[go: up one dir, main page]

WO2020052613A1 - Switching method and terminal device - Google Patents

Switching method and terminal device Download PDF

Info

Publication number
WO2020052613A1
WO2020052613A1 PCT/CN2019/105508 CN2019105508W WO2020052613A1 WO 2020052613 A1 WO2020052613 A1 WO 2020052613A1 CN 2019105508 W CN2019105508 W CN 2019105508W WO 2020052613 A1 WO2020052613 A1 WO 2020052613A1
Authority
WO
WIPO (PCT)
Prior art keywords
network
terminal device
mobility management
security context
security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2019/105508
Other languages
French (fr)
Chinese (zh)
Inventor
潘凯
李�赫
陈璟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Publication of WO2020052613A1 publication Critical patent/WO2020052613A1/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0011Control or signalling for completing the hand-off for data sessions of end-to-end connection
    • H04W36/0033Control or signalling for completing the hand-off for data sessions of end-to-end connection with transfer of context information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0055Transmission or use of information for re-establishing the radio link
    • H04W36/0066Transmission or use of information for re-establishing the radio link of control information between different types of networks in order to establish a new radio link in the target network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0055Transmission or use of information for re-establishing the radio link
    • H04W36/0069Transmission or use of information for re-establishing the radio link in case of dual connectivity, e.g. decoupled uplink/downlink
    • H04W36/00695Transmission or use of information for re-establishing the radio link in case of dual connectivity, e.g. decoupled uplink/downlink using split of the control plane or user plane
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/14Reselecting a network or an air interface
    • H04W36/144Reselecting a network or an air interface over a different radio air interface technology
    • H04W36/1443Reselecting a network or an air interface over a different radio air interface technology between licensed networks

Definitions

  • the present application relates to the field of communications, and more particularly, to a handover method and a terminal device.
  • VoNR New air interface voice
  • 5G fifth generation
  • VoNR coverage faces the same problems as long-term evolution bearer voice (VoLTE). That is, if a user who uses VoNR for a call moves to a circuit-switched (CS) coverage area, it is also necessary to ensure that the call is not interrupted.
  • CS circuit-switched
  • a 5G single wireless voice call continuity is defined in the standard, which can solve the switch between the 5G network and the 3rd generation (3G) network, thereby ensuring that the call is not interrupted.
  • 3G network is not capable of high-speed data transmission of the 5G network, if the user stays on the 3G network after ending the 3G network's voice service, the user experience will be greatly affected. Therefore, if the user is in the 4th generation (4G) or 5G network coverage at this time, the user should be returned to the 4G or 5G network.
  • the user When the user is instructed to return to the 4G network, the user will deduce the 4G security context based on the 3G security context. Since the security of the 3G network is worse than 4G, this makes the derived 4G security context risk leakage. For example, the 4G security context can be compromised. The 3G network is known and then obtained by the attacker. At the same time, if the user returns to the 5G network, the 5G security context will be deduced according to the 4G security context described above, which will cause the insecurity of the 3G network to spread to the 5G network and seriously affect the security of network communications.
  • the present application provides a handover method and terminal equipment to avoid the leakage of the 4G security context, thereby affecting the security of the 5G network and improving the security of network communication.
  • a switching method is provided. The method is applied to a scenario in which a terminal device returns to a second network after switching from a third network to the first network.
  • the method includes: the terminal device receives first information, and the first One piece of information includes instruction information that instructs the terminal device to switch from the first network to the second network; when the terminal device has a native security context of the third network, the terminal device uses The security context of the third network is set to the currently used security context; the terminal device sends a tracking area update using the security context protection of the third network to a mobility management entity in the second network. , TAU) request (TAU request) information.
  • the terminal network when a terminal device switches from a first network (such as a 2G / 3G network) to a second network (such as a 4G network), the terminal network can infer the performance of the second network based on the security context of the third network (such as a 5G network) Security key.
  • the security context on the terminal device can be divided into at least the currently used security context and the non-currently used security context according to the state.
  • the security context of the first network is the currently used security context.
  • the security context of the second network After the terminal device receives the instruction to switch to the second network, if the security context of the second network is deduced based on the security context of the first network, the security context of the second network may occur due to the poor security of the first network. There are leaks. Therefore, the present application proposes that the security context currently used can be changed, for example, the security context of the third network is set to the currently used security context, and the security secret of the second network can be derived based on the security context of the third network. Key, which can improve security and user experience.
  • the terminal device uses the currently used security context (the security context of the third network) to protect the TAU request information that is subsequently sent to the mobility management entity, instead of protecting the TAU request message from the 4G mapping security context derived from the 3G security context. , Can prevent Kasme from leaking, and ensure the security of 5G networks and improve the security of network communications.
  • the currently used security context the security context of the third network
  • the method further includes: the terminal device deleting the security context of the first network.
  • the terminal device first deletes the security context of the first network (such as the 2G / 3G network), and then sets the security context of the third network (such as the 5G network) to the currently used security context, which can further ensure the terminal device.
  • the security context of the second network such as a 4G network
  • the security context of the third network is used, thereby ensuring the security of the security context of the second network.
  • the tracking area update request information includes a fifth-generation 5G globally unique temporary terminal equipment identifier mapping and a fourth-generation 4G globally unique temporary terminal equipment identifier and key set. Identifier.
  • the first information is radio resource control RRC release information.
  • the method further includes: when the terminal device does not have a native security context of the third network, the terminal device deletes the first A network security context; the terminal device sends a tracking area update request message without integrity protection to the mobility management entity, so that the mobility management entity performs a re-authentication process.
  • the mobility management entity is Send the tracking area update request information without integrity protection so that the mobility management entity performs a re-authentication process to establish a 4G security context.
  • the first network is a third-generation 3G / second-generation 2G network
  • the second network is a fourth-generation 4G network
  • the third network For the fifth generation 5G network.
  • a switching method is provided. The method is applied to a scenario where a terminal device returns to the second network after switching from the third network to the first network.
  • the method includes: the mobility management entity switches from the third network to the terminal device During the process of going to the first network, the security context of the second network is acquired and saved; when the terminal device switches from the first network to the second network, the mobility management entity according to the second network.
  • the security context protects communication with the terminal device.
  • a terminal device when a terminal device switches from a first network (such as a 2G / 3G network) to a second network (such as a 4G network), the terminal device can make full use of the process of switching from a third network (such as a 5G network) to the first network.
  • the security context of the second network obtained in this way can avoid the re-authentication process when the first network switches back to the second network.
  • the terminal device Before the terminal device is switched from the first network to the second network, it is switched from the third network to the first network, and during the process of switching from the third network to the first network, it will be deduced according to the security context of the third network.
  • the security context of the second network is then used to derive the security context of the first network according to the security context of the second network, so that the terminal device switches from the third network to the first network.
  • This application makes full use of the security context of the second network obtained by the terminal device during the process of switching from the third network to the first network, and then the mobility management entity uses the security context of the second network to protect communication with the terminal device, avoiding The delay caused by the re-authentication process when the terminal device is switched from the first network to the second network is improved, and the user experience is improved.
  • the security context of the second network includes a root key of the second network and a security algorithm of the second network;
  • the acquiring and saving the security context of the second network during the terminal device switching from the third network to the first network includes: during the switching of the terminal device from the third network to the first network, the mobility The management entity receives first request information from the access and mobility management network element, the first request information includes single radio frequency voice call continuity SRVCC handover indication information and a root key of the second network; the mobility management The entity selects a security algorithm of the second network for the terminal according to a preset policy; the mobility management entity determines to save the root secret of the second network and the second network according to the SRVCC handover instruction information.
  • Network security algorithms are used to save the root secret of the second network and the second network according to the SRVCC handover instruction information.
  • the terminal device before the terminal device is switched from the first network (such as a 2G / 3G network) to the second network (such as a 4G network), the terminal device is switched from the third network (such as a 5G network) to the first network.
  • the third network such as a 5G network
  • the root key of the second network is derived from the root key of the third network
  • the security key of the first network is derived from the root key of the second network. So that the terminal device switches from the third network to the first network.
  • the mobility management entity derives the security key of the first network, it does not save the root key of the second network, nor does it select and save the security algorithm of the second network.
  • the mobility management entity when the terminal device is switched from the first network to the second network, stores the second network obtained by the terminal device from the third network to the first network according to the received SRVCC switch instruction. The root key.
  • the mobility management entity also selects and saves the security algorithm of the second network, which can avoid the delay caused by the re-authentication process when the terminal device switches from the first network to the second network, and improves the user experience.
  • the method further includes: during a handover of the terminal device from a third network to the first network, the mobility management entity sends the terminal device to the terminal device Sending the security algorithm of the second network.
  • the mobility management entity when the terminal management device switches from the first network to the second network, the mobility management entity sends the saved security algorithm of the second network to the terminal device, so that the terminal device can The root key of the second network deduces the security key used by the terminal device in the second network.
  • the security key can protect communication between the mobility management entity and the terminal device.
  • the method further includes: the mobility management entity sending a security algorithm of the second network to a mobile switching center in the first network, so as to facilitate When the terminal device switches from the first network to the second network, the terminal device can obtain a security algorithm of the second network.
  • the terminal device before the terminal device is switched from the first network (such as a 2G / 3G network) to the second network (such as a 4G network), the terminal device is switched from the third network (such as a 5G network) to the first network.
  • the mobility management entity will select and save the security algorithm of the second network based on the SRVCC handover instruction information from the access and mobility management network elements.
  • the mobility management entity sends the security algorithm of the selected second network to the mobile switching center, so that when the terminal device needs to switch from the first network to the second network, it can obtain the security algorithm of the second network from the mobile switching center, so that it can Avoid re-authentication processes and improve user experience.
  • the preset policy includes at least one of the following factors: the security capability of the terminal device, the security capability of the mobility management entity, and the security of the service A priority list of requirements, security capabilities of the mobility management entity.
  • the preset policy may include the security capability of the terminal device, that is, the mobility management entity selects the security algorithm of the second network based on the security capability of the terminal device (such as a security algorithm supported by the terminal device).
  • the preset policy may also include the security capability of the mobility management entity itself, that is, the mobility management entity selects the security algorithm of the second network based on its own security capability (such as a security algorithm supported by the mobility management entity itself).
  • the preset policy may also include a priority list of security capabilities. For example, the mobility management entity determines the security algorithms supported by the terminal device and itself, and then may select the algorithm with the highest security emphasis or the highest priority as the security of the second network. algorithm.
  • the first network is a third-generation (3G) / second-generation (2G) network
  • the second network is a fourth-generation (4G) network
  • the third network is a fifth generation (5G) network.
  • a switching method is provided. The method is applied to a scenario in which a terminal device returns to a second network after switching from a third network to a first network.
  • the method includes: the terminal device receives first information, and the first information Including instruction information for instructing the terminal device to switch from a first network to a second network; the terminal device deducing the terminal device according to a root key of the second network and a security algorithm of the second network A security key used in the second network, wherein the root key of the second network is stored when the terminal device is switched from the third network to the first network, or the The root key of the second network is derived from the root key of the third network.
  • a terminal device when a terminal device switches from a first network (such as a 2G / 3G network) to a second network (such as a 4G network), the terminal device can make full use of the process of switching from a third network (such as a 5G network) to the first network.
  • the root key of the second network stored in the or derived from the root key of the third network.
  • the terminal device derives the security key of the second network based on the root key and the security algorithm of the second network, avoiding the delay caused by the re-authentication process when switching from the first network to the second network, and Improved user experience.
  • the security algorithm of the second network is a mobility management entity in a process in which the terminal device switches from the third network to the first network Selected; before the terminal device receives the first information, the method includes: the terminal device receives and saves a security algorithm of the second network from the mobility management entity.
  • the terminal device acquires and saves the second network (such as the 4G network) from the mobility management entity during the process of switching from the third network (such as the 5G network) to the first network (such as the 2G / 3G network).
  • the second network such as the 4G network
  • the third network such as the 5G network
  • the first network such as the 2G / 3G network.
  • Security algorithm so that during the process of switching from the first network to the second network, the terminal device can directly use the saved security algorithm of the second network, which can further reduce latency and improve user experience.
  • the first information includes a security algorithm of the second network.
  • the security algorithm of the second network is also sent to the terminal device, so that the terminal device can be made
  • the security key of the second network is derived from the root key of the second network and the security algorithm of the second network.
  • the first network is a third-generation 3G / second-generation 2G network
  • the second network is a fourth-generation 4G network
  • the third network For the fifth generation 5G network.
  • a handover method is provided.
  • the method is applied to a scenario in which a terminal device returns to a second network after switching from a third network to a first network.
  • the method includes: a mobility management entity receives a request from an access and mobility management network. Meta-first information and a root key of the second network, wherein the root key of the second network is used to derive a security key used by the terminal device on the first network, and the first information is used Instructing the terminal device to switch from a third network to the first network; the mobility management entity selects and saves a security algorithm of the second network; the mobility management entity sends the terminal device to the terminal device Security algorithm for the second network.
  • the mobility management entity may select and save a second network (such as a 4G network) based on a preset policy. ), And send the security algorithm of the second network to the terminal device.
  • the security algorithm of the second network can be directly used, which reduces the delay caused by the switching and improves the user experience.
  • the first information includes single radio frequency voice call continuity SRVCC handover instruction information
  • the mobility management entity determines to save the information according to the SRVCC handover instruction information. Describe the root key of the second network.
  • the terminal device when the terminal device needs to switch from the first network to the second network, it can directly use the root key of the second network, which can further reduce the delay.
  • the preset policy includes at least one of the following factors: the security capability of the terminal device, the security capability of the mobility management entity, and the security of the service A priority list of requirements, security capabilities of the mobility management entity.
  • the first network is a third-generation 3G / second-generation 2G network
  • the second network is a fourth-generation 4G network
  • the third network For the fifth generation 5G network.
  • a switching method is provided.
  • the method is applied to a scenario in which a terminal device returns to the second network after switching from the third network to the first network.
  • the method includes: switching the terminal device from the third network to the first network.
  • the terminal device receives and saves a security algorithm of a second network from a mobility management entity;
  • the terminal device receives first information, and the first information includes an instruction for instructing the terminal device from the first Instruction information for a network switch to the second network, the first information further including a network identifier of the second network;
  • the terminal device according to a security algorithm of the second network and a root of the second network
  • the key derives a security key used by the terminal device in the second network.
  • the mobility management entity may select and save a security algorithm of the second network (such as a 4G network) And sending the security algorithm of the second network to the terminal device.
  • the security algorithm of the second network can be directly used, which reduces the delay caused by the switching and improves the user experience.
  • the root key of the second network is stored during a process in which the terminal device switches from the third network to the first network.
  • the terminal device when the terminal device needs to switch from the first network to the second network, it can directly use the root key of the second network, which can further reduce the delay.
  • the terminal device derives that the terminal device is in the second network according to a security algorithm of the second network and a root key of the second network. Before the security key used by the network, the terminal device derives a root key of the second network according to the root key of the third network.
  • the terminal device when the terminal device needs to switch from the first network to the second network, it can use the saved root key of the first network to derive the root key of the second network, and then use the root key of the second network. And the security algorithm of the second network deduces the security key of the second network, thereby avoiding re-authentication and improving the user experience.
  • the first network is a third-generation 3G / second-generation 2G network
  • the second network is a fourth-generation 4G network
  • a switching method is provided. The method is applied to a scenario in which a terminal device returns to a second network after switching from a third network to a first network.
  • the method includes: the terminal device receives first information, and the first information Including instruction information for instructing the terminal device to switch from a first network to a second network, and the first information further includes a network identifier of the second network and a security algorithm of the second network; the terminal The device derives a security key used by the terminal device on the second network according to a security algorithm of the second network and a root key of the second network.
  • the wireless network subsystem when a terminal device needs to switch from a first network (such as a 4G network) to a second network (such as a 4G network), the wireless network subsystem sends the first information (such as radio resource control RRC release information) to the terminal device, Instruct the terminal device to switch from the first network to the second network.
  • the first information also carries the security algorithm of the second network, so that the terminal device can directly use the security algorithm of the second network, thereby further deriving the security key of the second network, reducing the handover delay and improving the user experience.
  • the root key of the second network is stored during a process in which the terminal device switches from the third network to the first network.
  • the terminal device when the terminal device switches from the first network to the second network, it can directly use the saved root key of the second network, thereby further reducing the delay.
  • the terminal device derives that the terminal device is in the second network according to a security algorithm of the second network and a root key of the second network. Before the security key used by the network, the terminal device derives a root key of the second network according to the root key of the third network.
  • the terminal device when the terminal device needs to switch from the first network to the second network, it can use the saved root key of the first network to derive the root key of the second network, and then use the root key of the second network. And the security algorithm of the second network deduces the security key of the second network, thereby avoiding re-authentication and improving the user experience.
  • the security algorithm of the second network is selected by a mobility management entity during a handover of the terminal device from the third network to the first network.
  • the first network is a third-generation 3G / second-generation 2G network
  • the second network is a fourth-generation 4G network
  • the third network For the fifth generation 5G network.
  • a handover method is provided.
  • the method is applied to a scenario in which a terminal device returns to a second network after switching from a third network to a first network, and the method includes: a mobility management entity receives a request from an access and mobility management network; The first information of the meta and the root key of the second network, wherein the root key of the second network is used to derive a security key used by the terminal device on the first network, and the first information is used to indicate The terminal device switches from a third network to the first network; the mobility management entity selects and saves a security algorithm of the second network according to a preset policy; the mobility management entity reports to the first network The mobile switching center in the network sends the security algorithm of the second network.
  • the mobility management entity may select and save a security algorithm of the second network (such as a 4G network).
  • the security algorithm of the second network is sent to the mobile switching center.
  • the mobile switching center can send the security algorithm of the second network to the terminal device, so that the terminal device can directly use the security algorithm of the second network, which reduces the handover. The resulting delay improves the user experience.
  • the method before the mobility management entity selects and saves the security algorithm of the second network, the method includes: the mobility management entity receiving the security algorithm from the first network Request information of the China Mobile Switching Center, the request information is used to request a security algorithm of the second network.
  • the mobile switching center when the terminal device needs to switch from the first network to the second network, the mobile switching center requests the mobility management entity for the security algorithm of the second network, which can further avoid waste of resources.
  • the preset policy includes at least one of the following factors: the security capability of the terminal device, the security capability of the mobility management entity, and the security of the service A priority list of requirements, security capabilities of the mobility management entity.
  • the first network is a third-generation 3G / second-generation 2G network
  • the second network is a fourth-generation 4G network
  • the third network For the fifth generation 5G network.
  • a switching method is provided. The method is applied to a scenario in which a terminal device returns to the second network after switching from the third network to the first network.
  • the method includes: receiving, from a mobility management entity, a mobile switching center in the first network The security algorithm of the second network sent; the mobile switching center in the first network sends the security algorithm of the second network to the wireless network subsystem, so that the terminal device can switch from the first network to the second network Acquiring a security algorithm of the second network.
  • the security algorithm of the second network can be obtained directly from the wireless network subsystem.
  • the security algorithm of the second network may be sent by the mobility management entity to the mobile switching center in advance.
  • the method before the mobile switching center in the first network receives the security algorithm from the second network sent by a mobility management entity, the method includes: the mobile switching center in the first network Receiving notification information sent from the wireless network subsystem, where the notification information is used to notify the mobile switching center to request the mobility management entity for a security algorithm of the second network.
  • the wireless network subsystem may notify the mobile switching center to request a mobility management entity for a security algorithm of the second network.
  • the first network is a third-generation 3G / second-generation 2G network
  • the second network is a fourth-generation 4G network.
  • a switching method is provided. The method is applied to a scenario in which a terminal device returns to a second network after switching from the third network to the first network.
  • the method includes: the wireless network subsystem receives a mobile switching center from the first network. The security algorithm of the second network; the wireless network subsystem sends the security algorithm of the second network to the terminal device, so that the terminal device according to the security algorithm of the second network and the root secret of the second network The key derives the security key of the second network.
  • the security algorithm of the second network can be obtained directly from the wireless network subsystem.
  • the security algorithm of the second network may be sent by the mobility management entity to the mobile switching center in advance.
  • the security algorithm of the second network is that the mobility management entity in the first network switches from the third network to the first network on the terminal device. The process of choosing.
  • the mobility management entity may select and save the security algorithm of the second network during the process of the terminal device switching from the third network to the first network, so that when the terminal device needs to switch from the first network to the second network ,
  • the security algorithm of the second network can be obtained directly from the wireless network subsystem.
  • the first network is a third-generation 3G / second-generation 2G network
  • the second network is a fourth-generation 4G network
  • the third network For the fifth generation 5G network.
  • a switching device including each module or unit for performing the method in any one of the possible implementation manners of the first to ninth aspects.
  • a switching device including a processor.
  • the processor is coupled to the memory and can be used to execute instructions in the memory to implement the method in any one of the possible implementation manners of the first to ninth aspects described above.
  • the switching device further includes a memory.
  • the switching device further includes a communication interface, and the processor is coupled to the communication interface.
  • the switching device is a communication device, such as a terminal device, a mobility access entity, an access and mobility management network element, a mobile switching center, and a wireless network subsystem network element in the embodiments of the present application.
  • the communication interface may be a transceiver, or an input / output interface.
  • the switching device is a chip configured in a communication device, such as a terminal device, a mobility access entity, an access and mobility management network element, and a mobile switching center configured in the embodiments of the present application.
  • the chip in the network element of the wireless network subsystem.
  • the communication interface may be an input / output interface.
  • the transceiver may be a transceiver circuit.
  • the input / output interface may be an input / output circuit.
  • a processor including: an input circuit, an output circuit, and a processing circuit.
  • the processing circuit is configured to receive a signal through the input circuit and transmit a signal through the output circuit, so that the processor executes the method in any one of the possible implementation manners of the first to ninth aspects described above.
  • the processor may be a chip
  • the input circuit may be an input pin
  • the output circuit may be an output pin
  • the processing circuit may be a transistor, a gate circuit, a flip-flop, and various logic circuits.
  • An input signal received by the input circuit may be received and input by, for example, but not limited to, a receiver
  • a signal output by the output circuit may be, for example, but not limited to, output to a transmitter and transmitted by the transmitter
  • the circuits may be the same circuit, which are used as input circuits and output circuits respectively at different times.
  • the embodiments of the present application do not limit specific implementations of the processor and various circuits.
  • a processing device including a processor and a memory.
  • the processor is used to read instructions stored in the memory, and can receive signals through a receiver and transmit signals through a transmitter to execute the method in any one of the possible implementation manners of the first to ninth aspects described above.
  • processors there are one or more processors, and one or more memories.
  • the memory may be integrated with the processor, or the memory is separately provided from the processor.
  • the memory may be a non-transitory memory, such as a read-only memory (ROM), which may be integrated on the same chip as the processor, or may be separately set in different On the chip, the embodiment of the present application does not limit the type of the memory and the way of setting the memory and the processor.
  • ROM read-only memory
  • sending instruction information may be a process of outputting instruction information from a processor
  • receiving capability information may be a process of receiving input capability information by a processor.
  • the processed output data can be output to the transmitter, and the input data received by the processor can come from the receiver.
  • the transmitter and the receiver may be collectively referred to as a transceiver.
  • the processing device in the thirteenth aspect may be a chip, and the processor may be implemented by hardware or software.
  • the processor When implemented by hardware, the processor may be a logic circuit, an integrated circuit, or the like.
  • the processor When implemented, the processor may be a general-purpose processor, which is implemented by reading software codes stored in a memory.
  • the memory may be integrated in the processor, may be located outside the processor, and exist independently.
  • a computer program product includes a computer program (also referred to as code or instructions), and when the computer program is executed, causes a computer to execute the foregoing first to first steps.
  • the method in any of the nine possible implementations.
  • a computer-readable medium stores a computer program (also referred to as code, or instructions), which when executed on a computer, causes the computer to execute the first to the first The method in any of the nine possible implementations.
  • a computer program also referred to as code, or instructions
  • a communication system including the foregoing terminal device, a mobility access entity, an access and mobility management network element, a mobile switching center, and a wireless network subsystem network element.
  • FIG. 1 is a schematic diagram of a network architecture applicable to a handover method provided by an embodiment of the present application
  • FIG. 2 is a schematic flowchart of an SRVCC handover performed by a terminal device applicable to an embodiment of the present application
  • FIG. 3 is another schematic flowchart of an SRVCC handover performed by a terminal device applicable to an embodiment of the present application
  • FIG. 4 is a schematic flowchart of a handover method according to an embodiment of the present application.
  • FIG. 5 is another schematic flowchart of a handover method according to an embodiment of the present application.
  • FIG. 6 is a schematic flowchart of a handover method according to another embodiment of the present application.
  • FIG. 7 is a schematic block diagram of a switching device according to an embodiment of the present application.
  • FIG. 8 is a schematic block diagram of a switching device according to an embodiment of the present application.
  • GSM global mobile communication
  • CDMA code division multiple access
  • WCDMA broadband code division multiple access
  • GPRS general packet radio service
  • LTE long term evolution
  • FDD frequency division duplex
  • TDD Time Division Duplex
  • UMTS Universal Mobile Telecommunications System
  • WiMAX Global Interoperability for Microwave Access
  • the embodiment of the present application does not specifically limit the specific structure of the execution subject of the method provided by the embodiment of the present application, as long as it can run a program that records the code of the method provided by the embodiment of the present application, in accordance with the embodiment of the present application.
  • the provided methods only need to communicate.
  • the method provided by the embodiments of the present application may be a terminal or a network device, or a function module in the terminal or the network device that can call a program and execute the program.
  • FIG. 1 is a schematic diagram of a network architecture applicable to the method provided by an embodiment of the present application.
  • the network architecture may be, for example, a non-roaming architecture.
  • the network architecture shown in FIG. 1 may specifically include the following network elements:
  • User equipment can be called terminal equipment, terminal, access terminal, user unit, user station, mobile station, mobile station, remote station, remote terminal, mobile device, user terminal, wireless communication device, User agent or user device.
  • the UE can also be a cellular phone, a cordless phone, a session initiation protocol (SIP) phone, a wireless local loop (WLL) station, a personal digital assistant (PDA), and a wireless communication function.
  • SIP session initiation protocol
  • WLL wireless local loop
  • PDA personal digital assistant
  • Handheld devices, computing devices, or other processing devices connected to wireless modems, in-vehicle devices, wearable devices, terminal devices in the future 5G network, or terminals in the future evolved public land mobile network (PLMN) Devices, etc. may also be end devices, logical entities, smart devices such as mobile phones, smart terminals and other terminal devices, or Internet of Things (IoT) devices. This embodiment of the present application is not limited to this.
  • the UE stores a security key, and the UE uses the security key to protect the signaling plane and user plane data transmission with the network device, so that the signaling plane and user plane data transmission can be guaranteed. safety.
  • Access network Provides network access functions for authorized users in specific areas, and can use different quality transmission tunnels according to user levels and business needs.
  • the access network may be an access network using different access technologies.
  • 3rd Generation Partnership Project 3rd Generation Partnership Project
  • non-3rd Generation Partnership Project non-3GPP
  • 3GPP access technologies such as the radio access network technology used in the 3rd generation (3G) system, the radio access network technology used in the 4th generation (4G) system, or in FIG. 1 Next generation wireless access network (NG-RAN) technology (such as the wireless access technology used in 5G systems).
  • NG-RAN Next generation wireless access network
  • the 3GPP access technology refers to an access technology conforming to the 3GPP standard specification.
  • the non-3GPP access technology refers to an access technology that does not comply with the 3GPP standard specification, for example, an air interface technology represented by an access point (AP) in wifi.
  • AP access point
  • radio access network An access network that implements an access network function based on a wireless communication technology may be referred to as a radio access network (radio access network, RAN).
  • the radio access network can manage radio resources, provide access services for the terminal, and then complete the transfer of control signals and user data between the terminal and the core network.
  • the radio access network may be, for example, a base station (NodeB), an evolved base station (eNB or eNodeB), a base station (gNB) in a 5G mobile communication system, a base station in a future mobile communication system, or an AP in a WiFi system, It can also be a wireless controller in a cloud radio access network (CRAN) scenario, or the access network device can be a relay station, an access point, a car device, a wearable device, and a network in the future 5G network Equipment or network equipment in a future evolved PLMN network.
  • CRAN cloud radio access network
  • the embodiment of the present application does not limit the specific technology and specific device form adopted by the wireless access network device.
  • UMTS Universal mobile telecommunications system
  • UTRAN terrestrial radio access network
  • GSM Global system for mobile communication
  • EDGE enhanced data rate for GSM evolution
  • GSM / EDGE terrestrial radio access network, GERAN such as 2G Access Network.
  • Evolved universal mobile communication system evolved universal terrestrial radio access network, E-UTRAN: such as 4G access network.
  • S-GW Serving gateway
  • PDN gateway entity A user plane data link anchor point between 3GPP and non-3GPP networks, which can be responsible for managing data routing between 3GPP and non-3GPP.
  • Mobile switching center server has call control and processing functions.
  • the MSC server refers to an enhanced MSC server (MSC server for SRVCC) that supports a single wireless voice call continuity (SRVCC).
  • Mobility management entity mainly responsible for mobility management, bearer management, user authentication, selection of S-GW and packet data network gateway (P-GW), etc.
  • Access and mobility management function (AMF): mainly used for mobility management and access management, etc., can be used to implement other functions in the MME entity function in addition to session management, for example, legal Monitoring, or access authorization (or authentication) and other functions. In the embodiment of the present application, it can be used to implement functions of terminal access and mobility management.
  • AMF Access and mobility management function
  • User plane function Equivalent to the P-GW entity in the LTE system, which is mainly responsible for session and bearer management, Internet Protocol (IP) address allocation, and other functions. In the embodiment of the present application, it can be used to implement the function of the user plane gateway.
  • IP Internet Protocol
  • IP Multimedia Subsystem A general-purpose network architecture that provides multimedia services based on IP networks.
  • AMF network element UPF network element, S-GW entity, and P-GW entity shown in FIG. 1 can all be understood as network elements used to implement different functions in the core network, for example, they can be combined into a network as required slice.
  • These core network elements may be independent devices or integrated in the same device to implement different functions, which is not limited in this application.
  • the AMF network element will be referred to as an access and mobility management network element, and the UPF network element will be referred to as a user plane gateway.
  • the above naming is only used to distinguish different functions, and does not mean that these network elements are independent physical devices.
  • This application does not limit the specific form of the above network elements. For example, they can be integrated in the same physical device. It can also be a different physical device.
  • the above naming is only for the convenience of distinguishing different functions, and should not constitute any limitation on this application. This application does not exclude the possibility of using other naming in 5G networks and other networks in the future.
  • 5G 5G
  • 6G network some or all of the above-mentioned network elements may use the terminology in 5G, or may use other names. The description is unified here, and will not be repeated here.
  • the above-mentioned network architecture applied to the embodiment of the present application is merely an exemplary network architecture described from the perspective of a traditional point-to-point architecture and a service-oriented architecture, and the network architecture applicable to the embodiment of the present application is not limited to this. Any network architecture capable of implementing the functions of the foregoing network elements is applicable to the embodiments of the present application.
  • VoLTE Voice over LTE
  • IP network protocol
  • SRVCC is mainly to solve the problem of how to ensure the continuity of voice calls when a single radio terminal moves between LTE network and 2G / 3G network, that is, to ensure that a single radio terminal is controlled by IMS-controlled Internet Protocol (VoIP) Smooth switching between voice and CS domain voice.
  • VoIP refers to the technology of digitizing voice signals in the form of analog signals and transmitting them on IP networks in the form of data packets. Its advantage is that it can widely use the characteristics of the Internet and global IP interconnection to provide better services than traditional services. .
  • CS refers to the circuit switching technology that allocates a fixed channel for both parties before a call, and occupies this "dedicated" channel during the entire call, and releases it after the call for distribution to other users.
  • VoIP voice greatly improves resource utilization due to shared transmission channels, but it may also cause processing overhead and delay.
  • FIG. 2 shows a schematic flowchart of SRVCC handover performed by a terminal. As shown in FIG. 2, steps 110 to 180 are included.
  • the base station sends a handover request message to the mobility management entity.
  • the base station decides to initiate the SRVCC handover according to the measurement report reported by the terminal, the base station sends a handover request message to the mobility management entity.
  • the handover request message carries an SRVCC handover (HO) indication (SRVCC HO indication).
  • SRVCC handover instruction is used to indicate that the process to be performed next is SRVCC handover.
  • the mobility management entity uses the root key Kasme in the current terminal security context to derive the encryption key (cipher key, CK) required for CS domain voice and Integrity key (integrity key, IK), and map the key set identifier (key set identifier, E-UTRAN, eKSI) identifying the key Kasme to the key set identifier (key set identifier, KSI).
  • the values of the eKSI and the KSI are the same and the types are different.
  • step 130 the mobility management entity sends a PS-to-CS HO request message to the mobile switching center server. This includes the CK
  • the mobile switching center server sends a PS-to-CS HO response message to the mobility management entity. It contains KSI.
  • step 150 the mobility management entity sends a HO command message to the terminal. It contains KSI.
  • step 160 the base station sends a handover command message to the terminal, which includes a KSI.
  • the KSI is sent to the terminal to inform the terminal which key is used for protection of this message.
  • step 170 after receiving the handover command message, the terminal uses Kasme to derive CK
  • step 180 the terminal switches to UTRAN, such as the terminal switches to a 3G / 2G network.
  • the KSI obtained in step 170 can be used to identify and retrieve the key between the terminal and the network.
  • IK obtained in step 170 can be used to protect the signaling between the terminal and the network. Plane and user plane data transmission.
  • mapping of eKSI to KSI by the mobility management entity and the terminal is performed separately.
  • the specific mapping operation is to keep the eKSI and KSI value part the same, and the type part can distinguish whether it is a native security context or mapped. Security context.
  • the mobility management entity can first derive the key information of the 3G / 2G network, and then send the deduced key information of the 3G / 2G network to the mobile switching center server.
  • a new air interface is a technology that uses a 5G new air interface to carry voice.
  • VoNR coverage faces the same problem as VoLTE, that is, if users who use VoNR to make a call move to a CS-only coverage area, they also need to ensure that the call is not interrupted. Therefore, a new 5G SRVCC is defined in the standard to solve the handover between 5G and 3G.
  • FIG. 3 shows a schematic flowchart of 5G SRVCC handover performed by a terminal device. Because there is no direct interface between the access and mobility management network elements and the mobile switching center server, 5G SRVCC uses the mobility management entity relay method. The interaction between the mobility management entity and the mobile switching center server is similar to the process in FIG. 2 except that the interaction between the access and mobility management network element and the mobility management entity is increased. As shown in FIG. 3, steps 201 to 211 are included.
  • the base station sends a handover request message to the access and mobility management network element.
  • the base station decides to initiate a 5G SRVCC handover according to the measurement report reported by the terminal, the base station sends a handover request message to the access and mobility management network element.
  • the handover request message carries an SRVCC handover instruction.
  • the SRVCC handover instruction is used to indicate that the process to be performed next is SRVCC handover.
  • step 202 after receiving the handover request message from the base station, the access and mobility management network element uses the key Kamf to derive Kasme, and maps the key set identifier ngKSI that identifies Kamf to the eKSI labeled Kasme.
  • step 203 the access and mobility management network element sends a forward relocation request message to the mobility management entity. It includes Kasme and eKSI derived in step 202.
  • the mobility management entity uses the root key Kasme to derive the encryption and integrity key CK required for CS domain voice
  • the values of eKSI and KSI are partially the same, but the types are different.
  • step 205 the mobility management entity sends a PS to CS handover request message to the mobile switching center server. It contains CK
  • the mobile switching center server sends a PS-to-CS HO response message to the mobility management entity. It contains KSI.
  • the mobility management entity sends a forward relocation response message to the access and mobility management network element. It contains KSI.
  • the access and mobility management network element sends a handover command message to the base station. It contains KSI.
  • the base station sends a handover command message to the terminal, which includes a KSI.
  • the KSI is sent to the terminal to inform the terminal which key is used for protection of this message.
  • step 210 the terminal derives CK
  • the terminal After receiving the switch command, the terminal first uses Kaf to deduce Kasme, and then uses Kasme and input parameters to deduce CK
  • the input parameters may be obtained by the access and mobility management network element and notified to the UE, or may be carried in a service request message sent by the UE, such as a PDU session identifier.
  • step 211 the terminal switches to UTRAN, such as the terminal switches to a 3G / 2G network.
  • the KSI obtained in step 210 can be used to identify and retrieve the key between the terminal and the network.
  • IK obtained in step 210 can be used to protect the signaling between the terminal and the network. Plane and user plane data transmission.
  • ngKSI and KSI are the same, and the type part can distinguish whether it is a native security context or a mapped security context.
  • the access and mobility management network elements in the 5G network can first derive the root key of the 4G network, and then send the root key of the 4G network to the mobility management entity in the 4G network.
  • the mobility management entity then derives the key information (such as CK
  • the terminal Since the 3G network cannot handle the high-speed data transmission of the 5G network, if the terminal still resides on the 3G network after ending the 3G network's voice service, the user experience will be greatly affected. Therefore, if the terminal is in 4G or 5G network coverage at this time, the terminal should be returned to the 4G or 5G network.
  • a possible implementation manner is that the 3G network sends a radio resource control (RRC) release message to the terminal, which carries a 4G or 5G public land mobile network (public land mobile network) identity (identity, ID), used to notify the terminal to return the corresponding target network.
  • RRC radio resource control
  • the terminal will be instructed to return to the 5G network.
  • the terminal and the access and mobility management network element can use the 5G security context to protect communication before the 5G SRVCC process occurs.
  • the terminal will be instructed to return to the 4G network.
  • the terminal and the mobility management entity do not have the corresponding 4G security context, a complete re-authentication process needs to be established, which will greatly increase the delay and the consumption of air interface resources, and will seriously affect the user experience of the terminal.
  • this application provides a method to prevent the terminal from performing re-authentication when returning to the 4G network, to help the terminal quickly return to the 4G network, and to achieve the purpose of reducing delay and air interface resource consumption.
  • the method provided in this application is not limited to the scenario shown in FIG. 3 described above. For example, when a terminal switches from a 5G network to a 2G / 3G network, the network device first derives the root key of the 4G network based on the root key of the 5G network, and then derives the security of the 2G / 3G network based on the root key of the 4G network. Key. Then, when the terminal needs to switch from the 2G / 3G network to the 4G network, the method provided in this application can also avoid the delay caused by re-authentication.
  • Kamf The key obtained by the terminal and the access and mobility management network element during the terminal's registration with the 5G network.
  • Kamf is related to a key set identifier (KSI in 5G, ngKSI) in a 5G network.
  • the access and mobility management network element can randomly allocate an ngKSI and send the ngKSI to the terminal.
  • ngKSI is used to identify the root key Kamf of the 5G network.
  • the access request and mobility management network element sends the above-mentioned ngKSI used to identify the root key of the 5G network in the authentication request message and / or the authentication success message sent to the terminal. Therefore, for the terminal and the access and mobility management network elements, each ngKSI can be used to uniquely indicate a Kamf. In this application, Kamf can be used to subsequently generate the root key Kasme.
  • Second key Kasme The key obtained by the terminal and the mobility management entity during the terminal's registration with the 4G network. Kasme is related to the key set identifier (KSI, E-UTRAN, eKSI) in 4G.
  • the mobility management entity may randomly allocate an eKSI and send the eKSI to the terminal.
  • eKSI is used to identify the root key Kasme of the 4G network.
  • the authentication request message sent by the mobility management entity to the terminal carries the above-mentioned eKSI used to identify the root key of the 4G network. Therefore, for the terminal and the mobility management entity, each eKSI can be used to uniquely indicate a Kasme. Kasme can be used to subsequently generate non-access stratum (NAS) keys and access stratum (AS) keys.
  • NAS non-access stratum
  • AS access stratum
  • eKSI, ngKSI, KSI key set identifier.
  • the key set identifier can be used to identify and retrieve the key between the terminal and the network.
  • eKSI is used to identify Kasme
  • ngKSI is used to identify Kamf
  • KSI can be used to identify the encryption key CK + integrity key IK.
  • CK and IK can be used as key information for 3G networks.
  • Derivation key also known as key deduction, which means that the key is obtained according to the input parameters. Take the derivation of the root key of the 4G network based on the root key of the 5G network as an example.
  • the input parameters for deriving the root key of the 4G network according to the root key of the 5G network may include one or more of the following parameters: Function Code (FC), uplink / downlink non-access layer count value, preset value Random numbers.
  • FC Function Code
  • the root key of the 5G network can be Kamf.
  • the root key of a 4G network can be Kasme.
  • FC can be understood as the code of the deduction function used in deriving the key information, which is used to indicate what function is used to deduct the key information.
  • the FC can deduct the 4G root key for the root key of the 5G network Function code used.
  • the NAS count (count) consists of a sequence number and an overflow counter.
  • the non-access stratum count can be an uplink non-access stratum count or a downlink non-access stratum count.
  • the downlink non-access layer count value may be a downlink non-access layer count value used by the root key of the 5G network to derive the root key of the 4G network.
  • Kasme can be key information generated after the terminal and the network have completed authentication.
  • Specific key derivation such as the root key of the 5G network to the root key of the 4G network or the root key of the 4G network to the 3G security key, may refer to the method in the existing standard, which is not limited in the embodiments of the present application.
  • the sender encrypts the plaintext according to the encryption algorithm and encryption key to generate ciphertext. If a symmetric encryption method is used, the encryption key and the decryption key are the same.
  • the receiving end can decrypt the ciphertext according to the same encryption algorithm and encryption key. In other words, the sender and receiver can encrypt and decrypt based on the same key.
  • Integrity protection The sender performs integrity protection on the plaintext or ciphertext according to the integrity protection algorithm and the integrity protection key.
  • the receiving end can perform integrity verification on the integrity-protected data according to the same integrity protection algorithm and integrity protection key.
  • Security capabilities including but not limited to: security algorithms, security parameters, keys, etc.
  • the security capability may include, for example, the security capability of the UE and the security capability of a network-side device (such as an MME or an AMF or a UPF).
  • Security algorithm The algorithm used to protect data security. For example, it can include: encryption / decryption algorithms, integrity protection algorithms, and so on.
  • Security context information that can be used to implement data encryption and decryption and / or integrity protection.
  • the security context may include, for example, an encryption / decryption key, an integrity protection key, a fresh parameter (such as a non-access stratum (NAS) count), ngKSI, a security algorithm, and the like.
  • NAS non-access stratum
  • the gNB shown in FIGS. 4 to 6 may correspond to a base station node
  • the AMF may correspond to an access and mobility management network element
  • the MME may correspond to a mobility management entity
  • the MSC server may correspond to a mobile switching center server
  • the RNS It may correspond to a radio network subsystem (RNS) network element.
  • RNS radio network subsystem
  • the first network is a 3G network
  • the second network is a 4G network
  • the third network is a 5G network.
  • FIG. 4 is a schematic flowchart of a handover method 400 according to an embodiment of the present application, which is shown from the perspective of device interaction. As shown, the method 400 shown in FIG. 4 may include steps 401 to 426. Each step in the method 400 is described in detail below with reference to FIG. 4.
  • step 401 the base station sends a handover request message to the access and mobility management network element.
  • the base station may decide to initiate a request for SRVCC handover according to the measurement report reported by the UE, or the base station may decide to initiate a request for SRVCC handover according to factors such as the current load.
  • the base station sends a handover request message to the access and mobility management network element.
  • the handover request message carries an SRVCC handover instruction.
  • the SRVCC handover instruction is used to indicate that the process to be performed next is SRVCC handover.
  • step 402 the access and mobility management network element derives Kasme and maps ngKSI to eKSI.
  • the UE When the UE does not support the CS domain from SRVCC to the 3G network on the new air interface of the 5G network, the UE performs voice services on the 5G network and needs to switch the voice services of the 5G network to the 3G network.
  • the signaling transfer during voice service switching can be performed by the mobile management entity, thereby switching the voice service from the 5G network to the 3G network, and ensuring the continuity of the voice service.
  • the access and mobility management network element can derive Kasme based on the key derivation parameters and Kamf in the current security context.
  • the key derivation parameter may include a non-access layer count value as described above, and the non-access layer count value may be an uplink non-access layer count value or a downlink non-access layer count value.
  • the access and mobility management network element may use Kamf and non-access stratum count values to derive Kasme, and map the ngKSI that identifies Kamf to the eKSI that is labeled Kasme.
  • step 403 the access and mobility management network element sends a forward relocation request message to the mobility management entity.
  • the fronthaul relocation request message includes an SRVCC handover indication message and Kasme. Mobility management entities can derive keys for 3G networks based on Kasme deduction.
  • the fronthaul relocation request message may further include the key set identifier eKSI in step 402, and the eKSI is used to identify the root key Kasme of the 4G network.
  • the fronthaul and fronthaul relocation request message may further include a security capability of the UE.
  • the security capability of the UE may include a name of a security algorithm supported by the UE, or may further include a type or an identifier of each security algorithm arranged in a descending order of priority.
  • the access and mobility management network element knows the security capabilities of the UE in advance and does not need to be carried in the fronthaul relocation request message.
  • step 404 CK
  • the mobility management entity After receiving the relocation request message from the access and mobility management network element, the mobility management entity knows that it needs to initiate the SRVCC process for the UE to switch from the 5G network to the 3G network according to the SRVCC handover instruction message in it, and uses the received SRVCC process.
  • Kasme gets CK
  • the mobility management entity uses Kasme and input parameters to derive CK
  • the input parameters may be obtained by the access and mobility management network element and notified to the UE, or may be carried in a service request message sent by the UE, such as a PDU session identifier.
  • the mobility management entity may directly use the first half of Kasme as CK and the latter half as IK.
  • the eKSI received by the mobility management entity may also be directly used as the KSI identifier CK
  • step 405 the mobility management entity sends a PS to CS handover request message to the mobile switching center server.
  • the PS to CS handover request message includes a CK
  • the role of the PS to CS handover request message is to perform a packet switching to circuit switching request.
  • step 406 the mobile switching center server sends a relocation request message / handover request message to the wireless network subsystem network element.
  • the relocation request message / handover request message is used to make a handover request to the base station controller in the network element of the wireless network subsystem.
  • the wireless network subsystem network element refers to a wireless network subsystem including a base station controller and a base station.
  • step 407 the network element of the wireless network subsystem sends a relocation response message / handover response message to the mobile switching center server.
  • This message is a response to the relocation request message / handover request message in step 406.
  • step 408 the mobile switching center server sends a PS to CS handover response message to the mobility management entity.
  • the PS to CS handover response message is used to respond to the PS to CS handover request message in step 405.
  • step 409 the mobility management entity sends a forward relocation response message to the access and mobility management network element.
  • step 410 the access and mobility management network element sends a handover command message to the base station.
  • step 411 the base station sends a handover command message to the UE.
  • step 412 the UE derives CK
  • the UE After receiving the handover command message, the UE uses Kamf to derive Kasme, and then uses Kasme to derive CK
  • step 413 the UE sends a handover completion message to the wireless network subsystem network element.
  • step 414 the wireless network subsystem network element sends a handover completion message to the mobile switching center server.
  • step 415 the mobile switching center server sends a PS to CS handover completion message to the mobility management entity.
  • the UE can switch from a 5G network to a 3G network.
  • the SRVCC process is similar to the prior art, and this application is not limited.
  • the UE After the UE voice service ends, if the area where the UE is located has NR coverage (that is, 5G network), the UE will switch from the 3G network to the 5G network. If the 5G security context stored in the UE is available and the 5G security context is a native security context (that is, the context is generated through a complete authentication and key agreement (AKA) process), then Use the above 5G security context to protect communication between the UE and the 5G network, for example, use the 5G security context to perform integrity protection on the registration request message.
  • AKA complete authentication and key agreement
  • the 5G security context is a mapped security context (that is, the context is derived from the 4G security context, such as using the 4G network root key Kasme to derive the 5G network root key Kamf, and then generate a NAS key, AS key, etc.), or the 5G security context is unavailable (for example, there is no 5G security context in the UE), the UE will send a registration request message without integrity protection, which will trigger the access and mobility management network
  • the unit performs a re-authentication process on the UE (that is, the access and mobility management entity requests a unified data management (UDM) network element for an authentication vector, and sends an authentication challenge to the UE according to the authentication vector. After the UE passes the authentication challenge, it shares a root key with the network) to establish a 5G native security context.
  • UDM unified data management
  • the 5G native security context or the native 5G security context is used to indicate that the 5G security context is native, and its specific name does not limit the scope of protection of the present application.
  • a native security context means that the security context is a security context generated through a complete AKA process.
  • the UE voice service ends, if there is no NR coverage in the area where the UE is located, but there is E-UTRAN (that is, 4G network) coverage, then the UE will switch from the 3G network to the 4G network. If the 5G security context is stored on the UE at this time, and the 5G security context is a native security context, the UE will delete the UMTS security context (that is, 3G security) after receiving the RRC release message sent by the wireless network subsystem (such as RNS).
  • the wireless network subsystem such as RNS
  • TAU request tracking area update
  • the UE will send a tracking update message without integrity protection to the mobility management entity, thereby triggering the mobility management entity to perform a re-authentication process on the UE To establish a new evolved packet system (EPS) security context (ie, 4G security context).
  • EPS evolved packet system
  • step 416 the mobile switching center server sends an RRC release to the wireless network subsystem network element, and the message carries the PLMN ID used last time, that is, the PLMN ID of the 4G network.
  • step 417 the wireless network subsystem network element sends an RRC release message to the UE.
  • the network element of the wireless network subsystem may send an RRC release message to the UE to instruct the UE to switch to the 4G network.
  • the RRC release message includes a network identifier indicating the target network returned by the UE.
  • the network identifier may include, but is not limited to, an operator identifier (e.g., PLMN ID, access network ID, serving network ID, cell ID, base station ID, etc.) gNB ID), LAN network ID, slice ID, bearer ID, quality of service (QoS) ID, flow ID, network slice selection assistance information (NSSAI).
  • the UE sets the security context of the 5G network to the currently used security context.
  • the security context of 5G networks is the native security context.
  • the security context on the UE is divided into a current security context (current security context) and a non-current security context (non-current security context) according to the status.
  • current security context current security context
  • non-current security context non-current security context
  • the UE will trigger the 3G to 4G handover process according to the currently used security context (that is, the 3G security context), that is, the root key CK of the 3G network
  • IK deduces the root key Kasme of the 4G network, so that the mobility management entity in the 4G network derives the NAS key and AS key based on the Kasme to obtain the 4G security context.
  • the embodiments of the present application provide a method that can avoid the risk of 4G security context leakage and improve the user experience.
  • the UE After receiving the RRC release message, the UE determines whether to return to the 4G network according to the target network identifier contained in the RRC release message, and the UE checks whether the 5G native security context is currently saved.
  • the UE deletes the 3G security context or sets the 3G security context to inactive, and sets the 5G native security context to the currently used security context, and moves to the The sex management entity sends a TAU request message for integrity protection by the 5G native security context.
  • the UE does not save the 5G native security context (including the 5G security context is mapped), or the 5G native security context is not available, delete the 3G security context in the currently used state or set the 3G security context to inactive, and The mobility management entity sends a TAU request message without integrity protection, in order to subsequently trigger the mobility management entity to perform a re-authentication process on the UE, and finally establish a 4G (native) security context.
  • step 419 the UE sends a TAU request message to the mobility management entity.
  • the UE checks that the 5G native security context is currently saved and that the 5G native security context is available.
  • the UE sends a TAU request message to the mobility management entity, and the TAU request message is integrity protected by the 5G native security context.
  • the 5G native security context instead of the 4G mapping security context derived from the 3G security context to protect the TAU request message, it is possible to prevent Kasme from leaking, thereby ensuring the security of the 5G network when the UE switches to the 5G network and improving the security of network communication .
  • the TAU request message includes an evolved packet system GUTI (evolved packet system GUTI, EPS GUTI) mapped from a 5G globally unique temporary UE identity (5G GUTI), an eKSI mapped from ngKSI, And the NAS MAC generated by the 5G native security context protection TAU request message for integrity protection.
  • GUTI evolved packet system GUTI
  • EPS GUTI evolved packet system GUTI
  • 5G GUTI 5G globally unique temporary UE identity
  • eKSI mapped from ngKSI
  • NAS MAC generated by the 5G native security context protection TAU request message for integrity protection.
  • the mobility management entity obtains the address of the access and mobility management network element according to the mapped EPS GUTI after receiving the TAU request message.
  • step 421 the mobility management entity sends a context request message to the access and mobility management network element.
  • the context request message includes a mapped EPS GUTI and a TAU request message using 5G native security context protection.
  • the TAU request message is sent by the UE to the mobility management entity in step 419.
  • the access and mobility management network element uses the security context of the 5G network to map the security context of the 4G network.
  • the access and mobility management network element finds the corresponding 5G native security context according to the eKSI in the TAU request message, and verifies the TAU request message. If the authentication is passed, the access and mobility management network element can use the 5G native security context to map out the 4G security context and send it to the mobility management entity through a context response message. If the verification fails or the corresponding 5G native security context is not found, the access and mobility management network element will treat the TAU request message as unsecured, so it will not send any security context to the mobility management entity. Regardless of whether the authentication is passed, the access and mobility management network element will carry the UE's permanent identity (such as International Mobile Subscriber Identity (IMSI) or Subscriber Permanent Identifier (SUPI) in the context response message. .
  • IMSI International Mobile Subscriber Identity
  • SUPI Subscriber Permanent Identifier
  • step 423 the access and mobility management network element sends a context response message to the mobility management entity.
  • the context response message includes the UE permanent identity in step 422 and the generated 4G mapping security context (if the verification is passed). If the mobility management entity does not receive the 4G mapping security context, it will request the authentication vector from the Home Subscriber Server (HSS) according to the received permanent identity of the UE to perform the re-authentication process to generate 4G ( (Native) security context.
  • HSS Home Subscriber Server
  • step 424 the mobility management entity determines a 4G algorithm according to the received 4G mapping security context.
  • the 4G algorithm includes the encryption algorithm and integrity protection algorithm that the UE will use when returning to the 4G network.
  • the mobility management entity can select a suitable encryption algorithm and integrity protection algorithm according to its own security capabilities, local priority list, and UE security capabilities.
  • the 4G mapping security context received by the mobility management entity may include the 4G encryption algorithm and 4G integrity protection algorithm corresponding to the 5G encryption algorithm and 5G integrity protection algorithm previously used by the access and mobility management network elements and the UE, If the above algorithm is inconsistent with the configuration of the mobility management entity, or the mobility management entity does not support it, the mobility management entity will reselect the algorithm.
  • step 425 if the mobility management entity reselects the algorithm, the NAS security mode command (SMC) process is triggered to activate NAS security, so that the UE and the mobility management entity share Kasme and related NAS keys.
  • SMC NAS security mode command
  • the mobility management entity sends a TAU accept message to the UE.
  • the UE sends a TAU request message, it can first derive the 4G mapping security context according to the 5G native security context, that is, use Kamf Derive Kasme, and use the 4G encryption algorithm and 4G integrity protection algorithm corresponding to the 5G encryption algorithm and 5G integrity protection algorithm in the 5G native security context to derive the NAS key. If the UE subsequently receives the NAS from the mobility management entity, SMC message, according to the instructions of the NAS SMC message, deduce a new NAS key and delete the previously generated NAS key, otherwise the UE will use the previously generated NAS key to verify the TAU acceptance message.
  • the UE adjusts the state of the security context it saves. That is, the UE deletes the 3G security context that is currently in use, sets the 5G native security context to the currently used security context, and uses the 5G native security context instead of the 4G mapping security context derived from the 3G security context to protect the TAU. Request message. In this way, leaked 4G security contexts can be avoided, the security of 5G networks can be guaranteed, and the user experience can be improved.
  • FIG. 5 is a schematic flowchart of a handover method 500 according to another embodiment of the present application, which is shown from the perspective of device interaction. As shown, the method 500 shown in FIG. 5 may include steps 501 to 519. Each step in the method 500 is described in detail below with reference to FIG. 5.
  • step 501 the base station sends a handover request message to the access and mobility management network element.
  • the base station may decide to initiate a request for SRVCC handover according to the measurement report reported by the UE, or the base station may also decide to initiate a request for SRVCC handover according to factors such as the current load.
  • the base station sends a handover request message to the access and mobility management network element.
  • the handover request message carries an SRVCC handover instruction.
  • the SRVCC handover instruction is used to indicate that the process to be performed next is SRVCC handover.
  • step 502 the access and mobility management network element derives Kasme and maps ngKSI to eKSI.
  • step 402 of the embodiment shown in Figure 4 the relevant content, please refer to the relevant description of step 402.
  • step 503 the access and mobility management network element sends a fronthaul relocation request message to the mobility management entity.
  • step 403 Similar to step 403 in the embodiment shown in FIG. 4, for related content, refer to the related description of step 403.
  • step 504 the mobility management entity saves Kasme, selects a 4G algorithm, and derives a NAS key.
  • the mobility management entity After receiving the relocation request message from the access and mobility management network element, the mobility management entity knows that the SRVCC process needs to be initiated according to the SRVCC handover instruction message therein, so the mobility management entity saves the Kasme.
  • the Kasme saved by the mobility management entity can be used when a subsequent UE needs to return to the 4G network from the 3G network, and the NAS key is inferred based on the Kasme to avoid the UE from switching from the 3G network to the 4G network.
  • the authentication process needs to be re-established. This will increase latency and air interface signaling overhead and seriously affect user experience.
  • the mobility management entity may select an encryption algorithm and an integrity protection algorithm to be used later if the UE returns to the 4G network based on a preset policy.
  • the preset policy may include at least one of the following factors: its own security capability, local priority list, UE security capability, and so on.
  • the preset policy may include the security capabilities of the terminal device, that is, the mobility management entity selects the encryption algorithm and the integrity that the UE will use when returning to the 4G network based on the security capabilities of the terminal device (such as the security algorithm supported by the terminal device).
  • Sexual protection algorithm such as the security algorithm supported by the terminal device.
  • the preset policy can also include the security capabilities of the mobility management entity itself, that is, the mobility management entity selects the encryption that the UE will use when returning to the 4G network based on its own security capabilities (such as the security algorithms supported by the mobility management entity itself). Algorithms and integrity protection algorithms. Alternatively, the preset policy may also include a priority list of security capabilities. For example, the mobility management entity determines the security algorithms supported by the terminal device and itself, and then may select the algorithm with the highest security emphasis or the highest priority as the UE to return to the 4G network. The encryption algorithm and integrity protection algorithm that will be used at the time.
  • the preset policy may be predefined, such as a protocol definition, or may be determined through negotiation between the UE and the user plane gateway, which is not limited in this application.
  • the above encryption algorithms and integrity protection algorithms can be collectively referred to as security algorithms.
  • security algorithms For brevity, in the following embodiments, the encryption algorithm and integrity protection algorithm used when the UE selected by the mobility management entity returns to the 4G network is referred to as the 4G algorithm.
  • the mobility management entity can use Kasme and 4G algorithms to derive a NAS key, and the NAS key can be used when the UE switches to the 4G network.
  • 4G algorithms include 4G encryption algorithms and 4G integrity protection algorithms.
  • NAS keys include NAS encryption keys and NAS integrity protection keys.
  • the mobility management entity derives NAS encryption keys based on Kasme and 4G encryption algorithms; and derives NAS integrity protection keys based on Kasme and 4G integrity protection algorithms.
  • the mobility management entity after the mobility management entity receives the relocation request message from the access and mobility management network element, it knows that the SRVCC process needs to be initiated according to the SRVCC handover instruction message, and based on the SRVCC The handover instruction message, the mobility management entity will save Kasme and the selected 4G algorithm.
  • the embodiment of this application does not limit the time when the mobility management entity pushes the NAS key.
  • the mobility management entity may not derive the NAS key, but may instead derive the NAS key when it is determined that the UE needs to return to the 4G network.
  • step 505 CK
  • the mobility management entity After the mobility management entity receives the relocation request message from the access and mobility management network element, it knows that it needs to initiate the SRVCC process for the UE to switch from the 5G network to the 3G network according to the SRVCC handover instruction message in it.
  • Kasme gets CK
  • the mobility management entity uses Kasme and input parameters to derive CK
  • the input parameters may be obtained by the access and mobility management network element and notified to the UE, or may be carried in a service request message sent by the UE, such as a PDU session identifier.
  • the mobility management entity may directly use the first half of Kasme as CK and the latter half as IK.
  • the eKSI received by the mobility management entity may also be directly used as the KSI identifier CK
  • step 506 the mobility management entity sends a PS to CS handover request message to the mobile switching center server.
  • the PS to CS handover request message includes a CK
  • the role of the PS to CS handover request message is to perform a packet switching to circuit switching request.
  • the PS to CS handover request message may further include a 4G algorithm selected by the mobility management entity for the UE, or may be an identifier of the 4G algorithm.
  • step 507 the mobile switching center server sends a relocation request message / handover request message to the wireless network subsystem network element.
  • the relocation request message / handover request message is used to make a handover request to the base station controller in the wireless network subsystem, and the message may include a source container to a target base container.
  • the wireless network subsystem network element refers to a wireless network subsystem including a base station controller and a base station.
  • step 508 the wireless network subsystem network element sends a relocation response message / handover response message to the mobile switching center server.
  • This message is a response to the relocation request message / handover request message in step 507.
  • step 509 the mobile switching center server sends a PS to CS handover response message to the mobility management entity.
  • the PS to CS handover response message is used to respond to the PS to CS handover request message in step 506.
  • step 510 the mobility management entity sends a fronthaul relocation response message to the access and mobility management network element.
  • the relocation response message may further include an identifier indicating the 4G algorithm or the 4G algorithm selected by the mobility management entity in step 504.
  • the UE can derive the NAS key based on the Kasme and 4G algorithm, avoiding the need to re-establish the authentication when the UE needs to switch from 3G to 4G Rights process, which will increase the delay and air interface signaling overhead and seriously affect the user experience.
  • the relocation response message may also carry an indication information, which is used to indicate the 4G algorithm, so as to indicate that the 4G algorithm does not need to be processed in the 3G network.
  • step 511 the access and mobility management network element sends a handover command message to the base station.
  • the handover command message includes a 4G algorithm or an identifier of the 4G algorithm.
  • the switching command message may further include the indication information in step 510.
  • step 512 the base station sends a handover command message to the UE.
  • the handover command message includes a 4G algorithm or an identifier of the 4G algorithm.
  • the switching command message may further include the indication information in step 510.
  • step 513 the UE derives CK
  • the UE After receiving the handover command message, the UE uses Kamf to deduce Kasme, and then uses Kasme to deduce CK
  • the UE may save the received 4G algorithm or the identifier of the 4G algorithm, so that the NAS key can be derived when the subsequent return to the 4G network is needed.
  • the UE can also save Kasme, so that it can be used directly when it needs to return to the 4G network in the future, and the NAS key can be derived based on the Kasme and 4G algorithm.
  • the UE can also use Kamf to derive the same Kasme when it is subsequently determined that it needs to return to the 4G network, and then derive the NAS key according to the Kasme and 4G algorithms.
  • step 514 the UE sends a handover completion message to the wireless network subsystem network element.
  • step 515 the wireless network subsystem network element sends a handover completion message to the mobile switching center server.
  • step 516 the mobile switching center server sends a PS to CS handover completion message to the mobility management entity.
  • the UE can switch from a 5G network to a 3G network.
  • the mobility management entity can also share the Kasme generated during the process of switching from the 5G network to the 3G network with the UE, so that when the UE needs to return to the 4G network, the NAS key can be derived based on the Kasme and 4G algorithm, thereby avoiding In order to re-establish the authentication process and improve user experience.
  • step 517 the mobile switching center server sends an RRC release message to the wireless network subsystem network element.
  • step 518 the wireless network subsystem network element sends an RRC release message to the UE.
  • the network element of the wireless network subsystem may send an RRC release message to the UE to instruct the UE to switch to the 4G network.
  • the RRC release message includes a network identifier indicating the target network returned by the UE.
  • the network identifier may include, but is not limited to, an operator identifier (e.g., PLMN ID, access network ID, serving network ID, cell ID, base station ID, etc.) gNB ID), LAN network ID, slice ID, bearer ID, quality of service (QoS) ID, flow ID, network slice selection assistance information (NSSAI).
  • step 519 the UE uses the 4G algorithm to derive the NAS key, and determines to return to the 4G network.
  • the UE After receiving the RRC release message, the UE determines to return to the 4G network.
  • the UE can use the 3G network RRC release message to derive the root key of the 4G network using the root key of the 5G network, and then the NAS key of the 4G network. If the UE previously stored Kasme, it uses Kasme and the 4G algorithm received previously to derive the NAS key. If the UE does not store Kasme, it uses Kamf to deduce Kasme first, and then uses Kasme and the 4G algorithm received previously to deduce the NAS key.
  • the access and mobility management network element will first derive the root key Kasme of the 4G network based on the root key Kamf of the 5G network.
  • the root key Kasme of the 4G network obtained when the UE switches from the 5G network to the 3G network can be used.
  • the mobility management entity will select a security algorithm for the UE when returning to the 4G network when the UE switches from the 5G network to the 3G network.
  • the UE can derive the security key of the 4G network and thereby avoid the UE When returning to the 4G network, the re-authentication process is performed, thereby reducing the delay and improving the user experience.
  • FIG. 6 is another schematic flowchart of a handover method 600 according to another embodiment of the present application, which is shown from the perspective of device interaction. As shown, the method 600 shown in FIG. 6 may include steps 601 to 620. Each step in the method 600 is described in detail below with reference to FIG. 6.
  • step 601 the base station sends a handover request message to the access and mobility management network element.
  • step 601 is similar to step 401 in method 400 and step 501 in method 500 above. Since step 401 has been described in detail in the method 400 above, for brevity, it will not be repeated here.
  • step 602 the access and mobility management network element derives Kasme and maps ngKSI to eKSI.
  • step 602 is similar to step 402 in method 400 and step 502 in method 500 above. Since step 402 has been described in detail in the method 400 above, for brevity, it will not be repeated here.
  • step 603 the access and mobility management network element sends a fronthaul relocation request message to the mobility management entity.
  • step 603 is similar to step 403 in method 400 and step 503 in method 500 above. Since step 403 has been described in detail in the method 400 above, for brevity, it will not be repeated here.
  • the mobility management entity saves Kasme, selects a 4G algorithm, and derives a NAS key.
  • the mobility management entity After receiving the forward relocation request message from the access and mobility management network element, the mobility management entity knows that the SRVCC process needs to be initiated according to the SRVCC handover instruction message, so the mobility management entity can save the Kasme.
  • the Kasme saved by the mobility management entity can be used when a subsequent UE needs to return to the 4G network from the 3G network, and the NAS key is inferred based on the Kasme to avoid the UE from switching from the 3G network to the 4G network.
  • the authentication process needs to be re-established. This will increase latency and air interface signaling overhead and seriously affect user experience.
  • the mobility management entity may select an encryption algorithm and an integrity protection algorithm to be used later when the UE returns to the 4G network.
  • the mobility management entity may select an appropriate encryption algorithm and integrity protection algorithm according to its own security capabilities, local priority list, and UE security capabilities.
  • the encryption algorithm and integrity protection algorithm used when the UE selected by the mobility management entity returns to the 4G network is referred to as the 4G algorithm.
  • the mobility management entity can use Kasme and 4G algorithms to derive a NAS key, and the NAS key can be used when the UE switches to 4G.
  • the embodiment of the present application when the mobility management entity selects the 4G algorithm and when the NAS key is derived, the embodiment of the present application is not limited. Specifically, during the handover process from 5G to 3G, the mobility management entity may not perform step 604.
  • step 605 CK
  • the mobility management entity knows that the SRVCC process needs to be initiated according to the SRVCC handover instruction message, and then uses the received Kasme to obtain CK
  • the mobility management entity may directly use the first half of Kasme as CK and the latter half as IK.
  • the eKSI received by the mobility management entity may also be directly used as the KSI identifier CK
  • step 606 the mobility management entity sends a PS to CS handover request message to the mobile switching center server.
  • the PS to CS handover request message includes a CK
  • the role of the PS to CS handover request message is to perform a packet switching to circuit switching request.
  • step 607 the mobile switching center server sends a relocation request message / handover request message to the wireless network subsystem network element.
  • the relocation request message / handover request message is used to make a handover request to the base station controller in the network element of the wireless network subsystem, and the message may include a transparent container from the source base station to the destination base station.
  • the wireless network subsystem network element refers to a wireless network subsystem including a base station controller and a base station.
  • step 608 the network element of the wireless network subsystem sends a relocation response message / handover response message to the mobile switching center server.
  • This message is a response to the relocation request message / handover request message in step 607.
  • step 609 the mobile switching center server sends a PS to CS handover response message to the mobility management entity.
  • the PS to CS handover response message is used to respond to the PS to CS handover request message in step 606.
  • step 610 the mobility management entity sends a fronthaul relocation response message to the access and mobility management network element.
  • step 611 the access and mobility management network element sends a handover command message to the base station.
  • step 612 the base station sends a handover command message to the UE.
  • step 613 the UE derives CK
  • the UE After receiving the handover command message, the UE uses Kamf to deduce Kasme, and then uses Kasme to deduce CK
  • step 614 the UE sends a handover completion message to the wireless network subsystem network element.
  • step 615 the wireless network subsystem network element sends a handover completion message to the mobile switching center server.
  • step 616 the mobile switching center server sends a PS to CS handover completion message to the mobility management entity.
  • the UE can switch from a 5G network to a 3G network.
  • step 617 the mobile switching center server sends an RRC release message to the wireless network subsystem network element.
  • the RRC release message includes the 4G algorithm or the algorithm identifier of the 4G algorithm selected by the mobility management entity for the UE.
  • step 618 the returned target network is determined.
  • the wireless network subsystem network element may decide whether to carry the 4G algorithm or the algorithm identifier of the 4G algorithm in the RRC release message according to whether the target network to be returned by the UE is a 4G network.
  • the wireless network subsystem network element can obtain the current network coverage status according to the measurement report reported by the UE. Therefore, when the wireless network subsystem network element can learn that there is currently 4G network coverage and there is no 5G network coverage, the UE is determined. Switch from 3G network to 4G network.
  • the RRC release message sent by the network element of the wireless network subsystem to the UE carries a 4G algorithm.
  • the wireless network subsystem network element determines that there is currently coverage of the 5G network, determines that the target network to be returned by the UE is a 5G network, and directly sends an RRC release message to the UE.
  • the network element of the wireless network subsystem determines that there is currently no coverage of the 5G network. If there is coverage of the 4G network, it determines that the target network that the UE is about to return is a 4G network. Or the algorithm identifier of the 4G algorithm.
  • the RRC release message includes the 4G algorithm or the algorithm identifier of the 4G algorithm preselected by the mobility management entity for the UE, then the wireless network
  • the RRC release message sent by the system network element to the UE carries the 4G algorithm or the algorithm identifier of the 4G algorithm preselected by the mobility management entity for the UE.
  • the network element of the wireless network subsystem notifies the mobile switching center server to request a 4G algorithm.
  • the mobile switching center server requests the mobility management entity to select a 4G algorithm for the UE.
  • the mobility management entity receives the instruction, selects the 4G algorithm for the UE, and sends the selected 4G algorithm or the algorithm identifier of the 4G algorithm to the wireless network subsystem network element, so that the wireless network subsystem network element sends an RRC release message to the UE. It carries the 4G algorithm.
  • the network element of the wireless network subsystem may not judge the returned target network.
  • the RRC release message includes the 4G algorithm or the algorithm identifier of the 4G algorithm preselected by the mobility management entity for the UE, and the network element of the wireless network subsystem may return without judging.
  • the target network directly sends the 4G algorithm or the algorithm identifier of the 4G algorithm to the UE through an RRC release message.
  • the RRC release message instructs the UE to return to the 5G network, the UE will ignore the above 4G algorithm because it already has a 5G security context, otherwise the UE will use the above 4G algorithm to derive the NAS key.
  • step 619 the network element of the wireless network subsystem sends an RRC release message to the UE.
  • the wireless network subsystem network element sends an RRC release message to the UE to instruct the UE to switch to the 4G network.
  • the RRC release message includes a network identifier indicating the target network returned by the UE.
  • the network identifier has been described in step 510 in the above method 500, which is brevity and will not be described again here. According to the network identifier, the UE determines that the network to be returned is a 4G network.
  • step 620 the UE derives a NAS key.
  • the UE When the UE receives the RRC release message, it can use the 4G algorithm carried in the RRC release message to derive the NAS key. Before the NAS key is derived, if the UE does not have Kasme, the UE needs to use Kamf to derive Kasme first. If the UE saved Kasme when inferring CK
  • a method that requires the UE to save Kasme in advance may be that when the UE switches from a 5G network to a 3G network, the mobility management entity sends instruction information to the UE to instruct the UE to save Kasme.
  • the access and mobility management network element will first derive the root key Kasme of the 4G network based on the root key Kamf of the 5G network.
  • the root key Kasme of the 4G network obtained when the UE switches from the 5G network to the 3G network can be used.
  • the security management algorithm of the 4G network is requested from the mobility management entity, and the security algorithm of the 4G network is sent to the UE, so that the UE can make the Kasme, the root key of the 4G network, deduces the security key of the 4G network, which can prevent the UE from performing the re-authentication process when returning to the 4G network, thereby reducing the delay and saving the air interface resources in the 5G SRVCC phase, improving the user experience .
  • FIG. 7 is a schematic block diagram of a switching device 700 according to an embodiment of the present application.
  • the communication device 700 may include: a transceiver module 710 and a processing module 720.
  • the switching device 700 may be the UE in the foregoing method embodiment, or may be a chip used to implement the functions of the UE in the foregoing method embodiment.
  • the transceiver module 710 is configured to receive first information, where the first information includes instruction information instructing the terminal device to switch from the first network to the second network, and the first information further includes the A network identification of the second network; a processing module 720, configured to set the security context of the third network to the currently used security context when the security context of the native third network exists in the terminal device The processing module 720 is further configured to derive the security context of the second network according to the security context of the third network.
  • the processing module 720 is further configured to: delete the security context of the first network.
  • the transceiver module 710 is further configured to send tracking area update request information protected by the security context of the third network to a mobility management entity.
  • the tracking area update request information includes a fifth-generation 5G globally unique temporary terminal device identifier mapping of a fourth-generation 4G globally unique temporary terminal device identifier and a key set identifier.
  • the first information is radio resource control RRC release information.
  • the processing module 720 is further configured to: when the security context of the native third network does not exist in the terminal device, delete the security context of the first network; and the transceiver module 710 is further configured to: Sending the tracking area update request information without integrity protection to the mobility management entity, so that the mobility management entity performs a re-authentication process.
  • the first network is a third-generation 3G / second-generation 2G network
  • the second network is a fourth-generation 4G network
  • the third network is a fifth-generation 5G network.
  • the switching device 700 may correspond to the UE in the methods 400 to 600 according to the embodiment of the present application, and the switching device 700 may include a UE for performing the method 400 in FIG. 4 to the method 600 in FIG. 6.
  • Method module each module in the switching device 700 and the other operations and / or functions described above are used to implement corresponding processes of the method 400 in FIG. 4, the method 500 in FIG. 5, and the method 600 in FIG. 6, respectively. It should be understood that the specific process of each module performing the above corresponding steps has been described in detail in the foregoing method embodiment, and for the sake of brevity, it will not be repeated here.
  • the switching device 700 may be the mobility management entity in the foregoing method embodiment, or may be a chip used to implement the functions of the mobility management entity in the foregoing method embodiment.
  • the switching device 700 may correspond to the mobility management entity in the methods 400 to 600 according to the embodiment of the present application.
  • the switching device 700 may include a method for performing the method 400 in FIG. 4 to the method 600 in FIG. 6.
  • each unit in the switching device 700 and the other operations and / or functions described above are respectively used to implement the corresponding processes of the method 400 in FIG. 4, the method 500 in FIG. 5, and the method 600 in FIG. 6. It should be understood that the specific process of each module performing the above corresponding steps has been described in detail in the foregoing method embodiment, and for the sake of brevity, it will not be repeated here.
  • the switching device 700 may be an access and mobility management network element in the foregoing method embodiment, or may be used to implement the access and mobility management network element in the foregoing method embodiment. Functional chip.
  • the switching device 700 may correspond to the access and mobility management network elements in the methods 400 to 600 according to the embodiment of the present application.
  • the switching device 700 may include a method for performing the methods 400 to 6 in FIG. 4. Module of the method performed by the access and mobility management network element in method 600.
  • each module in the switching device 700 and the other operations and / or functions described above are used to implement corresponding processes of the method 400 in FIG. 4, the method 500 in FIG. 5, and the method 600 in FIG. 6, respectively. It should be understood that the specific process of each module performing the above corresponding steps has been described in detail in the foregoing method embodiment, and for the sake of brevity, it will not be repeated here.
  • the switching device 700 may be the mobile switching center in the foregoing method embodiment, or may be a chip used to implement the functions of the mobile switching center in the foregoing method embodiment.
  • the switching device 700 may correspond to the mobile switching center in the methods 400 to 600 according to the embodiment of the present application.
  • the switching device 700 may include a method for performing the method 400 in FIG. 4 to the method 600 in FIG. 6.
  • each module in the switching device 700 and the other operations and / or functions described above are used to implement corresponding processes of the method 400 in FIG. 4, the method 500 in FIG. 5, and the method 600 in FIG. 6, respectively. It should be understood that the specific process of each module performing the above corresponding steps has been described in detail in the foregoing method embodiment, and for the sake of brevity, it will not be repeated here.
  • the switching device 700 may be the wireless network subsystem network element in the foregoing method embodiment, or may be used to implement the functions of the wireless network subsystem network element in the foregoing method embodiment. chip.
  • the switching device 700 may correspond to the wireless network subsystem network element in the methods 400 to 600 according to the embodiment of the present application, and the switching device 700 may include a method for executing the method 400 in FIG. 4 to the method in FIG. 6. 600.
  • each module in the switching device 700 and the other operations and / or functions described above are respectively used to implement the corresponding processes of the method 400 in FIG. 4, the method 500 in FIG. 5, and the method 600 in FIG. It should be understood that the specific process of each module performing the above corresponding steps has been described in detail in the foregoing method embodiment, and for the sake of brevity, it will not be repeated here.
  • transceiver module in the switching device 700 may correspond to the transceiver 810 in the switching device 700 shown in FIG. 8, and the processing module 720 in the switching device 700 may correspond to the switching device 800 shown in FIG. 8.
  • the transceiver 820 may correspond to the transceiver 810 in the switching device 700 shown in FIG. 8 and the processing module 720 in the switching device 700 may correspond to the switching device 800 shown in FIG. 8.
  • the transceiver 820 may correspond to the transceiver 810 in the switching device 700 shown in FIG. 810 in the switching device 700 shown in FIG. 8
  • processing module 720 in the switching device 700 may correspond to the switching device 800 shown in FIG. 8.
  • the transceiver 820 may correspond to the transceiver 810 in the switching device 700 shown in FIG. 820.
  • FIG. 8 is a schematic block diagram of a switching device 800 according to an embodiment of the present application.
  • the switching device 800 includes: a processor 810 and a transceiver 820.
  • the processor 810 is coupled to the memory and is configured to execute instructions stored in the memory to control the transceiver 820 to send signals and / or receive signals.
  • the switching device 800 further includes a memory 830 for storing instructions.
  • processor 810 and the memory 830 may be combined into a processing device, and the processor 810 is configured to execute program codes stored in the memory 830 to implement the foregoing functions.
  • the memory 830 may also be integrated in the processor 810, or be independent of the processor 810.
  • the transceiver 820 may include a receiver (or receiver) and a transmitter (or transmitter).
  • the transceiver may further include antennas, and the number of antennas may be one or more.
  • the switching device 800 may be the UE in the foregoing method embodiment, or may be a chip used to implement the functions of the UE in the foregoing method embodiment.
  • the switching device 800 may correspond to the UE in the methods 400 to 600 according to the embodiment of the present application, and the switching device 800 may include a UE for performing the method 400 in FIG. 4 to the method 600 in FIG. 6.
  • Method module a module in the switching device 800 and the other operations and / or functions described above are respectively for implementing the corresponding processes of the method 400 in FIG. 4, the method 500 in FIG. 5, and the method 600 in FIG. 6. It should be understood that the specific process of each module performing the above corresponding steps has been described in detail in the foregoing method embodiment, and for the sake of brevity, it will not be repeated here.
  • the switching device 800 may be the mobility management entity in the foregoing method embodiment, or may be a chip used to implement the functions of the mobility management entity in the foregoing method embodiment.
  • the switching device 800 may correspond to the mobility management entity in the methods 400 to 600 according to the embodiment of the present application.
  • the switching device 800 may include a method for performing the method 400 in FIG. 4 to the method 600 in FIG. 6.
  • each unit in the switching device 800 and the other operations and / or functions described above are respectively used to implement corresponding processes of the method 400 in FIG. 4, the method 500 in FIG. 5, and the method 600 in FIG. 6. It should be understood that the specific process of each module performing the above corresponding steps has been described in detail in the foregoing method embodiment, and for the sake of brevity, it will not be repeated here.
  • the switching device 800 may be the access and mobility management network element in the foregoing method embodiment, or may be used to implement the access and mobility management network element in the method embodiment above. Functional chip.
  • the switching device 800 may correspond to the access and mobility management network elements in the methods 400 to 600 according to the embodiments of the present application.
  • the switching device 800 may include a method for performing the methods 400 to 6 in FIG. 4. Module of the method performed by the access and mobility management network element in method 600.
  • each module in the switching device 800 and the other operations and / or functions described above are respectively for implementing the corresponding processes of the method 400 in FIG. 4, the method 500 in FIG. 5, and the method 600 in FIG. 6. It should be understood that the specific process of each module performing the above corresponding steps has been described in detail in the above method embodiment, and for the sake of brevity, it will not be repeated here.
  • the switching device 800 may be the mobile switching center in the foregoing method embodiment, or may be a chip used to implement the functions of the mobile switching center in the foregoing method embodiment.
  • the switching device 800 may correspond to the mobile switching center in the methods 400 to 600 according to the embodiment of the present application, and the switching device 800 may include a method for performing the method 400 in FIG. 4 to the method 600 in FIG. 6.
  • each module in the switching device 800 and the other operations and / or functions described above are respectively for implementing the corresponding processes of the method 400 in FIG. 4, the method 500 in FIG. 5, and the method 600 in FIG. 6. It should be understood that the specific process of each module performing the above corresponding steps has been described in detail in the foregoing method embodiment, and for the sake of brevity, it will not be repeated here.
  • the switching device 800 may be the wireless network subsystem network element in the foregoing method embodiment, or may be used to implement the functions of the wireless network subsystem network element in the method embodiment above. chip.
  • the switching device 800 may correspond to the wireless network subsystem network element in the methods 400 to 600 according to the embodiment of the present application, and the switching device 800 may include a method for performing the method 400 in FIG. 4 to the method in FIG. 6. 600.
  • each module in the switching device 800 and the other operations and / or functions described above are respectively for implementing the corresponding processes of the method 400 in FIG. 4, the method 500 in FIG. 5, and the method 600 in FIG. 6. It should be understood that the specific process of each module performing the above corresponding steps has been described in detail in the foregoing method embodiment, and for the sake of brevity, it will not be repeated here.
  • the present application also provides a computer program product, the computer program product includes: computer program code, when the computer program code is run on a computer, the computer executes the operations shown in FIG. 4 to FIG. 6 The switching method of any one of the embodiments is shown.
  • the present application further provides a computer-readable medium, where the computer-readable medium stores program code, and when the program code runs on the computer, the computer executes the operations shown in FIG. 4 to FIG. 6.
  • the switching method of any one of the embodiments is shown.
  • the present application further provides a system including the foregoing UE, a mobility management entity, an access and mobility management network element, a mobile switching center, and a wireless network subsystem network element.
  • the computer program product includes one or more computer instructions.
  • the computer may be a general-purpose computer, a special-purpose computer, a computer network, or other programmable devices.
  • the computer instructions may be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be from a website site, computer, server, or data center Transmission by wire (such as coaxial cable, optical fiber, digital subscriber line (DSL)) or wireless (such as infrared, wireless, microwave, etc.) to another website site, computer, server, or data center.
  • the computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server, a data center, and the like that includes one or more available medium integration.
  • the usable medium may be a magnetic medium (for example, a floppy disk, a hard disk, a magnetic tape), an optical medium (for example, a high-density digital video disc (DVD)), or a semiconductor medium (for example, a solid state disk (solid state disk, SSD)) and so on.
  • a magnetic medium for example, a floppy disk, a hard disk, a magnetic tape
  • an optical medium for example, a high-density digital video disc (DVD)
  • DVD high-density digital video disc
  • semiconductor medium for example, a solid state disk (solid state disk, SSD)
  • Each network element in each of the foregoing device embodiments may completely correspond to each network element in the method embodiment, and the corresponding module or unit performs the corresponding steps, for example, the transceiver unit (transceiver) performs the steps of receiving or sending in the method embodiment.
  • the steps other than sending and receiving can be performed by a processing unit (processor).
  • processor For the function of the specific unit, refer to the corresponding method embodiment. Among them, there may be one or more processors.
  • At least one means one or more, and “multiple” means two or more.
  • “And / or” describes the association relationship of related objects, and indicates that there can be three kinds of relationships. For example, A and / or B can indicate: A exists alone, A and B exist simultaneously, and B exists alone, where A, B can be singular or plural. The character “/” generally indicates that the related objects are an "or” relationship. "At least one or more of the following” or similar expressions refers to any combination of these items, including any combination of single or plural items.
  • At least one or more of a, b, or c may represent: a, or b, or c, or a and b, or a and c, or b and c, or a, b, and c, where a, b, or c may be single or multiple.
  • an embodiment or “an embodiment” mentioned throughout the specification means that a particular feature, structure, or characteristic related to the embodiment is included in at least one embodiment of the present application.
  • the appearances of "in one embodiment” or “in an embodiment” appearing throughout the specification are not necessarily referring to the same embodiment.
  • the particular features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. It should be understood that, in the various embodiments of the present application, the size of the sequence numbers of the above processes does not mean the order of execution. The execution order of each process should be determined by its function and internal logic, and should not deal with the embodiments of the present invention.
  • the implementation process constitutes any limitation.
  • module may be, but is not limited to, a process running on a processor, a processor, an object, an executable, a thread of execution, a program, and / or a computer.
  • an application running on a computing device and a computing device can be components.
  • One or more components can reside within a process and / or thread of execution, and a component can be localized on one computer and / or distributed between 2 or more computers.
  • these components can execute from various computer readable media having various data structures stored thereon.
  • a component may, for example, be based on a signal having one or more data packets (e.g., data from two components that interact with another component between a local system, a distributed system, and / or a network, such as the Internet that interacts with other systems through signals) Communicate via local and / or remote processes.
  • data packets e.g., data from two components that interact with another component between a local system, a distributed system, and / or a network, such as the Internet that interacts with other systems through signals
  • the disclosed systems, devices, and methods may be implemented in other ways.
  • the device embodiments described above are only schematic.
  • the division of the unit is only a logical function division.
  • multiple units or components may be combined or Can be integrated into another system, or some features can be ignored or not implemented.
  • the displayed or discussed mutual coupling or direct coupling or communication connection may be through some interfaces, the indirect coupling or communication connection of the device or unit, and may be electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, may be located in one place, or may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the objective of the solution of this embodiment.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, or each of the units may exist separately physically, or two or more units may be integrated into one unit.
  • the functions are implemented in the form of software functional units and sold or used as independent products, they can be stored in a computer-readable storage medium.
  • the technical solution of this application is essentially a part that contributes to the existing technology or a part of the technical solution can be embodied in the form of a software product.
  • the computer software product is stored in a storage medium, including Several instructions are used to cause a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the method described in the embodiments of the present application.
  • the aforementioned storage media include: U disks, mobile hard disks, read-only memories (ROMs), random access memories (RAMs), magnetic disks or compact discs and other media that can store program codes .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present application provides a switching method and a terminal device. The switching method is applied to a scene where a terminal device switches from a third network to a first network and then returns to a second network. The method comprises: a terminal device receives first information, the first information comprising instruction information for instructing the terminal device to switch from a first network to a second network; if the terminal device stores a security context of a third network and the security context of the third network is a native security context, the terminal device deletes the security context of the first network, and sets the security context of the third network as the currently used security context; the terminal device sends, to a mobility management entity in the second network, tracking area update (TAU) request information protected by the security context of the third network. The switching method of embodiments of the present application can prevent the leakage of security contexts, thereby ensuring the security of network communications and improving user experience.

Description

切换方法和终端设备Switching method and terminal equipment

本申请要求于2018年09月15日提交中国专利局、申请号为201811077476.X、申请名称为“切换方法和终端设备”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。This application claims priority from a Chinese patent application filed with the Chinese Patent Office on September 15, 2018, with application number 201811077476.X, and with the application name "switching method and terminal device", the entire contents of which are incorporated herein by reference. .

技术领域Technical field

本申请涉及通信领域,并且更具体地,涉及切换方法和终端设备。The present application relates to the field of communications, and more particularly, to a handover method and a terminal device.

背景技术Background technique

新空口承载语音(voice over new radio,VoNR)是使用第五代(5th generation,5G)新空口承载语音的技术。在5G网络部署初期,VoNR的覆盖面临着与长期演进承载语音(voice over long term evolution,VoLTE)相同的问题。即如果使用VoNR进行通话的用户移动到了只有电路交换(circuit switched,CS)覆盖区域的话,同样需要确保通话不被间断。New air interface voice (voNR) is a technology that uses the fifth generation (5G) new air interface to carry voice. In the initial stage of 5G network deployment, VoNR coverage faces the same problems as long-term evolution bearer voice (VoLTE). That is, if a user who uses VoNR for a call moves to a circuit-switched (CS) coverage area, it is also necessary to ensure that the call is not interrupted.

标准上定义了一种5G单一无线语音呼叫连续性(single radio voice call continuity,SRVCC),可以解决5G网络与第三代(3rd generation,3G)网络之间的切换,进而确保通话不被间断。由于3G网络无法胜任5G网络的高速数据传输,如果用户在结束3G网络的语音业务后仍然驻留在3G网络,则会使用户体验受到较大的影响。因此如果此时用户所处位置有第四代(4th generation,4G)或5G网络覆盖的话,则应将用户重新返回4G或5G网络。A 5G single wireless voice call continuity (SRVCC) is defined in the standard, which can solve the switch between the 5G network and the 3rd generation (3G) network, thereby ensuring that the call is not interrupted. As the 3G network is not capable of high-speed data transmission of the 5G network, if the user stays on the 3G network after ending the 3G network's voice service, the user experience will be greatly affected. Therefore, if the user is in the 4th generation (4G) or 5G network coverage at this time, the user should be returned to the 4G or 5G network.

当用户被指示需要返回4G网络时,用户会根据3G安全上下文推演4G安全上下文,由于3G网络安全性较4G差,这使得推演出的4G安全上下文存在泄漏的风险,如该4G安全上下文可以被3G网络知晓,进而被攻击者获得,同时后续如果用户返回5G网络,会根据上述4G安全上下文继续推演5G安全上下文,使得3G网络的不安全性蔓延到5G网络,严重影响网络通信安全。When the user is instructed to return to the 4G network, the user will deduce the 4G security context based on the 3G security context. Since the security of the 3G network is worse than 4G, this makes the derived 4G security context risk leakage. For example, the 4G security context can be compromised. The 3G network is known and then obtained by the attacker. At the same time, if the user returns to the 5G network, the 5G security context will be deduced according to the 4G security context described above, which will cause the insecurity of the 3G network to spread to the 5G network and seriously affect the security of network communications.

发明内容Summary of the Invention

本申请提供一种切换方法和终端设备,以避免4G安全上下文遭到泄漏,进而影响5G网络的安全,提高网络通信安全。The present application provides a handover method and terminal equipment to avoid the leakage of the 4G security context, thereby affecting the security of the 5G network and improving the security of network communication.

第一方面,提供了一种切换方法,该方法应用于终端设备从第三网络切换至第一网络之后返回第二网络的场景,该方法包括:所述终端设备接收第一信息,所述第一信息包括指示所述终端设备从所述第一网络切换至所述第二网络的指示信息;当所述终端设备中存在原生的所述第三网络的安全上下文时,所述终端设备将所述第三网络的安全上下文设置为当前使用的安全上下文;所述终端设备向所述第二网络中的移动性管理实体发送使用所述第三网络的安全上下文保护的跟踪区更新(tracking area update,TAU)请求(TAU  request)信息。In a first aspect, a switching method is provided. The method is applied to a scenario in which a terminal device returns to a second network after switching from a third network to the first network. The method includes: the terminal device receives first information, and the first One piece of information includes instruction information that instructs the terminal device to switch from the first network to the second network; when the terminal device has a native security context of the third network, the terminal device uses The security context of the third network is set to the currently used security context; the terminal device sends a tracking area update using the security context protection of the third network to a mobility management entity in the second network. , TAU) request (TAU request) information.

基于上述技术方案,终端设备从第一网络(如2G/3G网络)向第二网络(如4G网络)切换时,可以基于第三网络(如5G网络)的安全上下文来推演出第二网络的安全密钥。终端设备上的安全上下文按照状态至少可以分为当前使用的安全上下文和非当前使用的安全上下文。终端设备驻留在第一网络时,第一网络的安全上下文为当前使用的安全上下文。当终端设备收到切换到第二网络的指示信息后,如果基于第一网络的安全上下文来推演第二网络的安全上下文,可能会出现由于第一网络的安全性差,导致第二网络的安全上下文存在泄漏的情况。因此,本申请提出,可以改变当前使用的安全上下文,如,将第三网络的安全上下文设置为当前使用的安全上下文,并可以基于该第三网络的安全上下文来推演出第二网络的安全密钥,进而可以提高安全性和用户体验。此外,终端设备用当前使用的安全上下文(第三网络的安全上下文)保护接下来向移动性管理实体发送的TAU请求信息,而不是从3G安全上下文派生出的4G映射安全上下文来保护TAU请求消息,可以避免Kasme发生泄漏,并保证5G网络的安全,提高网络通信安全。Based on the above technical solution, when a terminal device switches from a first network (such as a 2G / 3G network) to a second network (such as a 4G network), the terminal network can infer the performance of the second network based on the security context of the third network (such as a 5G network) Security key. The security context on the terminal device can be divided into at least the currently used security context and the non-currently used security context according to the state. When the terminal device resides on the first network, the security context of the first network is the currently used security context. After the terminal device receives the instruction to switch to the second network, if the security context of the second network is deduced based on the security context of the first network, the security context of the second network may occur due to the poor security of the first network. There are leaks. Therefore, the present application proposes that the security context currently used can be changed, for example, the security context of the third network is set to the currently used security context, and the security secret of the second network can be derived based on the security context of the third network. Key, which can improve security and user experience. In addition, the terminal device uses the currently used security context (the security context of the third network) to protect the TAU request information that is subsequently sent to the mobility management entity, instead of protecting the TAU request message from the 4G mapping security context derived from the 3G security context. , Can prevent Kasme from leaking, and ensure the security of 5G networks and improve the security of network communications.

结合第一方面,在第一方面的某些实现方式中,所述终端设备接收第一信息之后,还包括:所述终端设备删除所述第一网络的安全上下文。With reference to the first aspect, in some implementations of the first aspect, after the terminal device receives the first information, the method further includes: the terminal device deleting the security context of the first network.

基于上述技术方案,终端设备先删除第一网络(如2G/3G网络)的安全上下文,再将第三网络(如5G网络)的安全上下文设置为当前使用的安全上下文,这样可以进一步保证终端设备推演第二网络(如4G网络)的安全上下文时,使用的是第三网络的安全上下文,进而可以保证第二网络的安全上下文的安全性。Based on the above technical solution, the terminal device first deletes the security context of the first network (such as the 2G / 3G network), and then sets the security context of the third network (such as the 5G network) to the currently used security context, which can further ensure the terminal device. When deriving the security context of the second network (such as a 4G network), the security context of the third network is used, thereby ensuring the security of the security context of the second network.

结合第一方面,在第一方面的某些实现方式中,所述跟踪区更新请求信息包括第五代5G全局唯一临时终端设备标识映射的第四代4G全局唯一临时终端设备标识和密钥集标识符。With reference to the first aspect, in some implementations of the first aspect, the tracking area update request information includes a fifth-generation 5G globally unique temporary terminal equipment identifier mapping and a fourth-generation 4G globally unique temporary terminal equipment identifier and key set. Identifier.

结合第一方面,在第一方面的某些实现方式中,所述第一信息为无线资源控制RRC释放信息。With reference to the first aspect, in some implementation manners of the first aspect, the first information is radio resource control RRC release information.

结合第一方面,在第一方面的某些实现方式中,所述方法还包括:当所述终端设备中不存在原生的所述第三网络的安全上下文时,所述终端设备删除所述第一网络的安全上下文;所述终端设备向移动性管理实体发送无完整性保护的跟踪区更新请求信息,以使所述移动性管理实体执行重鉴权流程。With reference to the first aspect, in some implementations of the first aspect, the method further includes: when the terminal device does not have a native security context of the third network, the terminal device deletes the first A network security context; the terminal device sends a tracking area update request message without integrity protection to the mobility management entity, so that the mobility management entity performs a re-authentication process.

基于上述技术方案,如果没有保存5G(即第三网络)原生安全上下文,或者5G原生安全上下文不可用,则删除处于当前使用状态的3G(即第一网络)安全上下文,并向移动性管理实体发送无完整性保护的跟踪区更新请求信息,这样移动性管理实体执行重鉴权流程,以建立4G安全上下文。Based on the above technical solution, if the 5G (that is, the third network) native security context is not saved, or the 5G native security context is not available, the 3G (that is, the first network) security context that is currently in use is deleted, and the mobility management entity is Send the tracking area update request information without integrity protection so that the mobility management entity performs a re-authentication process to establish a 4G security context.

结合第一方面,在第一方面的某些实现方式中,所述第一网络为第三代3G/第二代2G网络,所述第二网络为第四代4G网络,所述第三网络为第五代5G网络。With reference to the first aspect, in some implementations of the first aspect, the first network is a third-generation 3G / second-generation 2G network, the second network is a fourth-generation 4G network, and the third network For the fifth generation 5G network.

第二方面,提供了一种切换方法,该方法应用于终端设备从第三网络切换至第一网络之后返回第二网络的场景,该方法包括:移动性管理实体在终端设备从第三网络切换至第一网络过程中,获取并保存第二网络的安全上下文;在所述终端设备从所述第一网络切换至所述第二网络时,所述移动性管理实体根据所述第二网络的安全上下文保护与所述终端设备的通信。In a second aspect, a switching method is provided. The method is applied to a scenario where a terminal device returns to the second network after switching from the third network to the first network. The method includes: the mobility management entity switches from the third network to the terminal device During the process of going to the first network, the security context of the second network is acquired and saved; when the terminal device switches from the first network to the second network, the mobility management entity according to the second network The security context protects communication with the terminal device.

基于上述技术方案,终端设备从第一网络(如2G/3G网络)向第二网络(如4G网络)切换时,可以充分利用终端设备从第三网络(如5G网络)切换到第一网络过程中得到的第二网络的安全上下文,从而可以避免由第一网络切换回第二网络时的重鉴权流程。终端设备从第一网络向第二网络切换之前,是从第三网络切换到第一网络的,且在从第三网络切换到第一网络的过程中,会根据第三网络的安全上下文推演出第二网络的安全上下文,继而再根据第二网络的安全上下文推演出第一网络的安全上下文,以便终端设备从第三网络切换到第一网络。本申请充分利用了终端设备在从第三网络切换到第一网络的过程中得到的第二网络的安全上下文,继而移动性管理实体利用该第二网络的安全上下文保护与终端设备的通信,避免了终端设备从第一网络切换到第二网络时建立重鉴权流程带来的时延,并提高了用户体验。Based on the above technical solution, when a terminal device switches from a first network (such as a 2G / 3G network) to a second network (such as a 4G network), the terminal device can make full use of the process of switching from a third network (such as a 5G network) to the first network. The security context of the second network obtained in this way can avoid the re-authentication process when the first network switches back to the second network. Before the terminal device is switched from the first network to the second network, it is switched from the third network to the first network, and during the process of switching from the third network to the first network, it will be deduced according to the security context of the third network. The security context of the second network is then used to derive the security context of the first network according to the security context of the second network, so that the terminal device switches from the third network to the first network. This application makes full use of the security context of the second network obtained by the terminal device during the process of switching from the third network to the first network, and then the mobility management entity uses the security context of the second network to protect communication with the terminal device, avoiding The delay caused by the re-authentication process when the terminal device is switched from the first network to the second network is improved, and the user experience is improved.

结合第二方面,在第二方面的某些实现方式中,所述第二网络的安全上下文包括所述第二网络的根密钥和所述第二网络的安全算法;所述移动性管理实体在终端设备从第三网络切换至第一网络过程中,获取并保存所述第二网络的安全上下文,包括:在所述终端设备从第三网络切换至第一网络过程中,所述移动性管理实体接收来自接入和移动管理网元的第一请求信息,所述第一请求信息包括单射频语音呼叫连续性SRVCC切换指示信息以及所述第二网络的根密钥;所述移动性管理实体根据预设的策略,为所述终端选择所述第二网络的安全算法;所述移动性管理实体根据所述SRVCC切换指示信息,确定保存所述第二网络的根密和所述第二网络的安全算法。With reference to the second aspect, in some implementations of the second aspect, the security context of the second network includes a root key of the second network and a security algorithm of the second network; the mobility management entity The acquiring and saving the security context of the second network during the terminal device switching from the third network to the first network includes: during the switching of the terminal device from the third network to the first network, the mobility The management entity receives first request information from the access and mobility management network element, the first request information includes single radio frequency voice call continuity SRVCC handover indication information and a root key of the second network; the mobility management The entity selects a security algorithm of the second network for the terminal according to a preset policy; the mobility management entity determines to save the root secret of the second network and the second network according to the SRVCC handover instruction information. Network security algorithms.

基于上述技术方案,终端设备从第一网络(如2G/3G网络)向第二网络(如4G网络)切换之前,是从第三网络(如5G网络)切换到第一网络的,且在从第三网络切换到第一网络的过程中,会根据第三网络的根密钥推演出第二网络的根密钥,继而再根据第二网络的根密钥推演出第一网络的安全密钥,以便终端设备从第三网络切换到第一网络。现有技术中,移动性管理实体推演出第一网络的安全密钥后,并不会保存第二网络的根密钥,也不会选择并保存第二网络的安全算法。本申请中,终端设备从第一网络向第二网络切换时,移动性管理实体根据接收到的SRVCC切换指示,保存了终端设备从第三网络切换到第一网络过程中得到的第二网络的根密钥。此外,移动性管理实体还选择并保存第二网络的安全算法,从而可以避免终端设备从第一网络切换到第二网络时建立重鉴权流程带来的时延,并提高了用户体验。Based on the above technical solution, before the terminal device is switched from the first network (such as a 2G / 3G network) to the second network (such as a 4G network), the terminal device is switched from the third network (such as a 5G network) to the first network, During the process of switching from the third network to the first network, the root key of the second network is derived from the root key of the third network, and then the security key of the first network is derived from the root key of the second network. So that the terminal device switches from the third network to the first network. In the prior art, after the mobility management entity derives the security key of the first network, it does not save the root key of the second network, nor does it select and save the security algorithm of the second network. In this application, when the terminal device is switched from the first network to the second network, the mobility management entity stores the second network obtained by the terminal device from the third network to the first network according to the received SRVCC switch instruction. The root key. In addition, the mobility management entity also selects and saves the security algorithm of the second network, which can avoid the delay caused by the re-authentication process when the terminal device switches from the first network to the second network, and improves the user experience.

结合第二方面,在第二方面的某些实现方式中,所述方法还包括:在所述终端设备从第三网络切换至第一网络过程中,所述移动性管理实体向所述终端设备发送所述第二网络的安全算法。With reference to the second aspect, in some implementations of the second aspect, the method further includes: during a handover of the terminal device from a third network to the first network, the mobility management entity sends the terminal device to the terminal device Sending the security algorithm of the second network.

基于上述技术方案,移动性管理实体在终端设备从第一网络切换至第二网络时,将保存的第二网络的安全算法发送至终端设备,以便于终端设备根据第二网络的安全算法和第二网络的根密钥推演出终端设备在第二网络中使用的安全密钥。通过该安全密钥可以保护移动性管理实体与终端设备之间的通信。Based on the above technical solution, when the terminal management device switches from the first network to the second network, the mobility management entity sends the saved security algorithm of the second network to the terminal device, so that the terminal device can The root key of the second network deduces the security key used by the terminal device in the second network. The security key can protect communication between the mobility management entity and the terminal device.

结合第二方面,在第二方面的某些实现方式中,所述方法还包括:所述移动性管理实体向所述第一网络中移动交换中心发送所述第二网络的安全算法,以便于所述终端设备从所述第一网络切换至所述第二网络时能够获取所述第二网络的安全算法。With reference to the second aspect, in some implementations of the second aspect, the method further includes: the mobility management entity sending a security algorithm of the second network to a mobile switching center in the first network, so as to facilitate When the terminal device switches from the first network to the second network, the terminal device can obtain a security algorithm of the second network.

基于上述技术方案,终端设备从第一网络(如2G/3G网络)向第二网络(如4G网络) 切换之前,是从第三网络(如5G网络)切换到第一网络的,且在从第三网络切换到第一网络的过程中,移动性管理实体基于来自接入和移动管理网元的SRVCC切换指示信息,会选择并保存第二网络的安全算法。移动性管理实体将选择的第二网络的安全算法发送至移动交换中心,以便于终端设备需要从第一网络切换至第二网络时,可以从移动交换中心获取第二网络的安全算法,从而可以避免建立重鉴权流程,提高用户体验。Based on the above technical solution, before the terminal device is switched from the first network (such as a 2G / 3G network) to the second network (such as a 4G network), the terminal device is switched from the third network (such as a 5G network) to the first network, During the process of switching from the third network to the first network, the mobility management entity will select and save the security algorithm of the second network based on the SRVCC handover instruction information from the access and mobility management network elements. The mobility management entity sends the security algorithm of the selected second network to the mobile switching center, so that when the terminal device needs to switch from the first network to the second network, it can obtain the security algorithm of the second network from the mobile switching center, so that it can Avoid re-authentication processes and improve user experience.

结合第二方面,在第二方面的某些实现方式中,所述预设的策略包括以下至少一项因素:所述终端设备的安全能力、所述移动性管理实体的安全能力、业务的安全需求、所述移动性管理实体的安全能力优先级列表。With reference to the second aspect, in some implementations of the second aspect, the preset policy includes at least one of the following factors: the security capability of the terminal device, the security capability of the mobility management entity, and the security of the service A priority list of requirements, security capabilities of the mobility management entity.

基于上述技术方案,预设的策略可以包括终端设备的安全能力,即移动性管理实体基于终端设备的安全能力(如终端设备支持的安全算法)来选择第二网络的安全算法。预设的策略也可以包括移动性管理实体自身的安全能力,即移动性管理实体基于自身的安全能力(如移动性管理实体自身支持的安全算法)来选择第二网络的安全算法。或者,预设的策略也可以包括安全能力优先级列表,例如,移动性管理实体确定终端设备和自身都支持的安全算法,然后可以选择安全强调最高或者优先级最高的算法作为第二网络的安全算法。Based on the above technical solution, the preset policy may include the security capability of the terminal device, that is, the mobility management entity selects the security algorithm of the second network based on the security capability of the terminal device (such as a security algorithm supported by the terminal device). The preset policy may also include the security capability of the mobility management entity itself, that is, the mobility management entity selects the security algorithm of the second network based on its own security capability (such as a security algorithm supported by the mobility management entity itself). Alternatively, the preset policy may also include a priority list of security capabilities. For example, the mobility management entity determines the security algorithms supported by the terminal device and itself, and then may select the algorithm with the highest security emphasis or the highest priority as the security of the second network. algorithm.

结合第二方面,在第二方面的某些实现方式中,所述第一网络为第三代(3G)/第二代(2G)网络,所述第二网络为第四代(4G)网络,所述第三网络为第五代(5G)网络。With reference to the second aspect, in some implementations of the second aspect, the first network is a third-generation (3G) / second-generation (2G) network, and the second network is a fourth-generation (4G) network The third network is a fifth generation (5G) network.

第三方面,提供了一种切换方法,该方法应用于终端设备从第三网络切换至第一网络之后返回第二网络的场景,该方法包括:终端设备接收第一信息,所述第一信息包括用于指示所述终端设备从第一网络切换到第二网络的指示信息;所述终端设备根据所述第二网络的根密钥和所述第二网络的安全算法推演出所述终端设备在所述第二网络使用的安全密钥,其中,所述第二网络的根密钥是在所述终端设备从所述第三网络切换至所述第一网络时保存的,或,所述第二网络的根密钥是根据所述第三网络的根密钥推演得到的。According to a third aspect, a switching method is provided. The method is applied to a scenario in which a terminal device returns to a second network after switching from a third network to a first network. The method includes: the terminal device receives first information, and the first information Including instruction information for instructing the terminal device to switch from a first network to a second network; the terminal device deducing the terminal device according to a root key of the second network and a security algorithm of the second network A security key used in the second network, wherein the root key of the second network is stored when the terminal device is switched from the third network to the first network, or the The root key of the second network is derived from the root key of the third network.

基于上述技术方案,终端设备从第一网络(如2G/3G网络)向第二网络(如4G网络)切换时,可以充分利用终端设备从第三网络(如5G网络)切换到第一网络过程中保存的第二网络的根密钥,或者根据第三网络的根密钥推演出第二网络的根密钥。继而终端设备根据该第二网络的根密钥和安全算法,推演出第二网络的安全密钥,避免了从第一网络切换到第二网络时建立重鉴权流程带来的时延,并提高了用户体验。Based on the above technical solution, when a terminal device switches from a first network (such as a 2G / 3G network) to a second network (such as a 4G network), the terminal device can make full use of the process of switching from a third network (such as a 5G network) to the first network. The root key of the second network stored in the or derived from the root key of the third network. Then the terminal device derives the security key of the second network based on the root key and the security algorithm of the second network, avoiding the delay caused by the re-authentication process when switching from the first network to the second network, and Improved user experience.

结合第三方面,在第三方面的某些实现方式中,所述第二网络的安全算法是移动性管理实体在所述终端设备从所述第三网络切换至所述第一网络的过程中选择的;所述终端设备接收第一信息之前,包括:所述终端设备接收并保存来自所述移动性管理实体的所述第二网络的安全算法。With reference to the third aspect, in some implementations of the third aspect, the security algorithm of the second network is a mobility management entity in a process in which the terminal device switches from the third network to the first network Selected; before the terminal device receives the first information, the method includes: the terminal device receives and saves a security algorithm of the second network from the mobility management entity.

基于上述技术方案,终端设备在从第三网络(如5G网络)切换至第一网络(如2G/3G网络)的过程中,获取并保存来自移动性管理实体的第二网络(如4G网络)的安全算法,从而终端设备在从第一网络切换至第二网络的过程中,可以直接使用保存的第二网络的安全算法,进而可以进一步降低时延,提高用户体验。Based on the above technical solution, the terminal device acquires and saves the second network (such as the 4G network) from the mobility management entity during the process of switching from the third network (such as the 5G network) to the first network (such as the 2G / 3G network). Security algorithm, so that during the process of switching from the first network to the second network, the terminal device can directly use the saved security algorithm of the second network, which can further reduce latency and improve user experience.

结合第三方面,在第三方面的某些实现方式中,所述第一信息中包括所述第二网络的安全算法。With reference to the third aspect, in some implementation manners of the third aspect, the first information includes a security algorithm of the second network.

基于上述技术方案,当指示终端设备从第一网络(如2G/3G网络)切换到第二网络(如 4G网络)时,将第二网络的安全算法也发送至终端设备,进而可以使得终端设备根据第二网络的根密钥和第二网络的安全算法推演出第二网络的安全密钥。Based on the above technical solution, when the terminal device is instructed to switch from the first network (such as a 2G / 3G network) to the second network (such as a 4G network), the security algorithm of the second network is also sent to the terminal device, so that the terminal device can be made The security key of the second network is derived from the root key of the second network and the security algorithm of the second network.

结合第三方面,在第三方面的某些实现方式中,所述第一网络为第三代3G/第二代2G网络,所述第二网络为第四代4G网络,所述第三网络为第五代5G网络。With reference to the third aspect, in some implementations of the third aspect, the first network is a third-generation 3G / second-generation 2G network, the second network is a fourth-generation 4G network, and the third network For the fifth generation 5G network.

第四方面,提供了一种切换方法,该方法应用于终端设备从第三网络切换至第一网络之后返回第二网络的场景,该方法包括:移动性管理实体接收来自接入和移动管理网元的第一信息和所述第二网络的根密钥,其中,所述第二网络的根密钥用于推演所述终端设备在第一网络使用的安全密钥,所述第一信息用于指示所述终端设备从第三网络切换至所述第一网络;所述移动性管理实体选择并保存所述第二网络的安全算法;所述移动性管理实体向所述终端设备发送所述第二网络的安全算法。According to a fourth aspect, a handover method is provided. The method is applied to a scenario in which a terminal device returns to a second network after switching from a third network to a first network. The method includes: a mobility management entity receives a request from an access and mobility management network. Meta-first information and a root key of the second network, wherein the root key of the second network is used to derive a security key used by the terminal device on the first network, and the first information is used Instructing the terminal device to switch from a third network to the first network; the mobility management entity selects and saves a security algorithm of the second network; the mobility management entity sends the terminal device to the terminal device Security algorithm for the second network.

基于上述技术特征,终端设备从第三网络(如5G网络)向第一网络(如2G/3G网络)切换时,移动性管理实体可以基于预设的策略选择并保存第二网络(如4G网络)的安全算法,并将该第二网络的安全算法发送至终端设备。这样,终端设备需要从第一网络切换至第二网络时可以直接使用该第二网络的安全算法,降低了切换带来的时延,提高了用户体验。Based on the above technical characteristics, when a terminal device switches from a third network (such as a 5G network) to a first network (such as a 2G / 3G network), the mobility management entity may select and save a second network (such as a 4G network) based on a preset policy. ), And send the security algorithm of the second network to the terminal device. In this way, when the terminal device needs to switch from the first network to the second network, the security algorithm of the second network can be directly used, which reduces the delay caused by the switching and improves the user experience.

结合第四方面,在第四方面的某些实现方式中,所述第一信息包括单射频语音呼叫连续性SRVCC切换指示信息,所述移动性管理实体根据所述SRVCC切换指示信息,确定保存所述第二网络的根密钥。With reference to the fourth aspect, in some implementation manners of the fourth aspect, the first information includes single radio frequency voice call continuity SRVCC handover instruction information, and the mobility management entity determines to save the information according to the SRVCC handover instruction information. Describe the root key of the second network.

基于上述技术特征,终端设备需要从第一网络切换至第二网络时可以直接使用该第二网络的根密钥,可以进一步降低时延。Based on the above technical features, when the terminal device needs to switch from the first network to the second network, it can directly use the root key of the second network, which can further reduce the delay.

结合第四方面,在第四方面的某些实现方式中,所述预设的策略包括以下至少一项因素:所述终端设备的安全能力、所述移动性管理实体的安全能力、业务的安全需求、所述移动性管理实体的安全能力优先级列表。With reference to the fourth aspect, in some implementations of the fourth aspect, the preset policy includes at least one of the following factors: the security capability of the terminal device, the security capability of the mobility management entity, and the security of the service A priority list of requirements, security capabilities of the mobility management entity.

结合第四方面,在第四方面的某些实现方式中,所述第一网络为第三代3G/第二代2G网络,所述第二网络为第四代4G网络,所述第三网络为第五代5G网络。With reference to the fourth aspect, in some implementations of the fourth aspect, the first network is a third-generation 3G / second-generation 2G network, the second network is a fourth-generation 4G network, and the third network For the fifth generation 5G network.

第五方面,提供了一种切换方法,该方法应用于终端设备从第三网络切换至第一网络之后返回第二网络的场景,该方法包括:终端设备从第三网络切换至第一网络的过程中,所述终端设备接收并保存来自移动性管理实体的第二网络的安全算法;所述终端设备接收第一信息,所述第一信息包括用于指示所述终端设备从所述第一网络切换至所述第二网络的指示信息,所述第一信息中还包括所述第二网络的网络标识;所述终端设备根据所述第二网络的安全算法和所述第二网络的根密钥推演出所述终端设备在所述第二网络使用的安全密钥。According to a fifth aspect, a switching method is provided. The method is applied to a scenario in which a terminal device returns to the second network after switching from the third network to the first network. The method includes: switching the terminal device from the third network to the first network. In the process, the terminal device receives and saves a security algorithm of a second network from a mobility management entity; the terminal device receives first information, and the first information includes an instruction for instructing the terminal device from the first Instruction information for a network switch to the second network, the first information further including a network identifier of the second network; the terminal device according to a security algorithm of the second network and a root of the second network The key derives a security key used by the terminal device in the second network.

基于上述技术特征,终端设备从第三网络(如5G网络)向第一网络(如2G/3G网络)切换时,移动性管理实体可以选择并保存第二网络(如4G网络)的安全算法,并将该第二网络的安全算法发送至终端设备。这样,终端设备需要从第一网络切换至第二网络时可以直接使用该第二网络的安全算法,降低了切换带来的时延,提高了用户体验。Based on the above technical characteristics, when a terminal device switches from a third network (such as a 5G network) to a first network (such as a 2G / 3G network), the mobility management entity may select and save a security algorithm of the second network (such as a 4G network) And sending the security algorithm of the second network to the terminal device. In this way, when the terminal device needs to switch from the first network to the second network, the security algorithm of the second network can be directly used, which reduces the delay caused by the switching and improves the user experience.

结合第五方面,在第五方面的某些实现方式中,所述第二网络的根密钥是在所述终端设备从第三网络切换至第一网络的过程中保存的。With reference to the fifth aspect, in some implementation manners of the fifth aspect, the root key of the second network is stored during a process in which the terminal device switches from the third network to the first network.

基于上述技术特征,终端设备需要从第一网络切换至第二网络时可以直接使用该第二 网络的根密钥,可以进一步降低时延。Based on the above technical characteristics, when the terminal device needs to switch from the first network to the second network, it can directly use the root key of the second network, which can further reduce the delay.

结合第五方面,在第五方面的某些实现方式中,所述终端设备根据所述第二网络的安全算法和所述第二网络的根密钥推演出所述终端设备在所述第二网络使用的安全密钥之前,包括:所述终端设备根据所述第三网络的根密钥,推演出所述第二网络的根密钥。With reference to the fifth aspect, in some implementation manners of the fifth aspect, the terminal device derives that the terminal device is in the second network according to a security algorithm of the second network and a root key of the second network. Before the security key used by the network, the terminal device derives a root key of the second network according to the root key of the third network.

基于上述技术特征,终端设备需要从第一网络切换至第二网络时可以使用保存的第一网络的根密钥推演出第二网络的根密钥,然后再利用该第二网络的根密钥和第二网络的安全算法推演出第二网络的安全密钥,进而避免重鉴权,提高用户体验。Based on the above technical characteristics, when the terminal device needs to switch from the first network to the second network, it can use the saved root key of the first network to derive the root key of the second network, and then use the root key of the second network. And the security algorithm of the second network deduces the security key of the second network, thereby avoiding re-authentication and improving the user experience.

结合第五方面,在第五方面的某些实现方式中,所述第一网络为第三代3G/第二代2G网络,所述第二网络为第四代4G网络,所述第三网络为第五代5G网络With reference to the fifth aspect, in some implementations of the fifth aspect, the first network is a third-generation 3G / second-generation 2G network, the second network is a fourth-generation 4G network, and the third network For the fifth generation 5G network

第六方面,提供了一种切换方法,该方法应用于终端设备从第三网络切换至第一网络之后返回第二网络的场景,该方法包括:终端设备接收第一信息,所述第一信息包括用于指示所述终端设备从第一网络切换至第二网络的指示信息,所述第一信息中还包括所述第二网络的网络标识和所述第二网络的安全算法;所述终端设备根据所述第二网络的安全算法和所述第二网络的根密钥推演出所述终端设备在所述第二网络使用的安全密钥。According to a sixth aspect, a switching method is provided. The method is applied to a scenario in which a terminal device returns to a second network after switching from a third network to a first network. The method includes: the terminal device receives first information, and the first information Including instruction information for instructing the terminal device to switch from a first network to a second network, and the first information further includes a network identifier of the second network and a security algorithm of the second network; the terminal The device derives a security key used by the terminal device on the second network according to a security algorithm of the second network and a root key of the second network.

基于上述技术特征,终端设备需要从第一网络(如4G网络)向第二网络(如4G网络)切换时,无线网络子系统向终端设备发送第一信息(如无线资源控制RRC释放信息),指示终端设备从第一网络切换至第二网络。该第一信息中还携带第二网络的安全算法,这样终端设备可以直接使用该第二网络的安全算法,从而进一步推演出第二网络的安全密钥,降低了切换时延,提高了用户体验。Based on the above technical characteristics, when a terminal device needs to switch from a first network (such as a 4G network) to a second network (such as a 4G network), the wireless network subsystem sends the first information (such as radio resource control RRC release information) to the terminal device, Instruct the terminal device to switch from the first network to the second network. The first information also carries the security algorithm of the second network, so that the terminal device can directly use the security algorithm of the second network, thereby further deriving the security key of the second network, reducing the handover delay and improving the user experience. .

结合第六方面,在第六方面的某些实现方式中,所述第二网络的根密钥是在所述终端设备从第三网络切换至第一网络的过程中保存的。With reference to the sixth aspect, in some implementation manners of the sixth aspect, the root key of the second network is stored during a process in which the terminal device switches from the third network to the first network.

基于上述技术特征,终端设备从第一网络向第二网络切换时,可以直接使用保存的第二网络的根密钥,从而可以进一步降低时延。Based on the above technical features, when the terminal device switches from the first network to the second network, it can directly use the saved root key of the second network, thereby further reducing the delay.

结合第六方面,在第六方面的某些实现方式中,所述终端设备根据所述第二网络的安全算法和所述第二网络的根密钥推演出所述终端设备在所述第二网络使用的安全密钥之前,包括:所述终端设备根据所述第三网络的根密钥,推演出所述第二网络的根密钥。With reference to the sixth aspect, in some implementation manners of the sixth aspect, the terminal device derives that the terminal device is in the second network according to a security algorithm of the second network and a root key of the second network. Before the security key used by the network, the terminal device derives a root key of the second network according to the root key of the third network.

基于上述技术特征,终端设备需要从第一网络切换至第二网络时可以使用保存的第一网络的根密钥推演出第二网络的根密钥,然后再利用该第二网络的根密钥和第二网络的安全算法推演出第二网络的安全密钥,进而避免重鉴权,提高用户体验。Based on the above technical characteristics, when the terminal device needs to switch from the first network to the second network, it can use the saved root key of the first network to derive the root key of the second network, and then use the root key of the second network. And the security algorithm of the second network deduces the security key of the second network, thereby avoiding re-authentication and improving the user experience.

结合第六方面,在第六方面的某些实现方式中,所述第二网络的安全算法是移动性管理实体在所述终端设备从第三网络切换至第一网络的过程中选择的。With reference to the sixth aspect, in some implementation manners of the sixth aspect, the security algorithm of the second network is selected by a mobility management entity during a handover of the terminal device from the third network to the first network.

结合第六方面,在第六方面的某些实现方式中,所述第一网络为第三代3G/第二代2G网络,所述第二网络为第四代4G网络,所述第三网络为第五代5G网络。With reference to the sixth aspect, in some implementations of the sixth aspect, the first network is a third-generation 3G / second-generation 2G network, the second network is a fourth-generation 4G network, and the third network For the fifth generation 5G network.

第七方面,提供了一种切换方法,该方法应用于终端设备从第三网络切换至第一网络之后返回第二网络的场景,该方法包括:移动性管理实体接收来自接入和移动管理网元的第一信息和第二网络的根密钥,其中,所述第二网络的根密钥用于推演所述终端设备在第一网络使用的安全密钥,所述第一信息用于指示所述终端设备从第三网络切换至所述第一网络;所述移动性管理实体根据预设的策略选择并保存所述第二网络的安全算法;所述移动性管理实体向所述第一网络中移动交换中心发送所述第二网络的安全算法。According to a seventh aspect, a handover method is provided. The method is applied to a scenario in which a terminal device returns to a second network after switching from a third network to a first network, and the method includes: a mobility management entity receives a request from an access and mobility management network; The first information of the meta and the root key of the second network, wherein the root key of the second network is used to derive a security key used by the terminal device on the first network, and the first information is used to indicate The terminal device switches from a third network to the first network; the mobility management entity selects and saves a security algorithm of the second network according to a preset policy; the mobility management entity reports to the first network The mobile switching center in the network sends the security algorithm of the second network.

基于上述技术特征,终端设备从第三网络(如5G网络)向第一网络(如2G/3G网络)切换时,移动性管理实体可以选择并保存第二网络(如4G网络)的安全算法,并将该第二网络的安全算法发送至移动交换中心。这样,终端设备需要从第一网络切换至第二网络时,移动交换中心可以将该第二网络的安全算法发给终端设备,使得终端设备可以直接使用该第二网络的安全算法,降低了切换带来的时延,提高了用户体验。Based on the above technical characteristics, when a terminal device switches from a third network (such as a 5G network) to a first network (such as a 2G / 3G network), the mobility management entity may select and save a security algorithm of the second network (such as a 4G network). The security algorithm of the second network is sent to the mobile switching center. In this way, when the terminal device needs to switch from the first network to the second network, the mobile switching center can send the security algorithm of the second network to the terminal device, so that the terminal device can directly use the security algorithm of the second network, which reduces the handover. The resulting delay improves the user experience.

结合第七方面,在第七方面的某些实现方式中,所述移动性管理实体选择并保存所述第二网络的安全算法之前,包括:所述移动性管理实体接收来自所述第一网络中移动交换中心的请求信息,所述请求信息用于请求所述第二网络的安全算法。With reference to the seventh aspect, in some implementation manners of the seventh aspect, before the mobility management entity selects and saves the security algorithm of the second network, the method includes: the mobility management entity receiving the security algorithm from the first network Request information of the China Mobile Switching Center, the request information is used to request a security algorithm of the second network.

基于上述技术特征,终端设备需要从第一网络切换至第二网络时,移动交换中心向移动性管理实体请求第二网络的安全算法,可以进一步避免资源的浪费。Based on the above technical characteristics, when the terminal device needs to switch from the first network to the second network, the mobile switching center requests the mobility management entity for the security algorithm of the second network, which can further avoid waste of resources.

结合第七方面,在第七方面的某些实现方式中,所述预设的策略包括以下至少一项因素:所述终端设备的安全能力、所述移动性管理实体的安全能力、业务的安全需求、所述移动性管理实体的安全能力优先级列表。With reference to the seventh aspect, in some implementations of the seventh aspect, the preset policy includes at least one of the following factors: the security capability of the terminal device, the security capability of the mobility management entity, and the security of the service A priority list of requirements, security capabilities of the mobility management entity.

结合第七方面,在第七方面的某些实现方式中,所述第一网络为第三代3G/第二代2G网络,所述第二网络为第四代4G网络,所述第三网络为第五代5G网络。With reference to the seventh aspect, in some implementations of the seventh aspect, the first network is a third-generation 3G / second-generation 2G network, the second network is a fourth-generation 4G network, and the third network For the fifth generation 5G network.

第八方面,提供了一种切换方法,该方法应用于终端设备从第三网络切换至第一网络之后返回第二网络的场景,该方法包括:第一网络中移动交换中心接收来自移动性管理实体发送的第二网络的安全算法;所述第一网络中移动交换中心向无线网络子系统发送所述第二网络的安全算法,以便所述终端设备从第一网络切换至所述第二网络时能够获取所述第二网络的安全算法。According to an eighth aspect, a switching method is provided. The method is applied to a scenario in which a terminal device returns to the second network after switching from the third network to the first network. The method includes: receiving, from a mobility management entity, a mobile switching center in the first network The security algorithm of the second network sent; the mobile switching center in the first network sends the security algorithm of the second network to the wireless network subsystem, so that the terminal device can switch from the first network to the second network Acquiring a security algorithm of the second network.

基于上述技术特征,当终端设备需要从第一网络切换至第二网络时,可以直接从无线网络子系统获取第二网络的安全算法。该第二网络的安全算法可以是移动性管理实体提前发送给移动交换中心的。Based on the above technical features, when the terminal device needs to switch from the first network to the second network, the security algorithm of the second network can be obtained directly from the wireless network subsystem. The security algorithm of the second network may be sent by the mobility management entity to the mobile switching center in advance.

结合第八方面,在第八方面的某些实现方式中,所述第一网络中移动交换中心接收来自移动性管理实体发送的第二网络的安全算法之前,包括:所述第一网络中移动交换中心接收来自所述无线网络子系统发送的通知信息,所述通知信息用于通知所述移动交换中心向所述移动性管理实体请求所述第二网络的安全算法。With reference to the eighth aspect, in some implementations of the eighth aspect, before the mobile switching center in the first network receives the security algorithm from the second network sent by a mobility management entity, the method includes: the mobile switching center in the first network Receiving notification information sent from the wireless network subsystem, where the notification information is used to notify the mobile switching center to request the mobility management entity for a security algorithm of the second network.

基于上述技术特征,当终端设备需要从第一网络切换至第二网络时,无线网络子系统可以通知移动交换中心向移动性管理实体请求第二网络的安全算法。Based on the above technical characteristics, when the terminal device needs to switch from the first network to the second network, the wireless network subsystem may notify the mobile switching center to request a mobility management entity for a security algorithm of the second network.

结合第八方面,在第八方面的某些实现方式中,所述第一网络为第三代3G/第二代2G网络,所述第二网络为第四代4G网络。With reference to the eighth aspect, in some implementations of the eighth aspect, the first network is a third-generation 3G / second-generation 2G network, and the second network is a fourth-generation 4G network.

第九方面,提供了一种切换方法,该方法应用于终端设备从第三网络切换至第一网络之后返回第二网络的场景,该方法包括:无线网络子系统接收来自第一网络中移动交换中心的第二网络的安全算法;所述无线网络子系统向终端设备发送所述第二网络的安全算法,以便所述终端设备根据所述第二网络的安全算法和所述第二网络的根密钥推演出所述第二网络的安全密钥。In a ninth aspect, a switching method is provided. The method is applied to a scenario in which a terminal device returns to a second network after switching from the third network to the first network. The method includes: the wireless network subsystem receives a mobile switching center from the first network. The security algorithm of the second network; the wireless network subsystem sends the security algorithm of the second network to the terminal device, so that the terminal device according to the security algorithm of the second network and the root secret of the second network The key derives the security key of the second network.

基于上述技术特征,当终端设备需要从第一网络切换至第二网络时,可以直接从无线网络子系统获取第二网络的安全算法。该第二网络的安全算法可以是移动性管理实体提前发送给移动交换中心的。Based on the above technical features, when the terminal device needs to switch from the first network to the second network, the security algorithm of the second network can be obtained directly from the wireless network subsystem. The security algorithm of the second network may be sent by the mobility management entity to the mobile switching center in advance.

结合第九方面,在第九方面的某些实现方式中,所述第二网络的安全算法是所述第一网络中移动性管理实体在所述终端设备从第三网络切换至所述第一网络的过程中选择的。With reference to the ninth aspect, in some implementations of the ninth aspect, the security algorithm of the second network is that the mobility management entity in the first network switches from the third network to the first network on the terminal device. The process of choosing.

基于上述技术特征,移动性管理实体可以在终端设备从第三网络切换至第一网络的过程中选择并保存第二网络的安全算法,这样当终端设备需要从第一网络切换至第二网络时,可以直接从无线网络子系统获取第二网络的安全算法。Based on the above technical characteristics, the mobility management entity may select and save the security algorithm of the second network during the process of the terminal device switching from the third network to the first network, so that when the terminal device needs to switch from the first network to the second network , The security algorithm of the second network can be obtained directly from the wireless network subsystem.

结合第九方面,在第九方面的某些实现方式中,所述第一网络为第三代3G/第二代2G网络,所述第二网络为第四代4G网络,所述第三网络为第五代5G网络。With reference to the ninth aspect, in some implementations of the ninth aspect, the first network is a third-generation 3G / second-generation 2G network, the second network is a fourth-generation 4G network, and the third network For the fifth generation 5G network.

第十方面,提供了一种切换装置,包括用于执行上述第一至第九方面中任一种可能实现方式中的方法的各个模块或单元。According to a tenth aspect, a switching device is provided, including each module or unit for performing the method in any one of the possible implementation manners of the first to ninth aspects.

第十一方面,提供了一种切换设备,包括处理器。该处理器与存储器耦合,可用于执行存储器中的指令,以实现上述第一至第九方面中任一种可能实现方式中的方法。可选地,该切换设备还包括存储器。可选地,该切换设备还包括通信接口,处理器与通信接口耦合。According to an eleventh aspect, a switching device is provided, including a processor. The processor is coupled to the memory and can be used to execute instructions in the memory to implement the method in any one of the possible implementation manners of the first to ninth aspects described above. Optionally, the switching device further includes a memory. Optionally, the switching device further includes a communication interface, and the processor is coupled to the communication interface.

在一种实现方式中,该切换设备为通信设备,如本申请实施例中的终端设备、移动性接入实体、接入和移动管理网元、移动交换中心、无线网络子系统网元。当该切换设备为通信设备时,所述通信接口可以是收发器,或,输入/输出接口。In an implementation manner, the switching device is a communication device, such as a terminal device, a mobility access entity, an access and mobility management network element, a mobile switching center, and a wireless network subsystem network element in the embodiments of the present application. When the switching device is a communication device, the communication interface may be a transceiver, or an input / output interface.

在另一种实现方式中,该切换设备为配置于通信设备中的芯片,如配置于如本申请实施例中的终端设备、移动性接入实体、接入和移动管理网元、移动交换中心、无线网络子系统网元中的芯片。当该切换设备为配置于通信设备中的芯片时,所述通信接口可以是输入/输出接口。In another implementation manner, the switching device is a chip configured in a communication device, such as a terminal device, a mobility access entity, an access and mobility management network element, and a mobile switching center configured in the embodiments of the present application. The chip in the network element of the wireless network subsystem. When the switching device is a chip configured in a communication device, the communication interface may be an input / output interface.

可选地,所述收发器可以为收发电路。可选地,所述输入/输出接口可以为输入/输出电路。Optionally, the transceiver may be a transceiver circuit. Optionally, the input / output interface may be an input / output circuit.

第十二方面,提供了一种处理器,包括:输入电路、输出电路和处理电路。所述处理电路用于通过所述输入电路接收信号,并通过所述输出电路发射信号,使得所述处理器执行上述第一至第九方面任一种可能实现方式中的方法。In a twelfth aspect, a processor is provided, including: an input circuit, an output circuit, and a processing circuit. The processing circuit is configured to receive a signal through the input circuit and transmit a signal through the output circuit, so that the processor executes the method in any one of the possible implementation manners of the first to ninth aspects described above.

在具体实现过程中,上述处理器可以为芯片,输入电路可以为输入管脚,输出电路可以为输出管脚,处理电路可以为晶体管、门电路、触发器和各种逻辑电路等。输入电路所接收的输入的信号可以是由例如但不限于接收器接收并输入的,输出电路所输出的信号可以是例如但不限于输出给发射器并由发射器发射的,且输入电路和输出电路可以是同一电路,该电路在不同的时刻分别用作输入电路和输出电路。本申请实施例对处理器及各种电路的具体实现方式不做限定。In a specific implementation process, the processor may be a chip, the input circuit may be an input pin, the output circuit may be an output pin, and the processing circuit may be a transistor, a gate circuit, a flip-flop, and various logic circuits. An input signal received by the input circuit may be received and input by, for example, but not limited to, a receiver, and a signal output by the output circuit may be, for example, but not limited to, output to a transmitter and transmitted by the transmitter, and the input circuit and output The circuits may be the same circuit, which are used as input circuits and output circuits respectively at different times. The embodiments of the present application do not limit specific implementations of the processor and various circuits.

第十三方面,提供了一种处理装置,包括处理器和存储器。该处理器用于读取存储器中存储的指令,并可通过接收器接收信号,通过发射器发射信号,以执行上述第一至第九方面任一种可能实现方式中的方法。In a thirteenth aspect, a processing device is provided, including a processor and a memory. The processor is used to read instructions stored in the memory, and can receive signals through a receiver and transmit signals through a transmitter to execute the method in any one of the possible implementation manners of the first to ninth aspects described above.

可选地,所述处理器为一个或多个,所述存储器为一个或多个。Optionally, there are one or more processors, and one or more memories.

可选地,所述存储器可以与所述处理器集成在一起,或者所述存储器与处理器分离设置。Optionally, the memory may be integrated with the processor, or the memory is separately provided from the processor.

在具体实现过程中,存储器可以为非瞬时性(non-transitory)存储器,例如只读存储器(read only memory,ROM),其可以与处理器集成在同一块芯片上,也可以分别设置在不同的芯片上,本申请实施例对存储器的类型以及存储器与处理器的设置方式不做限 定。In the specific implementation process, the memory may be a non-transitory memory, such as a read-only memory (ROM), which may be integrated on the same chip as the processor, or may be separately set in different On the chip, the embodiment of the present application does not limit the type of the memory and the way of setting the memory and the processor.

应理解,相关的数据交互过程例如发送指示信息可以为从处理器输出指示信息的过程,接收能力信息可以为处理器接收输入能力信息的过程。具体地,处理输出的数据可以输出给发射器,处理器接收的输入数据可以来自接收器。其中,发射器和接收器可以统称为收发器。It should be understood that the related data interaction process, for example, sending instruction information may be a process of outputting instruction information from a processor, and receiving capability information may be a process of receiving input capability information by a processor. Specifically, the processed output data can be output to the transmitter, and the input data received by the processor can come from the receiver. Among them, the transmitter and the receiver may be collectively referred to as a transceiver.

上述第十三方面中的处理装置可以是一个芯片,该处理器可以通过硬件来实现也可以通过软件来实现,当通过硬件实现时,该处理器可以是逻辑电路、集成电路等;当通过软件来实现时,该处理器可以是一个通用处理器,通过读取存储器中存储的软件代码来实现,该存储器可以集成在处理器中,可以位于该处理器之外,独立存在。The processing device in the thirteenth aspect may be a chip, and the processor may be implemented by hardware or software. When implemented by hardware, the processor may be a logic circuit, an integrated circuit, or the like. When implemented, the processor may be a general-purpose processor, which is implemented by reading software codes stored in a memory. The memory may be integrated in the processor, may be located outside the processor, and exist independently.

第十四方面,提供了一种计算机程序产品,所述计算机程序产品包括:计算机程序(也可以称为代码,或指令),当所述计算机程序被运行时,使得计算机执行上述第一至第九方面中任一种可能实现方式中的方法。According to a fourteenth aspect, a computer program product is provided. The computer program product includes a computer program (also referred to as code or instructions), and when the computer program is executed, causes a computer to execute the foregoing first to first steps. The method in any of the nine possible implementations.

第十五方面,提供了一种计算机可读介质,所述计算机可读介质存储有计算机程序(也可以称为代码,或指令)当其在计算机上运行时,使得计算机执行上述第一至第九方面中任一种可能实现方式中的方法。According to a fifteenth aspect, a computer-readable medium is provided, where the computer-readable medium stores a computer program (also referred to as code, or instructions), which when executed on a computer, causes the computer to execute the first to the first The method in any of the nine possible implementations.

第十六方面,提供了一种通信系统,包括前述的终端设备、移动性接入实体、接入和移动管理网元、移动交换中心以及无线网络子系统网元。In a sixteenth aspect, a communication system is provided, including the foregoing terminal device, a mobility access entity, an access and mobility management network element, a mobile switching center, and a wireless network subsystem network element.

附图说明BRIEF DESCRIPTION OF THE DRAWINGS

图1是适用于本申请实施例提供的切换方法的网络架构的一示意图;FIG. 1 is a schematic diagram of a network architecture applicable to a handover method provided by an embodiment of the present application; FIG.

图2是适用于本申请实施例的终端设备进行SRVCC切换的一示意性流程图;2 is a schematic flowchart of an SRVCC handover performed by a terminal device applicable to an embodiment of the present application;

图3是适用于本申请实施例的终端设备进行SRVCC切换的又一示意性流程图;3 is another schematic flowchart of an SRVCC handover performed by a terminal device applicable to an embodiment of the present application;

图4是根据本申请一实施例提供的切换方法的一示意性流程图;4 is a schematic flowchart of a handover method according to an embodiment of the present application;

图5是根据本申请一实施例提供的切换方法的又一示意性流程图;5 is another schematic flowchart of a handover method according to an embodiment of the present application;

图6是根据本申请又一实施例提供的切换方法的示意性流程图;6 is a schematic flowchart of a handover method according to another embodiment of the present application;

图7是本申请实施例提供的切换装置的示意性框图;7 is a schematic block diagram of a switching device according to an embodiment of the present application;

图8是本申请实施例提供的切换设备的示意性框图。FIG. 8 is a schematic block diagram of a switching device according to an embodiment of the present application.

具体实施方式detailed description

下面将结合附图,对本申请中的技术方案进行描述。The technical solutions in this application will be described below with reference to the drawings.

本申请实施例的技术方案可以应用于各种通信系统,例如:全球移动通信(global system for mobile communications,GSM)系统、码分多址(code division multiple access,CDMA)系统、宽带码分多址(wideband code division multiple access,WCDMA)系统、通用分组无线业务(general packet radio service,GPRS)、长期演进(long term evolution,LTE)系统、LTE频分双工(frequency division duplex,FDD)系统、LTE时分双工(time division duplex,TDD)、通用移动通信系统(universal mobile telecommunication system,UMTS)、全球互联微波接入(worldwide interoperability for microwave access,WiMAX)通信系统、未来的第五代(5th generation,5G)系统或新无线(new radio,NR)等。The technical solutions of the embodiments of the present application can be applied to various communication systems, for example: a global mobile communication (GSM) system, a code division multiple access (CDMA) system, and a broadband code division multiple access (wideband code division multiple access (WCDMA) system, general packet radio service (GPRS), long term evolution (LTE) system, LTE frequency division duplex (FDD) system, LTE Time Division Duplex (TDD), Universal Mobile Telecommunications System (UMTS), Global Interoperability for Microwave Access (WiMAX) communication system, 5th generation in the future, 5G) system or new radio (NR).

应理解,本申请实施例并未对本申请实施例提供的方法的执行主体的具体结构特别限 定,只要能够通过运行记录有本申请实施例的提供的方法的代码的程序,以根据本申请实施例提供的方法进行通信即可,例如,本申请实施例提供的方法的执行主体可以是终端或网络设备,或者,是终端或网络设备中能够调用程序并执行程序的功能模块。It should be understood that the embodiment of the present application does not specifically limit the specific structure of the execution subject of the method provided by the embodiment of the present application, as long as it can run a program that records the code of the method provided by the embodiment of the present application, in accordance with the embodiment of the present application. The provided methods only need to communicate. For example, the method provided by the embodiments of the present application may be a terminal or a network device, or a function module in the terminal or the network device that can call a program and execute the program.

为便于理解本申请实施例,首先结合图1详细说明适用于本申请实施例的应用场景。In order to facilitate understanding of the embodiments of the present application, an application scenario applicable to the embodiments of the present application will be described in detail with reference to FIG. 1 first.

图1是适用于本申请实施例提供的方法的网络架构的示意图。如图所示,网络架构例如可以是非漫游(non-roaming)架构。图1所示的网络架构具体可以包括下列网元:FIG. 1 is a schematic diagram of a network architecture applicable to the method provided by an embodiment of the present application. As shown, the network architecture may be, for example, a non-roaming architecture. The network architecture shown in FIG. 1 may specifically include the following network elements:

1、用户设备(user equipment,UE):可以称终端设备、终端、接入终端、用户单元、用户站、移动站、移动台、远方站、远程终端、移动设备、用户终端、无线通信设备、用户代理或用户装置。UE还可以是蜂窝电话、无绳电话、会话启动协议(session initiation protocol,SIP)电话、无线本地环路(wireless local loop,WLL)站、个人数字助理(personal digital assistant,PDA)、具有无线通信功能的手持设备、计算设备或连接到无线调制解调器的其它处理设备、车载设备、可穿戴设备,未来5G网络中的终端设备或者未来演进的公用陆地移动通信网络(public land mobile network,PLMN)中的终端设备等,还可以是端设备,逻辑实体,智能设备,如手机,智能终端等终端设备,或者物联网(Internet of things,IoT)设备。本申请实施例对此并不限定。1. User equipment (UE): can be called terminal equipment, terminal, access terminal, user unit, user station, mobile station, mobile station, remote station, remote terminal, mobile device, user terminal, wireless communication device, User agent or user device. The UE can also be a cellular phone, a cordless phone, a session initiation protocol (SIP) phone, a wireless local loop (WLL) station, a personal digital assistant (PDA), and a wireless communication function. Handheld devices, computing devices, or other processing devices connected to wireless modems, in-vehicle devices, wearable devices, terminal devices in the future 5G network, or terminals in the future evolved public land mobile network (PLMN) Devices, etc., may also be end devices, logical entities, smart devices such as mobile phones, smart terminals and other terminal devices, or Internet of Things (IoT) devices. This embodiment of the present application is not limited to this.

在本申请实施例中,UE会存储有安全密钥,UE会通过安全密钥来保护与网络设备之间的信令面和用户面数据传输,从而可以保证信令面和用户面数据传输的安全性。In the embodiment of the present application, the UE stores a security key, and the UE uses the security key to protect the signaling plane and user plane data transmission with the network device, so that the signaling plane and user plane data transmission can be guaranteed. safety.

2、接入网(access network,AN):为特定区域的授权用户提供入网功能,并能够根据用户的级别,业务的需求等使用不同质量的传输隧道。接入网络可以为采用不同接入技术的接入网络。目前的无线接入技术有两种类型:第三代合作伙伴计划(3rd Generation Partnership Project,3GPP)接入技术和非第三代合作伙伴计划(non-3GPP)接入技术。其中,3GPP接入技术,例如第三代(3rd generation,3G)系统中采用的无线接入网技术、第四代(4th generation,4G)系统中采用的无线接入网技术、或图1中的下一代无线接入网(next generation radio access network,NG-RAN)技术(如5G系统中采用的无线接入技术)。3GPP接入技术是指符合3GPP标准规范的接入技术,采用3GPP接入技术的接入网络称为无线接入网络(radio access network,RAN)。其中,5G系统中的接入网设备称为下一代基站节点(next generation Node Base station,gNB)。非3GPP接入技术是指不符合3GPP标准规范的接入技术,例如,以wifi中的接入点(access point,AP)为代表的空口技术。2. Access network (AN): Provides network access functions for authorized users in specific areas, and can use different quality transmission tunnels according to user levels and business needs. The access network may be an access network using different access technologies. There are two types of current wireless access technologies: 3rd Generation Partnership Project (3rd Generation Partnership Project) access technology and non-3rd Generation Partnership Project (non-3GPP) access technology. Among them, 3GPP access technologies, such as the radio access network technology used in the 3rd generation (3G) system, the radio access network technology used in the 4th generation (4G) system, or in FIG. 1 Next generation wireless access network (NG-RAN) technology (such as the wireless access technology used in 5G systems). The 3GPP access technology refers to an access technology conforming to the 3GPP standard specification. An access network using the 3GPP access technology is called a radio access network (RAN). Among them, the access network equipment in the 5G system is called a next generation base station (gNB). The non-3GPP access technology refers to an access technology that does not comply with the 3GPP standard specification, for example, an air interface technology represented by an access point (AP) in wifi.

基于无线通信技术实现接入网络功能的接入网可以称为无线接入网(radio access network,RAN)。无线接入网能够管理无线资源,为终端提供接入服务,进而完成控制信号和用户数据在终端和核心网之间的转发。An access network that implements an access network function based on a wireless communication technology may be referred to as a radio access network (radio access network, RAN). The radio access network can manage radio resources, provide access services for the terminal, and then complete the transfer of control signals and user data between the terminal and the core network.

无线接入网例如可以是基站(NodeB)、演进型基站(evolved NodeB,eNB或eNodeB)、5G移动通信系统中的基站(gNB)、未来移动通信系统中的基站或WiFi系统中的AP等,还可以是云无线接入网络(cloud radio access network,CRAN)场景下的无线控制器,或者该接入网设备可以为中继站、接入点、车载设备、可穿戴设备以及未来5G网络中的网络设备或者未来演进的PLMN网络中的网络设备等。本申请的实施例对无线接入网设备所采用的具体技术和具体设备形态不做限定。The radio access network may be, for example, a base station (NodeB), an evolved base station (eNB or eNodeB), a base station (gNB) in a 5G mobile communication system, a base station in a future mobile communication system, or an AP in a WiFi system, It can also be a wireless controller in a cloud radio access network (CRAN) scenario, or the access network device can be a relay station, an access point, a car device, a wearable device, and a network in the future 5G network Equipment or network equipment in a future evolved PLMN network. The embodiment of the present application does not limit the specific technology and specific device form adopted by the wireless access network device.

3、通用移动通信系统(universal mobile telecommunications system,UMTS)陆地无 线接入网(UMTS terrestrial radio access network,UTRAN):如3G接入网。3. Universal mobile telecommunications system (UMTS) terrestrial radio access network (UTRAN): such as 3G access network.

4、全球移动通信系统(global system for mobile communication,GSM)/改进数据率GSM服务(enhanced data rate for GSM evolution,EDGE)陆地无线接入网(GSM/EDGE terrestrial radio access network,GERAN):如2G接入网。4. Global system for mobile communication (GSM) / improved data rate GSM service (enhanced data rate for GSM evolution, EDGE) terrestrial wireless access network (GSM / EDGE terrestrial radio access network, GERAN): such as 2G Access Network.

5、演进的通用移动通信系统(evolved universal terrestrial radio access network,E-UTRAN):如4G接入网。5. Evolved universal mobile communication system (evolved universal terrestrial radio access network, E-UTRAN): such as 4G access network.

6、服务网关(serving gateway,S-GW)实体:可以负责用户面处理,数据包的理由和转发等功能。6. Serving gateway (S-GW) entity: responsible for user plane processing, data packet reasoning and forwarding functions.

7、公共数据网(public data network,PDN)网关(gateway)实体:3GPP和非3GPP网络间的用户面数据链路锚点,可以负责管理3GPP和非3GPP间的数据路由。7. Public data network (PDN) gateway entity: A user plane data link anchor point between 3GPP and non-3GPP networks, which can be responsible for managing data routing between 3GPP and non-3GPP.

8、移动交换中心服务器(mobile switching center server,MSC server):具有呼叫控制和处理功能。本申请实施例中,MSC server指的是支持单一无线语音呼叫连续性(single radio voice call continuity,SRVCC)的增强MSC server(MSC server enhanced for SRVCC)。8. Mobile switching center server (MSC server): has call control and processing functions. In the embodiment of the present application, the MSC server refers to an enhanced MSC server (MSC server for SRVCC) that supports a single wireless voice call continuity (SRVCC).

9、移动性管理实体(mobility management entity,MME):主要负责移动性管理、承载管理、用户的鉴权认证、S-GW和分组数据网络网关(packet data network gateway,P-GW)的选择等功能。9. Mobility management entity (MME): mainly responsible for mobility management, bearer management, user authentication, selection of S-GW and packet data network gateway (P-GW), etc. Features.

10、接入和移动管理功能(access and mobility management function,AMF):主要用于移动性管理和接入管理等,可以用于实现MME实体功能中除会话管理之外的其它功能,例如,合法监听、或接入授权(或鉴权)等功能。在本申请实施例中,可用于实现终端接入和移动管理的功能。10. Access and mobility management function (AMF): mainly used for mobility management and access management, etc., can be used to implement other functions in the MME entity function in addition to session management, for example, legal Monitoring, or access authorization (or authentication) and other functions. In the embodiment of the present application, it can be used to implement functions of terminal access and mobility management.

11、用户平面功能(user plane function,UPF):相当于LTE系统中的P-GW实体,主要负责会话和承载管理、互联网协议(Internet Protocol,IP)地址分配等功能。在本申请实施例中,可用于实现用户面网关的功能。11. User plane function (UPF): Equivalent to the P-GW entity in the LTE system, which is mainly responsible for session and bearer management, Internet Protocol (IP) address allocation, and other functions. In the embodiment of the present application, it can be used to implement the function of the user plane gateway.

12、IP多媒体子系统(IP multimedia subsystem,IMS):基于IP网络提供多媒体业务的通用网络架构。12. IP Multimedia Subsystem (IMS): A general-purpose network architecture that provides multimedia services based on IP networks.

应理解,图1中所示的AMF网元、UPF网元、S-GW实体、P-GW实体,均可以理解为核心网中用于实现不同功能的网元,例如可以按需组合成网络切片。这些核心网网元可以各自独立的设备,也可以集成于同一设备中实现不同的功能,本申请对此不做限定。It should be understood that the AMF network element, UPF network element, S-GW entity, and P-GW entity shown in FIG. 1 can all be understood as network elements used to implement different functions in the core network, for example, they can be combined into a network as required slice. These core network elements may be independent devices or integrated in the same device to implement different functions, which is not limited in this application.

下文中,为便于说明,将用于实现AMF网元记作接入和移动管理网元,将用于实现UPF网元记作用户面网关。应理解,上述命名仅为用于区分不同的功能,并不代表这些网元分别为独立的物理设备,本申请对于上述网元的具体形态不作限定,例如,可以集成在同一个物理设备中,也可以分别是不同的物理设备。此外,上述命名仅为便于区分不同的功能,而不应对本申请构成任何限定,本申请并不排除在5G网络以及未来其它的网络中采用其他命名的可能。例如,在6G网络中,上述各个网元中的部分或全部可以沿用5G中的术语,也可能采用其他名称等。在此进行统一说明,以下不再赘述。In the following, for convenience of explanation, the AMF network element will be referred to as an access and mobility management network element, and the UPF network element will be referred to as a user plane gateway. It should be understood that the above naming is only used to distinguish different functions, and does not mean that these network elements are independent physical devices. This application does not limit the specific form of the above network elements. For example, they can be integrated in the same physical device. It can also be a different physical device. In addition, the above naming is only for the convenience of distinguishing different functions, and should not constitute any limitation on this application. This application does not exclude the possibility of using other naming in 5G networks and other networks in the future. For example, in a 6G network, some or all of the above-mentioned network elements may use the terminology in 5G, or may use other names. The description is unified here, and will not be repeated here.

还应理解,上述应用于本申请实施例的网络架构仅是举例说明的从传统点到点的架构和服务化架构的角度描述的网络架构,适用本申请实施例的网络架构并不局限于此,任何能够实现上述各个网元的功能的网络架构都适用于本申请实施例。It should also be understood that the above-mentioned network architecture applied to the embodiment of the present application is merely an exemplary network architecture described from the perspective of a traditional point-to-point architecture and a service-oriented architecture, and the network architecture applicable to the embodiment of the present application is not limited to this. Any network architecture capable of implementing the functions of the foregoing network elements is applicable to the embodiments of the present application.

LTE承载语音(voice over LTE,VoLTE)是一种网络协议(Internet Protocol,IP)传 输技术,其无需2G/3G网络,完全由4G网络承载语音和数据业务,其给用户带来最直观的感受就是接通等待时间更短,话音质量更高。然而,有LTE网络覆盖并不等同于有VoLTE覆盖,因为VoLTE还需要依靠IMS实现。但是IMS的部署需要一定周期并对现网设备做相应的改造或升级,所以在此过程中存在VoLTE覆盖不理想的情况。因此,如果用户在使用VoLTE打着电话时移动到了只有电路交换(circuit switched,CS)覆盖的区域,通话可能就会中断。Voice over LTE (VoLTE) is a network protocol (IP) transmission technology. It does not require a 2G / 3G network, and is entirely carried by a 4G network for voice and data services. It brings the most intuitive experience to users. That is, the connection waiting time is shorter and the voice quality is higher. However, having LTE network coverage is not the same as having VoLTE coverage, because VoLTE also needs to be implemented by IMS. However, the deployment of IMS requires a certain period of time and the corresponding transformation or upgrade of the existing network equipment is performed. Therefore, VoLTE coverage is not ideal during this process. Therefore, if a user moves to an area covered by circuit switching (CS) while making a call using VoLTE, the call may be interrupted.

为此,3GPP提出的一种VoLTE语音业务连续性方案,即SRVCC。SRVCC主要是为了解决当单射频终端在LTE网络和2G/3G网络之间移动时,如何保证语音呼叫连续性的问题,即保证单射频终端在IMS控制的网络电话(voice over Internet Protocol,VoIP)语音和CS域语音之间的平滑切换。其中,VoIP指的是将处于模拟信号形式的语音信号数字化后用数据包的形式在IP网络上传输的技术,其优势在于可以广泛采用互联网和全球IP互联的特性提供比传统业务更好的服务。CS指的是在通话前为双方分配一条固定的通道,在整个通话过程中一直占用这条“专用”通道,待通话结束后释放以便分配给其他用户的电路交换技术。VoIP语音与CS域语音相比,由于共享传输通道大大提升了资源的利用率,不过也可能会带来处理开销和时延。To this end, 3GPP proposed a VoLTE voice service continuity solution, namely SRVCC. SRVCC is mainly to solve the problem of how to ensure the continuity of voice calls when a single radio terminal moves between LTE network and 2G / 3G network, that is, to ensure that a single radio terminal is controlled by IMS-controlled Internet Protocol (VoIP) Smooth switching between voice and CS domain voice. Among them, VoIP refers to the technology of digitizing voice signals in the form of analog signals and transmitting them on IP networks in the form of data packets. Its advantage is that it can widely use the characteristics of the Internet and global IP interconnection to provide better services than traditional services. . CS refers to the circuit switching technology that allocates a fixed channel for both parties before a call, and occupies this "dedicated" channel during the entire call, and releases it after the call for distribution to other users. Compared with CS domain voice, VoIP voice greatly improves resource utilization due to shared transmission channels, but it may also cause processing overhead and delay.

为了便于理解本申请实施例,下面结合图2和图3简单说明SRVCC的主要流程。In order to facilitate understanding of the embodiments of the present application, the main process of SRVCC is briefly described below with reference to FIG. 2 and FIG. 3.

图2示出了终端进行SRVCC切换的一示意性流程图。如图2所示,包括步骤110-步骤180。FIG. 2 shows a schematic flowchart of SRVCC handover performed by a terminal. As shown in FIG. 2, steps 110 to 180 are included.

在步骤110中,基站向移动性管理实体发送切换请求(handover required)消息。基站根据终端上报的测量报告决定发起SRVCC切换时,基站向移动性管理实体发送切换请求消息。该切换请求消息中携带SRVCC切换(handover,HO)指示(SRVCC HO indication)。该SRVCC切换指示用于指示接下来执行的过程是SRVCC切换。In step 110, the base station sends a handover request message to the mobility management entity. When the base station decides to initiate the SRVCC handover according to the measurement report reported by the terminal, the base station sends a handover request message to the mobility management entity. The handover request message carries an SRVCC handover (HO) indication (SRVCC HO indication). The SRVCC handover instruction is used to indicate that the process to be performed next is SRVCC handover.

在步骤120中,移动性管理实体接收到基站发来的切换请求消息后,使用当前的终端安全上下文中的根密钥Kasme推演出CS域语音需要使用的加密密钥(cipher key,CK)和完整性密钥(integrity key,IK),并将标识密钥Kasme的密钥集标识符(key set identifier in E-UTRAN,eKSI)映射为标记CK||IK的密钥集标识符(key set identifier,KSI)。可选的,其中,eKSI和KSI两者值(value)部分相同,类型不同。In step 120, after receiving the handover request message from the base station, the mobility management entity uses the root key Kasme in the current terminal security context to derive the encryption key (cipher key, CK) required for CS domain voice and Integrity key (integrity key, IK), and map the key set identifier (key set identifier, E-UTRAN, eKSI) identifying the key Kasme to the key set identifier (key set identifier, KSI). Optionally, the values of the eKSI and the KSI are the same and the types are different.

在步骤130中,移动性管理实体向移动交换中心服务器发送PS到CS的切换请求(PS to CS HO request)消息。其中包含在步骤120中推演出的CK||IK和KSI。In step 130, the mobility management entity sends a PS-to-CS HO request message to the mobile switching center server. This includes the CK || IK and KSI deduced in step 120.

在步骤140中,移动交换中心服务器向移动性管理实体发送PS到CS的切换响应(PS to CS HO response)消息。其中包含了KSI。In step 140, the mobile switching center server sends a PS-to-CS HO response message to the mobility management entity. It contains KSI.

在步骤150中,移动性管理实体向终端发送切换命令(HO command)消息。其中包含了KSI。In step 150, the mobility management entity sends a HO command message to the terminal. It contains KSI.

在步骤160中,基站向终端发送切换命令消息,其中包含了KSI。其中,向终端发送KSI,目的是通知终端本条消息是使用哪个密钥进行保护的。In step 160, the base station sends a handover command message to the terminal, which includes a KSI. The KSI is sent to the terminal to inform the terminal which key is used for protection of this message.

在步骤170中,终端收到切换命令消息后,利用Kasme推演CK||IK,并将eKSI映射为KSI。In step 170, after receiving the handover command message, the terminal uses Kasme to derive CK || IK and maps the eKSI to KSI.

在步骤180中,终端切换到UTRAN,如终端切换到3G/2G网络。In step 180, the terminal switches to UTRAN, such as the terminal switches to a 3G / 2G network.

终端切换到3G/2G网络后,步骤170中得到的KSI可用于终端和网络之间对密钥的 识别和检索,步骤170中得到的CK||IK可用于保护终端与网络之间的信令面和用户面数据传输。After the terminal switches to the 3G / 2G network, the KSI obtained in step 170 can be used to identify and retrieve the key between the terminal and the network. The CK || IK obtained in step 170 can be used to protect the signaling between the terminal and the network. Plane and user plane data transmission.

需要说明的是,移动性管理实体和终端将eKSI映射为KSI是分别执行的,具体映射操作为保持eKSI和KSI值部分相同,而类型部分可以区分是原生(native)安全上下文还是映射(mapped)安全上下文。It should be noted that the mapping of eKSI to KSI by the mobility management entity and the terminal is performed separately. The specific mapping operation is to keep the eKSI and KSI value part the same, and the type part can distinguish whether it is a native security context or mapped. Security context.

从图2可知,在SRVCC切换过程中,移动性管理实体可以先推演3G/2G网络的密钥信息,再将推演的3G/2G网络的密钥信息发送至移动交换中心服务器。It can be known from FIG. 2 that during the SRVCC handover process, the mobility management entity can first derive the key information of the 3G / 2G network, and then send the deduced key information of the 3G / 2G network to the mobile switching center server.

在下一代通信网络,也需要考虑通话不被间断的问题。以5G通信网络为例,新空口承载语音(voice over new radio,VoNR)是使用5G新空口承载语音的技术。在5G网络部署初期,VoNR的覆盖面临着与VoLTE相同的问题,即如果使用VoNR进行通话的用户移动到了只有CS覆盖区域的话,同样需要确保通话不被间断。因此标准上定义了一种新的5G SRVCC,用来解决5G与3G间的切换。In next-generation communication networks, the problem of uninterrupted calls also needs to be considered. Taking a 5G communication network as an example, a new air interface (VONR) is a technology that uses a 5G new air interface to carry voice. In the initial stage of 5G network deployment, VoNR coverage faces the same problem as VoLTE, that is, if users who use VoNR to make a call move to a CS-only coverage area, they also need to ensure that the call is not interrupted. Therefore, a new 5G SRVCC is defined in the standard to solve the handover between 5G and 3G.

图3示出了终端设备进行5G SRVCC切换的一示意性流程图。由于接入和移动管理网元与移动交换中心服务器之间没有直接接口,因此5G SRVCC采用移动性管理实体中继的方式进行。其中,移动性管理实体与移动交换中心服务器的交互与图2中的过程相似,只是增加了接入和移动管理网元与移动性管理实体间的交互。如图3所示,包括步骤201-步骤211。FIG. 3 shows a schematic flowchart of 5G SRVCC handover performed by a terminal device. Because there is no direct interface between the access and mobility management network elements and the mobile switching center server, 5G SRVCC uses the mobility management entity relay method. The interaction between the mobility management entity and the mobile switching center server is similar to the process in FIG. 2 except that the interaction between the access and mobility management network element and the mobility management entity is increased. As shown in FIG. 3, steps 201 to 211 are included.

在步骤201中,基站向接入和移动管理网元发送切换请求消息。基站根据终端上报的测量报告决定发起5G SRVCC切换时,基站向接入和移动管理网元发送切换请求消息。该切换请求消息中携带SRVCC切换指示。该SRVCC切换指示用于指示接下来执行的过程是SRVCC切换。In step 201, the base station sends a handover request message to the access and mobility management network element. When the base station decides to initiate a 5G SRVCC handover according to the measurement report reported by the terminal, the base station sends a handover request message to the access and mobility management network element. The handover request message carries an SRVCC handover instruction. The SRVCC handover instruction is used to indicate that the process to be performed next is SRVCC handover.

在步骤202中,接入和移动管理网元接收到基站发来的切换请求消息后,使用密钥Kamf推演出Kasme,并将标识Kamf的密钥集标识符ngKSI映射为标记Kasme的eKSI。In step 202, after receiving the handover request message from the base station, the access and mobility management network element uses the key Kamf to derive Kasme, and maps the key set identifier ngKSI that identifies Kamf to the eKSI labeled Kasme.

在步骤203中,接入和移动管理网元向移动性管理实体发送前传重定位请求(forward relocation request)消息。其中包含步骤202中推演得到的Kasme和eKSI。In step 203, the access and mobility management network element sends a forward relocation request message to the mobility management entity. It includes Kasme and eKSI derived in step 202.

在步骤204中,移动性管理实体接收到接入和移动管理网元发来的前传重定位请求消息后,使用根密钥Kasme推演出CS域语音需要使用的加密和完整性密钥CK||IK,并将标识Kasme的eKSI映射为标记CK||IK的KSI。其中,eKSI和KSI两者值部分相同,类型不同。In step 204, after receiving the forward relocation request message from the access and mobility management network element, the mobility management entity uses the root key Kasme to derive the encryption and integrity key CK required for CS domain voice || IK, and map the eKSI identifying Kasme to the KSI labeled CK || IK. Among them, the values of eKSI and KSI are partially the same, but the types are different.

在步骤205中,移动性管理实体向移动交换中心服务器发送PS到CS的切换请求(PS to CS HO request)消息。其中包含在步骤204中推演出的CK||IK和KSI。In step 205, the mobility management entity sends a PS to CS handover request message to the mobile switching center server. It contains CK || IK and KSI deduced in step 204.

在步骤206中,移动交换中心服务器向移动性管理实体发送PS到CS的切换响应(PS to CS HO response)消息。其中包含了KSI。In step 206, the mobile switching center server sends a PS-to-CS HO response message to the mobility management entity. It contains KSI.

在步骤207中,移动性管理实体向接入和移动管理网元发送前传重定位响应(forward relocation response)消息。其中包含了KSI。In step 207, the mobility management entity sends a forward relocation response message to the access and mobility management network element. It contains KSI.

在步骤208中,接入和移动管理网元向基站发送切换命令消息。其中包含了KSI。In step 208, the access and mobility management network element sends a handover command message to the base station. It contains KSI.

在步骤209中,基站向终端发送切换命令消息,其中包含了KSI。其中,向终端发送KSI,目的是通知终端本条消息是使用哪个密钥进行保护的。In step 209, the base station sends a handover command message to the terminal, which includes a KSI. The KSI is sent to the terminal to inform the terminal which key is used for protection of this message.

在步骤210中,终端收到切换命令消息后推演出CK||IK,并由ngKSI映射出KSI。In step 210, the terminal derives CK || IK after receiving the handover command message, and maps KSI by ngKSI.

终端收到切换命令后,首先使用Kamf推演出Kasme,然后使用Kasme和输入参数推演出CK||IK。其中,输入参数可以是由接入和移动管理网元获取并通知UE,也可以是UE发送的业务请求消息中携带的,如PDU会话标识等。After receiving the switch command, the terminal first uses Kaf to deduce Kasme, and then uses Kasme and input parameters to deduce CK || IK. The input parameters may be obtained by the access and mobility management network element and notified to the UE, or may be carried in a service request message sent by the UE, such as a PDU session identifier.

在步骤211中,终端切换到UTRAN,如终端切换到3G/2G网络。In step 211, the terminal switches to UTRAN, such as the terminal switches to a 3G / 2G network.

终端切换到3G/2G网络后,步骤210中得到的KSI可用于终端和网络之间对密钥的识别和检索,步骤210中得到的CK||IK可用于保护终端与网络之间的信令面和用户面数据传输。After the terminal switches to the 3G / 2G network, the KSI obtained in step 210 can be used to identify and retrieve the key between the terminal and the network. The CK || IK obtained in step 210 can be used to protect the signaling between the terminal and the network. Plane and user plane data transmission.

需要说明的是,与4G到3G的SRVCC类似,ngKSI与KSI在值的部分相同,类型部分可以区分是原生安全上下文还是映射安全上下文。It should be noted that, similar to SRVCC of 4G to 3G, the value part of ngKSI and KSI is the same, and the type part can distinguish whether it is a native security context or a mapped security context.

从图3可以看出,5G网络中的接入和移动管理网元可以先推演4G网络的根密钥,再将4G网络的根密钥发送至4G网络中的移动性管理实体。移动性管理实体再基于上述根密钥推演3G网络系统的密钥信息(如CK||IK),将推演的3G网络的密钥信息发送至移动交换中心服务器。It can be seen from FIG. 3 that the access and mobility management network elements in the 5G network can first derive the root key of the 4G network, and then send the root key of the 4G network to the mobility management entity in the 4G network. The mobility management entity then derives the key information (such as CK || IK) of the 3G network system based on the root key, and sends the deduced key information of the 3G network to the mobile switching center server.

由于3G网络无法胜任5G网络的高速数据传输,如果终端在结束3G网络的语音业务后仍然驻留在3G网络,则会使用户体验受到较大的影响。因此如果此时终端所处位置有4G或5G网络覆盖的话,则应将终端重新返回4G或5G网络。Since the 3G network cannot handle the high-speed data transmission of the 5G network, if the terminal still resides on the 3G network after ending the 3G network's voice service, the user experience will be greatly affected. Therefore, if the terminal is in 4G or 5G network coverage at this time, the terminal should be returned to the 4G or 5G network.

一种可能的实现方式为,3G网络向终端发送无线资源控制(radio resource control,RRC)释放(release)消息,其中携带了4G或5G的公共陆地移动网络(public land mobile network)标识(identity,ID),用于通知终端返回相应的目标网络。A possible implementation manner is that the 3G network sends a radio resource control (RRC) release message to the terminal, which carries a 4G or 5G public land mobile network (public land mobile network) identity (identity, ID), used to notify the terminal to return the corresponding target network.

如果此时终端所处位置有5G网络覆盖,终端将被指示返回5G网络。此时终端与接入和移动管理网元可以使用发生5G SRVCC流程前的5G安全上下文保护通信。If there is 5G network coverage in the terminal at this time, the terminal will be instructed to return to the 5G network. At this time, the terminal and the access and mobility management network element can use the 5G security context to protect communication before the 5G SRVCC process occurs.

如果此时终端所处位置没有5G网络覆盖,而只有4G网络覆盖,终端将被指示返回4G网络。此时由于终端和移动性管理实体并没有相应的4G安全上下文,因此需要建立完整的重鉴权流程,这样会大大增加时延和空口资源的消耗,且会严重影响终端的用户体验。If the terminal is not covered by 5G network at this time, but only covered by 4G network, the terminal will be instructed to return to the 4G network. At this time, since the terminal and the mobility management entity do not have the corresponding 4G security context, a complete re-authentication process needs to be established, which will greatly increase the delay and the consumption of air interface resources, and will seriously affect the user experience of the terminal.

有鉴于此,本申请提供一种方法,以避免终端在回到4G网络时执行重鉴权,以帮助终端快速返回4G网络,且达到减小时延和空口资源消耗的目的。应理解,本申请提供的方法并不仅限于上述图3所示的场景。例如,终端从5G网络切换到2G/3G网络时,网络设备会先根据5G网络的根密钥推演出4G网络的根密钥,再根据4G网络的根密钥推演出2G/3G网络的安全密钥。那么,当终端需要从2G/3G网络切换到4G网络时,根据本申请提供的方法,也能够避免重鉴权带来的时延。In view of this, this application provides a method to prevent the terminal from performing re-authentication when returning to the 4G network, to help the terminal quickly return to the 4G network, and to achieve the purpose of reducing delay and air interface resource consumption. It should be understood that the method provided in this application is not limited to the scenario shown in FIG. 3 described above. For example, when a terminal switches from a 5G network to a 2G / 3G network, the network device first derives the root key of the 4G network based on the root key of the 5G network, and then derives the security of the 2G / 3G network based on the root key of the 4G network. Key. Then, when the terminal needs to switch from the 2G / 3G network to the 4G network, the method provided in this application can also avoid the delay caused by re-authentication.

为便于理解,在描述本申请实施例之前,首先对本申请涉及的几个术语做简单介绍。In order to facilitate understanding, before describing the embodiments of the present application, a few terms involved in the present application are briefly introduced first.

1、第一密钥Kamf:在终端注册到5G网络的过程中,终端与接入和移动管理网元分别获取到的密钥。Kamf与5G网络中的密钥集标识符(KSI in 5G,ngKSI)相关。在注册过程中,接入和移动管理网元可以随机分配一个ngKSI,并将ngKSI发送至终端。ngKSI用于标识5G网络的根密钥Kamf。例如,接入和移动管理网元在向终端发送的鉴权请求消息和/或鉴权成功消息中携带了上述ngKSI用于标识5G网络的根密钥。因此对于终端以及接入和移动管理网元而言,每个ngKSI可用于唯一地指示一个Kamf。在本申请中,Kamf可用于后续生成根密钥Kasme。1. First key Kamf: The key obtained by the terminal and the access and mobility management network element during the terminal's registration with the 5G network. Kamf is related to a key set identifier (KSI in 5G, ngKSI) in a 5G network. During the registration process, the access and mobility management network element can randomly allocate an ngKSI and send the ngKSI to the terminal. ngKSI is used to identify the root key Kamf of the 5G network. For example, the access request and mobility management network element sends the above-mentioned ngKSI used to identify the root key of the 5G network in the authentication request message and / or the authentication success message sent to the terminal. Therefore, for the terminal and the access and mobility management network elements, each ngKSI can be used to uniquely indicate a Kamf. In this application, Kamf can be used to subsequently generate the root key Kasme.

2、第二密钥Kasme:在终端注册到4G网络的过程中,终端与移动性管理实体分别 获取到的密钥。Kasme与4G中的密钥集标识符(KSI in E-UTRAN,eKSI)相关。在注册过程中,移动性管理实体可以随机分配一个eKSI,并将eKSI发送至终端。eKSI用于标识4G网络的根密钥Kasme。例如,移动性管理实体在向终端发送的鉴权请求消息中携带了上述eKSI用于标识4G网络的根密钥。因此对于终端以及移动性管理实体而言,每个eKSI可用于唯一地指示一个Kasme。Kasme可用于后续生成非接入层(non-access stratum,NAS)密钥和接入层(access stratum,AS)密钥。2. Second key Kasme: The key obtained by the terminal and the mobility management entity during the terminal's registration with the 4G network. Kasme is related to the key set identifier (KSI, E-UTRAN, eKSI) in 4G. During the registration process, the mobility management entity may randomly allocate an eKSI and send the eKSI to the terminal. eKSI is used to identify the root key Kasme of the 4G network. For example, the authentication request message sent by the mobility management entity to the terminal carries the above-mentioned eKSI used to identify the root key of the 4G network. Therefore, for the terminal and the mobility management entity, each eKSI can be used to uniquely indicate a Kasme. Kasme can be used to subsequently generate non-access stratum (NAS) keys and access stratum (AS) keys.

3、eKSI、ngKSI、KSI:密钥集标识符。密钥集标识符可用于终端和网络之间对密钥的识别和检索。eKSI用于标识Kasme,ngKSI用于标识Kamf,KSI可用于标识加密密钥CK+完整性密钥IK。CK和IK可以作为3G网络的密钥信息。3. eKSI, ngKSI, KSI: key set identifier. The key set identifier can be used to identify and retrieve the key between the terminal and the network. eKSI is used to identify Kasme, ngKSI is used to identify Kamf, and KSI can be used to identify the encryption key CK + integrity key IK. CK and IK can be used as key information for 3G networks.

应理解,上文列举的密钥、根密钥、密钥集标识符的名称仅为便于区分而命名,不应对本申请构成任何限定,本申请并不排除采用其他的名称来替代上述中间密钥或根密钥以实现相同或相似功能的可能。It should be understood that the names of the keys, root keys, and key set identifiers listed above are named for easy differentiation only, and should not constitute any limitation on this application, and this application does not exclude the use of other names instead of the above-mentioned intermediate secrets. Key or root key to achieve the same or similar functionality.

4、推演密钥:或者称为密钥推演,指根据输入参数得到密钥。以根据5G网络的根密钥推演4G网络的根密钥为例。4. Derivation key: also known as key deduction, which means that the key is obtained according to the input parameters. Take the derivation of the root key of the 4G network based on the root key of the 5G network as an example.

根据5G网络的根密钥推演4G网络的根密钥的输入参数可以包含以下参数中的一个或者多个:函数代码(Function Code,FC)、上行/下行非接入层计数值、预设值、随机数,5G网络的根密钥可以是Kamf。4G网络的根密钥可以是Kasme。The input parameters for deriving the root key of the 4G network according to the root key of the 5G network may include one or more of the following parameters: Function Code (FC), uplink / downlink non-access layer count value, preset value Random numbers. The root key of the 5G network can be Kamf. The root key of a 4G network can be Kasme.

其中,FC可以理解为在推演密钥信息时使用的推演函数的代码,用于表示使用什么样的函数来推演密钥信息,如,FC可以为5G网络的根密钥推演4G的根密钥使用的函数代码。NAS计数值(count)由序列号和溢出计数器组成,非接入层计数值可以为上行非接入层计数值或者下行非接入层计数值。其中,下行非接入层计数值可以是5G网络的根密钥推演4G网络的根密钥使用的下行非接入层计数值。Kasme可以是终端和网络完成认证后生成的密钥信息。Among them, FC can be understood as the code of the deduction function used in deriving the key information, which is used to indicate what function is used to deduct the key information. For example, the FC can deduct the 4G root key for the root key of the 5G network Function code used. The NAS count (count) consists of a sequence number and an overflow counter. The non-access stratum count can be an uplink non-access stratum count or a downlink non-access stratum count. The downlink non-access layer count value may be a downlink non-access layer count value used by the root key of the 5G network to derive the root key of the 4G network. Kasme can be key information generated after the terminal and the network have completed authentication.

应理解,以上列举的参数仅为示例,不应对本申请构成任何限定。同时,本申请也并不排除采用其他的信息作为用于生成根密钥的参数的可能。It should be understood that the parameters listed above are merely examples, and should not be construed as limiting this application in any way. At the same time, this application does not exclude the possibility of using other information as parameters for generating the root key.

具体的密钥推演,如5G网络的根密钥推演4G网络的根密钥或者4G网络根密钥推演3G安全密钥,可以参考现有标准中的方法,本申请实施例不做限定。Specific key derivation, such as the root key of the 5G network to the root key of the 4G network or the root key of the 4G network to the 3G security key, may refer to the method in the existing standard, which is not limited in the embodiments of the present application.

5、加密:发送端根据加密算法以及加密密钥对明文进行加密以生成密文。若使用对称加密的方法,加密密钥和解密密钥是相同的。接收端可以根据相同的加密算法和加密密钥对密文进行解密。换句话说,发送端和接收端可以基于同一个密钥去加密和解密。5. Encryption: The sender encrypts the plaintext according to the encryption algorithm and encryption key to generate ciphertext. If a symmetric encryption method is used, the encryption key and the decryption key are the same. The receiving end can decrypt the ciphertext according to the same encryption algorithm and encryption key. In other words, the sender and receiver can encrypt and decrypt based on the same key.

6、完整性保护:发送端根据完整性保护算法以及完整性保护密钥对明文或密文进行完整性保护。接收端可以根据相同的完整性保护算法和完整性保护密钥对进行了完整性保护的数据进行完整性验证。6. Integrity protection: The sender performs integrity protection on the plaintext or ciphertext according to the integrity protection algorithm and the integrity protection key. The receiving end can perform integrity verification on the integrity-protected data according to the same integrity protection algorithm and integrity protection key.

7、安全能力:包括但不限于:安全算法、安全参数、密钥等。在本申请实施例中,安全能力例如可以包括UE的安全能力和网络侧设备(如MME或者AMF或者UPF)的安全能力等。7. Security capabilities: including but not limited to: security algorithms, security parameters, keys, etc. In the embodiment of the present application, the security capability may include, for example, the security capability of the UE and the security capability of a network-side device (such as an MME or an AMF or a UPF).

8、安全算法:用于在对数据安全保护时使用的算法。例如可包括:加/解密算法、完整性保护算法等。8. Security algorithm: The algorithm used to protect data security. For example, it can include: encryption / decryption algorithms, integrity protection algorithms, and so on.

9、安全上下文:可以用于实现数据加解密和/或完整性保护的信息。安全上下文例如 可以包括:加/解密密钥、完整性保护密钥、新鲜参数(比如非接入层(non-access stratum,NAS)计数值(count))、ngKSI以及安全算法等。9. Security context: information that can be used to implement data encryption and decryption and / or integrity protection. The security context may include, for example, an encryption / decryption key, an integrity protection key, a fresh parameter (such as a non-access stratum (NAS) count), ngKSI, a security algorithm, and the like.

下面结合附图详细说明本申请实施例提供切换方法。The switching method provided in the embodiments of the present application will be described in detail below with reference to the accompanying drawings.

需要说明的是,在下文中结合附图描述实施例的过程中,图中仅为便于理解而示意,不应对本申请构成任何限定。此外,图4至图6中示出的gNB可对应于基站节点,AMF可对应于接入和移动管理网元,MME可对应于移动性管理实体,MSC server可对应于移动交换中心服务器,RNS可对应于无线网络子系统(radio network subsystem,RNS)网元。各网元名称仅为区分不同的功能而定义,不应对本申请构成任何限定。本申请并不排除定义其他网元来实现相同或相似功能的可能。It should be noted that in the following description of the embodiments with reference to the accompanying drawings, the drawings are only for ease of understanding and should not be construed as limiting the present application in any way. In addition, the gNB shown in FIGS. 4 to 6 may correspond to a base station node, the AMF may correspond to an access and mobility management network element, the MME may correspond to a mobility management entity, the MSC server may correspond to a mobile switching center server, and the RNS It may correspond to a radio network subsystem (RNS) network element. Each network element name is defined only to distinguish different functions, and should not constitute any limitation in this application. This application does not exclude the possibility of defining other network elements to achieve the same or similar functions.

下文的实施例仅为示例,以第一网络为3G网络、第二网络为4G网络、第三网络为5G网络为例详细说明本申请实施例。The following embodiments are merely examples. The first network is a 3G network, the second network is a 4G network, and the third network is a 5G network.

图4是从设备交互的角度示出的本申请一实施例提供的切换方法400的示意性流程图。如图所示,图4中所示的方法400可以包括步骤401至步骤426。下面结合图4详细说明方法400中的各个步骤。FIG. 4 is a schematic flowchart of a handover method 400 according to an embodiment of the present application, which is shown from the perspective of device interaction. As shown, the method 400 shown in FIG. 4 may include steps 401 to 426. Each step in the method 400 is described in detail below with reference to FIG. 4.

在步骤401中,基站向接入和移动管理网元发送切换请求消息。In step 401, the base station sends a handover request message to the access and mobility management network element.

基站可以根据UE上报的测量报告决定发起进行SRVCC切换的请求,或者,基站也可以根据当前负载等因素决定发起进行SRVCC切换的请求。基站向接入和移动管理网元发送切换请求消息。该切换请求消息中携带SRVCC切换指示。该SRVCC切换指示用于指示接下来执行的过程是SRVCC切换。The base station may decide to initiate a request for SRVCC handover according to the measurement report reported by the UE, or the base station may decide to initiate a request for SRVCC handover according to factors such as the current load. The base station sends a handover request message to the access and mobility management network element. The handover request message carries an SRVCC handover instruction. The SRVCC handover instruction is used to indicate that the process to be performed next is SRVCC handover.

在步骤402中,接入和移动管理网元推演出Kasme,并将ngKSI映射为eKSI。In step 402, the access and mobility management network element derives Kasme and maps ngKSI to eKSI.

当UE在5G网络新空口不支持SRVCC到3G网络的CS域时,UE在5G网络进行语音业务,需要将5G网络的语音业务切换至3G网络。如可以通过移动管理实体进行语音业务切换时的信令中转,从而将语音业务由5G网络切换至3G网络,保证语音业务的连续性。When the UE does not support the CS domain from SRVCC to the 3G network on the new air interface of the 5G network, the UE performs voice services on the 5G network and needs to switch the voice services of the 5G network to the 3G network. For example, the signaling transfer during voice service switching can be performed by the mobile management entity, thereby switching the voice service from the 5G network to the 3G network, and ensuring the continuity of the voice service.

接入和移动管理网元可以根据密钥推演参数和当前的安全上下文中的Kamf推演出Kasme。其中,密钥推演参数可以包括如前所述的非接入层计数值,非接入层计数值可以为上行非接入层计数值或者下行非接入层计数值。The access and mobility management network element can derive Kasme based on the key derivation parameters and Kamf in the current security context. The key derivation parameter may include a non-access layer count value as described above, and the non-access layer count value may be an uplink non-access layer count value or a downlink non-access layer count value.

接入和移动管理网元可以使用Kamf和非接入层计数值推演出Kasme,并将标识Kamf的ngKSI映射为标记Kasme的eKSI。The access and mobility management network element may use Kamf and non-access stratum count values to derive Kasme, and map the ngKSI that identifies Kamf to the eKSI that is labeled Kasme.

在步骤403中,接入和移动管理网元向移动性管理实体发送前传重定位请求消息。In step 403, the access and mobility management network element sends a forward relocation request message to the mobility management entity.

该前传重定位请求消息中包含SRVCC切换指示消息和Kasme。移动性管理实体可以基于Kasme推演得到3G网络的密钥。该前传重定位请求消息中还可以包含步骤402中的密钥集标识符eKSI,该eKSI用于标识4G网络的根密钥Kasme。The fronthaul relocation request message includes an SRVCC handover indication message and Kasme. Mobility management entities can derive keys for 3G networks based on Kasme deduction. The fronthaul relocation request message may further include the key set identifier eKSI in step 402, and the eKSI is used to identify the root key Kasme of the 4G network.

可选的,该前传前传重定位请求消息中还可以包括UE的安全能力。其中,UE的安全能力可以包括该UE支持的安全算法的名称,或者,还可以包括按照优先级由高到低的顺序排列的各安全算法的类型或标识。或者,接入和移动管理网元预先已知该UE的安全能力,不需要在该前传重定位请求消息中携带。Optionally, the fronthaul and fronthaul relocation request message may further include a security capability of the UE. The security capability of the UE may include a name of a security algorithm supported by the UE, or may further include a type or an identifier of each security algorithm arranged in a descending order of priority. Alternatively, the access and mobility management network element knows the security capabilities of the UE in advance and does not need to be carried in the fronthaul relocation request message.

在步骤404中,获得CK||IK。In step 404, CK || IK is obtained.

移动性管理实体收到来自接入和移动管理网元发来的重定位请求消息后,根据其中的 SRVCC切换指示消息知道需要发起UE从5G网络切换至3G网络的SRVCC流程,于是使用收到的Kasme获得CK||IK。例如,移动性管理实体使用Kasme和输入参数推演出CK||IK。其中,输入参数可以是由接入和移动管理网元获取并通知UE,也可以是UE发送的业务请求消息中携带的,如PDU会话标识等。After receiving the relocation request message from the access and mobility management network element, the mobility management entity knows that it needs to initiate the SRVCC process for the UE to switch from the 5G network to the 3G network according to the SRVCC handover instruction message in it, and uses the received SRVCC process. Kasme gets CK || IK. For example, the mobility management entity uses Kasme and input parameters to derive CK || IK. The input parameters may be obtained by the access and mobility management network element and notified to the UE, or may be carried in a service request message sent by the UE, such as a PDU session identifier.

可选的,移动性管理实体可以直接把Kasme的前半段作为CK,后半段作为IK,此时,移动性管理实体收到的eKSI也可以直接作为KSI标识CK||IK,因为eKSI和KSI的值是一样的,并且类型也都是映射安全上下文。Optionally, the mobility management entity may directly use the first half of Kasme as CK and the latter half as IK. At this time, the eKSI received by the mobility management entity may also be directly used as the KSI identifier CK || IK, because eKSI and KSI The values are the same, and the types are also mapped to the security context.

在步骤405中,移动性管理实体向移动交换中心服务器发送PS到CS切换请求消息。In step 405, the mobility management entity sends a PS to CS handover request message to the mobile switching center server.

该PS到CS切换请求消息中包含CK||IK和标识CK||IK的KSI,该PS到CS切换请求消息的作用是进行分组交换到电路交换的请求。The PS to CS handover request message includes a CK || IK and a KSI identifying CK || IK. The role of the PS to CS handover request message is to perform a packet switching to circuit switching request.

在步骤406中,移动交换中心服务器向无线网络子系统网元发送重定位请求消息/切换请求消息。In step 406, the mobile switching center server sends a relocation request message / handover request message to the wireless network subsystem network element.

重定位请求消息/切换请求消息用于向无线网络子系统网元中的基站控制器进行切换请求。其中,无线网络子系统网元指包含基站控制器和基站的无线网络子系统。The relocation request message / handover request message is used to make a handover request to the base station controller in the network element of the wireless network subsystem. The wireless network subsystem network element refers to a wireless network subsystem including a base station controller and a base station.

在步骤407中,无线网络子系统网元向移动交换中心服务器发送重定位响应消息/切换响应消息。In step 407, the network element of the wireless network subsystem sends a relocation response message / handover response message to the mobile switching center server.

该消息是对步骤406中重定位请求消息/切换请求消息的响应。This message is a response to the relocation request message / handover request message in step 406.

在步骤408中,移动交换中心服务器向移动性管理实体发送PS到CS切换响应消息。In step 408, the mobile switching center server sends a PS to CS handover response message to the mobility management entity.

该PS到CS切换响应消息用于响应步骤405中的PS到CS切换请求消息。The PS to CS handover response message is used to respond to the PS to CS handover request message in step 405.

在步骤409中,移动性管理实体向接入和移动管理网元发送前传重定位响应消息。In step 409, the mobility management entity sends a forward relocation response message to the access and mobility management network element.

在步骤410中,接入和移动管理网元向基站发送切换命令消息。In step 410, the access and mobility management network element sends a handover command message to the base station.

在步骤411中,基站向UE发送切换命令消息。In step 411, the base station sends a handover command message to the UE.

在步骤412中,UE推演出CK||IK。In step 412, the UE derives CK || IK.

UE收到切换命令消息后,利用Kamf推演Kasme,然后用Kasme推演出CK||IK。After receiving the handover command message, the UE uses Kamf to derive Kasme, and then uses Kasme to derive CK || IK.

在步骤413中,UE向无线网络子系统网元发送切换完成消息。In step 413, the UE sends a handover completion message to the wireless network subsystem network element.

在步骤414中,无线网络子系统网元向移动交换中心服务器发送切换完成消息。In step 414, the wireless network subsystem network element sends a handover completion message to the mobile switching center server.

在步骤415中,移动交换中心服务器向移动性管理实体发送PS到CS的切换完成消息。In step 415, the mobile switching center server sends a PS to CS handover completion message to the mobility management entity.

通过上述步骤401到步骤415,UE可以从5G网络切换到3G网络。Through the above steps 401 to 415, the UE can switch from a 5G network to a 3G network.

上述简单介绍了UE从5G网络切换至3G网络的SRVCC流程,该SRVCC流程与现有技术类似,本申请不作限制。The above briefly describes the SRVCC process for the UE to switch from the 5G network to the 3G network. The SRVCC process is similar to the prior art, and this application is not limited.

当UE语音业务结束后,如果UE所在区域有NR覆盖(即5G网络),那么UE将从3G网络切换至5G网络。如果UE中保存的5G安全上下文可用,且该5G安全上下文为原生(native)安全上下文(即该上下文是通过完整的鉴权和密钥协商(authentication and key agreement,AKA)流程生成的),则使用上述5G安全上下文来保护UE与5G网络之间的通信,例如,使用该5G安全上下文对注册请求消息进行完整性保护。如果该5G安全上下文为映射(mapped)安全上下文(即该上下文是通过4G安全上下文推演而来的,如使用4G网络根密钥Kasme推演出5G网络根密钥Kamf,进而再生成NAS密钥、AS密钥等),或者该5G安全上下文不可用(如UE中不存在5G安全上下文),则UE将发 送不带完整性保护的注册请求消息,该注册请求消息会触发接入和移动管理网元对UE执行重鉴权流程(即接入和移动性管理实体向统一数据管理(Unified Data Management,UDM)网元请求一个鉴权向量,并根据该鉴权向量向UE发送鉴权挑战,当UE通过上述鉴权挑战后便与网络共享了一个根密钥),建立一个5G原生安全上下文。After the UE voice service ends, if the area where the UE is located has NR coverage (that is, 5G network), the UE will switch from the 3G network to the 5G network. If the 5G security context stored in the UE is available and the 5G security context is a native security context (that is, the context is generated through a complete authentication and key agreement (AKA) process), then Use the above 5G security context to protect communication between the UE and the 5G network, for example, use the 5G security context to perform integrity protection on the registration request message. If the 5G security context is a mapped security context (that is, the context is derived from the 4G security context, such as using the 4G network root key Kasme to derive the 5G network root key Kamf, and then generate a NAS key, AS key, etc.), or the 5G security context is unavailable (for example, there is no 5G security context in the UE), the UE will send a registration request message without integrity protection, which will trigger the access and mobility management network The unit performs a re-authentication process on the UE (that is, the access and mobility management entity requests a unified data management (UDM) network element for an authentication vector, and sends an authentication challenge to the UE according to the authentication vector. After the UE passes the authentication challenge, it shares a root key with the network) to establish a 5G native security context.

需要说明的是,在本申请实施例中,5G原生安全上下文,或,原生的5G安全上下文,都是用来表示5G安全上下文为原生的,其具体名称不对本申请的保护范围造成限定。如前所述,原生安全上下文即表示该安全上下文是通过完整的AKA流程生成的安全上下文。It should be noted that, in the embodiments of the present application, the 5G native security context or the native 5G security context is used to indicate that the 5G security context is native, and its specific name does not limit the scope of protection of the present application. As mentioned earlier, a native security context means that the security context is a security context generated through a complete AKA process.

当UE语音业务结束后,如果UE所在区域没有NR覆盖,但是有E-UTRAN(即4G网络)覆盖,那么UE将从3G网络切换至4G网络。如果此时UE上保存有5G安全上下文,且该5G安全上下文为原生安全上下文,则UE收到无线网络子系统(如RNS)发送的RRC释放消息后,UE将删除UMTS安全上下文(即3G安全上下文)或者将UMTS安全上下文设置为非激活态(inactive),并将5G安全上下文从非当前使用的安全上下文设置为当前使用的安全上下文(即激活5G安全上下文),进而UE可以使用该5G安全上下文推演4G安全上下文。后续UE可以向移动性管理实体发送跟踪区更新(tracking area update,TAU)请求(TAU request)消息,该TAU请求消息是由5G安全上下文进行完整性保护的。如果上述5G安全上下文为映射安全上下文,或者该5G安全上下文不可用,则UE将向移动性管理实体发送没有完整性保护的跟踪去更新消息,进而触发移动性管理实体对UE执行重鉴权流程,以建立新的演进的分组系统(evolved packet system,EPS)安全上下文(即4G安全上下文)。After the UE voice service ends, if there is no NR coverage in the area where the UE is located, but there is E-UTRAN (that is, 4G network) coverage, then the UE will switch from the 3G network to the 4G network. If the 5G security context is stored on the UE at this time, and the 5G security context is a native security context, the UE will delete the UMTS security context (that is, 3G security) after receiving the RRC release message sent by the wireless network subsystem (such as RNS). Context) or set the UMTS security context to inactive, and set the 5G security context from the non-currently used security context to the currently used security context (that is, activate the 5G security context), so that the UE can use the 5G security The context deduces the 4G security context. Subsequent UEs may send a tracking area update (TAU) request (TAU request) message to the mobility management entity, and the TAU request message is integrity protected by the 5G security context. If the above 5G security context is a mapped security context, or the 5G security context is not available, the UE will send a tracking update message without integrity protection to the mobility management entity, thereby triggering the mobility management entity to perform a re-authentication process on the UE To establish a new evolved packet system (EPS) security context (ie, 4G security context).

下面结合图4中的步骤416至步骤426详细说明UE从3G网络切换至4G网络的主要过程。The main process of the UE switching from the 3G network to the 4G network will be described in detail with reference to steps 416 to 426 in FIG. 4.

在步骤416中,移动交换中心服务器向无线网络子系统网元发送RRC释放,该消息中携带上次使用的PLMN ID,即4G网络的PLMN ID。In step 416, the mobile switching center server sends an RRC release to the wireless network subsystem network element, and the message carries the PLMN ID used last time, that is, the PLMN ID of the 4G network.

在步骤417中,无线网络子系统网元向UE发送RRC释放消息。In step 417, the wireless network subsystem network element sends an RRC release message to the UE.

当UE所处位置有4G网络,且无5G网络时,无线网络子系统网元可以向UE发送RRC释放消息以指示UE切换到4G网络。该RRC释放消息中包含指示UE回到的目标网络的网络标识。例如,该网络标识例如可以包括但不限于:运营商标识(例如,PLMN ID、接入网络标识(access network ID)、服务网络标识(serving network ID)、小区标识(cell ID)、基站标识(gNB ID)、局域网网络ID、切片ID、承载(bearer)ID、服务质量(quality of service,QoS)ID、流(flow)ID、网络切片选择辅助信息(network slice selection assistance information,NSSAI)。When the UE is in a 4G network and there is no 5G network, the network element of the wireless network subsystem may send an RRC release message to the UE to instruct the UE to switch to the 4G network. The RRC release message includes a network identifier indicating the target network returned by the UE. For example, the network identifier may include, but is not limited to, an operator identifier (e.g., PLMN ID, access network ID, serving network ID, cell ID, base station ID, etc.) gNB ID), LAN network ID, slice ID, bearer ID, quality of service (QoS) ID, flow ID, network slice selection assistance information (NSSAI).

在步骤418中,UE将5G网络的安全上下文设置为当前使用的安全上下文。其中,5G网络的安全上下文是原生安全上下文。In step 418, the UE sets the security context of the 5G network to the currently used security context. Among them, the security context of 5G networks is the native security context.

UE上的安全上下文按照状态分为当前使用的安全上下文(current security context)和非当前使用的安全上下文(non-current security context)。当UE收到RRC释放消息并指示其从3G网络切换至5G网络后,UE会根据当前使用的安全上下文(即3G安全上下文)触发3G到4G的切换流程,即使用3G网络的根密钥CK||IK推演出4G网络的根密钥Kasme,以便4G网络中的移动性管理实体根据Kasme推演出NAS密钥、AS密钥,获得4G安全上下文。但是由于3G网络安全性较差,这使得通过上述方法获得的4G安全上下 文存在泄漏的风险,即如果攻击者攻破3G网络获得根密钥CK||IK后,其完全有能力推演出4G安全上下文。此外,当UE切换至4G网络后,又需要从4G网络切换至5G网络时(如,UE所处位置有5G网络覆盖的时候),UE将使用可能存在泄漏风险的4G安全上下文推演5G安全上下文。因此,本申请实施例提供一种方法,可以避免发生4G安全上下文泄漏的风险,并且提高用户体验。The security context on the UE is divided into a current security context (current security context) and a non-current security context (non-current security context) according to the status. After the UE receives the RRC release message and instructs it to switch from the 3G network to the 5G network, the UE will trigger the 3G to 4G handover process according to the currently used security context (that is, the 3G security context), that is, the root key CK of the 3G network || IK deduces the root key Kasme of the 4G network, so that the mobility management entity in the 4G network derives the NAS key and AS key based on the Kasme to obtain the 4G security context. However, due to the poor security of the 3G network, there is a risk of leakage of the 4G security context obtained through the above method. That is, if an attacker breaks the 3G network to obtain the root key CK || IK, it is fully capable of deducing the 4G security context. . In addition, when the UE switches to the 4G network and needs to switch from the 4G network to the 5G network (for example, when the UE is in a location with 5G network coverage), the UE will use the 4G security context that may have the risk of leakage to derive the 5G security context. . Therefore, the embodiments of the present application provide a method that can avoid the risk of 4G security context leakage and improve the user experience.

UE收到RRC释放消息后,根据RRC释放消息中包含的目标网络标识,确定要返回4G网络时,UE检查当前是否保存了5G原生(native)安全上下文。After receiving the RRC release message, the UE determines whether to return to the 4G network according to the target network identifier contained in the RRC release message, and the UE checks whether the 5G native security context is currently saved.

如果保存了5G原生安全上下文,且该5G原生安全上下文可用,则UE删除3G安全上下文或将3G安全上下文设置为非激活态,并将5G原生安全上下文设置为当前使用的安全上下文,并向移动性管理实体发送由5G原生安全上下文进行完整性保护的TAU请求消息。If the 5G native security context is saved and the 5G native security context is available, the UE deletes the 3G security context or sets the 3G security context to inactive, and sets the 5G native security context to the currently used security context, and moves to the The sex management entity sends a TAU request message for integrity protection by the 5G native security context.

如果UE没有保存5G原生安全上下文(包括该5G安全上下文是映射的),或者5G原生安全上下文不可用,则删除处于当前使用状态的3G安全上下文或将3G安全上下文设置为非激活态,并向移动性管理实体发送无完整性保护的TAU请求消息,以便后续触发移动性管理实体对UE执行重鉴权流程,最终建立4G(原生)安全上下文。If the UE does not save the 5G native security context (including the 5G security context is mapped), or the 5G native security context is not available, delete the 3G security context in the currently used state or set the 3G security context to inactive, and The mobility management entity sends a TAU request message without integrity protection, in order to subsequently trigger the mobility management entity to perform a re-authentication process on the UE, and finally establish a 4G (native) security context.

在步骤419中,UE向移动性管理实体发送TAU请求消息。In step 419, the UE sends a TAU request message to the mobility management entity.

UE检查当前保存5G原生安全上下文,且该5G原生安全上下文可用,UE向移动性管理实体发送TAU请求消息,该TAU请求消息由5G原生安全上下文进行完整性保护。通过使用5G原生安全上下文,而不是从3G安全上下文派生出的4G映射安全上下文来保护TAU请求消息,可以避免Kasme发生泄漏,进而在UE切换到5G网络时保证5G网络的安全,提高网络通信安全。The UE checks that the 5G native security context is currently saved and that the 5G native security context is available. The UE sends a TAU request message to the mobility management entity, and the TAU request message is integrity protected by the 5G native security context. By using the 5G native security context instead of the 4G mapping security context derived from the 3G security context to protect the TAU request message, it is possible to prevent Kasme from leaking, thereby ensuring the security of the 5G network when the UE switches to the 5G network and improving the security of network communication .

TAU请求消息中包含由5G全局唯一的临时UE标识(5G globally unique temporary UE identity,5G GUTI)映射出的演进的分组系统的GUTI(evolved packet system GUTI,EPS GUTI),由ngKSI映射出的eKSI,以及用5G原生安全上下文保护TAU请求消息做完整性保护生成的NAS MAC。The TAU request message includes an evolved packet system GUTI (evolved packet system GUTI, EPS GUTI) mapped from a 5G globally unique temporary UE identity (5G GUTI), an eKSI mapped from ngKSI, And the NAS MAC generated by the 5G native security context protection TAU request message for integrity protection.

在步骤420中,移动性管理实体收到TAU请求消息后根据映射的EPS GUTI获得接入和移动管理网元的地址。In step 420, the mobility management entity obtains the address of the access and mobility management network element according to the mapped EPS GUTI after receiving the TAU request message.

在步骤421中,移动性管理实体向接入和移动管理网元发送上下文请求消息。In step 421, the mobility management entity sends a context request message to the access and mobility management network element.

该上下文请求消息中包含映射的EPS GUTI和使用5G原生安全上下文保护的TAU请求消息。其中,TAU请求消息是步骤419中UE发送给移动性管理实体的。The context request message includes a mapped EPS GUTI and a TAU request message using 5G native security context protection. The TAU request message is sent by the UE to the mobility management entity in step 419.

在步骤422中,接入和移动管理网元利用5G网络的安全上下文映射出4G网络的安全上下文。In step 422, the access and mobility management network element uses the security context of the 5G network to map the security context of the 4G network.

接入和移动管理网元根据TAU请求消息中的eKSI找到相应的5G原生安全上下文,验证TAU请求消息。如果通过验证,接入和移动管理网元便利用5G原生安全上下文映射出4G安全上下文,并通过上下文响应消息发给移动性管理实体。如果没有通过验证,或者没有找到相应的5G原生安全上下文,则接入和移动管理网元会把该TAU请求消息当成是没有安全保护的,因此也不会向移动性管理实体发送任何安全上下文。无论验证是否通过,接入和移动管理网元都会在上下文响应消息中携带UE的永久身份标识(如国际移动用户识别码(International Mobile Subscriber Identity,IMSI)或用户永久标识 (Subscription Permanent Identifier,SUPI)。The access and mobility management network element finds the corresponding 5G native security context according to the eKSI in the TAU request message, and verifies the TAU request message. If the authentication is passed, the access and mobility management network element can use the 5G native security context to map out the 4G security context and send it to the mobility management entity through a context response message. If the verification fails or the corresponding 5G native security context is not found, the access and mobility management network element will treat the TAU request message as unsecured, so it will not send any security context to the mobility management entity. Regardless of whether the authentication is passed, the access and mobility management network element will carry the UE's permanent identity (such as International Mobile Subscriber Identity (IMSI) or Subscriber Permanent Identifier (SUPI) in the context response message. .

在步骤423中,接入和移动管理网元向移动性管理实体发送上下文响应消息。In step 423, the access and mobility management network element sends a context response message to the mobility management entity.

该上下文响应消息中包括步骤422中中UE永久身份标识,和生成的4G映射安全上下文(如果验证通过)。如果移动性管理实体没有收到4G映射安全上下文,则其会根据收到的UE永久身份标识向归属用户服务器(Home Subscriber Server,HSS)请求鉴权向量,以进行重鉴权流程,生成4G(原生)安全上下文。The context response message includes the UE permanent identity in step 422 and the generated 4G mapping security context (if the verification is passed). If the mobility management entity does not receive the 4G mapping security context, it will request the authentication vector from the Home Subscriber Server (HSS) according to the received permanent identity of the UE to perform the re-authentication process to generate 4G ( (Native) security context.

在步骤424中,移动性管理实体根据收到的4G映射安全上下文确定4G算法。In step 424, the mobility management entity determines a 4G algorithm according to the received 4G mapping security context.

4G算法包括UE回到4G网络时将使用的加密算法和完整性保护算法,移动性管理实体可以根据自身安全能力、本地优先级列表和UE安全能力选择合适的加密算法和完整性保护算法。虽然移动性管理实体收到的4G映射安全上下文中可能会包含接入和移动管理网元与UE之前使用的5G加密算法和5G完整性保护算法对应的4G加密算法和4G完整性保护算法,但如果上述算法与移动性管理实体的配置不一致,或者移动性管理实体不支持,移动性管理实体将会重新选择算法。The 4G algorithm includes the encryption algorithm and integrity protection algorithm that the UE will use when returning to the 4G network. The mobility management entity can select a suitable encryption algorithm and integrity protection algorithm according to its own security capabilities, local priority list, and UE security capabilities. Although the 4G mapping security context received by the mobility management entity may include the 4G encryption algorithm and 4G integrity protection algorithm corresponding to the 5G encryption algorithm and 5G integrity protection algorithm previously used by the access and mobility management network elements and the UE, If the above algorithm is inconsistent with the configuration of the mobility management entity, or the mobility management entity does not support it, the mobility management entity will reselect the algorithm.

在步骤425中,如果移动性管理实体重新选择了算法将触发NAS安全模式命令(security mode command,SMC)流程激活NAS安全,使得UE和移动性管理实体共享Kasme和相关的NAS密钥。In step 425, if the mobility management entity reselects the algorithm, the NAS security mode command (SMC) process is triggered to activate NAS security, so that the UE and the mobility management entity share Kasme and related NAS keys.

在步骤426中,移动性管理实体向UE发送TAU接受(TAU accept)消息,在此之前,如UE在发送TAU请求消息之后,可以先行根据5G原生安全上下文推演出4G映射安全上下文,即使用Kamf推演出Kasme,并用5G原生安全上下文中的5G加密算法和5G完整性保护算法对应的4G加密算法和4G完整性保护算法推演出NAS密钥,如果UE后续收到了移动性管理实体发来的NAS SMC消息,则根据NAS SMC消息的指示推演出新的NAS密钥并删除之前生成的NAS密钥,否则UE将使用之前生成的NAS密钥验证TAU接受消息。In step 426, the mobility management entity sends a TAU accept message to the UE. Before this, if the UE sends a TAU request message, it can first derive the 4G mapping security context according to the 5G native security context, that is, use Kamf Derive Kasme, and use the 4G encryption algorithm and 4G integrity protection algorithm corresponding to the 5G encryption algorithm and 5G integrity protection algorithm in the 5G native security context to derive the NAS key. If the UE subsequently receives the NAS from the mobility management entity, SMC message, according to the instructions of the NAS SMC message, deduce a new NAS key and delete the previously generated NAS key, otherwise the UE will use the previously generated NAS key to verify the TAU acceptance message.

基于上述方案,UE从5G网络切换到3G网络,再从3G网络返回4G网络时,UE调整其保存的安全上下文的状态。即UE删掉处于当前使用状态的3G安全上下文,并将5G原生安全上下文设置为当前使用的安全上下文,并使用5G原生安全上下文,而不是从3G安全上下文派生出的4G映射安全上下文来保护TAU请求消息。从而可以避免产生有泄露的4G安全上下文,保证5G网络的安全性,提高用户体验。Based on the above scheme, when the UE switches from the 5G network to the 3G network, and then returns from the 3G network to the 4G network, the UE adjusts the state of the security context it saves. That is, the UE deletes the 3G security context that is currently in use, sets the 5G native security context to the currently used security context, and uses the 5G native security context instead of the 4G mapping security context derived from the 3G security context to protect the TAU. Request message. In this way, leaked 4G security contexts can be avoided, the security of 5G networks can be guaranteed, and the user experience can be improved.

图5是从设备交互的角度示出的本申请又一实施例提供的切换方法500的一示意性流程图。如图所示,图5中所示的方法500可以包括步骤501至步骤519。下面结合图5详细说明方法500中的各个步骤。FIG. 5 is a schematic flowchart of a handover method 500 according to another embodiment of the present application, which is shown from the perspective of device interaction. As shown, the method 500 shown in FIG. 5 may include steps 501 to 519. Each step in the method 500 is described in detail below with reference to FIG. 5.

在步骤501中,基站向接入和移动管理网元发送切换请求消息。In step 501, the base station sends a handover request message to the access and mobility management network element.

基站可以根据UE上报的测量报告决定发起进行SRVCC切换的请求,或者,基站也可以根据当前负载等因素决定发起进行SRVCC切换的请求。基站向接入和移动管理网元发送切换请求消息。该切换请求消息中携带SRVCC切换指示。该SRVCC切换指示用于指示接下来执行的过程是SRVCC切换。The base station may decide to initiate a request for SRVCC handover according to the measurement report reported by the UE, or the base station may also decide to initiate a request for SRVCC handover according to factors such as the current load. The base station sends a handover request message to the access and mobility management network element. The handover request message carries an SRVCC handover instruction. The SRVCC handover instruction is used to indicate that the process to be performed next is SRVCC handover.

在步骤502中,接入和移动管理网元推演出Kasme,并将ngKSI映射为eKSI。In step 502, the access and mobility management network element derives Kasme and maps ngKSI to eKSI.

同图4所示实施例步骤402,相关内容请参考步骤402相关描述.The same as step 402 of the embodiment shown in Figure 4, the relevant content, please refer to the relevant description of step 402.

在步骤503中,接入和移动管理网元向移动性管理实体发送前传重定位请求消息。In step 503, the access and mobility management network element sends a fronthaul relocation request message to the mobility management entity.

同图4所示实施例步骤403,相关内容可以参考步骤403相关描述。Similar to step 403 in the embodiment shown in FIG. 4, for related content, refer to the related description of step 403.

在步骤504中,移动性管理实体保存Kasme,选择4G算法,并推演出NAS密钥。In step 504, the mobility management entity saves Kasme, selects a 4G algorithm, and derives a NAS key.

移动性管理实体收到接入和移动管理网元发来的重定位请求消息后,根据其中的SRVCC切换指示消息知道需要发起SRVCC流程,因此移动性管理实体保存该Kasme。在本申请实施例中,移动性管理实体保存的Kasme可以用于后续UE从3G网络需要返回4G网络时,根据该Kasme推演出NAS密钥,避免当UE需要从3G网络切换到4G网络时,需要重新建立鉴权流程,这样会增加时延和空口信令开销,严重影响用户体验。After receiving the relocation request message from the access and mobility management network element, the mobility management entity knows that the SRVCC process needs to be initiated according to the SRVCC handover instruction message therein, so the mobility management entity saves the Kasme. In the embodiment of the present application, the Kasme saved by the mobility management entity can be used when a subsequent UE needs to return to the 4G network from the 3G network, and the NAS key is inferred based on the Kasme to avoid the UE from switching from the 3G network to the 4G network. The authentication process needs to be re-established. This will increase latency and air interface signaling overhead and seriously affect user experience.

可选的,移动性管理实体可以基于预设的策略选择后续如果UE回到4G网络时将使用的加密算法和完整性保护算法。预设的策略可以包括以下至少一项因素:自身安全能力、本地优先级列表、UE安全能力等等。具体的,预设的策略可以包括终端设备的安全能力,即移动性管理实体基于终端设备的安全能力(如终端设备支持的安全算法)来选择UE回到4G网络时将使用的加密算法和完整性保护算法。预设的策略也可以包括移动性管理实体自身的安全能力,即移动性管理实体基于自身的安全能力(如移动性管理实体自身支持的安全算法)来选择UE回到4G网络时将使用的加密算法和完整性保护算法。或者,预设的策略也可以包括安全能力优先级列表,例如,移动性管理实体确定终端设备和自身都支持的安全算法,然后可以选择安全强调最高或者优先级最高的算法作为UE回到4G网络时将使用的加密算法和完整性保护算法。Optionally, the mobility management entity may select an encryption algorithm and an integrity protection algorithm to be used later if the UE returns to the 4G network based on a preset policy. The preset policy may include at least one of the following factors: its own security capability, local priority list, UE security capability, and so on. Specifically, the preset policy may include the security capabilities of the terminal device, that is, the mobility management entity selects the encryption algorithm and the integrity that the UE will use when returning to the 4G network based on the security capabilities of the terminal device (such as the security algorithm supported by the terminal device). Sexual protection algorithm. The preset policy can also include the security capabilities of the mobility management entity itself, that is, the mobility management entity selects the encryption that the UE will use when returning to the 4G network based on its own security capabilities (such as the security algorithms supported by the mobility management entity itself). Algorithms and integrity protection algorithms. Alternatively, the preset policy may also include a priority list of security capabilities. For example, the mobility management entity determines the security algorithms supported by the terminal device and itself, and then may select the algorithm with the highest security emphasis or the highest priority as the UE to return to the 4G network. The encryption algorithm and integrity protection algorithm that will be used at the time.

其中,预设的策略可以是预先定义的,如协议定义,也可以是由UE和用户面网关协商确定的,本申请对此不做限定。上述加密算法和完整性保护算法可以统称为安全算法。为简洁,在下文实施例中,将移动性管理实体选择的UE回到4G网络时将使用的加密算法和完整性保护算法称为4G算法。The preset policy may be predefined, such as a protocol definition, or may be determined through negotiation between the UE and the user plane gateway, which is not limited in this application. The above encryption algorithms and integrity protection algorithms can be collectively referred to as security algorithms. For brevity, in the following embodiments, the encryption algorithm and integrity protection algorithm used when the UE selected by the mobility management entity returns to the 4G network is referred to as the 4G algorithm.

可选的,移动性管理实体能够使用Kasme和4G算法推演出NAS密钥,该NAS密钥可以用于UE切换到4G网络时使用。4G算法包括4G加密算法和4G完整性保护算法,NAS密钥包括NAS加密密钥和NAS完整性保护密钥。移动性管理实体根据Kasme以及4G加密算法推演出NAS加密密钥;根据Kasme以及4G完整性保护算法推演出NAS完整性保护密钥。Optionally, the mobility management entity can use Kasme and 4G algorithms to derive a NAS key, and the NAS key can be used when the UE switches to the 4G network. 4G algorithms include 4G encryption algorithms and 4G integrity protection algorithms. NAS keys include NAS encryption keys and NAS integrity protection keys. The mobility management entity derives NAS encryption keys based on Kasme and 4G encryption algorithms; and derives NAS integrity protection keys based on Kasme and 4G integrity protection algorithms.

需要说明的是,在本申请实施例中,移动性管理实体收到接入和移动管理网元发来的重定位请求消息后,根据其中的SRVCC切换指示消息知道需要发起SRVCC流程,基于该SRVCC切换指示消息,移动性管理实体会保存Kasme以及选择的4G算法。It should be noted that, in the embodiment of the present application, after the mobility management entity receives the relocation request message from the access and mobility management network element, it knows that the SRVCC process needs to be initiated according to the SRVCC handover instruction message, and based on the SRVCC The handover instruction message, the mobility management entity will save Kasme and the selected 4G algorithm.

还需要说明的是,关于移动性管理实体何时推演出NAS密钥,本申请实施例不作限定。具体地,在步骤504中,移动性管理实体可以不推演NAS密钥,而是在确定UE需要返回4G网络时,再推演出NAS密钥。It should also be noted that the embodiment of this application does not limit the time when the mobility management entity pushes the NAS key. Specifically, in step 504, the mobility management entity may not derive the NAS key, but may instead derive the NAS key when it is determined that the UE needs to return to the 4G network.

在步骤505中,获得CK||IK。In step 505, CK || IK is obtained.

移动性管理实体收到来自接入和移动管理网元发来的重定位请求消息后,根据其中的SRVCC切换指示消息知道需要发起UE从5G网络切换至3G网络的SRVCC流程,于是使用收到的Kasme获得CK||IK。例如,移动性管理实体使用Kasme和输入参数推演出CK||IK。其中,输入参数可以是由接入和移动管理网元获取并通知UE,也可以是UE发送的业务请求消息中携带的,如PDU会话标识等。After the mobility management entity receives the relocation request message from the access and mobility management network element, it knows that it needs to initiate the SRVCC process for the UE to switch from the 5G network to the 3G network according to the SRVCC handover instruction message in it. Kasme gets CK || IK. For example, the mobility management entity uses Kasme and input parameters to derive CK || IK. The input parameters may be obtained by the access and mobility management network element and notified to the UE, or may be carried in a service request message sent by the UE, such as a PDU session identifier.

可选的,移动性管理实体可以直接把Kasme的前半段作为CK,后半段作为IK,此时, 移动性管理实体收到的eKSI也可以直接作为KSI标识CK||IK,因为eKSI和KSI的值是一样的,并且类型也都是映射安全上下文。Optionally, the mobility management entity may directly use the first half of Kasme as CK and the latter half as IK. At this time, the eKSI received by the mobility management entity may also be directly used as the KSI identifier CK || IK, because eKSI and KSI The values are the same, and the types are also mapped to the security context.

在步骤506中,移动性管理实体向移动交换中心服务器发送PS到CS切换请求消息。In step 506, the mobility management entity sends a PS to CS handover request message to the mobile switching center server.

该PS到CS切换请求消息中包含CK||IK和标识CK||IK的KSI,该PS到CS切换请求消息的作用是进行分组交换到电路交换的请求。The PS to CS handover request message includes a CK || IK and a KSI identifying CK || IK. The role of the PS to CS handover request message is to perform a packet switching to circuit switching request.

该PS到CS切换请求消息中还可以包含移动性管理实体为UE选择的4G算法,或者也可以是4G算法的标识符。The PS to CS handover request message may further include a 4G algorithm selected by the mobility management entity for the UE, or may be an identifier of the 4G algorithm.

在步骤507中,移动交换中心服务器向无线网络子系统网元发送重定位请求消息/切换请求消息。In step 507, the mobile switching center server sends a relocation request message / handover request message to the wireless network subsystem network element.

重定位请求消息/切换请求消息用于向无线网络子系统中的基站控制器进行切换请求,该消息中可以包括源基站到目的基站的透明容器(source to target transparent container)。其中,无线网络子系统网元指包含基站控制器和基站的无线网络子系统。The relocation request message / handover request message is used to make a handover request to the base station controller in the wireless network subsystem, and the message may include a source container to a target base container. The wireless network subsystem network element refers to a wireless network subsystem including a base station controller and a base station.

在步骤508中,无线网络子系统网元向移动交换中心服务器发送重定位响应消息/切换响应消息。In step 508, the wireless network subsystem network element sends a relocation response message / handover response message to the mobile switching center server.

该消息是对步骤507中重定位请求消息/切换请求消息的响应。This message is a response to the relocation request message / handover request message in step 507.

在步骤509中,移动交换中心服务器向移动性管理实体发送PS到CS切换响应消息。In step 509, the mobile switching center server sends a PS to CS handover response message to the mobility management entity.

该PS到CS切换响应消息用于响应步骤506中的PS到CS切换请求消息。The PS to CS handover response message is used to respond to the PS to CS handover request message in step 506.

在步骤510中,移动性管理实体向接入和移动管理网元发送前传重定位响应消息。In step 510, the mobility management entity sends a fronthaul relocation response message to the access and mobility management network element.

可选的,该重定位响应消息中还可以包含指示移动性管理实体在步骤504中选择的4G算法或4G算法的标识符。通过将该4G算法发送至接入和移动管理网元,进而发送至UE,可以使得UE根据该Kasme和4G算法推演出NAS密钥,避免当UE需要从3G切换到4G时,需要重新建立鉴权流程,这样会增加时延和空口信令开销,严重影响用户体验。Optionally, the relocation response message may further include an identifier indicating the 4G algorithm or the 4G algorithm selected by the mobility management entity in step 504. By sending the 4G algorithm to the access and mobility management network element, and then to the UE, the UE can derive the NAS key based on the Kasme and 4G algorithm, avoiding the need to re-establish the authentication when the UE needs to switch from 3G to 4G Rights process, which will increase the delay and air interface signaling overhead and seriously affect the user experience.

可选的,该重定位响应消息中还可以携带一个指示信息,该指示信息用于标明4G算法,以便指示在3G网络中不需要进行处理该4G算法。Optionally, the relocation response message may also carry an indication information, which is used to indicate the 4G algorithm, so as to indicate that the 4G algorithm does not need to be processed in the 3G network.

在步骤511中,接入和移动管理网元向基站发送切换命令消息。In step 511, the access and mobility management network element sends a handover command message to the base station.

可选的,该切换命令消息中包含4G算法或4G算法的标识符。可选的,该切换命令消息中还可以包括步骤510中的指示信息。Optionally, the handover command message includes a 4G algorithm or an identifier of the 4G algorithm. Optionally, the switching command message may further include the indication information in step 510.

在步骤512中,基站向UE发送切换命令消息。In step 512, the base station sends a handover command message to the UE.

可选的,该切换命令消息中包含4G算法或4G算法的标识符。可选的,该切换命令消息中还可以包括步骤510中的指示信息。Optionally, the handover command message includes a 4G algorithm or an identifier of the 4G algorithm. Optionally, the switching command message may further include the indication information in step 510.

在步骤513中,UE推演出CK||IK,保存4G算法。In step 513, the UE derives CK || IK and saves the 4G algorithm.

UE收到切换命令消息后,利用Kamf推演出Kasme,然后利用Kasme推演出CK||IK,进而可以从5G网络切换到3G网络。After receiving the handover command message, the UE uses Kamf to deduce Kasme, and then uses Kasme to deduce CK || IK, and then can switch from 5G network to 3G network.

可选的,UE可以保存接收到的4G算法或4G算法的标识符,以便后续需要返回4G网络时推演NAS密钥。Optionally, the UE may save the received 4G algorithm or the identifier of the 4G algorithm, so that the NAS key can be derived when the subsequent return to the 4G network is needed.

可选的,UE也可以保存Kasme,以便后续需要返回4G网络时直接使用该Kasme,并根据Kasme和4G算法推演出NAS密钥。或者,UE也可以在后续确定需要返回4G网络时,使用Kamf推演出相同的Kasme,进而再根据Kasme和4G算法推演出NAS密钥。Optionally, the UE can also save Kasme, so that it can be used directly when it needs to return to the 4G network in the future, and the NAS key can be derived based on the Kasme and 4G algorithm. Alternatively, the UE can also use Kamf to derive the same Kasme when it is subsequently determined that it needs to return to the 4G network, and then derive the NAS key according to the Kasme and 4G algorithms.

在步骤514中,UE向无线网络子系统网元发送切换完成消息。In step 514, the UE sends a handover completion message to the wireless network subsystem network element.

在步骤515中,无线网络子系统网元向移动交换中心服务器发送切换完成消息。In step 515, the wireless network subsystem network element sends a handover completion message to the mobile switching center server.

在步骤516中,移动交换中心服务器向移动性管理实体发送PS到CS的切换完成消息。In step 516, the mobile switching center server sends a PS to CS handover completion message to the mobility management entity.

通过上述步骤501到步骤516,UE可以从5G网络切换到3G网络。此外,移动性管理实体也可以和UE共享在5G网络切换到3G网络的过程中生成的Kasme,从而使得UE可以在需要返回4G网络时,根据该Kasme和4G算法推演出NAS密钥,进而避免了重新建立鉴权流程,提高用户体验。Through the above steps 501 to 516, the UE can switch from a 5G network to a 3G network. In addition, the mobility management entity can also share the Kasme generated during the process of switching from the 5G network to the 3G network with the UE, so that when the UE needs to return to the 4G network, the NAS key can be derived based on the Kasme and 4G algorithm, thereby avoiding In order to re-establish the authentication process and improve user experience.

下面结合图5中的步骤517到步骤519说明,UE从3G网络返回4G网络的主要过程。The following describes the main process of the UE returning from the 3G network to the 4G network with reference to steps 517 to 519 in FIG. 5.

在步骤517中,移动交换中心服务器向无线网络子系统网元发送RRC释放消息。In step 517, the mobile switching center server sends an RRC release message to the wireless network subsystem network element.

在步骤518中,无线网络子系统网元向UE发送RRC释放消息。In step 518, the wireless network subsystem network element sends an RRC release message to the UE.

当UE所处位置有4G网络,且无5G网络时,无线网络子系统网元可以向UE发送RRC释放消息以指示UE切换到4G网络。该RRC释放消息中包含指示UE回到的目标网络的网络标识。例如,该网络标识例如可以包括但不限于:运营商标识(例如,PLMN ID、接入网络标识(access network ID)、服务网络标识(serving network ID)、小区标识(cell ID)、基站标识(gNB ID)、局域网网络ID、切片ID、承载(bearer)ID、服务质量(quality of service,QoS)ID、流(flow)ID、网络切片选择辅助信息(network slice selection assistance information,NSSAI)。When the UE is in a 4G network and there is no 5G network, the network element of the wireless network subsystem may send an RRC release message to the UE to instruct the UE to switch to the 4G network. The RRC release message includes a network identifier indicating the target network returned by the UE. For example, the network identifier may include, but is not limited to, an operator identifier (e.g., PLMN ID, access network ID, serving network ID, cell ID, base station ID, etc.) gNB ID), LAN network ID, slice ID, bearer ID, quality of service (QoS) ID, flow ID, network slice selection assistance information (NSSAI).

在步骤519中,UE使用4G算法推演出NAS密钥,确定返回4G网络。In step 519, the UE uses the 4G algorithm to derive the NAS key, and determines to return to the 4G network.

UE收到RRC释放消息后确定返回4G网络,UE可以通过3G网络的RRC释放消息,使用5G网络的根密钥推演出4G网络的根密钥,进而推演出4G网络的NAS密钥。如果UE在之前存储了Kasme,则使用Kasme和之前收到的4G算法推演出NAS密钥。如果UE没有存储Kasme,则使用Kamf先推演出Kasme,再使用Kasme和之前收到的4G算法推演出NAS密钥。After receiving the RRC release message, the UE determines to return to the 4G network. The UE can use the 3G network RRC release message to derive the root key of the 4G network using the root key of the 5G network, and then the NAS key of the 4G network. If the UE previously stored Kasme, it uses Kasme and the 4G algorithm received previously to derive the NAS key. If the UE does not store Kasme, it uses Kamf to deduce Kasme first, and then uses Kasme and the 4G algorithm received previously to deduce the NAS key.

基于上述方案,UE从5G网络切换到3G网络的过程中,接入和移动管理网元会先根据5G网络的根密钥Kamf推演出4G网络的根密钥Kasme。UE从3G网络返回4G网络时,可以使用UE从5G网络切换到3G网络的过程中得到的4G网络的根密钥Kasme。且移动性管理实体在UE从5G网络切换到3G网络的过程中,会为UE选择返回4G网络时的安全算法。通过移动性管理实体预先选择的安全算法,以及在UE从5G网络切换到3G网络的过程中得到的4G网络的根密钥Kasme,UE可以推演出返回4G网络的安全密钥,从而能够避免UE在回到4G网络时执行重鉴权的流程,进而减小时延,提高用户体验。Based on the above scheme, in the process of the UE switching from the 5G network to the 3G network, the access and mobility management network element will first derive the root key Kasme of the 4G network based on the root key Kamf of the 5G network. When the UE returns from the 3G network to the 4G network, the root key Kasme of the 4G network obtained when the UE switches from the 5G network to the 3G network can be used. In addition, the mobility management entity will select a security algorithm for the UE when returning to the 4G network when the UE switches from the 5G network to the 3G network. Through the security algorithm pre-selected by the mobility management entity and the root key Kasme of the 4G network obtained during the UE's handover from the 5G network to the 3G network, the UE can derive the security key of the 4G network and thereby avoid the UE When returning to the 4G network, the re-authentication process is performed, thereby reducing the delay and improving the user experience.

图6是从设备交互的角度示出的本申请又实施例提供的切换方法600的又一示意性流程图。如图所示,图6中所示的方法600可以包括步骤601至步骤620。下面结合图6详细说明方法600中的各个步骤。FIG. 6 is another schematic flowchart of a handover method 600 according to another embodiment of the present application, which is shown from the perspective of device interaction. As shown, the method 600 shown in FIG. 6 may include steps 601 to 620. Each step in the method 600 is described in detail below with reference to FIG. 6.

在步骤601中,基站向接入和移动管理网元发送切换请求消息。In step 601, the base station sends a handover request message to the access and mobility management network element.

应理解,步骤601与上文方法400中的步骤401、上文方法500中的步骤501的具体过程相似。由于上文方法400中已经对步骤401做了详细说明,为了简洁,这里不再赘述。It should be understood that the specific process of step 601 is similar to step 401 in method 400 and step 501 in method 500 above. Since step 401 has been described in detail in the method 400 above, for brevity, it will not be repeated here.

在步骤602中,接入和移动管理网元推演出Kasme,并将ngKSI映射为eKSI。In step 602, the access and mobility management network element derives Kasme and maps ngKSI to eKSI.

应理解,步骤602与上文方法400中的步骤402、上文方法500中的步骤502的具体过程相似。由于上文方法400中已经对步骤402做了详细说明,为了简洁,这里不再赘述。It should be understood that the specific process of step 602 is similar to step 402 in method 400 and step 502 in method 500 above. Since step 402 has been described in detail in the method 400 above, for brevity, it will not be repeated here.

在步骤603中,接入和移动管理网元向移动性管理实体发送前传重定位请求消息。In step 603, the access and mobility management network element sends a fronthaul relocation request message to the mobility management entity.

应理解,步骤603与上文方法400中的步骤403、上文方法500中的步骤503的具体过程相似。由于上文方法400中已经对步骤403做了详细说明,为了简洁,这里不再赘述。It should be understood that the specific process of step 603 is similar to step 403 in method 400 and step 503 in method 500 above. Since step 403 has been described in detail in the method 400 above, for brevity, it will not be repeated here.

可选的,在步骤604中,移动性管理实体保存Kasme,选择4G算法,并推演出NAS密钥。Optionally, in step 604, the mobility management entity saves Kasme, selects a 4G algorithm, and derives a NAS key.

移动性管理实体收到接入和移动管理网元发来的前传重定位请求消息后,根据其中的SRVCC切换指示消息知道需要发起SRVCC流程,因此移动性管理实体可以保存该Kasme。在本申请实施例中,移动性管理实体保存的Kasme可以用于后续UE从3G网络需要返回4G网络时,根据该Kasme推演出NAS密钥,避免当UE需要从3G网络切换到4G网络时,需要重新建立鉴权流程,这样会增加时延和空口信令开销,严重影响用户体验。After receiving the forward relocation request message from the access and mobility management network element, the mobility management entity knows that the SRVCC process needs to be initiated according to the SRVCC handover instruction message, so the mobility management entity can save the Kasme. In the embodiment of the present application, the Kasme saved by the mobility management entity can be used when a subsequent UE needs to return to the 4G network from the 3G network, and the NAS key is inferred based on the Kasme to avoid the UE from switching from the 3G network to the 4G network. The authentication process needs to be re-established. This will increase latency and air interface signaling overhead and seriously affect user experience.

可选的,移动性管理实体可以选择后续如果UE回到4G网络时将使用的加密算法和完整性保护算法。例如,移动性管理实体可以根据自身安全能力、本地优先级列表和UE安全能力选择合适的加密算法和完整性保护算法。为简洁,在下文实施例中,将移动性管理实体选择的UE回到4G网络时将使用的加密算法和完整性保护算法称为4G算法。Optionally, the mobility management entity may select an encryption algorithm and an integrity protection algorithm to be used later when the UE returns to the 4G network. For example, the mobility management entity may select an appropriate encryption algorithm and integrity protection algorithm according to its own security capabilities, local priority list, and UE security capabilities. For brevity, in the following embodiments, the encryption algorithm and integrity protection algorithm used when the UE selected by the mobility management entity returns to the 4G network is referred to as the 4G algorithm.

可选的,移动性管理实体能够使用Kasme和4G算法推演出NAS密钥,该NAS密钥可以用于UE切换到4G时使用。Optionally, the mobility management entity can use Kasme and 4G algorithms to derive a NAS key, and the NAS key can be used when the UE switches to 4G.

需要说明的是,在本申请实施例中,关于移动性管理实体何时选择4G算法,以及何时推演出NAS密钥,本申请实施例不作限定。具体地,在5G到3G的切换过程中,移动性管理实体也可以不执行步骤604。It should be noted that, in the embodiment of the present application, when the mobility management entity selects the 4G algorithm and when the NAS key is derived, the embodiment of the present application is not limited. Specifically, during the handover process from 5G to 3G, the mobility management entity may not perform step 604.

在步骤605中,获得CK||IK。In step 605, CK || IK is obtained.

移动性管理实体根据SRVCC切换指示消息知道需要发起SRVCC流程,于是使用收到的Kasme获得CK||IK。The mobility management entity knows that the SRVCC process needs to be initiated according to the SRVCC handover instruction message, and then uses the received Kasme to obtain CK || IK.

可选的,移动性管理实体可以直接把Kasme的前半段作为CK,后半段作为IK,此时,移动性管理实体收到的eKSI也可以直接作为KSI标识CK||IK,因为eKSI和KSI的值是一样的,并且类型也都映射安全上下文。Optionally, the mobility management entity may directly use the first half of Kasme as CK and the latter half as IK. At this time, the eKSI received by the mobility management entity may also be directly used as the KSI identifier CK || IK, because eKSI and KSI The values are the same, and the types all map to the security context.

在步骤606中,移动性管理实体向移动交换中心服务器发送PS到CS切换请求消息。In step 606, the mobility management entity sends a PS to CS handover request message to the mobile switching center server.

该PS到CS切换请求消息中包含CK||IK和标识CK||IK的KSI,该PS到CS切换请求消息的作用是进行分组交换到电路交换的请求。The PS to CS handover request message includes a CK || IK and a KSI identifying CK || IK. The role of the PS to CS handover request message is to perform a packet switching to circuit switching request.

在步骤607中,移动交换中心服务器向无线网络子系统网元发送重定位请求消息/切换请求消息。In step 607, the mobile switching center server sends a relocation request message / handover request message to the wireless network subsystem network element.

重定位请求消息/切换请求消息用于向无线网络子系统网元中的基站控制器进行切换请求,该消息中可以包括源基站到目的基站的透明容器。其中,无线网络子系统网元指包含基站控制器和基站的无线网络子系统。The relocation request message / handover request message is used to make a handover request to the base station controller in the network element of the wireless network subsystem, and the message may include a transparent container from the source base station to the destination base station. The wireless network subsystem network element refers to a wireless network subsystem including a base station controller and a base station.

在步骤608中,无线网络子系统网元向移动交换中心服务器发送重定位响应消息/切换响应消息。In step 608, the network element of the wireless network subsystem sends a relocation response message / handover response message to the mobile switching center server.

该消息是对步骤607中重定位请求消息/切换请求消息的响应。This message is a response to the relocation request message / handover request message in step 607.

在步骤609中,移动交换中心服务器向移动性管理实体发送PS到CS切换响应消息。In step 609, the mobile switching center server sends a PS to CS handover response message to the mobility management entity.

该PS到CS切换响应消息用于响应步骤606中的PS到CS切换请求消息。The PS to CS handover response message is used to respond to the PS to CS handover request message in step 606.

在步骤610中,移动性管理实体向接入和移动管理网元发送前传重定位响应消息。In step 610, the mobility management entity sends a fronthaul relocation response message to the access and mobility management network element.

在步骤611中,接入和移动管理网元向基站发送切换命令消息。In step 611, the access and mobility management network element sends a handover command message to the base station.

在步骤612中,基站向UE发送切换命令消息。In step 612, the base station sends a handover command message to the UE.

在步骤613中,UE推演出CK||IK。In step 613, the UE derives CK || IK.

UE收到切换命令消息后,利用Kamf推演出Kasme,然后利用Kasme推演出CK||IK,进而可以从5G网络切换到3G网络。After receiving the handover command message, the UE uses Kamf to deduce Kasme, and then uses Kasme to deduce CK || IK, and then can switch from 5G network to 3G network.

在步骤614中,UE向无线网络子系统网元发送切换完成消息。In step 614, the UE sends a handover completion message to the wireless network subsystem network element.

在步骤615中,无线网络子系统网元向移动交换中心服务器发送切换完成消息。In step 615, the wireless network subsystem network element sends a handover completion message to the mobile switching center server.

在步骤616中,移动交换中心服务器向移动性管理实体发送PS到CS的切换完成消息。In step 616, the mobile switching center server sends a PS to CS handover completion message to the mobility management entity.

通过上述步骤601到步骤616,UE可以从5G网络切换到3G网络。Through the above steps 601 to 616, the UE can switch from a 5G network to a 3G network.

下面结合图6中的步骤617到步骤620说明,UE从3G网络返回4G网络的主要过程。The following describes the main process of the UE returning from the 3G network to the 4G network with reference to steps 617 to 620 in FIG. 6.

在步骤617中,移动交换中心服务器向无线网络子系统网元发送RRC释放消息。In step 617, the mobile switching center server sends an RRC release message to the wireless network subsystem network element.

可选的,如果移动性管理实体已执行步骤604,则该RRC释放消息中包含移动性管理实体为UE选择的4G算法或4G算法的算法标识符。Optionally, if the mobility management entity has performed step 604, the RRC release message includes the 4G algorithm or the algorithm identifier of the 4G algorithm selected by the mobility management entity for the UE.

在步骤618中,判断返回的目标网络。In step 618, the returned target network is determined.

可选的,无线网络子系统网元可以根据UE即将返回的目标网络是否为4G网络,来决定是否要在RRC释放消息中携带4G算法或4G算法的算法标识符。例如,无线网络子系统网元可以根据UE上报的测量报告获知当前的网络覆盖状况,因此当无线网络子系统网元可以获知当前有4G网络的覆盖,且没有5G网络的覆盖时,则确定UE从3G网络切换至4G网络。进而,在无线网络子系统网元向UE发送的RRC释放消息中携带4G算法。Optionally, the wireless network subsystem network element may decide whether to carry the 4G algorithm or the algorithm identifier of the 4G algorithm in the RRC release message according to whether the target network to be returned by the UE is a 4G network. For example, the wireless network subsystem network element can obtain the current network coverage status according to the measurement report reported by the UE. Therefore, when the wireless network subsystem network element can learn that there is currently 4G network coverage and there is no 5G network coverage, the UE is determined. Switch from 3G network to 4G network. Furthermore, the RRC release message sent by the network element of the wireless network subsystem to the UE carries a 4G algorithm.

无线网络子系统网元确定当前有5G网络的覆盖,则判断UE即将返回的目标网络是5G网络,则直接向UE发送RRC释放消息。The wireless network subsystem network element determines that there is currently coverage of the 5G network, determines that the target network to be returned by the UE is a 5G network, and directly sends an RRC release message to the UE.

无线网络子系统网元确定当前没有5G网络的覆盖,有4G网络的覆盖,则判断UE即将返回的目标网络是4G网络,则无线网络子系统网元向UE发送的RRC释放消息中包括4G算法或4G算法的算法标识符。The network element of the wireless network subsystem determines that there is currently no coverage of the 5G network. If there is coverage of the 4G network, it determines that the target network that the UE is about to return is a 4G network. Or the algorithm identifier of the 4G algorithm.

一种可能的实现方式,如果移动性管理实体已执行步骤604,上述步骤617中,RRC释放消息中包含移动性管理实体为UE预先选择的4G算法或4G算法的算法标识符,则无线网络子系统网元向UE发送的RRC释放消息中携带移动性管理实体为UE预先选择的4G算法或4G算法的算法标识符。In a possible implementation manner, if the mobility management entity has performed step 604 and the above step 617, the RRC release message includes the 4G algorithm or the algorithm identifier of the 4G algorithm preselected by the mobility management entity for the UE, then the wireless network The RRC release message sent by the system network element to the UE carries the 4G algorithm or the algorithm identifier of the 4G algorithm preselected by the mobility management entity for the UE.

一种可能的实现方式,如果移动性管理实体未执行步骤604,则无线网络子系统网元通知移动交换中心服务器去请求4G算法。移动交换中心服务器向移动性管理实体请求为UE选择4G算法。移动性管理实体接收到指示,为UE选择4G算法,并将选择的4G算法或4G算法的算法标识符发送至无线网络子系统网元,以便无线网络子系统网元向UE发送的RRC释放消息中携带该4G算法。In a possible implementation manner, if the mobility management entity does not perform step 604, the network element of the wireless network subsystem notifies the mobile switching center server to request a 4G algorithm. The mobile switching center server requests the mobility management entity to select a 4G algorithm for the UE. The mobility management entity receives the instruction, selects the 4G algorithm for the UE, and sends the selected 4G algorithm or the algorithm identifier of the 4G algorithm to the wireless network subsystem network element, so that the wireless network subsystem network element sends an RRC release message to the UE. It carries the 4G algorithm.

可选的,无线网络子系统网元也可以不判断返回的目标网络。Optionally, the network element of the wireless network subsystem may not judge the returned target network.

如果移动性管理实体已执行步骤604,上述步骤617中,RRC释放消息中包含移动性管理实体为UE预先选择的4G算法或4G算法的算法标识符,无线网络子系统网元也可以不判断返回的目标网络,直接将4G算法或4G算法的算法标识符通过RRC释放消息发 送给UE。此时,如果RRC释放消息指示UE返回5G网络,则UE会因为已经有5G安全上下文而忽略上述4G算法,否则UE会使用上述4G算法推演NAS密钥。If the mobility management entity has performed step 604, in the above step 617, the RRC release message includes the 4G algorithm or the algorithm identifier of the 4G algorithm preselected by the mobility management entity for the UE, and the network element of the wireless network subsystem may return without judging. The target network directly sends the 4G algorithm or the algorithm identifier of the 4G algorithm to the UE through an RRC release message. At this time, if the RRC release message instructs the UE to return to the 5G network, the UE will ignore the above 4G algorithm because it already has a 5G security context, otherwise the UE will use the above 4G algorithm to derive the NAS key.

在步骤619中,无线网络子系统网元向UE发送RRC释放消息。In step 619, the network element of the wireless network subsystem sends an RRC release message to the UE.

无线网络子系统网元向UE发送RRC释放消息以指示UE切换到4G网络。该RRC释放消息中包含指示UE回到的目标网络的网络标识。该网络标识在上述方法500中的步骤510中已介绍,此处为简洁,不再赘述。UE根据该网络标识,确定将要返回的网络为4G网络。The wireless network subsystem network element sends an RRC release message to the UE to instruct the UE to switch to the 4G network. The RRC release message includes a network identifier indicating the target network returned by the UE. The network identifier has been described in step 510 in the above method 500, which is brevity and will not be described again here. According to the network identifier, the UE determines that the network to be returned is a 4G network.

在步骤620中,UE推演出NAS密钥。In step 620, the UE derives a NAS key.

当UE收到RRC释放消息后,可以利用RRC释放消息中携带的4G算法,推演出NAS密钥。在推演NAS密钥之前,如果UE没有Kasme,则UE需要先使用Kamf推演出Kasme。如果UE在推演CK||IK时保存了Kasme,则可以直接使用Kasme推演NAS密钥。需要UE事先保存Kasme的方法可以是在UE从5G网络切换到3G网络时,移动性管理实体向UE发送指示信息,指示UE保存Kasme。When the UE receives the RRC release message, it can use the 4G algorithm carried in the RRC release message to derive the NAS key. Before the NAS key is derived, if the UE does not have Kasme, the UE needs to use Kamf to derive Kasme first. If the UE saved Kasme when inferring CK || IK, it can directly use NAS to infer the NAS key. A method that requires the UE to save Kasme in advance may be that when the UE switches from a 5G network to a 3G network, the mobility management entity sends instruction information to the UE to instruct the UE to save Kasme.

基于上述方案,UE从5G网络切换到3G网络的过程中,接入和移动管理网元会先根据5G网络的根密钥Kamf推演出4G网络的根密钥Kasme。UE从3G网络返回4G网络时,可以使用UE从5G网络切换到3G网络的过程中得到的4G网络的根密钥Kasme。此外,当确定UE将要返回的目标网络为4G网络时,向移动性管理实体请求4G网络的安全算法,并把该4G网络的安全算法发送给UE,进而可以使得UE根据4G网络的安全算法和4G网络的根密钥Kasme,推演出4G网络的安全密钥,从而能够避免UE在回到4G网络时执行重鉴权的流程,进而减小时延并节省5G SRVCC阶段的空口资源,提高用户体验。Based on the above scheme, in the process of the UE switching from the 5G network to the 3G network, the access and mobility management network element will first derive the root key Kasme of the 4G network based on the root key Kamf of the 5G network. When the UE returns from the 3G network to the 4G network, the root key Kasme of the 4G network obtained when the UE switches from the 5G network to the 3G network can be used. In addition, when it is determined that the target network to be returned by the UE is a 4G network, the security management algorithm of the 4G network is requested from the mobility management entity, and the security algorithm of the 4G network is sent to the UE, so that the UE can make the Kasme, the root key of the 4G network, deduces the security key of the 4G network, which can prevent the UE from performing the re-authentication process when returning to the 4G network, thereby reducing the delay and saving the air interface resources in the 5G SRVCC phase, improving the user experience .

以上,结合图4至图6详细说明了本申请实施例提供的切换方法。以下,结合图7至图8详细说明本申请实施例提供的切换装置。In the foregoing, the handover method provided by the embodiment of the present application has been described in detail with reference to FIGS. 4 to 6. Hereinafter, the switching device provided by the embodiment of the present application will be described in detail with reference to FIGS. 7 to 8.

图7是本申请实施例提供的切换装置700的示意性框图。如图所示,该通信装置700可以包括:收发模块710和处理模块720。FIG. 7 is a schematic block diagram of a switching device 700 according to an embodiment of the present application. As shown in the figure, the communication device 700 may include: a transceiver module 710 and a processing module 720.

在一种可能的设计中,该切换装置700可以是上文方法实施例中的UE,也可以是用于实现上文方法实施例中UE的功能的芯片。In a possible design, the switching device 700 may be the UE in the foregoing method embodiment, or may be a chip used to implement the functions of the UE in the foregoing method embodiment.

一种可能的方式,收发模块710,用于接收第一信息,所述第一信息包括指示所述终端设备从第一网络切换至第二网络的指示信息,所述第一信息还包括所述第二网络的网络标识;处理模块720,用于当所述终端设备中存在原生的第三网络的安全上下文时,所述终端设备将所述第三网络的安全上下文设置为当前使用的安全上下文;所述处理模块720:还用于根据所述第三网络的安全上下文,推演出所述第二网络的安全上下文。In a possible manner, the transceiver module 710 is configured to receive first information, where the first information includes instruction information instructing the terminal device to switch from the first network to the second network, and the first information further includes the A network identification of the second network; a processing module 720, configured to set the security context of the third network to the currently used security context when the security context of the native third network exists in the terminal device The processing module 720 is further configured to derive the security context of the second network according to the security context of the third network.

可选的,所述收发模块710接收第一信息之后,所述处理模块720还用于:删除所述第一网络的安全上下文。Optionally, after the transceiver module 710 receives the first information, the processing module 720 is further configured to: delete the security context of the first network.

可选的,所述所述收发模块710还用于:向移动性管理实体发送使用所述第三网络的安全上下文保护的跟踪区更新请求信息。Optionally, the transceiver module 710 is further configured to send tracking area update request information protected by the security context of the third network to a mobility management entity.

可选的,所述跟踪区更新请求信息包括第五代5G全局唯一临时终端设备标识映射的第四代4G全局唯一临时终端设备标识和密钥集标识符。Optionally, the tracking area update request information includes a fifth-generation 5G globally unique temporary terminal device identifier mapping of a fourth-generation 4G globally unique temporary terminal device identifier and a key set identifier.

可选的,所述第一信息为无线资源控制RRC释放信息。Optionally, the first information is radio resource control RRC release information.

可选的,所述处理模块720还用于:当所述终端设备中不存在原生的第三网络的安全上下文时,删除所述第一网络的安全上下文;所述收发模块710还用于:向移动性管理实体发送无完整性保护的跟踪区更新请求信息,以使所述移动性管理实体执行重鉴权流程。Optionally, the processing module 720 is further configured to: when the security context of the native third network does not exist in the terminal device, delete the security context of the first network; and the transceiver module 710 is further configured to: Sending the tracking area update request information without integrity protection to the mobility management entity, so that the mobility management entity performs a re-authentication process.

可选的,所述第一网络为第三代3G/第二代2G网络,所述第二网络为第四代4G网络,所述第三网络为第五代5G网络。Optionally, the first network is a third-generation 3G / second-generation 2G network, the second network is a fourth-generation 4G network, and the third network is a fifth-generation 5G network.

具体地,该切换装置700可对应于根据本申请实施例的方法400至600中的UE,该切换装置700可以包括用于执行图4中的方法400至图6中的方法600中的UE执行的方法的模块。并且,该切换装置700中的各模块和上述其他操作和/或功能分别为了实现图4中的方法400、图5中的方法500、图6中的方法600的相应流程。应理解,各模块执行上述相应步骤的具体过程在上述方法实施例中已经详细说明,为了简洁,在此不再赘述。Specifically, the switching device 700 may correspond to the UE in the methods 400 to 600 according to the embodiment of the present application, and the switching device 700 may include a UE for performing the method 400 in FIG. 4 to the method 600 in FIG. 6. Method module. In addition, each module in the switching device 700 and the other operations and / or functions described above are used to implement corresponding processes of the method 400 in FIG. 4, the method 500 in FIG. 5, and the method 600 in FIG. 6, respectively. It should be understood that the specific process of each module performing the above corresponding steps has been described in detail in the foregoing method embodiment, and for the sake of brevity, it will not be repeated here.

在另一种可能的设计中,该切换装置700可以是上文方法实施例中的移动性管理实体,也可以是用于实现上文方法实施例中移动性管理实体的功能的芯片。In another possible design, the switching device 700 may be the mobility management entity in the foregoing method embodiment, or may be a chip used to implement the functions of the mobility management entity in the foregoing method embodiment.

具体地,该切换装置700可对应于根据本申请实施例的方法400至600中的移动性管理实体,该切换装置700可以包括用于执行图4中的方法400至图6中的方法600中的移动性管理实体执行的方法的模块。并且,该切换装置700中的各单元和上述其他操作和/或功能分别为了实现图4中的方法400、图5中的方法500、图6中的方法600的相应流程。应理解,各模块执行上述相应步骤的具体过程在上述方法实施例中已经详细说明,为了简洁,在此不再赘述。Specifically, the switching device 700 may correspond to the mobility management entity in the methods 400 to 600 according to the embodiment of the present application. The switching device 700 may include a method for performing the method 400 in FIG. 4 to the method 600 in FIG. 6. A module of methods performed by a mobility management entity. In addition, each unit in the switching device 700 and the other operations and / or functions described above are respectively used to implement the corresponding processes of the method 400 in FIG. 4, the method 500 in FIG. 5, and the method 600 in FIG. 6. It should be understood that the specific process of each module performing the above corresponding steps has been described in detail in the foregoing method embodiment, and for the sake of brevity, it will not be repeated here.

在另一种可能的设计中,该切换装置700可以是上文方法实施例中的接入和移动管理网元,也可以是用于实现上文方法实施例中接入和移动管理网元的功能的芯片。In another possible design, the switching device 700 may be an access and mobility management network element in the foregoing method embodiment, or may be used to implement the access and mobility management network element in the foregoing method embodiment. Functional chip.

具体地,该切换装置700可对应于根据本申请实施例的方法400至600中的接入和移动管理网元,该切换装置700可以包括用于执行图4中的方法400至图6中的方法600中的接入和移动管理网元执行的方法的模块。并且,该切换装置700中的各模块和上述其他操作和/或功能分别为了实现图4中的方法400、图5中的方法500、图6中的方法600的相应流程。应理解,各模块执行上述相应步骤的具体过程在上述方法实施例中已经详细说明,为了简洁,在此不再赘述。Specifically, the switching device 700 may correspond to the access and mobility management network elements in the methods 400 to 600 according to the embodiment of the present application. The switching device 700 may include a method for performing the methods 400 to 6 in FIG. 4. Module of the method performed by the access and mobility management network element in method 600. In addition, each module in the switching device 700 and the other operations and / or functions described above are used to implement corresponding processes of the method 400 in FIG. 4, the method 500 in FIG. 5, and the method 600 in FIG. 6, respectively. It should be understood that the specific process of each module performing the above corresponding steps has been described in detail in the foregoing method embodiment, and for the sake of brevity, it will not be repeated here.

在另一种可能的设计中,该切换装置700可以是上文方法实施例中的移动交换中心,也可以是用于实现上文方法实施例中移动交换中心的功能的芯片。In another possible design, the switching device 700 may be the mobile switching center in the foregoing method embodiment, or may be a chip used to implement the functions of the mobile switching center in the foregoing method embodiment.

具体地,该切换装置700可对应于根据本申请实施例的方法400至600中的移动交换中心,该切换装置700可以包括用于执行图4中的方法400至图6中的方法600中的移动交换中心执行的方法的模块。并且,该切换装置700中的各模块和上述其他操作和/或功能分别为了实现图4中的方法400、图5中的方法500、图6中的方法600的相应流程。应理解,各模块执行上述相应步骤的具体过程在上述方法实施例中已经详细说明,为了简洁,在此不再赘述。Specifically, the switching device 700 may correspond to the mobile switching center in the methods 400 to 600 according to the embodiment of the present application. The switching device 700 may include a method for performing the method 400 in FIG. 4 to the method 600 in FIG. 6. A module of a method performed by a mobile switching center. In addition, each module in the switching device 700 and the other operations and / or functions described above are used to implement corresponding processes of the method 400 in FIG. 4, the method 500 in FIG. 5, and the method 600 in FIG. 6, respectively. It should be understood that the specific process of each module performing the above corresponding steps has been described in detail in the foregoing method embodiment, and for the sake of brevity, it will not be repeated here.

在另一种可能的设计中,该切换装置700可以是上文方法实施例中的无线网络子系统网元,也可以是用于实现上文方法实施例中无线网络子系统网元的功能的芯片。In another possible design, the switching device 700 may be the wireless network subsystem network element in the foregoing method embodiment, or may be used to implement the functions of the wireless network subsystem network element in the foregoing method embodiment. chip.

具体地,该切换装置700可对应于根据本申请实施例的方法400至600中的无线网络子系统网元,该切换装置700可以包括用于执行图4中的方法400至图6中的方法600中的无线网络子系统网元执行的方法的模块。并且,该切换装置700中的各模块和上述其他 操作和/或功能分别为了实现图4中的方法400、图5中的方法500、图6中的方法600的相应流程。应理解,各模块执行上述相应步骤的具体过程在上述方法实施例中已经详细说明,为了简洁,在此不再赘述。Specifically, the switching device 700 may correspond to the wireless network subsystem network element in the methods 400 to 600 according to the embodiment of the present application, and the switching device 700 may include a method for executing the method 400 in FIG. 4 to the method in FIG. 6. 600. A module of a method performed by a wireless network subsystem network element in 600. In addition, each module in the switching device 700 and the other operations and / or functions described above are respectively used to implement the corresponding processes of the method 400 in FIG. 4, the method 500 in FIG. 5, and the method 600 in FIG. It should be understood that the specific process of each module performing the above corresponding steps has been described in detail in the foregoing method embodiment, and for the sake of brevity, it will not be repeated here.

应理解,各模块执行上述相应步骤的具体过程在上述方法实施例中已经详细说明,为了简洁,在此不再赘述。It should be understood that the specific process of each module performing the above corresponding steps has been described in detail in the foregoing method embodiment, and for the sake of brevity, it will not be repeated here.

应理解,该切换装置700中的收发模块可对应于图8中示出的切换设备700中的收发器810,该切换装置700中的处理模块720可对应于图8中示出的切换设备800中的收发器820。It should be understood that the transceiver module in the switching device 700 may correspond to the transceiver 810 in the switching device 700 shown in FIG. 8, and the processing module 720 in the switching device 700 may correspond to the switching device 800 shown in FIG. 8. The transceiver 820.

图8是本申请实施例提供的切换设备800的示意性框图。如图所示,该切换设备800包括:处理器810和收发器820。该处理器810与存储器耦合,用于执行存储器中存储的指令,以控制收发器820发送信号和/或接收信号。可选地,该切换设备800还包括存储器830,用于存储指令。FIG. 8 is a schematic block diagram of a switching device 800 according to an embodiment of the present application. As shown, the switching device 800 includes: a processor 810 and a transceiver 820. The processor 810 is coupled to the memory and is configured to execute instructions stored in the memory to control the transceiver 820 to send signals and / or receive signals. Optionally, the switching device 800 further includes a memory 830 for storing instructions.

应理解,上述处理器810和存储器830可以合成一个处理装置,处理器810用于执行存储器830中存储的程序代码来实现上述功能。具体实现时,该存储器830也可以集成在处理器810中,或者独立于处理器810。It should be understood that the processor 810 and the memory 830 may be combined into a processing device, and the processor 810 is configured to execute program codes stored in the memory 830 to implement the foregoing functions. In specific implementation, the memory 830 may also be integrated in the processor 810, or be independent of the processor 810.

还应理解,收发器820可以包括接收器(或者称,接收机)和发射器(或者称,发射机)。收发器还可以进一步包括天线,天线的数量可以为一个或多个。It should also be understood that the transceiver 820 may include a receiver (or receiver) and a transmitter (or transmitter). The transceiver may further include antennas, and the number of antennas may be one or more.

在一种可能的设计中,该切换设备800可以是上文方法实施例中的UE,也可以是用于实现上文方法实施例中UE的功能的芯片。In a possible design, the switching device 800 may be the UE in the foregoing method embodiment, or may be a chip used to implement the functions of the UE in the foregoing method embodiment.

具体地,该切换装置800可对应于根据本申请实施例的方法400至600中的UE,该切换装置800可以包括用于执行图4中的方法400至图6中的方法600中的UE执行的方法的模块。并且,该切换装置800中的各模块和上述其他操作和/或功能分别为了实现图4中的方法400、图5中的方法500、图6中的方法600的相应流程。应理解,各模块执行上述相应步骤的具体过程在上述方法实施例中已经详细说明,为了简洁,在此不再赘述。Specifically, the switching device 800 may correspond to the UE in the methods 400 to 600 according to the embodiment of the present application, and the switching device 800 may include a UE for performing the method 400 in FIG. 4 to the method 600 in FIG. 6. Method module. In addition, each module in the switching device 800 and the other operations and / or functions described above are respectively for implementing the corresponding processes of the method 400 in FIG. 4, the method 500 in FIG. 5, and the method 600 in FIG. 6. It should be understood that the specific process of each module performing the above corresponding steps has been described in detail in the foregoing method embodiment, and for the sake of brevity, it will not be repeated here.

在另一种可能的设计中,该切换装置800可以是上文方法实施例中的移动性管理实体,也可以是用于实现上文方法实施例中移动性管理实体的功能的芯片。In another possible design, the switching device 800 may be the mobility management entity in the foregoing method embodiment, or may be a chip used to implement the functions of the mobility management entity in the foregoing method embodiment.

具体地,该切换装置800可对应于根据本申请实施例的方法400至600中的移动性管理实体,该切换装置800可以包括用于执行图4中的方法400至图6中的方法600中的移动性管理实体执行的方法的模块。并且,该切换装置800中的各单元和上述其他操作和/或功能分别为了实现图4中的方法400、图5中的方法500、图6中的方法600的相应流程。应理解,各模块执行上述相应步骤的具体过程在上述方法实施例中已经详细说明,为了简洁,在此不再赘述。Specifically, the switching device 800 may correspond to the mobility management entity in the methods 400 to 600 according to the embodiment of the present application. The switching device 800 may include a method for performing the method 400 in FIG. 4 to the method 600 in FIG. 6. A module of methods performed by a mobility management entity. In addition, each unit in the switching device 800 and the other operations and / or functions described above are respectively used to implement corresponding processes of the method 400 in FIG. 4, the method 500 in FIG. 5, and the method 600 in FIG. 6. It should be understood that the specific process of each module performing the above corresponding steps has been described in detail in the foregoing method embodiment, and for the sake of brevity, it will not be repeated here.

在另一种可能的设计中,该切换装置800可以是上文方法实施例中的接入和移动管理网元,也可以是用于实现上文方法实施例中接入和移动管理网元的功能的芯片。In another possible design, the switching device 800 may be the access and mobility management network element in the foregoing method embodiment, or may be used to implement the access and mobility management network element in the method embodiment above. Functional chip.

具体地,该切换装置800可对应于根据本申请实施例的方法400至600中的接入和移动管理网元,该切换装置800可以包括用于执行图4中的方法400至图6中的方法600中的接入和移动管理网元执行的方法的模块。并且,该切换装置800中的各模块和上述其他操作和/或功能分别为了实现图4中的方法400、图5中的方法500、图6中的方法600的相应流程。应理解,各模块执行上述相应步骤的具体过程在上述方法实施例中已经详细说 明,为了简洁,在此不再赘述。Specifically, the switching device 800 may correspond to the access and mobility management network elements in the methods 400 to 600 according to the embodiments of the present application. The switching device 800 may include a method for performing the methods 400 to 6 in FIG. 4. Module of the method performed by the access and mobility management network element in method 600. In addition, each module in the switching device 800 and the other operations and / or functions described above are respectively for implementing the corresponding processes of the method 400 in FIG. 4, the method 500 in FIG. 5, and the method 600 in FIG. 6. It should be understood that the specific process of each module performing the above corresponding steps has been described in detail in the above method embodiment, and for the sake of brevity, it will not be repeated here.

在另一种可能的设计中,该切换装置800可以是上文方法实施例中的移动交换中心,也可以是用于实现上文方法实施例中移动交换中心的功能的芯片。In another possible design, the switching device 800 may be the mobile switching center in the foregoing method embodiment, or may be a chip used to implement the functions of the mobile switching center in the foregoing method embodiment.

具体地,该切换装置800可对应于根据本申请实施例的方法400至600中的移动交换中心,该切换装置800可以包括用于执行图4中的方法400至图6中的方法600中的移动交换中心执行的方法的模块。并且,该切换装置800中的各模块和上述其他操作和/或功能分别为了实现图4中的方法400、图5中的方法500、图6中的方法600的相应流程。应理解,各模块执行上述相应步骤的具体过程在上述方法实施例中已经详细说明,为了简洁,在此不再赘述。Specifically, the switching device 800 may correspond to the mobile switching center in the methods 400 to 600 according to the embodiment of the present application, and the switching device 800 may include a method for performing the method 400 in FIG. 4 to the method 600 in FIG. 6. A module of a method performed by a mobile switching center. In addition, each module in the switching device 800 and the other operations and / or functions described above are respectively for implementing the corresponding processes of the method 400 in FIG. 4, the method 500 in FIG. 5, and the method 600 in FIG. 6. It should be understood that the specific process of each module performing the above corresponding steps has been described in detail in the foregoing method embodiment, and for the sake of brevity, it will not be repeated here.

在另一种可能的设计中,该切换装置800可以是上文方法实施例中的无线网络子系统网元,也可以是用于实现上文方法实施例中无线网络子系统网元的功能的芯片。In another possible design, the switching device 800 may be the wireless network subsystem network element in the foregoing method embodiment, or may be used to implement the functions of the wireless network subsystem network element in the method embodiment above. chip.

具体地,该切换装置800可对应于根据本申请实施例的方法400至600中的无线网络子系统网元,该切换装置800可以包括用于执行图4中的方法400至图6中的方法600中的无线网络子系统网元执行的方法的模块。并且,该切换装置800中的各模块和上述其他操作和/或功能分别为了实现图4中的方法400、图5中的方法500、图6中的方法600的相应流程。应理解,各模块执行上述相应步骤的具体过程在上述方法实施例中已经详细说明,为了简洁,在此不再赘述。Specifically, the switching device 800 may correspond to the wireless network subsystem network element in the methods 400 to 600 according to the embodiment of the present application, and the switching device 800 may include a method for performing the method 400 in FIG. 4 to the method in FIG. 6. 600. A module of a method performed by a wireless network subsystem network element in 600. In addition, each module in the switching device 800 and the other operations and / or functions described above are respectively for implementing the corresponding processes of the method 400 in FIG. 4, the method 500 in FIG. 5, and the method 600 in FIG. 6. It should be understood that the specific process of each module performing the above corresponding steps has been described in detail in the foregoing method embodiment, and for the sake of brevity, it will not be repeated here.

应理解,各模块执行上述相应步骤的具体过程在上述方法实施例中已经详细说明,为了简洁,在此不再赘述。It should be understood that the specific process of each module performing the above corresponding steps has been described in detail in the foregoing method embodiment, and for the sake of brevity, it will not be repeated here.

根据本申请实施例提供的方法,本申请还提供一种计算机程序产品,该计算机程序产品包括:计算机程序代码,当该计算机程序代码在计算机上运行时,使得该计算机执行图4至图6所示实施例中任意一个实施例的切换方法。According to the method provided in the embodiment of the present application, the present application also provides a computer program product, the computer program product includes: computer program code, when the computer program code is run on a computer, the computer executes the operations shown in FIG. 4 to FIG. 6 The switching method of any one of the embodiments is shown.

根据本申请实施例提供的方法,本申请还提供一种计算机可读介质,该计算机可读介质存储有程序代码,当该程序代码在计算机上运行时,使得该计算机执行图4至图6所示实施例中任意一个实施例的切换方法。According to the method provided in the embodiment of the present application, the present application further provides a computer-readable medium, where the computer-readable medium stores program code, and when the program code runs on the computer, the computer executes the operations shown in FIG. 4 to FIG. 6. The switching method of any one of the embodiments is shown.

根据本申请实施例提供的方法,本申请还提供一种系统,其包括前述的UE、移动性管理实体、接入和移动管理网元、移动交换中心以及无线网络子系统网元。According to the method provided in the embodiment of the present application, the present application further provides a system including the foregoing UE, a mobility management entity, an access and mobility management network element, a mobile switching center, and a wireless network subsystem network element.

在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机指令时,全部或部分地产生按照本申请实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(digital subscriber line,DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质(例如,软盘、硬盘、磁带)、光介质(例如,高密度数字视频光盘(digital video disc,DVD))、或者半导体介质(例如,固态硬 盘(solid state disk,SSD))等。In the above embodiments, it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented in software, it may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When the computer instructions are loaded and executed on a computer, the processes or functions according to the embodiments of the present application are generated in whole or in part. The computer may be a general-purpose computer, a special-purpose computer, a computer network, or other programmable devices. The computer instructions may be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be from a website site, computer, server, or data center Transmission by wire (such as coaxial cable, optical fiber, digital subscriber line (DSL)) or wireless (such as infrared, wireless, microwave, etc.) to another website site, computer, server, or data center. The computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server, a data center, and the like that includes one or more available medium integration. The usable medium may be a magnetic medium (for example, a floppy disk, a hard disk, a magnetic tape), an optical medium (for example, a high-density digital video disc (DVD)), or a semiconductor medium (for example, a solid state disk (solid state disk, SSD)) and so on.

上述各个装置实施例中各网元可以和方法实施例中的各网元完全对应,由相应的模块或单元执行相应的步骤,例如收发单元(收发器)执行方法实施例中接收或发送的步骤,除发送、接收外的其它步骤可以由处理单元(处理器)执行。具体单元的功能可以参考相应的方法实施例。其中,处理器可以为一个或多个。Each network element in each of the foregoing device embodiments may completely correspond to each network element in the method embodiment, and the corresponding module or unit performs the corresponding steps, for example, the transceiver unit (transceiver) performs the steps of receiving or sending in the method embodiment. The steps other than sending and receiving can be performed by a processing unit (processor). For the function of the specific unit, refer to the corresponding method embodiment. Among them, there may be one or more processors.

本申请中,“至少一个”是指一个或者多个,“多个”是指两个或两个以上。“和/或”,描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B的情况,其中A、B可以是单数或者复数。字符“/”一般表示前后关联对象是一种“或”的关系。“以下至少一项(个)”或其类似表达,是指的这些项中的任意组合,包括单项(个)或复数项(个)的任意组合。例如,a、b或c中的至少一项(个),可以表示:a,或b,或c,或a和b,或a和c,或b和c,或a、b和c,其中a、b或c分别可以是单个,也可以是多个。In the present application, "at least one" means one or more, and "multiple" means two or more. "And / or" describes the association relationship of related objects, and indicates that there can be three kinds of relationships. For example, A and / or B can indicate: A exists alone, A and B exist simultaneously, and B exists alone, where A, B can be singular or plural. The character "/" generally indicates that the related objects are an "or" relationship. "At least one or more of the following" or similar expressions refers to any combination of these items, including any combination of single or plural items. For example, at least one or more of a, b, or c may represent: a, or b, or c, or a and b, or a and c, or b and c, or a, b, and c, where a, b, or c may be single or multiple.

应理解,说明书通篇中提到的“一个实施例”或“一实施例”意味着与实施例有关的特定特征、结构或特性包括在本申请的至少一个实施例中。因此,在整个说明书各处出现的“在一个实施例中”或“在一实施例中”未必一定指相同的实施例。此外,这些特定的特征、结构或特性可以任意适合的方式结合在一个或多个实施例中。应理解,在本申请的各种实施例中,上述各过程的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本发明实施例的实施过程构成任何限定。It should be understood that “an embodiment” or “an embodiment” mentioned throughout the specification means that a particular feature, structure, or characteristic related to the embodiment is included in at least one embodiment of the present application. Thus, the appearances of "in one embodiment" or "in an embodiment" appearing throughout the specification are not necessarily referring to the same embodiment. Furthermore, the particular features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. It should be understood that, in the various embodiments of the present application, the size of the sequence numbers of the above processes does not mean the order of execution. The execution order of each process should be determined by its function and internal logic, and should not deal with the embodiments of the present invention. The implementation process constitutes any limitation.

在本说明书中使用的术语“模块”、“系统”等用于表示计算机相关的实体、硬件、固件、硬件和软件的组合、软件、或执行中的软件。例如,部件可以是但不限于,在处理器上运行的进程、处理器、对象、可执行文件、执行线程、程序和/或计算机。通过图示,在计算设备上运行的应用和计算设备都可以是部件。一个或多个部件可驻留在进程和/或执行线程中,部件可位于一个计算机上和/或分布在2个或更多个计算机之间。此外,这些部件可从在上面存储有各种数据结构的各种计算机可读介质执行。部件可例如根据具有一个或多个数据分组(例如来自与本地系统、分布式系统和/或网络间的另一部件交互的二个部件的数据,例如通过信号与其它系统交互的互联网)的信号通过本地和/或远程进程来通信。The terms "module", "system", and the like used in this specification are used to indicate computer-related entities, hardware, firmware, a combination of hardware and software, software, or software in execution. For example, a component may be, but is not limited to, a process running on a processor, a processor, an object, an executable, a thread of execution, a program, and / or a computer. By way of illustration, both an application running on a computing device and a computing device can be components. One or more components can reside within a process and / or thread of execution, and a component can be localized on one computer and / or distributed between 2 or more computers. In addition, these components can execute from various computer readable media having various data structures stored thereon. A component may, for example, be based on a signal having one or more data packets (e.g., data from two components that interact with another component between a local system, a distributed system, and / or a network, such as the Internet that interacts with other systems through signals) Communicate via local and / or remote processes.

本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。Those of ordinary skill in the art may realize that the units and algorithm steps of each example described in connection with the embodiments disclosed herein can be implemented by electronic hardware, or a combination of computer software and electronic hardware. Whether these functions are performed in hardware or software depends on the specific application and design constraints of the technical solution. Professional technicians can use different methods to implement the described functions for each specific application, but such implementation should not be considered to be beyond the scope of this application.

所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。Those skilled in the art can clearly understand that, for the convenience and brevity of description, the specific working processes of the systems, devices, and units described above can refer to the corresponding processes in the foregoing method embodiments, and are not repeated here.

在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间 接耦合或通信连接,可以是电性,机械或其它的形式。In the several embodiments provided in this application, it should be understood that the disclosed systems, devices, and methods may be implemented in other ways. For example, the device embodiments described above are only schematic. For example, the division of the unit is only a logical function division. In actual implementation, there may be another division manner. For example, multiple units or components may be combined or Can be integrated into another system, or some features can be ignored or not implemented. In addition, the displayed or discussed mutual coupling or direct coupling or communication connection may be through some interfaces, the indirect coupling or communication connection of the device or unit, and may be electrical, mechanical or other forms.

所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。The units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, may be located in one place, or may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the objective of the solution of this embodiment.

另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。In addition, each functional unit in each embodiment of the present application may be integrated into one processing unit, or each of the units may exist separately physically, or two or more units may be integrated into one unit.

所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(read-only memory,ROM)、随机存取存储器(random access memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。If the functions are implemented in the form of software functional units and sold or used as independent products, they can be stored in a computer-readable storage medium. Based on this understanding, the technical solution of this application is essentially a part that contributes to the existing technology or a part of the technical solution can be embodied in the form of a software product. The computer software product is stored in a storage medium, including Several instructions are used to cause a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the method described in the embodiments of the present application. The aforementioned storage media include: U disks, mobile hard disks, read-only memories (ROMs), random access memories (RAMs), magnetic disks or compact discs and other media that can store program codes .

以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以所述权利要求的保护范围为准。The above is only a specific implementation of this application, but the scope of protection of this application is not limited to this. Any person skilled in the art can easily think of changes or replacements within the technical scope disclosed in this application. It should be covered by the protection scope of this application. Therefore, the protection scope of this application shall be subject to the protection scope of the claims.

Claims (15)

一种切换方法,其特征在于,所述方法应用于终端设备从第三网络切换至第一网络之后返回第二网络的场景,所述方法包括:A switching method, characterized in that the method is applied to a scenario in which a terminal device returns to the second network after switching from the third network to the first network, and the method includes: 所述终端设备接收第一信息,所述第一信息包括指示所述终端设备从所述第一网络切换至所述第二网络的指示信息;Receiving, by the terminal device, first information, the first information including instruction information instructing the terminal device to switch from the first network to the second network; 当所述终端设备中存在原生的所述第三网络的安全上下文时,所述终端设备将所述第三网络的安全上下文设置为当前使用的安全上下文;When the terminal device has a native security context of the third network, the terminal device sets the security context of the third network to the currently used security context; 所述终端设备向所述第二网络中的移动性管理实体发送使用所述第三网络的安全上下文保护的跟踪区更新TAU请求信息。The terminal device sends to the mobility management entity in the second network the TAU request information using the tracking area protected by the security context of the third network. 根据权利要求1所述的方法,其特征在于,所述终端设备接收第一信息之后,还包括:The method according to claim 1, wherein after receiving the first information, the terminal device further comprises: 所述终端设备删除所述第一网络的安全上下文。Deleting, by the terminal device, the security context of the first network. 根据权利要求2所述的方法,其特征在于,所述跟踪区更新请求信息包括第五代5G全局唯一临时终端设备标识映射的第四代4G全局唯一临时终端设备标识和密钥集标识符。The method according to claim 2, wherein the tracking area update request information comprises a fourth-generation 4G globally unique temporary terminal equipment identifier and a key set identifier of a fifth-generation 5G globally unique temporary terminal equipment identifier mapping. 根据权利要求1至3中任一项所述的方法,其特征在于,所述第一信息为无线资源控制RRC释放信息。The method according to any one of claims 1 to 3, wherein the first information is radio resource control RRC release information. 根据权利要求1至4中任一项所述的方法,其特征在于,所述方法还包括:The method according to any one of claims 1 to 4, further comprising: 当所述终端设备中不存在原生的所述第三网络的安全上下文时,所述终端设备删除所述第一网络的安全上下文;When there is no native security context of the third network in the terminal device, the terminal device deletes the security context of the first network; 所述终端设备向移动性管理实体发送无完整性保护的跟踪区更新请求信息,以使所述移动性管理实体执行重鉴权流程。The terminal device sends the tracking area update request information without integrity protection to the mobility management entity, so that the mobility management entity performs a re-authentication process. 根据权利要求1至5中任一项所述的方法,其特征在于,所述第一网络为第三代3G/第二代2G网络,所述第二网络为第四代4G网络,所述第三网络为第五代5G网络。The method according to any one of claims 1 to 5, wherein the first network is a third-generation 3G / second-generation 2G network, the second network is a fourth-generation 4G network, and the The third network is the fifth generation 5G network. 一种终端设备,应用于从第三网络切换至第一网络之后返回第二网络的场景,其特征在于,包括:A terminal device, which is applied to a scenario in which a second network is returned after switching from a third network to a first network, is characterized in that it includes: 收发模块,用于接收第一信息,所述第一信息包括指示所述终端设备从所述第一网络切换至所述第二网络的指示信息;A transceiver module, configured to receive first information, where the first information includes instruction information instructing the terminal device to switch from the first network to the second network; 处理模块,用于当所述终端设备中存在原生的所述第三网络的安全上下文时,将所述第三网络的安全上下文设置为当前使用的安全上下文;A processing module, configured to set a security context of the third network to a currently used security context when a security context of the third network is native in the terminal device; 所述收发模块:还用于向所述第二网络中的移动性管理实体发送使用所述第三网络的安全上下文保护的跟踪区更新TAU请求信息。The transceiver module is further configured to send the TAU request information using the tracking area protected by the security context of the third network to a mobility management entity in the second network. 根据权利要求7所述的终端设备,其特征在于,所述收发模块接收第一信息之后,所述处理模块还用于:删除所述第一网络的安全上下文。The terminal device according to claim 7, wherein after the transceiver module receives the first information, the processing module is further configured to delete the security context of the first network. 根据权利要求7或8所述的终端设备,其特征在于,所述跟踪区更新请求信息包括第五代5G全局唯一临时终端设备标识映射的第四代4G全局唯一临时终端设备标识和密钥集标识符。The terminal device according to claim 7 or 8, wherein the tracking area update request information includes a fifth-generation 5G globally unique temporary terminal device identifier mapping of a fourth-generation 4G globally unique temporary terminal device identifier and a key set Identifier. 根据权利要求7至9中任一项所述的终端设备,其特征在于,所述第一信息为无线资源控制RRC释放信息。The terminal device according to any one of claims 7 to 9, wherein the first information is radio resource control RRC release information. 根据权利要求7至10中任一项所述的终端设备,其特征在于,所述处理模块还用于:The terminal device according to any one of claims 7 to 10, wherein the processing module is further configured to: 当所述终端设备中不存在原生的所述第三网络的安全上下文时,删除所述第一网络的安全上下文;Deleting the security context of the first network when there is no native security context of the third network in the terminal device; 所述收发模块还用于:向移动性管理实体发送无完整性保护的跟踪区更新请求信息,以使所述移动性管理实体执行重鉴权流程。The transceiver module is further configured to send tracking area update request information without integrity protection to the mobility management entity, so that the mobility management entity performs a re-authentication process. 根据权利要求7至11中任一项所述的终端设备,其特征在于,所述第一网络为第三代3G/第二代2G网络,所述第二网络为第四代4G网络,所述第三网络为第五代5G网络。The terminal device according to any one of claims 7 to 11, wherein the first network is a third-generation 3G / second-generation 2G network, and the second network is a fourth-generation 4G network. The third network is a fifth-generation 5G network. 一种终端设备,包括处理器和存储器,所述存储器用于存储指令,所述处理器用于读取所述存储器中存储的指令,使得所述终端设备实现上述权利要求1至6中任一项所述的方法。A terminal device includes a processor and a memory, the memory is used to store instructions, and the processor is used to read the instructions stored in the memory, so that the terminal device implements any one of the preceding claims 1 to 6 The method described. 一种计算机可读介质,其特征在于,包括计算机程序,当所述计算机程序在计算机上运行时,使得所述计算机执行如权利要求1至6中任一项所述的方法。A computer-readable medium, comprising a computer program, which, when the computer program runs on a computer, causes the computer to perform the method according to any one of claims 1 to 6. 一种计算机程序产品,其特征在于,所述计算机程序产品中包括计算机程序代码,其特征在于,当所述计算机程序代码在计算机上运行时,使得计算机实现上述权利要求1至6中任一项所述的方法。A computer program product, wherein the computer program product includes computer program code, and is characterized in that when the computer program code runs on a computer, the computer implements any one of claims 1 to 6 above. The method described.
PCT/CN2019/105508 2018-09-15 2019-09-12 Switching method and terminal device Ceased WO2020052613A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201811077476.XA CN110913393B (en) 2018-09-15 2018-09-15 Handover method and terminal device
CN201811077476.X 2018-09-15

Publications (1)

Publication Number Publication Date
WO2020052613A1 true WO2020052613A1 (en) 2020-03-19

Family

ID=69776759

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/105508 Ceased WO2020052613A1 (en) 2018-09-15 2019-09-12 Switching method and terminal device

Country Status (2)

Country Link
CN (1) CN110913393B (en)
WO (1) WO2020052613A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115776673A (en) * 2021-09-08 2023-03-10 大唐移动通信设备有限公司 Satellite communication system, authentication method and device
US20230156530A1 (en) * 2020-04-08 2023-05-18 Samsung Electronics Co., Ltd. Method and device for supporting voice handover in wireless communication system

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022027526A1 (en) * 2020-08-06 2022-02-10 Oppo广东移动通信有限公司 Access method, terminal device and network device
WO2022067815A1 (en) * 2020-09-30 2022-04-07 华为技术有限公司 Communication method and apparatus, and device
CN116250263A (en) * 2020-10-26 2023-06-09 华为技术有限公司 An information transmission method and device
CN112822736B (en) * 2021-01-05 2022-03-15 山东大学 An autonomous switching wireless communication system and method for robots
EP4044553A1 (en) * 2021-02-15 2022-08-17 Koninklijke Philips N.V. Method and device to provide a security level for communication
CN113115318B (en) * 2021-03-18 2022-08-12 中国联合网络通信集团有限公司 Communication control method and device
CN120019688A (en) * 2022-08-09 2025-05-16 上海诺基亚贝尔股份有限公司 Mobility between gateway devices in non-3GPP access
WO2025081395A1 (en) * 2023-10-18 2025-04-24 北京小米移动软件有限公司 Security context processing method, communication device and storage medium
WO2025175429A1 (en) * 2024-02-19 2025-08-28 Nokia Shanghai Bell Co., Ltd. Enhancements to support rrc_inactive state
WO2025156438A1 (en) * 2024-04-07 2025-07-31 Zte Corporation Techniques for security algorithm selection in handover from evolved packet system to 5g system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101771990A (en) * 2008-12-31 2010-07-07 华为技术有限公司 Key acquisition method, equipment and system
WO2016134536A1 (en) * 2015-02-28 2016-09-01 华为技术有限公司 Key generation method, device and system
US20170134996A1 (en) * 2014-06-23 2017-05-11 Nec Corporation Communication system adapted for key derivation during handover
CN108024296A (en) * 2016-11-04 2018-05-11 华为技术有限公司 Method, system and the mobile management network element of handover network

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101610506B (en) * 2008-06-16 2012-02-22 上海华为技术有限公司 Method and device for preventing network security out of sync
CN102025685B (en) * 2009-09-21 2013-09-11 华为技术有限公司 Authentication processing method and device
CN103781069B (en) * 2012-10-19 2017-02-22 华为技术有限公司 Bidirectional-authentication method, device and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101771990A (en) * 2008-12-31 2010-07-07 华为技术有限公司 Key acquisition method, equipment and system
US20170134996A1 (en) * 2014-06-23 2017-05-11 Nec Corporation Communication system adapted for key derivation during handover
WO2016134536A1 (en) * 2015-02-28 2016-09-01 华为技术有限公司 Key generation method, device and system
CN108024296A (en) * 2016-11-04 2018-05-11 华为技术有限公司 Method, system and the mobile management network element of handover network

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20230156530A1 (en) * 2020-04-08 2023-05-18 Samsung Electronics Co., Ltd. Method and device for supporting voice handover in wireless communication system
CN115776673A (en) * 2021-09-08 2023-03-10 大唐移动通信设备有限公司 Satellite communication system, authentication method and device

Also Published As

Publication number Publication date
CN110913393B (en) 2021-09-07
CN110913393A (en) 2020-03-24

Similar Documents

Publication Publication Date Title
CN110913393B (en) Handover method and terminal device
US11490436B2 (en) User plane relocation techniques in wireless communication systems
JP6950141B2 (en) Communication method and communication equipment
US10958692B2 (en) Security capability negotiation method, system, and equipment
US20220330361A1 (en) Method for establishing connection and obtaining relay service code and communications apparatus
CN108574969B (en) Connection processing method and device in multi-access scenario
US11523308B2 (en) Methods, apparatuses, and systems for voice service handover
CN101754191B (en) Method for handling handover security setting and related communication device
WO2020052531A1 (en) Method and apparatus for acquiring security context
WO2020029938A1 (en) Secure conversation method and device
CN102158855B (en) Method and communication device for handling continuity handover security of single wireless voice call
JP2020505816A (en) Communication method, access network device, core network device, and user device
WO2008023162A2 (en) Methods for call continuity telecommunication systems
US11576092B2 (en) Handover handling method and apparatus
US10602404B2 (en) Data offloading method and base station
WO2020001226A1 (en) Redirection method, communication system, and communication device
US20220141664A1 (en) Data transmission method and apparatus in network slice architecture
CN116671085A (en) Apparatus and method for deleting new radio cell not supporting new radio voice from measurement report
WO2022007639A1 (en) Application management method and apparatus
CN102790965B (en) Changing method, base station, subscriber equipment and mobile management entity
CN102413461B (en) Method for negotiating safety capacity
CN112789896B (en) Method and device for switching transmission path
WO2020233496A1 (en) Secure session method and apparatus

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19860143

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19860143

Country of ref document: EP

Kind code of ref document: A1