WO2022021413A1 - Key generation method and apparatus, and terminal device and network device - Google Patents
Key generation method and apparatus, and terminal device and network device Download PDFInfo
- Publication number
- WO2022021413A1 WO2022021413A1 PCT/CN2020/106391 CN2020106391W WO2022021413A1 WO 2022021413 A1 WO2022021413 A1 WO 2022021413A1 CN 2020106391 W CN2020106391 W CN 2020106391W WO 2022021413 A1 WO2022021413 A1 WO 2022021413A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- cell group
- secondary cell
- counter information
- information
- configuration information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
Definitions
- the embodiments of the present application relate to the field of mobile communication technologies, and in particular, to a method and apparatus for generating a key, a terminal device, and a network device.
- the secondary key count (Secondary Key-Counter, SK-Counter) is configured in the Radio Resource Control (Radio Resource Control, RRC) recovery message, and the SK-Counter is also configured in the secondary cell group configuration information (mrdc-SecondaryCellGroup) , how to use or how to configure these two SK-Counters is a problem that needs to be clarified.
- RRC Radio Resource Control
- Embodiments of the present application provide a method and device for generating a key, a terminal device, and a network device.
- the terminal device receives an RRC recovery message sent by the MN, where the RRC recovery message carries the first SK-Counter information and/or the configuration information of the secondary cell group;
- the terminal device determines target SK-Counter information based on the RRC recovery message, and uses the target SK-Counter information to calculate the key of the secondary cell group.
- the MN sends an RRC recovery message to the terminal device, where the RRC recovery message is used to determine one SK-Counter information, and the one SK-Counter information is used by the terminal device to calculate the key of the secondary cell group.
- the key generation device provided by the embodiment of the present application is applied to a terminal device, and the device includes:
- a receiving unit configured to receive an RRC recovery message sent by the MN, where the RRC recovery message carries the first SK-Counter information and/or the configuration information of the secondary cell group;
- a determining unit configured to determine target SK-Counter information based on the RRC recovery message
- a processing unit configured to calculate the key of the secondary cell group by using the target SK-Counter information.
- the key generation device provided by the embodiment of the present application is applied to network equipment, and the device includes:
- a sending unit configured to send an RRC recovery message to the terminal device, where the RRC recovery message is used to determine one SK-Counter information, and the one SK-Counter information is used for the terminal device to calculate the key of the secondary cell group.
- the terminal device provided by the embodiments of the present application includes a processor and a memory.
- the memory is used to store a computer program
- the processor is used to call and run the computer program stored in the memory to execute the above key generation method.
- the network device provided by the embodiments of the present application includes a processor and a memory.
- the memory is used to store a computer program
- the processor is used to call and run the computer program stored in the memory to execute the above key generation method.
- the chip provided by the embodiment of the present application is used to implement the above key generation method.
- the chip includes: a processor for invoking and running a computer program from the memory, so that the device on which the chip is installed executes the above-mentioned key generation method.
- the computer-readable storage medium provided by the embodiment of the present application is used to store a computer program, and the computer program enables a computer to execute the above-mentioned key generation method.
- the computer program product provided by the embodiments of the present application includes computer program instructions, and the computer program instructions cause a computer to execute the above-mentioned key generation method.
- the computer program provided by the embodiment of the present application when it runs on a computer, causes the computer to execute the above-mentioned key generation method.
- the terminal device uses the SK-Counter configured on the network side, and on the other hand, how to configure the SK-Counter on the network side, so that the keys used by the terminal device and the network side are consistent. Provide guarantee for subsequent normal communication.
- FIG. 1 is a schematic diagram of a communication system architecture provided by an embodiment of the present application.
- FIG. 2 is a schematic flowchart 1 of a key generation method provided by an embodiment of the present application.
- FIG. 3 is a second schematic flowchart of a key generation method provided by an embodiment of the present application.
- FIG. 4 is a schematic flowchart three of a key generation method provided by an embodiment of the present application.
- FIG. 5 is a fourth schematic flowchart of a key generation method provided by an embodiment of the present application.
- FIG. 6 is a schematic structural diagram 1 of a key generation device provided by an embodiment of the present application.
- FIG. 7 is a schematic diagram 2 of the structure and composition of a key generation device provided by an embodiment of the present application.
- FIG. 8 is a schematic structural diagram of a communication device provided by an embodiment of the present application.
- FIG. 9 is a schematic structural diagram of a chip according to an embodiment of the present application.
- FIG. 10 is a schematic block diagram of a communication system provided by an embodiment of the present application.
- LTE Long Term Evolution
- FDD Frequency Division Duplex
- TDD Time Division Duplex
- 5G communication systems or future communication systems etc.
- the communication system 100 may include a network device 110, and the network device 110 may be a device that communicates with a terminal 120 (or referred to as a communication terminal, a terminal).
- the network device 110 may provide communication coverage for a particular geographic area and may communicate with terminals located within the coverage area.
- the network device 110 may be an evolved base station (Evolutional Node B, eNB or eNodeB) in an LTE system, or a wireless controller in a cloud radio access network (Cloud Radio Access Network, CRAN), or the
- the network device can be a mobile switching center, a relay station, an access point, a vehicle-mounted device, a wearable device, a hub, a switch, a bridge, a router, a network-side device in a 5G network, or a network device in a future communication system.
- the communication system 100 also includes at least one terminal 120 located within the coverage of the network device 110 .
- Terminal includes, but is not limited to, connections via wired lines, such as via Public Switched Telephone Networks (PSTN), Digital Subscriber Line (DSL), digital cable, direct cable connections; and/or another data connection/network; and/or via a wireless interface, e.g. for cellular networks, Wireless Local Area Networks (WLAN), digital television networks such as DVB-H networks, satellite networks, AM-FM A broadcast transmitter; and/or a device of another terminal configured to receive/transmit a communication signal; and/or an Internet of Things (IoT) device.
- PSTN Public Switched Telephone Networks
- DSL Digital Subscriber Line
- WLAN Wireless Local Area Networks
- WLAN Wireless Local Area Networks
- digital television networks such as DVB-H networks, satellite networks, AM-FM A broadcast transmitter
- IoT Internet of Things
- a terminal arranged to communicate through a wireless interface may be referred to as a "wireless communication terminal", “wireless terminal” or “mobile terminal”.
- mobile terminals include, but are not limited to, satellite or cellular telephones; Personal Communications System (PCS) terminals that may combine cellular radio telephones with data processing, facsimile, and data communication capabilities; may include radio telephones, pagers, Internet/Intranet PDAs with networking access, web browsers, memo pads, calendars, and/or Global Positioning System (GPS) receivers; and conventional laptop and/or palmtop receivers or others including radiotelephone transceivers electronic device.
- PCS Personal Communications System
- GPS Global Positioning System
- a terminal may refer to an access terminal, user equipment (UE), subscriber unit, subscriber station, mobile station, mobile station, remote station, remote terminal, mobile device, user terminal, terminal, wireless communication device, user agent, or user device.
- the access terminal may be a cellular phone, a cordless phone, a Session Initiation Protocol (SIP) phone, a Wireless Local Loop (WLL) station, a Personal Digital Assistant (PDA), a wireless communication Functional handheld devices, computing devices or other processing devices connected to wireless modems, in-vehicle devices, wearable devices, terminals in 5G networks or terminals in future evolved PLMNs, etc.
- SIP Session Initiation Protocol
- WLL Wireless Local Loop
- PDA Personal Digital Assistant
- direct terminal (Device to Device, D2D) communication may be performed between the terminals 120 .
- the 5G communication system or the 5G network may also be referred to as a new radio (New Radio, NR) system or an NR network.
- New Radio NR
- NR New Radio
- FIG. 1 exemplarily shows one network device and two terminals.
- the communication system 100 may include multiple network devices, and the coverage of each network device may include other numbers of terminals. This embodiment of the present application This is not limited.
- the communication system 100 may further include other network entities such as a network controller and a mobility management entity, which are not limited in this embodiment of the present application.
- network entities such as a network controller and a mobility management entity, which are not limited in this embodiment of the present application.
- a device having a communication function in the network/system may be referred to as a communication device.
- the communication device may include a network device 110 and a terminal 120 with a communication function, and the network device 110 and the terminal 120 may be the specific devices described above, which will not be repeated here;
- the device may further include other devices in the communication system 100, such as other network entities such as a network controller and a mobility management entity, which are not limited in this embodiment of the present application.
- 5G 3rd Generation Partnership Project
- eMBB Enhanced Mobile Broadband
- URLLC Ultra-Reliable Low-Latency Communications
- mMTC Massive Machine-Type Communications
- eMBB still aims at users' access to multimedia content, services and data, and its demand is growing rapidly.
- eMBB since eMBB may be deployed in different scenarios, such as indoor, urban, rural, etc., its capabilities and requirements are also quite different, so it cannot be generalized and must be analyzed in detail in combination with specific deployment scenarios.
- Typical applications of URLLC include: industrial automation, power automation, telemedicine operations (surgery), traffic safety assurance, etc.
- Typical features of mMTC include: high connection density, small data volume, latency-insensitive services, low cost and long service life of the module.
- E-UTRA-NR Dual Connectivity E-UTRA-NR Dual Connectivity
- EN-DC an LTE base station (eNB) acts as a master node (Master Node, MN), and an NR base station (gNB or en-gNB) acts as a secondary node (Secondary Node, SN), connecting to the EPC core network.
- eNB LTE base station
- gNB or en-gNB NR base station
- SN secondary node
- other DC modes will be supported, including NR and E-UTRA Dual Connectivity (NR-E-UTRA Dual Connectivity, NE-DC), 5GC-EN-DC, NR DC.
- the NR base station acts as the MN, and the eLTE base station acts as the SN, connecting to the 5GC core network.
- the eLTE base station acts as the MN, and the NR base station acts as the SN, connecting to the 5GC core network.
- the NR base station acts as the MN, and the NR base station acts as the SN, connecting to the 5GC core network.
- the cell group on the MN side is called the Master Cell Group (MCG), and the cell group on the SN side is called the Secondary Cell Group (SCG).
- MCG includes a primary cell (Primary Cell, PCell) and at least one secondary cell (Secondary Cell, SCell).
- SCG includes a special cell (Special Cell, SpCell), optionally, one or more SCells.
- MR-DC Multi-RAT Dual Connectivity
- RRC_INACTIVE Radio Resource Control
- RRC_INACTIVE Radio Resource Control
- RRC_IDLE state (referred to as idle state): mobility is based on terminal device cell selection and reselection, paging is initiated by the core network (Core Network, CN), and the paging area is configured by the CN. There is no terminal device context and no RRC connection on the base station side.
- RRC_CONNECTED state (referred to as connected (connected) state for short): there is an RRC connection, and a terminal device context exists on the base station side and the terminal device side.
- the network side knows that the location of the terminal equipment is at the specific cell level. Mobility is the mobility controlled by the network side. Unicast data can be transmitted between the terminal equipment and the base station.
- RRC_INACTIVE state (referred to as inactive state): mobility is based on terminal equipment cell selection reselection, there is a connection between CN-NR, terminal equipment context exists on a certain base station, paging is triggered by RAN , the RAN-based paging area is managed by the RAN, and the network side knows the location of the terminal device is based on the RAN-based paging area level.
- the terminal device When the terminal device configured with the MR-DC enters the inactive state, the terminal device keeps the configuration information of the MR-DC, but releases the SCG configuration when the terminal device initializes the RRC connection recovery.
- the indication information corresponds to "restoreSCG" in Table 1 below.
- the key of the SCG is generated based on the key of the MN and the secondary key count (Secondary Key-Counter, SK-Counter).
- the SK-Counter can also be called the SCG counter.
- NCC Next Hop Chaining Counter
- RRCRelease RRC Release
- the SK-Counter is configured in the RRC recovery message, and the SK-Counter is also configured in the secondary cell group configuration information (mrdc-SecondaryCellGroup). How to use or configure the two SK-Counters is a problem that needs to be clarified.
- FIG. 2 is a schematic flowchart 1 of a key generation method provided by an embodiment of the present application. As shown in FIG. 2 , the key generation method includes the following steps:
- Step 201 The terminal device receives an RRC recovery message sent by the MN, where the RRC recovery message carries first SK-Counter information and/or secondary cell group configuration information.
- the terminal device before the terminal device receives the RRC recovery message sent by the MN, the terminal device sends an RRC recovery request message to the MN.
- Step 202 The terminal device determines target SK-Counter information based on the RRC recovery message, and uses the target SK-Counter information to calculate the key of the secondary cell group.
- the determination of the target SK-Counter information may be implemented in the following manner.
- the terminal device determines the target SK-Counter The Counter information is the second SK-Counter information; or, 2) the terminal device determines that the target SK-Counter information is the first SK-Counter information.
- the terminal device determines the target SK-Counter The information is the first SK-Counter information.
- the terminal device determines that the target SK-Counter information is the first SK-Counter information.
- the terminal device determines that the target SK-Counter information is the second SK-Counter Counter information.
- the terminal device after the terminal device receives the RRC recovery message sent by the MN, or after the terminal device calculates the key of the secondary cell group, the terminal device sends an RRC recovery complete message to the MN.
- FIG. 3 is a second schematic flowchart of a key generation method provided by an embodiment of the present application. As shown in FIG. 3 , the key generation method includes the following steps:
- Step 301 The UE receives an RRC release (RRCRlease) message sent by the MN.
- RRC release RRCRlease
- the UE configured with MR-DC enters the inactive state after receiving the RRC release message.
- Step 302 The UE initiates an RRC connection recovery process, and sends an RRC recovery request (RRCResumeRequest) message to the MN.
- RRC recovery request RRCResumeRequest
- Step 303 The MN sends a secondary node modification request (S-NODE MODIFICATION REQUEST) message or a secondary node addition request (S-NODE ADDITION REQUEST) message to the SN.
- S-NODE MODIFICATION REQUEST a secondary node modification request
- S-NODE ADDITION REQUEST a secondary node addition request
- Step 304 The SN sends a secondary node modification request acknowledgment (S-NODE MODIFICATION REQUEST ACKNOWLEDGE) message or a secondary node addition request acknowledgment (S-NODE ADDITION REQUEST ACKNOWLEDGE) message to the MN.
- S-NODE MODIFICATION REQUEST ACKNOWLEDGE a secondary node modification request acknowledgment
- S-NODE ADDITION REQUEST ACKNOWLEDGE secondary node addition request acknowledgment
- Step 305 The UE receives an RRC resume (RRCResume) message sent by the MN, where the RRC resume message carries two information elements, the first SK-Counter and the mrdc-SecondaryCellGroup.
- the second SK-Counter is carried in the mrdc-SecondaryCellGroup information element.
- Step 306 The UE uses the second SK-Counter to calculate the key of the SCG and ignores the first SK-Counter. Alternatively, the UE uses the first SK-Counter to calculate the key of the SCG and ignores the second SK-Counter.
- Step 307 The UE sends an RRC recovery complete (RRCResumeComplte) message to the MN.
- FIG. 4 is a schematic flow chart 3 of a key generation method provided by an embodiment of the present application. As shown in FIG. 4 , the key generation method includes the following steps:
- Step 401 The MN sends an RRC recovery message to the terminal equipment, where the RRC recovery message is used to determine a piece of SK-Counter information, and the piece of SK-Counter information is used by the terminal equipment to calculate the key of the secondary cell group.
- the MN before the MN sends the RRC recovery message to the terminal device, the MN receives the RRC recovery request message sent by the terminal device. After the MN sends the RRC recovery message to the terminal device, the MN receives the RRC recovery complete message sent by the terminal device.
- the RRC recovery message is used to determine a piece of SK-Counter information. In this way, the ambiguity of the SK-Counter information for the terminal equipment can be avoided, and the SK-Counter information can be directly used to calculate the key of the secondary cell group.
- the network side can ensure that only one SK-Counter information can be determined in the RRC recovery message in the following manner.
- the RRC recovery message carries the first SK-Counter information.
- the RRC recovery message carries the first SK-Counter information.
- the network side carries the first SK-Counter in the RRC recovery message only when the KeyToUse information element of at least one RB is set to secondary and the mrdc-SecondaryCellGroup is not configured.
- the RRC recovery message carries the first SK-Counter information.
- the network side carries the first SK-Counter in the RRC recovery message only when the KeyToUse information element of at least one RB is set to secondary and the mrdc-SecondaryCellGroup is configured.
- the RRC recovery message carries the first SK-Counter information and the first secondary cell group configuration information, the first secondary cell group configuration information does not carry the second SK-Counter information, and the first secondary cell group configuration information is: The RRC reconfiguration message generated by the first secondary cell group.
- the RRC reconfiguration message includes second secondary cell group configuration information or secondary cell group configuration information, and in the case where the second secondary cell group or secondary cell group configuration information is configured, the second secondary cell group
- the RRC reconfiguration message where the configuration information or the secondary cell group configuration information is located does not carry the second SK-Counter information.
- the second SK-Counter information is not configured in the RRC reconfiguration message, that is, the second SK-Counter information is not configured in the RRC reconfiguration message.
- Two SK-Counter information is missing in the RRC reconfiguration message.
- the SN will not add the second SK-Counter information in the RRC reconfiguration message.
- the second SK-Counter information does not exist in the RRC reconfiguration message.
- the RRC recovery message carries secondary cell group configuration information, and the secondary cell group configuration information carries second SK-Counter information.
- FIG. 5 is a fourth schematic flowchart of a key generation method provided by an embodiment of the present application. As shown in FIG. 5 , the key generation method includes the following steps:
- Step 501 The UE receives an RRC release (RRCRlease) message sent by the MN.
- RRC release RRCRlease
- the UE configured with MR-DC enters the inactive state after receiving the RRC release message.
- Step 502 The UE initiates an RRC connection recovery process, and sends an RRC recovery request (RRCResumeRequest) message to the MN.
- RRC recovery request RRCResumeRequest
- Step 503 The MN sends a secondary node modification request (S-NODE MODIFICATION REQUEST) message or a secondary node addition request (S-NODE ADDITION REQUEST) message to the SN.
- S-NODE MODIFICATION REQUEST a secondary node modification request
- S-NODE ADDITION REQUEST a secondary node addition request
- the MN determines that in the RRC recovery message only when the KeyToUse information element of at least one bearer is set to secondary (that is, the key of at least one bearer is set to the secondary key) and the mrdc-SecondaryCellGroup information element is not configured Carry the first SK-Counter. or,
- the RRC reconfiguration message corresponds to the mrdc-SecondaryCellGroup information element, that is, the second SK-Counter does not exist in the mrdc-SecondaryCellGroup information element.
- Step 505 The SN sends a secondary node modification request acknowledgment (S-NODE MODIFICATION REQUEST ACKNOWLEDGE) message or a secondary node addition request acknowledgment (S-NODE ADDITION REQUEST ACKNOWLEDGE) message to the MN.
- S-NODE MODIFICATION REQUEST ACKNOWLEDGE a secondary node modification request acknowledgment
- S-NODE ADDITION REQUEST ACKNOWLEDGE secondary node addition request acknowledgment
- Step 506 The UE receives an RRC recovery (RRCResume) message sent by the MN, and the RRC recovery message carries the first SK-Counter, or carries two information elements of the first SK-Counter and mrdc-SecondaryCellGroup, wherein the mrdc-SecondaryCellGroup information element A second SK-Counte is not carried.
- RRC recovery RRCResume
- Step 507 The UE uses the first SK-Counter carried in the RRC recovery message to calculate the key of the SCG.
- Step 508 The UE sends an RRC recovery complete (RRCResumeComplte) message to the MN.
- FIG. 6 is a schematic structural diagram 1 of a key generation apparatus provided by an embodiment of the present application, which is applied to a terminal device. As shown in FIG. 6 , the key generation apparatus includes:
- a receiving unit 601 configured to receive an RRC recovery message sent by the MN, where the RRC recovery message carries first SK-Counter information and/or secondary cell group configuration information;
- a determining unit 602 configured to determine target SK-Counter information based on the RRC recovery message
- the processing unit 603 is configured to calculate the key of the secondary cell group by using the target SK-Counter information.
- the RRC recovery message carries the first SK-Counter information and the secondary cell group configuration information
- the secondary cell group configuration information carries the second SK-Counter information
- the determining unit 602 is configured to determine that the target SK-Counter information is the second SK-Counter information; or, determine that the target SK-Counter information is the first SK-Counter information.
- the determining unit 602 is configured to determine that the target SK-Counter information is the first SK-Counter information.
- the determining unit 602 is configured to determine that the target SK-Counter information is the first SK-Counter information.
- the RRC recovery message carries secondary cell group configuration information
- the secondary cell group configuration information carries the second SK-Counter information
- the determining unit 602 is configured to determine that the target SK-Counter information is the second SK-Counter information.
- FIG. 7 is a schematic structural diagram 2 of a key generation apparatus provided by an embodiment of the present application, which is applied to a network device. As shown in FIG. 7 , the key generation apparatus includes:
- the sending unit 701 is configured to send an RRC recovery message to a terminal device, where the RRC recovery message is used to determine one SK-Counter information, and the one SK-Counter information is used for the terminal device to calculate the key of the secondary cell group.
- the RRC recovery message carries the first SK-Counter information.
- the RRC recovery message carries the first SK-Counter information.
- the RRC recovery message carries the first SK-Counter information.
- the RRC recovery message carries first SK-Counter information and first secondary cell group configuration information, the first secondary cell group configuration information does not carry second SK-Counter information, and the first secondary cell group configuration information does not carry the second SK-Counter information.
- the configuration information of the first secondary cell group is an RRC reconfiguration message generated by the first secondary cell group.
- the RRC reconfiguration message includes second secondary cell group configuration information or secondary cell group configuration information, if the second secondary cell group or secondary cell group configuration information is configured, the The second secondary cell group configuration information or the RRC reconfiguration message where the secondary cell group configuration information is located does not carry the second SK-Counter information.
- the RRC recovery message carries secondary cell group configuration information
- the secondary cell group configuration information carries second SK-Counter information
- FIG. 8 is a schematic structural diagram of a communication device 800 provided by an embodiment of the present application.
- the communication device may be a terminal device or a network device.
- the communication device 800 shown in FIG. 8 includes a processor 810, and the processor 810 may call and run a computer program from a memory to implement the methods in the embodiments of the present application.
- the communication device 800 may further include a memory 820 .
- the processor 810 may call and run a computer program from the memory 820 to implement the methods in the embodiments of the present application.
- the memory 820 may be a separate device independent of the processor 810 , or may be integrated in the processor 810 .
- the communication device 800 may further include a transceiver 830, and the processor 810 may control the transceiver 830 to communicate with other devices, specifically, may send information or data to other devices, or receive other Information or data sent by a device.
- the transceiver 830 may include a transmitter and a receiver.
- the transceiver 830 may further include antennas, and the number of the antennas may be one or more.
- the communication device 800 may specifically be the network device in this embodiment of the present application, and the communication device 800 may implement the corresponding processes implemented by the network device in each method in the embodiment of the present application. For brevity, details are not repeated here. .
- the communication device 800 may specifically be the mobile terminal/terminal device in the embodiments of the present application, and the communication device 800 may implement the corresponding processes implemented by the mobile terminal/terminal device in each method in the embodiments of the present application. , and will not be repeated here.
- FIG. 9 is a schematic structural diagram of a chip according to an embodiment of the present application.
- the chip 900 shown in FIG. 9 includes a processor 910, and the processor 910 can call and run a computer program from a memory, so as to implement the method in the embodiment of the present application.
- the chip 900 may further include a memory 920 .
- the processor 910 may call and run a computer program from the memory 920 to implement the methods in the embodiments of the present application.
- the memory 920 may be a separate device independent of the processor 910 , or may be integrated in the processor 910 .
- the chip 900 may further include an input interface 930 .
- the processor 910 may control the input interface 930 to communicate with other devices or chips, and specifically, may acquire information or data sent by other devices or chips.
- the chip 900 may further include an output interface 940 .
- the processor 910 may control the output interface 940 to communicate with other devices or chips, and specifically, may output information or data to other devices or chips.
- the chip can be applied to the network device in the embodiment of the present application, and the chip can implement the corresponding processes implemented by the network device in each method of the embodiment of the present application, which is not repeated here for brevity.
- the chip can be applied to the mobile terminal/terminal device in the embodiments of the present application, and the chip can implement the corresponding processes implemented by the mobile terminal/terminal device in each method of the embodiments of the present application.
- the chip can implement the corresponding processes implemented by the mobile terminal/terminal device in each method of the embodiments of the present application.
- the chip can implement the corresponding processes implemented by the mobile terminal/terminal device in each method of the embodiments of the present application.
- the chip mentioned in the embodiments of the present application may also be referred to as a system-on-chip, a system-on-chip, a system-on-chip, or a system-on-a-chip, or the like.
- FIG. 10 is a schematic block diagram of a communication system 1000 provided by an embodiment of the present application. As shown in FIG. 10 , the communication system 1000 includes a terminal device 1010 and a network device 1020 .
- the terminal device 1010 can be used to implement the corresponding functions implemented by the terminal device in the above method
- the network device 1020 can be used to implement the corresponding functions implemented by the network device in the above method. For brevity, details are not repeated here. .
- the processor in this embodiment of the present application may be an integrated circuit chip, which has a signal processing capability.
- each step of the above method embodiments may be completed by a hardware integrated logic circuit in a processor or an instruction in the form of software.
- the above-mentioned processor can be a general-purpose processor, a digital signal processor (Digital Signal Processor, DSP), an application specific integrated circuit (Application Specific Integrated Circuit, ASIC), an off-the-shelf programmable gate array (Field Programmable Gate Array, FPGA) or other available Programming logic devices, discrete gate or transistor logic devices, discrete hardware components.
- DSP Digital Signal Processor
- ASIC Application Specific Integrated Circuit
- FPGA Field Programmable Gate Array
- a general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
- the steps of the method disclosed in conjunction with the embodiments of the present application may be directly embodied as being executed and completed by a hardware decoding processor, or executed and completed by a combination of hardware and software modules in the decoding processor.
- the software module may be located in random access memory, flash memory, read-only memory, programmable read-only memory or electrically erasable programmable memory, registers and other storage media mature in the art.
- the storage medium is located in the memory, and the processor reads the information in the memory, and completes the steps of the above method in combination with its hardware.
- the memory in this embodiment of the present application may be a volatile memory or a non-volatile memory, or may include both volatile and non-volatile memory.
- the non-volatile memory may be a read-only memory (Read-Only Memory, ROM), a programmable read-only memory (Programmable ROM, PROM), an erasable programmable read-only memory (Erasable PROM, EPROM), an electrically programmable read-only memory (Erasable PROM, EPROM). Erase programmable read-only memory (Electrically EPROM, EEPROM) or flash memory.
- Volatile memory may be Random Access Memory (RAM), which acts as an external cache.
- RAM Static RAM
- DRAM Dynamic RAM
- SDRAM Synchronous DRAM
- SDRAM double data rate synchronous dynamic random access memory
- Double Data Rate SDRAM DDR SDRAM
- enhanced SDRAM ESDRAM
- synchronous link dynamic random access memory Synchlink DRAM, SLDRAM
- Direct Rambus RAM Direct Rambus RAM
- the memory in the embodiment of the present application may also be a static random access memory (static RAM, SRAM), a dynamic random access memory (dynamic RAM, DRAM), Synchronous dynamic random access memory (synchronous DRAM, SDRAM), double data rate synchronous dynamic random access memory (double data rate SDRAM, DDR SDRAM), enhanced synchronous dynamic random access memory (enhanced SDRAM, ESDRAM), synchronous connection Dynamic random access memory (synch link DRAM, SLDRAM) and direct memory bus random access memory (Direct Rambus RAM, DR RAM) and so on. That is, the memory in the embodiments of the present application is intended to include but not limited to these and any other suitable types of memory.
- Embodiments of the present application further provide a computer-readable storage medium for storing a computer program.
- the computer-readable storage medium can be applied to the network device in the embodiments of the present application, and the computer program enables the computer to execute the corresponding processes implemented by the network device in the various methods of the embodiments of the present application.
- the computer program enables the computer to execute the corresponding processes implemented by the network device in the various methods of the embodiments of the present application.
- the computer-readable storage medium can be applied to the mobile terminal/terminal device in the embodiments of the present application, and the computer program enables the computer to execute the corresponding processes implemented by the mobile terminal/terminal device in each method of the embodiments of the present application. , and are not repeated here for brevity.
- Embodiments of the present application also provide a computer program product, including computer program instructions.
- the computer program product can be applied to the network device in the embodiments of the present application, and the computer program instructions cause the computer to execute the corresponding processes implemented by the network device in each method of the embodiments of the present application. Repeat.
- the computer program product can be applied to the mobile terminal/terminal device in the embodiments of the present application, and the computer program instructions cause the computer to execute the corresponding processes implemented by the mobile terminal/terminal device in each method of the embodiments of the present application, For brevity, details are not repeated here.
- the embodiments of the present application also provide a computer program.
- the computer program can be applied to the network device in the embodiments of the present application.
- the computer program runs on the computer, the computer executes the corresponding processes implemented by the network device in each method of the embodiments of the present application. For the sake of brevity. , and will not be repeated here.
- the computer program may be applied to the mobile terminal/terminal device in the embodiments of the present application, and when the computer program is run on the computer, the mobile terminal/terminal device implements the various methods of the computer program in the embodiments of the present application.
- the corresponding process for the sake of brevity, will not be repeated here.
- the disclosed system, apparatus and method may be implemented in other manners.
- the apparatus embodiments described above are only illustrative.
- the division of the units is only a logical function division. In actual implementation, there may be other division methods.
- multiple units or components may be combined or Can be integrated into another system, or some features can be ignored, or not implemented.
- the shown or discussed mutual coupling or direct coupling or communication connection may be through some interfaces, indirect coupling or communication connection of devices or units, and may be in electrical, mechanical or other forms.
- the units described as separate components may or may not be physically separated, and components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution in this embodiment.
- each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically alone, or two or more units may be integrated into one unit.
- the functions, if implemented in the form of software functional units and sold or used as independent products, may be stored in a computer-readable storage medium.
- the technical solution of the present application can be embodied in the form of a software product in essence, or the part that contributes to the prior art or the part of the technical solution, and the computer software product is stored in a storage medium, including Several instructions are used to cause a computer device (which may be a personal computer, a server, or a network device, etc.) to execute all or part of the steps of the methods described in the various embodiments of the present application.
- the aforementioned storage medium includes: U disk, mobile hard disk, read-only memory (Read-Only Memory,) ROM, random access memory (Random Access Memory, RAM), magnetic disk or optical disk and other media that can store program codes .
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
本申请实施例涉及移动通信技术领域,具体涉及一种密钥生成方法及装置、终端设备、网络设备。The embodiments of the present application relate to the field of mobile communication technologies, and in particular, to a method and apparatus for generating a key, a terminal device, and a network device.
目前,无线资源控制(Radio Resource Control,RRC)恢复消息中配置了辅密钥计数(Secondary Key-Counter,SK-Counter),而辅小区组配置信息(mrdc-SecondaryCellGroup)中也配置了SK-Counter,如何使用或者如何配置这两个SK-Counter是个需要明确的问题。At present, the secondary key count (Secondary Key-Counter, SK-Counter) is configured in the Radio Resource Control (Radio Resource Control, RRC) recovery message, and the SK-Counter is also configured in the secondary cell group configuration information (mrdc-SecondaryCellGroup) , how to use or how to configure these two SK-Counters is a problem that needs to be clarified.
发明内容SUMMARY OF THE INVENTION
本申请实施例提供一种密钥生成方法及装置、终端设备、网络设备。Embodiments of the present application provide a method and device for generating a key, a terminal device, and a network device.
本申请实施例提供的密钥生成方法,包括:The key generation method provided by the embodiment of the present application includes:
终端设备接收MN发送的RRC恢复消息,所述RRC恢复消息携带第一SK-Counter信息和/或辅小区组配置信息;The terminal device receives an RRC recovery message sent by the MN, where the RRC recovery message carries the first SK-Counter information and/or the configuration information of the secondary cell group;
所述终端设备基于所述RRC恢复消息,确定目标SK-Counter信息,使用所述目标SK-Counter信息计算辅小区组的密钥。The terminal device determines target SK-Counter information based on the RRC recovery message, and uses the target SK-Counter information to calculate the key of the secondary cell group.
本申请实施例提供的密钥生成方法,包括:The key generation method provided by the embodiment of the present application includes:
MN向终端设备发送RRC恢复消息,所述RRC恢复消息用于确定一个SK-Counter信息,所述一个SK-Counter信息用于所述终端设备计算辅小区组的密钥。The MN sends an RRC recovery message to the terminal device, where the RRC recovery message is used to determine one SK-Counter information, and the one SK-Counter information is used by the terminal device to calculate the key of the secondary cell group.
本申请实施例提供的密钥生成装置,应用于终端设备,所述装置包括:The key generation device provided by the embodiment of the present application is applied to a terminal device, and the device includes:
接收单元,用于接收MN发送的RRC恢复消息,所述RRC恢复消息携带第一SK-Counter信息和/或辅小区组配置信息;a receiving unit, configured to receive an RRC recovery message sent by the MN, where the RRC recovery message carries the first SK-Counter information and/or the configuration information of the secondary cell group;
确定单元,用于基于所述RRC恢复消息,确定目标SK-Counter信息;a determining unit, configured to determine target SK-Counter information based on the RRC recovery message;
处理单元,用于使用所述目标SK-Counter信息计算辅小区组的密钥。A processing unit, configured to calculate the key of the secondary cell group by using the target SK-Counter information.
本申请实施例提供的密钥生成装置,应用于网络设备,所述装置包括:The key generation device provided by the embodiment of the present application is applied to network equipment, and the device includes:
发送单元,用于向终端设备发送RRC恢复消息,所述RRC恢复消息用于确定一个SK-Counter信息,所述一个SK-Counter信息用于所述终端设备计算辅小区组的密钥。A sending unit, configured to send an RRC recovery message to the terminal device, where the RRC recovery message is used to determine one SK-Counter information, and the one SK-Counter information is used for the terminal device to calculate the key of the secondary cell group.
本申请实施例提供的终端设备,包括处理器和存储器。该存储器用于存储计算机程序,该处理器用于调用并运行该存储器中存储的计算机程序,执行上述的密钥生成方法。The terminal device provided by the embodiments of the present application includes a processor and a memory. The memory is used to store a computer program, and the processor is used to call and run the computer program stored in the memory to execute the above key generation method.
本申请实施例提供的网络设备,包括处理器和存储器。该存储器用于存储计算机程序,该处理器用于调用并运行该存储器中存储的计算机程序,执行上述的密钥生成方法。The network device provided by the embodiments of the present application includes a processor and a memory. The memory is used to store a computer program, and the processor is used to call and run the computer program stored in the memory to execute the above key generation method.
本申请实施例提供的芯片,用于实现上述的密钥生成方法。The chip provided by the embodiment of the present application is used to implement the above key generation method.
具体地,该芯片包括:处理器,用于从存储器中调用并运行计算机程序,使得安 装有该芯片的设备执行上述的密钥生成方法。Specifically, the chip includes: a processor for invoking and running a computer program from the memory, so that the device on which the chip is installed executes the above-mentioned key generation method.
本申请实施例提供的计算机可读存储介质,用于存储计算机程序,该计算机程序使得计算机执行上述的密钥生成方法。The computer-readable storage medium provided by the embodiment of the present application is used to store a computer program, and the computer program enables a computer to execute the above-mentioned key generation method.
本申请实施例提供的计算机程序产品,包括计算机程序指令,该计算机程序指令使得计算机执行上述的密钥生成方法。The computer program product provided by the embodiments of the present application includes computer program instructions, and the computer program instructions cause a computer to execute the above-mentioned key generation method.
本申请实施例提供的计算机程序,当其在计算机上运行时,使得计算机执行上述的密钥生成方法。The computer program provided by the embodiment of the present application, when it runs on a computer, causes the computer to execute the above-mentioned key generation method.
通过上述技术方案,一方面,明确了终端设备如何使用网络侧配置的SK-Counter,另一方面,也明确了网络侧如何配置SK-Counter,从而使得终端设备和网络侧使用的密钥一致,为后续正常通信提供保障。Through the above technical solutions, on the one hand, it is clarified how the terminal device uses the SK-Counter configured on the network side, and on the other hand, how to configure the SK-Counter on the network side, so that the keys used by the terminal device and the network side are consistent. Provide guarantee for subsequent normal communication.
此处所说明的附图用来提供对本申请的进一步理解,构成本申请的一部分,本申请的示意性实施例及其说明用于解释本申请,并不构成对本申请的不当限定。在附图中:The drawings described herein are used to provide further understanding of the present application and constitute a part of the present application. The schematic embodiments and descriptions of the present application are used to explain the present application and do not constitute an improper limitation of the present application. In the attached image:
图1是本申请实施例提供的一种通信系统架构的示意性图;FIG. 1 is a schematic diagram of a communication system architecture provided by an embodiment of the present application;
图2是本申请实施例提供的密钥生成方法的流程示意图一;2 is a
图3是本申请实施例提供的密钥生成方法的流程示意图二;3 is a second schematic flowchart of a key generation method provided by an embodiment of the present application;
图4是本申请实施例提供的密钥生成方法的流程示意图三;FIG. 4 is a schematic flowchart three of a key generation method provided by an embodiment of the present application;
图5是本申请实施例提供的密钥生成方法的流程示意图四;5 is a fourth schematic flowchart of a key generation method provided by an embodiment of the present application;
图6是本申请实施例提供的密钥生成装置的结构组成示意图一;FIG. 6 is a schematic structural diagram 1 of a key generation device provided by an embodiment of the present application;
图7是本申请实施例提供的密钥生成装置的结构组成示意图二;FIG. 7 is a schematic diagram 2 of the structure and composition of a key generation device provided by an embodiment of the present application;
图8是本申请实施例提供的一种通信设备示意性结构图;FIG. 8 is a schematic structural diagram of a communication device provided by an embodiment of the present application;
图9是本申请实施例的芯片的示意性结构图;FIG. 9 is a schematic structural diagram of a chip according to an embodiment of the present application;
图10是本申请实施例提供的一种通信系统的示意性框图。FIG. 10 is a schematic block diagram of a communication system provided by an embodiment of the present application.
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。The technical solutions in the embodiments of the present application will be described below with reference to the accompanying drawings in the embodiments of the present application. Obviously, the described embodiments are part of the embodiments of the present application, not all of the embodiments. Based on the embodiments in the present application, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present application.
本申请实施例的技术方案可以应用于各种通信系统,例如:长期演进(Long Term Evolution,LTE)系统、LTE频分双工(Frequency Division Duplex,FDD)系统、LTE时分双工(Time Division Duplex,TDD)、系统、5G通信系统或未来的通信系统等。The technical solutions of the embodiments of the present application can be applied to various communication systems, such as: Long Term Evolution (Long Term Evolution, LTE) system, LTE Frequency Division Duplex (Frequency Division Duplex, FDD) system, LTE Time Division Duplex (Time Division Duplex) , TDD), systems, 5G communication systems or future communication systems, etc.
示例性的,本申请实施例应用的通信系统100如图1所示。该通信系统100可以包括网络设备110,网络设备110可以是与终端120(或称为通信终端、终端)通信的设备。网络设备110可以为特定的地理区域提供通信覆盖,并且可以与位于该覆盖区域内的终端进行通信。可选地,该网络设备110可以是LTE系统中的演进型基站(Evolutional Node B,eNB或eNodeB),或者是云无线接入网络(Cloud Radio Access Network,CRAN)中的无线控制器,或者该网络设备可以为移动交换中心、中继站、接入点、车载设备、可穿戴设备、集线器、交换机、网桥、路由器、5G网络中的网络侧设备或者未来通信系统中的网络设备等。Exemplarily, a
该通信系统100还包括位于网络设备110覆盖范围内的至少一个终端120。作为在此使用的“终端”包括但不限于经由有线线路连接,如经由公共交换电话网络(Public Switched Telephone Networks,PSTN)、数字用户线路(Digital Subscriber Line,DSL)、数字电缆、直接电缆连接;和/或另一数据连接/网络;和/或经由无线接口,如,针对蜂窝网络、无线局域网(Wireless Local Area Network,WLAN)、诸如DVB-H网络的数字电视网络、卫星网络、AM-FM广播发送器;和/或另一终端的被设置成接收/发送通信信号的装置;和/或物联网(Internet of Things,IoT)设备。被设置成通过无线接口通信的终端可以被称为“无线通信终端”、“无线终端”或“移动终端”。移动终端的示例包括但不限于卫星或蜂窝电话;可以组合蜂窝无线电电话与数据处理、传真以及数据通信能力的个人通信系统(Personal Communications System,PCS)终端;可以包括无线电电话、寻呼机、因特网/内联网接入、Web浏览器、记事簿、日历以及/或全球定位系统(Global Positioning System,GPS)接收器的PDA;以及常规膝上型和/或掌上型接收器或包括无线电电话收发器的其它电子装置。终端可以指接入终端、用户设备(User Equipment,UE)、用户单元、用户站、移动站、移动台、远方站、远程终端、移动设备、用户终端、终端、无线通信设备、用户代理或用户装置。接入终端可以是蜂窝电话、无绳电话、会话启动协议(Session Initiation Protocol,SIP)电话、无线本地环路(Wireless Local Loop,WLL)站、个人数字处理(Personal Digital Assistant,PDA)、具有无线通信功能的手持设备、计算设备或连接到无线调制解调器的其它处理设备、车载设备、可穿戴设备、5G网络中的终端或者未来演进的PLMN中的终端等。The
可选地,终端120之间可以进行终端直连(Device to Device,D2D)通信。Optionally, direct terminal (Device to Device, D2D) communication may be performed between the
可选地,5G通信系统或5G网络还可以称为新无线(New Radio,NR)系统或NR网络。Optionally, the 5G communication system or the 5G network may also be referred to as a new radio (New Radio, NR) system or an NR network.
图1示例性地示出了一个网络设备和两个终端,可选地,该通信系统100可以包括多个网络设备并且每个网络设备的覆盖范围内可以包括其它数量的终端,本申请实施例对此不做限定。FIG. 1 exemplarily shows one network device and two terminals. Optionally, the
可选地,该通信系统100还可以包括网络控制器、移动管理实体等其他网络实体,本申请实施例对此不作限定。Optionally, the
应理解,本申请实施例中网络/系统中具有通信功能的设备可称为通信设备。以图1示出的通信系统100为例,通信设备可包括具有通信功能的网络设备110和终端120,网络设备110和终端120可以为上文所述的具体设备,此处不再赘述;通信设备还可包括通信系统100中的其他设备,例如网络控制器、移动管理实体等其他网络实体,本申请实施例中对此不做限定。It should be understood that, in the embodiments of the present application, a device having a communication function in the network/system may be referred to as a communication device. Taking the
应理解,本文中术语“系统”和“网络”在本文中常被可互换使用。本文中术语“和/或”,仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。另外,本文中字符“/”,一般表示前后关联对象是一种“或”的关系。It should be understood that the terms "system" and "network" are often used interchangeably herein. The term "and/or" in this article is only an association relationship to describe the associated objects, indicating that there can be three kinds of relationships, for example, A and/or B, it can mean that A exists alone, A and B exist at the same time, and A and B exist independently B these three cases. In addition, the character "/" in this document generally indicates that the related objects are an "or" relationship.
为便于理解本申请实施例的技术方案,以下对本申请实施例相关的技术方案进行说明。In order to facilitate the understanding of the technical solutions of the embodiments of the present application, the following describes the technical solutions related to the embodiments of the present application.
随着人们对速率、延迟、高速移动性、能效的追求以及未来生活中业务的多样性、复杂性,为此第三代合作伙伴计划(3 rd Generation Partnership Project,3GPP)国际标准组织开始研发5G。5G的主要应用场景为:增强移动超宽带(enhanced Mobile Broadband,eMBB)、低时延高可靠通信(Ultra-Reliable Low-Latency Communications,URLLC)、大规模机器类通信(massive Machine-Type Communications,mMTC)。 With people's pursuit of speed, delay, high-speed mobility, energy efficiency, and the diversity and complexity of services in future life, the 3rd Generation Partnership Project (3GPP) international standards organization began to develop 5G . The main application scenarios of 5G are: Enhanced Mobile Broadband (eMBB), Ultra-Reliable Low-Latency Communications (URLLC), Massive Machine-Type Communications (mMTC) ).
一方面,eMBB仍然以用户获得多媒体内容、服务和数据为目标,其需求增长十分迅速。另一方面,由于eMBB可能部署在不同的场景中,例如室内,市区,农村等,其能力和需求的差别也比较大,所以不能一概而论,必须结合具体的部署场景详细分析。 URLLC的典型应用包括:工业自动化,电力自动化,远程医疗操作(手术),交通安全保障等。mMTC的典型特点包括:高连接密度,小数据量,时延不敏感业务,模块的低成本和长使用寿命等。On the one hand, eMBB still aims at users' access to multimedia content, services and data, and its demand is growing rapidly. On the other hand, since eMBB may be deployed in different scenarios, such as indoor, urban, rural, etc., its capabilities and requirements are also quite different, so it cannot be generalized and must be analyzed in detail in combination with specific deployment scenarios. Typical applications of URLLC include: industrial automation, power automation, telemedicine operations (surgery), traffic safety assurance, etc. Typical features of mMTC include: high connection density, small data volume, latency-insensitive services, low cost and long service life of the module.
在NR早期部署时,完整的NR覆盖很难获取,所以典型的网络覆盖是广域的LTE覆盖和NR的孤岛覆盖模式。而且大量的LTE部署在6GHz以下,可用于5G的6GHz以下频谱很少。所以NR必须研究6GHz以上的频谱应用,而高频段覆盖有限、信号衰落快。同时为了保护移动运营商前期在LTE投资,提出了LTE和NR之间紧耦合(tight interworking)的工作模式。In the early deployment of NR, complete NR coverage is difficult to obtain, so typical network coverage is wide-area LTE coverage and NR island coverage mode. And a lot of LTE is deployed in sub-6GHz, and there is very little sub-6GHz spectrum available for 5G. Therefore, NR must study the spectrum application above 6GHz, while the high frequency band has limited coverage and fast signal fading. At the same time, in order to protect the early investment of mobile operators in LTE, a working mode of tight interworking between LTE and NR is proposed.
双连接(Dual Connectivity,DC)架构 Dual Connectivity (DC) architecture
为了能够尽快实现5G网络部署和商业应用,第三代合作伙伴计划(3rd Generation Partnership Project,3GPP)首先完成第一个5G版本,即E-UTRA和NR双连接(E-UTRA-NR Dual Connectivity,EN-DC)。在EN-DC中,LTE基站(eNB)作为主节点(Master Node,MN),NR基站(gNB或en-gNB)作为辅节点(Secondary Node,SN),连接EPC核心网。在R15后期,将支持其他DC模式,包括NR和E-UTRA双连接(NR-E-UTRA Dual Connectivity,NE-DC),5GC-EN-DC,NR DC。在NE-DC中,NR基站作为MN,eLTE基站作为SN,连接5GC核心网。在5GC-EN-DC中,eLTE基站作为MN,NR基站作为SN,连接5GC核心网。在NR DC中,NR基站作为MN,NR基站作为SN,连接5GC核心网。In order to realize 5G network deployment and commercial applications as soon as possible, the 3rd Generation Partnership Project (3GPP) first completed the first 5G version, namely E-UTRA and NR Dual Connectivity (E-UTRA-NR Dual Connectivity, EN-DC). In EN-DC, an LTE base station (eNB) acts as a master node (Master Node, MN), and an NR base station (gNB or en-gNB) acts as a secondary node (Secondary Node, SN), connecting to the EPC core network. Later in R15, other DC modes will be supported, including NR and E-UTRA Dual Connectivity (NR-E-UTRA Dual Connectivity, NE-DC), 5GC-EN-DC, NR DC. In NE-DC, the NR base station acts as the MN, and the eLTE base station acts as the SN, connecting to the 5GC core network. In 5GC-EN-DC, the eLTE base station acts as the MN, and the NR base station acts as the SN, connecting to the 5GC core network. In NR DC, the NR base station acts as the MN, and the NR base station acts as the SN, connecting to the 5GC core network.
在双连接架构中,MN侧的小区组称为主小区组(Master Cell Group,MCG),SN侧的小区组称为辅小区组(Secondary Cell Group,SCG)。其中,MCG包括一个主小区(Primary Cell,PCell)和至少一个辅小区(Secondary Cell,SCell)。SCG包括一个特殊小区(Special Cell,SpCell),可选地,还包括一个或多个SCell。In the dual-connection architecture, the cell group on the MN side is called the Master Cell Group (MCG), and the cell group on the SN side is called the Secondary Cell Group (SCG). The MCG includes a primary cell (Primary Cell, PCell) and at least one secondary cell (Secondary Cell, SCell). The SCG includes a special cell (Special Cell, SpCell), optionally, one or more SCells.
本申请实施例的技术方案可以应用于双连接架构,如多RAT双连接(Multi-RAT Dual Connectivity,MR-DC)架构。The technical solutions of the embodiments of the present application may be applied to a dual-connectivity architecture, such as a Multi-RAT Dual Connectivity (MR-DC) architecture.
RRC状态 RRC status
5G为了降低空口信令和快速恢复无线连接,快速恢复数据业务的目的,定义了一个新的无线资源控制(Radio Resource Control,RRC)状态,即RRC非激活(RRC_INACTIVE)状态。这种状态有别于RRC空闲(RRC_IDLE)状态和RRC激活(RRC_ACTIVE)状态。其中,5G defines a new Radio Resource Control (RRC) state, that is, RRC_INACTIVE state, in order to reduce air interface signaling, quickly restore wireless connections, and quickly restore data services. This state is different from the RRC idle (RRC_IDLE) state and the RRC active (RRC_ACTIVE) state. in,
1)RRC_IDLE状态(简称为空闲(idle)态):移动性为基于终端设备的小区选择重选,寻呼由核心网(Core Network,CN)发起,寻呼区域由CN配置。基站侧不存在终端设备上下文,不存在RRC连接。1) RRC_IDLE state (referred to as idle state): mobility is based on terminal device cell selection and reselection, paging is initiated by the core network (Core Network, CN), and the paging area is configured by the CN. There is no terminal device context and no RRC connection on the base station side.
2)RRC_CONNECTED状态(简称为连接(connected)态):存在RRC连接,基站侧和终端设备侧存在终端设备上下文。网络侧知道终端设备的位置是具体小区级别的。移动性是网络侧控制的移动性。终端设备和基站之间可以传输单播数据。2) RRC_CONNECTED state (referred to as connected (connected) state for short): there is an RRC connection, and a terminal device context exists on the base station side and the terminal device side. The network side knows that the location of the terminal equipment is at the specific cell level. Mobility is the mobility controlled by the network side. Unicast data can be transmitted between the terminal equipment and the base station.
3)RRC_INACTIVE状态(简称为非激活(inactive)态):移动性为基于终端设备的小区选择重选,存在CN-NR之间的连接,终端设备上下文存在某个基站上,寻呼由RAN触发,基于RAN的寻呼区域由RAN管理,网络侧知道终端设备的位置是基于RAN的寻呼区域级别的。3) RRC_INACTIVE state (referred to as inactive state): mobility is based on terminal equipment cell selection reselection, there is a connection between CN-NR, terminal equipment context exists on a certain base station, paging is triggered by RAN , the RAN-based paging area is managed by the RAN, and the network side knows the location of the terminal device is based on the RAN-based paging area level.
当配置了MR-DC的终端设备进入非激活态时,终端设备保持MR-DC的配置信息,但是当终端设备初始化RRC连接恢复时会释放SCG配置。通过在RRC恢复(RRCResume)消息中添加一个指示信息,指示终端设备可以恢复之前的SCG配置,该指示信息对应于如下表1中的“restoreSCG”。When the terminal device configured with the MR-DC enters the inactive state, the terminal device keeps the configuration information of the MR-DC, but releases the SCG configuration when the terminal device initializes the RRC connection recovery. By adding an indication information in the RRC resume (RRCResume) message, indicating that the terminal device can restore the previous SCG configuration, the indication information corresponds to "restoreSCG" in Table 1 below.
表1Table 1
在MR-DC中,SCG的密钥是基于MN的密钥和辅密钥计数(Secondary Key-Counter,SK-Counter)生成,这里,SK-Counter也可以称为SCG counter。在RRC连接恢复过程中,终端设备会使用RRC释放(RRCRelease)消息中配置的下一跳链接计数(Next hop Chaining Counter,NCC)生成用于MSG4以及以后的所有上下行消息和数据的密钥。目前,RRC恢复消息中配置了SK-Counter,而辅小区组配置信息(mrdc-SecondaryCellGroup)中也配置了SK-Counter,如何使用或者如何配置这两个SK-Counter是个需要明确的问题。In MR-DC, the key of the SCG is generated based on the key of the MN and the secondary key count (Secondary Key-Counter, SK-Counter). Here, the SK-Counter can also be called the SCG counter. During the RRC connection recovery process, the terminal device will use the Next Hop Chaining Counter (NCC) configured in the RRC Release (RRCRelease) message to generate a key for MSG4 and all subsequent uplink and downlink messages and data. Currently, the SK-Counter is configured in the RRC recovery message, and the SK-Counter is also configured in the secondary cell group configuration information (mrdc-SecondaryCellGroup). How to use or configure the two SK-Counters is a problem that needs to be clarified.
图2是本申请实施例提供的密钥生成方法的流程示意图一,如图2所示,所述密钥生成方法包括以下步骤:FIG. 2 is a
步骤201:终端设备接收MN发送的RRC恢复消息,所述RRC恢复消息携带第一SK-Counter信息和/或辅小区组配置信息。Step 201: The terminal device receives an RRC recovery message sent by the MN, where the RRC recovery message carries first SK-Counter information and/or secondary cell group configuration information.
本申请实施例中,终端设备接收MN发送的RRC恢复消息之前,终端设备向MN发送RRC恢复请求消息。In this embodiment of the present application, before the terminal device receives the RRC recovery message sent by the MN, the terminal device sends an RRC recovery request message to the MN.
步骤202:所述终端设备基于所述RRC恢复消息,确定目标SK-Counter信息,使用所述目标SK-Counter信息计算辅小区组的密钥。Step 202: The terminal device determines target SK-Counter information based on the RRC recovery message, and uses the target SK-Counter information to calculate the key of the secondary cell group.
本申请实施例中,目标SK-Counter信息的确定可以通过以下方式来实现。In this embodiment of the present application, the determination of the target SK-Counter information may be implemented in the following manner.
●方式一●
所述RRC恢复消息携带第一SK-Counter信息和辅小区组配置信息,且所述辅小区组配置信息携带第二SK-Counter信息的情况下,1)所述终端设备确定所述目标SK-Counter信息为所述第二SK-Counter信息;或者,2)所述终端设备确定所述目标SK-Counter信息为所述第一SK-Counter信息。When the RRC recovery message carries the first SK-Counter information and the secondary cell group configuration information, and the secondary cell group configuration information carries the second SK-Counter information, 1) the terminal device determines the target SK-Counter The Counter information is the second SK-Counter information; or, 2) the terminal device determines that the target SK-Counter information is the first SK-Counter information.
●方式二●Method 2
所述RRC恢复消息携带第一SK-Counter信息和辅小区组配置信息,且所述辅小区组配置信息未携带第二SK-Counter信息的情况下,所述终端设备确定所述目标SK-Counter信息为所述第一SK-Counter信息。In the case where the RRC recovery message carries the first SK-Counter information and the secondary cell group configuration information, and the secondary cell group configuration information does not carry the second SK-Counter information, the terminal device determines the target SK-Counter The information is the first SK-Counter information.
●方式三●Method three
所述RRC恢复消息携带第一SK-Counter信息的情况下,所述终端设备确定所述目标SK-Counter信息为所述第一SK-Counter信息。In the case that the RRC recovery message carries the first SK-Counter information, the terminal device determines that the target SK-Counter information is the first SK-Counter information.
●方式四●Method four
所述RRC恢复消息携带辅小区组配置信息,且所述辅小区组配置信息携带第二SK-Counter信息的情况下,所述终端设备确定所述目标SK-Counter信息为所述第二SK-Counter信息。When the RRC recovery message carries secondary cell group configuration information, and the secondary cell group configuration information carries second SK-Counter information, the terminal device determines that the target SK-Counter information is the second SK-Counter Counter information.
本申请实施例中,终端设备接收MN发送的RRC恢复消息之后,或者,终端设备 计算出辅小区组的密钥之后,终端设备向MN发送RRC恢复完成消息。In the embodiment of the present application, after the terminal device receives the RRC recovery message sent by the MN, or after the terminal device calculates the key of the secondary cell group, the terminal device sends an RRC recovery complete message to the MN.
图3是本申请实施例提供的密钥生成方法的流程示意图二,如图3所示,所述密钥生成方法包括以下步骤:FIG. 3 is a second schematic flowchart of a key generation method provided by an embodiment of the present application. As shown in FIG. 3 , the key generation method includes the following steps:
步骤301:UE接收MN发送的RRC释放(RRCRelease)消息。Step 301: The UE receives an RRC release (RRCRlease) message sent by the MN.
这里,配置了MR-DC的UE接收到RRC释放消息后,进入非激活态。Here, the UE configured with MR-DC enters the inactive state after receiving the RRC release message.
步骤302:UE发起RRC连接恢复过程,向MN发送RRC恢复请求(RRCResumeRequest)消息。Step 302: The UE initiates an RRC connection recovery process, and sends an RRC recovery request (RRCResumeRequest) message to the MN.
步骤303:MN向SN发送辅节点修改请求(S-NODE MODIFICATION REQUEST)消息或者辅节点添加请求(S-NODE ADDITION REQUEST)消息。Step 303: The MN sends a secondary node modification request (S-NODE MODIFICATION REQUEST) message or a secondary node addition request (S-NODE ADDITION REQUEST) message to the SN.
步骤304:SN向MN发送辅节点修改请求确认(S-NODE MODIFICATION REQUEST ACKNOWLEDGE)消息或者辅节点添加请求确认(S-NODE ADDITION REQUEST ACKNOWLEDGE)消息。Step 304: The SN sends a secondary node modification request acknowledgment (S-NODE MODIFICATION REQUEST ACKNOWLEDGE) message or a secondary node addition request acknowledgment (S-NODE ADDITION REQUEST ACKNOWLEDGE) message to the MN.
步骤305:UE接收MN发送的RRC恢复(RRCResume)消息,该RRC恢复消息携带第一SK-Counter以及mrdc-SecondaryCellGroup两个信息单元。其中,mrdc-SecondaryCellGroup信息单元中携带第二SK-Counter。Step 305: The UE receives an RRC resume (RRCResume) message sent by the MN, where the RRC resume message carries two information elements, the first SK-Counter and the mrdc-SecondaryCellGroup. The second SK-Counter is carried in the mrdc-SecondaryCellGroup information element.
步骤306:UE使用第二SK-Counter计算SCG的密钥,并忽略第一SK-Counter。或者,UE使用第一SK-Counter计算SCG的密钥,并忽略第二SK-Counter。Step 306: The UE uses the second SK-Counter to calculate the key of the SCG and ignores the first SK-Counter. Alternatively, the UE uses the first SK-Counter to calculate the key of the SCG and ignores the second SK-Counter.
步骤307:UE向MN发送RRC恢复完成(RRCResumeComplte)消息。Step 307: The UE sends an RRC recovery complete (RRCResumeComplte) message to the MN.
图4是本申请实施例提供的密钥生成方法的流程示意图三,如图4所示,所述密钥生成方法包括以下步骤:FIG. 4 is a schematic flow chart 3 of a key generation method provided by an embodiment of the present application. As shown in FIG. 4 , the key generation method includes the following steps:
步骤401:MN向终端设备发送RRC恢复消息,所述RRC恢复消息用于确定一个SK-Counter信息,所述一个SK-Counter信息用于所述终端设备计算辅小区组的密钥。Step 401: The MN sends an RRC recovery message to the terminal equipment, where the RRC recovery message is used to determine a piece of SK-Counter information, and the piece of SK-Counter information is used by the terminal equipment to calculate the key of the secondary cell group.
本申请实施例中,MN向终端设备发送RRC恢复消息之前,MN接收终端设备发送的RRC恢复请求消息。MN向终端设备发送RRC恢复消息之后,MN接收终端设备发送的RRC恢复完成消息。In the embodiment of the present application, before the MN sends the RRC recovery message to the terminal device, the MN receives the RRC recovery request message sent by the terminal device. After the MN sends the RRC recovery message to the terminal device, the MN receives the RRC recovery complete message sent by the terminal device.
本申请实施例中,所述RRC恢复消息用于确定一个SK-Counter信息,如此,可以避免终端设备对于SK-Counter信息的歧义,直接利用该SK-Counter信息计算辅小区组的密钥。网络侧可以通过以下方式来保证RRC恢复消息只能确定一个SK-Counter信息。In the embodiment of the present application, the RRC recovery message is used to determine a piece of SK-Counter information. In this way, the ambiguity of the SK-Counter information for the terminal equipment can be avoided, and the SK-Counter information can be directly used to calculate the key of the secondary cell group. The network side can ensure that only one SK-Counter information can be determined in the RRC recovery message in the following manner.
●方式一●
所述RRC恢复消息中携带第一SK-Counter信息。The RRC recovery message carries the first SK-Counter information.
在一可选方式中,存在至少一个承载的密钥被设置为辅密钥,且辅小区组配置信息没有被配置的情况下,所述RRC恢复消息中携带所述第一SK-Counter信息。In an optional manner, in the case that the key of at least one bearer is set as the secondary key, and the secondary cell group configuration information is not configured, the RRC recovery message carries the first SK-Counter information.
具体地,网络侧只有在存在至少一个RB的KeyToUse信元设置为secondary,且mrdc-SecondaryCellGroup未被配置的情况下,才在RRC恢复消息中携带第一SK-Counter。Specifically, the network side carries the first SK-Counter in the RRC recovery message only when the KeyToUse information element of at least one RB is set to secondary and the mrdc-SecondaryCellGroup is not configured.
在另一可选方式中,存在至少一个承载的密钥被设置为辅密钥,或者辅小区组配置信息被配置的情况下,所述RRC恢复消息中携带所述第一SK-Counter信息。In another optional manner, in the case where the key of at least one bearer is set as the secondary key, or the secondary cell group configuration information is configured, the RRC recovery message carries the first SK-Counter information.
具体地,网络侧只有在存在至少一个RB的KeyToUse信元设置为secondary,且mrdc-SecondaryCellGroup被配置的情况下,才在RRC恢复消息中携带第一SK-Counter。Specifically, the network side carries the first SK-Counter in the RRC recovery message only when the KeyToUse information element of at least one RB is set to secondary and the mrdc-SecondaryCellGroup is configured.
●方式二●Method 2
所述RRC恢复消息中携带第一SK-Counter信息和第一辅小区组配置信息,所述第一辅小区组配置信息未携带第二SK-Counter信息,所述第一辅小区组配置信息为第一辅小区组生成的RRC重配置消息。The RRC recovery message carries the first SK-Counter information and the first secondary cell group configuration information, the first secondary cell group configuration information does not carry the second SK-Counter information, and the first secondary cell group configuration information is: The RRC reconfiguration message generated by the first secondary cell group.
具体地,所述RRC重配置消息包含第二辅小区组配置信息或者辅小区组配置信息,所述第二辅小区组或者辅小区组配置信息被配置的情况下,所述第二辅小区组配置信息或者辅小区组配置信息所在的RRC重配置消息未携带所述第二SK-Counter信息。Specifically, the RRC reconfiguration message includes second secondary cell group configuration information or secondary cell group configuration information, and in the case where the second secondary cell group or secondary cell group configuration information is configured, the second secondary cell group The RRC reconfiguration message where the configuration information or the secondary cell group configuration information is located does not carry the second SK-Counter information.
例如:网络侧在设置RRC重配置消息的时候,如果该RRC重配置消息中存在secondaryCellGroup信息或者mrdc-SecondaryCellGroupConfig信息,则该RRC重配置消息中不配置第二SK-Counter信息,也就是说,第二SK-Counter信息在该RRC重配置消息中是缺失的。For example, when the network side sets the RRC reconfiguration message, if there is secondaryCellGroup information or mrdc-SecondaryCellGroupConfig information in the RRC reconfiguration message, the second SK-Counter information is not configured in the RRC reconfiguration message, that is, the second SK-Counter information is not configured in the RRC reconfiguration message. Two SK-Counter information is missing in the RRC reconfiguration message.
例如:如果RRC重配置消息中存在secondaryCellGroup信息,则SN将不会在RRC重配置消息中添加第二SK-Counter信息。或者,如果RRC重配置消息由SN生成,则该RRC重配置消息中不存在第二SK-Counter信息。For example, if there is secondaryCellGroup information in the RRC reconfiguration message, the SN will not add the second SK-Counter information in the RRC reconfiguration message. Alternatively, if the RRC reconfiguration message is generated by the SN, the second SK-Counter information does not exist in the RRC reconfiguration message.
●方式三●Method three
所述RRC恢复消息中携带辅小区组配置信息,所述辅小区组配置信息携带第二SK-Counter信息。The RRC recovery message carries secondary cell group configuration information, and the secondary cell group configuration information carries second SK-Counter information.
图5是本申请实施例提供的密钥生成方法的流程示意图四,如图5所示,所述密钥生成方法包括以下步骤:FIG. 5 is a fourth schematic flowchart of a key generation method provided by an embodiment of the present application. As shown in FIG. 5 , the key generation method includes the following steps:
步骤501:UE接收MN发送的RRC释放(RRCRelease)消息。Step 501: The UE receives an RRC release (RRCRlease) message sent by the MN.
这里,配置了MR-DC的UE接收到RRC释放消息后,进入非激活态。Here, the UE configured with MR-DC enters the inactive state after receiving the RRC release message.
步骤502:UE发起RRC连接恢复过程,向MN发送RRC恢复请求(RRCResumeRequest)消息。Step 502: The UE initiates an RRC connection recovery process, and sends an RRC recovery request (RRCResumeRequest) message to the MN.
步骤503:MN向SN发送辅节点修改请求(S-NODE MODIFICATION REQUEST)消息或者辅节点添加请求(S-NODE ADDITION REQUEST)消息。Step 503: The MN sends a secondary node modification request (S-NODE MODIFICATION REQUEST) message or a secondary node addition request (S-NODE ADDITION REQUEST) message to the SN.
步骤504:Step 504:
A)当存在至少一个承载的KeyToUse信元设置为secondary(即至少一个承载的密钥被设置为辅密钥),且mrdc-SecondaryCellGroup信息单元没有被配置的情况下MN才确定在RRC恢复消息中携带第一SK-Counter。或者,A) The MN determines that in the RRC recovery message only when the KeyToUse information element of at least one bearer is set to secondary (that is, the key of at least one bearer is set to the secondary key) and the mrdc-SecondaryCellGroup information element is not configured Carry the first SK-Counter. or,
B)SN在设置RRC重配置(RRCReconfiguration)消息的时候,如果SCG或者mrdc-SecondaryCellGroup被配置,则在RRC重配置消息中不配置第二SK-Counter,也即第二SK-Counter被处理为缺失(absent)。B) When the SN sets the RRC reconfiguration (RRCReconfiguration) message, if the SCG or mrdc-SecondaryCellGroup is configured, the second SK-Counter is not configured in the RRC reconfiguration message, that is, the second SK-Counter is processed as missing (absent).
这里,RRC重配置消息对应于mrdc-SecondaryCellGroup信息单元,也就是说,mrdc-SecondaryCellGroup信息单元中不存在第二SK-Counter。Here, the RRC reconfiguration message corresponds to the mrdc-SecondaryCellGroup information element, that is, the second SK-Counter does not exist in the mrdc-SecondaryCellGroup information element.
步骤505:SN向MN发送辅节点修改请求确认(S-NODE MODIFICATION REQUEST ACKNOWLEDGE)消息或者辅节点添加请求确认(S-NODE ADDITION REQUEST ACKNOWLEDGE)消息。Step 505: The SN sends a secondary node modification request acknowledgment (S-NODE MODIFICATION REQUEST ACKNOWLEDGE) message or a secondary node addition request acknowledgment (S-NODE ADDITION REQUEST ACKNOWLEDGE) message to the MN.
步骤506:UE接收MN发送的RRC恢复(RRCResume)消息,该RRC恢复消息携带第一SK-Counter,或者携带第一SK-Counter和mrdc-SecondaryCellGroup两个信息单元,其中,mrdc-SecondaryCellGroup信息单元中未携带第二SK-Counte。Step 506: The UE receives an RRC recovery (RRCResume) message sent by the MN, and the RRC recovery message carries the first SK-Counter, or carries two information elements of the first SK-Counter and mrdc-SecondaryCellGroup, wherein the mrdc-SecondaryCellGroup information element A second SK-Counte is not carried.
步骤507:UE使用RRC恢复消息中携带的第一SK-Counter计算SCG的密钥。Step 507: The UE uses the first SK-Counter carried in the RRC recovery message to calculate the key of the SCG.
步骤508:UE向MN发送RRC恢复完成(RRCResumeComplte)消息。Step 508: The UE sends an RRC recovery complete (RRCResumeComplte) message to the MN.
图6是本申请实施例提供的密钥生成装置的结构组成示意图一,应用于终端设备,如图6所示,所述密钥生成装置包括:FIG. 6 is a schematic structural diagram 1 of a key generation apparatus provided by an embodiment of the present application, which is applied to a terminal device. As shown in FIG. 6 , the key generation apparatus includes:
接收单元601,用于接收MN发送的RRC恢复消息,所述RRC恢复消息携带第一SK-Counter信息和/或辅小区组配置信息;A receiving unit 601, configured to receive an RRC recovery message sent by the MN, where the RRC recovery message carries first SK-Counter information and/or secondary cell group configuration information;
确定单元602,用于基于所述RRC恢复消息,确定目标SK-Counter信息;a determining unit 602, configured to determine target SK-Counter information based on the RRC recovery message;
处理单元603,用于使用所述目标SK-Counter信息计算辅小区组的密钥。The processing unit 603 is configured to calculate the key of the secondary cell group by using the target SK-Counter information.
在一可选方式中,所述RRC恢复消息携带第一SK-Counter信息和辅小区组配置信息,且所述辅小区组配置信息携带第二SK-Counter信息的情况下,In an optional manner, when the RRC recovery message carries the first SK-Counter information and the secondary cell group configuration information, and the secondary cell group configuration information carries the second SK-Counter information,
所述确定单元602,用于确定所述目标SK-Counter信息为所述第二SK-Counter信息;或者,确定所述目标SK-Counter信息为所述第一SK-Counter信息。The determining unit 602 is configured to determine that the target SK-Counter information is the second SK-Counter information; or, determine that the target SK-Counter information is the first SK-Counter information.
在一可选方式中,所述RRC恢复消息携带第一SK-Counter信息和辅小区组配置信息,且所述辅小区组配置信息未携带第二SK-Counter信息的情况下,In an optional manner, when the RRC recovery message carries the first SK-Counter information and the secondary cell group configuration information, and the secondary cell group configuration information does not carry the second SK-Counter information,
所述确定单元602,用于确定所述目标SK-Counter信息为所述第一SK-Counter信息。The determining unit 602 is configured to determine that the target SK-Counter information is the first SK-Counter information.
在一可选方式中,所述RRC恢复消息携带第一SK-Counter信息的情况下,In an optional manner, in the case that the RRC recovery message carries the first SK-Counter information,
所述确定单元602,用于确定所述目标SK-Counter信息为所述第一SK-Counter信息。The determining unit 602 is configured to determine that the target SK-Counter information is the first SK-Counter information.
在一可选方式中,所述RRC恢复消息携带辅小区组配置信息,且所述辅小区组配置信息携带第二SK-Counter信息的情况下,In an optional manner, when the RRC recovery message carries secondary cell group configuration information, and the secondary cell group configuration information carries the second SK-Counter information,
所述确定单元602,用于确定所述目标SK-Counter信息为所述第二SK-Counter信息。The determining unit 602 is configured to determine that the target SK-Counter information is the second SK-Counter information.
本领域技术人员应当理解,本申请实施例的上述密钥生成装置的相关描述可以参照本申请实施例的密钥生成方法的相关描述进行理解。It should be understood by those skilled in the art that the relevant description of the above-mentioned key generation apparatus in the embodiment of the present application can be understood with reference to the relevant description of the key generation method in the embodiment of the present application.
图7是本申请实施例提供的密钥生成装置的结构组成示意图二,应用于网络设备,如图7所示,所述密钥生成装置包括:FIG. 7 is a schematic structural diagram 2 of a key generation apparatus provided by an embodiment of the present application, which is applied to a network device. As shown in FIG. 7 , the key generation apparatus includes:
发送单元701,用于向终端设备发送RRC恢复消息,所述RRC恢复消息用于确定一个SK-Counter信息,所述一个SK-Counter信息用于所述终端设备计算辅小区组的密钥。The sending unit 701 is configured to send an RRC recovery message to a terminal device, where the RRC recovery message is used to determine one SK-Counter information, and the one SK-Counter information is used for the terminal device to calculate the key of the secondary cell group.
在一可选方式中,所述RRC恢复消息中携带第一SK-Counter信息。In an optional manner, the RRC recovery message carries the first SK-Counter information.
在一可选方式中,存在至少一个承载的密钥被设置为辅密钥,且辅小区组配置信息没有被配置的情况下,所述RRC恢复消息中携带所述第一SK-Counter信息。In an optional manner, in the case that the key of at least one bearer is set as the secondary key, and the secondary cell group configuration information is not configured, the RRC recovery message carries the first SK-Counter information.
在一可选方式中,存在至少一个承载的密钥被设置为辅密钥,或者辅小区组配置信息被配置的情况下,所述RRC恢复消息中携带所述第一SK-Counter信息。In an optional manner, in the case where the key of at least one bearer is set as the secondary key, or the secondary cell group configuration information is configured, the RRC recovery message carries the first SK-Counter information.
在一可选方式中,所述RRC恢复消息中携带第一SK-Counter信息和第一辅小区组配置信息,所述第一辅小区组配置信息未携带第二SK-Counter信息,所述第一辅小区组配置信息为第一辅小区组生成的RRC重配置消息。In an optional manner, the RRC recovery message carries first SK-Counter information and first secondary cell group configuration information, the first secondary cell group configuration information does not carry second SK-Counter information, and the first secondary cell group configuration information does not carry the second SK-Counter information. The configuration information of the first secondary cell group is an RRC reconfiguration message generated by the first secondary cell group.
在一可选方式中,所述RRC重配置消息包含第二辅小区组配置信息或者辅小区组配置信息,如果所述第二辅小区组或者辅小区组配置信息被配置的情况下,所述第二辅小区组配置信息或者辅小区组配置信息所在的RRC重配置消息未携带所述第二SK-Counter信息。In an optional manner, the RRC reconfiguration message includes second secondary cell group configuration information or secondary cell group configuration information, if the second secondary cell group or secondary cell group configuration information is configured, the The second secondary cell group configuration information or the RRC reconfiguration message where the secondary cell group configuration information is located does not carry the second SK-Counter information.
在一可选方式中,所述RRC恢复消息中携带辅小区组配置信息,所述辅小区组配置信息携带第二SK-Counter信息。In an optional manner, the RRC recovery message carries secondary cell group configuration information, and the secondary cell group configuration information carries second SK-Counter information.
本领域技术人员应当理解,本申请实施例的上述密钥生成装置的相关描述可以参照本申请实施例的密钥生成方法的相关描述进行理解Those skilled in the art should understand that the relevant description of the above-mentioned key generation apparatus in the embodiment of the present application can be understood with reference to the relevant description of the key generation method in the embodiment of the present application
图8是本申请实施例提供的一种通信设备800示意性结构图。该通信设备可以是终端设备,也可以是网络设备,图8所示的通信设备800包括处理器810,处理器810可以从存储器中调用并运行计算机程序,以实现本申请实施例中的方法。FIG. 8 is a schematic structural diagram of a communication device 800 provided by an embodiment of the present application. The communication device may be a terminal device or a network device. The communication device 800 shown in FIG. 8 includes a
可选地,如图8所示,通信设备800还可以包括存储器820。其中,处理器810可以从存储器820中调用并运行计算机程序,以实现本申请实施例中的方法。Optionally, as shown in FIG. 8 , the communication device 800 may further include a
其中,存储器820可以是独立于处理器810的一个单独的器件,也可以集成在处理器810中。The
可选地,如图8所示,通信设备800还可以包括收发器830,处理器810可以控制该收发器830与其他设备进行通信,具体地,可以向其他设备发送信息或数据,或接收其他设备发送的信息或数据。Optionally, as shown in FIG. 8 , the communication device 800 may further include a transceiver 830, and the
其中,收发器830可以包括发射机和接收机。收发器830还可以进一步包括天线,天线的数量可以为一个或多个。Among them, the transceiver 830 may include a transmitter and a receiver. The transceiver 830 may further include antennas, and the number of the antennas may be one or more.
可选地,该通信设备800具体可为本申请实施例的网络设备,并且该通信设备800可以实现本申请实施例的各个方法中由网络设备实现的相应流程,为了简洁,在此不再赘述。Optionally, the communication device 800 may specifically be the network device in this embodiment of the present application, and the communication device 800 may implement the corresponding processes implemented by the network device in each method in the embodiment of the present application. For brevity, details are not repeated here. .
可选地,该通信设备800具体可为本申请实施例的移动终端/终端设备,并且该通信设备800可以实现本申请实施例的各个方法中由移动终端/终端设备实现的相应流程,为了简洁,在此不再赘述。Optionally, the communication device 800 may specifically be the mobile terminal/terminal device in the embodiments of the present application, and the communication device 800 may implement the corresponding processes implemented by the mobile terminal/terminal device in each method in the embodiments of the present application. , and will not be repeated here.
图9是本申请实施例的芯片的示意性结构图。图9所示的芯片900包括处理器910,处理器910可以从存储器中调用并运行计算机程序,以实现本申请实施例中的方法。FIG. 9 is a schematic structural diagram of a chip according to an embodiment of the present application. The chip 900 shown in FIG. 9 includes a processor 910, and the processor 910 can call and run a computer program from a memory, so as to implement the method in the embodiment of the present application.
可选地,如图9所示,芯片900还可以包括存储器920。其中,处理器910可以从存储器920中调用并运行计算机程序,以实现本申请实施例中的方法。Optionally, as shown in FIG. 9 , the chip 900 may further include a
其中,存储器920可以是独立于处理器910的一个单独的器件,也可以集成在处理器910中。The
可选地,该芯片900还可以包括输入接口930。其中,处理器910可以控制该输入接口930与其他设备或芯片进行通信,具体地,可以获取其他设备或芯片发送的信息或数据。Optionally, the chip 900 may further include an
可选地,该芯片900还可以包括输出接口940。其中,处理器910可以控制该输出接口940与其他设备或芯片进行通信,具体地,可以向其他设备或芯片输出信息或数据。Optionally, the chip 900 may further include an
可选地,该芯片可应用于本申请实施例中的网络设备,并且该芯片可以实现本申请实施例的各个方法中由网络设备实现的相应流程,为了简洁,在此不再赘述。Optionally, the chip can be applied to the network device in the embodiment of the present application, and the chip can implement the corresponding processes implemented by the network device in each method of the embodiment of the present application, which is not repeated here for brevity.
可选地,该芯片可应用于本申请实施例中的移动终端/终端设备,并且该芯片可以实现本申请实施例的各个方法中由移动终端/终端设备实现的相应流程,为了简洁,在此不再赘述。Optionally, the chip can be applied to the mobile terminal/terminal device in the embodiments of the present application, and the chip can implement the corresponding processes implemented by the mobile terminal/terminal device in each method of the embodiments of the present application. For brevity, here No longer.
应理解,本申请实施例提到的芯片还可以称为系统级芯片,系统芯片,芯片系统或片上系统芯片等。It should be understood that the chip mentioned in the embodiments of the present application may also be referred to as a system-on-chip, a system-on-chip, a system-on-chip, or a system-on-a-chip, or the like.
图10是本申请实施例提供的一种通信系统1000的示意性框图。如图10所示,该通信系统1000包括终端设备1010和网络设备1020。FIG. 10 is a schematic block diagram of a communication system 1000 provided by an embodiment of the present application. As shown in FIG. 10 , the communication system 1000 includes a
其中,该终端设备1010可以用于实现上述方法中由终端设备实现的相应的功能,以及该网络设备1020可以用于实现上述方法中由网络设备实现的相应的功能为了简洁,在此不再赘述。The
应理解,本申请实施例的处理器可能是一种集成电路芯片,具有信号的处理能力。在实现过程中,上述方法实施例的各步骤可以通过处理器中的硬件的集成逻辑电路或者软件形式的指令完成。上述的处理器可以是通用处理器、数字信号处理器(Digital Signal Processor,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现成可编程门阵列(Field Programmable Gate Array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。可以实现或者执行本申请实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。结合本申请实施例所公开的方法的步骤可以直接体现为硬件译码处理器执 行完成,或者用译码处理器中的硬件及软件模块组合执行完成。软件模块可以位于随机存储器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质位于存储器,处理器读取存储器中的信息,结合其硬件完成上述方法的步骤。It should be understood that the processor in this embodiment of the present application may be an integrated circuit chip, which has a signal processing capability. In the implementation process, each step of the above method embodiments may be completed by a hardware integrated logic circuit in a processor or an instruction in the form of software. The above-mentioned processor can be a general-purpose processor, a digital signal processor (Digital Signal Processor, DSP), an application specific integrated circuit (Application Specific Integrated Circuit, ASIC), an off-the-shelf programmable gate array (Field Programmable Gate Array, FPGA) or other available Programming logic devices, discrete gate or transistor logic devices, discrete hardware components. The methods, steps, and logic block diagrams disclosed in the embodiments of this application can be implemented or executed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in conjunction with the embodiments of the present application may be directly embodied as being executed and completed by a hardware decoding processor, or executed and completed by a combination of hardware and software modules in the decoding processor. The software module may be located in random access memory, flash memory, read-only memory, programmable read-only memory or electrically erasable programmable memory, registers and other storage media mature in the art. The storage medium is located in the memory, and the processor reads the information in the memory, and completes the steps of the above method in combination with its hardware.
可以理解,本申请实施例中的存储器可以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(Read-Only Memory,ROM)、可编程只读存储器(Programmable ROM,PROM)、可擦除可编程只读存储器(Erasable PROM,EPROM)、电可擦除可编程只读存储器(Electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(Random Access Memory,RAM),其用作外部高速缓存。通过示例性但不是限制性说明,许多形式的RAM可用,例如静态随机存取存储器(Static RAM,SRAM)、动态随机存取存储器(Dynamic RAM,DRAM)、同步动态随机存取存储器(Synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(Double Data Rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(Enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(Synchlink DRAM,SLDRAM)和直接内存总线随机存取存储器(Direct Rambus RAM,DR RAM)。应注意,本文描述的系统和方法的存储器旨在包括但不限于这些和任意其它适合类型的存储器。It can be understood that the memory in this embodiment of the present application may be a volatile memory or a non-volatile memory, or may include both volatile and non-volatile memory. Wherein, the non-volatile memory may be a read-only memory (Read-Only Memory, ROM), a programmable read-only memory (Programmable ROM, PROM), an erasable programmable read-only memory (Erasable PROM, EPROM), an electrically programmable read-only memory (Erasable PROM, EPROM). Erase programmable read-only memory (Electrically EPROM, EEPROM) or flash memory. Volatile memory may be Random Access Memory (RAM), which acts as an external cache. By way of illustration and not limitation, many forms of RAM are available, such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM, SDRAM), double data rate synchronous dynamic random access memory (Double Data Rate SDRAM, DDR SDRAM), enhanced synchronous dynamic random access memory (Enhanced SDRAM, ESDRAM), synchronous link dynamic random access memory (Synchlink DRAM, SLDRAM) ) and direct memory bus random access memory (Direct Rambus RAM, DR RAM). It should be noted that the memory of the systems and methods described herein is intended to include, but not be limited to, these and any other suitable types of memory.
应理解,上述存储器为示例性但不是限制性说明,例如,本申请实施例中的存储器还可以是静态随机存取存储器(static RAM,SRAM)、动态随机存取存储器(dynamic RAM,DRAM)、同步动态随机存取存储器(synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(double data rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(synch link DRAM,SLDRAM)以及直接内存总线随机存取存储器(Direct Rambus RAM,DR RAM)等等。也就是说,本申请实施例中的存储器旨在包括但不限于这些和任意其它适合类型的存储器。It should be understood that the above memory is an example but not a limitative description, for example, the memory in the embodiment of the present application may also be a static random access memory (static RAM, SRAM), a dynamic random access memory (dynamic RAM, DRAM), Synchronous dynamic random access memory (synchronous DRAM, SDRAM), double data rate synchronous dynamic random access memory (double data rate SDRAM, DDR SDRAM), enhanced synchronous dynamic random access memory (enhanced SDRAM, ESDRAM), synchronous connection Dynamic random access memory (synch link DRAM, SLDRAM) and direct memory bus random access memory (Direct Rambus RAM, DR RAM) and so on. That is, the memory in the embodiments of the present application is intended to include but not limited to these and any other suitable types of memory.
本申请实施例还提供了一种计算机可读存储介质,用于存储计算机程序。Embodiments of the present application further provide a computer-readable storage medium for storing a computer program.
可选的,该计算机可读存储介质可应用于本申请实施例中的网络设备,并且该计算机程序使得计算机执行本申请实施例的各个方法中由网络设备实现的相应流程,为了简洁,在此不再赘述。Optionally, the computer-readable storage medium can be applied to the network device in the embodiments of the present application, and the computer program enables the computer to execute the corresponding processes implemented by the network device in the various methods of the embodiments of the present application. For brevity, here No longer.
可选地,该计算机可读存储介质可应用于本申请实施例中的移动终端/终端设备,并且该计算机程序使得计算机执行本申请实施例的各个方法中由移动终端/终端设备实现的相应流程,为了简洁,在此不再赘述。Optionally, the computer-readable storage medium can be applied to the mobile terminal/terminal device in the embodiments of the present application, and the computer program enables the computer to execute the corresponding processes implemented by the mobile terminal/terminal device in each method of the embodiments of the present application. , and are not repeated here for brevity.
本申请实施例还提供了一种计算机程序产品,包括计算机程序指令。Embodiments of the present application also provide a computer program product, including computer program instructions.
可选的,该计算机程序产品可应用于本申请实施例中的网络设备,并且该计算机程序指令使得计算机执行本申请实施例的各个方法中由网络设备实现的相应流程,为了简洁,在此不再赘述。Optionally, the computer program product can be applied to the network device in the embodiments of the present application, and the computer program instructions cause the computer to execute the corresponding processes implemented by the network device in each method of the embodiments of the present application. Repeat.
可选地,该计算机程序产品可应用于本申请实施例中的移动终端/终端设备,并且该计算机程序指令使得计算机执行本申请实施例的各个方法中由移动终端/终端设备实现的相应流程,为了简洁,在此不再赘述。Optionally, the computer program product can be applied to the mobile terminal/terminal device in the embodiments of the present application, and the computer program instructions cause the computer to execute the corresponding processes implemented by the mobile terminal/terminal device in each method of the embodiments of the present application, For brevity, details are not repeated here.
本申请实施例还提供了一种计算机程序。The embodiments of the present application also provide a computer program.
可选的,该计算机程序可应用于本申请实施例中的网络设备,当该计算机程序在计算机上运行时,使得计算机执行本申请实施例的各个方法中由网络设备实现的相应流程,为了简洁,在此不再赘述。Optionally, the computer program can be applied to the network device in the embodiments of the present application. When the computer program runs on the computer, the computer executes the corresponding processes implemented by the network device in each method of the embodiments of the present application. For the sake of brevity. , and will not be repeated here.
可选地,该计算机程序可应用于本申请实施例中的移动终端/终端设备,当该计算机 程序在计算机上运行时,使得计算机执行本申请实施例的各个方法中由移动终端/终端设备实现的相应流程,为了简洁,在此不再赘述。Optionally, the computer program may be applied to the mobile terminal/terminal device in the embodiments of the present application, and when the computer program is run on the computer, the mobile terminal/terminal device implements the various methods of the computer program in the embodiments of the present application. The corresponding process, for the sake of brevity, will not be repeated here.
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。Those of ordinary skill in the art can realize that the units and algorithm steps of each example described in conjunction with the embodiments disclosed herein can be implemented in electronic hardware, or a combination of computer software and electronic hardware. Whether these functions are performed in hardware or software depends on the specific application and design constraints of the technical solution. Skilled artisans may implement the described functionality using different methods for each particular application, but such implementations should not be considered beyond the scope of this application.
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。Those skilled in the art can clearly understand that, for the convenience and brevity of description, the specific working process of the above-described systems, devices and units may refer to the corresponding processes in the foregoing method embodiments, which will not be repeated here.
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。In the several embodiments provided in this application, it should be understood that the disclosed system, apparatus and method may be implemented in other manners. For example, the apparatus embodiments described above are only illustrative. For example, the division of the units is only a logical function division. In actual implementation, there may be other division methods. For example, multiple units or components may be combined or Can be integrated into another system, or some features can be ignored, or not implemented. On the other hand, the shown or discussed mutual coupling or direct coupling or communication connection may be through some interfaces, indirect coupling or communication connection of devices or units, and may be in electrical, mechanical or other forms.
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。The units described as separate components may or may not be physically separated, and components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution in this embodiment.
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。In addition, each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically alone, or two or more units may be integrated into one unit.
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(Read-Only Memory,)ROM、随机存取存储器(Random Access Memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。The functions, if implemented in the form of software functional units and sold or used as independent products, may be stored in a computer-readable storage medium. Based on this understanding, the technical solution of the present application can be embodied in the form of a software product in essence, or the part that contributes to the prior art or the part of the technical solution, and the computer software product is stored in a storage medium, including Several instructions are used to cause a computer device (which may be a personal computer, a server, or a network device, etc.) to execute all or part of the steps of the methods described in the various embodiments of the present application. The aforementioned storage medium includes: U disk, mobile hard disk, read-only memory (Read-Only Memory,) ROM, random access memory (Random Access Memory, RAM), magnetic disk or optical disk and other media that can store program codes .
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应所述以权利要求的保护范围为准。The above are only specific embodiments of the present application, but the protection scope of the present application is not limited to this. should be covered within the scope of protection of this application. Therefore, the protection scope of the present application should be based on the protection scope of the claims.
Claims (34)
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202080104339.XA CN116210336B (en) | 2020-07-31 | 2020-07-31 | Key generation method and device, terminal equipment and network equipment |
| PCT/CN2020/106391 WO2022021413A1 (en) | 2020-07-31 | 2020-07-31 | Key generation method and apparatus, and terminal device and network device |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/CN2020/106391 WO2022021413A1 (en) | 2020-07-31 | 2020-07-31 | Key generation method and apparatus, and terminal device and network device |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2022021413A1 true WO2022021413A1 (en) | 2022-02-03 |
Family
ID=80036973
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2020/106391 Ceased WO2022021413A1 (en) | 2020-07-31 | 2020-07-31 | Key generation method and apparatus, and terminal device and network device |
Country Status (2)
| Country | Link |
|---|---|
| CN (1) | CN116210336B (en) |
| WO (1) | WO2022021413A1 (en) |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2024066844A1 (en) * | 2022-09-29 | 2024-04-04 | 大唐移动通信设备有限公司 | Scg side security key determination method, device, and apparatus, and storage medium |
| WO2025036034A1 (en) * | 2023-08-11 | 2025-02-20 | 大唐移动通信设备有限公司 | Security processing method and apparatus, and storage medium |
Families Citing this family (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2025015580A1 (en) * | 2023-07-19 | 2025-01-23 | 北京小米移动软件有限公司 | Information processing method, terminal, communication system, and storage machine |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2018171583A1 (en) * | 2017-03-23 | 2018-09-27 | 华为技术有限公司 | Configuration method, apparatus and system |
| WO2020029165A1 (en) * | 2018-08-09 | 2020-02-13 | Zte Corporation | Security key generation techniques |
| WO2020065622A1 (en) * | 2018-09-27 | 2020-04-02 | Telefonaktiebolaget Lm Ericsson (Publ) | Flexible resume and reconfigurations in multi-radio dual connectivity and standalone scenarios |
| CN111225443A (en) * | 2018-11-27 | 2020-06-02 | 华硕电脑股份有限公司 | Method and apparatus for releasing pre-configured uplink resource configuration in wireless communications |
Family Cites Families (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20170245181A1 (en) * | 2014-09-19 | 2017-08-24 | Nec Corporation | Apparatus for dual connectivity |
| EP3422799B1 (en) * | 2017-06-27 | 2020-08-05 | Nokia Solutions and Networks Oy | Lte-nr interworking procedure for scg split bearer configurations |
| JP7065183B2 (en) * | 2017-11-16 | 2022-05-11 | テレフオンアクチーボラゲット エルエム エリクソン(パブル) | Full RRC setting in EN-DC |
| US10667185B2 (en) * | 2018-03-28 | 2020-05-26 | Telefonaktiebolaget Lm Ericsson (Publ) | Method for avoiding unnecessary actions in resume procedure |
| CN110557849B (en) * | 2018-05-30 | 2021-06-22 | 华为技术有限公司 | A communication method and device |
| WO2020034229A1 (en) * | 2018-08-17 | 2020-02-20 | Oppo广东移动通信有限公司 | Information transmission method and apparatus, and communication device |
| WO2020143054A1 (en) * | 2019-01-11 | 2020-07-16 | Oppo广东移动通信有限公司 | Rrc connection re-establishment method and apparatus, and network device |
-
2020
- 2020-07-31 WO PCT/CN2020/106391 patent/WO2022021413A1/en not_active Ceased
- 2020-07-31 CN CN202080104339.XA patent/CN116210336B/en active Active
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2018171583A1 (en) * | 2017-03-23 | 2018-09-27 | 华为技术有限公司 | Configuration method, apparatus and system |
| WO2020029165A1 (en) * | 2018-08-09 | 2020-02-13 | Zte Corporation | Security key generation techniques |
| WO2020065622A1 (en) * | 2018-09-27 | 2020-04-02 | Telefonaktiebolaget Lm Ericsson (Publ) | Flexible resume and reconfigurations in multi-radio dual connectivity and standalone scenarios |
| CN111225443A (en) * | 2018-11-27 | 2020-06-02 | 华硕电脑股份有限公司 | Method and apparatus for releasing pre-configured uplink resource configuration in wireless communications |
Non-Patent Citations (1)
| Title |
|---|
| HUAWEI ET AL.: ""sk-counter presence in RRC(Connection)Reconfiguration"", 3GPP TSG-RAN WG2 MEETING#107BIS, R2-1913614, 18 October 2019 (2019-10-18), XP051791607 * |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2024066844A1 (en) * | 2022-09-29 | 2024-04-04 | 大唐移动通信设备有限公司 | Scg side security key determination method, device, and apparatus, and storage medium |
| WO2025036034A1 (en) * | 2023-08-11 | 2025-02-20 | 大唐移动通信设备有限公司 | Security processing method and apparatus, and storage medium |
Also Published As
| Publication number | Publication date |
|---|---|
| CN116210336A (en) | 2023-06-02 |
| CN116210336B (en) | 2024-07-26 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| WO2021203310A1 (en) | Data transmission method and apparatus, and terminal device | |
| CN112703802B (en) | Method and device for processing uplink coverage weakening, terminal and network equipment | |
| WO2021092860A1 (en) | Cell configuration method and apparatus, terminal device, and network device | |
| US11805563B2 (en) | Wireless communication method and base station | |
| WO2020154925A1 (en) | Method and apparatus for coordinating measurement configuration, network device, and terminal | |
| WO2021087678A1 (en) | Cell state management method and apparatus, terminal device, and network device | |
| WO2022061872A1 (en) | Small data transmission method and apparatus, and terminal device | |
| WO2020227860A1 (en) | Terminal capability determination method and device, and terminal | |
| CN110741686B (en) | Cell search method, device and terminal | |
| WO2020258192A1 (en) | Data transmission method and apparatus, and terminal | |
| CN111787554A (en) | A method and device for maintaining neighbor relationship, and network equipment | |
| CN112804759A (en) | Information transmission method and device, terminal and network equipment | |
| WO2022021413A1 (en) | Key generation method and apparatus, and terminal device and network device | |
| CN113207153B (en) | Method and device for controlling terminal mobility and terminal | |
| WO2021026717A1 (en) | Resource coordination method and apparatus, and terminal device | |
| WO2021114206A1 (en) | Cli measurement method and apparatus, terminal device, and network device | |
| CN113207180A (en) | Paging opportunity configuration method and device, terminal and network equipment | |
| CN113068276A (en) | Information configuration method and device, terminal and network equipment | |
| WO2020177135A1 (en) | Power control method, random access method apparatuses, and terminal | |
| WO2022109955A1 (en) | Information indication method and apparatus, terminal device, and network device | |
| WO2022236835A1 (en) | Method and apparatus for determining behavior of terminal device, and terminal device and network device | |
| CN116782384A (en) | Communication method and device, terminal equipment and network equipment | |
| WO2021203400A1 (en) | Method and apparatus for configuring transmission policy, and network device and terminal device | |
| CN114846861B (en) | A method and device for reporting power margin, network equipment, and terminal equipment | |
| WO2020061947A1 (en) | Timer-based processing method, terminal device and network device |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 20947629 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 20947629 Country of ref document: EP Kind code of ref document: A1 |