustrate a system chip in a terminal. In this case, the above-mentioned actions performed by the terminal may be implemented by the system chip, and the specific actions to be performed may refer to the above, which will not be repeated here. Figures 12 and 13 may also illustrate a system-on-chip in the first node. In this case, the above-mentioned actions performed by the first node may be implemented by the system chip, and the specific actions performed can refer to the above, which will not be repeated here.
另外,本申请实施例还提供了一种终端(记为终端140)和网络设备(记为网络设备150)的硬件结构示意图,具体可分别参见图14和图15。In addition, an embodiment of the present application also provides a schematic diagram of the hardware structure of a terminal (referred to as terminal 140 ) and a network device (referred to as network device 150 ). For details, please refer to FIG. 14 and FIG. 15 respectively.
图14为终端140的硬件结构示意图。为了便于说明,图14仅示出了终端的主要部件。如图14所示,终端140包括处理器、存储器、控制电路、天线以及输入输出装置。FIG. 14 is a schematic diagram of the hardware structure of the terminal 140 . For convenience of explanation, FIG. 14 only shows the main components of the terminal. As shown in FIG. 14 , the terminal 140 includes a processor, a memory, a control circuit, an antenna, and an input and output device.
处理器主要用于对通信协议以及通信数据进行处理,以及对整个终端进行控制,执行软件程序,处理软件程序的数据,例如,用于控制终端执行图3中的301、305、307和308,图4中的401、402、404、406和407,图5中的501、502、506、509和510,图6中的603,图7中的701、702、704和705,图8中的801、803、805和806,图9中的901、906和907,图10中的1001,1006和1007,和/或本申请实施例中所描述的其他过程中的终端执行的动作。存储器主要用于存储软件程序和数据。控制电路(也可以称为射频电路)主要用于基带信号与射频信号的转换以及对射频信号的处理。控制电路和天线一起也可以叫做收发器,主要用于收发电磁波形式的射频信号。输入输出装置,例如触摸屏、显示屏,键盘等主要用于接收用户输入的数据以及对用户输出数据。The processor is mainly used to process communication protocols and communication data, and to control the entire terminal, execute software programs, and process data of software programs, for example, to control the terminal to execute 301, 305, 307, and 308 in FIG. 401, 402, 404, 406 and 407 in Fig. 4, 501, 502, 506, 509 and 510 in Fig. 5, 603 in Fig. 6, 701, 702, 704 and 705 in Fig. 7, 801, 803, 805, and 806, 901, 906, and 907 in FIG. 9, 1001, 1006, and 1007 in FIG. 10, and/or actions performed by the terminal in other processes described in the embodiments of this application. The memory is mainly used to store software programs and data. The control circuit (also referred to as a radio frequency circuit) is mainly used for the conversion of the baseband signal and the radio frequency signal and the processing of the radio frequency signal. The control circuit together with the antenna can also be called a transceiver, which is mainly used to send and receive radio frequency signals in the form of electromagnetic waves. Input and output devices, such as touch screens, display screens, and keyboards, are mainly used to receive data input by users and output data to users.
当终端开机后,处理器可以读取存储器中的软件程序,解释并执行软件程序的指令,处理软件程序的数据。当需要通过天线发送数据时,处理器对待发送的数据进行基带处理后,输出基带信号至控制电路中的控制电路,控制电路将基带信号进行射频处理后将射频信号通过天线以电磁波的形式向外发送。当有数据发送到终端时,控制电路通过天线接收到射频信号,将射频信号转换为基带信号,并将基带信号输出至处理器,处理器将基带信号转换为数据并对该数据进行处理。When the terminal is powered on, the processor can read the software program in the memory, interpret and execute the instructions of the software program, and process the data of the software program. When it is necessary to send data through the antenna, the processor performs baseband processing on the data to be sent, and outputs the baseband signal to the control circuit in the control circuit. The control circuit performs radio frequency processing on the baseband signal and sends the radio frequency signal through the antenna in the form of electromagnetic waves. send. When data is sent to the terminal, the control circuit receives the radio frequency signal through the antenna, converts the radio frequency signal into a baseband signal, and outputs the baseband signal to the processor, which converts the baseband signal into data and processes the data.
本领域技术人员可以理解,为了便于说明,图14仅示出了一个存储器和处理器。在实际的终端中,可以存在多个处理器和存储器。存储器也可以称为存储介质或者存储设备等,本申请实施例对此不做限制。Those skilled in the art can understand that, for the convenience of description, FIG. 14 only shows one memory and one processor. In an actual terminal, there may be multiple processors and memories. The memory may also be referred to as a storage medium or a storage device, etc., which is not limited in this embodiment of the present application.
作为一种可选的实现方式,处理器可以包括基带处理器和中央处理器,基带处理器主要用于对通信协议以及通信数据进行处理,中央处理器主要用于对整个终端进行控制,执行软件程序,处理软件程序的数据。图14中的处理器集成了基带处理器和中央处理器的功能,本领域技术人员可以理解,基带处理器和中央处理器也可以是各自独立的处理器,通过总线等技术互联。本领域技术人员可以理解,终端可以包括多个基带处理器以适应不同的网络制式,终端可以包括多个中央处理器以增强其处理能力,终端的各个部件可以通过各种总线连接。该基带处理器也可以表述为基带处理电路或者基带处理芯片。该中央处理器也可以表述为中央处理电路或者中央处理芯片。对通信协议以及通信数据进行处理的功能可以内置在处理器中,也可以以软件程序的形式存储在存储器中,由处理器执行软件程序以实现基带处理功能。As an optional implementation, the processor may include a baseband processor and a central processing unit. The baseband processor is mainly used to process communication protocols and communication data, and the central processing unit is mainly used to control the entire terminal and execute software. Programs that process data from software programs. The processor in FIG. 14 integrates the functions of the baseband processor and the central processing unit. Those skilled in the art can understand that the baseband processor and the central processing unit may also be independent processors, interconnected by technologies such as a bus. Those skilled in the art can understand that a terminal may include multiple baseband processors to adapt to different network standards, a terminal may include multiple central processors to enhance its processing capability, and various components of the terminal may be connected through various buses. The baseband processor can also be expressed as a baseband processing circuit or a baseband processing chip. The central processing unit can also be expressed as a central processing circuit or a central processing chip. The function of processing the communication protocol and communication data may be built in the processor, or may be stored in the memory in the form of a software program, and the processor executes the software program to realize the baseband processing function.
图15为网络设备150的硬件结构示意图。网络设备150可以为上述接入网设备或第一节点。网络设备150可包括一个或多个射频单元,如远端射频单元(remote radio unit,简称RRU)1501和一个或多个基带单元(basebandunit,简称BBU)(也可称为数字单元(digitalunit,简称DU))1502。FIG. 15 is a schematic diagram of the hardware structure of the
该RRU1501可以称为收发单元、收发机、收发电路、或者收发器等等,其可以包括至少一个天线1511和射频单元1512。该RRU1501部分主要用于射频信号的收发以及射频信号与基带信号的转换。该RRU1501与BBU1502可以是物理上设置在一起,也可以物理上分离设置的,例如,分布式基站。The
该BBU1502为网络设备的控制中心,也可以称为处理单元,主要用于完成基带处理功能,如信道编码,复用,调制,扩频等等。The BBU1502 is the control center of the network equipment, which can also be called a processing unit, and is mainly used to complete baseband processing functions, such as channel coding, multiplexing, modulation, spread spectrum, and so on.
在一个实施例中,该BBU1502可以由一个或多个单板构成,多个单板可以共同支持单一接入制式的无线接入网(如LTE网络),也可以分别支持不同接入制式的无线接入网(如LTE网,5G网或其它网)。该BBU1502还包括存储器1521和处理器1522,该存储器1521用于存储必要的指令和数据。该处理器1522用于控制网络设备进行必要的动作。该存储器1521和处理器1522可以服务于一个或多个单板。也就是说,可以每个单板上单独设置存储器和处理器。也可以是多个单板共用相同的存储器和处理器。此外每个单板上还可以设置有必要的电路。In one embodiment, the
应理解,当网络设备150为上述实施例中的接入网设备时,网络设备150能够执行图3中的302-304、306,图4中的400-401,图5中的501、503-505、507,图6中的601-602,图7中的701,图8中的801-802,图9中的902-904和906,图10中的1002-1004和1006,和/或本申请实施例中所描述的其他过程中的接入网设备执行的动作。当网络设备150为上述实施例中的第一节点时,网络设备150能够执行图3中的301-302、304-307,图4中的400、402-406,图5中的502-503、505-509,图6中的601-603,图7中的702-704,图8中的802-805,图9中的901-902、904-906,图10中的1001-1002、1004-1006,和/或本申请实施例中所描述的其他过程中的第一节点执行的动作。网络设备150中的各个模块的操作,功能,或者,操作和功能,分别设置为实现上述方法实施例中的相应流程。具体可参见上述方法实施例中的描述,为避免重复,此处适当省略详述描述。It should be understood that when the
在实现过程中,本实施例提供的方法中的各步骤可以通过处理器中的硬件的集成逻辑电路或者软件形式的指令完成。结合本申请实施例所公开的方法的步骤可以直接体现为硬件处理器执行完成,或者用处理器中的硬件及软件模块组合执行完成。图14和图15中的关于处理器的其他描述可参见图12和图13中的与处理器相关的描述,不再赘述。In the implementation process, each step in the method provided in this embodiment may be completed by an integrated logic circuit of hardware in a processor or an instruction in the form of software. The steps of the method disclosed in conjunction with the embodiments of the present application may be directly embodied as executed by a hardware processor, or executed by a combination of hardware and software modules in the processor. For other descriptions about the processor in FIG. 14 and FIG. 15, reference may be made to the description about the processor in FIG. 12 and FIG. 13, and details are not repeated here.
本申请实施例还提供了一种计算机可读存储介质,包括指令,当其在计算机上运行时,使得计算机执行上述任一方法。Embodiments of the present application further provide a computer-readable storage medium, including instructions, which, when executed on a computer, cause the computer to execute any of the foregoing methods.
本申请实施例还提供了一种包含指令的计算机程序产品,当其在计算机上运行时,使得计算机执行上述任一方法。Embodiments of the present application also provide a computer program product containing instructions, which, when run on a computer, enables the computer to execute any of the above methods.
本申请实施例还提供了一种通信系统,包括:第一节点和终端。可选的,还包括接入网设备。The embodiment of the present application also provides a communication system, including: a first node and a terminal. Optionally, it also includes access network equipment.
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件程序实现时,可以全部或部分地以计算机程序产品的形式来实现。该计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行计算机程序指令时,全部或部分地产生按照本申请实施例所述的流程或功能。计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,计算机指令可以从一个网站站点、计算机、服务器或者数据中心通过有线(例如同轴电缆、光纤、数字用户线(digital subscriber line,简称DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可以用介质集成的服务器、数据中心等数据存储设备。可用介质可以是磁性介质(例如,软盘、硬盘、磁带),光介质(例如,DVD)、或者半导体介质(例如固态硬盘(solid state disk,简称SSD))等。In the above-mentioned embodiments, it may be implemented in whole or in part by software, hardware, firmware or any combination thereof. When implemented using a software program, it can be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on the computer, all or part of the processes or functions described in the embodiments of the present application are generated. The computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable device. Computer instructions may be stored in or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transmitted from a website site, computer, server, or data center over a wire (e.g. Coaxial cable, optical fiber, digital subscriber line (DSL for short)) or wireless (such as infrared, wireless, microwave, etc.) means to transmit to another website site, computer, server or data center. Computer-readable storage media can be any available media that can be accessed by a computer or data storage devices including one or more servers, data centers, etc., that can be integrated with the media. Useful media may be magnetic media (eg, floppy disks, hard disks, magnetic tapes), optical media (eg, DVD), or semiconductor media (eg, solid state disk (SSD) for short), and the like.
尽管在此结合各实施例对本申请进行了描述,然而,在实施所要求保护的本申请过程中,本领域技术人员通过查看附图、公开内容、以及所附权利要求书,可理解并实现公开实施例的其他变化。在权利要求中,“包括”(comprising)一词不排除其他组成部分或步骤,“一”或“一个”不排除多个的情况。单个处理器或其他单元可以实现权利要求中列举的若干项功能。相互不同的从属权利要求中记载了某些措施,但这并不表示这些措施不能组合起来产生良好的效果。Although the application is described herein in conjunction with various embodiments, in practicing the claimed application, those skilled in the art can understand and implement the disclosure by reviewing the drawings, the disclosure, and the appended claims Other variations of the embodiment. In the claims, the word "comprising" does not exclude other components or steps, and "a" or "an" does not exclude a plurality. A single processor or other unit may fulfill the functions of several items recited in the claims. The mere fact that certain measures are recited in mutually different dependent claims does not indicate that these measures cannot be combined to advantage.
尽管结合具体特征及其实施例对本申请进行了描述,显而易见的,在不脱离本申请的精神和范围的情况下,可对其进行各种修改和组合。相应地,本说明书和附图仅仅是所附权利要求所界定的本申请的示例性说明,且视为已覆盖本申请范围内的任意和所有修改、变化、组合或等同物。显然,本领域的技术人员可以对本申请进行各种改动和变型而不脱离本申请的精神和范围。这样,倘若本申请的这些修改和变型属于本申请权利要求及其等同技术的范围之内,则本申请也意图包含这些改动和变型在内。Although the application has been described in conjunction with specific features and embodiments thereof, it will be apparent that various modifications and combinations can be made therein without departing from the spirit and scope of the application. Accordingly, this specification and drawings are merely exemplary illustrations of the application as defined by the appended claims, and are deemed to cover any and all modifications, variations, combinations or equivalents within the scope of this application. Obviously, those skilled in the art can make various changes and modifications to the present application without departing from the spirit and scope of the present application. Thus, if these modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is also intended to include these modifications and variations.
Claims (18)
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910472664.0A CN112019489B (en) | 2019-05-31 | 2019-05-31 | Verification method and device |
PCT/CN2020/092605 WO2020238957A1 (en) | 2019-05-31 | 2020-05-27 | Verification method and apparatus |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910472664.0A CN112019489B (en) | 2019-05-31 | 2019-05-31 | Verification method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112019489A true CN112019489A (en) | 2020-12-01 |
CN112019489B CN112019489B (en) | 2022-03-04 |
Family
ID=73506233
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910472664.0A Active CN112019489B (en) | 2019-05-31 | 2019-05-31 | Verification method and device |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN112019489B (en) |
WO (1) | WO2020238957A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115643557A (en) * | 2022-12-26 | 2023-01-24 | 深圳市鑫宇鹏电子科技有限公司 | Toy equipment team communication method and device |
WO2023205978A1 (en) * | 2022-04-24 | 2023-11-02 | 北京小米移动软件有限公司 | Key generation method and apparatus for proximity-based service, and device and storage medium |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP4413692A1 (en) * | 2021-10-04 | 2024-08-14 | Qualcomm Incorporated | Techniques for on-demand secret key requesting and sharing |
Citations (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
ES2139925T3 (en) * | 1994-08-17 | 2000-02-16 | British Telecomm | AUTHENTICATION OF USERS IN A COMMUNICATION NETWORK. |
CN102625306A (en) * | 2011-01-31 | 2012-08-01 | 电信科学技术研究院 | Method, system and equipment for authentication |
CN102711105A (en) * | 2012-05-18 | 2012-10-03 | 华为技术有限公司 | Method, device and system for communication through mobile communication network |
CN103415010A (en) * | 2013-07-18 | 2013-11-27 | 中国联合网络通信集团有限公司 | D2D network authentication method and system |
WO2014056449A1 (en) * | 2012-10-12 | 2014-04-17 | 中兴通讯股份有限公司 | Method, device, and system for management and verification of device-to-device communication |
CN103825733A (en) * | 2014-02-28 | 2014-05-28 | 华为技术有限公司 | Communication method, device and system based on combined public key cryptography system |
US20140162601A1 (en) * | 2012-12-12 | 2014-06-12 | Sanghoon Kim | Ephemeral identity for device and service discovery |
CN104902443A (en) * | 2014-03-05 | 2015-09-09 | 华为终端有限公司 | Communication method and equipment |
CN104902469A (en) * | 2015-04-17 | 2015-09-09 | 国家电网公司 | Secure communication method facing wireless communication network of power transmission lines |
CN105873039A (en) * | 2015-01-19 | 2016-08-17 | 普天信息技术有限公司 | MANET session key generating method and user equipment |
CN106162618A (en) * | 2015-04-23 | 2016-11-23 | 中兴通讯股份有限公司 | Authentication method, device and the system of a kind of D2D business multicast |
CN106465102A (en) * | 2014-05-12 | 2017-02-22 | 诺基亚技术有限公司 | Method, network element, user equipment and system for securing device-to-device communication in a wireless network |
CN106470420A (en) * | 2015-08-17 | 2017-03-01 | 中兴通讯股份有限公司 | Method for processing business and device |
CN108400964A (en) * | 2017-12-26 | 2018-08-14 | 聚光科技(杭州)股份有限公司 | Equipment room encryption connection method |
CN109428875A (en) * | 2017-08-31 | 2019-03-05 | 华为技术有限公司 | Discovery method and device based on serviceization framework |
CN109756336A (en) * | 2017-11-03 | 2019-05-14 | 中国移动通信有限公司研究院 | An authentication method, V2X computing system and V2X computing node |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101835152A (en) * | 2010-04-16 | 2010-09-15 | 中兴通讯股份有限公司 | Method and system for establishing reinforced secret key when terminal moves to reinforced UTRAN (Universal Terrestrial Radio Access Network) |
CN105635168B (en) * | 2016-01-25 | 2019-01-22 | 恒宝股份有限公司 | A kind of application method of offline transaction device and its security key |
WO2018004600A1 (en) * | 2016-06-30 | 2018-01-04 | Sophos Limited | Proactive network security using a health heartbeat |
US10694382B2 (en) * | 2017-06-27 | 2020-06-23 | Here Global B.V. | Authentication of satellite navigation system receiver |
-
2019
- 2019-05-31 CN CN201910472664.0A patent/CN112019489B/en active Active
-
2020
- 2020-05-27 WO PCT/CN2020/092605 patent/WO2020238957A1/en active Application Filing
Patent Citations (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
ES2139925T3 (en) * | 1994-08-17 | 2000-02-16 | British Telecomm | AUTHENTICATION OF USERS IN A COMMUNICATION NETWORK. |
CN102625306A (en) * | 2011-01-31 | 2012-08-01 | 电信科学技术研究院 | Method, system and equipment for authentication |
CN102711105A (en) * | 2012-05-18 | 2012-10-03 | 华为技术有限公司 | Method, device and system for communication through mobile communication network |
WO2014056449A1 (en) * | 2012-10-12 | 2014-04-17 | 中兴通讯股份有限公司 | Method, device, and system for management and verification of device-to-device communication |
US20140162601A1 (en) * | 2012-12-12 | 2014-06-12 | Sanghoon Kim | Ephemeral identity for device and service discovery |
CN103415010A (en) * | 2013-07-18 | 2013-11-27 | 中国联合网络通信集团有限公司 | D2D network authentication method and system |
CN103825733A (en) * | 2014-02-28 | 2014-05-28 | 华为技术有限公司 | Communication method, device and system based on combined public key cryptography system |
CN104902443A (en) * | 2014-03-05 | 2015-09-09 | 华为终端有限公司 | Communication method and equipment |
CN106465102A (en) * | 2014-05-12 | 2017-02-22 | 诺基亚技术有限公司 | Method, network element, user equipment and system for securing device-to-device communication in a wireless network |
CN105873039A (en) * | 2015-01-19 | 2016-08-17 | 普天信息技术有限公司 | MANET session key generating method and user equipment |
CN104902469A (en) * | 2015-04-17 | 2015-09-09 | 国家电网公司 | Secure communication method facing wireless communication network of power transmission lines |
CN106162618A (en) * | 2015-04-23 | 2016-11-23 | 中兴通讯股份有限公司 | Authentication method, device and the system of a kind of D2D business multicast |
CN106470420A (en) * | 2015-08-17 | 2017-03-01 | 中兴通讯股份有限公司 | Method for processing business and device |
CN109428875A (en) * | 2017-08-31 | 2019-03-05 | 华为技术有限公司 | Discovery method and device based on serviceization framework |
CN109756336A (en) * | 2017-11-03 | 2019-05-14 | 中国移动通信有限公司研究院 | An authentication method, V2X computing system and V2X computing node |
CN108400964A (en) * | 2017-12-26 | 2018-08-14 | 聚光科技(杭州)股份有限公司 | Equipment room encryption connection method |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2023205978A1 (en) * | 2022-04-24 | 2023-11-02 | 北京小米移动软件有限公司 | Key generation method and apparatus for proximity-based service, and device and storage medium |
CN115643557A (en) * | 2022-12-26 | 2023-01-24 | 深圳市鑫宇鹏电子科技有限公司 | Toy equipment team communication method and device |
CN115643557B (en) * | 2022-12-26 | 2023-04-18 | 深圳市鑫宇鹏电子科技有限公司 | Toy equipment team communication method and system |
Also Published As
Publication number | Publication date |
---|---|
CN112019489B (en) | 2022-03-04 |
WO2020238957A1 (en) | 2020-12-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109600804B (en) | A security protection method, device and system | |
CN113133085B (en) | Method and communication device for establishing connection and acquiring relay service code | |
JP7503557B2 (en) | Procedures for enabling V2X unicast communication over PC5 interface | |
JP2019525506A (en) | Registration method, session establishment method, terminal, and AMF entity | |
JP2024528432A (en) | Internet of Things Network Discovery | |
US9794836B2 (en) | Methods and apparatus for differencitating security configurations in a radio local area network | |
US20170244705A1 (en) | Method of using converged core network service, universal control entity, and converged core network system | |
CN110557846B (en) | Data transmission method, terminal equipment and network equipment | |
EP3761751A1 (en) | Relay selection in cellular sliced networks | |
CN111869261A (en) | Discovery and Security in LWA Communications | |
CN104885552A (en) | Method and apparatus for device-to-device communication | |
CN116723507B (en) | Terminal security method and device for edge network | |
EP3849103A1 (en) | Relay selection in cellular sliced networks | |
CN112019489B (en) | Verification method and device | |
US11089167B2 (en) | Apparatus, system and method of internet connectivity via a relay station | |
US9960922B2 (en) | Device-to-device communication security with authentication certificates | |
US10439989B2 (en) | Device and method of handling cellular network and wireless local area network radio level integration with internet protocol security tunnel | |
CN114503649B (en) | Communication method and communication device | |
WO2023020481A1 (en) | Method for transmitting data and apparatus | |
CN115552928B (en) | Network selection method and device | |
CN113556703B (en) | Wireless communication method and communication device | |
CN110913507B (en) | Communication method and device | |
US11032856B2 (en) | Data transmission method and apparatus | |
WO2023213191A1 (en) | Security protection method and communication apparatus | |
WO2023143022A1 (en) | Method and apparatus for data processing in random access process |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |