WO2025054983A1 - Communication method, apparatus and storage medium - Google Patents
Communication method, apparatus and storage medium Download PDFInfo
- Publication number
- WO2025054983A1 WO2025054983A1 PCT/CN2023/119183 CN2023119183W WO2025054983A1 WO 2025054983 A1 WO2025054983 A1 WO 2025054983A1 CN 2023119183 W CN2023119183 W CN 2023119183W WO 2025054983 A1 WO2025054983 A1 WO 2025054983A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- information
- network device
- terminal
- message
- service
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/50—Service provisioning or reconfiguring
Definitions
- the present disclosure relates to the field of communication technology, and in particular to a communication method, device and storage medium.
- the Relay Service Code can be used to identify the connection service between a terminal-to-network (UE to Network, U2N) relay device or a terminal-to-terminal (UE to UE, U2U) relay device and an authorized remote device or end device that the relay device can provide service.
- UE to Network U2N
- UE to UE, U2U terminal-to-terminal
- the present disclosure provides a communication method, a device and a storage medium.
- a communication method is proposed, which is executed by a first network device, and the first network device corresponds to a first terminal.
- the method includes: obtaining first information determined by a third network device, the first information is used for proximity service security, and the first information corresponds to a first service; sending the first information to the first terminal and/or the second network device, and the second network device corresponds to the second terminal.
- the first network device obtains the first information determined by the third network device and sends the first information to the first terminal and/or the second network device. Based on the uniqueness of the first information determined by the third network device, the RSC for the same service generates unique first information.
- a communication method is proposed.
- the method is executed by a third network device, and the method includes: determining first information, the first information is used for proximity service security, and the first information corresponds to a first service.
- the third network device determines the unique corresponding first information based on the first service identifier, thereby realizing generation of unique first information for the RSC of the same service.
- a communication method is proposed, which is executed by a second network device.
- the method includes: receiving first information sent by a first network device, the first information is used for proximity service security, the first information corresponds to a first service, and the first network device corresponds to a first terminal.
- the second network device receives the first information from the first network device, and the second network device can send the first information to the second terminal, thereby obtaining the first information. Since the first information determined by the third network device is unique, the RSC for the same service can generate unique first information.
- a first network device comprising a transceiver module, used to: obtain first information determined by a third network device, the first information being used for proximity service discovery security, the first information corresponding to a first service; and send the first information to a first terminal and/or a second network device, the second network device corresponding to a second terminal.
- a third network device comprising a processing module, configured to: determine first information, wherein the first information is used for proximity service discovery security, and the first information corresponds to a first service.
- a second network device comprising a transceiver module, for: receiving first information sent by a first network device, the first information being used for proximity service discovery security, the first information corresponding to a first service, and the first network device corresponding to a first terminal.
- a communication device which includes: a transceiver; a memory; a processor, which is connected to the transceiver and the memory respectively, and is configured to control the wireless signal reception and transmission of the transceiver by executing computer-executable instructions on the memory, and can execute the communication method of any one of the first aspect, the second aspect, and the third aspect.
- a storage medium stores an instruction.
- the instruction When the instruction is in a communication device, When the communication device is run on the communication device, it enables the communication device to execute the communication method of any one of the first aspect, the second aspect, and the third aspect.
- a communication system comprising a first network device, a third network device, and a second network device, wherein the first network device is configured to implement the method of the first aspect, the third network device is configured to implement the method of the second aspect, and the second network device is configured to implement the method of the third aspect.
- FIG1 is a schematic diagram of the architecture of some communication systems provided by embodiments of the present disclosure.
- 2a-2b are interactive schematic diagrams of a communication method provided by an embodiment of the present disclosure
- 3a-3c are flowchart diagrams of some communication methods provided by embodiments of the present disclosure.
- FIG6 is a schematic diagram of interaction of other communication methods provided by embodiments of the present disclosure.
- FIG7a is a schematic diagram of the structure of a first network device provided by an embodiment of the present disclosure.
- FIG7b is a schematic diagram of the structure of a third network device provided by an embodiment of the present disclosure.
- FIG7c is a schematic diagram of the structure of a second network device provided by an embodiment of the present disclosure.
- FIG8a is a schematic diagram of the structure of a communication device provided by an embodiment of the present disclosure.
- FIG8b is a schematic diagram of the structure of a chip provided by an embodiment of the present disclosure.
- the method disclosed in the present invention can be used to realize generation of unique discovery security information for the same service identifier, thereby avoiding the problem of terminal selection confusion when multiple sets of discovery security information are generated for the same service identifier.
- the embodiments of the present disclosure provide a communication method, a device, and a storage medium.
- an embodiment of the present disclosure proposes a communication method, which is executed by a first network device, and the method includes: obtaining first information determined by a third network device, the first information is used for proximity service security, and the first information corresponds to a first service; sending the first information to a first terminal and/or a second network device, and the second network device corresponds to a second terminal.
- the first network device obtains the first information, wherein the first information is determined by the third network device. Since the first information corresponds to the first service, the first information determined by the third network device is unique. After the first network device obtains the first information, it can provide it to the first terminal and/or the second network device, so that the first terminal can use the unique first information to perform security protection, security verification and other operations, thereby avoiding operational confusion in the terminal.
- the method also includes: obtaining first information determined by the third network device includes any one of the following: obtaining preconfigured first information, the first information is determined by the third network device; or; receiving first information sent by the third network device.
- the first network device can use two different methods to obtain the first information, wherein the first information obtained by the two acquisition methods is determined by the third network device and is unique, so that the first terminal can use the unique first information to perform security protection, security verification and other operations, which can avoid operational confusion in the terminal.
- the third network device can provide the first information to the first network device in a pre-configured manner, or send the first information to the first network device in a manner such as signaling, which improves flexibility and expands the application boundary.
- the method further includes: receiving a first message sent by a first terminal, where the first message is used to request first information, and the first message carries an identifier of a first service.
- the first network device receives the first message sent by the first terminal, and the first message carries the identifier of the first service, so that the first network device can respond to the request of the first terminal and obtain the unique first information corresponding to the first service identifier.
- the first network device can only obtain the first information corresponding to the first service requested by the first terminal, avoiding information redundancy and improving communication efficiency.
- the method further includes: based on the identifier of the first service, determining that first information corresponding to the identifier of the first service is stored in the first network device.
- the first network device can determine whether the corresponding first information is stored locally based on the identifier of the first service, so as to confirm the storage status of the first information by the first network device and perform different processing for different situations.
- the first network device can avoid the first network device repeatedly requesting the first information of the same service from the third network device, causing confusion in the use of the first information on the terminal side.
- the stored first information can be provided to the terminal without requesting it from the third network device.
- the method further includes: determining that first information corresponding to an identifier of the first service is not stored in the first network device; and sending a second message to a third network device, the second message being used to request the first information.
- the first network device when it does not store the first information corresponding to the first service identifier, it can send a request message to the third network device to request the corresponding first information, and obtain the unique first information by interacting with the third network device to make the request.
- receiving the first information sent by the third network device includes: receiving a third message sent by the third network device, wherein the third message carries the first information.
- the third message also carries a timer corresponding to the first information, and the timer is used to determine whether the first information is expired.
- the first network device can receive a third message sent by a third network device, and the third message carries the first information and a timer corresponding to the first information, wherein the first information is determined by the third network device and is unique, so that the first terminal can use the unique first information to perform security protection, security verification and other operations to avoid operational confusion of the terminal; the timer information can be used to reflect the timeliness information of the first information, so that the first network device can determine the timeliness of the first information based on the timer information.
- the method further includes: determining that the first information stored in the first network device is expired; and sending a fourth message to the third network device, the fourth message being used to request an update of the first information.
- a fourth message can be sent to the third network device, and the fourth message is used to request to update the first information, so as to realize the update of the first information.
- the third network device can update the first information based on the fourth message to improve the communication stability.
- the first network device has the ability to determine whether the first information is expired.
- receiving first information sent by a third network device includes: receiving updated first information sent by the third network device in a first situation, wherein the first situation is that the third network device determines that the first information stored in the third network device is expired.
- the first network device can obtain the first information updated by the third network device, and can update the first information locally stored by the first network device, so as to provide the updated first information to the first terminal and the second network device.
- the third network device has the ability to determine whether the first information is expired, and the first network device does not need to request the third network device to update the first information after determination, thus saving signaling consumption.
- the first network device obtains the first information determined by the third network device and sends the first information to the first terminal and/or the second network device. This can achieve the goal that even when there are multiple first network devices, the generated first information is the same, thereby facilitating the system to use security information to perform security protection, security verification and other operations.
- an embodiment of the present disclosure proposes a communication method, which is executed by a third network device.
- the method includes: determining first information, where the first information is used for proximity service security and corresponds to a first service.
- the third network device can determine the corresponding first information based on the identifier of the first service.
- the first information generated by the third network device is unique.
- the first terminal can use the unique first information to perform security protection, security verification and other operations, thereby avoiding operational confusion in the terminal.
- the method further includes: receiving a second message sent by the first network device, where the second message is used to request the first information.
- the third network device may determine the first information corresponding to the first service identifier based on the received second message, and may generate the first information based on the response of the first network device.
- the method further includes: sending first information to a first network device, the first network device corresponding to the first terminal.
- the first information is carried by a third message.
- the third network device may send a third message to the first network device.
- the third message carries the first information, and can provide the first information corresponding to the first service identifier to the first network device, so that the first network device can store it.
- the third message also carries a timer corresponding to the first information, and the timer is used to determine whether the first information is expired.
- the third message also carries a timer corresponding to the first information.
- the timer information can reflect the timeliness information of the first information, so that the first network device can determine the timeliness of the first information.
- sending the first information to the first network device includes: determining that the first information stored in the third network device is expired; and sending updated first information to the first network device.
- the third network device when the third network device determines that the locally stored first information is expired, it can update the first information and provide the updated first information to the first network device, so that the first network device can update the stored first information.
- the third network device has the ability to determine whether the first information is expired, and the first network device does not need to request the third network device to update the first information after determination, thus saving signaling consumption.
- the first information is preconfigured into the first network device.
- the first information can be stored in the first network device through a preconfiguration method, and the first information is determined by the third network device, so that the first network device can obtain the first information through a preconfiguration method.
- the third network device can provide the first information to the first network device through a preconfiguration method, or send the first information to the first network device through a signaling method, which improves flexibility and expands the application boundary.
- the third network device can determine the unique first information corresponding to the identifier of the first service by determining the first information, and can achieve that even when there are multiple first network devices, the generated first information is the same, which facilitates the system to use security information to perform security protection, security verification and other operations.
- an embodiment of the present disclosure proposes a communication method, which is executed by a second network device, and the second network device corresponds to a second terminal.
- the method includes: receiving first information sent by a first network device, the first information is used for proximity service security, the first information corresponds to a first service, and the first network device corresponds to a first terminal.
- the second network device can receive the first information sent by the first network device, and can obtain the first information corresponding to the first service identifier.
- the method further includes: sending first information to the second terminal, wherein the first information is used for the second terminal to select and use the first information for security protection.
- the second network device may send the first information to the second terminal, so that the second terminal can use the first information to perform security protection, security verification and other operations.
- the second network device receives the first information sent by the first network device and sends the first information to the second terminal. Since the first information is confirmed by the third network device, it is unique. Even if there are multiple first network devices, the generated first information is the same, which facilitates the system to use security information to perform security protection, security verification and other operations.
- an embodiment of the present disclosure proposes a first network device, including a transceiver module, for obtaining first information determined by a third network device, the first information being used for proximity service discovery security, and the first information corresponding to a first service; and sending the first information to a first terminal and/or a second network device, the second network device corresponding to a second terminal.
- an embodiment of the present disclosure proposes a third network device, including a processing module, for determining first information, where the first information is used for proximity service discovery security, and the first information corresponds to a first service.
- an embodiment of the present disclosure proposes a second network device, comprising a transceiver module, for: receiving first information sent by a first network device, the first information being used for proximity service discovery security, the first information corresponding to a first service, and the first network device corresponding to a first terminal.
- an embodiment of the present disclosure proposes a communication device, which includes: a transceiver; a memory; a processor, which is connected to the transceiver and the memory respectively, and is configured to control the wireless signal reception and transmission of the transceiver by executing computer-executable instructions on the memory, and can execute the communication method described in the first aspect, the second aspect and the third aspect, and the optional implementation methods of the first aspect, the second aspect and the third aspect.
- an embodiment of the present disclosure proposes a storage medium, wherein the computer storage medium stores computer executable instructions; after the computer executable instructions are executed by a processor, the method described in the first aspect, the optional implementation of the first aspect, the second aspect, the optional implementation of the second aspect, the third aspect, and the optional implementation of the third aspect can be executed.
- an embodiment of the present disclosure proposes a communication system, which includes: a first network device, a third network device, and a second network device; wherein the first network device is configured to execute the method described in the first aspect and the optional implementation of the first aspect, the third network device is configured to execute the method described in the second aspect and the optional implementation of the second aspect, and the second network device is configured to execute the method described in the third aspect and the optional implementation of the third aspect.
- the first network device, the second network device, the third network device, the communication device, the communication system, and the storage medium are all It is used to execute the method proposed in the embodiment of the present disclosure. Therefore, the beneficial effects that can be achieved can refer to the beneficial effects in the corresponding method, which will not be repeated here.
- the embodiments of the present disclosure provide a communication method, an apparatus, and a storage medium.
- the terms communication method, information processing method, communication method, etc. can be interchangeable, the terms apparatus, terminal, network device, communication device, etc. can be interchangeable, and the terms information processing system, communication system, etc. can be interchangeable.
- each step in a certain embodiment can be implemented as an independent embodiment, and the steps can be arbitrarily combined.
- a solution after removing some steps in a certain embodiment can also be implemented as an independent embodiment, and the order of the steps in a certain embodiment can be arbitrarily exchanged.
- the optional implementation methods in a certain embodiment can be arbitrarily combined; in addition, the embodiments can be arbitrarily combined, for example, some or all steps of different embodiments can be arbitrarily combined, and a certain embodiment can be arbitrarily combined with the optional implementation methods of other embodiments.
- elements expressed in the singular form such as “a”, “an”, “the”, “above”, “said”, “aforementioned”, “this”, etc., may mean “one and only one", or “one or more”, “at least one”, etc.
- the noun after the article may be understood as a singular expression or a plural expression.
- plurality refers to two or more.
- the terms “at least one of”, “at least one of”, “at least one of”, “one or more”, “a plurality of”, “multiple”, etc. can be used interchangeably.
- descriptions such as “at least one of A, B, C...”, “A and/or B and/or C...”, etc. include the case where any one of A, B, C... exists alone, and also include any combination of any multiple of A, B, C..., and each case may exist alone; for example, “at least one of A, B, C” includes the case where A exists alone, B exists alone, C exists alone, the combination of A and B, the combination of A and C, the combination of B and C, and the combination of A, B, and C; for example, A and/or B includes the case where A exists alone, B exists alone, and the combination of A and B.
- the description methods such as “in one case A, in another case B", “in response to one case A, in response to another case B”, etc. may include the following technical solutions according to the situation: A is executed independently of B, that is, in some embodiments A; B is executed independently of A, that is, in some embodiments B; A and B are selectively executed, that is, selected from A and B in some embodiments; A and B are both executed, that is, A and B in some embodiments.
- branches such as A, B, C, etc., it is similar to the above.
- prefixes such as “first” and “second” in the embodiments of the present disclosure are only used to distinguish different description objects, and do not constitute restrictions on the position, order, priority, quantity or content of the description objects.
- the statement of the description object refers to the description in the context of the claims or embodiments, and should not constitute redundant restrictions due to the use of prefixes. For example, if the description object is a "field”, the ordinal number before the "field” in the "first field” and the "second field” does not limit the position or order between the "fields”, and the "first” and “second” do not limit whether the "fields” they modify are in the same message, nor do they limit the order of the "first field” and the "second field”.
- the description object is a "level”
- the ordinal number before the "level” in the “first level” and the “second level” does not limit the priority between the "levels”.
- the number of description objects is not limited by the ordinal number, and can be one or more. Taking the "first device” as an example, the number of "devices” can be one or more.
- the objects modified by different prefixes may be the same or different. For example, if the description object is "device”, then the “first device” and the “second device” may be the same device or different devices, and their types may be the same or different. For another example, if the description object is "information”, then the "first information” and the “second information” may be the same information or different information, and their contents may be the same or different.
- “including A”, “comprising A”, “used to indicate A”, and “carrying A” can be interpreted as directly carrying A or indirectly indicating A.
- terms such as “greater than”, “greater than or equal to”, “not less than”, “more than”, “more than or equal to”, “not less than”, “higher than”, “higher than or equal to”, “not lower than”, and “above” can be replaced with each other, and terms such as “less than”, “less than or equal to”, “not greater than”, “less than”, “less than or equal to”, “no more than”, “lower than”, “lower than or equal to”, “not higher than”, and “below” can be replaced with each other.
- the device and the like can be interpreted as physical or virtual, and their names are not limited to those described in the embodiments.
- the names of the devices, equipment, circuits, network elements, nodes, functions, units, sections, systems, networks, chips, chip systems, entities and other terms are interchangeable.
- terminal In some embodiments, the terms "terminal”, “terminal device”, “user equipment (UE)”, “user terminal”, “mobile station (MS)”, “mobile terminal (MT)", subscriber station, mobile unit, subscriber unit, wireless unit, remote unit, mobile device, wireless device, wireless communication device, remote device, mobile subscriber station, access terminal, mobile terminal, wireless terminal, remote terminal, handset, user agent, mobile client, client and the like can be used interchangeably.
- the access network device, the core network device, or the network device can be replaced by a terminal.
- the various embodiments of the present disclosure can also be applied to a structure in which the communication between the access network device, the core network device, or the network device and the terminal is replaced by the communication between multiple terminals (for example, it can also be referred to as device-to-device (D2D), vehicle-to-everything (V2X), etc.).
- D2D device-to-device
- V2X vehicle-to-everything
- the language such as "uplink” and "downlink” can also be replaced by the language corresponding to the communication between the terminals (for example, "side”).
- the uplink channel, the downlink channel, etc. can be replaced by the side channel
- the uplink, the downlink, etc. can be replaced by the side link.
- the terminal may be replaced by an access network device, a core network device, or a network device.
- the access network device, the core network device, or the network device may also be configured to have a structure that has all or part of the functions of the terminal.
- the names of information, etc. are not limited to the names recorded in the embodiments, and terms such as “information”, “message”, “signal”, “signaling”, “report”, “configuration”, “indication”, “instruction”, “command”, “channel”, “parameter”, “domain”, “field”, “symbol”, “symbol”, “code element”, “codebook”, “codeword”, “codepoint”, “bit”, “data”, “program”, and “chip” can be used interchangeably.
- terms such as “uplink”, “uplink”, “physical uplink” can be interchangeable, and terms such as “downlink”, “downlink”, “physical downlink” can be interchangeable, and terms such as “side”, “sidelink”, “side communication”, “sidelink communication”, “direct connection”, “direct link”, “direct communication”, “direct link communication” can be interchangeable.
- DCI downlink control information
- DL downlink
- UL uplink
- UL DCI uplink
- the terms “physical downlink shared channel (PDSCH)”, “DL data” and the like can be interchangeable with each other, and the terms “physical uplink shared channel (PUSCH)”, “UL data” and the like can be interchangeable with each other.
- radio wireless
- RAN radio access network
- AN access network
- RAN-based and the like
- synchronization signal SS
- synchronization signal block SSB
- reference signal RS
- pilot pilot signal
- the terms “moment”, “time point”, “time”, “time position” and the like can be used interchangeably, and “duration”, “period”, “time” and the like can be used interchangeably.
- the terms “interval window”, “window” and “time” are used interchangeably.
- obtain can be interchangeable, and can be interpreted as receiving from other entities, obtaining from a protocol, obtaining by self-processing, autonomous implementation, etc.
- predetermined or “preset” may be interpreted as being pre-specified in a protocol, etc., or may be interpreted as a pre-set action performed by a device, etc.
- determining can be interpreted as judging, deciding, calculating, computing, processing, deriving, investigating, searching, looking up, searching, inquiring, ascertaining, receiving, transmitting, inputting, outputting, accessing, resolving, selecting, choosing, establishing, comparing, “assuming,” “expecting,” “considering,” broadcasting, notifying, communicating, forwarding, configuring, reconfiguring, allocating, mapping, assigning, etc., but is not limited to the foregoing.
- the determination or judgment can be performed by a value represented by 1 bit (0 or 1), by a true or false value (Boolean value) represented by true or false, or by comparison of numerical values (for example, comparison with a predetermined value), but is not limited to this.
- network may be interpreted as devices included in the network (eg, access network equipment, core network equipment, etc.).
- not expecting to receive can be interpreted as not receiving on time domain resources and/or frequency domain resources, or as not performing subsequent processing on the data after receiving the data; "not expecting to send” can be interpreted as not sending, or as sending but not expecting the recipient to respond to the sent content.
- the acquisition of data, information, etc. may comply with the laws and regulations of the country where the data is obtained.
- data, information, etc. may be obtained with the user's consent.
- RSC can be used to identify a connection service between a U2N relay device or a U2U relay device and an authorized remote device or end device that the relay device can provide services.
- RSC is unique between different public land mobile communication networks.
- the remote device can send a key request to its corresponding core network element (such as DDNMF/PKMF).
- the remote device can discover the core network element corresponding to the potential relay device based on the local public land mobile network ID (such as PLMN ID) of the potential relay mapped to the RSC, and then send a key request to the core network element corresponding to the potential relay device.
- the remote device's element After receiving the key response message, the remote device's element sends the received key information to the remote device.
- the core network element corresponding to each relay device can generate different key information.
- the remote device When the remote device receives multiple key information, it will be unable to choose which set of key information to use for encryption and decryption operations and integrity protection.
- the present disclosure proposes a communication method, device and storage medium.
- Fig. 1 is a schematic diagram of the architecture of a communication system according to an embodiment of the present disclosure.
- the communication system 100 may include a first network device 101, a second network device 102 and a third network device 103.
- the communication system 100 also includes a first terminal and a second terminal.
- the first network device 101 may be a core network device.
- the first network device may be a network element corresponding to the first terminal, such as a Direct Discovery Name Management Function (DDNMF) network element and/or a ProSe Key Management Function (PKMF) network element corresponding to the first terminal.
- DDNMF Direct Discovery Name Management Function
- PKMF ProSe Key Management Function
- the first network device may be a 5G-DDNMF and/or PKMF of the first terminal in a Home Public Land Mobile Network (HPLMN).
- the first network device may also be other core network devices corresponding to the first terminal, such as a PCF.
- the first network device 101 when the first network device 101 communicates with the first terminal through the user plane, the first network device 101 may be a PKMF network element; when the first network device 101 communicates with the first terminal through the control plane, the first network device 101 may be a DDNMF network element.
- the second network device 102 corresponds to the second terminal, and the second network device may be a core network device.
- the second network device may be a DDNMF network element and/or a PKMF network element of the second terminal. 5G-DDNMF and/or PKMF in HPLMN.
- the first network device may also be other core network devices corresponding to the second terminal, such as PCF.
- the second network device 102 when the second network device 102 communicates with the second terminal through the user plane, the second network device 102 may be a PKMF network element; when the second network device 102 communicates with the second terminal through the control plane, the second network device 102 may be a DDNMF network element.
- the third network device 103 may be a proximity service application server (Prose Application Server). In other embodiments, the third network device 103 may be a network device in other proximity services.
- Prose Application Server Prose Application Server
- the third network device 103 may be a network device in other proximity services.
- the first terminal may be a relay user equipment (User Equipment, UE).
- UE User Equipment
- the first terminal may be a relay UE between a remote UE and a network.
- the first terminal may be a relay UE between two end UEs.
- the name of the first terminal may be a relay terminal, a relay user equipment, a discovered device (Discoveree UE), an announcing device (Announcing UE), etc., which is not limited in the present disclosure.
- the second terminal can be a remote UE (remote UE) in U2N or an end UE (end UE) in U2U.
- remote UE remote UE
- end UE end UE
- the name of the second terminal can be a remote terminal, a remote user equipment, an end user equipment, a discovery device (Discoverer UE), a monitoring device (Monitoring UE), etc., which is not limited in the present disclosure.
- Discoverer UE discovery device
- Monitoring UE monitoring device
- the terminal includes, for example, a mobile phone, a wearable device, an Internet of Things device, a car with communication function, a smart car, a tablet computer (Pad), a computer with wireless transceiver function, a virtual reality (VR) terminal device, an augmented reality (AR) terminal device, a wireless terminal device in industrial control (industrial control), a wireless terminal device in self-driving, a wireless terminal device in remote medical surgery, a wireless terminal device in a smart grid (smart grid), a wireless terminal device in transportation safety (transportation safety), a wireless terminal device in a smart city (smart city), and at least one of a wireless terminal device in a smart home (smart home), but is not limited to these.
- a mobile phone a wearable device, an Internet of Things device, a car with communication function, a smart car, a tablet computer (Pad), a computer with wireless transceiver function, a virtual reality (VR) terminal device, an augmented reality (AR) terminal device, a wireless terminal device
- the access network device is, for example, a node or device that accesses a terminal to a wireless network.
- the access network device may include an evolved Node B (eNB), a next generation evolved Node B (ng-eNB), a next generation Node B (gNB), a node B (NB), a home node B (HNB), a home evolved node B (HeNB), a wireless backhaul device, a radio network controller (RNC), a base station controller (BSC), a base transceiver station (BTS), a base band unit (BBU), a mobile switching center, a base station in a 6G communication system, an open base station (Open RAN), a cloud base station (Cloud RAN), a base station in other communication systems, and at least one of an access node in a wireless fidelity (WiFi) system, but is not limited thereto.
- eNB evolved Node B
- ng-eNB next generation evolved Node B
- gNB next generation Node B
- the core network device may be a device including one or more network elements, or may be multiple devices or device groups, each including all or part of one or more network elements.
- the network element may be virtual or physical.
- the core network may include, for example, at least one of an Evolved Packet Core (EPC), a 5G Core Network (5GCN), and a Next Generation Core (NGC).
- EPC Evolved Packet Core
- 5GCN 5G Core Network
- NGC Next Generation Core
- the above-mentioned one or more network elements may include AMF, UPF, MME, etc., and may also include other network elements, such as Policy Control Function (PCF), Application Function (AF), Network Application Function (NAF), Application Layer Authentication and Key Management Anchor Function (AAnF), Bootstrapping Server Functionality (BSF), Session Management Function (SMF), etc.
- PCF Policy Control Function
- AF Application Function
- NAF Network Application Function
- AnF Application Layer Authentication and Key Management Anchor Function
- BSF Bootstrapping Server Functionality
- Session Management Function etc.
- the communication system described in the embodiment of the present disclosure is for the purpose of more clearly illustrating the technical solution of the embodiment of the present disclosure, and does not constitute a limitation on the technical solution proposed in the embodiment of the present disclosure.
- a person skilled in the art can know that with the evolution of the system architecture and the emergence of new business scenarios, the technical solution proposed in the embodiment of the present disclosure is also applicable to similar technical problems.
- the following embodiments of the present disclosure may be applied to the communication system 100 shown in FIG1 , or part of the subject, but are not limited thereto.
- the subjects shown in FIG1 are examples, and the communication system may include all or part of the subjects in FIG1 , or may include other subjects other than FIG1 , and the number and form of the subjects are arbitrary, and the connection relationship between the subjects is an example, and the subjects may be connected or disconnected, and the connection may be in any manner, which may be a direct connection or an indirect connection, and may be a wired connection or a wireless connection.
- FIG2a is an interactive schematic diagram of a communication method according to an embodiment of the present disclosure.
- the present disclosure embodiment relates to a communication method
- the communication system 100 may include a first network device 101, a second network device 102, and a third network device 103.
- the communication system 100 also includes a first terminal and a second terminal.
- the above method includes:
- Step 2101 A first terminal sends a first message to a first network device.
- the first network device may receive the first message.
- the first network device may be a core network device.
- the first network device may be a network element corresponding to the first terminal.
- the first network device may be a network element of a Direct Discovery Name Management Function (DDNMF) and/or a ProSe Key Management Function (PKMF) corresponding to the first terminal.
- DDNMF Direct Discovery Name Management Function
- PKMF ProSe Key Management Function
- the first network device may be a 5G-DDNMF and/or PKMF of the first terminal in a Home Public Land Mobile Network (HPLMN).
- HPLMN Home Public Land Mobile Network
- the first terminal may be a relay user equipment (User Equipment, UE).
- UE User Equipment
- the first terminal may be a relay UE between a remote UE and a network.
- the first terminal may be a relay UE between two end UEs.
- the name of the first terminal may be a relay terminal, a relay user equipment, a discovered device, an announcing device, etc., which is not limited in the present disclosure.
- the first message may be used to request first information, the first information is related to a first service, and the first message may carry an identifier of the first service.
- the first message may also carry the security capability of the first terminal PC5.
- the name of the first message is not limited, and it can be, for example, “Relay Discovery Key Request”, “Key Request”, “Discovery Key Request”, etc.
- the first service may be a connection service provided by the first terminal, the identifier of the first service is used to uniquely identify the first service, and the identifier of the first service may be a relay service code (RSC).
- RSC relay service code
- the first information may be used to protect the security of the proximity service (ProSe Security).
- the first information may be used for the discovery security of the proximity service (ProSe Discovery Security).
- the discovery security of the proximity service may include any one of encryption/decryption, integrity protection, scrambling, etc.
- the first information may also be used for the communication security of the proximity service (Prose Communication Security).
- the communication security of the proximity service may include any one of encryption/decryption, integrity protection, scrambling, etc.
- the name of the first information is not limited, and it can be “key”, “key information”, “security materials”, “security parameters”, etc.
- the proximity service discovery security may be U2N discovery security or U2U discovery security, which is not limited in the present disclosure.
- the proximity service communication security may be U2N communication security or U2U communication security, which is not limited in the present disclosure.
- the first information may be determined (or generated) by a third network device.
- Step 2102 The first network device determines whether first information corresponding to the first service identifier is stored in the first network device.
- the first network device may determine whether the first information is previously stored locally.
- the first network device may determine whether the first information corresponding to the identifier of the first service is stored in the first network device based on the identifier of the first service received from the first terminal.
- step 2104 when the first network device determines that the first information corresponding to the identifier of the first service is stored locally, the validity of the stored first information may be judged, that is, step 2104 is executed.
- the first network device may send a second message to the third network device, where the second message is used to request the first information, ie, execute step 2103.
- the second message may be used to request the first information.
- the second message may carry an identifier of the first service, thereby requesting first information corresponding to the identifier of the first service.
- the first information is determined by a third network device.
- the name of the second message is not limited, and it can be, for example, “Relay Discovery Key Request”, “Key Request”, “Discovery Key Request”, etc.
- step 2103 is optional, and when the first information corresponding to the identifier of the first service is stored in the first network device, step 2103 may be omitted.
- the first network device may further determine the validity of the stored first information, and if the first information is valid (not expired), step 2103 may be omitted, and if the first information is invalid (or invalid, or expired), step 2104 is executed.
- the first network device sends a request message to the third network device, thereby realizing the interaction between the network element and the application server.
- the uniqueness of the first information can be achieved.
- Step 2104 The first network device determines whether the first information stored in the first network device is expired.
- the first network device may determine whether the locally stored first information is expired.
- the first network device may determine whether the first information is expired based on information related to the first information. For example, the determination may be made based on timer information related to the first information.
- the first network device may determine whether the locally stored first information is expired based on a timer.
- the timer may be a timer associated with the first information, and the timer may be obtained by the first network device when obtaining the first information.
- the timer may be provided by a third network device or may be preconfigured.
- the first network device may determine whether the first information is expired by other means, which is not limited in the present disclosure.
- the first network device stores the timer associated with the first information when storing the first information corresponding to the identifier of the first service.
- the timer may indicate the timeliness information of the first information, for example, the timer may be information indicating the valid time period of the first information.
- the first network device may determine the expiration status of the first information according to the timer.
- the first network device may send a fourth message to the third network device, where the fourth message is used to request the third network device to update the first information, ie, execute step 2105 .
- the first network device may send the stored first information to the first terminal and/or the second network device, that is, step 2109 and/or step 2110 may be executed.
- step 2104 is optional.
- step 2104 may be omitted, and the first network device may obtain the first information from the third network device through step 2103 .
- step 2104 is an optional step. In other words, step 2104 may be omitted in some embodiments.
- the first network device may not perform the judgment action of determining whether the stored first information is "expired", but directly obtain the locally stored state information of whether the first information is expired or not.
- Step 2105 The first network device sends a fourth message to the third network device.
- the fourth message is used to request an update of the first information.
- the second message and the fourth message may be consistent with each other and are also used to request valid first information from the third network device.
- the name of the fourth message is not limited, and it can be, for example, “Relay Discovery Key Request”, “Key Request”, “Discovery Key Request”, etc.
- the fourth message may carry an identifier of the first service, thereby requesting to update the first information corresponding to the identifier of the first service.
- the first network device may send a fourth message to the third network device, and the fourth message may be used to instruct the third network device to generate valid first information.
- step 2105 is optional.
- the first network device can send the corresponding first information to the second network device and/or the first terminal without sending a request to the third network device.
- the first network device sends an update request message to the third network device, thereby realizing the interaction between the network element and the application server and the update of the first information.
- the third network device By acquiring the updated first information through the interaction, the uniqueness of the first information can be achieved.
- Step 2106 The third network device determines whether the first information stored in the third network device is expired.
- the third network device can determine whether the first information is expired based on the information associated with the first information. For example, Whether the first information is expired is determined by the timer information associated with the first information.
- the timer can be referred to the above description and will not be described again.
- the third network device may regenerate the first information corresponding to the first service identifier, that is, execute steps 2107 and 2108.
- the third network device may send a third message containing the first information to the first network device, that is, execute step 2108.
- the third network device may send the first information to the first network device in response to a request from the first network device, that is, if the request from the first network device is not received, step 2108 may not be executed.
- the third network device determines that the first information stored in the third network device is expired, it means that the first situation occurs. At this time, the first network device can receive the updated first information sent by the third network device in the first situation.
- step 2106 is optional, and the third network device may not determine whether the first information stored in the third network device is expired, and may only send the first information in response to the request of the first network device.
- Step 2107 The third network device determines the first information.
- the third network device may determine (or generate) first information corresponding to an identifier of the first service.
- the identifier of the first service may be obtained from the first network device.
- the third network device may select a random number based on the first service identifier, and generate first information corresponding to the first service identifier based on the random number.
- the present disclosure does not limit the manner in which the third network device determines or generates the first information.
- different services of the same terminal have different identifiers, and the generated first information is also different.
- step 2107 is optional.
- the third network device may not need to regenerate new first information.
- the optional meaning of step 2107 is that the execution order of step 2107 is not limited.
- step 2107 may not be executed after step 2102.
- step 2107 may not be executed after step 2104.
- step 2107 may not be executed after step 2106.
- the first information is determined by the third network device, and step 2107 may be executed after the first network device requests the first information, or before the first network device requests the first information, and the present disclosure does not limit this.
- the third network device since the first network device no longer requests the first information from the third network device when the first information corresponding to the identifier of the first service is stored, the third network device generates corresponding unique first information for the same first service identifier.
- Step 2108 The third network device sends a third message to the first network device.
- the third message may carry the first information.
- the third network device may send the determined first information to the first network device.
- the third message may also carry a timer corresponding to the first information.
- the third message may also carry a current time (Current_Time) parameter and a maximum offset (Max_Offset) parameter as well as a selected PC5 security protection algorithm.
- Current_Time current time
- Max_Offset maximum offset
- the name of the third message is not limited, and it can be, for example, “Relay Discovery Key Response”, “Key Response”, “Discovery Key Response”, etc.
- the 5G-DDNMF and/or PKMF of the relay user equipment in the visited public land mobile network can exchange and publish authentication messages (Announce Auth. Message) with the 5G-DDNMF and/or PKMF of the first terminal in the home public land mobile network (Home Public Land Mobile Network, HPLMN) to synchronize the first information.
- the relay user equipment is not roaming, no exchange is performed.
- the execution order of step 2108 is not limited.
- the third network device may send a third message carrying the first information in response to a request from the first network device, that is, execute step 2108 in response to step 2102 or 2105.
- the third network device may first send the third message carrying the first information to the first network device, for example, before any of the above steps 2101-2107, send the third message carrying the first information to the first network device.
- Step 2109 The first network device sends first information to the first terminal.
- the first network device may send the first information to the first terminal after receiving the first information provided by the third network device.
- the first network device returns first information corresponding to the first service identifier, Current_Time, Max_Offset parameters and the selected PC5 security protection algorithm to the first terminal, and the first terminal stores the first information together with the selected PC5 algorithm and the first service identifier.
- the first information is provided to the first terminal to perform proximity service security.
- the first terminal selects and uses the first information for encryption and decryption, integrity protection and verification, and the like.
- the first terminal may use the first information to perform security protection on the broadcast message and broadcast the protected broadcast message.
- the second terminal may monitor the broadcast message and perform decryption.
- the first terminal can receive the protected broadcast message sent by the second terminal, and the first terminal can use the first information to perform security verification on the protected broadcast message sent by the second terminal.
- the protected broadcast message sent by the second terminal can carry the identifier of the first service (taking RSC as an example), that is, the identifier of the first service corresponding to the first information used by the second terminal when performing security protection on the broadcast message.
- the first terminal uses the first information to verify the security of the protected broadcast message, it can learn the RSC in the protected broadcast message.
- the first network device can determine whether the first information corresponding to the identifier of the first service is stored locally (or the first information that has not expired is stored). If so, there is no need to request the first information corresponding to the identifier of the first service from the third network device.
- the first network device can send the stored first information to the first terminal, and the third network device will not generate two sets of first information for the same identifier of the first service, causing confusion for the first terminal when selecting the first information for proximity service security processing (such as encryption and decryption).
- Step 2110 The first network device sends first information to the second network device.
- the second terminal can be a remote UE (remote UE) in U2N or an end UE (end UE) in U2U.
- remote UE remote UE
- end UE end UE
- the name of the second terminal may be a remote terminal, a remote user device, an end user device, a discovery device, a monitoring device, etc., which is not limited in the present disclosure.
- the first network device may send the first information to the second network device upon receiving a request from the second terminal sent by the second network device.
- the second terminal may send a request message to the second network device, and the request message may be used to request the first information corresponding to the identifier of the first service, and the request message may include the identifier of the first service (e.g., a relay service code) and the 5G proximity service PC5 security capability of the second terminal.
- the request message sent by the second terminal to the second network device may also include a public land mobile network (PLMN) list, and the second terminal is authorized to use the 5G proximity service relay in the relay discovery information request in the PLMN included in the list.
- PLMN public land mobile network
- the second network device can check through unified data management (UDM) whether the second terminal is authorized to monitor U2N relay discovery and/or U2U relay discovery.
- UDM unified data management
- the 5G DDNMF and/or PKMF (i.e., the second network device) of the second terminal in the HPLMN can send a discovery request message to the 5G DDNMF and/or PKMF (i.e., the first network device) of the first terminal in the HPLMN, and the discovery request message may include the PC5 security capabilities of the second terminal.
- the second network device may execute a relay discovery process and send a request message to the first network device of the discovered relay, where the request message may be used to request the first information corresponding to the identifier of the first service.
- the 5G DDNMF and/or PKMF of the second terminal may be based on the potential 5G neighbor mapped to the RSC.
- HPLMNs of nearby serving relays discover the 5G DDNMF and/or PKMF of potential 5G nearby serving relays supporting the RSC.
- Step 2111 The second network device sends first information to the second terminal.
- the first information is provided to the second terminal to perform proximity based service security.
- the second terminal selects and uses the first information to perform security operations such as encryption and decryption, integrity protection and verification.
- the second terminal sends broadcast information protected by the first information security to the first terminal.
- the second terminal performs security protection on the broadcast information based on the discovery security information (i.e., the first information) received in step 2110, and sends the protected broadcast message to the first terminal, the broadcast message including the first service identifier.
- the first terminal sends a protected response message to the second terminal.
- the first terminal performs security verification on the broadcast message received from the second terminal based on the discovery security information (i.e., the first information) received from the 5G DDNMF and/or PKMF of the first terminal.
- the RSC corresponding to the broadcast message is matched with the RSC information configured by the first terminal itself.
- a security protection response message is sent to the second terminal.
- no message is sent.
- the first terminal performs security protection on the response message based on the first information received in step 2109, and sends the protected response message to the second terminal.
- the second terminal performs security verification on the response message received from the first terminal based on the first information received from the 5G DDNMF and/or PKMF of the second terminal.
- the second terminal can use the first information sent by the second network device to perform security protection on the broadcast message, and broadcast the protected broadcast message.
- the first terminal can receive the protected broadcast information and perform security verification.
- the broadcast message sent by the second terminal can carry the identifier of the first service (taking RSC as an example), that is, the identifier of the first service corresponding to the first information used by the second terminal when performing security protection on the broadcast message.
- the RSC in the protected broadcast message can be learned.
- the first terminal can use the first information received from the first network device to perform security protection on the response message, and feedback the response message to the second terminal.
- the second terminal receives the response message and can use the first information received from the second network device to perform security verification on the response message; if the RSC in the protected broadcast message does not exist in the RSC supported by the first terminal, the first terminal does not feedback the response message to the second terminal.
- the first network device can determine whether the first information corresponding to the identifier of the first service is stored locally (or the first information that has not expired is stored). If so, there is no need to request the first information corresponding to the identifier of the first service from the third network device.
- the first network device can send the stored first information to the first terminal, and the third network device will not generate two sets of first information for the same identifier of the first service, causing confusion for the first terminal when selecting the first information for proximity service security processing (such as encryption and decryption).
- the first information generated by the third network device is unique, and the first information provided by the first network device to the first terminal also uniquely corresponds to the identifier of the first service requested by the first terminal, so that the first terminal can use the unique first information to perform security protection, security verification and other operations, thereby avoiding operational confusion of the terminal.
- step 2109 may be performed before step 2110 .
- the method provided by the present invention can use an application server to determine the discovery security information. Since the security information generated by the application server for different RSCs is unique, it can be achieved that even when there are multiple relay devices, the generated discovery security information is the same, which facilitates the system to use security information to perform security protection, security verification and other operations.
- the communication method involved in the embodiments of the present disclosure may include at least one of steps 2101 to 2111.
- step 2108 may be implemented as an independent embodiment
- steps 2101+2102+2104+2105+2106+2107+2108+2109+110+2111 may be implemented as an independent embodiment
- steps 2101+2102+2103+2107+2108+2109+2110+2111 may be implemented as an independent embodiment
- steps 2101+2102+2103+2104+2105+2106+2107+2108+2109+2110+2111 may be implemented as an independent embodiment, but are not limited thereto.
- FIG2b is an interactive schematic diagram of a communication method according to an embodiment of the present disclosure.
- the present disclosure embodiment relates to a communication method
- the communication system 100 may include a first network device 101, a second network device 102, and a third network device 103.
- the communication system 100 also includes a first terminal and a second terminal.
- the above method includes:
- Step 2201 A first network device obtains first information.
- the description of the first information can refer to Figure 2a and will not be repeated here.
- the first network device may obtain one or more first information corresponding to each of the one or more first service identifiers. For example, the first network device may obtain a configuration list of first information, which may include one or more first information and the identifier of the first service corresponding to the first information.
- the first information may be preconfigured.
- the first network device may obtain the preconfigured first information.
- the first network device acquiring the first information may mean that the first information is preconfigured in the first network device.
- the first information may be obtained through operator preconfiguration, and the first information is determined by the third network device.
- the first network device may not request the first information from the third network device in real time. In other words, the first network device may not receive the first information from the third network device, but obtains the first information preconfigured by the third network device.
- the first information is unique for different service identifiers, so that a specific service identifier can have unique corresponding first information.
- Step 2202 The first terminal sends a first message to the first network device.
- step 2202 can refer to the optional implementation of step 2101 in FIG. 2a and other related parts in the embodiment involved in FIG. 2a, which will not be described in detail here.
- Step 2203 The third network device determines that the first information stored in the third network device is expired.
- the third network device can determine whether the first information is expired according to information associated with the first information. For example, the third network device can determine whether the first information is expired according to timer information associated with the first information. The timer can be referred to the above description and will not be repeated here.
- the third network device may regenerate the first information, that is, execute step 2204 .
- the first information can be directly sent to the first terminal and/or the second network device, that is, steps 2206 and/or 2207 can be directly executed.
- step 2203 can refer to the optional implementations of step 2106 in FIG. 2a and other related parts in the embodiment involved in FIG. 2a, which will not be described in detail here.
- step 2203 is optional, and the third network device may not determine whether the first information stored in the third network device is expired.
- Step 2204 The third network device determines the first information.
- step 2204 is optional. When the third network device determines in step 2203 that the first information is not expired, step 2204 may be omitted.
- step 2204 can refer to the optional implementation of step 2107 in FIG. 2a and other related parts in the embodiment involved in FIG. 2a, which will not be described in detail here.
- the third network device no longer determines new first information when the first information has not expired.
- Step 2205 The third network device sends a third message to the first network device.
- the third message carries updated first information.
- step 2205 is optional.
- the third network device determines in step 2203 that the first information is not expired, the third network device does not need to update the first information, and the third network device does not need to send a third message to the first network device, that is, step 2205 is not executed.
- the execution order of step 2205 may not be fixed.
- the update of the first information by the third network device depends on whether the first information is expired.
- the update process can be executed before the request step or after the step of obtaining the first information is completed, that is, step 2205 can be executed before step 2202 or after step 2208.
- step 2205 can refer to the optional implementation of step 2108 in FIG. 2a and other related parts in the embodiment involved in FIG. 2a, which will not be described in detail here.
- Step 2206 The first network device sends first information to the first terminal.
- Step 2207 The first network device sends first information to the second network device.
- step 2207 can refer to the optional implementation of step 2110 in FIG. 2a and other related parts in the embodiment involved in FIG. 2a, which will not be described in detail here.
- Step 2208 The second network device sends the first information to the second terminal.
- the second terminal performs security protection on the broadcast information based on the first information received in step 2208, and sends the protected broadcast message to the first terminal, where the broadcast message includes the RSC.
- the first terminal performs security protection on the response message based on the first information received in step 2206, and sends the encrypted response message to the second terminal.
- step 2208 can refer to the optional implementation of step 2111 in FIG. 2a and other related parts in the embodiment involved in FIG. 2a, which will not be described in detail here.
- the second network device sends the first information to the second terminal.
- the first information generated based on the third network device is unique, and the second terminal no longer needs to select different discovered security information, so that the second terminal can use the first information for security protection, security verification and other operations.
- step 2206 may be performed before step 2207 .
- a first network device can obtain first information in a pre-configuration manner, the first information is determined by a third network device, and the first information is pre-configured in the first network device.
- the first network device can query according to the identifier of the first service requested by the first terminal to obtain the corresponding first information, and send the first information to the first terminal and/or the second network device, so as to avoid confusion of the first terminal when selecting the first information for proximity service security processing (such as encryption and decryption).
- the communication method involved in the embodiments of the present disclosure may include at least one of steps 2201 to 2208.
- step 2201 may be implemented as an independent embodiment
- steps 2201+2202+2206+2207+2208 may be implemented as an independent embodiment
- steps 2201+2202+2203+2204+2205+2206+2207+2208 may be implemented as an independent embodiment, but are not limited thereto.
- FIG3a is a flow chart of a communication method according to an embodiment of the present disclosure. As shown in FIG3a, the present disclosure embodiment relates to a communication method, which is used for a first network device 101, and the method includes:
- Step 3101 Get the first message.
- step 3101 can refer to the optional implementation of step 2101 in Figure 2a, step 2202 in Figure 2b, and other related parts in the embodiments involved in Figures 2a and 2b, which will not be repeated here.
- the first network device 101 may obtain the first message sent by the first terminal, but is not limited thereto, and may also receive the first message sent by other entities.
- the first network device 101 obtains a first message specified by a protocol.
- the first network device 101 obtains the first message from an upper layer(s).
- the first network device 101 performs processing to obtain the first message.
- step 3101 is omitted, and the first network device 101 autonomously implements the function indicated by the first message, or the above function is default or acquiescent.
- Step 3102 Determine whether the first network device stores first information corresponding to the identifier of the first service.
- step 3102 can refer to the optional implementation of step 2101 of step 2102 in FIG. 2a and other related parts in the embodiment involved in FIG. 2a, which will not be described in detail here.
- Step 3103 Send the second message.
- step 3103 can refer to the optional implementation of step 2103 in FIG. 2a and other related parts in the embodiment involved in FIG. 2a, which will not be described in detail here.
- the second message may be used to request the first information.
- the first network device 101 may send the second message to the third network device 103 , but is not limited thereto, and the second message may also be sent to other entities.
- the first network device 101 can send the second message through various messages.
- the third network device has different types and can send the second message via an uplink signal, a sidelink signal, or a high-layer signaling message.
- step 3103 is omitted and the above functions are default or acquiescent.
- Step 3104 Determine whether the first information stored in the first network device is expired.
- step 3104 can refer to the optional implementation of step 2104 in FIG. 2a and other related parts in the embodiment involved in FIG. 2a, which will not be described in detail here.
- step 3104 is omitted and the above functions are default or by default.
- Step 3105 Send the fourth message.
- step 3105 can refer to the optional implementation of step 2105 in FIG. 2a and other related parts in the embodiment involved in FIG. 2a, which will not be described in detail here.
- the fourth message may be used to request an update of the first information.
- the first network device 101 may send the fourth message to the third network device 103 , but is not limited thereto, and the fourth message may also be sent to other entities.
- the first network device 101 may send the fourth message through various messages.
- the fourth message may be sent through an uplink signal, a sidelink signal, or a high-layer signaling message.
- step 3105 is omitted and the above functions are default or acquiescent.
- Step 3106 Get the third message.
- step 3106 can refer to the optional implementation of step 2108 in Figure 2a, step 2205 in Figure 2b, and other related parts in the embodiments involved in Figures 2a and 2b, which will not be repeated here.
- the first network device 101 may obtain a third message sent by a third network device, but is not limited thereto, and may also receive a third message sent by other entities.
- the first network device 101 obtains a third message specified by the protocol.
- the first network device 101 obtains the third message from an upper layer(s).
- the first network device 101 performs processing to obtain the third message.
- Step 3107 Send first information to the first terminal.
- step 3107 can refer to the optional implementation of step 2109 in Figure 2a, step 2206 in Figure 2b, and other related parts in the embodiments involved in Figures 2a and 2b, which will not be repeated here.
- the first information may be used for discovery security of the proximity service, such as encryption, integrity protection, scrambling, etc., wherein the first information corresponds to the first service.
- the first network device 101 may send the first information to the first terminal, but is not limited thereto, and may also send the first information to other entities.
- the first network device 101 may send the first information through various messages. For example, depending on the types of the first network device and the first terminal, the first information may be sent through an uplink signal, a sidelink signal, or a high-layer signaling message.
- Step 3108 Send the first information to the second network device.
- step 3108 can refer to step 2110 of Figure 2a.
- step 2207 of Figure 2b and other related parts of the embodiments involved in Figures 2a and 2b are not described in detail here.
- the first information may be used for discovery security of the proximity service, such as encryption, integrity protection, scrambling, etc., wherein the first information corresponds to the first service.
- the first network device 101 may send the first information to the second network device, but is not limited thereto, and may also send the first information to other entities.
- the first network device 101 may send the first information through various messages.
- the first information may be sent through an uplink signal, a sidelink signal, or a high-layer signaling message.
- the communication method involved in the embodiment of the present disclosure may include at least one of step 3101 to step 3108.
- step 3106 may be implemented as an independent embodiment
- steps 3101+3102+3103+3106+3107+3108 may be implemented as an independent embodiment
- steps 3101+3102+3103+3106+3107+3108 may be implemented as an independent embodiment, but are not limited thereto.
- step 3103, step 3104, step 3105, and step 3106 are optional, and one or more of these steps may be omitted or replaced in different embodiments.
- each step can be independent, arbitrarily combined or exchanged in order, the optional methods or optional examples can be arbitrarily combined, and can be arbitrarily combined with any steps of other implementation modes or other examples.
- FIG3b is a flow chart of a communication method according to an embodiment of the present disclosure. As shown in FIG3b, the present disclosure embodiment relates to a communication method, which is used for a first network device 101, and the method includes:
- Step 3201 Obtain first information.
- step 3201 can refer to the optional implementation of step 2201 in Figure 2b and other related parts in the embodiment involved in Figure 2b, which will not be repeated here.
- the first network device 101 may obtain the first information configuration list sent by the third network device, but is not limited thereto, and may also receive the first information configuration list sent by other entities.
- the first network device 101 obtains a first information configuration list specified by a protocol.
- the first network device 101 obtains the first information configuration list from an upper layer(s).
- the first network device 101 performs processing to obtain a first information configuration list.
- Step 3202 Get the first message.
- step 3202 can refer to the optional implementation of step 2101 in Figure 2a, step 2202 in Figure 2b, step 3101 in Figure 3a, and other related parts in the embodiments involved in Figures 2a, 2b, and 3a, which will not be repeated here.
- the first network device 101 may obtain the first message sent by the first terminal, but is not limited thereto, and may also receive the first message sent by other entities.
- the first network device 101 obtains a first message specified by a protocol.
- the first network device 101 obtains the first message from an upper layer(s).
- the first network device 101 performs processing to obtain the first message.
- Step 3203 Get the third message.
- step 3203 can refer to the optional implementation of step 2108 in Figure 2a, step 2205 in Figure 2b, step 3106 in Figure 3a, and other related parts in the embodiments involved in Figures 2a, 2b, and 3a, which will not be repeated here.
- the first network device 101 may obtain a third message sent by a third network device, but is not limited thereto, and may also receive a third message sent by other entities.
- the first network device 101 obtains a third message specified by the protocol.
- the first network device 101 obtains the third message from an upper layer(s).
- the first network device 101 performs processing to obtain the third message.
- step 3203 is omitted and the above functions are default or by default.
- Step 3204 Send first information to the first terminal.
- step 3204 can refer to the optional implementation of step 2109 in Figure 2a, step 2206 in Figure 2b, step 3107 in Figure 3a and other related parts in the embodiments involved in Figures 2a, 2b and 3a, which will not be repeated here.
- the first information may be used for discovery security of the proximity service, such as encryption, integrity protection, scrambling, etc., wherein the first information corresponds to the first service.
- the first network device 101 may send the first information to the first terminal, but is not limited thereto, and may also send the first information to other entities.
- the first network device 101 may send the first information through various messages. For example, depending on the types of the first network device and the first terminal, the first information may be sent through an uplink signal, a sidelink signal, or a high-layer signaling message.
- Step 3205 Send the first information to the second network device.
- step 3205 can refer to the optional implementation of step 2110 in Figure 2a, step 2207 in Figure 2b, step 3108 in Figure 3a and other related parts in the embodiments involved in Figures 2a, 2b and 3a, which will not be repeated here.
- the first information may be used for discovery security of the proximity service, such as encryption, integrity protection, scrambling, etc., wherein the first information corresponds to the first service.
- the first network device 101 may send the first information to the second network device, but is not limited thereto, and may also send the first information to other entities.
- the first network device 101 can send the first information through various messages.
- the second network device has different types and can send the first information via an uplink signal, a sidelink signal, or a high-layer signaling message.
- the communication method involved in the embodiment of the present disclosure may include at least one of step 3201 to step 3205.
- step 3201 may be implemented as an independent embodiment
- steps 3201+3202+3204+3205 may be implemented as independent embodiments, but are not limited thereto.
- each step can be independent, arbitrarily combined or exchanged in order, and the optional methods or optional examples can be arbitrarily combined and can be arbitrarily combined with other implementation modes or examples.
- FIG3c is a flow chart of a communication method according to an embodiment of the present disclosure. As shown in FIG3c, the present disclosure embodiment relates to a communication method, which is used for a first network device 101, and the method includes:
- Step 3301 Obtain first information.
- step 3301 can refer to the optional implementation methods of step 2108 of Figure 2a, step 2205 of Figure 2b, step 3106 of Figure 3a, step 3203 of Figure 3b, and other related parts in the embodiments involved in Figures 2a, 2b, 3a, and 3b, which will not be repeated here.
- the first network device 101 may obtain a third message sent by a third network device, but is not limited thereto, and may also receive a third message sent by other entities.
- the third message carries the first information.
- the first network device 101 obtains a third message specified by the protocol.
- the first network device 101 obtains the third message from an upper layer(s).
- the first network device 101 performs processing to obtain the third message.
- Step 3302 Send the first message.
- step 3302 please refer to the optional implementation of step 2109 and/or 2110 of Figure 2a, the optional implementation of step 2206 and/or 2207 of Figure 2b, the optional implementation of step 3107 and/or 3108 of Figure 3a, the optional implementation of step 3204 and/or 3205 of Figure 3b and other related parts in the embodiments involved in Figures 2a, 2b, 3a and 3b, which will not be repeated here.
- the first information may be used for discovery security of the proximity service, such as encryption, integrity protection, scrambling, etc., wherein the first information corresponds to the first service.
- the first network device 101 may send the first information to the second network device and/or the first terminal, but is not limited thereto, and may also send the first information to other entities.
- the first network device 101 may send the first information through various messages. For example, depending on the types of the first network device and the second network device and/or the first terminal, the first information may be sent through an uplink signal, a sidelink signal, or a high-layer signaling message.
- obtaining the first information determined by the third network device includes any of the following: obtaining preconfigured first information, the first information being determined by the third network device; or receiving the first information sent by the third network device.
- the method further includes: based on the identifier of the first service, determining that first information corresponding to the identifier of the first service is stored in the first network device.
- the method further includes: determining that the first information corresponding to the identifier of the first service is not stored in the first network device; and sending a second message to the third network device, where the second message is used to request the first information.
- receiving the first information sent by the third network device includes: receiving a third message sent by the third network device, wherein the third message carries the first information.
- the third message also carries a timer corresponding to the first information, and the timer is used to determine whether the first information is expired.
- the method further includes: determining that the first information stored in the first network device is expired; and sending a fourth message to the third network device, where the fourth message is used to request to update the first information.
- receiving the first information sent by the third network device includes: receiving updated first information sent by the third network device in a first situation, wherein the first situation is that the third network device determines that the first information stored in the third network device is expired.
- steps 3301 - 3302 please refer to the embodiments shown in FIG. 2 a and FIG. 2 b .
- FIG4a is a flow chart of a communication method according to an embodiment of the present disclosure. As shown in FIG4a, the present disclosure embodiment relates to a communication method, which is used for a third network device 103, and the method includes:
- Step 4101 Get the second message.
- step 4101 can refer to the optional implementation of step 2103 in FIG. 2a and the optional implementation of step 3103 in FIG. 3a.
- the method and other related parts of the embodiments involved in Figures 2a and 3a will not be repeated here.
- the third network device 103 may obtain the second message sent by the first network device, but is not limited thereto, and may also receive the second message sent by other entities.
- the third network device 103 obtains a second message specified by the protocol.
- the third network device 103 obtains the second message from an upper layer(s).
- the third network device 103 performs processing to obtain the second message.
- step 4101 is omitted and the above functions are default or acquiescent.
- Step 4102 Get the fourth message.
- step 4102 can refer to the optional implementation of step 2105 in Figure 2a, the optional implementation of step 3105 in Figure 3a and other related parts in the embodiments involved in Figures 2a and 3a, which will not be repeated here.
- the third network device 103 may obtain the fourth message sent by the first network device, but is not limited thereto, and may also receive the second message sent by other entities.
- the third network device 103 obtains a fourth message specified by the protocol.
- the third network device 103 obtains the fourth message from an upper layer(s).
- the third network device 103 performs processing to obtain a fourth message.
- step 4102 is omitted and the above functions are default or acquiescent.
- step 4103 can refer to the optional implementation of step 2106 in FIG. 2a and other related parts in the embodiment involved in FIG. 2a, which will not be described in detail here.
- step 4103 is omitted and the above functions are default or acquiescent.
- Step 4104 Determine the first information.
- step 4104 can refer to the optional implementation of step 2107 in Figure 2a and other related parts in the embodiment involved in Figure 2a, which will not be repeated here.
- step 4104 is omitted and the above functions are default or acquiescent.
- Step 4105 Send the third message.
- step 4105 can refer to the optional implementation of step 2108 in Figure 2a, the optional implementation of step 3106 in Figure 3a, and other related parts in the embodiments involved in Figures 2a and 3a, which will not be repeated here.
- the third message carries the first information.
- the third network device 103 may send the third message to the first network device 101 , but is not limited thereto, and the third message may also be sent to other entities.
- the third network device 103 may send the third message through various messages.
- the third message may be sent through an uplink signal, a sidelink signal, or a high-layer signaling message.
- the communication method involved in the embodiment of the present disclosure may include at least one of step 4101 to step 4105.
- step 4103 may be implemented as an independent embodiment, for example, steps 4101+4103+4104+4105 may be implemented as an independent embodiment, and steps 4102+4103+4104+4105 may be implemented as an independent embodiment, but are not limited thereto.
- step 4101, step 4102, and step 4103 are optional, and one or more of these steps may be omitted or replaced in different embodiments.
- each step can be independent, arbitrarily combined or exchanged in order, and the optional methods or optional examples can be arbitrarily combined and can be arbitrarily combined with other implementation modes or examples.
- FIG4b is a flow chart of a communication method according to an embodiment of the present disclosure. As shown in FIG4b, the present disclosure embodiment relates to a communication method for a third network device 103, the method comprising:
- Step 4201 Determine whether the first information stored in the third network device is expired.
- step 4201 can refer to the optional implementation of step 2106 in Figure 2a, the optional implementation of step 2203 in Figure 2b, and other related parts in the embodiments involved in Figures 2a and 2b, which will not be repeated here.
- step 4201 is omitted and the above functions are default or default.
- Step 4202 Determine the first information.
- step 4202 can refer to the optional implementation of step 2107 in Figure 2a, the optional implementation of step 2204 in Figure 2b, the optional implementation of step 4104 in Figure 4a, and other related parts in the embodiments involved in Figures 2a, 2b, and 4a, which will not be repeated here.
- Step 4203 Send the third message.
- step 4203 reference may be made to the optional implementation of step 2108 of Figure 2a, the optional implementation of step 2205 of Figure 2b, the optional implementation of step 3106 of Figure 3a, the optional implementation of step 3203 of Figure 3b, the optional implementation of step 4105 of Figure 4a and other related parts in the embodiments involved in Figures 2a, 2b, 3a, 3b and 4a, which will not be repeated here.
- the third message carries the first information.
- the third network device 103 may send the third message to the first network device 101 , but is not limited thereto, and the third message may also be sent to other entities.
- the third network device 103 may send the third message through various messages.
- the third message may be sent through an uplink signal, a sidelink signal, or a high-layer signaling message.
- step 4203 is omitted and the above functions are default or acquiescent.
- FIG4c is a flow chart of a communication method according to an embodiment of the present disclosure. As shown in FIG4c, the present disclosure embodiment relates to a communication method for a third network device 103, the method comprising:
- Step 4301 Determine the first information.
- the optional implementation method of step 4301 can refer to the optional implementation method of step 2107 in Figure 2a, the optional implementation method of step 2204 in Figure 2b, the optional implementation method of step 4104 in Figure 4a, the optional implementation method of step 4202 in Figure 4b, and other related parts in the embodiments involved in Figures 2a, 2b, 4a, and 4b, which will not be repeated here.
- the method further includes: receiving a second message sent by the first network device, where the second message is used to request the first information.
- the method further includes: sending first information to a first network device, the first network device corresponding to the first terminal.
- sending the first information to the first network device includes: sending a third message to the first network device, wherein the third message carries the first information.
- the third message also carries a timer corresponding to the first information, and the timer is used to determine whether the first information is expired.
- sending the first information to the first network device includes: determining that the first information stored in the third network device is expired; and sending updated first information to the first network element.
- the first information is preconfigured into the first network device.
- step 4301 please refer to the above-mentioned embodiments of Figures 2a and 2b.
- FIG5a is a flow chart of a communication method according to an embodiment of the present disclosure. As shown in FIG5a, the present disclosure embodiment relates to a communication method, which is used for a second network device 102, and the method includes:
- Step 5101 Obtain first information.
- step 5101 see step 2110 of Figure 2a, step 2207 of Figure 2b, step 3108 of Figure 3a, step 3205 of Figure 3b, and other related parts of the embodiments involved in the steps of Figures 2a, 2b, 3a, and 3b.
- the second network device 102 may obtain the first information sent by the first network device, but is not limited thereto, and may also receive the first information sent by other entities.
- the second network device 102 obtains first information specified by the protocol.
- the second network device 102 obtains the first information from an upper layer(s).
- the second network device 102 performs processing to obtain the first information.
- Step 5102 Send the first message.
- step 5102 can refer to the optional implementation of step 2111 in Figure 2a, step 2208 in Figure 2b, and other related parts in the embodiments involved in Figures 2a and 2b, which will not be repeated here.
- the first information may be used for discovery security of the proximity service, such as encryption, integrity protection, scrambling, etc., wherein the first information corresponds to the first service.
- the second network device 102 may send the first information to the second terminal, but is not limited thereto, and may also send the first information to other entities. Send the first message.
- the second network device 102 may send the first information through various messages.
- the first information may be sent through an uplink signal, a sidelink signal, or a high-layer signaling message.
- FIG5b is a flow chart of a communication method according to an embodiment of the present disclosure. As shown in FIG5b, the present disclosure embodiment relates to a communication method, which is used for the second network device 102, and the method includes:
- Step 5201 Obtain first information.
- step 5201 see step 2110 of Figure 2a, step 2207 of Figure 2b, step 3108 of Figure 3a, step 3205 of Figure 3b, step 5101 of Figure 5a, and other related parts of the embodiments involved in the steps of Figures 2a, 2b, 3a, 3b, and 5a.
- the second network device 102 may obtain the first information sent by the first network device, but is not limited thereto, and may also receive the first information sent by other entities.
- the second network device 102 obtains first information specified by the protocol.
- the second network device 102 obtains the first information from an upper layer(s).
- the second network device 102 performs processing to obtain the first information.
- the method further includes: sending first information to the second terminal, wherein the first information is used for the second terminal to select and use the first information for security protection.
- a flow chart of a communication method is shown in Figure 6.
- the method shown in the embodiment of the present disclosure involves discovery security material generated by a proximity service application server.
- the method may include the steps of:
- Steps 6101-6104 involve a discovered UE or an announcing UE, which may be referred to as a U2N relay or relay UE or U2U relay:
- Step 6101 in 5G ProSe UE-to-Network Relay Discovery and 5G ProSe UE-to-UE Relay Discovery, the 5G ProSe U2N Relay and U2U Relay, as discovered user devices or declaring devices, send a Relay Discovery Key Request to 5G-DDNMF or PKMF, and the key request includes a Relay Service Code (RSC) and its PC5 security capability.
- RSC Relay Service Code
- Step 6102 in 5G ProSe U2N relay discovery or U2U relay discovery, 5GDDNMF and/or PKMF checks in UDM whether the U2N relay or U2U relay is authorized to issue the U2N relay discovery procedure or the U2U ultimate discovery procedure. If the U2N relay or U2U relay is authorized and the discovery security information associated with the RSC is not stored in 5GDDNMF and/or PKMF, 5GDDNMF and/or PKMF may request the discovery security information by sending a key request message to the ProSe Application Server.
- the discovery security information may be updated, and once the discovery security information stored in the 5G DDNMF and/or PKMF becomes invalid, the 5G DDNMF and/or PKMF may request new discovery security information associated with the RSC from the proximity service application server.
- the 5G-DDNMF and/or PKMF of the relay user equipment in the VPLMN may exchange and publish authentication messages (Announce Auth.Message) with the 5G-DDNMF and/or PKMF of the relay user equipment in the HPLMN. This step is not executed when the relay user equipment is not roaming.
- step 6104 the 5GDDNMF and/or PKMF of the relay user equipment in the HPLMN returns the discovery security information (also referred to as the discovery security parameter), Current_Time and Max_Offset parameters, and the selected PC5 security protection algorithm associated with the RSC, and the relay user equipment stores the discovery security information and the selected PC5 algorithm together with the RSC.
- the discovery security parameter also referred to as the discovery security parameter
- Current_Time and Max_Offset parameters also referred to as the discovery security parameter
- the selected PC5 security protection algorithm associated with the RSC the relay user equipment stores the discovery security information and the selected PC5 algorithm together with the RSC.
- Steps 6105-6110 are for a discoverer UE or a monitoring UE, which may be referred to as a U2N remote UE or an end UE:
- Step 6105 For 5G proximity service U2N relay discovery, the 5G proximity service remote user equipment plays the role of discovering UE or monitoring UE.
- the 5G proximity service end user equipment plays the role of discovering UE or monitoring UE and sends a discovery key request to the 5G DDNMF and/or PKMF.
- the key request includes RSC and PC5 security capabilities of the 5G proximity service remote user equipment.
- the remote user equipment or end user equipment can provide a PLMN list, and the remote user equipment or end user equipment is authorized to use the 5G proximity service U2N relay service or U2U relay service in the PLMNs included in the list.
- the 5G DDNMF and/or PKMF of the remote user device or the end user device may check through UDM whether the remote user device is authorized to monitor U2N relay discovery or U2U relay discovery.
- the 5G DDNMF and/or PKMF of the remote user device or the end user device in the HPLMN may send a key discovery request to the 5G DDNMF and/or PKMF of the relay user device in the HPLMN, and the key discovery request information includes the PC5 user device security capabilities in step 6105.
- the 5G DDNMF and/or PKMF of the remote user equipment or the end user equipment discovers the 5G DDNMF and/or PKMF of the potential 5G proximity service U2N relay or U2U relay supporting the RSC based on the HPLMNs of the potential 5G proximity service U2N relay or U2U relay mapped to the RSC.
- the 5G DDNMF and/or PKMF may obtain the HPLMN of a potential 5G proximity service U2N relay or U2U relay in different ways (e.g., from the PCF or based on local configuration).
- Step 6107 if the PC5UE security capability in step 6104 includes the selected PC5 security protection algorithm, the 5G DDNMF and/or PKMF of the relay user equipment in the HPLMN sends a discovery key response message to the 5G DDNMF and/or PKMF of the remote user equipment in the HPLMN, and the message includes the discovery security information associated with the RSC and the selected PC5 security protection algorithm.
- a selected PC5 security protection algorithm is associated with the RSC.
- the 5G DDNMF and/or PKMF of the remote user equipment or end user equipment in the HPLMN may exchange and publish authentication messages with the 5G DDNMF and/or PKMF of the remote user equipment or end user equipment in the VPLMN. This step is not performed when the remote user equipment or end user equipment is not roaming.
- Step 6109 the 5G DDNMF and/or PKMF of the remote user device or the end user device returns the discovery security information, Current_Time and Max_Offset parameters, and the selected PC5 security protection algorithm associated with the RSC, and the remote user device or the end user device stores the discovery security information and the selected PC5 algorithm together with the RSC.
- Steps 6110 - 6112 are performed on PC 5 to perform discovery between user devices protected using discovery security information associated with the RSC.
- the remote user device or end user device may use the discovery security information received from its 5G DDNMF and/or PKMF to perform security protection on the broadcast information, and send the protected broadcast message including the RSC to the relay user device.
- step 6111 the relay user device performs security verification on the broadcast message received from the remote user device based on the discovery security information received from the 5G DDNMF and/or PKMF of the relay user device. After verification, the RSC corresponding to the broadcast message is matched with the RSC information configured by the relay user device itself. When the match is successful, step 6112 is executed. When the match is unsuccessful, it is not executed.
- Step 6112 The relay user equipment performs security protection on the response message based on the discovery security information received in step 6104, and sends the protected response message to the remote user equipment or the end user equipment.
- Step 6113 the remote user device or end user device performs security verification on the response message received from the relay user device based on the discovery security information received from its 5G DDNMF and/or PKMF.
- FIG7a is a schematic diagram of the structure of the first network device 101 proposed in an embodiment of the present disclosure.
- the first network device 101 includes: a transceiver module 7101.
- the transceiver module can be used to obtain the first information determined by the third network device, wherein the first information is used for proximity service discovery security, and the first information corresponds to the first service; send the first information to the first terminal and/or the second network device, and the second network device corresponds to the second terminal.
- the transceiver module 7101 is used to execute at least one of the communication steps such as sending and/or receiving performed by the first network device 101 in any of the above methods (for example, step 2101, step 2103, step 2105, step 2108, step 2109, step 2110, etc., but not limited to this), which will not be repeated here.
- the first network device 101 also includes a processing module for executing at least one of the other steps (for example, step 2102, step 2104, etc., but not limited to this) performed by the first network device 101 in any of the above methods, which will not be repeated here.
- obtaining the first information determined by the third network device includes any of the following: obtaining preconfigured first information, where the first information is determined by the third network device; or receiving the first information sent by the third network device.
- the transceiver module 7101 is further used to execute: receiving a first message sent by a first terminal, where the first message is used to request first information, and the first message carries an identifier of a first service.
- the first network device further includes a processing module, configured to determine, based on the identifier of the first service, that first information corresponding to the identifier of the first service is stored in the first network device.
- the first network device further includes a processing module for determining that the first network device does not store an identifier of the first service. The corresponding first information.
- the transceiver module 7101 is further used to execute: sending a second message to a third network device, where the second message is used to request the first information.
- the transceiver module 7101 is further used to execute: receiving a third message sent by a third network device, where the third message carries the first information.
- the third message also carries a timer corresponding to the first information, and the timer is used to determine whether the first information is expired.
- the first network device further includes a processing module configured to determine that the first information stored in the first network device is expired.
- the transceiver module 7101 is further used to execute: sending a fourth message to the third network device, where the fourth message is used to request to update the first information.
- receiving the first information sent by the third network device includes: receiving updated first information sent by the third network device under a first situation, wherein the first situation is that the third network device determines that the first information stored in the third network device is expired.
- FIG7b is a schematic diagram of the structure of the third network device 103 proposed in an embodiment of the present disclosure.
- the third network device 103 includes: a processing module 7301.
- the processing module can be used to determine the first information, the first information is used for proximity service discovery security, and the first information corresponds to the first service.
- the processing module 7301 is used to execute at least one of the communication determination steps (such as step 2107, step 2204, etc., but not limited to this) performed by the third network device 103 in any of the above methods, which will not be repeated here.
- the third network device 103 also includes a transceiver module for executing at least one of the other steps (such as step 2103, step 2105, etc., but not limited to this) performed by the third network device 103 in any of the above methods, which will not be repeated here.
- the third network device further includes a transceiver module for receiving a second message sent by the first network device, where the second message is used to request the first information.
- the third network device further includes a transceiver module for sending the first information to the first network device, and the first network device corresponds to the first terminal.
- the third network device further includes a transceiver module, configured to send a third message to the first network device, wherein the third message carries the first information.
- the third message also carries a timer corresponding to the first information, and the timer is used to determine whether the first information is expired.
- the processing module 7301 is further used to execute: determining that the first information stored in the third network device is expired.
- the third network device further includes a transceiver module configured to send updated first information to the first network element.
- the first information is preconfigured into the first network device.
- FIG7c is a schematic diagram of the structure of the second network device 102 proposed in an embodiment of the present disclosure.
- the third network device 102 includes: a transceiver module 7201.
- the transceiver module can be used to receive the first information sent by the first network device, the first information is used for proximity service discovery security, the first information corresponds to the first service, and the first network device corresponds to the first terminal.
- the transceiver module 7201 can be used to execute at least one of the sending and/or receiving communication steps (such as step 2110, step 2111, etc., but not limited to this) performed by the second network device 102 in any of the above methods, which will not be repeated here.
- the transceiver module 7201 is further used to execute: sending first information to the second terminal, wherein the first information is used for the second terminal to select and use the first information for security protection.
- the communication device 8100 includes one or more processors 8101.
- the processor 8101 may be a general-purpose processor or a dedicated processor, for example, a baseband processor or a central processing unit.
- the baseband processor may be used to process the communication protocol and the communication data
- the central processing unit may be used to control the communication device (such as a base station, a baseband chip, a terminal device, a terminal device chip, a DU or a CU, etc.), execute a program, and process the data of the program.
- the processor 8101 is used to call instructions so that the communication device 8100 executes any of the above methods.
- the communication device 8100 further includes one or more memories 8102 for storing instructions.
- the memory 8102 may also be outside the communication device 8100.
- the communication device 8100 further includes one or more transceivers 8103.
- the communication steps such as sending and receiving in the above method are executed by the transceiver 8103, and the other steps are executed by the processor 8101.
- the transceiver may include a receiver and a transmitter, and the receiver and the transmitter may be separate or integrated.
- the terms such as transceiver, transceiver unit, transceiver, transceiver circuit, etc. may be replaced with each other, the terms such as transmitter, transmission unit, transmitter, transmission circuit, etc. may be replaced with each other, and the terms such as receiver, receiving unit, receiver, receiving circuit, etc. may be replaced with each other.
- the communication device 8100 further includes one or more interface circuits 8104, the interface circuit 8104 is connected to the memory 8102, and the interface circuit 8104 is connected to the memory 8102.
- the circuit 8104 may be used to receive signals from the memory 8102 or other devices, and may be used to send signals to the memory 8102 or other devices.
- the interface circuit 8104 may read instructions stored in the memory 8102 and send the instructions to the processor 8101.
- the communication device 8100 described in the above embodiments may be a network device or a terminal, but the scope of the communication device 8100 described in the present disclosure is not limited thereto, and the structure of the communication device 8100 may not be limited by FIG. 8a.
- the communication device may be an independent device or may be part of a larger device.
- the communication device may be: 1) an independent integrated circuit IC, or a chip, or a chip system or subsystem; (2) a collection of one or more ICs, optionally, the above IC collection may also include a storage component for storing data and programs; (3) an ASIC, such as a modem; (4) a module that can be embedded in other devices; (5) a receiver, a terminal device, an intelligent terminal device, a cellular phone, a wireless device, a handheld device, a mobile unit, a vehicle-mounted device, a network device, a cloud device, an artificial intelligence device, etc.; (6) others, etc.
- Fig. 8b is a schematic diagram of the structure of a chip 8200 provided in an embodiment of the present disclosure.
- the communication device 8100 may be a chip or a chip system
- the chip 8200 includes one or more processors 8201, and the processor 8201 is used to call instructions so that the chip 8200 executes any of the above methods.
- the chip 8200 further includes one or more interface circuits 8202, which are connected to the memory 8203.
- the interface circuit 8202 can be used to receive signals from the memory 8203 or other devices, and the interface circuit 8202 can be used to send signals to the memory 8203 or other devices.
- the interface circuit 8202 can read the instructions stored in the memory 8203 and send the instructions to the processor 8201.
- the terms such as interface circuit, interface, transceiver pin, and transceiver can be replaced with each other.
- the chip 8200 further includes one or more memories 8203 for storing instructions.
- the memory 8203 may be outside the chip 8200.
- the present disclosure also proposes a storage medium, on which instructions are stored, and when the instructions are executed on the communication device 8100, the communication device 8100 executes any of the above methods.
- the storage medium is an electronic storage medium.
- the storage medium is a computer-readable storage medium, but is not limited to this, and it can also be a storage medium readable by other devices.
- the storage medium can be a non-transitory storage medium, but is not limited to this, and it can also be a temporary storage medium.
- the present disclosure also proposes a program product, which, when executed by the communication device 8100, enables the communication device 8100 to execute any of the above methods.
- the program product is a computer program product.
- the present disclosure also proposes a computer program, which, when executed on a computer, causes the computer to execute any one of the above methods.
- the computer program product includes one or more computer programs.
- the computer can be a general-purpose computer, a special-purpose computer, a computer network, or other programmable device.
- the computer program can be stored in a computer-readable storage medium, or transmitted from one computer-readable storage medium to another computer-readable storage medium.
- the computer program can be transmitted from a website site, computer, server or data center by wired (e.g., coaxial cable, optical fiber, digital subscriber line (digital subscriber line, DSL)) or wireless (e.g., infrared, wireless, microwave, etc.) mode to another website site, computer, server or data center.
- the computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device such as a server or data center that includes one or more available media integrated.
- the available medium may be a magnetic medium (e.g., a floppy disk, a hard disk, a magnetic tape), an optical medium (e.g., a high-density digital video disc (DVD)), or a semiconductor medium (e.g., a solid state disk (SSD)), etc.
- a magnetic medium e.g., a floppy disk, a hard disk, a magnetic tape
- an optical medium e.g., a high-density digital video disc (DVD)
- DVD high-density digital video disc
- SSD solid state disk
- the corresponding relationships shown in the tables in the present disclosure can be configured or predefined.
- the values of the information in each table are only examples and can be configured as other values, which are not limited by the present disclosure.
- the corresponding relationships shown in some rows may not be configured.
- appropriate deformation adjustments can be made based on the above table, such as splitting, merging, etc.
- the names of the parameters shown in the titles of the above tables can also use other names that can be understood by the communication device, and the values or representations of the parameters can also be other values or representations that can be understood by the communication device.
- other data structures can also be used, such as arrays, queues, containers, stacks, linear lists, pointers, linked lists, trees, graphs, structures, classes, heaps, hash tables or hash tables.
- the predefined in the present disclosure may be understood as defined, predefined, stored, pre-stored, pre-negotiated, pre-configured, solidified, or pre-burned.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
本公开涉及通信技术领域,尤其涉及一种通信方法、装置及存储介质。The present disclosure relates to the field of communication technology, and in particular to a communication method, device and storage medium.
中继服务码(Relay Service Code,RSC)可以用于标识终端到网络(UE to Network,U2N)中继设备或者终端到终端(UE to UE,U2U)中继设备与该中继设备可以提供服务的被授权远端设备或端设备之间的连接服务。The Relay Service Code (RSC) can be used to identify the connection service between a terminal-to-network (UE to Network, U2N) relay device or a terminal-to-terminal (UE to UE, U2U) relay device and an authorized remote device or end device that the relay device can provide service.
发明内容Summary of the invention
本公开提出一种通信方法、装置及存储介质。The present disclosure provides a communication method, a device and a storage medium.
根据本公开实施例的第一方面,提出了一种通信方法,由第一网络设备执行,第一网络设备对应第一终端,方法包括:获取第三网络设备确定的第一信息,第一信息用于邻近服务安全,第一信息与第一业务对应;向第一终端和/或第二网络设备发送第一信息,第二网络设备对应第二终端。According to the first aspect of an embodiment of the present disclosure, a communication method is proposed, which is executed by a first network device, and the first network device corresponds to a first terminal. The method includes: obtaining first information determined by a third network device, the first information is used for proximity service security, and the first information corresponds to a first service; sending the first information to the first terminal and/or the second network device, and the second network device corresponds to the second terminal.
在上述方法中,第一网络设备获取第三网络设备确定的第一信息,并将第一信息发送至第一终端和/或第二网络设备,基于第三网络设备确定的第一信息的唯一性,实现了对于同一业务的RSC生成唯一的第一信息。In the above method, the first network device obtains the first information determined by the third network device and sends the first information to the first terminal and/or the second network device. Based on the uniqueness of the first information determined by the third network device, the RSC for the same service generates unique first information.
根据本公开实施例的第二方面,提出了一种通信方法,方法由第三网络设备设备执行,方法包括:确定第一信息,第一信息用于邻近服务安全,第一信息与第一业务对应。According to a second aspect of an embodiment of the present disclosure, a communication method is proposed. The method is executed by a third network device, and the method includes: determining first information, the first information is used for proximity service security, and the first information corresponds to a first service.
在上述方法中,第三网络设备基于第一业务标识确定唯一的对应的第一信息,实现了对于同一业务的RSC生成唯一的第一信息。In the above method, the third network device determines the unique corresponding first information based on the first service identifier, thereby realizing generation of unique first information for the RSC of the same service.
根据本公开实施例的第三方面,提出了一种通信方法,方法由第二网络设备设备执行,方法包括:接收第一网络设备发送的第一信息,第一信息用于邻近服务安全,第一信息与第一业务对应,第一网络设备对应第一终端。According to the third aspect of an embodiment of the present disclosure, a communication method is proposed, which is executed by a second network device. The method includes: receiving first information sent by a first network device, the first information is used for proximity service security, the first information corresponds to a first service, and the first network device corresponds to a first terminal.
在上述方法中,第二网络设备接收第一网络设备的第一信息,第二网络设备可以将该第一信息发送至第二终端处,实现了对于第一信息的获取,由于第三网络设备确定的第一信息具有唯一性,实现了对于同一业务的RSC生成唯一的第一信息。In the above method, the second network device receives the first information from the first network device, and the second network device can send the first information to the second terminal, thereby obtaining the first information. Since the first information determined by the third network device is unique, the RSC for the same service can generate unique first information.
根据本公开实施例的第四方面,提出了一种第一网络设备,包括收发模块,用于:获取第三网络设备确定的第一信息,第一信息用于邻近服务发现安全,第一信息与第一业务对应;向第一终端和/或第二网络设备发送第一信息,第二网络设备对应第二终端。According to the fourth aspect of an embodiment of the present disclosure, a first network device is proposed, comprising a transceiver module, used to: obtain first information determined by a third network device, the first information being used for proximity service discovery security, the first information corresponding to a first service; and send the first information to a first terminal and/or a second network device, the second network device corresponding to a second terminal.
根据本公开实施例的第五方面,提出了一种第三网络设备,包括处理模块,用于:确定第一信息,第一信息用于邻近服务发现安全,第一信息与第一业务对应。According to a fifth aspect of an embodiment of the present disclosure, a third network device is proposed, comprising a processing module, configured to: determine first information, wherein the first information is used for proximity service discovery security, and the first information corresponds to a first service.
根据本公开实施例的第六方面,提出了一种第二网络设备,包括收发模块,用于:接收第一网络设备发送的第一信息,第一信息用于邻近服务发现安全,第一信息与第一业务对应,第一网络设备对应第一终端。According to the sixth aspect of an embodiment of the present disclosure, a second network device is proposed, comprising a transceiver module, for: receiving first information sent by a first network device, the first information being used for proximity service discovery security, the first information corresponding to a first service, and the first network device corresponding to a first terminal.
根据本公开实施例的第七方面,提出了一种通信设备,其中,包括:收发器;存储器;处理器,分别与收发器及存储器连接,配置为通过执行存储器上的计算机可执行指令,控制收发器的无线信号收发,并能够执行第一方面、第二方面、第三方面中任一方面的通信方法。According to the seventh aspect of the embodiment of the present disclosure, a communication device is proposed, which includes: a transceiver; a memory; a processor, which is connected to the transceiver and the memory respectively, and is configured to control the wireless signal reception and transmission of the transceiver by executing computer-executable instructions on the memory, and can execute the communication method of any one of the first aspect, the second aspect, and the third aspect.
根据本公开实施例的第八方面,提出了一种存储介质,该存储介质存储有指令,当该指令在通信设备 上运行时,使得通信设备执行如第一方面、第二方面、第三方面中任一方面的通信方法。According to an eighth aspect of the embodiment of the present disclosure, a storage medium is provided, wherein the storage medium stores an instruction. When the instruction is in a communication device, When the communication device is run on the communication device, it enables the communication device to execute the communication method of any one of the first aspect, the second aspect, and the third aspect.
根据本公开实施例的第九方面,提出了一种通信系统,包括第一网络设备、第三网络设备和第二网络设备,其中,第一网络设备被配置为实现第一方面的方法,第三网络设备被配置为实现第二方面的方法,第二网络设备被配置为实现第三方面的方法。According to a ninth aspect of an embodiment of the present disclosure, a communication system is proposed, comprising a first network device, a third network device, and a second network device, wherein the first network device is configured to implement the method of the first aspect, the third network device is configured to implement the method of the second aspect, and the second network device is configured to implement the method of the third aspect.
本公开上述的和/或附加的方面和优点从下面结合附图对实施例的描述中将变得明显和容易理解,其中:The above and/or additional aspects and advantages of the present disclosure will become apparent and easily understood from the following description of the embodiments in conjunction with the accompanying drawings, in which:
图1为本公开实施例提供的一些通信系统的架构示意图;FIG1 is a schematic diagram of the architecture of some communication systems provided by embodiments of the present disclosure;
图2a-2b为本公开实施例所提供的一种通信方法的交互示意图;2a-2b are interactive schematic diagrams of a communication method provided by an embodiment of the present disclosure;
图3a-3c为本公开实施例所提供的一些通信方法的流程示意图;3a-3c are flowchart diagrams of some communication methods provided by embodiments of the present disclosure;
图4a-4c为本公开实施例所提供的另一些通信方法的流程示意图;4a-4c are flowchart diagrams of other communication methods provided by embodiments of the present disclosure;
图5a-5c为本公开实施例所提供的另一些通信方法的交互示意图;5a-5c are interaction schematic diagrams of other communication methods provided by embodiments of the present disclosure;
图6为本公开实施例所提供的另一些通信方法的交互示意图;FIG6 is a schematic diagram of interaction of other communication methods provided by embodiments of the present disclosure;
图7a为本公开一个实施例所提供的第一网络设备的结构示意图;FIG7a is a schematic diagram of the structure of a first network device provided by an embodiment of the present disclosure;
图7b为本公开一个实施例所提供的第三网络设备的结构示意图;FIG7b is a schematic diagram of the structure of a third network device provided by an embodiment of the present disclosure;
图7c为本公开一个实施例所提供的第二网络设备的结构示意图;FIG7c is a schematic diagram of the structure of a second network device provided by an embodiment of the present disclosure;
图8a是本公开一个实施例所提供的一种通信设备的结构示意图;FIG8a is a schematic diagram of the structure of a communication device provided by an embodiment of the present disclosure;
图8b为本公开一个实施例所提供的一种芯片的结构示意图。FIG8b is a schematic diagram of the structure of a chip provided by an embodiment of the present disclosure.
本公开的方法可以用于实现针对同一业务标识生成唯一的发现安全信息,避免针对同一业务标识生成多套发现安全信息时终端的选择混乱问题。The method disclosed in the present invention can be used to realize generation of unique discovery security information for the same service identifier, thereby avoiding the problem of terminal selection confusion when multiple sets of discovery security information are generated for the same service identifier.
本公开实施例提出了一种通信方法、装置及存储介质。The embodiments of the present disclosure provide a communication method, a device, and a storage medium.
第一方面,本公开实施例提出了一种通信方法,该方法由第一网络设备执行,方法包括:获取第三网络设备确定的第一信息,第一信息用于邻近服务安全,第一信息与第一业务对应;向第一终端和/或第二网络设备发送第一信息,第二网络设备对应第二终端。In a first aspect, an embodiment of the present disclosure proposes a communication method, which is executed by a first network device, and the method includes: obtaining first information determined by a third network device, the first information is used for proximity service security, and the first information corresponds to a first service; sending the first information to a first terminal and/or a second network device, and the second network device corresponds to a second terminal.
在上述实施例中,第一网络设备获取第一信息,其中第一信息由第三网络设备确定,由于第一信息与第一业务对应,第三网络设备确定的第一信息具有唯一性,第一网络设备获取该第一信息后可以提供给第一终端和/或第二网络设备,便于第一终端可以使用唯一的第一信息进行安全性保护、安全性验证等操作,可以避免终端出现操作混乱。In the above embodiment, the first network device obtains the first information, wherein the first information is determined by the third network device. Since the first information corresponds to the first service, the first information determined by the third network device is unique. After the first network device obtains the first information, it can provide it to the first terminal and/or the second network device, so that the first terminal can use the unique first information to perform security protection, security verification and other operations, thereby avoiding operational confusion in the terminal.
结合第一方面的一些实施例,在一些实施例中,方法还包括:获取第三网络设备确定的第一信息包括以下任一项:获取预配置的第一信息,第一信息由第三网络设备确定;或;接收第三网络设备发送的第一信息。In combination with some embodiments of the first aspect, in some embodiments, the method also includes: obtaining first information determined by the third network device includes any one of the following: obtaining preconfigured first information, the first information is determined by the third network device; or; receiving first information sent by the third network device.
在上述实施例中,第一网络设备可以采用两种不同的方式对第一信息及进行获取,其中两种获取方式获取的第一信息均由第三网络设备确定,具有唯一性,便于第一终端可以使用唯一的第一信息进行安全性保护、安全性验证等操作,可以避免终端出现操作混乱。此外,第三网络设备可以通过预配置的方式向第一网络设备提供第一信息,也可以向第一网络设备通过例如信令的方式发送第一信息,提高了灵活性,拓展了应用边界。In the above embodiment, the first network device can use two different methods to obtain the first information, wherein the first information obtained by the two acquisition methods is determined by the third network device and is unique, so that the first terminal can use the unique first information to perform security protection, security verification and other operations, which can avoid operational confusion in the terminal. In addition, the third network device can provide the first information to the first network device in a pre-configured manner, or send the first information to the first network device in a manner such as signaling, which improves flexibility and expands the application boundary.
结合第一方面的一些实施例,在一些实施例中方法还包括:接收第一终端发送的第一消息,第一消息用于请求第一信息,第一消息携带第一业务的标识。In combination with some embodiments of the first aspect, in some embodiments the method further includes: receiving a first message sent by a first terminal, where the first message is used to request first information, and the first message carries an identifier of a first service.
在上述实施例中,第一网络设备接收第一终端发送的第一消息,第一消息携带第一业务的标识,便于第一网络设备可以响应第一终端的请求,获取与第一业务标识对应的唯一的第一信息。在该方案下,第一网络设备可以仅获取第一终端所请求的第一业务对应的第一信息,避免信息冗余,提高通信效率。In the above embodiment, the first network device receives the first message sent by the first terminal, and the first message carries the identifier of the first service, so that the first network device can respond to the request of the first terminal and obtain the unique first information corresponding to the first service identifier. Under this scheme, the first network device can only obtain the first information corresponding to the first service requested by the first terminal, avoiding information redundancy and improving communication efficiency.
结合第一方面的一些实施例,在一些实施例中,方法还包括:基于第一业务的标识,确定第一网络设备中存储有第一业务的标识对应的第一信息。 In combination with some embodiments of the first aspect, in some embodiments, the method further includes: based on the identifier of the first service, determining that first information corresponding to the identifier of the first service is stored in the first network device.
在上述实施例中,第一网络设备可以基于第一业务的标识确定本地是否存储对应的第一信息,便于确认第一网络设备对第一信息的存储情况,并对不同情况进行不同的处理。通过确定第一网络设备中是否已经存储第一信息,可以避免第一网络设备向第三网络设备多次请求同一业务的第一信息,造成终端侧使用第一信息的混乱。换言之,当第一网络设备中存储有第一业务标识对应的第一信息时,可以将该存储的第一信息提供给终端,无需再向第三网络设备请求。In the above embodiment, the first network device can determine whether the corresponding first information is stored locally based on the identifier of the first service, so as to confirm the storage status of the first information by the first network device and perform different processing for different situations. By determining whether the first information is already stored in the first network device, it is possible to avoid the first network device repeatedly requesting the first information of the same service from the third network device, causing confusion in the use of the first information on the terminal side. In other words, when the first information corresponding to the first service identifier is stored in the first network device, the stored first information can be provided to the terminal without requesting it from the third network device.
结合第一方面的一些实施例,在一些实施例中,方法还包括:确定第一网络设备中未存储有第一业务的标识对应的第一信息;向第三网络设备发送第二消息,第二消息用于请求所述第一信息。In combination with some embodiments of the first aspect, in some embodiments, the method further includes: determining that first information corresponding to an identifier of the first service is not stored in the first network device; and sending a second message to a third network device, the second message being used to request the first information.
在上述实施例中,第一网络设备未存储有第一业务标识对应的第一信息时,可以向第三网络设备发送请求消息请求对应的第一信息,通过与第三网络设备交互进行请求,便于得到具有唯一性的第一信息。In the above embodiment, when the first network device does not store the first information corresponding to the first service identifier, it can send a request message to the third network device to request the corresponding first information, and obtain the unique first information by interacting with the third network device to make the request.
结合第一方面的一些实施例,在一些实施例中,接收第三网络设备发送的第一信息包括:接收第三网络设备发送的第三消息,第三消息中携带第一信息。In combination with some embodiments of the first aspect, in some embodiments, receiving the first information sent by the third network device includes: receiving a third message sent by the third network device, wherein the third message carries the first information.
在上述实施例中,第三消息中还携带第一信息对应的定时器,定时器用于确定第一信息是否过期。In the above embodiment, the third message also carries a timer corresponding to the first information, and the timer is used to determine whether the first information is expired.
在上述实施例中,第一网络设备可以接收第三网络设备发送的第三消息,第三消息携带第一信息以及第一信息对应的定时器,其中第一信息由第三网络设备确定,具有唯一性,便于第一终端可以使用该唯一的第一信息进行安全性保护、安全性验证等操作,避免终端的操作混乱;定时器信息可以用于反映第一信息的时效信息,便于第一网络设备基于定时器信息对第一信息的时效性进行判定。In the above embodiment, the first network device can receive a third message sent by a third network device, and the third message carries the first information and a timer corresponding to the first information, wherein the first information is determined by the third network device and is unique, so that the first terminal can use the unique first information to perform security protection, security verification and other operations to avoid operational confusion of the terminal; the timer information can be used to reflect the timeliness information of the first information, so that the first network device can determine the timeliness of the first information based on the timer information.
结合第一方面的一些实施例,在一些实施例中,方法还包括:确定第一网络设备中存储的第一信息过期;向第三网络设备发送第四消息,第四消息用于请求更新第一信息。In combination with some embodiments of the first aspect, in some embodiments, the method further includes: determining that the first information stored in the first network device is expired; and sending a fourth message to the third network device, the fourth message being used to request an update of the first information.
在上述实施例中,第一网络设备中存储的第一信息过期时,可以向第三网络设备发送第四消息,第四消息用于请求更新第一信息,可以实现对第一信息的更新,第三网络设备可以基于第四消息对第一信息进行更新,提高通信稳定性。在本方案下,第一网络设备具有判断第一信息是否过期的能力。In the above embodiment, when the first information stored in the first network device expires, a fourth message can be sent to the third network device, and the fourth message is used to request to update the first information, so as to realize the update of the first information. The third network device can update the first information based on the fourth message to improve the communication stability. Under this scheme, the first network device has the ability to determine whether the first information is expired.
结合第一方面的一些实施例,在一些实施例中,接收第三网络设备发送的第一信息包括:接收第三网络设备在第一情况下发送的更新的第一信息,其中第一情况为第三网络设备确定第三网络设备中存储的第一信息过期。In combination with some embodiments of the first aspect, in some embodiments, receiving first information sent by a third network device includes: receiving updated first information sent by the third network device in a first situation, wherein the first situation is that the third network device determines that the first information stored in the third network device is expired.
在上述实施例中,第一网络设备可以获取第三网络设备更新后的第一信息,可以对第一网络设备本地存储的第一信息进行更新,便于向第一终端及第二网络设备提供更新后的第一信息。在本方案下,第三网络设备具有判断第一信息是否过期的能力,无需第一网络设备判断后向第三网络设备请求更新第一信息,因此节省了信令消耗。In the above embodiment, the first network device can obtain the first information updated by the third network device, and can update the first information locally stored by the first network device, so as to provide the updated first information to the first terminal and the second network device. Under this solution, the third network device has the ability to determine whether the first information is expired, and the first network device does not need to request the third network device to update the first information after determination, thus saving signaling consumption.
在本公开第一方面的实施例中,第一网络设备通过获取第三网络设备确定的第一信息,并向第一终端和/或第二网络设备发送第一信息,可以实现,即使存在多个第一网络设备时,生成的第一信息相同,便于系统使用安全信息执行安全性保护、安全性验证等操作。In an embodiment of the first aspect of the present disclosure, the first network device obtains the first information determined by the third network device and sends the first information to the first terminal and/or the second network device. This can achieve the goal that even when there are multiple first network devices, the generated first information is the same, thereby facilitating the system to use security information to perform security protection, security verification and other operations.
第二方面,本公开实施例提出了一种通信方法,方法由第三网络设备执行,方法包括:确定第一信息,第一信息用于邻近服务安全,第一信息与第一业务对应。In a second aspect, an embodiment of the present disclosure proposes a communication method, which is executed by a third network device. The method includes: determining first information, where the first information is used for proximity service security and corresponds to a first service.
在上述实施例中,第三网络设备可以基于第一业务的标识确定对应的第一信息,第三网络设备生成的第一信息具有唯一性,第一终端可以使用唯一的第一信息进行安全性保护、安全性验证等操作,可以避免终端出现操作混乱。In the above embodiment, the third network device can determine the corresponding first information based on the identifier of the first service. The first information generated by the third network device is unique. The first terminal can use the unique first information to perform security protection, security verification and other operations, thereby avoiding operational confusion in the terminal.
结合第二方面的一些实施例,在一些实施例中,方法还包括:接收第一网络设备发送的第二消息,第二消息用于请求第一信息。In combination with some embodiments of the second aspect, in some embodiments, the method further includes: receiving a second message sent by the first network device, where the second message is used to request the first information.
在上述实施例中,第三网络设备可以基于收到的第二消息确定第一业务标识对应的第一信息,可以实现基于第一网络设备的响应,生成第一信息。In the above embodiment, the third network device may determine the first information corresponding to the first service identifier based on the received second message, and may generate the first information based on the response of the first network device.
结合第二方面的一些实施例,在一些实施例中方法还包括:向第一网络设备发送第一信息,第一网络设备对应第一终端。所述第一信息由第三消息承载。In conjunction with some embodiments of the second aspect, in some embodiments, the method further includes: sending first information to a first network device, the first network device corresponding to the first terminal. The first information is carried by a third message.
在上述实施例中,第三网络设备可以向第一网络设备发送第三消息,第三消息携带第一信息,可以实现将第一业务标识对应的第一信息提供给第一网络设备,便于第一网络设备对其进行存储。In the above embodiment, the third network device may send a third message to the first network device. The third message carries the first information, and can provide the first information corresponding to the first service identifier to the first network device, so that the first network device can store it.
结合第二方面的一些实施例,在一些实施例中,第三消息中还携带第一信息对应的定时器,定时器用于确定第一信息是否过期。 In combination with some embodiments of the second aspect, in some embodiments, the third message also carries a timer corresponding to the first information, and the timer is used to determine whether the first information is expired.
在上述实施例中,第三消息中还携带第一信息对应的定时器,定时器信息可以反应第一信息的时效信息,便于第一网络设备能够对第一信息的时效性进行判定。In the above embodiment, the third message also carries a timer corresponding to the first information. The timer information can reflect the timeliness information of the first information, so that the first network device can determine the timeliness of the first information.
结合第二方面的一些实施例,在一些实施例中,向第一网络设备发送第一信息包括:确定第三网络设备中存储的第一信息过期;向第一网络设备发送更新的第一信息。In combination with some embodiments of the second aspect, in some embodiments, sending the first information to the first network device includes: determining that the first information stored in the third network device is expired; and sending updated first information to the first network device.
在上述实施例中,第三网络设备确定本地存储的第一信息过期时,可以对第一信息进行更新,并将更新后的第一信息提供给第一网络设备,便于第一网络设备对存储的第一信息进行更新。在本方案下,第三网络设备具有判断第一信息是否过期的能力,无需第一网络设备判断后向第三网络设备请求更新第一信息,因此节省了信令消耗。In the above embodiment, when the third network device determines that the locally stored first information is expired, it can update the first information and provide the updated first information to the first network device, so that the first network device can update the stored first information. Under this solution, the third network device has the ability to determine whether the first information is expired, and the first network device does not need to request the third network device to update the first information after determination, thus saving signaling consumption.
结合第二方面的一些实施例,在一些实施例中,第一信息被预配置到第一网络设备中。In combination with some embodiments of the second aspect, in some embodiments, the first information is preconfigured into the first network device.
在上述实施例中,第一信息可以通过预配置方法存储在第一网络设备中,第一信息由第三网络设备确定,可以实现,第一网络设备通过预配置方式获得第一信息。第三网络设备可以通过预配置的方式向第一网络设备提供第一信息,也可以向第一网络设备通过例如信令的方式发送第一信息,提高了灵活性,拓展了应用边界。In the above embodiment, the first information can be stored in the first network device through a preconfiguration method, and the first information is determined by the third network device, so that the first network device can obtain the first information through a preconfiguration method. The third network device can provide the first information to the first network device through a preconfiguration method, or send the first information to the first network device through a signaling method, which improves flexibility and expands the application boundary.
在本公开第二方面的实施例中,第三网络设备通过确定第一信息,能够确定第一业务的标识对应的唯一的第一信息,能够实现即使存在多个第一网络设备时,生成的第一信息相同,便于系统使用安全信息执行安全性保护、安全性验证等操作。In the embodiment of the second aspect of the present disclosure, the third network device can determine the unique first information corresponding to the identifier of the first service by determining the first information, and can achieve that even when there are multiple first network devices, the generated first information is the same, which facilitates the system to use security information to perform security protection, security verification and other operations.
第三方面,本公开实施例提出了一种通信方法,方法由第二网络设备执行,第二网络设备对应第二终端,方法包括:接收第一网络设备发送的第一信息,第一信息用于邻近服务安全,第一信息与第一业务对应,第一网络设备对应第一终端。In a third aspect, an embodiment of the present disclosure proposes a communication method, which is executed by a second network device, and the second network device corresponds to a second terminal. The method includes: receiving first information sent by a first network device, the first information is used for proximity service security, the first information corresponds to a first service, and the first network device corresponds to a first terminal.
在上述实施例中,第二网络设备可以接收第一网络设备发送的第一信息,可以实现对第一业务标识对应的第一信息进行获取。In the above embodiment, the second network device can receive the first information sent by the first network device, and can obtain the first information corresponding to the first service identifier.
结合第三方面的一些实施例,在一些实施例中,方法还包括:向第二终端发送第一信息,其中,第一信息用于供第二终端选择并使用所述第一信息进行安全保护。In combination with some embodiments of the third aspect, in some embodiments, the method further includes: sending first information to the second terminal, wherein the first information is used for the second terminal to select and use the first information for security protection.
在上述实施例中,第二网络设备可以将第一信息发送给第二终端,便于第二终端采用第一信息进行安全性保护、安全性验证等操作。In the above embodiment, the second network device may send the first information to the second terminal, so that the second terminal can use the first information to perform security protection, security verification and other operations.
在本公开第三方面的实施例中,第二网络设备接收第一网络设备发送的第一信息,并将第一信息发送至第二终端,由于第一信息由第三网络设备确认,具有唯一性。可以实现即使存在多个第一网络设备时,生成的第一信息相同,便于系统使用安全信息执行安全性保护、安全性验证等操作。In an embodiment of the third aspect of the present disclosure, the second network device receives the first information sent by the first network device and sends the first information to the second terminal. Since the first information is confirmed by the third network device, it is unique. Even if there are multiple first network devices, the generated first information is the same, which facilitates the system to use security information to perform security protection, security verification and other operations.
第四方面,本公开实施例提出了一种第一网络设备,包括收发模块,用于获取第三网络设备确定的第一信息,第一信息用于邻近服务发现安全,第一信息与第一业务对应;向第一终端和/或第二网络设备发送第一信息,第二网络设备对应第二终端。In the fourth aspect, an embodiment of the present disclosure proposes a first network device, including a transceiver module, for obtaining first information determined by a third network device, the first information being used for proximity service discovery security, and the first information corresponding to a first service; and sending the first information to a first terminal and/or a second network device, the second network device corresponding to a second terminal.
第五方面,本公开实施例提出了一种第三网络设备,包括处理模块,用于:确定第一信息,第一信息用于邻近服务发现安全,第一信息与第一业务对应。In a fifth aspect, an embodiment of the present disclosure proposes a third network device, including a processing module, for determining first information, where the first information is used for proximity service discovery security, and the first information corresponds to a first service.
第六方面,本公开实施例提出了一种第二网络设备,包括收发模块,用于:接收第一网络设备发送的第一信息,第一信息用于邻近服务发现安全,第一信息与第一业务对应,第一网络设备对应第一终端。In a sixth aspect, an embodiment of the present disclosure proposes a second network device, comprising a transceiver module, for: receiving first information sent by a first network device, the first information being used for proximity service discovery security, the first information corresponding to a first service, and the first network device corresponding to a first terminal.
第七方面,本公开实施例提出了通信设备,上述包括:收发器;存储器;处理器,分别与收发器及存储器连接,配置为通过执行存储器上的计算机可执行指令,控制收发器的无线信号收发,并能够执行如第一方面、第二方面和第三方面,第一方面、第二方面和第三方面的可选实现方式所描述的通信方法。In the seventh aspect, an embodiment of the present disclosure proposes a communication device, which includes: a transceiver; a memory; a processor, which is connected to the transceiver and the memory respectively, and is configured to control the wireless signal reception and transmission of the transceiver by executing computer-executable instructions on the memory, and can execute the communication method described in the first aspect, the second aspect and the third aspect, and the optional implementation methods of the first aspect, the second aspect and the third aspect.
第八方面,本公开实施例提出了存储介质,计算机存储介质存储有计算机可执行指令;计算机可执行指令被处理器执行后,能够执行如第一方面、第一方面的可选实现方式、第二方面、第二方面的可选实现方式、第三方面和第三方面的可选实现方式所描述的方法。In an eighth aspect, an embodiment of the present disclosure proposes a storage medium, wherein the computer storage medium stores computer executable instructions; after the computer executable instructions are executed by a processor, the method described in the first aspect, the optional implementation of the first aspect, the second aspect, the optional implementation of the second aspect, the third aspect, and the optional implementation of the third aspect can be executed.
第九方面,本公开实施例提出了通信系统,上述通信系统包括:第一网络设备、第三网络设备和第二网络设备;其中,上述第一网络设备被配置为执行如第一方面和第一方面的可选实现方式所描述的方法,上述第三网络设备被配置为执行如第二方面和第二方面的可选实现方式所描述的方法,上述第二网络设备被配置为执行如第三方面和第三方面的可选实现方式所描述的方法。In a ninth aspect, an embodiment of the present disclosure proposes a communication system, which includes: a first network device, a third network device, and a second network device; wherein the first network device is configured to execute the method described in the first aspect and the optional implementation of the first aspect, the third network device is configured to execute the method described in the second aspect and the optional implementation of the second aspect, and the second network device is configured to execute the method described in the third aspect and the optional implementation of the third aspect.
可以理解地,上述第一网络设备、第二网络设备、第三网络设备、通信设备、通信系统、存储介质均 用于执行本公开实施例所提出的方法。因此,其所能达到的有益效果可以参考对应方法中的有益效果,此处不再赘述。It can be understood that the first network device, the second network device, the third network device, the communication device, the communication system, and the storage medium are all It is used to execute the method proposed in the embodiment of the present disclosure. Therefore, the beneficial effects that can be achieved can refer to the beneficial effects in the corresponding method, which will not be repeated here.
本公开实施例提出了通信方法、装置及存储介质。在一些实施例中,通信方法与信息处理方法、通信方法等术语可以相互替换,装置与终端、网络设备、通信装置等术语可以相互替换,信息处理系统、通信系统等术语可以相互替换。The embodiments of the present disclosure provide a communication method, an apparatus, and a storage medium. In some embodiments, the terms communication method, information processing method, communication method, etc. can be interchangeable, the terms apparatus, terminal, network device, communication device, etc. can be interchangeable, and the terms information processing system, communication system, etc. can be interchangeable.
本公开实施例并非穷举,仅为部分实施例的示意,不作为对本公开保护范围的具体限制。在不矛盾的情况下,某一实施例中的每个步骤均可以作为独立实施例来实施,且各步骤之间可以任意组合,例如,在某一实施例中去除部分步骤后的方案也可以作为独立实施例来实施,且在某一实施例中各步骤的顺序可以任意交换,另外,某一实施例中的可选实现方式可以任意组合;此外,各实施例之间可以任意组合,例如,不同实施例的部分或全部步骤可以任意组合,某一实施例可以与其他实施例的可选实现方式任意组合。The embodiments of the present disclosure are not exhaustive, but are only illustrative of some embodiments, and are not intended to be a specific limitation on the scope of protection of the present disclosure. In the absence of contradiction, each step in a certain embodiment can be implemented as an independent embodiment, and the steps can be arbitrarily combined. For example, a solution after removing some steps in a certain embodiment can also be implemented as an independent embodiment, and the order of the steps in a certain embodiment can be arbitrarily exchanged. In addition, the optional implementation methods in a certain embodiment can be arbitrarily combined; in addition, the embodiments can be arbitrarily combined, for example, some or all steps of different embodiments can be arbitrarily combined, and a certain embodiment can be arbitrarily combined with the optional implementation methods of other embodiments.
在各本公开实施例中,如果没有特殊说明以及逻辑冲突,各实施例之间的术语和/或描述具有一致性,且可以互相引用,不同实施例中的技术特征根据其内在的逻辑关系可以组合形成新的实施例。In each embodiment of the present disclosure, unless otherwise specified or there is a logical conflict, the terms and/or descriptions between the embodiments are consistent and can be referenced to each other, and the technical features in different embodiments can be combined to form a new embodiment based on their internal logical relationships.
本公开实施例中所使用的术语只是为了描述特定实施例的目的,而并非作为对本公开的限制。The terms used in the embodiments of the present disclosure are only for the purpose of describing specific embodiments and are not intended to limit the present disclosure.
在本公开实施例中,除非另有说明,以单数形式表示的元素,如“一个”、“一种”、“该”、“上述”、“所述”、“前述”、“这一”等,可以表示“一个且只有一个”,也可以表示“一个或多个”、“至少一个”等。例如,在翻译中使用如英语中的“a”、“an”、“the”等冠词(article)的情况下,冠词之后的名词可以理解为单数表达形式,也可以理解为复数表达形式。In the embodiments of the present disclosure, unless otherwise specified, elements expressed in the singular form, such as "a", "an", "the", "above", "said", "aforementioned", "this", etc., may mean "one and only one", or "one or more", "at least one", etc. For example, when using articles such as "a", "an", "the" in English in translation, the noun after the article may be understood as a singular expression or a plural expression.
在本公开实施例中,“多个”是指两个或两个以上。In the embodiments of the present disclosure, “plurality” refers to two or more.
在一些实施例中,“至少一者(at least one of)”、“至少一项(at least one of)”、“至少一个(at least one of)”、“一个或多个(one or more)”、“多个(a plurality of)”、“多个(multiple)等术语可以相互替换。In some embodiments, the terms "at least one of", "at least one of", "at least one of", "one or more", "a plurality of", "multiple", etc. can be used interchangeably.
本公开实施例中的如“A、B、C……中的至少一者”、“A和/或B和/或C……”等描述方式,包括了A、B、C……中任意一个单独存在的情况,也包括了A、B、C……中任意多个的任意组合情况,每种情况可以单独存在;例如,“A、B、C中的至少一者”包括单独A、单独B、单独C、A和B组合、A和C组合、B和C组合、A和B和C组合的情况;例如,A和/或B包括单独A、单独B、A和B的组合的情况。In the embodiments of the present disclosure, descriptions such as “at least one of A, B, C…”, “A and/or B and/or C…”, etc. include the case where any one of A, B, C… exists alone, and also include any combination of any multiple of A, B, C…, and each case may exist alone; for example, “at least one of A, B, C” includes the case where A exists alone, B exists alone, C exists alone, the combination of A and B, the combination of A and C, the combination of B and C, and the combination of A, B, and C; for example, A and/or B includes the case where A exists alone, B exists alone, and the combination of A and B.
在一些实施例中,“在一情况下A,在另一情况下B”、“响应于一情况A,响应于另一情况B”等记载方式,根据情况可以包括以下技术方案:与B无关地执行A,即,在一些实施例中A;与A无关地执行B,即,在一些实施例中B;A和B被选择性执行,即,在一些实施例中从A与B中选择执行;A和B都被执行,即,在一些实施例中A和B。当有A、B、C等更多分支时也类似上述。In some embodiments, the description methods such as "in one case A, in another case B", "in response to one case A, in response to another case B", etc. may include the following technical solutions according to the situation: A is executed independently of B, that is, in some embodiments A; B is executed independently of A, that is, in some embodiments B; A and B are selectively executed, that is, selected from A and B in some embodiments; A and B are both executed, that is, A and B in some embodiments. When there are more branches such as A, B, C, etc., it is similar to the above.
本公开实施例中的“第一”、“第二”等前缀词,仅仅为了区分不同的描述对象,不对描述对象的位置、顺序、优先级、数量或内容等构成限制,对描述对象的陈述参见权利要求或实施例中上下文的描述,不应因为使用前缀词而构成多余的限制。例如,描述对象为“字段”,则“第一字段”和“第二字段”中“字段”之前的序数词并不限制“字段”之间的位置或顺序,“第一”和“第二”并不限制其修饰的“字段”是否在同一个消息中,也不限制“第一字段”和“第二字段”的先后顺序。再如,描述对象为“等级”,则“第一等级”和“第二等级”中“等级”之前的序数词并不限制“等级”之间的优先级。再如,描述对象的数量并不受序数词的限制,可以是一个或者多个,以“第一装置”为例,其中“装置”的数量可以是一个或者多个。此外,不同前缀词修饰的对象可以相同或不同,例如,描述对象为“装置”,则“第一装置”和“第二装置”可以是相同的装置或者不同的装置,其类型可以相同或不同;再如,描述对象为“信息”,则“第一信息”和“第二信息”可以是相同的信息或者不同的信息,其内容可以相同或不同。The prefixes such as "first" and "second" in the embodiments of the present disclosure are only used to distinguish different description objects, and do not constitute restrictions on the position, order, priority, quantity or content of the description objects. The statement of the description object refers to the description in the context of the claims or embodiments, and should not constitute redundant restrictions due to the use of prefixes. For example, if the description object is a "field", the ordinal number before the "field" in the "first field" and the "second field" does not limit the position or order between the "fields", and the "first" and "second" do not limit whether the "fields" they modify are in the same message, nor do they limit the order of the "first field" and the "second field". For another example, if the description object is a "level", the ordinal number before the "level" in the "first level" and the "second level" does not limit the priority between the "levels". For another example, the number of description objects is not limited by the ordinal number, and can be one or more. Taking the "first device" as an example, the number of "devices" can be one or more. In addition, the objects modified by different prefixes may be the same or different. For example, if the description object is "device", then the "first device" and the "second device" may be the same device or different devices, and their types may be the same or different. For another example, if the description object is "information", then the "first information" and the "second information" may be the same information or different information, and their contents may be the same or different.
在一些实施例中,“包括A”、“包含A”、“用于指示A”、“携带A”,可以解释为直接携带A,也可以解释为间接指示A。In some embodiments, “including A”, “comprising A”, “used to indicate A”, and “carrying A” can be interpreted as directly carrying A or indirectly indicating A.
在一些实施例中,“响应于……”、“响应于确定……”、“在……的情况下”、“在……时”、“当……时”、“若……”、“如果……”等术语可以相互替换。In some embodiments, terms such as "in response to ...", "in response to determining ...", "in the case of ...", "at the time of ...", "when ...", "if ...", "if ...", etc. can be used interchangeably.
在一些实施例中,“大于”、“大于或等于”、“不小于”、“多于”、“多于或等于”、“不少于”、“高于”、“高于或等于”、“不低于”、“以上”等术语可以相互替换,“小于”、“小于或等于”、“不大于”、“少于”、“少于或等于”、“不多于”、“低于”、“低于或等于”、“不高于”、“以下”等术语可以相互替换。In some embodiments, terms such as "greater than", "greater than or equal to", "not less than", "more than", "more than or equal to", "not less than", "higher than", "higher than or equal to", "not lower than", and "above" can be replaced with each other, and terms such as "less than", "less than or equal to", "not greater than", "less than", "less than or equal to", "no more than", "lower than", "lower than or equal to", "not higher than", and "below" can be replaced with each other.
在一些实施例中,装置等可以解释为实体的、也可以解释为虚拟的,其名称不限定于实施例中所记载 的名称,“装置”、“设备(equipment)”、“设备(device)”、“电路”、“网元”、“节点”、“功能”、“单元”、“部件(section)”、“系统”、“网络”、“芯片”、“芯片系统”、“实体”、“主体”等术语可以相互替换。In some embodiments, the device and the like can be interpreted as physical or virtual, and their names are not limited to those described in the embodiments. The names of the devices, equipment, circuits, network elements, nodes, functions, units, sections, systems, networks, chips, chip systems, entities and other terms are interchangeable.
在一些实施例中,“接入网设备(access network device,AN device)”、“无线接入网设备(radio access network device,RAN device)”、“基站(base station,BS)”、“无线基站(radio base station)”、“固定台(fixed station)”、“节点(node)”、“接入点(access point)”、“发送点(transmission point,TP)”、“接收点(reception point,RP)”、“发送接收点(transmission/reception point,TRP)”、“面板(panel)”、“天线面板(antenna panel)”、“天线阵列(antenna array)”、“小区(cell)”、“宏小区(macro cell)”、“小型小区(small cell)”、“毫微微小区(femto cell)”、“微微小区(pico cell)”、“扇区(sector)”、“小区组(cell group)”、“载波(carrier)”、“分量载波(component carrier)”、“带宽部分(bandwidth part,BWP)”等术语可以相互替换。In some embodiments, the terms "access network device (AN device), "radio access network device (RAN device)", "base station (BS)", "radio base station (radio base station)", "fixed station (fixed station)", "node", "access point (access point)", "transmission point (TP)", "reception point (RP)", "transmission/reception point (TRP)", "panel", "antenna panel (antenna panel)", "antenna array (antenna array)", "cell", "macro cell", "small cell (small cell)", "femto cell (femto cell)", "pico cell (pico cell)", "sector (sector)", "cell group (cell)", "carrier (carrier)", "component carrier (component carrier)", "bandwidth part (bandwidth part (BWP))" and so on can be used interchangeably.
在一些实施例中,“终端(terminal)”、“终端设备(terminal device)”、“用户设备(user equipment,UE)”、“用户终端(user terminal)”、“移动台(mobile station,MS)”、“移动终端(mobile terminal,MT)”、订户站(subscriber station)、移动单元(mobile unit)、订户单元(subscriber unit)、无线单元(wireless unit)、远程单元(remote unit)、移动设备(mobile device)、无线设备(wireless device)、无线通信设备(wireless communication device)、远程设备(remote device)、移动订户站(mobile subscriber station)、接入终端(access terminal)、移动终端(mobile terminal)、无线终端(wireless terminal)、远程终端(remote terminal)、手持设备(handset)、用户代理(user agent)、移动客户端(mobile client)、客户端(client)等术语可以相互替换。In some embodiments, the terms "terminal", "terminal device", "user equipment (UE)", "user terminal", "mobile station (MS)", "mobile terminal (MT)", subscriber station, mobile unit, subscriber unit, wireless unit, remote unit, mobile device, wireless device, wireless communication device, remote device, mobile subscriber station, access terminal, mobile terminal, wireless terminal, remote terminal, handset, user agent, mobile client, client and the like can be used interchangeably.
在一些实施例中,接入网设备、核心网设备、或网络设备可以被替换为终端。例如,针对将接入网设备、核心网设备、或网络设备以及终端间的通信置换为多个终端间的通信(例如,也可以被称为设备对设备(device-to-device,D2D)、车联网(vehicle-to-everything,V2X)等)的结构,也可以应用本公开的各实施例。在该情况下,也可以设为终端具有接入网设备所具有的全部或部分功能的结构。此外,“上行”、“下行”等语言也可以被替换为与终端间通信对应的语言(例如,“侧行(side)”)。例如,上行信道、下行信道等可以被替换为侧行信道,上行链路、下行链路等可以被替换为侧行链路。In some embodiments, the access network device, the core network device, or the network device can be replaced by a terminal. For example, the various embodiments of the present disclosure can also be applied to a structure in which the communication between the access network device, the core network device, or the network device and the terminal is replaced by the communication between multiple terminals (for example, it can also be referred to as device-to-device (D2D), vehicle-to-everything (V2X), etc.). In this case, it can also be set as a structure in which the terminal has all or part of the functions of the access network device. In addition, the language such as "uplink" and "downlink" can also be replaced by the language corresponding to the communication between the terminals (for example, "side"). For example, the uplink channel, the downlink channel, etc. can be replaced by the side channel, and the uplink, the downlink, etc. can be replaced by the side link.
在一些实施例中,终端可以被替换为接入网设备、核心网设备、或网络设备。在该情况下,也可以设为接入网设备、核心网设备、或网络设备具有终端所具有的全部或部分功能的结构。In some embodiments, the terminal may be replaced by an access network device, a core network device, or a network device. In this case, the access network device, the core network device, or the network device may also be configured to have a structure that has all or part of the functions of the terminal.
在一些实施例中,信息等的名称不限定于实施例中所记载的名称,“信息(information)”、“消息(message)”、“信号(signal)”、“信令(signaling)”、“报告(report)”、“配置(configuration)”、“指示(indication)”、“指令(instruction)”、“命令(command)”、“信道”、“参数(parameter)”、“域”、“字段”、“符号(symbol)”、“码元(symbol)”、“码本(codebook)”、“码字(codeword)”、“码点(codepoint)”、“比特(bit)”、“数据(data)”、“程序(program)”、“码片(chip)”等术语可以相互替换。In some embodiments, the names of information, etc. are not limited to the names recorded in the embodiments, and terms such as "information", "message", "signal", "signaling", "report", "configuration", "indication", "instruction", "command", "channel", "parameter", "domain", "field", "symbol", "symbol", "code element", "codebook", "codeword", "codepoint", "bit", "data", "program", and "chip" can be used interchangeably.
在一些实施例中,“上行”、“上行链路”、“物理上行链路”等术语可以相互替换,“下行”、“下行链路”、“物理下行链路”等术语可以相互替换,“侧行(side)”、“侧行链路(sidelink)”、“侧行通信”、“侧行链路通信”、“直连”、“直连链路”、“直连通信”、“直连链路通信”等术语可以相互替换。In some embodiments, terms such as "uplink", "uplink", "physical uplink" can be interchangeable, and terms such as "downlink", "downlink", "physical downlink" can be interchangeable, and terms such as "side", "sidelink", "side communication", "sidelink communication", "direct connection", "direct link", "direct communication", "direct link communication" can be interchangeable.
在一些实施例中,“下行链路控制信息(downlink control information,DCI)”、“下行链路(downlink,DL)分配(assignment)”、“DL DCI”、“上行链路(uplink,UL)许可(grant)”、“UL DCI”等术语可以相互替换。In some embodiments, the terms "downlink control information (DCI)", "downlink (DL) assignment (assignment)", "DL DCI", "uplink (UL) grant (grant)", "UL DCI" and so on can be used interchangeably.
在一些实施例中,“物理下行链路共享信道(physical downlink shared channel,PDSCH)”、“DL数据”等术语可以相互替换,“物理上行链路共享信道(physical uplink shared channel,PUSCH)”、“UL数据”等术语可以相互替换。In some embodiments, the terms "physical downlink shared channel (PDSCH)", "DL data" and the like can be interchangeable with each other, and the terms "physical uplink shared channel (PUSCH)", "UL data" and the like can be interchangeable with each other.
在一些实施例中,“无线(radio)”、“无线(wireless)”、“无线接入网(radio access network,RAN)”、“接入网(access network,AN)”、“基于RAN的(RAN-based)”等术语可以相互替换。In some embodiments, the terms "radio", "wireless", "radio access network (RAN)", "access network (AN)", "RAN-based" and the like can be used interchangeably.
在一些实施例中,“同步信号(synchronization signal,SS)”、“同步信号块(synchronization signal block,SSB)”、“参考信号(reference signal,RS)”、“导频(pilot)”、“导频信号(pilot signal)”等术语可以相互替换。In some embodiments, terms such as "synchronization signal (SS)", "synchronization signal block (SSB)", "reference signal (RS)", "pilot", and "pilot signal" can be used interchangeably.
在一些实施例中,“时刻”、“时间点”、“时间”、“时间位置”等术语可以相互替换,“时长”、“时段”、“时 间窗口”、“窗口”、“时间”等术语可以相互替换。In some embodiments, the terms "moment", "time point", "time", "time position" and the like can be used interchangeably, and "duration", "period", "time" and the like can be used interchangeably. The terms "interval window", "window" and "time" are used interchangeably.
在一些实施例中,“获取”、“获得”、“得到”、“接收”、“传输”、“双向传输”、“发送和/或接收”可以相互替换,其可以解释为从其他主体接收,从协议中获取,自身处理得到、自主实现等多种含义。In some embodiments, "obtain", "obtain", "get", "receive", "transmit", "bidirectional transmission", "send and/or receive" can be interchangeable, and can be interpreted as receiving from other entities, obtaining from a protocol, obtaining by self-processing, autonomous implementation, etc.
在一些实施例中,“发送”、“发射”、“上报”、“下发”、“传输”、“双向传输”、“发送和/或接收”等术语可以相互替换。In some embodiments, terms such as "send", "transmit", "report", "send", "transmit", "bidirectional transmission", "send and/or receive" can be used interchangeably.
在一些实施例中,“预定”、“预设”可以解释为在协议等中预先规定,也可以解释为装置等进行预先设定动作。In some embodiments, "predetermined" or "preset" may be interpreted as being pre-specified in a protocol, etc., or may be interpreted as a pre-set action performed by a device, etc.
在一些实施例中,确定(determining)可以解释为判断、决定、判定(judging)、计算(calculating)、算出(computing)、处理(processing)、导出(deriving)、调查(investigating)、搜索、查找(looking up)、检索(search)、查询(inquiry)、确认(ascertaining)、接收(receiving)、发送(transmitting)、输入(input)、输出(output)、访问(accessing)、解决(resolving)、选择(selecting)、选定(choosing)、建立(establishing)、比较(comparing)、“设想(assuming)”、“期待(expecting)”、“视为(considering)、广播(broadcasting)、通知(notifying)、通信(communicating)、转发(forwarding)、配置(configuring)、重配(reconfiguring)、分配(allocating)、映射(mapping)、分派(assigning)等,但不限于此。In some embodiments, determining can be interpreted as judging, deciding, calculating, computing, processing, deriving, investigating, searching, looking up, searching, inquiring, ascertaining, receiving, transmitting, inputting, outputting, accessing, resolving, selecting, choosing, establishing, comparing, “assuming,” “expecting,” “considering,” broadcasting, notifying, communicating, forwarding, configuring, reconfiguring, allocating, mapping, assigning, etc., but is not limited to the foregoing.
在一些实施例中,判定或判断可以通过以1比特表示的值(0或1)来进行,也可以通过以真(true)或者假(false)表示的真假值(布尔值(boolean))来进行,也可以通过数值的比较(例如,与预定值的比较)来进行,但不限于此。In some embodiments, the determination or judgment can be performed by a value represented by 1 bit (0 or 1), by a true or false value (Boolean value) represented by true or false, or by comparison of numerical values (for example, comparison with a predetermined value), but is not limited to this.
在一些实施例中,“网络”可以解释为网络中包含的装置(例如,接入网设备、核心网设备等)。In some embodiments, "network" may be interpreted as devices included in the network (eg, access network equipment, core network equipment, etc.).
在一些实施例中,“不期待接收”可以解释为不在时域资源和/或频域资源上接收,也可以解释为在接收到数据等后,不对该数据等执行后续处理;“不期待发送”可以解释为不发送,也可以解释为发送但是不期待接收方对发送的内容做出响应。In some embodiments, "not expecting to receive" can be interpreted as not receiving on time domain resources and/or frequency domain resources, or as not performing subsequent processing on the data after receiving the data; "not expecting to send" can be interpreted as not sending, or as sending but not expecting the recipient to respond to the sent content.
在一些实施例中,获取数据、信息等可以遵照所在地国家的法律法规。In some embodiments, the acquisition of data, information, etc. may comply with the laws and regulations of the country where the data is obtained.
在一些实施例中,可以在得到用户同意后获取数据、信息等。In some embodiments, data, information, etc. may be obtained with the user's consent.
在通信系统中,RSC可以用于标识U2N中继设备或者U2U中继设备与该中继设备可以提供服务的被授权远端设备或端设备之间的连接服务。对于同一连接服务,RSC在不同的公用陆地移动通信网络之间,具有唯一性。In a communication system, RSC can be used to identify a connection service between a U2N relay device or a U2U relay device and an authorized remote device or end device that the relay device can provide services. For the same connection service, RSC is unique between different public land mobile communication networks.
为了获得密钥信息,远端设备可以向其对应的核心网网元(例如DDNMF/PKMF)发送密钥请求,远端设备可以基于映射到该RSC的潜在中继的本地公用陆地移动网络ID(例如PLMN ID),发现潜在中继设备对应的核心网网元,然后向潜在中继设备对应的核心网网元发送密钥请求,远端设备的网元在收到密钥响应消息后,将收到的密钥信息发送给远端设备。In order to obtain key information, the remote device can send a key request to its corresponding core network element (such as DDNMF/PKMF). The remote device can discover the core network element corresponding to the potential relay device based on the local public land mobile network ID (such as PLMN ID) of the potential relay mapped to the RSC, and then send a key request to the core network element corresponding to the potential relay device. After receiving the key response message, the remote device's element sends the received key information to the remote device.
在发现潜在中继设备时,如果存在多个支持该RSC的潜在中继,每个中继设备对应的的核心网网元,可以生成不同的密钥信息,远端设备收到多个密钥信息时,会出现无法选择要使用哪一组密钥信息进行加解密操作、完整性保护的问题。When discovering a potential relay device, if there are multiple potential relays that support the RSC, the core network element corresponding to each relay device can generate different key information. When the remote device receives multiple key information, it will be unable to choose which set of key information to use for encryption and decryption operations and integrity protection.
为了解决上述问题,本公开提出一种通信方法、装置及存储介质。In order to solve the above problems, the present disclosure proposes a communication method, device and storage medium.
图1是根据本公开实施例示出的通信系统的架构示意图。如图1所示,通信系统100可以包括第一网络设备101、第二网络设备102和第三网络设备103,可选地,通信系统100还包括第一终端和第二终端。Fig. 1 is a schematic diagram of the architecture of a communication system according to an embodiment of the present disclosure. As shown in Fig. 1, the communication system 100 may include a first network device 101, a second network device 102 and a third network device 103. Optionally, the communication system 100 also includes a first terminal and a second terminal.
在一些实施例中,第一网络设备101可以是核心网设备,示例地,第一网络设备可以是第一终端对应的网元,例如第一终端对应的直接发现命名管理功能(Direct Discovery Name Management Function,DDNMF)网元和/或邻近服务密钥管理功能(ProSe Key Management Function,PKMF)网元。可选地,第一网络设备可以是第一终端在本地公用陆地移动网络(Home Public Land Mobile Network,HPLMN)中的5G-DDNMF和/或PKMF。可选地,第一网络设备还可以是第一终端对应的其他核心网设备,例如PCF。In some embodiments, the first network device 101 may be a core network device. For example, the first network device may be a network element corresponding to the first terminal, such as a Direct Discovery Name Management Function (DDNMF) network element and/or a ProSe Key Management Function (PKMF) network element corresponding to the first terminal. Optionally, the first network device may be a 5G-DDNMF and/or PKMF of the first terminal in a Home Public Land Mobile Network (HPLMN). Optionally, the first network device may also be other core network devices corresponding to the first terminal, such as a PCF.
在一些实施例中,当第一网络设备101与第一终端通过用户面进行通信交互时,第一网络设备101可以是PKMF网元,当第一网络设备101与第一终端通过控制面进行通信交互时,第一网络设备101可以是DDNMF网元。In some embodiments, when the first network device 101 communicates with the first terminal through the user plane, the first network device 101 may be a PKMF network element; when the first network device 101 communicates with the first terminal through the control plane, the first network device 101 may be a DDNMF network element.
在一些实施例中,第二网络设备102对应第二终端,第二网络设备可以是核心网设备,示例地,第二网络设备可以是第二终端的DDNMF网元和/或PKMF网元。可选地,第二网络设备可以是第二终端在 HPLMN中的5G-DDNMF和/或PKMF。可选地,第一网络设备还可以是第二终端对应的其他核心网设备,例如PCF。In some embodiments, the second network device 102 corresponds to the second terminal, and the second network device may be a core network device. For example, the second network device may be a DDNMF network element and/or a PKMF network element of the second terminal. 5G-DDNMF and/or PKMF in HPLMN. Optionally, the first network device may also be other core network devices corresponding to the second terminal, such as PCF.
在一些实施例中,当第二网络设备102与第二终端通过用户面进行通信交互时,第二网络设备102可以是PKMF网元,当第二网络设备102与第二终端通过控制面进行通信交互时,第二网络设备102可以是DDNMF网元。In some embodiments, when the second network device 102 communicates with the second terminal through the user plane, the second network device 102 may be a PKMF network element; when the second network device 102 communicates with the second terminal through the control plane, the second network device 102 may be a DDNMF network element.
在一些实施例中,第三网络设备103可以是邻近服务应用服务器(Prose Application Server)。在另一些实施例中,第三网络设备103可以是其他邻近服务中的网络设备。In some embodiments, the third network device 103 may be a proximity service application server (Prose Application Server). In other embodiments, the third network device 103 may be a network device in other proximity services.
在一些实施例中,第一终端可以是中继用户设备(User Equipment,UE),在终端到网络(UE to Network,U2N)中,第一终端可以是远端UE与网络之间的中继UE,在终端到终端(UE to UE,U2U)中,第一终端可以是两个端UE之间的中继UE。In some embodiments, the first terminal may be a relay user equipment (User Equipment, UE). In terminal to network (UE to Network, U2N), the first terminal may be a relay UE between a remote UE and a network. In terminal to terminal (UE to UE, U2U), the first terminal may be a relay UE between two end UEs.
在上述实施例中,第一终端的名称可以是中继终端、中继用户设备、被发现设备(Discoveree UE)、宣告设备(Announcing UE)等,对此本公开不做限制。In the above embodiments, the name of the first terminal may be a relay terminal, a relay user equipment, a discovered device (Discoveree UE), an announcing device (Announcing UE), etc., which is not limited in the present disclosure.
在一些实施例中,第二终端可以是U2N中的远端UE(remote UE),也可以是U2U中的端UE(end UE)。In some embodiments, the second terminal can be a remote UE (remote UE) in U2N or an end UE (end UE) in U2U.
在上述实施例中,第二终端的名称可以是远端终端、远端用户设备、端用户设备、发现设备(Discoverer UE)、监听设备(Monitoring UE)等,对此本公开不做限制。In the above embodiments, the name of the second terminal can be a remote terminal, a remote user equipment, an end user equipment, a discovery device (Discoverer UE), a monitoring device (Monitoring UE), etc., which is not limited in the present disclosure.
在一些实施例中,终端例如包括手机(mobile phone)、可穿戴设备、物联网设备、具备通信功能的汽车、智能汽车、平板电脑(Pad)、带无线收发功能的电脑、虚拟现实(virtual reality,VR)终端设备、增强现实(augmented reality,AR)终端设备、工业控制(industrial control)中的无线终端设备、无人驾驶(self-driving)中的无线终端设备、远程手术(remote medical surgery)中的无线终端设备、智能电网(smart grid)中的无线终端设备、运输安全(transportation safety)中的无线终端设备、智慧城市(smart city)中的无线终端设备、智慧家庭(smart home)中的无线终端设备中的至少一者,但不限于此。In some embodiments, the terminal includes, for example, a mobile phone, a wearable device, an Internet of Things device, a car with communication function, a smart car, a tablet computer (Pad), a computer with wireless transceiver function, a virtual reality (VR) terminal device, an augmented reality (AR) terminal device, a wireless terminal device in industrial control (industrial control), a wireless terminal device in self-driving, a wireless terminal device in remote medical surgery, a wireless terminal device in a smart grid (smart grid), a wireless terminal device in transportation safety (transportation safety), a wireless terminal device in a smart city (smart city), and at least one of a wireless terminal device in a smart home (smart home), but is not limited to these.
在一些实施例中,接入网设备例如是将终端接入到无线网络的节点或设备,接入网设备可以包括5G通信系统中的演进节点B(evolved NodeB,eNB)、下一代演进节点B(next generation eNB,ng-eNB)、下一代节点B(next generation NodeB,gNB)、节点B(node B,NB)、家庭节点B(home node B,HNB)、家庭演进节点B(home evolved nodeB,HeNB)、无线回传设备、无线网络控制器(radio network controller,RNC)、基站控制器(base station controller,BSC)、基站收发台(base transceiver station,BTS)、基带单元(base band unit,BBU)、移动交换中心、6G通信系统中的基站、开放型基站(Open RAN)、云基站(Cloud RAN)、其他通信系统中的基站、无线保真(wireless fidelity,WiFi)系统中的接入节点中的至少一者,但不限于此。In some embodiments, the access network device is, for example, a node or device that accesses a terminal to a wireless network. The access network device may include an evolved Node B (eNB), a next generation evolved Node B (ng-eNB), a next generation Node B (gNB), a node B (NB), a home node B (HNB), a home evolved node B (HeNB), a wireless backhaul device, a radio network controller (RNC), a base station controller (BSC), a base transceiver station (BTS), a base band unit (BBU), a mobile switching center, a base station in a 6G communication system, an open base station (Open RAN), a cloud base station (Cloud RAN), a base station in other communication systems, and at least one of an access node in a wireless fidelity (WiFi) system, but is not limited thereto.
在一些实施例中,核心网设备可以是一个设备,包括一个或多个网元,也可以是多个设备或设备群,分别包括一个或多个网元中的全部或部分。网元可以是虚拟的,也可以是实体的。核心网例如包括演进分组核心(Evolved Packet Core,EPC)、5G核心网络(5G Core Network,5GCN)、下一代核心(Next Generation Core,NGC)中的至少一者。In some embodiments, the core network device may be a device including one or more network elements, or may be multiple devices or device groups, each including all or part of one or more network elements. The network element may be virtual or physical. The core network may include, for example, at least one of an Evolved Packet Core (EPC), a 5G Core Network (5GCN), and a Next Generation Core (NGC).
在一些实施例中,上述一个或多个网元例如可以包括AMF、UPF、MME等,还可能包括其他网元,例如策略控制功能(Policy Control Function,PCF)、应用功能(Application Function,AF)、网络应用功能(network application function,NAF)、应用层认证与密钥管理锚点功能(Authentication and Key management for Applications Anchor Function,AAnF)、引导服务器功能(Bootstrapping Server Functionality,BSF)、会话管理功能(Session Management Function,SMF)等。In some embodiments, the above-mentioned one or more network elements may include AMF, UPF, MME, etc., and may also include other network elements, such as Policy Control Function (PCF), Application Function (AF), Network Application Function (NAF), Application Layer Authentication and Key Management Anchor Function (AAnF), Bootstrapping Server Functionality (BSF), Session Management Function (SMF), etc.
可以理解的是,本公开实施例描述的通信系统是为了更加清楚的说明本公开实施例的技术方案,并不构成对于本公开实施例提出的技术方案的限定,本领域普通技术人员可知,随着系统架构的演变和新业务场景的出现,本公开实施例提出的技术方案对于类似的技术问题同样适用。It can be understood that the communication system described in the embodiment of the present disclosure is for the purpose of more clearly illustrating the technical solution of the embodiment of the present disclosure, and does not constitute a limitation on the technical solution proposed in the embodiment of the present disclosure. A person skilled in the art can know that with the evolution of the system architecture and the emergence of new business scenarios, the technical solution proposed in the embodiment of the present disclosure is also applicable to similar technical problems.
下述本公开实施例可以应用于图1所示的通信系统100、或部分主体,但不限于此。图1所示的各主体是例示,通信系统可以包括图1中的全部或部分主体,也可以包括图1以外的其他主体,各主体数量和形态为任意,各主体之间的连接关系是例示,各主体之间可以不连接也可以连接,其连接可以是任意方式,可以是直接连接也可以是间接连接,可以是有线连接也可以是无线连接。The following embodiments of the present disclosure may be applied to the communication system 100 shown in FIG1 , or part of the subject, but are not limited thereto. The subjects shown in FIG1 are examples, and the communication system may include all or part of the subjects in FIG1 , or may include other subjects other than FIG1 , and the number and form of the subjects are arbitrary, and the connection relationship between the subjects is an example, and the subjects may be connected or disconnected, and the connection may be in any manner, which may be a direct connection or an indirect connection, and may be a wired connection or a wireless connection.
图2a是根据本公开实施例示出的通信方法的交互示意图。如图2a所示,本公开实施例涉及通信方法, 用于通信系统100,通信系统100可以包括第一网络设备101,第二网络设备102,第三网络设备103,可选地,通信系统100还包括第一终端和第二终端。上述方法包括:FIG2a is an interactive schematic diagram of a communication method according to an embodiment of the present disclosure. As shown in FIG2a, the present disclosure embodiment relates to a communication method, For use in a communication system 100, the communication system 100 may include a first network device 101, a second network device 102, and a third network device 103. Optionally, the communication system 100 also includes a first terminal and a second terminal. The above method includes:
步骤2101,第一终端向第一网络设备发送第一消息。Step 2101: A first terminal sends a first message to a first network device.
在一些实施例中,第一网络设备可以接收第一消息。In some embodiments, the first network device may receive the first message.
在一些实施例中,第一网络设备可以是核心网设备,示例地,第一网络设备可以是第一终端对应的网元,例如,第一网络设备为第一终端对应的直接发现命名管理功能(Direct Discovery Name Management Function,DDNMF)网元和/或邻近服务密钥管理功能(ProSe Key Management Function,PKMF)。可选地,第一网络设备可以是第一终端在本地公用陆地移动网络(Home Public Land Mobile Network,HPLMN)中的5G-DDNMF和/或PKMF。In some embodiments, the first network device may be a core network device. For example, the first network device may be a network element corresponding to the first terminal. For example, the first network device may be a network element of a Direct Discovery Name Management Function (DDNMF) and/or a ProSe Key Management Function (PKMF) corresponding to the first terminal. Optionally, the first network device may be a 5G-DDNMF and/or PKMF of the first terminal in a Home Public Land Mobile Network (HPLMN).
在一些实施例中,第一终端可以是中继用户设备(User Equipment,UE),在终端到网络(UE to Network,U2N)中,第一终端可以是远端UE与网络之间的中继UE,在终端到终端(UE to UE,U2U)中,第一终端可以是两个端UE之间的中继UE。In some embodiments, the first terminal may be a relay user equipment (User Equipment, UE). In terminal to network (UE to Network, U2N), the first terminal may be a relay UE between a remote UE and a network. In terminal to terminal (UE to UE, U2U), the first terminal may be a relay UE between two end UEs.
在一些实施例中,第一终端的名称可以是中继终端、中继用户设备、被发现设备、宣告设备等,对此本公开不做限制。In some embodiments, the name of the first terminal may be a relay terminal, a relay user equipment, a discovered device, an announcing device, etc., which is not limited in the present disclosure.
在一些实施例中,第一消息可以用于请求第一信息,第一信息与第一业务相关,第一消息可以携带第一业务的标识。In some embodiments, the first message may be used to request first information, the first information is related to a first service, and the first message may carry an identifier of the first service.
在一些实施例中,第一消息还可以携带第一终端PC5安全能力。In some embodiments, the first message may also carry the security capability of the first terminal PC5.
在一些实施例中,第一消息的名称不予限制,其例如可以是“中继发现密钥请求(Relay Discovery Key Request)”、“密钥请求”、“发现密钥请求(Discovery Key Request)”等。In some embodiments, the name of the first message is not limited, and it can be, for example, "Relay Discovery Key Request", "Key Request", "Discovery Key Request", etc.
在一些实施例中,第一业务可以是第一终端提供的连接服务,第一业务的标识用于唯一标识第一业务,第一业务的标识可以是中继服务码(Relay Service Code,RSC)。In some embodiments, the first service may be a connection service provided by the first terminal, the identifier of the first service is used to uniquely identify the first service, and the identifier of the first service may be a relay service code (RSC).
在一些实施例中,第一信息可以用于保护邻近服务的安全(ProSe Security),示例地,第一信息可以用于邻近服务的发现安全(ProSe Discovery Security),例如,邻近服务发现安全可以包括加/解密、完整性保护、加扰等等中的任一项,第一信息还可以用邻近服务的通信安全(Prose Communication Security),例如,邻近服务通信安全可以包括加/解密、完整性保护、加扰等等中的任一项。In some embodiments, the first information may be used to protect the security of the proximity service (ProSe Security). For example, the first information may be used for the discovery security of the proximity service (ProSe Discovery Security). For example, the discovery security of the proximity service may include any one of encryption/decryption, integrity protection, scrambling, etc. The first information may also be used for the communication security of the proximity service (Prose Communication Security). For example, the communication security of the proximity service may include any one of encryption/decryption, integrity protection, scrambling, etc.
在一些实施例中,第一信息的名称不予限制,其可以是“密钥(Key)”、“密钥信息”、“安全信息(security materials)”、“安全参数(security parameters)”等。In some embodiments, the name of the first information is not limited, and it can be "key", "key information", "security materials", "security parameters", etc.
示例地,邻近服务发现安全可以是U2N发现安全、U2U发现安全,对此本公开不予限制。For example, the proximity service discovery security may be U2N discovery security or U2U discovery security, which is not limited in the present disclosure.
示例地,邻近服务通信安全可以是U2N通信安全、U2U通信安全,对此本公开不予限制。For example, the proximity service communication security may be U2N communication security or U2U communication security, which is not limited in the present disclosure.
在一些实施例中,第一信息可以是第三网络设备确定(或生成)的。In some embodiments, the first information may be determined (or generated) by a third network device.
步骤2102,第一网络设备确定第一网络设备中是否存储有第一业务标识对应的第一信息。Step 2102: The first network device determines whether first information corresponding to the first service identifier is stored in the first network device.
在一些实施例中,第一网络设备可以确定本地是否在先存储有第一信息。In some embodiments, the first network device may determine whether the first information is previously stored locally.
在一些实施例中,第一网络设备可以基于从第一终端接收到的第一业务的标识,确定第一网络设备中是否存储有第一业务的标识对应的第一信息。In some embodiments, the first network device may determine whether the first information corresponding to the identifier of the first service is stored in the first network device based on the identifier of the first service received from the first terminal.
可选地,在第一网络设备确定本地存储有该第一业务的标识对应的第一信息时,可以对存储的第一信息的有效性进行判断,即执行步骤2104。Optionally, when the first network device determines that the first information corresponding to the identifier of the first service is stored locally, the validity of the stored first information may be judged, that is, step 2104 is executed.
可选地,在第一网络设备确定本地未存储有该第一业务的标识对应的第一信息时,第一网络设备可以向第三网络设备发送第二消息,该第二消息用于请求第一信息,即执行步骤2103。Optionally, when the first network device determines that the first information corresponding to the identifier of the first service is not stored locally, the first network device may send a second message to the third network device, where the second message is used to request the first information, ie, execute step 2103.
在一些可选实施例中,步骤2102为可选步骤。换言之,步骤2102在一些实施例中可以缺省,例如,第一网络设备可以不执行确定“是否存储”的判断动作,而是直接获取第一网络设备中存储或未存储的指示信息,该指示信息可以是其他设备确定并提供给第一网络设备的。再例如,第一网络设备可以不执行确定“是否存储”的判断动作,而是直接获取本地存储或未存储的状态信息。In some optional embodiments, step 2102 is an optional step. In other words, step 2102 may be omitted in some embodiments. For example, the first network device may not perform the judgment action of determining "whether to store", but directly obtain the indication information stored or not stored in the first network device, and the indication information may be determined by other devices and provided to the first network device. For another example, the first network device may not perform the judgment action of determining "whether to store", but directly obtain the state information stored or not stored locally.
步骤2103,第一网络设备向第三网络设备发送第二消息。Step 2103: The first network device sends a second message to the third network device.
在一些实施例中,第三网络设备可以是服务器或网元功能,可选地,第三网络设备可以是应用服务器(Application Server),可选地,第三网络设备可以是邻近服务应用服务器(ProSe Application Server)。In some embodiments, the third network device may be a server or a network element function, optionally, the third network device may be an application server (Application Server), optionally, the third network device may be a proximity service application server (ProSe Application Server).
在一些实施例中,第二消息可以用于请求第一信息。 In some embodiments, the second message may be used to request the first information.
在一些实施例中,第二消息中可以携带第一业务的标识,从而请求该第一业务的标识对应的第一信息。In some embodiments, the second message may carry an identifier of the first service, thereby requesting first information corresponding to the identifier of the first service.
在一些实施例中,第一信息由第三网络设备确定。In some embodiments, the first information is determined by a third network device.
在一些实施例中,第二消息的名称不予限制,其例如可以是“中继发现密钥请求(Relay Discovery Key Request)”、“密钥请求”、“发现密钥请求(Discovery Key Request)”等。In some embodiments, the name of the second message is not limited, and it can be, for example, "Relay Discovery Key Request", "Key Request", "Discovery Key Request", etc.
在一些实施例中,步骤2103可选,当第一网络设备中存有第一业务的标识对应的第一信息时,步骤2103可以缺省。可选地,当第一网络设备中存有第一业务的标识对应的第一信息时,第一网络设备可以进一步判断所存储的第一信息的有效性,如果该第一信息有效(未过期),则步骤2103可以缺省,如果该第一信息失效(或无效,或过期),即执行步骤2104。In some embodiments, step 2103 is optional, and when the first information corresponding to the identifier of the first service is stored in the first network device, step 2103 may be omitted. Optionally, when the first information corresponding to the identifier of the first service is stored in the first network device, the first network device may further determine the validity of the stored first information, and if the first information is valid (not expired), step 2103 may be omitted, and if the first information is invalid (or invalid, or expired), step 2104 is executed.
在上述实施例中,第一网络设备向第三网络设备发送请求消息,实现了网元与应用服务器的交互,通过交互获取第一信息,可以实现获取第一信息的唯一性。In the above embodiment, the first network device sends a request message to the third network device, thereby realizing the interaction between the network element and the application server. By acquiring the first information through the interaction, the uniqueness of the first information can be achieved.
步骤2104,第一网络设备确定第一网络设备中存储的第一信息是否过期。Step 2104: The first network device determines whether the first information stored in the first network device is expired.
在一些实施例中,第一网络设备可以确定本地存储的第一信息是否过期。In some embodiments, the first network device may determine whether the locally stored first information is expired.
在一些实施例中,第一网络设备可以根据第一信息相关信息确定第一信息是否过期,示例地,可以根据第一信息相关的定时器信息进行判断。In some embodiments, the first network device may determine whether the first information is expired based on information related to the first information. For example, the determination may be made based on timer information related to the first information.
在一些实施例中,第一网络设备可以基于定时器确定本地存储的第一信息是否过期。可选地,该定时器可以是与第一信息相关联的定时器,该定时器可以是第一网络设备在获取第一信息时同时获取的。可选地,该定时器可以是第三网络设备提供的,也可以是预配置的。In some embodiments, the first network device may determine whether the locally stored first information is expired based on a timer. Optionally, the timer may be a timer associated with the first information, and the timer may be obtained by the first network device when obtaining the first information. Optionally, the timer may be provided by a third network device or may be preconfigured.
在一些实施例中,第一网络设备可以通过其他方式确定第一信息是否过期,对此本公开不予限制。In some embodiments, the first network device may determine whether the first information is expired by other means, which is not limited in the present disclosure.
在上述实施例中,第一网络设备在存储第一业务的标识对应的第一信息时一并存储第一信息相关联的定时器。In the above embodiment, the first network device stores the timer associated with the first information when storing the first information corresponding to the identifier of the first service.
在一些实施例中,定时器可以表示第一信息的时效信息,例如定时器可以是表示第一信息有效时间段的信息。第一网络设备可以根据定时器确定第一信息过期情况。In some embodiments, the timer may indicate the timeliness information of the first information, for example, the timer may be information indicating the valid time period of the first information. The first network device may determine the expiration status of the first information according to the timer.
在一些实施例中,第一网络设备确定存储的第一信息无效时,第一网络设备可以向第三网络设备发送第四消息,第四消息用于请求第三网络设备更新第一信息,即执行步骤2105。In some embodiments, when the first network device determines that the stored first information is invalid, the first network device may send a fourth message to the third network device, where the fourth message is used to request the third network device to update the first information, ie, execute step 2105 .
在一些实施例中,第一网络设备确定存储的第一信息有效时,第一网络设备可以向第一终端和/或第二网络设备发送存储的第一信息,即可以执行步骤2109和/或步骤2110。In some embodiments, when the first network device determines that the stored first information is valid, the first network device may send the stored first information to the first terminal and/or the second network device, that is, step 2109 and/or step 2110 may be executed.
在一些实施例中,步骤2104可选,在第一网络设备未存储有第一业务的标识对应的第一信息时,步骤2104可以缺省,第一网络设备可以通过步骤2103从第三网络设备获取第一信息。In some embodiments, step 2104 is optional. When the first network device does not store the first information corresponding to the identifier of the first service, step 2104 may be omitted, and the first network device may obtain the first information from the third network device through step 2103 .
在一些可选实施例中,步骤2104为可选步骤。换言之,步骤2104在一些实施例中可以缺省,例如,第一网络设备可以不执行确定存储的第一信息“是否过期”的判断动作,而是直接获取本地存储的第一信息过期或未过期的状态信息。In some optional embodiments, step 2104 is an optional step. In other words, step 2104 may be omitted in some embodiments. For example, the first network device may not perform the judgment action of determining whether the stored first information is "expired", but directly obtain the locally stored state information of whether the first information is expired or not.
步骤2105,第一网络设备向第三网络设备发送第四消息。Step 2105: The first network device sends a fourth message to the third network device.
在一些实施例中,第四消息用于请求更新第一信息。In some embodiments, the fourth message is used to request an update of the first information.
在一些实施例中,第二消息与第四消息可以一致,同样用于向第三网络设备请求有效第一信息。In some embodiments, the second message and the fourth message may be consistent with each other and are also used to request valid first information from the third network device.
在一些实施例中,第四消息的名称不予限制,其例如可以是“中继发现密钥请求(Relay Discovery Key Request)”、“密钥请求”、“发现密钥请求(Discovery Key Request)”等。In some embodiments, the name of the fourth message is not limited, and it can be, for example, "Relay Discovery Key Request", "Key Request", "Discovery Key Request", etc.
在一些实施例中,第四消息中可以携带第一业务的标识,从而请求更新该第一业务的标识对应的第一信息。In some embodiments, the fourth message may carry an identifier of the first service, thereby requesting to update the first information corresponding to the identifier of the first service.
在一些实施例中,第一网络设备确定存储的第一业务的标识对应的第一信息无效时,第一网络设备可以向第三网络设备发送第四消息,第四消息可以用于指示第三网络设备生成有效的第一信息。In some embodiments, when the first network device determines that the first information corresponding to the stored identifier of the first service is invalid, the first network device may send a fourth message to the third network device, and the fourth message may be used to instruct the third network device to generate valid first information.
在一些实施例中,步骤2105可选,当第一网络设备中存有第一业务标识对应的有效第一信息时,第一网络设备可以将对应的第一信息发送至第二网络设备和/或第一终端,无需向第三网络设备发送请求。In some embodiments, step 2105 is optional. When valid first information corresponding to the first service identifier is stored in the first network device, the first network device can send the corresponding first information to the second network device and/or the first terminal without sending a request to the third network device.
在上述实施例中,第一网络设备向第三网络设备发送请求更新消息,实现了网元与应用服务器的交互以及第一信息的更新,通过交互获取更新的第一信息,可以实现获取第一信息的唯一性。In the above embodiment, the first network device sends an update request message to the third network device, thereby realizing the interaction between the network element and the application server and the update of the first information. By acquiring the updated first information through the interaction, the uniqueness of the first information can be achieved.
步骤2106,第三网络设备确定第三网络设备中存储的第一信息是否过期。Step 2106: The third network device determines whether the first information stored in the third network device is expired.
在一些实施例中,第三网络设备可以根据第一信息关联的信息确定第一信息是否过期,示例地,可以 通过第一信息关联的定时器信息,确定第一信息是否过期。关于定时器可以参照上述描述,在此不再赘述。In some embodiments, the third network device can determine whether the first information is expired based on the information associated with the first information. For example, Whether the first information is expired is determined by the timer information associated with the first information. The timer can be referred to the above description and will not be described again.
在一些实施例中,第三网络设备确定第三网络设备中存储的第一业务标识对应的第一信息过期时,第三网络设备可以重新生成第一业务标识对应的第一信息,即执行步骤2107和2108。In some embodiments, when the third network device determines that the first information corresponding to the first service identifier stored in the third network device is expired, the third network device may regenerate the first information corresponding to the first service identifier, that is, execute steps 2107 and 2108.
在一些实施例中,第三网络设备确定第三网络设备中存储的第一业务标识对应的第一信息未过期时,第三网络设备可以将包含第一信息的第三消息发送至第一网络设备,即执行步骤2108。可选地,第三网络设备确定第三网络设备中存储的第一业务标识对应的第一信息未过期时,第三网络设备可以响应于第一网络设备的请求将第一信息发送至第一网络设备,即如果未收到第一网络设备的请求,则可以不执行步骤2108。In some embodiments, when the third network device determines that the first information corresponding to the first service identifier stored in the third network device has not expired, the third network device may send a third message containing the first information to the first network device, that is, execute step 2108. Optionally, when the third network device determines that the first information corresponding to the first service identifier stored in the third network device has not expired, the third network device may send the first information to the first network device in response to a request from the first network device, that is, if the request from the first network device is not received, step 2108 may not be executed.
在一些实施例中,当第三网络设备确定第三网络设备中存储的第一信息过期时,意味着发生第一情况。此时,第一网络设备可以接收第三网络设备在第一情况下发送的更新的第一信息。In some embodiments, when the third network device determines that the first information stored in the third network device is expired, it means that the first situation occurs. At this time, the first network device can receive the updated first information sent by the third network device in the first situation.
在一些实施例中,步骤2106可选,第三网络设备可以不判断第三网络设备中存储的第一信息是否过期,仅响应于第一网络设备的请求发送第一信息。In some embodiments, step 2106 is optional, and the third network device may not determine whether the first information stored in the third network device is expired, and may only send the first information in response to the request of the first network device.
步骤2107,第三网络设备确定第一信息。Step 2107: The third network device determines the first information.
在一些实施例中,第三网络设备可以确定(或生成)第一业务的标识对应的第一信息。该第一业务的标识可以是从第一网络设备获取的。In some embodiments, the third network device may determine (or generate) first information corresponding to an identifier of the first service. The identifier of the first service may be obtained from the first network device.
在一些实施例中,第三网络设备可以基于第一业务标识,选择随机数,并基于该随机数生成第一业务标识对应的第一信息。对于第三网络设备确定或生成第一信息的方式本公开不予限制。In some embodiments, the third network device may select a random number based on the first service identifier, and generate first information corresponding to the first service identifier based on the random number. The present disclosure does not limit the manner in which the third network device determines or generates the first information.
在一些实施例中,对于同一终端的不同业务具有不同的标识也不同,生成的第一信息也不同。In some embodiments, different services of the same terminal have different identifiers, and the generated first information is also different.
在一些实施例中,步骤2107可选,例如,第一网络设备中存储有第一业务标识对应的有效第一信息时,第三网络设备可以无需重新生成新的第一信息。应当注意的是,步骤2107可选的含义是步骤2107的执行次序不予限制,例如第一网络设备中存储有第一业务标识对应的第一信息而未向第三网络设备发送第二消息时,步骤2107可以不在步骤2102之后再执行,再例如第一网络设备确定第一网络设备中存储的第一信息未过期而未向第三网络设备发送第四消息时,步骤2107可以不在步骤2104之后再执行,再例如第三网络设备确定第三网络设备中存储的第一信息未过期时,步骤2107可以不在步骤2106之后再执行。但在本公开中,第一信息是由第三网络设备确定的,该步骤2107可以在第一网络设备请求第一信息之后执行,或者在第一网络设备请求第一信息之前执行,对此本公开不予限制。In some embodiments, step 2107 is optional. For example, when the first network device stores valid first information corresponding to the first service identifier, the third network device may not need to regenerate new first information. It should be noted that the optional meaning of step 2107 is that the execution order of step 2107 is not limited. For example, when the first network device stores the first information corresponding to the first service identifier and does not send the second message to the third network device, step 2107 may not be executed after step 2102. For another example, when the first network device determines that the first information stored in the first network device has not expired and does not send the fourth message to the third network device, step 2107 may not be executed after step 2104. For another example, when the third network device determines that the first information stored in the third network device has not expired, step 2107 may not be executed after step 2106. However, in the present disclosure, the first information is determined by the third network device, and step 2107 may be executed after the first network device requests the first information, or before the first network device requests the first information, and the present disclosure does not limit this.
在上述实施例中,由于第一网络设备在存储有第一业务的标识对应的第一信息的情况下不再向第三网络设备请求第一信息,第三网络设备对于同一第一业务标识,生成对应的具有唯一性的第一信息。In the above embodiment, since the first network device no longer requests the first information from the third network device when the first information corresponding to the identifier of the first service is stored, the third network device generates corresponding unique first information for the same first service identifier.
步骤2108,第三网络设备向第一网络设备发送第三消息。Step 2108: The third network device sends a third message to the first network device.
在一些实施例中,第三消息可以携带第一信息。第三网络设备可以将确定的第一信息发送给第一网络设备。In some embodiments, the third message may carry the first information. The third network device may send the determined first information to the first network device.
在一些实施例中,第三消息还可以携带第一信息对应的定时器。In some embodiments, the third message may also carry a timer corresponding to the first information.
在一些实施例中,第三消息还可以携带当前时间(Current_Time)参数和最大偏移(Max_Offset)参数以及选择的PC5安全保护算法。In some embodiments, the third message may also carry a current time (Current_Time) parameter and a maximum offset (Max_Offset) parameter as well as a selected PC5 security protection algorithm.
在一些实施例中,第三消息的名称不予限制,其例如可以是“中继发现密钥响应(Relay Discovery Key Response)”、“密钥响应”、“发现密钥响应(Discovery Key Response)”等。In some embodiments, the name of the third message is not limited, and it can be, for example, "Relay Discovery Key Response", "Key Response", "Discovery Key Response", etc.
在一些实施例中,第一终端在移动过程中,为了实现第一终端在漫游时可以提供同样的服务,在执行步骤2108之后,中继用户设备在拜访公用陆地移动网(Visited Public Land Mobile Network,VPLMN)中的5G-DDNMF和/或PKMF可以和第一终端在本地公用陆地移动网络(Home Public Land Mobile Network,HPLMN)中的5G-DDNMF和/或PKMF交换发布认证消息(Announce Auth.Message),以同步该第一信息,中继用户设备无漫游时,则不进行交换。In some embodiments, when the first terminal is moving, in order to enable the first terminal to provide the same service when roaming, after executing step 2108, the 5G-DDNMF and/or PKMF of the relay user equipment in the visited public land mobile network (Visited Public Land Mobile Network, VPLMN) can exchange and publish authentication messages (Announce Auth. Message) with the 5G-DDNMF and/or PKMF of the first terminal in the home public land mobile network (Home Public Land Mobile Network, HPLMN) to synchronize the first information. When the relay user equipment is not roaming, no exchange is performed.
在一些实施例中,步骤2108的执行顺序不予限制。在一种示例中,第三网络设备可以响应于第一网络设备的请求发送携带有第一信息的第三消息,即,响应于步骤2102或者2105,执行步骤2108。在另一种示例中,第三网络设备可以在先向第一网络设备发送携带有第一信息的第三消息,例如在上述步骤2101-2107中任一步骤之前,向第一网络设备发送携带有第一信息的第三消息。In some embodiments, the execution order of step 2108 is not limited. In one example, the third network device may send a third message carrying the first information in response to a request from the first network device, that is, execute step 2108 in response to step 2102 or 2105. In another example, the third network device may first send the third message carrying the first information to the first network device, for example, before any of the above steps 2101-2107, send the third message carrying the first information to the first network device.
步骤2109,第一网络设备向第一终端发送第一信息。 Step 2109: The first network device sends first information to the first terminal.
在一些实施例中,第一网络设备可以在接收到第三网络设备提供的第一信息之后向第一终端发送该第一信息。In some embodiments, the first network device may send the first information to the first terminal after receiving the first information provided by the third network device.
在一些实施例中,第一网络设备返回与第一业务标识对应的第一信息、Current_Time、Max_Offset参数以及选择的PC5安全保护算法至第一终端,第一终端将第一信息与选择的PC5算法和第一业务标识一起存储。In some embodiments, the first network device returns first information corresponding to the first service identifier, Current_Time, Max_Offset parameters and the selected PC5 security protection algorithm to the first terminal, and the first terminal stores the first information together with the selected PC5 algorithm and the first service identifier.
在一些实施例中,第一信息用于提供给第一终端以执行邻近服务安全。示例地,第一终端选择并使用第一信息进行加密和解密、进行完整性保护和验证等。In some embodiments, the first information is provided to the first terminal to perform proximity service security. For example, the first terminal selects and uses the first information for encryption and decryption, integrity protection and verification, and the like.
在一种示例中,在第一终端获得第一信息之后,第一终端可以使用第一信息对广播消息进行安全性保护,并广播保护后的广播消息。可选地,第二终端可以监听该广播消息,并进行解密。In one example, after the first terminal obtains the first information, the first terminal may use the first information to perform security protection on the broadcast message and broadcast the protected broadcast message. Optionally, the second terminal may monitor the broadcast message and perform decryption.
在另一种示例中,在第一终端获得第一信息之后,第一终端可以接收第二终端发送的保护的广播消息,第一终端可以使用第一信息,对第二终端发送的保护广播消息进行安全性验证。可选地,第二终端发送的保护广播消息中可以携带第一业务的标识(以RSC为例),即第二终端对广播消息进行安全性保护时使用的第一信息所对应的第一业务的标识。第一终端使用第一信息对保护广播消息安全性验证后,可以获知该保护广播消息中的RSC,若第一终端所支持的RSC中存在该保护广播消息中的RSC,则第一终端可以使用从第一网络设备接收的第一信息对响应消息进行安全性保护,并向第二终端反馈响应消息,第二终端接收到该响应消息,可以使用从第二网络设备接收到的第一信息对该响应消息进行安全性验证;若第一终端所支持的RSC中不存在该保护广播消息中的RSC,则第一终端不向第二终端反馈响应消息。In another example, after the first terminal obtains the first information, the first terminal can receive the protected broadcast message sent by the second terminal, and the first terminal can use the first information to perform security verification on the protected broadcast message sent by the second terminal. Optionally, the protected broadcast message sent by the second terminal can carry the identifier of the first service (taking RSC as an example), that is, the identifier of the first service corresponding to the first information used by the second terminal when performing security protection on the broadcast message. After the first terminal uses the first information to verify the security of the protected broadcast message, it can learn the RSC in the protected broadcast message. If the RSC in the protected broadcast message exists in the RSC supported by the first terminal, the first terminal can use the first information received from the first network device to perform security protection on the response message, and feedback the response message to the second terminal. The second terminal receives the response message and can use the first information received from the second network device to perform security verification on the response message; if the RSC in the protected broadcast message does not exist in the RSC supported by the first terminal, the first terminal does not feedback the response message to the second terminal.
在上述实施例中,由于第一终端向第一网络设备请求第一业务的标识对应的第一信息,第一网络设备可以确定本地是否存储有该第一业务的标识对应的第一信息(或存储有未过期的第一信息),如有则无需再向第三网络设备请求该第一业务的标识对应的第一信息,第一网络设备可以将所存储的第一信息发送至第一终端,则第三网络设备不会对相同的第一业务的标识生成两套第一信息,导致第一终端在选择第一信息进行邻近服务安全处理(例如加解密)时的混乱,第三网络设备生成的第一信息具有唯一性,第一网络设备提供给第一终端的第一信息也唯一对应第一终端所请求的第一业务的标识,便于第一终端可以使用该唯一的第一信息进行安全性保护、安全性验证等操作,避免终端的操作混乱。In the above embodiment, since the first terminal requests the first information corresponding to the identifier of the first service from the first network device, the first network device can determine whether the first information corresponding to the identifier of the first service is stored locally (or the first information that has not expired is stored). If so, there is no need to request the first information corresponding to the identifier of the first service from the third network device. The first network device can send the stored first information to the first terminal, and the third network device will not generate two sets of first information for the same identifier of the first service, causing confusion for the first terminal when selecting the first information for proximity service security processing (such as encryption and decryption). The first information generated by the third network device is unique, and the first information provided by the first network device to the first terminal also uniquely corresponds to the identifier of the first service requested by the first terminal, so that the first terminal can use the unique first information to perform security protection, security verification and other operations, thereby avoiding operational confusion of the terminal.
步骤2110,第一网络设备向第二网络设备发送第一信息。Step 2110: The first network device sends first information to the second network device.
在一些实施例中,第二网络设备对应第二终端,第二网络设备可以是核心网设备,例如第二终端的DDNMF网元和/或PKMF网元。可选地,第二网络设备可以是第二终端在HPLMN中的5G-DDNMF和/或PKMF。In some embodiments, the second network device corresponds to the second terminal, and the second network device may be a core network device, such as a DDNMF network element and/or a PKMF network element of the second terminal. Optionally, the second network device may be a 5G-DDNMF and/or PKMF of the second terminal in the HPLMN.
在一些实施例中,第二终端可以是U2N中的远端UE(remote UE),也可以是U2U中的端UE(end UE)。In some embodiments, the second terminal can be a remote UE (remote UE) in U2N or an end UE (end UE) in U2U.
在一些实施例中,第二终端的名称可以是远端终端、远端用户设备、端用户设备、发现设备、监听设备等,对此本公开不做限制。In some embodiments, the name of the second terminal may be a remote terminal, a remote user device, an end user device, a discovery device, a monitoring device, etc., which is not limited in the present disclosure.
在一些实施例中,第一网络设备可以在收到第二网络设备发送的第二终端的请求时,向第二网络设备发送第一信息。具体地,在执行步骤2110之前,第二终端可以向第二网络设备发送请求消息,该请求消息可以用于请求第一业务的标识对应的第一信息,该请求消息可以包括第一业务的标识(例如中继服务码)和第二终端的5G邻近服务PC5安全能力。In some embodiments, the first network device may send the first information to the second network device upon receiving a request from the second terminal sent by the second network device. Specifically, before executing step 2110, the second terminal may send a request message to the second network device, and the request message may be used to request the first information corresponding to the identifier of the first service, and the request message may include the identifier of the first service (e.g., a relay service code) and the 5G proximity service PC5 security capability of the second terminal.
在一些实施例中,第二终端向第二网络设备发送的请求消息中还可以包括公共陆地移动网络(Public Land Mobile Network,PLMN)列表,第二终端在该列表所包含的PLMN中被授权使用中继发现信息请求中的5G邻近服务中继。In some embodiments, the request message sent by the second terminal to the second network device may also include a public land mobile network (PLMN) list, and the second terminal is authorized to use the 5G proximity service relay in the relay discovery information request in the PLMN included in the list.
示例地,第二网络设备可以通过统一数据管理(Unified Data Management,UDM)检查第二终端是否被授权监控U2N中继发现和/或U2U中继发现。For example, the second network device can check through unified data management (UDM) whether the second terminal is authorized to monitor U2N relay discovery and/or U2U relay discovery.
在上述实施例中,如果被授权,第二终端在HPLMN中的5G DDNMF和/或PKMF(即第二网络设备)可以发送发现请求消息至第一终端在HPLMN中的5G DDNMF和/或PKMF(即第一网络设备),发现请求消息可以包括第二终端的PC5安全能力。In the above embodiment, if authorized, the 5G DDNMF and/or PKMF (i.e., the second network device) of the second terminal in the HPLMN can send a discovery request message to the 5G DDNMF and/or PKMF (i.e., the first network device) of the first terminal in the HPLMN, and the discovery request message may include the PC5 security capabilities of the second terminal.
在一些实施例中,第二网络设备收到第二终端的请求消息之后,可以执行中继发现流程,并向所发现的中继的第一网络设备发送请求消息,该请求消息可以用于请求第一业务的标识对应的第一信息。In some embodiments, after receiving the request message from the second terminal, the second network device may execute a relay discovery process and send a request message to the first network device of the discovered relay, where the request message may be used to request the first information corresponding to the identifier of the first service.
示例地,第二终端的5G DDNMF和/或PKMF(即第二网络设备)可以基于映射到RSC的潜在5G邻 近服务中继的HPLMNs,发现支持该RSC的潜在的5G邻近服务中继的5G DDNMF和/或PKMF。For example, the 5G DDNMF and/or PKMF of the second terminal (i.e., the second network device) may be based on the potential 5G neighbor mapped to the RSC. HPLMNs of nearby serving relays discover the 5G DDNMF and/or PKMF of potential 5G nearby serving relays supporting the RSC.
在一些实施例中,第二网络设备可以通过不同方式执行中继发现流程。示例地,第二终端的5G DDNMF和/或PKMF(即第二网络设备)可以通过不同的方式获得潜在5G邻近服务中继的HPLMN(例如从策略控制功能网元(Policy Control Function,PCF)获得或基于本地配置获得)。In some embodiments, the second network device may perform the relay discovery process in different ways. For example, the 5G DDNMF and/or PKMF of the second terminal (i.e., the second network device) may obtain the HPLMN of the potential 5G proximity service relay in different ways (e.g., from a policy control function (PCF) or based on local configuration).
在一些实施例中,第二终端在移动过程中,为了实现第二终端在漫游时可以提供同样的服务,第二终端在VPLMN中的5G-DDNMF和/或PKMF可以和第二终端在HPLMN中的5G-DDNMF和/或PKMF交换发布认证消息(Announce Auth.Message),第二终端无漫游时,则不进行交换。In some embodiments, when the second terminal is moving, in order to enable the second terminal to provide the same service when roaming, the 5G-DDNMF and/or PKMF of the second terminal in the VPLMN can exchange and publish authentication messages (Announce Auth.Message) with the 5G-DDNMF and/or PKMF of the second terminal in the HPLMN. When the second terminal is not roaming, no exchange is performed.
步骤2111,第二网络设备向第二终端发送第一信息。Step 2111: The second network device sends first information to the second terminal.
在一些实施例中,第一信息用于提供给第二终端以执行邻近服务安全。示例地,第二终端选择并使用第一信息进行加密和解密,完整性保护和验证等安全操作。In some embodiments, the first information is provided to the second terminal to perform proximity based service security. For example, the second terminal selects and uses the first information to perform security operations such as encryption and decryption, integrity protection and verification.
在一些实施例中,第二终端向第一终端发送使用第一信息安全保护的广播信息。In some embodiments, the second terminal sends broadcast information protected by the first information security to the first terminal.
在上述实施例中,第二终端基于步骤2110接收到的发现安全信息(即第一信息),对广播信息进行安全保护,并向第一终端发送该保护的广播消息,该广播消息包含第一业务标识。在一些实施例中,第一终端向第二终端发送保护的响应消息。In the above embodiment, the second terminal performs security protection on the broadcast information based on the discovery security information (i.e., the first information) received in step 2110, and sends the protected broadcast message to the first terminal, the broadcast message including the first service identifier. In some embodiments, the first terminal sends a protected response message to the second terminal.
在上述实施例中,第一终端基于从第一终端的5G DDNMF和/或PKMF接收到的发现安全信息(即第一信息),对从第二终端接收的广播消息进行安全性验证,经验证,该广播消息对应的RSC与第一终端自身配置RSC信息进行匹配,当匹配成功时向第二终端发送安全保护的响应消息,匹配不成功时,则不发送。In the above embodiment, the first terminal performs security verification on the broadcast message received from the second terminal based on the discovery security information (i.e., the first information) received from the 5G DDNMF and/or PKMF of the first terminal. After verification, the RSC corresponding to the broadcast message is matched with the RSC information configured by the first terminal itself. When the match is successful, a security protection response message is sent to the second terminal. When the match is unsuccessful, no message is sent.
在一些实施例中,第一终端基于步骤2109接收到的第一信息,将响应消息进行安全保护,并将保护后的响应消息发送至第二终端。In some embodiments, the first terminal performs security protection on the response message based on the first information received in step 2109, and sends the protected response message to the second terminal.
在一些实施例中,第二终端基于从第二终端的5G DDNMF和/或PKMF接收到的第一信息,对从第一终端接收的响应消息进行安全性验证。In some embodiments, the second terminal performs security verification on the response message received from the first terminal based on the first information received from the 5G DDNMF and/or PKMF of the second terminal.
示例地,在第二终端获得第一信息之后,第二终端可以使用第二网络设备发送的第一信息对广播消息进行安全性保护,并广播保护后的广播消息。可选地,第一终端可以接收该保护的广播信息,并进行安全性验证。可选地,第二终端发送的广播消息中可以携带第一业务的标识(以RSC为例),即第二终端对广播消息进行安全性保护时使用的第一信息所对应的第一业务的标识。第一终端使用第一信息对保护的广播消息进行安全性验证后,可以获知该保护的广播消息中的RSC,若第一终端所支持的RSC中存在该保护的广播消息中的RSC,则第一终端可以使用从第一网络设备接收的第一信息对响应消息进行安全性保护,并向第二终端反馈响应消息,第二终端接收到该响应消息,可以使用从第二网络设备接收到的第一信息对该响应消息进行安全性验证;若第一终端所支持的RSC中不存在该保护的广播消息中的RSC,则第一终端不向第二终端反馈响应消息。For example, after the second terminal obtains the first information, the second terminal can use the first information sent by the second network device to perform security protection on the broadcast message, and broadcast the protected broadcast message. Optionally, the first terminal can receive the protected broadcast information and perform security verification. Optionally, the broadcast message sent by the second terminal can carry the identifier of the first service (taking RSC as an example), that is, the identifier of the first service corresponding to the first information used by the second terminal when performing security protection on the broadcast message. After the first terminal uses the first information to perform security verification on the protected broadcast message, the RSC in the protected broadcast message can be learned. If the RSC in the protected broadcast message exists in the RSC supported by the first terminal, the first terminal can use the first information received from the first network device to perform security protection on the response message, and feedback the response message to the second terminal. The second terminal receives the response message and can use the first information received from the second network device to perform security verification on the response message; if the RSC in the protected broadcast message does not exist in the RSC supported by the first terminal, the first terminal does not feedback the response message to the second terminal.
在上述实施例中,由于第一终端向第一网络设备请求第一业务的标识对应的第一信息,第一网络设备可以确定本地是否存储有该第一业务的标识对应的第一信息(或存储有未过期的第一信息),如有则无需再向第三网络设备请求该第一业务的标识对应的第一信息,第一网络设备可以将所存储的第一信息发送至第一终端,则第三网络设备不会对相同的第一业务的标识生成两套第一信息,导致第一终端在选择第一信息进行邻近服务安全处理(例如加解密)时的混乱,第三网络设备生成的第一信息具有唯一性,第一网络设备提供给第一终端的第一信息也唯一对应第一终端所请求的第一业务的标识,便于第一终端可以使用该唯一的第一信息进行安全性保护、安全性验证等操作,避免终端的操作混乱。In the above embodiment, since the first terminal requests the first information corresponding to the identifier of the first service from the first network device, the first network device can determine whether the first information corresponding to the identifier of the first service is stored locally (or the first information that has not expired is stored). If so, there is no need to request the first information corresponding to the identifier of the first service from the third network device. The first network device can send the stored first information to the first terminal, and the third network device will not generate two sets of first information for the same identifier of the first service, causing confusion for the first terminal when selecting the first information for proximity service security processing (such as encryption and decryption). The first information generated by the third network device is unique, and the first information provided by the first network device to the first terminal also uniquely corresponds to the identifier of the first service requested by the first terminal, so that the first terminal can use the unique first information to perform security protection, security verification and other operations, thereby avoiding operational confusion of the terminal.
在一些实施例中,步骤2109可以在步骤2110之前执行。In some embodiments, step 2109 may be performed before step 2110 .
本公开所提供的方法能够采用应用服务器确定发现安全信息,由于应用服务器对于不同RSC生成的安全信息具有唯一性,能够实现,即使存在多个中继设备时,生成的发现安全信息相同,便于系统使用安全信息执行安全性保护、安全性验证等操作。The method provided by the present invention can use an application server to determine the discovery security information. Since the security information generated by the application server for different RSCs is unique, it can be achieved that even when there are multiple relay devices, the generated discovery security information is the same, which facilitates the system to use security information to perform security protection, security verification and other operations.
本公开实施例所涉及的通信方法可以包括步骤2101~步骤2111中的至少一者。例如,步骤2108可以作为独立实施例来实施,步骤2101+2102+2104+2105+2106+2107+2108+2109+110+2111可以作为独立实施例来实施,步骤2101+2102+2103+2107+2108+2109+2110+2111可以作为独立实施例来实施,步骤2101+2102+2103+2104+2105+2106+2107+2108+2109+2110+2111可以作为独立实施例来实施,但不限于此。The communication method involved in the embodiments of the present disclosure may include at least one of steps 2101 to 2111. For example, step 2108 may be implemented as an independent embodiment, steps 2101+2102+2104+2105+2106+2107+2108+2109+110+2111 may be implemented as an independent embodiment, steps 2101+2102+2103+2107+2108+2109+2110+2111 may be implemented as an independent embodiment, and steps 2101+2102+2103+2104+2105+2106+2107+2108+2109+2110+2111 may be implemented as an independent embodiment, but are not limited thereto.
图2b是根据本公开实施例示出的通信方法的交互示意图。如图2b所示,本公开实施例涉及通信方法, 用于通信系统100,通信系统100可以包括第一网络设备101,第二网络设备102,第三网络设备103,可选地,通信系统100还包括第一终端和第二终端。上述方法包括:FIG2b is an interactive schematic diagram of a communication method according to an embodiment of the present disclosure. As shown in FIG2b, the present disclosure embodiment relates to a communication method, For use in a communication system 100, the communication system 100 may include a first network device 101, a second network device 102, and a third network device 103. Optionally, the communication system 100 also includes a first terminal and a second terminal. The above method includes:
步骤2201,第一网络设备获取第一信息。Step 2201: A first network device obtains first information.
在一些实施例中,关于第一信息的描述可以参照图2a,在此不予赘述。In some embodiments, the description of the first information can refer to Figure 2a and will not be repeated here.
在一些实施例中,第一网络设备可以获取一个或多个第一业务的标识各自对应的一个或多个第一信息。示例地,第一网络设备可以获取第一信息的配置列表,该配置列表中可以包括一个或多个第一信息以及第一信息所对应的第一业务的标识。In some embodiments, the first network device may obtain one or more first information corresponding to each of the one or more first service identifiers. For example, the first network device may obtain a configuration list of first information, which may include one or more first information and the identifier of the first service corresponding to the first information.
在一些实施例中,第一信息可以是预配置的。第一网络设备可以获取预配置的第一信息。In some embodiments, the first information may be preconfigured. The first network device may obtain the preconfigured first information.
在一些实施例中,第一网络设备获取第一信息可以是指第一信息被预配置在第一网络设备中。In some embodiments, the first network device acquiring the first information may mean that the first information is preconfigured in the first network device.
在一些实施例中,第一信息可以是通过运营商预配置获取,该第一信息是第三网络设备确定的。In some embodiments, the first information may be obtained through operator preconfiguration, and the first information is determined by the third network device.
在一些实施例中,第一网络设备可以不向第三网络设备实时请求第一信息,或言之,第一网络设备可以不从第三网络设备接收第一信息,而是获取第三网络设备预配置的第一信息。In some embodiments, the first network device may not request the first information from the third network device in real time. In other words, the first network device may not receive the first information from the third network device, but obtains the first information preconfigured by the third network device.
在上述实施例中,第一网络设备获取的第一信息的配置列表中,对于不同业务标识,第一信息具有唯一性,可以实现对于某一特定的业务标识,能够有唯一对应的第一信息。In the above embodiment, in the configuration list of the first information acquired by the first network device, the first information is unique for different service identifiers, so that a specific service identifier can have unique corresponding first information.
步骤2202,第一终端向第一网络设备发送第一消息。Step 2202: The first terminal sends a first message to the first network device.
步骤2202的可选实现方式可以参见图2a的步骤2101的可选实现方式、及图2a所涉及的实施例中其他关联部分,此处不再赘述。The optional implementation of step 2202 can refer to the optional implementation of step 2101 in FIG. 2a and other related parts in the embodiment involved in FIG. 2a, which will not be described in detail here.
步骤2203,第三网络设备确定第三网络设备中存储的第一信息过期。Step 2203: The third network device determines that the first information stored in the third network device is expired.
在一些实施例中,第三网络设备可以根据第一信息关联的信息确定第一信息是否过期,示例地,可以通过第一信息关联的定时器信息,确定第一信息是否过期。关于定时器可以参照上述描述,在此不再赘述。In some embodiments, the third network device can determine whether the first information is expired according to information associated with the first information. For example, the third network device can determine whether the first information is expired according to timer information associated with the first information. The timer can be referred to the above description and will not be repeated here.
在一些实施例中,第三网络设备确定第三网络设备获取到的第一业务对应的第一信息过期时,第三网络设备可以重新生成第一信息,即执行步骤2204。In some embodiments, when the third network device determines that the first information corresponding to the first service acquired by the third network device is expired, the third network device may regenerate the first information, that is, execute step 2204 .
在一些实施例中,第一网络设备确定第一网络设备获取到的第一业务对应的第一信息未过期时,可以直接将第一信息发送至第一终端和/或第二网络设备,即可以直接执行步骤2206和/或2207。In some embodiments, when the first network device determines that the first information corresponding to the first service acquired by the first network device is not expired, the first information can be directly sent to the first terminal and/or the second network device, that is, steps 2206 and/or 2207 can be directly executed.
步骤2203的部分可选实现方式可以参见图2a的步骤2106的可选实现方式、及图2a所涉及的实施例中其他关联部分,此处不再赘述。Some optional implementations of step 2203 can refer to the optional implementations of step 2106 in FIG. 2a and other related parts in the embodiment involved in FIG. 2a, which will not be described in detail here.
在一些实施例中,步骤2203可选,第三网络设备可以不判断第三网络设备中存储的第一信息是否过期。In some embodiments, step 2203 is optional, and the third network device may not determine whether the first information stored in the third network device is expired.
步骤2204,第三网络设备确定第一信息。Step 2204: The third network device determines the first information.
在一些实施例中,步骤2204可选,第三网络设备经步骤2203确定第一信息未过期时,步骤2204可以缺省。In some embodiments, step 2204 is optional. When the third network device determines in step 2203 that the first information is not expired, step 2204 may be omitted.
步骤2204的可选实现方式可以参见图2a的步骤2107的可选实现方式、及图2a所涉及的实施例中其他关联部分,此处不再赘述。The optional implementation of step 2204 can refer to the optional implementation of step 2107 in FIG. 2a and other related parts in the embodiment involved in FIG. 2a, which will not be described in detail here.
在上述实施例中,第三网络设备在第一信息未过期的情况下不再确定新的第一信息。In the above embodiment, the third network device no longer determines new first information when the first information has not expired.
步骤2205,第三网络设备向第一网络设备发送第三消息。Step 2205: The third network device sends a third message to the first network device.
在一些实施例中,第三消息中携带更新的第一信息。In some embodiments, the third message carries updated first information.
在一些实施例中,步骤2205可选,第三网络设备经步骤2203确定第一信息未过期时,第三网络设备无需进行第一信息的更新,并且第三网络设备无需向第一网络设备发送第三消息,即不执行步骤2205。In some embodiments, step 2205 is optional. When the third network device determines in step 2203 that the first information is not expired, the third network device does not need to update the first information, and the third network device does not need to send a third message to the first network device, that is, step 2205 is not executed.
在一些实施例中,步骤2205的执行次序可以不固定,第三网络设备对于第一信息的更新取决于第一信息是否过期,更新过程可以在请求步骤之前或第一信息的获取步骤完成之后执行,即步骤2205可以在步骤2202步骤之前执行,也可以在步骤2208之后执行。In some embodiments, the execution order of step 2205 may not be fixed. The update of the first information by the third network device depends on whether the first information is expired. The update process can be executed before the request step or after the step of obtaining the first information is completed, that is, step 2205 can be executed before step 2202 or after step 2208.
步骤2205的可选实现方式可以参见图2a的步骤2108的可选实现方式、及图2a所涉及的实施例中其他关联部分,此处不再赘述。The optional implementation of step 2205 can refer to the optional implementation of step 2108 in FIG. 2a and other related parts in the embodiment involved in FIG. 2a, which will not be described in detail here.
步骤2206,第一网络设备向第一终端发送第一信息。Step 2206: The first network device sends first information to the first terminal.
步骤2206的可选实现方式可以参见图2a的步骤2109的可选实现方式、及图2a所涉及的实施例中其他关联部分,此处不再赘述。 The optional implementation of step 2206 can refer to the optional implementation of step 2109 in FIG. 2a and other related parts in the embodiment involved in FIG. 2a, which will not be described in detail here.
步骤2207,第一网络设备向第二网络设备发送第一信息。Step 2207: The first network device sends first information to the second network device.
步骤2207的可选实现方式可以参见图2a的步骤2110的可选实现方式、及图2a所涉及的实施例中其他关联部分,此处不再赘述。The optional implementation of step 2207 can refer to the optional implementation of step 2110 in FIG. 2a and other related parts in the embodiment involved in FIG. 2a, which will not be described in detail here.
步骤2208,第二网络设备向第二终端发送第一信息。Step 2208: The second network device sends the first information to the second terminal.
在一些实施例中,第二终端基于步骤2208接收到的第一信息,对广播信息进行安全性保护,并向第一终端发送该保护的广播消息,该广播消息包含RSC。In some embodiments, the second terminal performs security protection on the broadcast information based on the first information received in step 2208, and sends the protected broadcast message to the first terminal, where the broadcast message includes the RSC.
在一些实施例中,第一终端基于步骤2206接收到的第一信息,将响应消息进行安全性保护,并将加密后响应消息发送至第二终端。In some embodiments, the first terminal performs security protection on the response message based on the first information received in step 2206, and sends the encrypted response message to the second terminal.
步骤2208的可选实现方式可以参见图2a的步骤2111的可选实现方式、及图2a所涉及的实施例中其他关联部分,此处不再赘述。The optional implementation of step 2208 can refer to the optional implementation of step 2111 in FIG. 2a and other related parts in the embodiment involved in FIG. 2a, which will not be described in detail here.
在上述实施例中,第二网络设备将第一信息发送至第二终端,基于第三网络设备生成的第一信息具有唯一性,第二终端不用再进行对不同发现安全信息的选择,便于第二终端可以使用该第一信息进行安全性保护、安全性验证等操作。In the above embodiment, the second network device sends the first information to the second terminal. The first information generated based on the third network device is unique, and the second terminal no longer needs to select different discovered security information, so that the second terminal can use the first information for security protection, security verification and other operations.
在一些实施例中,步骤2206可以在步骤2207之前执行。In some embodiments, step 2206 may be performed before step 2207 .
本公开提供的方法,第一网络设备可以通过预配置的方式获取第一信息,该第一信息由第三网络设备确定,将第一信息预配置在第一网络设备中,第一网络设备可以根据第一终端所请求的第一业务的标识进行查询,以获得对应的第一信息,并将该第一信息发送至第一终端和/或第二网络设备,避免第一终端在选择第一信息进行邻近服务安全处理(例如加解密)时的混乱,通过预配置方式获取的第一信息具有唯一性,第一网络设备提供给第一终端的第一信息也唯一对应第一终端所请求的第一业务的标识,便于第一终端可以使用该唯一的第一信息进行安全性保护、安全性验证等操作,避免终端的操作混乱。According to the method provided by the present disclosure, a first network device can obtain first information in a pre-configuration manner, the first information is determined by a third network device, and the first information is pre-configured in the first network device. The first network device can query according to the identifier of the first service requested by the first terminal to obtain the corresponding first information, and send the first information to the first terminal and/or the second network device, so as to avoid confusion of the first terminal when selecting the first information for proximity service security processing (such as encryption and decryption). The first information obtained in a pre-configuration manner is unique, and the first information provided by the first network device to the first terminal also uniquely corresponds to the identifier of the first service requested by the first terminal, so that the first terminal can use the unique first information to perform security protection, security verification and other operations, so as to avoid confusion in terminal operations.
本公开实施例所涉及的通信方法可以包括步骤2201~步骤2208中的至少一者。例如,步骤2201可以作为独立实施例来实施,步骤2201+2202+2206+2207+2208可以作为独立实施例来实施,步骤2201+2202+2203+2204+2205+2206+2207+2208可以作为独立实施例来实施,但不限于此。The communication method involved in the embodiments of the present disclosure may include at least one of steps 2201 to 2208. For example, step 2201 may be implemented as an independent embodiment, steps 2201+2202+2206+2207+2208 may be implemented as an independent embodiment, and steps 2201+2202+2203+2204+2205+2206+2207+2208 may be implemented as an independent embodiment, but are not limited thereto.
图3a是根据本公开实施例示出的一种通信方法的流程示意图。如图3a所示,本公开实施例涉及通信方法,用于第一网络设备101,上述方法包括:FIG3a is a flow chart of a communication method according to an embodiment of the present disclosure. As shown in FIG3a, the present disclosure embodiment relates to a communication method, which is used for a first network device 101, and the method includes:
步骤3101、获取第一消息。Step 3101: Get the first message.
步骤3101的可选实现方式可以参见图2a的步骤2101、图2b的步骤2202的可选实现方式、及图2a、图2b所涉及的实施例中其他关联部分,此处不再赘述。The optional implementation of step 3101 can refer to the optional implementation of step 2101 in Figure 2a, step 2202 in Figure 2b, and other related parts in the embodiments involved in Figures 2a and 2b, which will not be repeated here.
在一些实施例中,第一网络设备101可以获取第一终端发送的第一消息。但不限于此,也可以接收由其他主体发送的第一消息。In some embodiments, the first network device 101 may obtain the first message sent by the first terminal, but is not limited thereto, and may also receive the first message sent by other entities.
在一些实施例中,第一网络设备101获取由协议规定的第一消息。In some embodiments, the first network device 101 obtains a first message specified by a protocol.
在一些实施例中,第一网络设备101从高层(upper layer(s))获取第一消息。In some embodiments, the first network device 101 obtains the first message from an upper layer(s).
在一些实施例中,第一网络设备101进行处理从而得到第一消息。In some embodiments, the first network device 101 performs processing to obtain the first message.
在一些实施例中,步骤3101被省略,第一网络设备101自主实现第一消息所指示的功能,或上述功能为缺省或默认。In some embodiments, step 3101 is omitted, and the first network device 101 autonomously implements the function indicated by the first message, or the above function is default or acquiescent.
步骤3102、确定第一网络设备是否存储有第一业务的标识对应的第一信息。Step 3102: Determine whether the first network device stores first information corresponding to the identifier of the first service.
步骤3102的可选实现方式可以参见图2a的步骤2102的步骤2101的可选实现方式、及图2a所涉及的实施例中其他关联部分,此处不再赘述。The optional implementation of step 3102 can refer to the optional implementation of step 2101 of step 2102 in FIG. 2a and other related parts in the embodiment involved in FIG. 2a, which will not be described in detail here.
步骤3103、发送第二消息。Step 3103: Send the second message.
步骤3103的可选实现方式可以参见图2a的步骤2103的可选实现方式、及图2a所涉及的实施例中其他关联部分,此处不再赘述。The optional implementation of step 3103 can refer to the optional implementation of step 2103 in FIG. 2a and other related parts in the embodiment involved in FIG. 2a, which will not be described in detail here.
在一些实施例中,第二消息可以用于请求第一信息。In some embodiments, the second message may be used to request the first information.
在一些实施例中,第一网络设备101可以向第三网络设备103发送第二消息,但不限于此,也可以向其他主体发送第二消息。In some embodiments, the first network device 101 may send the second message to the third network device 103 , but is not limited thereto, and the second message may also be sent to other entities.
在一些实施例中,第一网络设备101可以通过各种消息发送第二消息。例如,根据第一网络设备与第 三网络设备的种类不同,可以通过上行信号、侧行链路信号或高层信令等消息发送第二消息。In some embodiments, the first network device 101 can send the second message through various messages. The third network device has different types and can send the second message via an uplink signal, a sidelink signal, or a high-layer signaling message.
在一些实施例中,步骤3103被省略,上述功能为缺省或默认。In some embodiments, step 3103 is omitted and the above functions are default or acquiescent.
步骤3104、确定第一网络设备中存储的第一信息是否过期。Step 3104: Determine whether the first information stored in the first network device is expired.
步骤3104的可选实现方式可以参见图2a的步骤2104的可选实现方式、及图2a所涉及的实施例中其他关联部分,此处不再赘述。The optional implementation of step 3104 can refer to the optional implementation of step 2104 in FIG. 2a and other related parts in the embodiment involved in FIG. 2a, which will not be described in detail here.
在一些实施例中,步骤3104被省略,上述功能为缺省或默认。In some embodiments, step 3104 is omitted and the above functions are default or by default.
步骤3105、发送第四消息。Step 3105: Send the fourth message.
步骤3105的可选实现方式可以参见图2a的步骤2105的可选实现方式、及图2a所涉及的实施例中其他关联部分,此处不再赘述。The optional implementation of step 3105 can refer to the optional implementation of step 2105 in FIG. 2a and other related parts in the embodiment involved in FIG. 2a, which will not be described in detail here.
在一些实施例中,第四消息可以用于请求更新第一信息。In some embodiments, the fourth message may be used to request an update of the first information.
在一些实施例中,第一网络设备101可以向第三网络设备103发送第四消息,但不限于此,也可以向其他主体发送第四消息。In some embodiments, the first network device 101 may send the fourth message to the third network device 103 , but is not limited thereto, and the fourth message may also be sent to other entities.
在一些实施例中,第一网络设备101可以通过各种消息发送第四消息。例如,根据第一网络设备与第三网络设备的种类不同,可以通过上行信号、侧行链路信号或高层信令等消息发送第四消息。In some embodiments, the first network device 101 may send the fourth message through various messages. For example, depending on the types of the first network device and the third network device, the fourth message may be sent through an uplink signal, a sidelink signal, or a high-layer signaling message.
在一些实施例中,步骤3105被省略,上述功能为缺省或默认。In some embodiments, step 3105 is omitted and the above functions are default or acquiescent.
步骤3106、获取第三消息。Step 3106: Get the third message.
步骤3106的可选实现方式可以参见图2a的步骤2108、图2b的步骤2205的可选实现方式、及图2a、图2b所涉及的实施例中其他关联部分,此处不再赘述。The optional implementation of step 3106 can refer to the optional implementation of step 2108 in Figure 2a, step 2205 in Figure 2b, and other related parts in the embodiments involved in Figures 2a and 2b, which will not be repeated here.
在一些实施例中,第一网络设备101可以获取第三网络设备发送的第三消息。但不限于此,也可以接收由其他主体发送的第三消息。In some embodiments, the first network device 101 may obtain a third message sent by a third network device, but is not limited thereto, and may also receive a third message sent by other entities.
在一些实施例中,第一网络设备101获取由协议规定的第三消息。In some embodiments, the first network device 101 obtains a third message specified by the protocol.
在一些实施例中,第一网络设备101从高层(upper layer(s))获取第三消息。In some embodiments, the first network device 101 obtains the third message from an upper layer(s).
在一些实施例中,第一网络设备101进行处理从而得到第三消息。In some embodiments, the first network device 101 performs processing to obtain the third message.
步骤3107、向第一终端发送第一信息。Step 3107: Send first information to the first terminal.
步骤3107的可选实现方式可以参见图2a的步骤2109、图2b的步骤2206的可选实现方式、及图2a、图2b所涉及的实施例中其他关联部分,此处不再赘述。The optional implementation of step 3107 can refer to the optional implementation of step 2109 in Figure 2a, step 2206 in Figure 2b, and other related parts in the embodiments involved in Figures 2a and 2b, which will not be repeated here.
在一些实施例中,第一信息可以用于邻近服务的发现安全,例如加解密、完整性保护、加扰等等,其中第一信息与第一业务对应。In some embodiments, the first information may be used for discovery security of the proximity service, such as encryption, integrity protection, scrambling, etc., wherein the first information corresponds to the first service.
在一些实施例中,第一网络设备101可以向第一终端发送第一信息,但不限于此,也可以向其他主体发送第一信息。In some embodiments, the first network device 101 may send the first information to the first terminal, but is not limited thereto, and may also send the first information to other entities.
在一些实施例中,第一网络设备101可以通过各种消息发送第一信息。例如,根据第一网络设备与第一终端的种类不同,可以通过上行信号、侧行链路信号或高层信令等消息发送第一信息。In some embodiments, the first network device 101 may send the first information through various messages. For example, depending on the types of the first network device and the first terminal, the first information may be sent through an uplink signal, a sidelink signal, or a high-layer signaling message.
步骤3108、向第二网络设备发送第一信息。Step 3108: Send the first information to the second network device.
步骤3108的可选实现方式可以参见图2a的步骤2110。图2b的步骤2207的可选实现方式、及图2a、图2b所涉及的实施例中其他关联部分,此处不再赘述。The optional implementation of step 3108 can refer to step 2110 of Figure 2a. The optional implementation of step 2207 of Figure 2b and other related parts of the embodiments involved in Figures 2a and 2b are not described in detail here.
在一些实施例中,第一信息可以用于邻近服务的发现安全,例如加解密、完整性保护、加扰等等,其中第一信息与第一业务对应。In some embodiments, the first information may be used for discovery security of the proximity service, such as encryption, integrity protection, scrambling, etc., wherein the first information corresponds to the first service.
在一些实施例中,第一网络设备101可以向第二网络设备发送第一信息,但不限于此,也可以向其他主体发送第一信息。In some embodiments, the first network device 101 may send the first information to the second network device, but is not limited thereto, and may also send the first information to other entities.
在一些实施例中,第一网络设备101可以通过各种消息发送第一信息。例如,根据第一网络设备与第二网络设备的种类不同,可以通过上行信号、侧行链路信号或高层信令等消息发送第一信息。In some embodiments, the first network device 101 may send the first information through various messages. For example, depending on the types of the first network device and the second network device, the first information may be sent through an uplink signal, a sidelink signal, or a high-layer signaling message.
本公开实施例所涉及的通信方法可以包括步骤3101-步骤3108中的至少一者。例如,步骤3106可以作为独立实施例来实施,步骤3101+3102+3103+3106+3107+3108可以作为独立实施例来实施,步骤3101+3102+3103+3106+3107+3108可以作为独立实施例来实施,但不限于此。The communication method involved in the embodiment of the present disclosure may include at least one of step 3101 to step 3108. For example, step 3106 may be implemented as an independent embodiment, steps 3101+3102+3103+3106+3107+3108 may be implemented as an independent embodiment, and steps 3101+3102+3103+3106+3107+3108 may be implemented as an independent embodiment, but are not limited thereto.
在一些实施例中,步骤3103、步骤3104、步骤3105、步骤3105是可选的,在不同实施例中可以对这些步骤中的一个或多个步骤进行省略或替代。 In some embodiments, step 3103, step 3104, step 3105, and step 3106 are optional, and one or more of these steps may be omitted or replaced in different embodiments.
在本实施方式或实施例中,在不矛盾的情况下,各步骤可以独立、任意组合或交换顺序,可选方式或可选例可以任意组合,且可以与其他实施方式或其他实施例的任意步骤之间进行任意组合。In this implementation mode or example, unless there is any contradiction, each step can be independent, arbitrarily combined or exchanged in order, the optional methods or optional examples can be arbitrarily combined, and can be arbitrarily combined with any steps of other implementation modes or other examples.
图3b是根据本公开实施例示出的通信方法的流程示意图。如图3b所示,本公开实施例涉及通信方法,用于第一网络设备101,上述方法包括:FIG3b is a flow chart of a communication method according to an embodiment of the present disclosure. As shown in FIG3b, the present disclosure embodiment relates to a communication method, which is used for a first network device 101, and the method includes:
步骤3201、获取第一信息。Step 3201: Obtain first information.
步骤3201的可选实现方式可以参见图2b的步骤2201的可选实现方式、及图2b所涉及的实施例中其他关联部分,此处不再赘述。The optional implementation of step 3201 can refer to the optional implementation of step 2201 in Figure 2b and other related parts in the embodiment involved in Figure 2b, which will not be repeated here.
在一些实施例中,第一网络设备101可以获取第三网络设备发送的第一信息配置列表。但不限于此,也可以接收由其他主体发送的第一信息配置列表。In some embodiments, the first network device 101 may obtain the first information configuration list sent by the third network device, but is not limited thereto, and may also receive the first information configuration list sent by other entities.
在一些实施例中,第一网络设备101获取由协议规定的第一信息配置列表。In some embodiments, the first network device 101 obtains a first information configuration list specified by a protocol.
在一些实施例中,第一网络设备101从高层(upper layer(s))获取第一信息配置列表。In some embodiments, the first network device 101 obtains the first information configuration list from an upper layer(s).
在一些实施例中,第一网络设备101进行处理从而得到第一信息配置列表。In some embodiments, the first network device 101 performs processing to obtain a first information configuration list.
步骤3202、获取第一消息。Step 3202: Get the first message.
步骤3202的可选实现方式可以参见图2a的步骤2101、图2b的步骤2202、图3a的步骤3101的可选实现方式、及图2a、图2b、图3a所涉及的实施例中其他关联部分,此处不再赘述。The optional implementation of step 3202 can refer to the optional implementation of step 2101 in Figure 2a, step 2202 in Figure 2b, step 3101 in Figure 3a, and other related parts in the embodiments involved in Figures 2a, 2b, and 3a, which will not be repeated here.
在一些实施例中,第一网络设备101可以获取第一终端发送的第一消息。但不限于此,也可以接收由其他主体发送的第一信息。In some embodiments, the first network device 101 may obtain the first message sent by the first terminal, but is not limited thereto, and may also receive the first message sent by other entities.
在一些实施例中,第一网络设备101获取由协议规定的第一消息。In some embodiments, the first network device 101 obtains a first message specified by a protocol.
在一些实施例中,第一网络设备101从高层(upper layer(s))获取第一消息。In some embodiments, the first network device 101 obtains the first message from an upper layer(s).
在一些实施例中,第一网络设备101进行处理从而得到第一消息。In some embodiments, the first network device 101 performs processing to obtain the first message.
步骤3203、获取第三消息。Step 3203: Get the third message.
步骤3203的可选实现方式可以参见图2a的步骤2108、图2b的步骤2205、图3a的步骤3106的可选实现方式、及图2a、图2b、图3a所涉及的实施例中其他关联部分,此处不再赘述。The optional implementation of step 3203 can refer to the optional implementation of step 2108 in Figure 2a, step 2205 in Figure 2b, step 3106 in Figure 3a, and other related parts in the embodiments involved in Figures 2a, 2b, and 3a, which will not be repeated here.
在一些实施例中,第一网络设备101可以获取第三网络设备发送的第三消息。但不限于此,也可以接收由其他主体发送的第三消息。In some embodiments, the first network device 101 may obtain a third message sent by a third network device, but is not limited thereto, and may also receive a third message sent by other entities.
在一些实施例中,第一网络设备101获取由协议规定的第三消息。In some embodiments, the first network device 101 obtains a third message specified by the protocol.
在一些实施例中,第一网络设备101从高层(upper layer(s))获取第三消息。In some embodiments, the first network device 101 obtains the third message from an upper layer(s).
在一些实施例中,第一网络设备101进行处理从而得到第三消息。In some embodiments, the first network device 101 performs processing to obtain the third message.
在一些实施例中,步骤3203被省略,上述功能为缺省或默认。In some embodiments, step 3203 is omitted and the above functions are default or by default.
步骤3204、向第一终端发送第一信息。Step 3204: Send first information to the first terminal.
步骤3204的可选实现方式可以参见图2a的步骤2109、图2b的步骤2206、图3a的步骤3107的可选实现方式及图2a、图2b、图3a所涉及的实施例中其他关联部分,此处不再赘述。The optional implementation of step 3204 can refer to the optional implementation of step 2109 in Figure 2a, step 2206 in Figure 2b, step 3107 in Figure 3a and other related parts in the embodiments involved in Figures 2a, 2b and 3a, which will not be repeated here.
在一些实施例中,第一信息可以用于邻近服务的发现安全,例如加解密、完整性保护、加扰等等,其中第一信息与第一业务对应。In some embodiments, the first information may be used for discovery security of the proximity service, such as encryption, integrity protection, scrambling, etc., wherein the first information corresponds to the first service.
在一些实施例中,第一网络设备101可以向第一终端发送第一信息,但不限于此,也可以向其他主体发送第一信息。In some embodiments, the first network device 101 may send the first information to the first terminal, but is not limited thereto, and may also send the first information to other entities.
在一些实施例中,第一网络设备101可以通过各种消息发送第一信息。例如,根据第一网络设备与第一终端的种类不同,可以通过上行信号、侧行链路信号或高层信令等消息发送第一信息。In some embodiments, the first network device 101 may send the first information through various messages. For example, depending on the types of the first network device and the first terminal, the first information may be sent through an uplink signal, a sidelink signal, or a high-layer signaling message.
步骤3205、向第二网络设备发送第一信息。Step 3205: Send the first information to the second network device.
步骤3205的可选实现方式可以参见图2a的步骤2110、图2b的步骤2207、图3a的步骤3108的可选实现方式及图2a、图2b、图3a所涉及的实施例中其他关联部分,此处不再赘述。The optional implementation of step 3205 can refer to the optional implementation of step 2110 in Figure 2a, step 2207 in Figure 2b, step 3108 in Figure 3a and other related parts in the embodiments involved in Figures 2a, 2b and 3a, which will not be repeated here.
在一些实施例中,第一信息可以用于邻近服务的发现安全,例如加解密、完整性保护、加扰等等,其中第一信息与第一业务对应。In some embodiments, the first information may be used for discovery security of the proximity service, such as encryption, integrity protection, scrambling, etc., wherein the first information corresponds to the first service.
在一些实施例中,第一网络设备101可以向第二网络设备发送第一信息,但不限于此,也可以向其他主体发送第一信息。In some embodiments, the first network device 101 may send the first information to the second network device, but is not limited thereto, and may also send the first information to other entities.
在一些实施例中,第一网络设备101可以通过各种消息发送第一信息。例如,根据第一网络设备与第 二网络设备的种类不同,可以通过上行信号、侧行链路信号或高层信令等消息发送第一信息。In some embodiments, the first network device 101 can send the first information through various messages. The second network device has different types and can send the first information via an uplink signal, a sidelink signal, or a high-layer signaling message.
本公开实施例所涉及的通信方法可以包括步骤3201-步骤3205中的至少一者。例如,步骤3201可以作为独立实施例来实施,步骤3201+3202+3204+3205可以作为独立实施例来实施,但不限于此。The communication method involved in the embodiment of the present disclosure may include at least one of step 3201 to step 3205. For example, step 3201 may be implemented as an independent embodiment, and steps 3201+3202+3204+3205 may be implemented as independent embodiments, but are not limited thereto.
在本实施方式或实施例中,在不矛盾的情况下,各步骤可以独立、任意组合或交换顺序,可选方式或可选例可以任意组合,且可以与其他实施方式或实施例任意组合。In this implementation mode or example, unless there is any contradiction, each step can be independent, arbitrarily combined or exchanged in order, and the optional methods or optional examples can be arbitrarily combined and can be arbitrarily combined with other implementation modes or examples.
图3c是根据本公开实施例示出的通信方法的流程示意图。如图3c所示,本公开实施例涉及通信方法,用于第一网络设备101,上述方法包括:FIG3c is a flow chart of a communication method according to an embodiment of the present disclosure. As shown in FIG3c, the present disclosure embodiment relates to a communication method, which is used for a first network device 101, and the method includes:
步骤3301、获取第一信息。Step 3301: Obtain first information.
步骤3301的可选实现方式可以参见图2a的步骤2108、图2b的步骤2205、图3a的步骤3106、图3b的步骤3203的可选实现方式、及图2a、图2b、图3a、图3b所涉及的实施例中其他关联部分,此处不再赘述。The optional implementation methods of step 3301 can refer to the optional implementation methods of step 2108 of Figure 2a, step 2205 of Figure 2b, step 3106 of Figure 3a, step 3203 of Figure 3b, and other related parts in the embodiments involved in Figures 2a, 2b, 3a, and 3b, which will not be repeated here.
在一些实施例中,第一网络设备101可以获取第三网络设备发送的第三消息。但不限于此,也可以接收由其他主体发送的第三消息。In some embodiments, the first network device 101 may obtain a third message sent by a third network device, but is not limited thereto, and may also receive a third message sent by other entities.
在一些实施例中,第三消息携带第一信息。In some embodiments, the third message carries the first information.
在一些实施例中,第一网络设备101获取由协议规定的第三消息。In some embodiments, the first network device 101 obtains a third message specified by the protocol.
在一些实施例中,第一网络设备101从高层(upper layer(s))获取第三消息。In some embodiments, the first network device 101 obtains the third message from an upper layer(s).
在一些实施例中,第一网络设备101进行处理从而得到第三消息。In some embodiments, the first network device 101 performs processing to obtain the third message.
步骤3302、发送第一信息。Step 3302: Send the first message.
步骤3302的可选实现方式可以参见图2a的步骤2109和/或2110、图2b的步骤2206和/或2207的可选实现方式、图3a的步骤3107和/或3108、图3b的步骤3204和/或3205的可选实现方式及图2a、图2b、图3a、图3b所涉及的实施例中其他关联部分,此处不再赘述。For the optional implementation of step 3302, please refer to the optional implementation of step 2109 and/or 2110 of Figure 2a, the optional implementation of step 2206 and/or 2207 of Figure 2b, the optional implementation of step 3107 and/or 3108 of Figure 3a, the optional implementation of step 3204 and/or 3205 of Figure 3b and other related parts in the embodiments involved in Figures 2a, 2b, 3a and 3b, which will not be repeated here.
在一些实施例中,第一信息可以用于邻近服务的发现安全,例如加解密、完整性保护、加扰等等,其中第一信息与第一业务对应。In some embodiments, the first information may be used for discovery security of the proximity service, such as encryption, integrity protection, scrambling, etc., wherein the first information corresponds to the first service.
在一些实施例中,第一网络设备101可以向第二网络设备和/或第一终端发送第一信息,但不限于此,也可以向其他主体发送第一信息。In some embodiments, the first network device 101 may send the first information to the second network device and/or the first terminal, but is not limited thereto, and may also send the first information to other entities.
在一些实施例中,第一网络设备101可以通过各种消息发送第一信息。例如,根据第一网络设备与第二网络设备和/或第一终端的种类不同,可以通过上行信号、侧行链路信号或高层信令等消息发送第一信息。In some embodiments, the first network device 101 may send the first information through various messages. For example, depending on the types of the first network device and the second network device and/or the first terminal, the first information may be sent through an uplink signal, a sidelink signal, or a high-layer signaling message.
可选地,在一些实施例中,获取第三网络设备确定的第一信息包括以下任一项:获取预配置的第一信息,第一信息由第三网络设备确定;或;接收第三网络设备发送的第一信息。Optionally, in some embodiments, obtaining the first information determined by the third network device includes any of the following: obtaining preconfigured first information, the first information being determined by the third network device; or receiving the first information sent by the third network device.
可选地,在一些实施例中,方法还包括:基于第一业务的标识,确定第一网络设备中存储有第一业务的标识对应的第一信息。Optionally, in some embodiments, the method further includes: based on the identifier of the first service, determining that first information corresponding to the identifier of the first service is stored in the first network device.
可选地,在一些实施例中,方法还包括:确定第一网络设备中未存储有第一业务的标识对应的第一信息;向第三网络设备发送第二消息,第二消息用于请求第一信息。Optionally, in some embodiments, the method further includes: determining that the first information corresponding to the identifier of the first service is not stored in the first network device; and sending a second message to the third network device, where the second message is used to request the first information.
可选地,在一些实施例中,接收第三网络设备发送的第一信息包括:接收第三网络设备发送的第三消息,第三消息中携带第一信息。Optionally, in some embodiments, receiving the first information sent by the third network device includes: receiving a third message sent by the third network device, wherein the third message carries the first information.
可选地,在一些实施例中,第三消息中还携带第一信息对应的定时器,定时器用于确定第一信息是否过期。Optionally, in some embodiments, the third message also carries a timer corresponding to the first information, and the timer is used to determine whether the first information is expired.
可选地,在一些实施例中,方法还包括:确定第一网络设备中存储的第一信息过期;向第三网络设备发送第四消息,第四消息用于请求更新第一信息。Optionally, in some embodiments, the method further includes: determining that the first information stored in the first network device is expired; and sending a fourth message to the third network device, where the fourth message is used to request to update the first information.
可选地,在一些实施例中,接收第三网络设备发送的第一信息包括:接收第三网络设备在第一情况下发送的更新的第一信息,其中第一情况为第三网络设备确定第三网络设备中存储的第一信息过期。Optionally, in some embodiments, receiving the first information sent by the third network device includes: receiving updated first information sent by the third network device in a first situation, wherein the first situation is that the third network device determines that the first information stored in the third network device is expired.
关于步骤3301-3302的详细介绍可以参考上述图2a、图2b所示的实施例。For a detailed description of steps 3301 - 3302 , please refer to the embodiments shown in FIG. 2 a and FIG. 2 b .
图4a是根据本公开实施例示出的通信方法的流程示意图。如图4a所示,本公开实施例涉及通信方法,用于第三网络设备103,上述方法包括:FIG4a is a flow chart of a communication method according to an embodiment of the present disclosure. As shown in FIG4a, the present disclosure embodiment relates to a communication method, which is used for a third network device 103, and the method includes:
步骤4101、获取第二消息。Step 4101: Get the second message.
步骤4101的可选实现方式可以参见图2a的步骤2103的可选实现方式、图3a的步骤3103的可选实现 方式及图2a、图3a所涉及的实施例中其他关联部分,此处不再赘述。The optional implementation of step 4101 can refer to the optional implementation of step 2103 in FIG. 2a and the optional implementation of step 3103 in FIG. 3a. The method and other related parts of the embodiments involved in Figures 2a and 3a will not be repeated here.
在一些实施例中,第三网络设备103可以获取第一网络设备发送的第二消息。但不限于此,也可以接收由其他主体发送的第二消息。In some embodiments, the third network device 103 may obtain the second message sent by the first network device, but is not limited thereto, and may also receive the second message sent by other entities.
在一些实施例中,第三网络设备103获取由协议规定的第二消息。In some embodiments, the third network device 103 obtains a second message specified by the protocol.
在一些实施例中,第三网络设备103从高层(upper layer(s))获取第二消息。In some embodiments, the third network device 103 obtains the second message from an upper layer(s).
在一些实施例中,第三网络设备103进行处理从而得到第二消息。In some embodiments, the third network device 103 performs processing to obtain the second message.
在一些实施例中,步骤4101被省略,上述功能为缺省或默认。In some embodiments, step 4101 is omitted and the above functions are default or acquiescent.
步骤4102、获取第四消息。Step 4102: Get the fourth message.
步骤4102的可选实现方式可以参见图2a的步骤2105的可选实现方式、图3a的步骤3105的可选实现方式及图2a、图3a所涉及的实施例中其他关联部分,此处不再赘述。The optional implementation of step 4102 can refer to the optional implementation of step 2105 in Figure 2a, the optional implementation of step 3105 in Figure 3a and other related parts in the embodiments involved in Figures 2a and 3a, which will not be repeated here.
在一些实施例中,第三网络设备103可以获取第一网络设备发送的第四消息。但不限于此,也可以接收由其他主体发送的第二消息。In some embodiments, the third network device 103 may obtain the fourth message sent by the first network device, but is not limited thereto, and may also receive the second message sent by other entities.
在一些实施例中,第三网络设备103获取由协议规定的第四消息。In some embodiments, the third network device 103 obtains a fourth message specified by the protocol.
在一些实施例中,第三网络设备103从高层(upper layer(s))获取第四消息。In some embodiments, the third network device 103 obtains the fourth message from an upper layer(s).
在一些实施例中,第三网络设备103进行处理从而得到第四消息。In some embodiments, the third network device 103 performs processing to obtain a fourth message.
在一些实施例中,步骤4102被省略,上述功能为缺省或默认。In some embodiments, step 4102 is omitted and the above functions are default or acquiescent.
步骤4103、确定第三网络设备中存储的第一信息是否过期。Step 4103: Determine whether the first information stored in the third network device is expired.
步骤4103的可选实现方式可以参见图2a的步骤2106的可选实现方式、及图2a所涉及的实施例中其他关联部分,此处不再赘述。The optional implementation of step 4103 can refer to the optional implementation of step 2106 in FIG. 2a and other related parts in the embodiment involved in FIG. 2a, which will not be described in detail here.
在一些实施例中,步骤4103被省略,上述功能为缺省或默认。In some embodiments, step 4103 is omitted and the above functions are default or acquiescent.
步骤4104、确定第一信息。Step 4104: Determine the first information.
步骤4104的可选实现方式可以参见图2a的步骤2107的可选实现方式、及图2a所涉及的实施例中其他关联部分,此处不再赘述。The optional implementation of step 4104 can refer to the optional implementation of step 2107 in Figure 2a and other related parts in the embodiment involved in Figure 2a, which will not be repeated here.
在一些实施例中,步骤4104被省略,上述功能为缺省或默认。In some embodiments, step 4104 is omitted and the above functions are default or acquiescent.
步骤4105、发送第三消息。Step 4105: Send the third message.
步骤4105的可选实现方式可以参见图2a的步骤2108的可选实现方式、图3a的步骤3106的可选实现方式、及图2a、图3a所涉及的实施例中其他关联部分,此处不再赘述。The optional implementation of step 4105 can refer to the optional implementation of step 2108 in Figure 2a, the optional implementation of step 3106 in Figure 3a, and other related parts in the embodiments involved in Figures 2a and 3a, which will not be repeated here.
在一些实施例中,第三消息携带第一信息。In some embodiments, the third message carries the first information.
在一些实施例中,第三网络设备103可以向第一网络设备101发送第三消息,但不限于此,也可以向其他主体发送第三消息。In some embodiments, the third network device 103 may send the third message to the first network device 101 , but is not limited thereto, and the third message may also be sent to other entities.
在一些实施例中,第三网络设备103可以通过各种消息发送第三消息。例如,根据第一网络设备与第三网络设备的种类不同,可以通过上行信号、侧行链路信号或高层信令等消息发送第三消息。In some embodiments, the third network device 103 may send the third message through various messages. For example, depending on the types of the first network device and the third network device, the third message may be sent through an uplink signal, a sidelink signal, or a high-layer signaling message.
本公开实施例所涉及的通信方法可以包括步骤4101-步骤4105中的至少一者。例如,步骤4103可以作为独立实施例来实施,例如步骤4101+4103+4104+4105可以作为独立实施例来实施,步骤4102+4103+4104+4105可以作为独立实施例来实施,但不限于此。The communication method involved in the embodiment of the present disclosure may include at least one of step 4101 to step 4105. For example, step 4103 may be implemented as an independent embodiment, for example, steps 4101+4103+4104+4105 may be implemented as an independent embodiment, and steps 4102+4103+4104+4105 may be implemented as an independent embodiment, but are not limited thereto.
在一些实施例中,步骤4101、步骤4102、步骤4103是可选的,在不同实施例中可以对这些步骤中的一个或多个步骤进行省略或替代。In some embodiments, step 4101, step 4102, and step 4103 are optional, and one or more of these steps may be omitted or replaced in different embodiments.
在本实施方式或实施例中,在不矛盾的情况下,各步骤可以独立、任意组合或交换顺序,可选方式或可选例可以任意组合,且可以与其他实施方式或实施例任意组合。In this implementation mode or example, unless there is any contradiction, each step can be independent, arbitrarily combined or exchanged in order, and the optional methods or optional examples can be arbitrarily combined and can be arbitrarily combined with other implementation modes or examples.
图4b是根据本公开实施例示出的通信方法的流程示意图。如图4b所示,本公开实施例涉及通信方法,用于第三网络设备103,上述方法包括:FIG4b is a flow chart of a communication method according to an embodiment of the present disclosure. As shown in FIG4b, the present disclosure embodiment relates to a communication method for a third network device 103, the method comprising:
步骤4201、确定第三网络设备中存储的第一信息过期。Step 4201: Determine whether the first information stored in the third network device is expired.
步骤4201的可选实现方式可以参见图2a的步骤2106的可选实现方式、图2b的步骤2203的可选实现方式、及图2a、图2b所涉及的实施例中其他关联部分,此处不再赘述。The optional implementation of step 4201 can refer to the optional implementation of step 2106 in Figure 2a, the optional implementation of step 2203 in Figure 2b, and other related parts in the embodiments involved in Figures 2a and 2b, which will not be repeated here.
在一些实施例中,步骤4201被省略,上述功能为缺省或默认。In some embodiments, step 4201 is omitted and the above functions are default or default.
步骤4202、确定第一信息。 Step 4202: Determine the first information.
步骤4202的可选实现方式可以参见图2a的步骤2107的可选实现方式、图2b的步骤2204的可选实现方式、图4a的步骤4104的可选实现方式、及图2a、图2b、图4a所涉及的实施例中其他关联部分,此处不再赘述。The optional implementation of step 4202 can refer to the optional implementation of step 2107 in Figure 2a, the optional implementation of step 2204 in Figure 2b, the optional implementation of step 4104 in Figure 4a, and other related parts in the embodiments involved in Figures 2a, 2b, and 4a, which will not be repeated here.
步骤4203、发送第三消息。Step 4203: Send the third message.
步骤4203的可选实现方式可以参见图2a的步骤2108的可选实现方式、图2b的步骤2205的可选实现方式、图3a的步骤3106的可选实现方式、图3b的步骤3203的可选实现方式、图4a的步骤4105的可选实现方式及图2a、图2b、图3a、图3b、图4a所涉及的实施例中其他关联部分,此处不再赘述。For the optional implementation of step 4203, reference may be made to the optional implementation of step 2108 of Figure 2a, the optional implementation of step 2205 of Figure 2b, the optional implementation of step 3106 of Figure 3a, the optional implementation of step 3203 of Figure 3b, the optional implementation of step 4105 of Figure 4a and other related parts in the embodiments involved in Figures 2a, 2b, 3a, 3b and 4a, which will not be repeated here.
在一些实施例中,第三消息携带第一信息。In some embodiments, the third message carries the first information.
在一些实施例中,第三网络设备103可以向第一网络设备101发送第三消息,但不限于此,也可以向其他主体发送第三消息。In some embodiments, the third network device 103 may send the third message to the first network device 101 , but is not limited thereto, and the third message may also be sent to other entities.
在一些实施例中,第三网络设备103可以通过各种消息发送第三消息。例如,根据第一网络设备与第三网络设备的种类不同,可以通过上行信号、侧行链路信号或高层信令等消息发送第三消息。In some embodiments, the third network device 103 may send the third message through various messages. For example, depending on the types of the first network device and the third network device, the third message may be sent through an uplink signal, a sidelink signal, or a high-layer signaling message.
在一些实施例中,步骤4203被省略,上述功能为缺省或默认。In some embodiments, step 4203 is omitted and the above functions are default or acquiescent.
图4c是根据本公开实施例示出的通信方法的流程示意图。如图4c所示,本公开实施例涉及通信方法,用于第三网络设备103,上述方法包括:FIG4c is a flow chart of a communication method according to an embodiment of the present disclosure. As shown in FIG4c, the present disclosure embodiment relates to a communication method for a third network device 103, the method comprising:
步骤4301、确定第一信息。Step 4301: Determine the first information.
步骤4301的可选实现方式可以参见图2a的步骤2107的可选实现方式、图2b的步骤2204的可选实现方式、图4a的步骤4104的可选实现方式、图4b的步骤4202的可选实现方式、及图2a、图2b、图4a、图4b所涉及的实施例中其他关联部分,此处不再赘述。The optional implementation method of step 4301 can refer to the optional implementation method of step 2107 in Figure 2a, the optional implementation method of step 2204 in Figure 2b, the optional implementation method of step 4104 in Figure 4a, the optional implementation method of step 4202 in Figure 4b, and other related parts in the embodiments involved in Figures 2a, 2b, 4a, and 4b, which will not be repeated here.
可选地,在一些实施例中,方法还包括:接收第一网络设备发送的第二消息,第二消息用于请求第一信息。Optionally, in some embodiments, the method further includes: receiving a second message sent by the first network device, where the second message is used to request the first information.
可选地,在一些实施例中,方法还包括:向第一网络设备发送第一信息,第一网络设备对应第一终端。Optionally, in some embodiments, the method further includes: sending first information to a first network device, the first network device corresponding to the first terminal.
可选地,在一些实施例中,向第一网络设备发送第一信息包括:向第一网络设备发送第三消息,第三消息中携带第一信息。Optionally, in some embodiments, sending the first information to the first network device includes: sending a third message to the first network device, wherein the third message carries the first information.
可选地,在一些实施例中,第三消息中还携带第一信息对应的定时器,定时器用于确定第一信息是否过期。Optionally, in some embodiments, the third message also carries a timer corresponding to the first information, and the timer is used to determine whether the first information is expired.
可选地,在一些实施例中,向第一网络设备发送第一信息包括:确定第三网络设备中存储的第一信息过期;向第一网元发送更新的第一信息。Optionally, in some embodiments, sending the first information to the first network device includes: determining that the first information stored in the third network device is expired; and sending updated first information to the first network element.
可选地,在一些实施例中,第一信息被预配置到第一网络设备中。Optionally, in some embodiments, the first information is preconfigured into the first network device.
关于步骤4301的详细介绍可以参考上述图2a、图2b实施例。For a detailed description of step 4301, please refer to the above-mentioned embodiments of Figures 2a and 2b.
图5a是根据本公开实施例示出的通信方法的流程示意图。如图5a所示,本公开实施例涉及通信方法,用于第二网络设备102,上述方法包括:FIG5a is a flow chart of a communication method according to an embodiment of the present disclosure. As shown in FIG5a, the present disclosure embodiment relates to a communication method, which is used for a second network device 102, and the method includes:
步骤5101、获取第一信息。Step 5101: Obtain first information.
步骤5101的可选实现方式可以参见图2a的步骤2110、图2b的步骤2207、图3a的步骤3108、图3b的步骤3205、及图2a、图2b、图3a、图3b的步骤所涉及的实施例中其他关联部分。For optional implementations of step 5101, see step 2110 of Figure 2a, step 2207 of Figure 2b, step 3108 of Figure 3a, step 3205 of Figure 3b, and other related parts of the embodiments involved in the steps of Figures 2a, 2b, 3a, and 3b.
在一些实施例中,第二网络设备102可以获取第一网络设备发送的第一信息。但不限于此,也可以接收由其他主体发送的第一信息。In some embodiments, the second network device 102 may obtain the first information sent by the first network device, but is not limited thereto, and may also receive the first information sent by other entities.
在一些实施例中,第二网络设备102获取由协议规定的第一信息。In some embodiments, the second network device 102 obtains first information specified by the protocol.
在一些实施例中,第二网络设备102从高层(upper layer(s))获取第一信息。In some embodiments, the second network device 102 obtains the first information from an upper layer(s).
在一些实施例中,第二网络设备102进行处理从而得到第一信息。In some embodiments, the second network device 102 performs processing to obtain the first information.
步骤5102、发送第一信息。Step 5102: Send the first message.
步骤5102的可选实现方式可以参见图2a的步骤2111、图2b的步骤2208的可选实现方式、及图2a、图2b所涉及的实施例中其他关联部分,此处不再赘述。The optional implementation of step 5102 can refer to the optional implementation of step 2111 in Figure 2a, step 2208 in Figure 2b, and other related parts in the embodiments involved in Figures 2a and 2b, which will not be repeated here.
在一些实施例中,第一信息可以用于邻近服务的发现安全,例如加解密、完整性保护、加扰等等,其中第一信息与第一业务对应。In some embodiments, the first information may be used for discovery security of the proximity service, such as encryption, integrity protection, scrambling, etc., wherein the first information corresponds to the first service.
在一些实施例中,第二网络设备102可以向第二终端发送第一信息,但不限于此,也可以向其他主体 发送第一信息。In some embodiments, the second network device 102 may send the first information to the second terminal, but is not limited thereto, and may also send the first information to other entities. Send the first message.
在一些实施例中,第二网络设备102可以通过各种消息发送第一信息。例如,根据第二网络设备与第二终端的种类不同,可以通过上行信号、侧行链路信号或高层信令等消息发送第一信息。In some embodiments, the second network device 102 may send the first information through various messages. For example, depending on the types of the second network device and the second terminal, the first information may be sent through an uplink signal, a sidelink signal, or a high-layer signaling message.
图5b是根据本公开实施例示出的通信方法的流程示意图。如图5b所示,本公开实施例涉及通信方法,用于第二网络设备102,上述方法包括:FIG5b is a flow chart of a communication method according to an embodiment of the present disclosure. As shown in FIG5b, the present disclosure embodiment relates to a communication method, which is used for the second network device 102, and the method includes:
步骤5201、获取第一信息。Step 5201: Obtain first information.
步骤5201的可选实现方式可以参见图2a的步骤2110、图2b的步骤2207、图3a的步骤3108、图3b的步骤3205、图5a的步骤5101、及图2a、图2b、图3a、图3b、图5a的步骤所涉及的实施例中其他关联部分。For optional implementations of step 5201, see step 2110 of Figure 2a, step 2207 of Figure 2b, step 3108 of Figure 3a, step 3205 of Figure 3b, step 5101 of Figure 5a, and other related parts of the embodiments involved in the steps of Figures 2a, 2b, 3a, 3b, and 5a.
在一些实施例中,第二网络设备102可以获取第一网络设备发送的第一信息。但不限于此,也可以接收由其他主体发送的第一信息。In some embodiments, the second network device 102 may obtain the first information sent by the first network device, but is not limited thereto, and may also receive the first information sent by other entities.
在一些实施例中,第二网络设备102获取由协议规定的第一信息。In some embodiments, the second network device 102 obtains first information specified by the protocol.
在一些实施例中,第二网络设备102从高层(upper layer(s))获取第一信息。In some embodiments, the second network device 102 obtains the first information from an upper layer(s).
在一些实施例中,第二网络设备102进行处理从而得到第一信息。In some embodiments, the second network device 102 performs processing to obtain the first information.
可选地,在一些实施例中,方法还包括:向第二终端发送第一信息,其中,第一信息用于供第二终端选择并使用第一信息进行安全保护。Optionally, in some embodiments, the method further includes: sending first information to the second terminal, wherein the first information is used for the second terminal to select and use the first information for security protection.
以下为对上述方法的示例性介绍。The following is an exemplary introduction to the above method.
如图6示出一种通信方法的流程示意图。本公开实施例示出的方法涉及邻近服务应用服务器生成的发现安全信息(discovery security material)。A flow chart of a communication method is shown in Figure 6. The method shown in the embodiment of the present disclosure involves discovery security material generated by a proximity service application server.
该方法可以包括步骤:The method may include the steps of:
步骤6101-6104涉及被发现用户设备(discoveree UE)或宣告设备(announcing UE),该被发现用户设备可以称为U2N中继或中继用户设备(relay UE)或U2U中继:Steps 6101-6104 involve a discovered UE or an announcing UE, which may be referred to as a U2N relay or relay UE or U2U relay:
步骤6101,在5G邻近服务U2N中继发现(5G ProSe UE-to-Network Relay Discovery)中和5G邻近服务U2U中继发现(5G Prose UE-to-UE Relay Discovery),5G邻近服务U2N中继和U2U中继作为被发现用户设备或宣告设备向5G-DDNMF或PKMF发送中继发现密钥请求(Relay Discovery Key Request),密钥请求包括中继服务码(Relay Service Code,RSC)和其PC5安全能力。Step 6101, in 5G ProSe UE-to-Network Relay Discovery and 5G ProSe UE-to-UE Relay Discovery, the 5G ProSe U2N Relay and U2U Relay, as discovered user devices or declaring devices, send a Relay Discovery Key Request to 5G-DDNMF or PKMF, and the key request includes a Relay Service Code (RSC) and its PC5 security capability.
步骤6102,在5G邻近服务U2N中继发现或U2U中继发现中,5GDDNMF和/或PKMF在UDM检查U2N中继或U2U中继是否被授权发布U2N中继发现流程或U2U终极发现流程。如果U2N中继或U2U中继被授权,并且与RSC关联的发现安全信息没有被存储在5GDDNMF和/或PKMF中,则5GDDNMF和/或PKMF可以通过向邻近服务应用服务器(ProSe Application Server)发送密钥请求消息来请求该发现安全信息。Step 6102, in 5G ProSe U2N relay discovery or U2U relay discovery, 5GDDNMF and/or PKMF checks in UDM whether the U2N relay or U2U relay is authorized to issue the U2N relay discovery procedure or the U2U ultimate discovery procedure. If the U2N relay or U2U relay is authorized and the discovery security information associated with the RSC is not stored in 5GDDNMF and/or PKMF, 5GDDNMF and/or PKMF may request the discovery security information by sending a key request message to the ProSe Application Server.
可选地,发现安全信息可以被更新,一旦5G DDNMF和/或PKMF中存储的发现安全信息失效,5G DDNMF和/或PKMF可以从邻近服务应用服务器请求与RSC关联的新的发现安全信息。Optionally, the discovery security information may be updated, and once the discovery security information stored in the 5G DDNMF and/or PKMF becomes invalid, the 5G DDNMF and/or PKMF may request new discovery security information associated with the RSC from the proximity service application server.
步骤6103,中继用户设备在VPLMN中的5G-DDNMF和/或PKMF可以和中继用户设备在HPLMN中的5G-DDNMF和/或PKMF交换发布认证消息(Announce Auth.Message),中继用户设备无漫游时,则不执行该步骤。In step 6103, the 5G-DDNMF and/or PKMF of the relay user equipment in the VPLMN may exchange and publish authentication messages (Announce Auth.Message) with the 5G-DDNMF and/or PKMF of the relay user equipment in the HPLMN. This step is not executed when the relay user equipment is not roaming.
步骤6104,中继用户设备在HPLMN中的5GDDNMF和/或PKMF返回与RSC相关联的发现安全信息(也可以称为发现安全参数(Discovery Security Parameter))、Current_Time和Max_Offset参数以及选择的PC5安全保护算法,中继用户设备将发现安全信息和选择的PC5算法与RSC一起存储。In step 6104, the 5GDDNMF and/or PKMF of the relay user equipment in the HPLMN returns the discovery security information (also referred to as the discovery security parameter), Current_Time and Max_Offset parameters, and the selected PC5 security protection algorithm associated with the RSC, and the relay user equipment stores the discovery security information and the selected PC5 algorithm together with the RSC.
步骤6105-6110针对发现用户设备(discoverer UE)或监听设备(monitoring UE),该发现用户设备可以称为U2N远端用户设备(remote UE)或端设备(End UE):Steps 6105-6110 are for a discoverer UE or a monitoring UE, which may be referred to as a U2N remote UE or an end UE:
步骤6105,对于5G邻近服务U2N中继发现,5G邻近服务远端用户设备扮演发现UE或者监听UE的角色,对于5G邻近服务U2U中继发现,5G邻近服务端用户设备扮演发现UE或者监听UE的角色,并向5G DDNMF和/或PKMF发送发现密钥请求,密钥请求包括RSC和5G邻近服务远端用户设备的PC5安全能力。远端用户设备或端用户设备可以提供PLMN列表,远端用户设备或端用户设备在该列表所包含的PLMN中被授权使用5G邻近服务U2N中继服务或U2U中继服务。 Step 6105: For 5G proximity service U2N relay discovery, the 5G proximity service remote user equipment plays the role of discovering UE or monitoring UE. For 5G proximity service U2U relay discovery, the 5G proximity service end user equipment plays the role of discovering UE or monitoring UE and sends a discovery key request to the 5G DDNMF and/or PKMF. The key request includes RSC and PC5 security capabilities of the 5G proximity service remote user equipment. The remote user equipment or end user equipment can provide a PLMN list, and the remote user equipment or end user equipment is authorized to use the 5G proximity service U2N relay service or U2U relay service in the PLMNs included in the list.
步骤6106,远端用户设备或端用户设备的5G DDNMF和/或PKMF可以通过UDM检查远端用户设备是否被授权监控U2N中继发现或U2U中继发现。In step 6106, the 5G DDNMF and/or PKMF of the remote user device or the end user device may check through UDM whether the remote user device is authorized to monitor U2N relay discovery or U2U relay discovery.
如果被授权,远端用户设备或端用户设备在HPLMN中的5G DDNMF和/或PKMF可以发送发现密钥请求至中继用户设备在HPLMN中的5G DDNMF和/或PKMF,发现密钥请求信息包括步骤6105中的PC5用户设备安全能力。If authorized, the 5G DDNMF and/or PKMF of the remote user device or the end user device in the HPLMN may send a key discovery request to the 5G DDNMF and/or PKMF of the relay user device in the HPLMN, and the key discovery request information includes the PC5 user device security capabilities in step 6105.
远端用户设备或端用户设备的5G DDNMF和/或PKMF基于映射到RSC的潜在5G邻近服务U2N中继或U2U中继的HPLMNs,发现支持该RSC的潜在的5G邻近服务U2N中继或U2U中继的5G DDNMF和/或PKMF。The 5G DDNMF and/or PKMF of the remote user equipment or the end user equipment discovers the 5G DDNMF and/or PKMF of the potential 5G proximity service U2N relay or U2U relay supporting the RSC based on the HPLMNs of the potential 5G proximity service U2N relay or U2U relay mapped to the RSC.
可选地,5G DDNMF和/或PKMF可以通过不同的方式获得潜在5G邻近服务U2N中继或U2U中继的HPLMN(例如从PCF获得或基于本地配置获得)。Optionally, the 5G DDNMF and/or PKMF may obtain the HPLMN of a potential 5G proximity service U2N relay or U2U relay in different ways (e.g., from the PCF or based on local configuration).
步骤6107,如果步骤6104中的PC5UE安全能力包括选择的PC5安全保护算法,则中继用户设备在HPLMN中的5G DDNMF和/或PKMF发送发现密钥响应消息至远端用户设备在HPLMN中的5G DDNMF和/或PKMF,该消息包括与RSC相关联的发现安全信息和选择的PC5安全保护算法。Step 6107, if the PC5UE security capability in step 6104 includes the selected PC5 security protection algorithm, the 5G DDNMF and/or PKMF of the relay user equipment in the HPLMN sends a discovery key response message to the 5G DDNMF and/or PKMF of the remote user equipment in the HPLMN, and the message includes the discovery security information associated with the RSC and the selected PC5 security protection algorithm.
可选地,所选的PC5安全保护算法与RSC相关联。Optionally, a selected PC5 security protection algorithm is associated with the RSC.
步骤6108,远端用户设备或端用户设备在HPLMN中的5G DDNMF和/或PKMF可以与远端设备或端用户设备在VPLMN中的5G DDNMF和/或PKMF交换发布认证消息。当远端用户设备或端用户设备无漫游时,则不执行该步骤。In step 6108, the 5G DDNMF and/or PKMF of the remote user equipment or end user equipment in the HPLMN may exchange and publish authentication messages with the 5G DDNMF and/or PKMF of the remote user equipment or end user equipment in the VPLMN. This step is not performed when the remote user equipment or end user equipment is not roaming.
步骤6109,远端用户设备或端用户设备的5G DDNMF和/或PKMF返回与RSC相关联的发现安全信息、Current_Time和Max_Offset参数以及选择的PC5安全保护算法,远端用户设备或端用户设备将发现安全信息和选择的PC5算法与RSC一起存储。Step 6109, the 5G DDNMF and/or PKMF of the remote user device or the end user device returns the discovery security information, Current_Time and Max_Offset parameters, and the selected PC5 security protection algorithm associated with the RSC, and the remote user device or the end user device stores the discovery security information and the selected PC5 algorithm together with the RSC.
在PC5上执行步骤6110-6112,以便在使用与RSC相关联的发现安全信息所保护的用户设备之间进行发现。Steps 6110 - 6112 are performed on PC 5 to perform discovery between user devices protected using discovery security information associated with the RSC.
步骤6110,远端用户设备或端用户设备可以使用从其5G DDNMF和/或PKMF接收到的发现安全信息对广播信息进行安全保护,并向中继用户设备发送该保护的广播消息,该广播消息包含RSC。In step 6110, the remote user device or end user device may use the discovery security information received from its 5G DDNMF and/or PKMF to perform security protection on the broadcast information, and send the protected broadcast message including the RSC to the relay user device.
步骤6111,中继用户设备基于从中继用户设备的5G DDNMF和/或PKMF接收到的发现安全信息,对从远端用户设备接收的广播消息进行安全性验证,经验证,该广播消息对应的RSC与中继用户设备自身配置RSC信息进行匹配,当匹配成功时执行步骤6112,匹配不成功时,则不执行。In step 6111, the relay user device performs security verification on the broadcast message received from the remote user device based on the discovery security information received from the 5G DDNMF and/or PKMF of the relay user device. After verification, the RSC corresponding to the broadcast message is matched with the RSC information configured by the relay user device itself. When the match is successful, step 6112 is executed. When the match is unsuccessful, it is not executed.
步骤6112,中继用户设备基于步骤6104接收到的发现安全信息,将响应消息进行安全性保护,并将保护后的响应消息发送至远端用户设备或端用户设备。Step 6112: The relay user equipment performs security protection on the response message based on the discovery security information received in step 6104, and sends the protected response message to the remote user equipment or the end user equipment.
步骤6113,远端用户设备或端用户设备基于从其5G DDNMF和/或PKMF接收到的发现安全信息,对从中继用户设备接收的响应消息进行安全性验证。Step 6113, the remote user device or end user device performs security verification on the response message received from the relay user device based on the discovery security information received from its 5G DDNMF and/or PKMF.
图7a是本公开实施例提出的第一网络设备101的结构示意图。如图7a所示,第一网络设备101包括:收发模块7101,在一些实施例中,上述收发模块可以用于获取第三网络设备确定的第一信息,其中,第一信息用于邻近服务发现安全,第一信息与第一业务对应;向第一终端和/或第二网络设备发送第一信息,第二网络设备对应第二终端。可选地,上述收发模块7101用于执行以上任一方法中第一网络设备101执行的发送和/或接收等通信步骤(例如步骤2101、步骤2103、步骤2105、步骤2108、步骤2109、步骤2110等,但不限于此)中的至少一者,此处不再赘述。在一些实施例中,该第一网络设备101还包括处理模块,用于执行以上任一方法中第一网络设备101执行的其他步骤(例如步骤2102、步骤2104等,但不限于此)中的至少一者,此处不再赘述。FIG7a is a schematic diagram of the structure of the first network device 101 proposed in an embodiment of the present disclosure. As shown in FIG7a, the first network device 101 includes: a transceiver module 7101. In some embodiments, the transceiver module can be used to obtain the first information determined by the third network device, wherein the first information is used for proximity service discovery security, and the first information corresponds to the first service; send the first information to the first terminal and/or the second network device, and the second network device corresponds to the second terminal. Optionally, the transceiver module 7101 is used to execute at least one of the communication steps such as sending and/or receiving performed by the first network device 101 in any of the above methods (for example, step 2101, step 2103, step 2105, step 2108, step 2109, step 2110, etc., but not limited to this), which will not be repeated here. In some embodiments, the first network device 101 also includes a processing module for executing at least one of the other steps (for example, step 2102, step 2104, etc., but not limited to this) performed by the first network device 101 in any of the above methods, which will not be repeated here.
在一些实施例中,获取第三网络设备确定的第一信息包括以下任一项:获取预配置的第一信息,第一信息由第三网络设备确定;或;接收第三网络设备发送的第一信息。In some embodiments, obtaining the first information determined by the third network device includes any of the following: obtaining preconfigured first information, where the first information is determined by the third network device; or receiving the first information sent by the third network device.
在一些实施例中,收发模块7101还用于执行:接收第一终端发送的第一消息,第一消息用于请求第一信息,第一消息携带第一业务的标识。In some embodiments, the transceiver module 7101 is further used to execute: receiving a first message sent by a first terminal, where the first message is used to request first information, and the first message carries an identifier of a first service.
在一些实施例中,第一网络设备还包括处理模块,用于基于第一业务的标识,确定第一网络设备中存储有第一业务的标识对应的第一信息。In some embodiments, the first network device further includes a processing module, configured to determine, based on the identifier of the first service, that first information corresponding to the identifier of the first service is stored in the first network device.
在一些实施例中,第一网络设备还包括处理模块,用于确定第一网络设备中未存储有第一业务的标识 对应的第一信息。In some embodiments, the first network device further includes a processing module for determining that the first network device does not store an identifier of the first service. The corresponding first information.
在一些实施例中,收发模块7101还用于执行:向第三网络设备发送第二消息,第二消息用于请求第一信息。In some embodiments, the transceiver module 7101 is further used to execute: sending a second message to a third network device, where the second message is used to request the first information.
在一些实施例中,收发模块7101还用于执行:接收第三网络设备发送的第三消息,第三消息中携带第一信息。In some embodiments, the transceiver module 7101 is further used to execute: receiving a third message sent by a third network device, where the third message carries the first information.
在一些实施例中,第三消息中还携带第一信息对应的定时器,定时器用于确定第一信息是否过期。In some embodiments, the third message also carries a timer corresponding to the first information, and the timer is used to determine whether the first information is expired.
在一些实施例中,第一网络设备还包括处理模块,用于确定第一网络设备中存储的第一信息过期。In some embodiments, the first network device further includes a processing module configured to determine that the first information stored in the first network device is expired.
在一些实施例中,收发模块7101还用于执行:向第三网络设备发送第四消息,第四消息用于请求更新第一信息。In some embodiments, the transceiver module 7101 is further used to execute: sending a fourth message to the third network device, where the fourth message is used to request to update the first information.
在一些实施例中,接收第三网络设备发送的第一信息包括:接收第三网络设备在第一情况下发送的更新的第一信息,其中第一情况为第三网络设备确定第三网络设备中存储的第一信息过期。In some embodiments, receiving the first information sent by the third network device includes: receiving updated first information sent by the third network device under a first situation, wherein the first situation is that the third network device determines that the first information stored in the third network device is expired.
图7b是本公开实施例提出的第三网络设备103的结构示意图。如图7b所示,第三网络设备103包括:处理模块7301,在一些实施例中,上述处理模块可以用于确定第一信息,第一信息用于邻近服务发现安全,第一信息与第一业务对应。可选地,上述处理模块7301用于执行以上任一方法中第三网络设备103执行的确定通信步骤(例如步骤2107、步骤2204等,但不限于此)中的至少一者,此处不再赘述。在一些实施例中,该第三网络设备103还包括收发模块,用于执行以上任一方法中第三网络设备103执行的其他步骤(例如步骤2103、步骤2105等,但不限于此)中的至少一者,此处不再赘述。FIG7b is a schematic diagram of the structure of the third network device 103 proposed in an embodiment of the present disclosure. As shown in FIG7b, the third network device 103 includes: a processing module 7301. In some embodiments, the processing module can be used to determine the first information, the first information is used for proximity service discovery security, and the first information corresponds to the first service. Optionally, the processing module 7301 is used to execute at least one of the communication determination steps (such as step 2107, step 2204, etc., but not limited to this) performed by the third network device 103 in any of the above methods, which will not be repeated here. In some embodiments, the third network device 103 also includes a transceiver module for executing at least one of the other steps (such as step 2103, step 2105, etc., but not limited to this) performed by the third network device 103 in any of the above methods, which will not be repeated here.
在一些实施例中,第三网络设备还包括收发模块,用于接收第一网络设备发送的第二消息,第二消息用于请求第一信息。In some embodiments, the third network device further includes a transceiver module for receiving a second message sent by the first network device, where the second message is used to request the first information.
在一些实施例中,第三网络设备还包括收发模块,用于向第一网络设备发送第一信息,第一网络设备对应第一终端。In some embodiments, the third network device further includes a transceiver module for sending the first information to the first network device, and the first network device corresponds to the first terminal.
在一些实施例中,第三网络设备还包括收发模块,用于向第一网络设备发送第三消息,第三消息中携带第一信息。In some embodiments, the third network device further includes a transceiver module, configured to send a third message to the first network device, wherein the third message carries the first information.
在一些实施例中,第三消息中还携带第一信息对应的定时器,定时器用于确定第一信息是否过期。In some embodiments, the third message also carries a timer corresponding to the first information, and the timer is used to determine whether the first information is expired.
在一些实施例中,处理模块7301还用于执行:确定第三网络设备中存储的第一信息过期。In some embodiments, the processing module 7301 is further used to execute: determining that the first information stored in the third network device is expired.
在一些实施例中,第三网络设备还包括收发模块,用于向第一网元发送更新的第一信息。In some embodiments, the third network device further includes a transceiver module configured to send updated first information to the first network element.
在一些实施例中,第一信息被预配置到第一网络设备中。In some embodiments, the first information is preconfigured into the first network device.
图7c是本公开实施例提出的第二网络设备102的结构示意图。如图7c所示,第三网络设备102包括:收发模块7201,在一些实施例中,上述收发模块可以用于接收第一网络设备发送的第一信息,第一信息用于邻近服务发现安全,第一信息与第一业务对应,第一网络设备对应第一终端。可选地,上述收发模块7201可以用于执行以上任一方法中第二网络设备102执行的发送和/或接收通信步骤(例如步骤2110、步骤2111等,但不限于此)中的至少一者,此处不再赘述。FIG7c is a schematic diagram of the structure of the second network device 102 proposed in an embodiment of the present disclosure. As shown in FIG7c, the third network device 102 includes: a transceiver module 7201. In some embodiments, the transceiver module can be used to receive the first information sent by the first network device, the first information is used for proximity service discovery security, the first information corresponds to the first service, and the first network device corresponds to the first terminal. Optionally, the transceiver module 7201 can be used to execute at least one of the sending and/or receiving communication steps (such as step 2110, step 2111, etc., but not limited to this) performed by the second network device 102 in any of the above methods, which will not be repeated here.
在一些实施例中,收发模块7201还用于执行:向第二终端发送第一信息,其中,第一信息用于供第二终端选择并使用第一信息进行安全保护。In some embodiments, the transceiver module 7201 is further used to execute: sending first information to the second terminal, wherein the first information is used for the second terminal to select and use the first information for security protection.
如图8a所示,通信设备8100包括一个或多个处理器8101。处理器8101可以是通用处理器或者专用处理器等,例如可以是基带处理器或中央处理器。基带处理器可以用于对通信协议以及通信数据进行处理,中央处理器可以用于对通信装置(如,基站、基带芯片,终端设备、终端设备芯片,DU或CU等)进行控制,执行程序,处理程序的数据。处理器8101用于调用指令以使得通信设备8100执行以上任一方法。As shown in FIG8a, the communication device 8100 includes one or more processors 8101. The processor 8101 may be a general-purpose processor or a dedicated processor, for example, a baseband processor or a central processing unit. The baseband processor may be used to process the communication protocol and the communication data, and the central processing unit may be used to control the communication device (such as a base station, a baseband chip, a terminal device, a terminal device chip, a DU or a CU, etc.), execute a program, and process the data of the program. The processor 8101 is used to call instructions so that the communication device 8100 executes any of the above methods.
在一些实施例中,通信设备8100还包括用于存储指令的一个或多个存储器8102。可选地,全部或部分存储器8102也可以处于通信设备8100之外。In some embodiments, the communication device 8100 further includes one or more memories 8102 for storing instructions. Optionally, all or part of the memory 8102 may also be outside the communication device 8100.
在一些实施例中,通信设备8100还包括一个或多个收发器8103。在通信设备8100包括一个或多个收发器8103时,上述方法中的发送接收等通信步骤由收发器8103执行,其他步骤由处理器8101执行。In some embodiments, the communication device 8100 further includes one or more transceivers 8103. When the communication device 8100 includes one or more transceivers 8103, the communication steps such as sending and receiving in the above method are executed by the transceiver 8103, and the other steps are executed by the processor 8101.
在一些实施例中,收发器可以包括接收器和发送器,接收器和发送器可以是分离的,也可以集成在一起。可选地,收发器、收发单元、收发机、收发电路等术语可以相互替换,发送器、发送单元、发送机、发送电路等术语可以相互替换,接收器、接收单元、接收机、接收电路等术语可以相互替换。In some embodiments, the transceiver may include a receiver and a transmitter, and the receiver and the transmitter may be separate or integrated. Optionally, the terms such as transceiver, transceiver unit, transceiver, transceiver circuit, etc. may be replaced with each other, the terms such as transmitter, transmission unit, transmitter, transmission circuit, etc. may be replaced with each other, and the terms such as receiver, receiving unit, receiver, receiving circuit, etc. may be replaced with each other.
可选地,通信设备8100还包括一个或多个接口电路8104,接口电路8104与存储器8102连接,接口 电路8104可用于从存储器8102或其他装置接收信号,可用于向存储器8102或其他装置发送信号。例如,接口电路8104可读取存储器8102中存储的指令,并将该指令发送给处理器8101。Optionally, the communication device 8100 further includes one or more interface circuits 8104, the interface circuit 8104 is connected to the memory 8102, and the interface circuit 8104 is connected to the memory 8102. The circuit 8104 may be used to receive signals from the memory 8102 or other devices, and may be used to send signals to the memory 8102 or other devices. For example, the interface circuit 8104 may read instructions stored in the memory 8102 and send the instructions to the processor 8101.
以上实施例描述中的通信设备8100可以是网络设备或者终端,但本公开中描述的通信设备8100的范围并不限于此,通信设备8100的结构可以不受图8a的限制。通信设备可以是独立的设备或者可以是较大设备的一部分。例如通信设备可以是:1)独立的集成电路IC,或芯片,或,芯片系统或子系统;(2)具有一个或多个IC的集合,可选地,上述IC集合也可以包括用于存储数据,程序的存储部件;(3)ASIC,例如调制解调器(Modem);(4)可嵌入在其他设备内的模块;(5)接收机、终端设备、智能终端设备、蜂窝电话、无线设备、手持机、移动单元、车载设备、网络设备、云设备、人工智能设备等等;(6)其他等等。The communication device 8100 described in the above embodiments may be a network device or a terminal, but the scope of the communication device 8100 described in the present disclosure is not limited thereto, and the structure of the communication device 8100 may not be limited by FIG. 8a. The communication device may be an independent device or may be part of a larger device. For example, the communication device may be: 1) an independent integrated circuit IC, or a chip, or a chip system or subsystem; (2) a collection of one or more ICs, optionally, the above IC collection may also include a storage component for storing data and programs; (3) an ASIC, such as a modem; (4) a module that can be embedded in other devices; (5) a receiver, a terminal device, an intelligent terminal device, a cellular phone, a wireless device, a handheld device, a mobile unit, a vehicle-mounted device, a network device, a cloud device, an artificial intelligence device, etc.; (6) others, etc.
图8b是本公开实施例提出的芯片8200的结构示意图。对于通信设备8100可以是芯片或芯片系统的情况,可以参见图8b所示的芯片8200的结构示意图,但不限于此。Fig. 8b is a schematic diagram of the structure of a chip 8200 provided in an embodiment of the present disclosure. In the case where the communication device 8100 may be a chip or a chip system, reference may be made to the schematic diagram of the structure of the chip 8200 shown in Fig. 8b, but the present invention is not limited thereto.
芯片8200包括一个或多个处理器8201,处理器8201用于调用指令以使得芯片8200执行以上任一方法。The chip 8200 includes one or more processors 8201, and the processor 8201 is used to call instructions so that the chip 8200 executes any of the above methods.
在一些实施例中,芯片8200还包括一个或多个接口电路8202,接口电路8202与存储器8203连接,接口电路8202可以用于从存储器8203或其他装置接收信号,接口电路8202可用于向存储器8203或其他装置发送信号。例如,接口电路8202可读取存储器8203中存储的指令,并将该指令发送给处理器8201。可选地,接口电路、接口、收发管脚、收发器等术语可以相互替换。In some embodiments, the chip 8200 further includes one or more interface circuits 8202, which are connected to the memory 8203. The interface circuit 8202 can be used to receive signals from the memory 8203 or other devices, and the interface circuit 8202 can be used to send signals to the memory 8203 or other devices. For example, the interface circuit 8202 can read the instructions stored in the memory 8203 and send the instructions to the processor 8201. Optionally, the terms such as interface circuit, interface, transceiver pin, and transceiver can be replaced with each other.
在一些实施例中,芯片8200还包括用于存储指令的一个或多个存储器8203。可选地,全部或部分存储器8203可以处于芯片8200之外。In some embodiments, the chip 8200 further includes one or more memories 8203 for storing instructions. Optionally, all or part of the memory 8203 may be outside the chip 8200.
本公开还提出存储介质,上述存储介质上存储有指令,当上述指令在通信设备8100上运行时,使得通信设备8100执行以上任一方法。可选地,上述存储介质是电子存储介质。可选地,上述存储介质是计算机可读存储介质,但不限于此,其也可以是其他装置可读的存储介质。可选地,上述存储介质可以是非暂时性(non-transitory)存储介质,但不限于此,其也可以是暂时性存储介质。The present disclosure also proposes a storage medium, on which instructions are stored, and when the instructions are executed on the communication device 8100, the communication device 8100 executes any of the above methods. Optionally, the storage medium is an electronic storage medium. Optionally, the storage medium is a computer-readable storage medium, but is not limited to this, and it can also be a storage medium readable by other devices. Optionally, the storage medium can be a non-transitory storage medium, but is not limited to this, and it can also be a temporary storage medium.
本公开还提出程序产品,上述程序产品被通信设备8100执行时,使得通信设备8100执行以上任一方法。可选地,上述程序产品是计算机程序产品。The present disclosure also proposes a program product, which, when executed by the communication device 8100, enables the communication device 8100 to execute any of the above methods. Optionally, the program product is a computer program product.
本公开还提出计算机程序,当其在计算机上运行时,使得计算机执行以上任一方法。The present disclosure also proposes a computer program, which, when executed on a computer, causes the computer to execute any one of the above methods.
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机程序。在计算机上加载和执行所述计算机程序时,全部或部分地产生按照本公开实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机程序可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机程序可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(digital subscriber line,DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质(例如,软盘、硬盘、磁带)、光介质(例如,高密度数字视频光盘(digital video disc,DVD))、或者半导体介质(例如,固态硬盘(solid state disk,SSD))等。In the above embodiments, it can be implemented in whole or in part by software, hardware, firmware or any combination thereof. When implemented by software, it can be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer programs. When the computer program is loaded and executed on a computer, the process or function described in the embodiment of the present disclosure is generated in whole or in part. The computer can be a general-purpose computer, a special-purpose computer, a computer network, or other programmable device. The computer program can be stored in a computer-readable storage medium, or transmitted from one computer-readable storage medium to another computer-readable storage medium. For example, the computer program can be transmitted from a website site, computer, server or data center by wired (e.g., coaxial cable, optical fiber, digital subscriber line (digital subscriber line, DSL)) or wireless (e.g., infrared, wireless, microwave, etc.) mode to another website site, computer, server or data center. The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device such as a server or data center that includes one or more available media integrated. The available medium may be a magnetic medium (e.g., a floppy disk, a hard disk, a magnetic tape), an optical medium (e.g., a high-density digital video disc (DVD)), or a semiconductor medium (e.g., a solid state disk (SSD)), etc.
本公开中各表所示的对应关系可以被配置,也可以是预定义的。各表中的信息的取值仅仅是举例,可以配置为其他值,本公开并不限定。在配置信息与各参数的对应关系时,并不一定要求必须配置各表中示意出的所有对应关系。例如,本公开中的表格中,某些行示出的对应关系也可以不配置。又例如,可以基于上述表格做适当的变形调整,例如,拆分,合并等等。上述各表中标题示出参数的名称也可以采用通信装置可理解的其他名称,其参数的取值或表示方式也可以通信装置可理解的其他取值或表示方式。上述各表在实现时,也可以采用其他的数据结构,例如可以采用数组、队列、容器、栈、线性表、指针、链表、树、图、结构体、类、堆、散列表或哈希表等。The corresponding relationships shown in the tables in the present disclosure can be configured or predefined. The values of the information in each table are only examples and can be configured as other values, which are not limited by the present disclosure. When configuring the corresponding relationship between the information and each parameter, it is not necessarily required to configure all the corresponding relationships illustrated in each table. For example, in the table in the present disclosure, the corresponding relationships shown in some rows may not be configured. For another example, appropriate deformation adjustments can be made based on the above table, such as splitting, merging, etc. The names of the parameters shown in the titles of the above tables can also use other names that can be understood by the communication device, and the values or representations of the parameters can also be other values or representations that can be understood by the communication device. When implementing the above tables, other data structures can also be used, such as arrays, queues, containers, stacks, linear lists, pointers, linked lists, trees, graphs, structures, classes, heaps, hash tables or hash tables.
本公开中的预定义可以理解为定义、预先定义、存储、预存储、预协商、预配置、固化、或预烧制。The predefined in the present disclosure may be understood as defined, predefined, stored, pre-stored, pre-negotiated, pre-configured, solidified, or pre-burned.
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够 以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本公开的范围。Those skilled in the art will appreciate that the units and algorithm steps of the various examples described in the embodiments disclosed herein can be These functions are implemented in electronic hardware, or in a combination of computer software and electronic hardware. Whether these functions are implemented in hardware or software depends on the specific application and design constraints of the technical solution. Professional and technical personnel can use different methods to implement the described functions for each specific application, but such implementation should not be considered beyond the scope of this disclosure.
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。Those skilled in the art can clearly understand that, for the convenience and brevity of description, the specific working processes of the systems, devices and units described above can refer to the corresponding processes in the aforementioned method embodiments and will not be repeated here.
以上所述,仅为本公开的具体实施方式,但本公开的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本公开揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本公开的保护范围之内。因此,本公开的保护范围应以所述权利要求的保护范围为准。 The above is only a specific embodiment of the present disclosure, but the protection scope of the present disclosure is not limited thereto. Any person skilled in the art who is familiar with the technical field can easily think of changes or substitutions within the technical scope disclosed in the present disclosure, which should be included in the protection scope of the present disclosure. Therefore, the protection scope of the present disclosure should be based on the protection scope of the claims.
Claims (23)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2023/119183 WO2025054983A1 (en) | 2023-09-15 | 2023-09-15 | Communication method, apparatus and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2023/119183 WO2025054983A1 (en) | 2023-09-15 | 2023-09-15 | Communication method, apparatus and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2025054983A1 true WO2025054983A1 (en) | 2025-03-20 |
Family
ID=95020770
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2023/119183 WO2025054983A1 (en) | 2023-09-15 | 2023-09-15 | Communication method, apparatus and storage medium |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2025054983A1 (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104185208A (en) * | 2013-05-20 | 2014-12-03 | 华为终端有限公司 | Approaching business authorizing method, device and system thereof |
US20210345104A1 (en) * | 2020-05-01 | 2021-11-04 | Qualcomm Incorporated | Relay sidelink communications for secure link establishment |
CN115152254A (en) * | 2022-04-02 | 2022-10-04 | 北京小米移动软件有限公司 | Relay communication method, device, communication device and storage medium |
CN115190478A (en) * | 2022-08-29 | 2022-10-14 | 中国电信股份有限公司 | Key processing method, system and storage medium |
-
2023
- 2023-09-15 WO PCT/CN2023/119183 patent/WO2025054983A1/en unknown
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104185208A (en) * | 2013-05-20 | 2014-12-03 | 华为终端有限公司 | Approaching business authorizing method, device and system thereof |
US20210345104A1 (en) * | 2020-05-01 | 2021-11-04 | Qualcomm Incorporated | Relay sidelink communications for secure link establishment |
CN115152254A (en) * | 2022-04-02 | 2022-10-04 | 北京小米移动软件有限公司 | Relay communication method, device, communication device and storage medium |
CN115190478A (en) * | 2022-08-29 | 2022-10-14 | 中国电信股份有限公司 | Key processing method, system and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN113132334B (en) | Authorization result determination method and device | |
US20230029714A1 (en) | Authorization method, policy control function device, and access and mobility management function device | |
US20230239686A1 (en) | Secure communication method, apparatus, and system | |
WO2022012176A1 (en) | Proximity service communication method, management network element, terminal device, and communication system | |
WO2023060409A1 (en) | Sensing control method and apparatus, device, system, and storage medium | |
US20220369092A1 (en) | Method and device for providing direct communication in wireless communication system | |
WO2021068830A1 (en) | Multicast transport method and apparatus | |
WO2021134701A1 (en) | D2d communication method, apparatus and system | |
CN115884155A (en) | Method and device for information transmission | |
US10904763B2 (en) | Network access method and device | |
US20220272577A1 (en) | Communication method and communication apparatus | |
EP4322583A1 (en) | Method for determining security protection enabling mode, communication method, and communication apparatus | |
CN117242750A (en) | Communication management method, device, storage medium and system | |
US11924660B2 (en) | Method and apparatus for group management for group event monitoring | |
WO2025054983A1 (en) | Communication method, apparatus and storage medium | |
CN113556815A (en) | Data transmission method and device | |
WO2024050778A1 (en) | Artificial intelligence service policy updating method and apparatus | |
WO2021068258A1 (en) | Method and apparatus for acquiring security parameters | |
WO2022160183A1 (en) | Method and apparatus for accessing network | |
WO2025026454A1 (en) | Communication method, first function, second function and storage medium | |
CN117280823A (en) | Communication method, device, equipment and storage medium | |
WO2025025238A1 (en) | Sensing service session update method and apparatus | |
WO2025043723A1 (en) | Information processing method and apparatus | |
WO2024229863A1 (en) | Information transmitting method, information receiving method, apparatus, device and storage medium | |
WO2024254749A1 (en) | Information receiving method, terminal verification method and information sending method, and apparatus, device and storage medium |