WO2025066165A1 - Communication method and apparatus - Google Patents
Communication method and apparatus Download PDFInfo
- Publication number
- WO2025066165A1 WO2025066165A1 PCT/CN2024/092893 CN2024092893W WO2025066165A1 WO 2025066165 A1 WO2025066165 A1 WO 2025066165A1 CN 2024092893 W CN2024092893 W CN 2024092893W WO 2025066165 A1 WO2025066165 A1 WO 2025066165A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- message
- key
- network element
- terminal device
- communication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/069—Authentication using certificates or pre-shared keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W68/00—User notification, e.g. alerting and paging, for incoming communication, change of service or the like
Definitions
- the present application relates to the field of communication technology, and in particular to a communication method and device.
- RTK positioning technology is a differential positioning technology, also known as carrier phase differential technology.
- the base station data center obtains auxiliary data (such as RTK auxiliary data) based on the global navigation satellite system (GNSS) positioning measurement results reported by the base station and the difference between the GNSS positioning data calculated based on the actual position of the base station.
- GNSS global navigation satellite system
- the base station data center encrypts the auxiliary data and sends it to the base station through the location management function (LMF) network element and the mobility management (AMF) network element.
- LMF location management function
- AMF mobility management
- a terminal device taking the example of a terminal device obtaining RTK auxiliary data broadcast by a base station for positioning calibration.
- the terminal device In order to successfully parse (or decrypt) the encrypted RTK auxiliary data broadcast by the base station, the terminal device must first obtain the RTK key corresponding to the encrypted RTK auxiliary data by accessing the AMF network element.
- the PTK key has a validity period and cannot be used after the validity period expires.
- the terminal device when the terminal device requests the RTK key from the AMF network element, the AMF network element temporarily does not have the RTK key, then there will be a problem of energy loss caused by the terminal device blindly trying to send the RTK key acquisition request; or when the AMF network element does not send the RTK key to the terminal device in time after updating the RTK key, the terminal device will be unable to parse the encrypted RTK auxiliary data due to the expiration of the RTK key. Therefore, the current solution for terminal devices to obtain RTK keys needs further study.
- the present application provides a communication method and apparatus for enabling a terminal device to effectively obtain a key and successfully parse encrypted auxiliary data.
- the present application provides a communication method, which can be implemented by data interaction between multiple communication devices (such as a first communication device, a second communication device, etc.).
- the first communication device can be a terminal device or a component (such as a chip, a chip system or a circuit, etc.) that can support the terminal device to implement the functions required by the method
- the second communication device can be a first network element or a component (such as a chip, a chip system or a circuit, etc.) that can support the first network element to implement the functions required by the method.
- the terminal device can send a first message to the first network element, the first message is used to request a first key, and the first key is used to encrypt auxiliary data.
- the terminal device receives a first message from the first network element, the first message includes a first indication information, and the first indication information is used to indicate that the first key does not exist (Not exist) or is not available (Not available) or is not configured or stored.
- the terminal device sends a second message to the first network element, and the second information is used to request the first key, or the terminal device waits for the first network element to send the first key.
- the present application does not limit the terminal device to sending the second information until the first time or the timer or the timer expires.
- the terminal device may also send the second information after randomly waiting for a period of time without limitation.
- the assistance data in the present application can be understood as positioning assistance data, high-precision positioning assistance data, RTK data, GNSS assistance data, positioning data, differential positioning data, high-precision positioning data, GNSS positioning data, outdoor positioning data, satellite positioning data, positioning service data, high-precision positioning service data, differential positioning service data, GNSS positioning service data, satellite positioning service data, or RTK positioning service data.
- RTK positioning assistance data high-precision positioning assistance data
- GNSS positioning data positioning data
- the first information or the second information in the present application can be a key indication (for example, a cipher key or a ciphering key).
- the network side (such as the first network element) temporarily does not have the first key.
- the network side By sending an indication message to the terminal device indicating that the first key does not exist or is unavailable, it is possible to promptly notify the terminal device when the network side temporarily does not have the first key requested by the terminal device.
- This helps to avoid the terminal device from blindly and frequently attempting to initiate a request to obtain the first key, and can reduce the energy consumption of the terminal device due to blindly and frequently attempting to request the first key. It can also help the terminal device to effectively obtain the latest key to parse encrypted auxiliary data, and can also reduce the signaling overhead of the network, especially in scenarios with a large number of terminals.
- the terminal device sends first information to the first network element, including: if the auxiliary data is converted/switched from being received through the user plane of the terminal device to being received through the control plane, the terminal device sends the first information to the first network element, wherein the user plane reception may include reception through a session, for example, reception through a PDU session of the terminal device; the control plane reception may include reception through control plane signaling, for example, reception of a system message sent by an access network device, and the system message may include reception of a system message block (SIB).
- SIB system message block
- a terminal device when a terminal device receives an indication from a control plane to receive auxiliary data through a user plane (e.g., a PDU session) (e.g., from a third-party application or application function (Application Function, AF) or an application server (Application Server, AS), where the third-party application or AF or AS may be an auxiliary data center), the terminal device sends a first message to a first network element.
- a control plane e.g., a PDU session
- AF Application Function
- AS Application Server
- the third-party application or AF or AS can count the number of terminal devices from which auxiliary data is obtained (e.g., it can sense which terminal devices obtain auxiliary data from it through a PDU session), when the third-party application or AF or AS senses/determines that auxiliary data needs to be sent through the control plane (e.g., the user plane connection load is high or the outlet traffic pressure is high, etc.), an indication for notifying the control plane to receive auxiliary data is sent to these terminal devices through a PDU session.
- the control plane e.g., the user plane connection load is high or the outlet traffic pressure is high, etc.
- the terminal device receives a notification message from the core network or base station, notifying it to receive auxiliary data through the control plane.
- This scenario can be that when a third-party application or AF or AS perceives/determines that auxiliary data needs to be sent through the control plane (for example, the user plane connection load is high or the export traffic pressure is high, etc.), the core network or base station is first notified, and then the core network or base station notifies the terminal device to switch/convert to receiving auxiliary data through the control plane.
- whether the receiving method of the auxiliary data has changed can be determined/perceived/known as a trigger condition for sending the first information, thereby ensuring that the sending of the first information is more in line with the actual needs of the terminal device.
- the first message may also include second indication information, which may be used to indicate a first time or a timer or a timer, and the first time or a timer or a timer may be used to indicate a next request time for the first key, or to indicate a sending time for the next request information for the first key, or to indicate a start time for the next request information for the first key.
- second indication information may be used to indicate a first time or a timer or a timer, and the first time or a timer or a timer may be used to indicate a next request time for the first key, or to indicate a sending time for the next request information for the first key, or to indicate a start time for the next request information for the first key.
- the network side (such as the first network element) does not have the first key temporarily.
- the terminal device can effectively request the first key according to the second indication information, thereby further avoiding the terminal device from blindly and frequently attempting to initiate a request to obtain the first key, helping to reduce the energy consumption caused by the terminal device's blindly and frequently attempting to request the first key, and can also reduce the signaling overhead of the network, especially in scenarios with a large number of terminals.
- the first message may also include third indication information, where the third indication information is used to instruct the terminal device to wait for the first network element to send the first key.
- the network side (such as the first network element) temporarily does not have the first key.
- the terminal device can wait for the first key to be issued according to the third indication information, thereby further avoiding the terminal device from blindly and frequently attempting to initiate a request to obtain the first key, which helps to reduce the energy consumption caused by the terminal device's blindly and frequently attempting to request the first key.
- the auxiliary data is converted from being received through the user plane of the terminal device to being received through the control plane, including: receiving a system message block sent by the access network device to determine (or perceive) that the auxiliary data is converted from being received through the user plane of the terminal device to being received through the control plane; or not receiving a system message block sent by the access network device to determine that the auxiliary data is converted from being received through the control plane to being received through the user plane of the terminal device.
- the implementation methods for determining whether the receiving method of the auxiliary data has changed are flexible and diverse, which can ensure that the sending of the first information is more accurate and more in line with the actual sending situation.
- a timer or timer is used to indicate a first duration, where the first duration is the time interval between two consecutive requests for the first key by the terminal device, and the first time is the sum of the time when the terminal device sends the first message and the first duration.
- the first time is the sum of the time when the terminal device sends the first message and a second time length set by the terminal device.
- the terminal device after the terminal device fails to request the first key according to the first information, it sends the information requesting the first key again after a period of time set by the terminal device, which helps to reduce the energy consumption caused by the terminal device's blind attempts to continuously request the first key.
- the present application provides a communication method, which can be implemented by data interaction between multiple communication devices (such as a first communication device, a second communication device, etc.).
- the first communication device can be a terminal device or a component (such as a chip, a chip system or a circuit, etc.) that can support the terminal device to implement the functions required by the method
- the second communication device can be a first network element or a component (such as a chip, a chip system or a circuit, etc.) that can support the first network element to implement the functions required by the method.
- the first network element receives first information from the terminal device, wherein the first information is used to request a first key, and the first key is used to encrypt auxiliary data. Afterwards, if the first key does not exist or is not available, the first network element can send a first message to the terminal device, wherein the first message can include first indication information, and the first indication information can be used to indicate that the first key does not exist or is not available. Then, the first network element receives second information from the terminal device, or if the first key is obtained, sends the first key to the terminal device, wherein the second information is used to request the first key.
- the first key does not exist or is unavailable, including: the first network element does not store the first key, for example, the local or remote distributed database does not store the first key; or if the first network element does not store the first key locally, a second message is sent to a second network element, wherein the second message is used to request the first key, and then the first network element receives a third message from the second network element, the third message may include fourth indication information, and the fourth indication information may be used to indicate that the first key does not exist or is unavailable.
- the first network element if the first network element does not store the first key locally (or does not exist or is not configured or is unavailable), the first network element requests the first key from the second network element, and further determines whether it is necessary to send an indication information to the terminal device to indicate that the first key does not exist or is unavailable based on the third message from the second network element, so that the terminal device can accurately know the request status of the first key.
- the first network element obtains the first key, including: the first network element receives a fifth message from the second network element, and the fifth message may include the first key.
- the second network element After the second network element obtains the first key, it will send the first key to the first network element in a timely manner.
- the first message may also include second indication information, which may be used to indicate a first time or a timer or a timer, and the first time or a timer or a timer may be used to indicate a next request time for the first key, or to indicate a sending time for the next request information for the first key, or to indicate a start time for the next request information for the first key.
- second indication information may be used to indicate a first time or a timer or a timer, and the first time or a timer or a timer may be used to indicate a next request time for the first key, or to indicate a sending time for the next request information for the first key, or to indicate a start time for the next request information for the first key.
- the first message may also include third indication information, and the third indication information may be used to instruct the terminal device to wait for the first network element to send the first key.
- the present application provides a communication method, which can be implemented by data interaction between multiple communication devices (such as a second communication device, a third communication device, etc.).
- the second communication device may be a first network element or a component (such as a chip, a chip system or a circuit, etc.) that can support the first network element to implement the functions required by the method
- the third communication device may be a second network element or a component (such as a chip, a chip system or a circuit, etc.) that can support the second network element to implement the functions required by the method.
- the second network element may send a third message to the first network element, the second message is used to request the first key, and the third message may include fourth indication information, and the fourth indication information may be used to indicate that the first key does not exist or is not available.
- the method also includes: the second network element may send a fifth message to the first network element, and the fifth message may include the first key.
- the present application provides a communication method, which can be implemented by data interaction between multiple communication devices (such as a first communication device, a second communication device, etc.).
- the first communication device can be a first terminal device or a component (such as a chip, a chip system or a circuit, etc.) that can support the first terminal device to implement the functions required by the method
- the second communication device can be a first network element or a component (such as a chip, a chip system or a circuit, etc.) that can support the first network element to implement the functions required by the method.
- the first network element can send a sixth message to the first terminal device, and the sixth message can be used to update NAS parameters or to notify the first terminal device that the key has been updated, and the sixth message may include the second key; or if the first terminal device is in a connection management idle state, the first network element can send a paging message to the first terminal device, and the paging message is used to page the first terminal device; thereafter, if the first network element receives a seventh message from the first terminal device, it can send an eighth message to the first terminal device, and the seventh message can be used to activate a user plane session, and the eighth message may include the second key.
- the user associated with the first terminal device is a user who has signed a contract for a first service
- the first service may include a high-precision positioning service
- the second key is a new key for encrypting auxiliary data corresponding to the high-precision positioning service.
- the high-precision positioning service in the present application can also be replaced by the following descriptions: RTK service, outdoor satellite positioning service, outdoor positioning service, differential service, etc., and the present application does not limit this.
- the first terminal device associated user can be understood as the user of the first terminal device; or can be understood as the user holding the first terminal device; or can be understood as the user owning the first terminal device; or can be understood as the first terminal itself referring to the first user, that is, the first users can be replaced with each other, and this application is not limited.
- auxiliary data corresponding to the encrypted high-precision positioning service can be understood as the auxiliary data of the encrypted high-precision positioning service; and the new key can be understood as the updated key.
- the first network element after obtaining the latest key (such as the second key), the first network element promptly pushes the second key to the terminal device associated with the user who has signed up for the first service (such as a high-precision positioning service).
- the first service such as a high-precision positioning service.
- the sixth message, the seventh message, or the eighth message is a non-access stratum NAS message.
- the sixth message is a configuration update message (configuration update); the seventh message is a service request message (service request); and the eighth message is a service acceptance message (service accept).
- the present application provides a communication method, which can be implemented by data interaction between multiple communication devices (such as a first communication device, a second communication device, etc.).
- the first communication device may be a first terminal device or a component (such as a chip, a chip system or a circuit, etc.) that can support the first terminal device to implement the functions required for the method
- the second communication device may be a first network element or a component (such as a chip, a chip system or a circuit, etc.) that can support the first network element to implement the functions required for the method.
- the sixth message, the seventh message, or the eighth message is a non-access stratum NAS message.
- the sixth message is a configuration update message; the seventh message is a service request message; and the eighth message is a service reception message.
- the present application provides a possible communication device.
- the communication device may be a communication device (such as a first communication device or a second communication device or a third communication device) or a component (such as a chip, a chip system or a circuit, etc.) that can support the communication device to implement the functions required for the communication method.
- the first communication device may be a terminal device or a first terminal device (such as a UE)
- the second communication device may be a first network element (such as an AMF network element or an MME)
- the third communication device may be a second network element (such as an LMF network element or an E-SMLC).
- the communication device When the communication device is a chip arranged in the first communication device (or the second communication device or the third communication device), the communication device includes a transceiver and a processor, but does not include a memory.
- the transceiver exists as an input and output interface, and the input and output interface is used for the chip to implement the transceiver of the communication device.
- the input and output interface may include an input interface and/or an output interface, the input interface can implement the reception of the communication device, and the output interface can be used to implement the sending of the communication device.
- the processor is used to read and execute corresponding computer programs or instructions so that the corresponding functions of the first communication device (or the second communication device or the third communication device) are implemented.
- the input and output interface can implement the sending and receiving operations performed by the first communication device (or the second communication device or the third communication device) in the communication method embodiment provided by the present application; the processor can implement other operations other than the sending and receiving operations performed by the first communication device (or the second communication device or the third communication device) in the above-mentioned communication method embodiment provided by the present application.
- the beneficial effects can be referred to the description of the terminal device in the first aspect or the second aspect, which will not be repeated here.
- the communication device has the function of implementing the behavior of the terminal device in the method embodiment shown in the first aspect or the second aspect.
- the function can be implemented by hardware, or it can be implemented by hardware executing corresponding software.
- the hardware or software includes one or more modules corresponding to the above functions.
- the communication device includes: a communication module (or a communication unit, a transceiver module or a transceiver unit, used to send and receive data) and a processing module (or a processing unit).
- the communication module is used to send a first message to a first network element.
- the first information is used to request a first key, and the first key is used to encrypt auxiliary data.
- the communication module is also used to receive a first message from the first network element.
- the first message includes a first indication information, and the first indication information is used to indicate that the first key does not exist or is not available.
- the processing module is used to send a second message to the first network element if the first time or timer or timer expires, or wait for the first network element to send the first key.
- the second information is used to request the first key.
- the communication device when the communication device is used to implement the method embodiment shown in the first aspect, the second aspect, or the third aspect, the beneficial effects can refer to the description of the first network element in the first aspect, the second aspect or the third aspect, which will not be repeated here.
- the communication device has the function of realizing the behavior of the first network element in the method embodiment shown in the first aspect, the second aspect or the third aspect.
- the function can be realized by hardware, or by hardware executing corresponding software.
- the hardware or software includes one or more modules corresponding to the above functions.
- the communication device includes: a communication module and a processing module. The communication module is used to receive first information from a terminal device.
- the first information is used to request a first key, and the first key is used to encrypt auxiliary data.
- the processing module is used to send a first message to the terminal device if the first key does not exist or is not available.
- the first message includes first indication information, and the first indication information is used to indicate that the first key does not exist or is not available.
- the communication module is also used to receive second information from the terminal device, or if the first key is obtained, send the first key to the terminal device.
- the second information is used to request the first key.
- the beneficial effects can refer to the description of the second network element in the second aspect or the third aspect, which will not be repeated here.
- the communication device has the function of implementing the behavior of the second network element in the method embodiment shown in the second aspect or the third aspect.
- the function can be implemented by hardware, or it can be implemented by hardware executing corresponding software.
- the hardware or software includes one or more modules corresponding to the above functions.
- the communication device includes: a communication module and a processing module. The communication module is used to receive a second message from the first network element. The second message is used to request a first key.
- the processing module is used to send a third message to the first network element if the first key does not exist or is not available locally.
- the third message includes fourth indication information, and the fourth indication information is used to indicate that the first key does not exist or is not available.
- the beneficial effects can be referred to the description of the first network element in the fourth aspect or the fifth aspect, which will not be repeated here.
- the communication device has the function of implementing the behavior of the first network element in the method embodiment shown in the fourth aspect or the fifth aspect.
- the function can be implemented by hardware, or it can be implemented by hardware executing corresponding software.
- the hardware or software includes one or more modules corresponding to the above functions.
- the communication device includes: a communication module and a processing module. The communication module is used for the first terminal device to be in a connection management connection state, and send a sixth message to the first terminal device.
- the sixth message is used to update NAS parameters or to notify the first terminal device that the key has been updated; the sixth message includes a second key; the user associated with the first terminal device is a user who has signed a first service, and the first service includes a high-precision positioning service; the second key is a new key for encrypting auxiliary data corresponding to the high-precision positioning service.
- the communication module is also used to send a paging message to the first terminal device if the first terminal device is in a connection management idle state. The paging message is used to page the first terminal device.
- the communication module is also used to receive a seventh message from the first terminal device. Among them, the seventh message is used to activate the user plane session.
- the communication module is also used to send an eighth message to the first terminal device.
- the eighth message includes a second key.
- the processing module is used to save (or store) the second key.
- the processing module is also used to determine the contracted user to whom the second key needs to be pushed.
- the beneficial effect can refer to the description of the first terminal device in the fourth aspect or the fifth aspect, which will not be repeated here.
- the communication device has the function of implementing the behavior of the first terminal device in the method embodiment shown in the fourth aspect or the fifth aspect.
- the function can be implemented by hardware, or it can be implemented by hardware executing corresponding software.
- the hardware or software includes one or more modules corresponding to the above functions.
- the communication device includes a communication module. The communication module is used to receive a sixth message from the first network element if the first terminal device is in a connection management connection state.
- the sixth message is used to update NAS parameters or to notify the first terminal device that the key has been updated; the sixth message includes a second key; the user associated with the first terminal device is a user who has signed a first service, and the first service includes a high-precision positioning service; the second key is a new key for encrypting auxiliary data corresponding to the high-precision positioning service.
- the communication module is also used to receive a paging message from the first network element if the first terminal device is in a connection management idle state. The paging message is used to page the first terminal device.
- the communication module is also used to send a seventh message to the first network element.
- the seventh message is used to activate the user plane session.
- the communication module is further used to receive an eighth message from the first network element.
- the eighth message includes the second key.
- These modules can execute the corresponding functions of the first terminal device in the method embodiment shown in the fourth aspect or the fifth aspect above. For details, please refer to the detailed description of the corresponding functions of the first terminal device in the method example, which will not be repeated here.
- the beneficial effects can be referred to the description of the second network element in the fourth aspect or the fifth aspect, which will not be repeated here.
- the function can be implemented by hardware, or it can be implemented by hardware executing corresponding software.
- the hardware or software includes one or more modules corresponding to the above functions.
- the communication device includes a communication module.
- the communication module is used to send a broadcast key data notification message to the first network element. Among them, the broadcast key data notification message includes a second key.
- These modules can execute the corresponding functions of the second network element in the method embodiment shown in the fourth aspect or the fifth aspect above. Please refer to the detailed description of the corresponding functions of the second network element in the method example, which will not be repeated here.
- the present application provides a possible communication device, which may be a communication device (such as a first communication device or a second communication device or a third communication device) required for executing the communication method provided in the present application, or may be a device including a communication device required for executing the communication method provided in the present application, or may be a device having the functions required to implement the communication method.
- the communication device may include a transceiver and a processor.
- the communication device may also include a memory.
- the memory is used to store computer programs or instructions
- the processor is coupled to the memory and the transceiver.
- the communication device executes any possible design method of the first aspect above, any possible design method of the second aspect above, any possible design method of the third aspect above, any possible design method of the fourth aspect above, or any possible design method of the fifth aspect above.
- the present application provides a possible communication system, which may include the first communication device, the second communication device, and the third communication device mentioned in the first aspect, the second aspect, the third aspect, the fourth aspect, or the fifth aspect.
- the relevant functional implementation of the first communication device, the second communication device, or the third communication device can refer to the relevant description mentioned in the first aspect, the second aspect, the third aspect, the fourth aspect, or the fifth aspect, which will not be repeated here.
- the communication system may include one or more first communication devices, one or more second communication devices, and one or more third communication devices.
- the present application provides a computer program product, which includes a computer program or instructions.
- the computer program or instructions When the computer program or instructions are run on a computer, the computer executes any possible method in the design of the first aspect or any possible method in the design of the second aspect or any possible method in the design of the third aspect or any possible method in the design of the fourth aspect or any possible method in the design of the fifth aspect.
- the present application provides a computer-readable storage medium, which stores a computer program or instruction.
- the computer program or instruction executes any possible design method of the first aspect or any possible design method of the second aspect or any possible design method of the third aspect or any possible design method of the fourth aspect or any possible design method of the fifth aspect.
- the present application provides a chip, which may include a processor and a memory (or the chip is coupled to the memory), and the chip executes program instructions in the memory to execute the method in any possible design of the first aspect or the method in any possible design of the second aspect or the method in any possible design of the third aspect or the method in any possible design of the fourth aspect or the method in any possible design of the fifth aspect.
- a chip which may include a processor and a memory (or the chip is coupled to the memory), and the chip executes program instructions in the memory to execute the method in any possible design of the first aspect or the method in any possible design of the second aspect or the method in any possible design of the third aspect or the method in any possible design of the fourth aspect or the method in any possible design of the fifth aspect.
- coupling refers to the direct or indirect combination of two components with each other, such as coupling can refer to an electrical connection between two components.
- the present application further provides a chip system, which includes a processor for supporting a computer device to implement any possible method in the design of the first aspect or any possible method in the design of the second aspect or any possible method in the design of the third aspect or any possible method in the design of the fourth aspect or any possible method in the design of the fifth aspect.
- the chip system also includes a memory, which is used to store the necessary programs and data of the computer device.
- the chip system can be composed of chips, or it can include chips and other discrete devices.
- FIG. 1a exemplarily shows a possible communication system architecture diagram provided by an embodiment of the present application
- FIG. 1b exemplarily shows another possible communication system architecture diagram provided in an embodiment of the present application
- FIG2 exemplarily shows a schematic diagram of another possible communication system architecture provided in an embodiment of the present application.
- FIG3 exemplarily shows a flow chart of a communication method provided in Embodiment 1 of the present application
- FIG4 exemplarily shows a flow chart of another communication method provided in Embodiment 1 of the present application.
- FIG5 exemplarily shows a flow chart of another communication method provided in Embodiment 1 of the present application.
- FIG6 exemplarily shows a flow chart of a communication method provided in Embodiment 2 of the present application.
- FIG7 exemplarily shows a flow chart of another communication method provided in Embodiment 2 of the present application.
- FIG8 exemplarily shows a flow chart of another communication method provided in Embodiment 2 of the present application.
- FIG9 exemplarily shows a schematic structural diagram of a possible communication device provided in an embodiment of the present application.
- FIG10 exemplarily shows a schematic structural diagram of another possible communication device provided in an embodiment of the present application.
- FIG. 1a exemplarily shows a possible communication system architecture diagram applicable to the embodiment of the present application.
- the communication system architecture shown in FIG. 1a is the fifth-generation (5th-generation, 5G) communication system architecture formulated by the third generation partnership project (3GPP) standard, and the communication system architecture includes terminal equipment, access network (such as (R)AN), core network (CN) and data network (DN).
- the terminal equipment can be connected to the access network equipment (such as (R)AN equipment) in a wireless manner
- the access network equipment can be connected to the core network in a wireless or wired manner.
- the core network equipment and the wireless access network equipment can be independent and different physical devices, or the functions of the core network equipment and the logical functions of the wireless access network equipment can be integrated on the same physical device, or the functions of some core network equipment and some wireless access network equipment can be integrated on one physical device.
- Terminal equipment and terminal equipment and access network equipment and access network equipment can be connected to each other in a wired or wireless manner.
- the communication system architecture may also include other network devices (such as wireless relay devices or wireless backhaul devices, etc.).
- Terminal equipment It is an entity on the user side that has the function of sending and receiving signals, and can provide users with service functions such as video, voice, and data connectivity.
- the terminal equipment is the entrance for mobile users to interact with the network, and can provide basic computing and storage capabilities, display service windows to users, and receive user operation input.
- the next generation of terminal equipment (NextGen UE) can use new air interface technology to establish signal connections and data connections with (R)AN equipment, thereby transmitting control signals and service data to the mobile network.
- the terminal device may also be referred to as a terminal, user equipment (UE), access terminal equipment, vehicle-mounted terminal, industrial control terminal, UE unit, UE station, mobile station, mobile station (MS), mobile terminal (MT), remote station, remote terminal equipment, mobile device, UE terminal equipment, terminal equipment, wireless communication equipment, UE agent or UE device, etc.
- the terminal device may be fixed or mobile, and the implementation of the present application does not limit this.
- the terminal device may be deployed on land, including indoors or outdoors, handheld, wearable or vehicle-mounted, or may be deployed on the water (such as a ship, etc.), or may be deployed in the air (such as an airplane, a balloon or a satellite, etc.).
- the terminal device may be a mobile phone, a tablet computer, a subscriber unit, a cellular phone, a smart phone, a wireless data card, a personal digital assistant (PDA), a computer, a wireless modem, a handheld device (handset), a laptop computer, a computer with wireless transceiver function, a virtual reality (VR) terminal device, an augmented reality (AR) terminal device, Wireless terminals in industrial control, vehicle-mounted terminal equipment, wireless terminals in self-driving, wireless terminals in remote medical, wireless terminals in smart grid, wireless terminals in transportation safety, wireless terminals in smart city, wireless terminals in smart home, wearable terminal equipment, vehicles, drones, helicopters, airplanes, factory machines/equipment, machine type communication (MTC) terminals, ships or robots, etc.
- the embodiments of the present application do not limit the specific technology and specific device form adopted by the terminal equipment.
- (R)AN equipment is a device that connects terminal devices to wireless networks.
- (R)AN equipment can provide network access functions for authorized users in a specific area, and can determine transmission tunnels of different qualities to transmit user data based on user levels, business requirements, etc.
- (R)AN equipment can manage its own resources, use them reasonably, provide access services to terminal devices on demand, and is responsible for forwarding control signals and user data between terminal devices and the core network.
- (R)AN equipment may include, but is not limited to: a next generation base station (next generation NodeB, gNB) in a fifth generation (5G) communication system, a next generation base station in a sixth generation (6G) communication system, a base station in a future communication system, a transmission reception point (TRP), an evolved Node B (eNB), a radio network controller (RNC), a Node B (NB), a base station controller (base station controller, BSC), base transceiver station (BTS), home base station (e.g., home evolved Node B, or home Node B, HNB), base band unit (BBU), or wireless fidelity (Wi-Fi) access point (AP), etc.
- a next generation base station (next generation NodeB, gNB) in a fifth generation (5G) communication system
- 5G fifth generation
- 6G sixth generation
- TRP transmission reception point
- eNB evolved Node B
- RNC radio network controller
- NB Node B
- BSC base
- the (R)AN device may also include a centralized unit (CU) or a distributed unit (DU).
- This structure can split the protocol layers of the network device, with the functions of some protocol layers being centrally controlled by the CU, and the functions of the remaining part or all of the protocol layers being distributed in the DU, which is centrally controlled by the CU.
- the functions of the packet data convergence protocol (PDCP) layer and above can be set in the CU, and the functions of the protocol layers below the PDCP (such as the RLC layer and the medium access control (MAC) layer, etc.) are set in the DU.
- PDCP packet data convergence protocol
- MAC medium access control
- the radio frequency device can be remote and not placed in the DU, or it can be integrated in the DU, or part of it can be remote and part of it can be integrated in the DU, and the embodiments of the present application do not impose any restrictions.
- the control plane (CP) and user plane (UP) of the CU can be separated and implemented by different entities, namely, the control plane CU entity (CU-CP entity) and the user plane CU entity (CU-UP entity).
- the base station can communicate with the terminal device, or communicate with the terminal device through a relay station.
- the terminal device can communicate with multiple base stations in different access technologies.
- the (R)AN device may be a macro base station, a micro base station or an indoor station, a relay node or a donor node, etc.
- the embodiment of the present application does not limit the specific technology and specific device form used by the wireless access network device.
- Data network A data network that provides business services to users.
- the client is located in the terminal device and the server is located in the data network.
- the data network can be a private network, such as a local area network, or an external network that is not controlled by the operator, such as the Internet. It can also be a proprietary network jointly deployed by operators, such as a network that provides IP multimedia core network subsystem (IMS) services.
- IMS IP multimedia core network subsystem
- Core network responsible for maintaining the subscription data of the mobile network, managing the network elements of the mobile network, and providing functions such as session management, mobility management, policy management, and security authentication for terminal devices.
- the terminal device When the terminal device is attached, it provides network access authentication for the terminal device; when the terminal device has a service request, it allocates network resources for the terminal device; when the terminal device moves, it updates network resources for the terminal device; when the terminal device is idle, it provides a fast recovery mechanism for the terminal device; when the terminal device is detached, it releases network resources for the terminal device; when the terminal device has service data, it provides data routing functions for the terminal device, such as forwarding uplink data to the data network; or receiving downlink data of the terminal device from the data network and forwarding it to the (R)AN device, so that the (R)AN device sends it to the terminal device.
- the network elements of the core network can be divided into two parts: user plane network elements and control plane network elements.
- the user plane network elements are responsible for the transmission of service data.
- the user plane network elements can include but are not limited to user plane function (UPF) network elements.
- the control plane network elements are responsible for the management of the mobile network.
- the control plane may include but is not limited to access and mobility management function (AMF) network elements, session management function (SMF) network elements, unified data management (UDM) network elements, policy control function (PCF) network elements, application function (AF) network elements, authentication server function (AUSF) network elements, and network slice selection function (NSSF) network elements.
- AMF access and mobility management function
- SMF session management function
- UDM unified data management
- PCF policy control function
- AF application function
- AUSF authentication server function
- NSSF network slice selection function
- the core network can also include other network elements (such as network exposure function (NEF) network elements, network storage function (NRF) network elements, unified data repository (UDR) network elements, network slice-specific authentication and authorization function (NSSAAF) network elements, etc.), which are not listed here one by one.
- network exposure function NEF
- NRF network storage function
- UDR unified data repository
- NSSAAF network slice-specific authentication and authorization function
- the core network control plane adopts a service-oriented architecture, and the interaction between control plane network elements adopts the service call method to replace the point-to-point communication method in the traditional architecture.
- the control plane network elements will open services to other control plane network elements for other control plane network elements to call; in point-to-point communication, the communication interface between control plane network elements will store a set of specific messages, which can only be used by the control plane network elements at both ends of the interface when communicating.
- SMF network element mainly used for session management, IP address allocation and management of terminal devices, selection of endpoints for manageable user equipment plane functions, policy control, or charging function interfaces, and downlink data notification, etc. For example, it can complete the establishment, release, and update processes related to protocol data unit (PDU) sessions.
- session management network elements can be SMF network elements.
- session management function network elements can still be SMF network elements, or have other names, which are not limited in this application.
- Nsmf is a service-based interface provided by SMF network elements. SMF network elements can communicate with other network functions through Nsmf.
- AMF network element Mainly used for mobility management and access management, etc.
- NAS non-access stratum
- MM mobility management
- SM session management
- N2 access network devices
- MME mobility management entity
- the access management network element can still be the AMF network element, or have other names, which is not limited in this application.
- Namf is a service-based interface provided by the AMF network element.
- the AMF network element can communicate with other network functions through Namf.
- UDM network element used to process user identification, contract signing, access authentication, registration, or mobility management.
- the data management network element may be a UDM network element.
- the data management network element may still be a UDM network element, or may have other names, which are not limited in this application.
- Nudm is a service-based interface provided by the UDM network element, and the UDM network element can communicate with other network functions through Nudm.
- PCF network element a unified policy framework for guiding network behavior, providing policy rule information (such as mobility-related policies or PDU session-related policies (such as quality of service (QoS) policies, billing policies, etc.)) to control plane functional network elements (such as AMF, SMF, etc.).
- policy rule information such as mobility-related policies or PDU session-related policies (such as quality of service (QoS) policies, billing policies, etc.)
- control plane functional network elements such as AMF, SMF, etc.
- the policy control network element may be a PCF network element.
- the policy control network element may still be a PCF network element, or may have other names, which are not limited in this application.
- Npcf is a service-based interface provided by the PCF network element, and the PCF network element can communicate with other network functions through Npcf.
- AF network element used for data routing affected by applications, access to network open functions, or interacting with the policy framework for policy control, etc.
- an application network element may be an AF network element.
- an application network element may still be an AF network element, or have other names, which are not limited in this application.
- Naf is a service-based interface provided by AF, and an AF network element can communicate with other network functions through Naf.
- UPF network element used for packet routing and forwarding, or QoS processing of user plane data, etc.
- the user plane network element may be a UPF network element.
- the user plane network element may still be a UPF network element, or have other names, which are not limited in this application.
- AUSF network element mainly used for user authentication, etc.
- the authentication service network element can be the AUSF network element.
- the authentication service network element can still be the AUSF network element, or have other names, which are not limited in this application.
- Nausf is a service-based interface provided by the AUSF network element.
- the AUSF network element can communicate with other network functions through Nausf.
- NSSF network element used to select a network slice for a terminal device.
- the network slice selection function network element may be a NSSF network element.
- the network slice selection function network element may still be a NSSF network element, or may have other names, which is not limited in this application.
- NEF network element used to securely open services and capabilities provided by 3GPP network functions to the outside.
- a network open network element may be a NEF network element.
- a network open function network element may still be a NEF network element, or have other names, which are not limited in this application.
- Nnef is a service-based interface provided by the NEF network element, and the NEF network element can communicate with other network functions through Nnef.
- NRF network element used to provide service registration, discovery and authorization, and maintain available network function (NF) instance information, which can realize on-demand configuration of network functions and services and interconnection between NFs.
- the network storage network element can be an NRF network element.
- the network storage function network element can still be an NRF network element, or have other names, which is not limited in this application.
- Nnrf is a service-based interface provided by the NRF network element. The NRF network element can communicate with other network functions through Nnrf.
- NSSAAF network element It is mainly responsible for the authentication and authorization of network slices and can interact with the authentication, authorization, and accounting server (AAA-S) through the authentication, authorization, and accounting proxy (AAA-P).
- UDR network element used by UDM network elements to store subscription data or read subscription data and PCF network elements to store policy data or read policy data.
- the above network element or function can be a network element in a hardware device, a software function running on dedicated hardware, or a virtualized function instantiated on a platform (e.g., a cloud platform).
- a platform e.g., a cloud platform
- the above network element or function can be implemented by one device, or by multiple devices, or a functional module in one device, which is not specifically limited in the embodiments of the present application.
- the terminal device can access the 5G communication system through access network devices such as (R)AN devices.
- the terminal device can communicate with the AMF network element through the next generation network (Next generation, NG) 1 interface (referred to as N1), the access network device communicates with the AMF network element through the N2 interface (referred to as N2), the access network device communicates with the UPF network element through the N3 interface (referred to as N3), the AMF network element communicates with the SMF network element through the N11 interface (referred to as N11), and the AMF network element communicates with the SMF network element through the N8 interface (referred to as N8).
- N1 next generation network
- N2 Next generation network
- N3 Next generation interface
- N3 the access network device
- the access network device communicates with the UPF network element through the N3 interface (referred to as N3)
- the AMF network element communicates with the SMF network element through the N11 interface (referred to as N11)
- the AMF network element communicates with the SMF network element through the N
- AMF network elements communicate with AUSF network elements through N12 interface (N12 for short), AMF network elements communicate with PCF network elements through N15 interface (N15 for short), SMF network elements communicate with PCF network elements through N7 interface (N7 for short), SMF network elements communicate with UPF network elements through N4 interface (N4 for short), NEF network elements communicate with SMF network elements through N29 interface (N29 for short), and UPF network elements access the data network (DN) through N6 interface (N6 for short).
- N12 N12 interface
- AMF network elements communicate with PCF network elements through N15 interface (N15 for short)
- SMF network elements communicate with PCF network elements through N7 interface (N7 for short)
- SMF network elements communicate with UPF network elements through N4 interface (N4 for short)
- NEF network elements communicate with SMF network elements through N29 interface (N29 for short)
- UPF network elements access the data network (DN) through N6 interface (N6 for short).
- FIG1b is a schematic diagram of another possible communication system architecture provided by the current technical specification (e.g., a schematic diagram of a network architecture for supporting positioning).
- This network architecture is an expansion of the communication system architecture shown in FIG1a.
- multiple functional entities such as a gateway mobile location center (GMLC) network element, a location retrieval function (LRF) network element, a location service (LCS) client, and a location management function (LMF) network element are added to support positioning service functions.
- GMLC gateway mobile location center
- LRF location retrieval function
- LCS location service
- LMF location management function
- GMLC network element responsible for processing positioning requests for positioning services and selecting appropriate AMF network elements for positioning services.
- LRF network element It can be configured with the GMLC network element or independently, and is responsible for retrieving or verifying the location information of the terminal device and providing routing and related information for the terminal device that has initiated the IMS emergency session.
- LCS client Location service client
- (4)LMF network element Mainly responsible for managing positioning requests, allocating positioning resources, and determining the location of terminal devices during positioning services.
- NL1 is the interface between the AMF network element and the LMF network element.
- NL7 is the interface between the LMF network element and the LMF network element.
- N52 is the interface between the UDM network element and the NEF network element.
- NL2 is the interface between the AMF network element and the GMLC network element.
- NL5 is the interface between the NEF network element and the GMLC network element.
- N33 is the interface between the NEF network element and the AF network element.
- N51 is the interface between the AMF network element and the NEF network element.
- NL6 is the interface between the UDM network element and the GMLC network element.
- One Le is the interface between the LCS client and the GMLC network element; one Le is the interface between the LCS client and the LRF network element.
- FIG. 2 is a schematic diagram of another possible communication system architecture (such as the positioning architecture of the 4G communication system) provided in an embodiment of the present application.
- the E-SMLC is similar to the role of the LMF network element
- the MME is similar to the role of the AMF network element.
- the MME can be connected to the access network device (such as the Evolved Universal Terrestrial Radio Access Network (Evolved Universal Terrestrial Radio Access Network, E-UTRAN)) through the S1 application protocol (S1 application protocol, S1-AP) interface.
- the LMF network element and the E-SMLC can be referred to as location management network elements.
- LTE-Uu is the interface between UE and E-UTRAN
- SLs is the interface between E-SMLC and MME
- SLg is the interface between MME and GMLC network element
- SLm is the interface between location measurement unit (LMU) and E-SMLC.
- Figure 3 exemplarily shows a flow chart of a communication method provided in Example 1 of the present application.
- the method is applicable to the communication system architecture illustrated in Figure 1a or Figure 1b or Figure 2.
- the method flow can be implemented by data interaction between multiple communication devices (such as a first communication device, a second communication device and a third communication device).
- the first communication device can be a terminal device or a component (such as a chip, a chip system or a circuit, etc.) that can support the terminal device to implement the functions required by the method
- the second communication device can be a first network element or a component (such as a chip, a chip system or a circuit, etc.) that can support the first network element to implement the functions required by the method
- the third communication device can be a second network element or a component (such as a chip, a chip system or a circuit, etc.) that can support the second network element to implement the functions required by the method.
- the terminal device when the communication method illustrated in Figure 3 is applicable to the communication system architecture illustrated in Figure 1a or Figure 1b, the terminal device can be the UE illustrated in Figure 1a or Figure 1b, the first network element can be the AMF network element illustrated in Figure 1a or Figure 1b, and the second network element can be the AMF network element illustrated in Figure 1a or Figure 1b. 1b.
- the terminal device When the communication method illustrated in FIG. 3 is applicable to the communication system architecture illustrated in FIG. 2, the terminal device may be the UE illustrated in FIG. 2, the first network element may be the MME illustrated in FIG. 2, and the second network element may be the E-SMLC illustrated in FIG. 2.
- the following takes the first communication device as the terminal device, the second communication device as the first network element, and the third communication device as the second network element as an example to introduce the process of implementing the communication method by data interaction between the first communication device, the second communication device, and the third communication device.
- the method includes:
- Step 301 A terminal device sends first information to a first network element, and the first network element receives the first information.
- the first information is used to request the first key, and the first key is used to encrypt the assistance data.
- the first key requested by the terminal device may be one or more.
- the first key can also be used to decrypt (or parse) the encrypted assistance data.
- the first key can be an RTK key or a key of GNSS assistance data (GNSS assistance data) sent through posSIB or a key of assistance data.
- the assistance data may refer to data used to assist the terminal device in achieving precise positioning, such as positioning assistance data.
- the positioning assistance data may be RTK positioning assistance data.
- the first information may be carried in a registration request message (Registration Request) message or other messages.
- the first information may be carried in a tracking area update request (Tracing Area Update Request, TAU Request) message or other messages.
- the first information may pass through one or more access network devices (such as base stations) during the process of being sent by the terminal device to the first network element.
- the access network device may be a next-generation base station (such as gNB) in a 5G communication system
- the access network device may be a base station (such as eNB) in a 4G communication system.
- Method 1 If the auxiliary data is converted from (or received from) a user plane (e.g., a PDU session) of the terminal device to a control plane, the terminal device may send the first information to the first network element.
- the control plane reception may include receiving a system information block (SIB) sent by the access network device.
- SIB system information block
- the auxiliary data is converted from being received through a user plane of the terminal device to being received through a control plane.
- the terminal device receives (or obtains) a system message block (or may be referred to as a system information block) sent by the access network device and determines (or senses) that the auxiliary data (or the first key) is converted from being received by the user plane of the terminal device to being received by the control plane. For example, the terminal device discovers (or determines) that the auxiliary data is converted from being received by the user plane of the terminal device to being received by the SIB sent by the access network device (such as the positioning SIB of the air interface).
- a system message block or may be referred to as a system information block
- Scenario 2 The terminal device does not receive (or does not obtain) the system message block sent by the access network device to determine that the auxiliary data is converted from being received through the control plane to being received through the user plane of the terminal device.
- Method 2 If the terminal device determines that the first key is invalid (for example, the first key is not available in the area where the terminal device is located or the available time of the first key is lower than the preset threshold T3512 or the usage period of the first key exceeds the validity period, etc.), the terminal device sends the first information to the first network element.
- the terminal device determines that the first key is invalid (for example, the first key is not available in the area where the terminal device is located or the available time of the first key is lower than the preset threshold T3512 or the usage period of the first key exceeds the validity period, etc.).
- Step 302 The first network element does not have the first key locally, and sends a second message to the second network element.
- the second network element receives the second message.
- the first network element may send a first request message (such as a second message) to the second network element.
- a first request message such as a second message
- the first request message may carry (or include or contain) an identifier or name or type of the first key.
- the first network element can send a NAS message to the terminal device.
- the NAS message can carry the first key requested by the terminal device.
- the NAS message can be a Registration Accept (or Registration Accept) message.
- Step 303 The second network element does not have the first key locally, and sends a third message to the first network element.
- the first network element receives the third message.
- the third message may be a response message of the second message.
- the second network element may send a third message to the first network element.
- the third message may be a response message to the second message.
- the third message may include fourth indication information, and the fourth indication information is used to indicate that the first key does not exist (or is not configured or is not available or is not stored).
- the second network element may send a response message to the first network element.
- the response message may carry the first key.
- the second network element determines that the first key requested by the terminal device does not exist locally, but after a period of time, ...
- the second network element obtains the first key requested by the terminal device, and at this time the second network element may send a fifth message to the first network element.
- the fifth message may carry the first key.
- steps 302 to 303 are optional steps, that is, they do not need to be performed in some application scenarios, but need to be performed in some application scenarios.
- Step 304 The first network element sends a first message to the terminal device.
- the terminal device receives the first message.
- the first network element can send the first message to the terminal device.
- this implementation can timely notify the terminal device that the network side (such as the first network element or the second network element) does not have the first key temporarily, thereby avoiding the terminal device from blindly attempting to initiate a request to obtain the first key, which helps to reduce the energy consumption of the terminal device (such as resource consumption, power consumption, or signaling overhead, etc.).
- the first message may include first indication information, and the first indication information is used to indicate that the first key does not exist (or is not configured or is not available or is not stored).
- the first indication information may be a reason value/cause (cause) used to indicate that the first key does not exist (or is not configured or is not available or is not stored), such as a reason value of 1 is used to indicate that the first key exists, and a reason value of 0 is used to indicate that the first key does not exist; or, a reason value of 0 is used to indicate that the first key exists, and a reason value of 1 is used to indicate that the first key does not exist; or, carrying a reason value indicates that the first key does not exist, and not carrying a reason value indicates that the first key exists.
- the reason/cause value may be a Boolean type or an enumeration type or a character type or an integer type, which is not limited in the embodiments of the present application.
- the first message may also include second indication information, and the second indication information is used to indicate a first time or a timer or a timer.
- the first time or a timer (Timer) or a timer (Timer) is used to indicate the next request time of the first key, or to indicate the sending time of the next request information of the first key, or to indicate the start time of the next request information of the first key, or to indicate the start time of the next request information of the first key.
- the timer or timer can also be used to indicate the first duration, in which case the first time may refer to the sum of the time when the terminal device sends the first information and the first duration.
- the first duration is the time interval between two adjacent requests for the first key by the terminal device.
- the first time may refer to the sum of the time when the terminal device sends the first information and the second time length set by the terminal device.
- the first message may further include third indication information, and the third indication information is used to indicate that the terminal device is waiting for the first network element to send the first key.
- the first network element may mark the user associated with the terminal device as waiting for the first key to be sent. Afterwards, after obtaining the first key sent by the second network element, the first network element may promptly send the first key to the terminal device, thereby avoiding the terminal device from blindly attempting to initiate a request to obtain the first key, which helps to reduce the energy consumption of the terminal device.
- the first network element may send the first key to the terminal device.
- the first key may be carried in an information or may also be carried in a message.
- the first network element may send a response message to the terminal device.
- the response message may carry the first key.
- Step 305 When the first time or the timer or the timer expires, the terminal device sends the second information to the first network element, or waits for the first network element to send the first key. Optionally, the first network element receives the second information.
- the second information may be used to request the first key again, or to initiate a request to obtain the first key again.
- the first time may refer to the sum of the time when the terminal device sends the first information and the second time period set by the terminal device.
- the terminal device may send the second information to the first network element when the first time expires.
- the terminal device may send the second information to the first network element at the first time or when the timer or timer expires.
- the first time may refer to the sum of the time when the terminal device sends the first information and the first duration.
- the terminal device may temporarily not send information for requesting the first key to the first network element, but wait for the first network element to send the first key. In this way, the implementation can avoid the terminal device from blindly attempting to initiate a request to obtain the first key, which helps to reduce the energy consumption of the terminal device.
- the network side (such as the first network element or the second network element) does not have the first key, and sends an indication message indicating that the first key does not exist or is unavailable to the terminal device.
- the device can promptly notify the terminal device when the network side temporarily does not have the first key requested by the terminal device, which helps to avoid the terminal device from blindly and frequently trying to initiate a request for the first key, and can reduce the energy consumption caused by the terminal device blindly and frequently trying to request the first key. It can also help the terminal device effectively obtain the key for parsing encrypted auxiliary data.
- the terminal device is UE
- the (R) AN device is gNB (or can be called NG-(R) AN device)
- the first key is RTK key
- the first network element is AMF network element
- the second network element is LMF network element
- the auxiliary data is RTK positioning auxiliary data
- the terminal device is UE
- the (R) AN device is eNB (or can be called eNodeB)
- the first key is RTK key
- the first network element is MME
- the second network element is E-SMLC
- the auxiliary data is RTK positioning auxiliary data.
- the action performed by a network element can also be replaced by the action performed by the functional component in the network element.
- the functional component may, for example, include at least one of a chip, a chip system, a processor, and a processing unit.
- FIG4 is a flow chart of another communication method provided in Embodiment 1 of the present application.
- the communication method shown in FIG4 is applicable to a 5G communication system architecture (or can be understood as a 5G core network (Core) architecture).
- the specific flow of the method may include:
- Step 401 The UE sends a registration request message to the AMF network element.
- the AMF network element receives the registration request message.
- the registration request message may be a NAS message.
- the registration request message may carry information or indication information requesting an RTK key (such as an indication requesting a Cipher Key) for requesting an RTK key (Cipher Key).
- the registration request message may also carry an identifier, name, or type of the RTK key requested by the UE.
- the RTK key requested by the UE may be one or more.
- the registration request message may pass through one or more gNBs during the process of being sent from the UE to the AMF network element.
- the UE may first send the registration request message to the gNB in its area, and the gNB may send the registration request message to the AMF network element.
- Method 1 The UE receives RTK positioning assistance data (or RTK key) through the user plane of the UE (e.g., PDU session) at the beginning.
- the UE needs to convert the RTK positioning assistance data received by the user plane of the UE to the RTK positioning assistance data received by the control plane (e.g., the UE discovers/determines that the RTK positioning assistance data is converted from being received through the user plane of the UE to being received through the positioning SIB message of the air interface)
- the UE sends a registration request message to the AMF network element.
- the registration request message may carry an indication of requesting an RTK key (Cipher Key), or may also carry an identifier, name, or type of the RTK key.
- Method 2 When the UE determines that the RTK key is invalid (for example, it is not available in the area where the UE is located or the RTK key availability time is lower than the preset threshold T3512 or the RTK key usage period exceeds the validity period, etc.), the UE sends a registration request message to the AMF network element.
- Step 402 If the RTK key requested by the UE is not stored locally, the AMF network element sends a first request message to the LMF network element. The LMF network element receives the first request message.
- the AMF network element may send a Registration Accept message (or Registration Accept) to the UE.
- the Registration Accept message may carry the RTK key requested by the UE.
- the Registration Accept message may be a NAS message.
- the first request message is used to request an RTK key.
- the first request message may carry an identifier or name of the RTK key requested by the UE.
- Step 403 The LMF network element sends a request response message to the AMF network element.
- the AMF network element receives the request response message.
- the LMF network element may carry indication information (such as data availability (DataAvailability)) in the request response message.
- the indication information may be used to indicate whether the LMF network element locally stores the RTK key requested by the UE, or may be used to indicate whether the LMF network element is locally configured with the RTK key requested by the UE, or may be used to indicate whether the LMF network element locally can obtain the RTK key requested by the UE.
- DataAvailability may be a cause value used to indicate the presence or absence of an RTK key, such as a cause value of 1 used to indicate that the RTK key exists, and a cause value of 0 used to indicate that the RTK key does not exist.
- the indication information is used to indicate that the RTK key requested by the UE is not available (or used to indicate that the RTK key requested by the UE has not been queried).
- the indication information DataAvailability "CIPHERING_KEY_DATA_AVAILABLE" can be carried in the request response message, and the indication information is used to indicate that the RTK key requested by the UE is available (or used to indicate that the RTK key requested by the UE can be queried), and the request response message is also It can carry the RTK key requested by the UE.
- Step 404 The AMF network element sends a registration reception message to the UE.
- the UE receives the registration reception message.
- the AMF network element may also carry the first information in the registration reception message.
- the first information may be information indicating a timer, where the timer is used to indicate the time when the UE attempts to request the RTK key next time, or the first information may indicate the time when the UE attempts to request the RTK key next time.
- the first information may indicate a first duration, where the first duration is the time interval between two consecutive acquisitions of the RTK key by the UE.
- the first information may indicate that the UE is waiting for the AMF network element to send the RTK key.
- the AMF network element may mark that the UE-associated user is waiting for the RTK key to be sent, and after obtaining the RTK key sent by the LMF network element, the AMF network element may send the RTK key to the UE.
- the registration reception message may pass through one or more gNBs during the process of being sent from the AMF network element to the UE.
- the AMF network element may first send the registration reception message to the gNB, and the gNB may send the registration reception message to the UE.
- Step 405 If the indication information included in the registration reception message indicates that the RTK key is not available, the UE sends a second request message to the AMF network element or waits for the AMF network element to send the RTK key.
- the second request message may carry information or indication information for requesting the RTK key again (such as an indication for requesting the Cipher Key again) for requesting the RTK key again.
- the second request message may also carry an identifier or name of the RTK key requested by the UE.
- the second request message may be a new registration request message, or may be a message for requesting the RTK key again.
- the second request message may pass through one or more gNBs during the process of being sent by the UE to the AMF network element.
- the UE may first send the second request message to the gNB in its area, and the gNB may send the second request message to the AMF network element.
- Method 1 When the indication information included (or carried) in the registration reception message indicates that the RTK key is not available and the first information included in the registration reception message indicates the time when the UE will attempt to request the RTK key next time, the UE can send a second request message to the AMF network element when the time for the next attempt to request the RTK key arrives.
- Method 2 When the indication information included in the registration reception message indicates that the RTK key is not available and the first information included in the registration reception message indicates a first duration, the UE can send a second request message to the AMF network element after the first duration has passed since the last time the RTK key was requested.
- Method 3 When the indication information included in the registration reception message indicates that the RTK key is not available, the UE can send a second request message to the AMF network element after the second duration set by the UE has passed since the last time the RTK key was requested.
- the UE may not send a second request message to the AMF network element, but wait for the AMF network element to send the RTK key.
- the network side (such as the LMF network element or the AMF network element) does not have the RTK key temporarily, and selectively generates indication information (such as indication information or second information for indicating that the RTK key requested by the UE is not available) and carries it in the registration reception message and sends it to the UE.
- indication information such as indication information or second information for indicating that the RTK key requested by the UE is not available
- the method can timely notify the UE when the network side temporarily does not have the RTK key requested by the UE, which helps to reduce the energy consumption caused by the UE blindly trying to request the RTK key, thereby effectively avoiding the problem that the UE generates certain energy consumption losses (such as signaling overhead or power loss or communication resource consumption, etc.) due to the UE blindly trying to request the RTK key.
- energy consumption losses such as signaling overhead or power loss or communication resource consumption, etc.
- FIG5 is a flow chart of another communication method provided in Embodiment 1 of the present application.
- the communication method shown in FIG5 is applicable to a 4G communication system architecture (or can be understood as a 4G core network (Evolved Packet Core, EPC) or an Evolved Packet System (Evolved Packet System, EPS)).
- EPC Evolved Packet Core
- EPS Evolved Packet System
- Step 501 UE sends a tracking area update request message to MME.
- MME receives the tracking area update request message.
- the tracking area update request message may pass through one or more eNodeBs during the process of being sent from the UE to the MME. For example, taking one eNodeB as an example, the UE may first send the tracking area update request message to the eNodeB in its area, and the eNodeB The tracking area update request message is sent to the MME.
- the implementation method of the UE sending the tracking area update request message to the MME in step 501 can refer to the implementation method of the UE sending the registration request message to the AMF network element in the above step 401, which will not be repeated here.
- Step 502 If the RTK key requested by the UE is not stored locally, the MME sends a third request message to the E-SMLC. The E-SMLC receives the third request message.
- the MME may send a Tracking Area Update Accept (or Tracking Area Update Accept) (TAU Accept) message to the UE.
- TAU Accept Tracking Area Update Accept
- the Tracking Area Update Accept message may carry the RTK key requested by the UE.
- the third request message is used to request the RTK key.
- the third request message may carry an identifier or name of the RTK key requested by the UE.
- the third request message may be an interface message.
- Step 503 The E-SMLC sends a request response message to the MME.
- the MME receives the request response message.
- the E-SMLC may carry indication information in the request response message.
- the indication information may be used to indicate whether the E-SMLC locally stores the RTK key requested by the UE, or may be used to indicate whether the E-SMLC locally is configured with the RTK key requested by the UE, or may be used to indicate whether the E-SMLC locally can obtain the RTK key requested by the UE.
- the indication information may be an indication of DataAvailability, or may be information used to indicate the presence or absence of the RTK key, for example, it may be a cause/cause value, such as a cause/cause value of 1 is used to indicate that the RTK key exists, and a cause/cause value of 0 is used to indicate that the RTK key does not exist.
- a cause/cause value of 0 indicates that the RTK key does not exist, and a cause/cause value of 1 is used to indicate that the RTK key exists.
- a cause/cause value carries an indication that the key does not exist, and a cause/cause value does not carry an indication that the key exists.
- the E-SMLC may carry indication information in the request response message, where the indication information is used to indicate that the RTK key requested by the UE is available (or used to indicate that the RTK key requested by the UE can be queried), and the request response message may also carry the RTK key requested by the UE.
- the E-SMLC may carry indication information in the request response message, where the indication information is used to indicate that the RTK key requested by the UE is not available (or used to indicate that the RTK key requested by the UE is not queried).
- Step 504 The MME sends a tracking area update reception message to the UE.
- the UE receives the tracking area update reception message.
- the MME can obtain the RTK key requested by the UE from the request response message and can carry the RTK key requested by the UE in the tracking area update reception message.
- the MME may carry the indication information for indicating that the RTK key requested by the UE is not available in the tracking area update reception message.
- the MME may also carry the second information in the tracking area update reception message.
- the second information may be information indicating a timer, the timer being used to indicate the time when the UE attempts to request the RTK key next time, or the second information may indicate the time when the UE attempts to request the RTK key next time.
- the second information may indicate a first duration, the first duration being the time interval between two consecutive acquisitions of the RTK key by the UE.
- the second information may indicate that the UE is waiting for the MME to send the RTK key.
- the MME may mark the UE-associated user as waiting for the RTK key to be sent, and after obtaining the RTK key sent by the E-SMLC, the MME may send the RTK key to the UE.
- Step 505 If the indication information included in the tracking area update reception message indicates that the RTK key is unavailable, the UE sends a fourth request message to the MME or waits for the MME to send the RTK key.
- the fourth request message may carry information or indication information for requesting the RTK key again (such as an indication for requesting the Cipher Key again) for requesting the RTK key again.
- the fourth request message may also carry an identifier or name of the RTK key requested by the UE.
- the fourth request message may be a new tracking area update request message, or may be a message for requesting the RTK key again.
- the fourth request message may pass through one or more eNodeBs during the process of being sent from the UE to the MME. For example, taking one eNodeB as an example, the UE may first send the fourth request message to the eNodeB in its area, and the eNodeB may send the second request message to the MME.
- the implementation method of the UE sending the fourth request message to the MME in step 505 can refer to the implementation method of the UE sending the second request message to the AMF network element in the above step 405, which will not be repeated here.
- the UE may not send the fourth request message to the MME, but wait for the MME to send the RTK key.
- the network side (such as E-SMLC or MME) does not have the RTK key temporarily, and selectively generates indication information (such as indication information or second information for indicating that the RTK key requested by the UE is not available) and carries it in the tracking area update reception message and sends it to the UE.
- indication information such as indication information or second information for indicating that the RTK key requested by the UE is not available
- the method can timely notify the UE when the network side temporarily does not have the RTK key requested by the UE, which helps to reduce the energy consumption caused by the UE blindly trying to request the RTK key, thereby effectively avoiding the problem that the UE generates certain energy consumption losses (such as signaling overhead or power loss or communication resource consumption, etc.) due to the UE blindly trying to request the RTK key.
- energy consumption losses such as signaling overhead or power loss or communication resource consumption, etc.
- FIG6 exemplarily shows a flow chart of a communication method provided in Embodiment 2 of the present application.
- the method is applicable to the communication system architecture illustrated in FIG2.
- the method flow may be implemented by data interaction between multiple communication devices (such as a first communication device, a second communication device, and a third communication device).
- the first communication device may be a first terminal device or a component (such as a chip, a chip system, or a circuit, etc.) that can support the first terminal device to implement the functions required by the method
- the second communication device may be a first network element or a component (such as a chip, a chip system, or a circuit, etc.) that can support the first network element to implement the functions required by the method
- the third communication device may be a second network element or a component (such as a chip, a chip system, or a circuit, etc.) that can support the second network element to implement the functions required by the method.
- the terminal device when the communication method illustrated in FIG6 is applicable to the communication system architecture illustrated in FIG1a or FIG1b, the terminal device may be the UE illustrated in FIG1a or FIG1b, the first network element may be the AMF network element illustrated in FIG1a or FIG1b, and the second network element may be the LMF network element illustrated in FIG1a or FIG1b.
- the terminal device When the communication method illustrated in FIG6 is applicable to the communication system architecture illustrated in FIG2, the terminal device may be the UE illustrated in FIG2, the first network element may be the MME illustrated in FIG2, and the second network element may be the E-SMLC illustrated in FIG2.
- the following takes the first communication device as the terminal device, the second communication device as the first network element, and the third communication device as the second network element as an example to introduce the process of implementing the communication method by data interaction between the first communication device, the second communication device, and the third communication device.
- the method includes:
- Step 601 A first network element obtains a second key from a second network element and stores the second key.
- the first network element may obtain the second key from the second network element, and save (or store) the obtained second key.
- the second key may be a new key for encrypting the auxiliary data corresponding to the high-precision positioning service included in the first service. It should be understood that the second key may also be used to decrypt (or parse) the encrypted auxiliary data.
- the second key may be a new/updated RTK key.
- the second network element may be the LMF network element illustrated in FIG1a or FIG1b.
- the second network element may be the E-SMLC illustrated in FIG2.
- the second network element may send the latest key (such as the second key) used to encrypt the auxiliary data corresponding to the high-precision positioning service to the first network element through a broadcast key data notification (Nlmf_Broadcast_CipheringKeyDataNotify) message.
- Nlmf_Broadcast_CipheringKeyDataNotify broadcast key data notification
- the first network element can determine which users need to push/send the second key according to whether the users have signed up for the first service. The first network element will push the second key only to users who have signed up for the first service. Afterwards, the first network element can select a corresponding push method to push the second key according to the connection management state of the terminal device used by the contracted user (such as the connection management connected state or the connection management idle state). For example, the second key pushed by the first network element can be one or more.
- the first network element when the terminal device (such as the first terminal device) used by the subscriber is in the connection management connected state, the first network element performs the following step 602. In another example, when the terminal device (such as the first terminal device) used by the subscriber is in the connection management idle state, the first network element performs the following steps 603 and 605.
- Step 602 If the first terminal device is in the connection management connection state, the first network element sends a sixth message to the first terminal device. The first terminal device receives the sixth message.
- the sixth message may be used to update NAS parameters or may be used to notify the first terminal device that the key has been updated.
- the sixth message may carry the second key.
- the sixth message may be a NAS message.
- the NAS message may be a configuration update message.
- the configuration update message may be a configuration update command message or a configuration update complete message.
- the sixth message may also be a NAS message.
- the NAS message may be a message such as updating a terminal device parameter configuration.
- Step 603 If the first terminal device is in the connection management idle state, the first network element sends a paging message to the first terminal device. The end device receives the paging message.
- the paging message is used to page the first terminal device to trigger the service request process, which helps to page the first terminal device from the connection management idle state back to the connection management connected state, so that the second key can be pushed to the first terminal device in a timely manner.
- Step 604 The first terminal device sends a seventh message to the first network element according to the paging message.
- the first terminal device receives the seventh message.
- the seventh message may be used to activate a user plane session (such as a PDU session).
- the seventh message may be a NAS message, such as a service request message.
- the first terminal device After receiving the paging message, the first terminal device can start the service request process according to the paging message, for example, it can send the seventh message to the first network element to activate the corresponding PDU session.
- Step 605 The first network element sends an eighth message to the first terminal device.
- the first terminal device receives the eighth message.
- the eighth message may carry the second key.
- the eighth message may be a response message to the seventh message.
- the first terminal device may receive a corresponding service message (such as a NAS message) from the first network element through the user plane connection. Accordingly, after the user plane session of the first terminal device is activated, the first network element may send the second key to the first terminal device by sending a corresponding service response message (such as the eighth message) to the first terminal device.
- a NAS message may be a service reception message (or may be referred to as a service acceptance message).
- the first network element promptly pushes the second key to the terminal device associated with the user who has signed up for the first service (such as the high-precision positioning service).
- the first service such as the high-precision positioning service
- the terminal device is a UE
- the (R) AN device is a gNB (or may be referred to as an NG-(R) AN device)
- the first key is an RTK key
- the first network element is an AMF network element
- the second network element is an LMF network element
- the auxiliary data is RTK positioning auxiliary data
- the terminal device is a UE
- the (R) AN device is an eNB (or may be referred to as an eNodeB)
- the first key is an RTK key
- the first network element is an MME
- the second network element is an E-SMLC
- the auxiliary data is RTK positioning auxiliary data.
- the action performed by a network element can also be replaced by the action performed by the functional component in the network element.
- the functional component may, for example, include at least one of a chip, a chip system, a processor, and a processing unit.
- FIG7 is a flow chart of another communication method provided in Embodiment 2 of the present application.
- the communication method shown in FIG7 is applicable to a 5G communication system architecture. As shown in FIG7 , the specific flow of the method may include:
- Step 701 The LMF network element sends a broadcast key data notification message to the AMF network element.
- the AMF network element receives the broadcast key data notification message.
- the broadcast key data notification message may include the latest RTK key corresponding to the RTK positioning assistance data (or may be understood as the updated RTK key).
- the RTK key may be understood as the key of the assistance data or the key of the GNSS assistance data.
- the AMF network element After receiving the broadcast key data notification message, the AMF network element obtains the latest RTK key from the broadcast key data notification message and stores (or saves) the latest RTK key.
- Step 702 The AMF network element determines the target UE to which the latest RTK key needs to be pushed.
- the target UE-associated user to which the latest RTK key needs to be pushed is the user who has signed up for the high-precision positioning service (hereinafter referred to as the "signed user").
- the AMF network element can determine which users have signed up for high-precision positioning services based on the bitmap of the location service (LCS)-broadcast assistance (BCA). After that, the AMF network element can promptly and accurately push the latest RTK key to the UEs corresponding to these users, so that the UEs corresponding to these users can promptly use the latest RTK key to successfully parse (or successfully decrypt) the encrypted RTK positioning assistance data broadcast by the base station, thereby effectively improving the UE positioning accuracy and effectively avoiding the problem that the encrypted RTK positioning assistance data cannot be successfully parsed due to the expiration of the RTK key of the UE corresponding to the contracted user, thereby causing inaccurate UE positioning accuracy.
- LCS location service
- BCA bitmap of the location service
- Step 703 When it is determined that the target UE is in the connection management connection state, the AMF network element sends a NAS message to the target UE. The target UE receives the NAS message.
- the NAS message may be a configuration update message.
- the configuration update message may be a configuration update command message or a configuration update complete message.
- the NAS message may carry the latest RTK key.
- the AMF network element may send a NAS message to the first user.
- the NAS message carries the latest RTK key.
- the number of first users may be one or more, which is not limited in the embodiments of the present application.
- the NAS message may pass through one or more gNBs during the process of being sent by the AMF network element to the target UE.
- the AMF network element may first send the NAS message to the gNB, and the gNB may send the NAS message to the target UE.
- Step 704 When it is determined that the target UE is in the connection management idle state, the AMF network element sends a paging message to the target UE. The target UE receives the paging message.
- the paging message is used to page the target UE, so as to page the target UE back from the CM idle state to the CM_connected state, thereby enabling the latest RTK key to be pushed to the target UE in a timely manner.
- the AMF network element needs to first send a paging message to the UE corresponding to the second user. After receiving the paging message, the UE corresponding to the second user initiates a service request process.
- the number of second users can be one or more, and the embodiments of the present application do not limit this.
- the paging message may pass through one or more gNBs during the process of being sent by the AMF network element to the target UE.
- the AMF network element may first send the paging message to the gNB, and the gNB may send the paging message to the target UE.
- Step 705 The target UE sends a service request message to the AMF network element according to the paging message.
- the AMF network element receives the service request message.
- the target UE can initiate a service request process according to the paging message.
- the target UE can send a service request message to the AMF network element.
- the service request message can be a NAS message.
- the service request message may pass through one or more gNBs during the process of being sent from the target UE to the AMF network element.
- the target UE may first send the service request message to the gNB in its area, and the gNB may send the service request message to the AMF network element.
- Step 706 The AMF network element sends a service reception message to the target UE.
- the target UE receives the service reception message.
- the service receive (or may be referred to as service accept) message may be a NAS message.
- the AMF network element can push the latest RTK key to the target UE through the service reception message.
- the service reception message may pass through one or more gNBs during the process of being sent by the AMF network element to the target UE.
- the AMF network element may first send the service reception message to the gNB, and the gNB may send the service reception message to the target UE.
- the LMF network element after the LMF network element generates the latest RTK key (or updates the RTK key), it can push the latest RTK key (or updated RTK key) to the AMF network element. After that, the AMF network element can promptly push the latest RTK key (or updated RTK key) to the corresponding target UE (i.e., the UE used by the contracted user).
- the method can enable the network side to promptly notify the corresponding target UE after generating the latest RTK key (or updating the RTK key), so that the target UE can use the latest RTK key (or updated RTK key) to successfully parse the encrypted RTK positioning assistance data, thereby effectively improving the positioning accuracy of the UE, and effectively avoiding the problem that the target UE cannot parse the encrypted RTK positioning assistance data due to the expiration of the RTK key, resulting in inaccurate UE positioning accuracy.
- FIG8 is a flow chart of another communication method provided in Embodiment 2 of the present application.
- the communication method shown in FIG8 is applicable to a 4G communication system architecture. As shown in FIG8 , the specific flow of the method may include:
- Step 801 E-SMLC sends a broadcast key data notification message to MME.
- MME receives the broadcast key data notification message.
- step 801 may refer to the implementation of step 701 described above, which will not be repeated here.
- Step 802 The MME determines the target UE to which the latest RTK key needs to be pushed.
- step 802 may refer to the implementation of step 702 described above, which will not be repeated here.
- Step 803 When the target UE is in the connection management connected state, the MME sends a NAS message to the target UE. The target UE receives the NAS message.
- step 803 may refer to the implementation of step 703 described above, which will not be repeated here.
- the NAS message may be a message (such as a configuration message) for updating UE parameter configuration in step 803.
- the configuration message may be a configuration update command message (or a configuration update complete message).
- Step 804 When the target UE is in the connection management idle state, the MME sends a paging message to the target UE. The target UE receives the paging message.
- step 804 may refer to the implementation of step 704 described above, which will not be described in detail here.
- Step 805 The target UE sends a service request message to the MME according to the paging message.
- the MME receives the service request message.
- step 805 may refer to the implementation of step 705 described above, which will not be repeated here.
- Step 806 The MME sends a service receiving message to the target UE.
- the target UE receives the service receiving message.
- step 806 may refer to the implementation of step 706 described above, which will not be described in detail here.
- the E-SMLC after the E-SMLC generates the latest RTK key (or updates the RTK key), it can push the latest RTK key (or the updated RTK key) to the MME. After that, the MME can promptly push the latest RTK key (or the updated RTK key) to the corresponding target UE (i.e., the UE used by the contracted user).
- the method can realize that after the network side generates the latest RTK key (or updates the RTK key), it can promptly notify the corresponding target UE, so that the target UE can use the latest RTK key (or the updated RTK key) to successfully parse the encrypted RTK positioning assistance data, thereby effectively improving the positioning accuracy of the UE, and effectively avoiding the problem that the target UE cannot parse the encrypted RTK positioning assistance data due to the expiration of the RTK key, resulting in inaccurate UE positioning accuracy.
- At least one refers to one or more, and “multiple” refers to two or more.
- And/or describes the association relationship of the associated objects, indicating that there may be three relationships, for example, A and/or B, which can represent: the situation where A exists alone, A and B exist at the same time, and B exists alone, wherein A and B can be singular or plural.
- the character “/” generally indicates that the associated objects before and after are an “or” relationship.
- At least one of the following (individuals) or its similar expression refers to any combination of these items, including any combination of single items (individuals) or plural items (individuals).
- A, B and C includes A, B, C, AB, AC, BC or ABC.
- ordinal numbers such as “first”, “second”, and “third” mentioned in the embodiments of the present application are used to distinguish multiple objects, and are not used to limit the order, timing, priority or importance of multiple objects.
- the terms “including”, “comprising”, “having” and their variations appearing in the present application all mean “including but not limited to”, unless otherwise specifically emphasized in other ways.
- each step involved in the above embodiments can be performed by a corresponding device, or by a chip, processor, or chip system in the device, and the embodiments of the present application do not limit them.
- the above embodiments are only described by taking the corresponding device as an example.
- the various devices involved in the above embodiments include hardware structures and/or software modules corresponding to the execution of the various functions. It should be easily appreciated by those skilled in the art that, in combination with the units and method steps of the various examples described in the embodiments disclosed in this application, the present application can be implemented in the form of hardware or a combination of hardware and computer software. Whether a function is executed in the form of hardware or computer software driving hardware depends on the specific application scenario and design constraints of the technical solution.
- steps in the embodiments of the present application are only for illustration, and are a method of expression used to better understand the embodiments, and do not constitute a substantial limitation on the execution of the scheme of the present application.
- the steps can also be understood as “features”.
- the steps do not constitute any limitation on the execution order of the scheme of the present application. Any changes in the order of steps, step merging, or step splitting made on this basis that do not affect the implementation of the overall scheme, and the resulting new technical solutions are also within the scope of the disclosure of the present application.
- the embodiment of the present application also provides a possible communication device, which is applicable to the communication system architecture shown in Figure 1a or Figure 1b or Figure 2.
- the communication device can be a communication device (such as a terminal device (such as a first terminal device or other terminal device), a first network element or a second network element) or a device that can support the communication device to implement the functions required by the communication method.
- the communication device when the communication device is a terminal device (or a first terminal device) (such as a UE), the communication device is used to implement the technical solutions involved in the terminal device (or the first terminal device) in the above embodiment, or the module (such as a chip) of the communication device is used to implement the technical solutions involved in the terminal device (or the first terminal device) in the above embodiment, so the beneficial effects possessed by the terminal device (or the first terminal device) in the above embodiment can also be achieved.
- the communication device when the communication device is a chip set in the terminal device (or the first terminal device), the communication device includes a transceiver and a processor, but does not include a memory.
- the transceiver exists as an input and output interface, and the input and output interface is used for the chip to implement the transceiver of the communication device (or the first terminal device).
- the input/output interface may include an input interface and/or an output interface.
- the input interface may implement the reception of the terminal device (or the first terminal device), and the output interface may be used to implement the transmission of the terminal device (or the first terminal device).
- the processor is used to read and execute the corresponding computer program or instruction so that the corresponding function of the terminal device (or the first terminal device) is implemented.
- the input/output interface The port can implement the transceiver operation performed by the terminal device (or the first terminal device) in the above embodiment; the processor can implement other operations except the transceiver operation performed by the terminal device (or the first terminal device) in the above embodiment.
- the processor can implement other operations except the transceiver operation performed by the terminal device (or the first terminal device) in the above embodiment.
- the communication device when the communication device is a first network element (such as an AMF network element or an MME), the communication device is used to implement the technical solution involved in the first network element in the above embodiment, or the module (such as a chip) of the communication device is used to implement the technical solution involved in the first network element in the above embodiment, so the beneficial effects of the first network element in the above embodiment can also be achieved.
- the communication device when the communication device is a chip set in the first network element, the communication device includes a transceiver and a processor, but does not include a memory. Among them, the transceiver exists as an input and output interface, and the input and output interface is used for the chip to implement the transceiver of the communication device.
- the input and output interface may include an input interface and/or an output interface, the input interface can implement the reception of the first network element, and the output interface can be used to implement the transmission of the first network element.
- the processor is used to read and execute the corresponding computer program or instruction so that the corresponding function of the first network element is implemented.
- the input and output interface can implement the transceiver operation performed by the first network element in the above embodiment; the processor can implement other operations except the transceiver operation performed by the first network element in the above embodiment.
- the communication device when the communication device is a second network element (such as an LMF network element or an E-SMLC), the communication device is used to implement the technical solution involved in the second network element in the above embodiment, or the module (such as a chip) of the communication device is used to implement the technical solution involved in the second network element in the above embodiment, so the beneficial effects of the second network element in the above embodiment can also be achieved.
- the communication device when the communication device is a chip set in the second network element, the communication device includes a transceiver and a processor, but does not include a memory. Among them, the transceiver exists as an input and output interface, and the input and output interface is used for the chip to implement the transceiver of the communication device.
- the input and output interface may include an input interface and/or an output interface, the input interface can implement the reception of the second network element, and the output interface can be used to implement the transmission of the second network element.
- the processor is used to read and execute the corresponding computer program or instruction so that the corresponding function of the second network element is implemented.
- the input and output interface can implement the transceiver operation performed by the second network element in the above embodiment; the processor can implement other operations except the transceiver operation performed by the second network element in the above embodiment.
- the second network element in the above embodiment which will not be described in detail here.
- the communication device 900 includes a communication module 901 (or may be referred to as a transceiver module, for sending and receiving data) and a processing module 902.
- the communication device 900 is used to implement the functions of the first communication device (such as a terminal device) or the second communication device (such as a first network element) or the third communication device (such as a second network element) in the method embodiments shown in the above-mentioned FIGS. 3 to 8.
- the communication module 901 may include a receiving module and/or a sending module.
- the receiving module may be used for the communication device 900 to receive signals (information or data, etc.); the sending module may be used for the communication device 900 to send signals (information or data, etc.).
- the sending module may send signals (information or data, etc.) under the control of the processing module 902, and the receiving module may receive signals (information or data, etc.) under the control of the processing module 902.
- the communication module 901 is used to send a first message to the first network element.
- the first information is used to request a first key, and the first key is used to encrypt auxiliary data.
- the communication module 901 is also used to receive a first message from the first network element.
- the first message includes first indication information, and the first indication information is used to indicate that the first key does not exist or is not available.
- the processing module 902 is used to send a second message to the first network element, or wait for the first network element to send a first key if the first time or timer or timer expires.
- the second information is used to request the first key.
- the communication module 901 is used to receive the first information from the terminal device.
- the first information is used to request the first key, and the first key is used to encrypt auxiliary data.
- the processing module 902 is used to send a first message to the terminal device if the first key does not exist or is not available.
- the first message includes first indication information, and the first indication information is used to indicate that the first key does not exist or is not available.
- the communication module 901 is also used to receive the second information from the terminal device, or if the first key is obtained, send the first key to the terminal device.
- the second information is used to request the first key.
- the communication module 901 is used to receive a second message from the first network element.
- the second message is used to request the first key.
- the processing module 902 is used to send a third message to the first network element if the first key does not exist or is not available locally.
- the third message includes fourth indication information, and the fourth indication information is used to indicate that the first key does not exist or is not available.
- the communication module 901 is used for the first terminal device to be in the connection management connection state, and send the sixth message to the first terminal device.
- the sixth message is used to update the NAS parameters or to notify the first terminal device that the key has been updated;
- the sixth message includes the second key;
- the first terminal device is associated with the user who signed the first
- the user of the service, the first service includes a high-precision positioning service;
- the second key is a new key for encrypting the auxiliary data corresponding to the high-precision positioning service.
- the communication module 901 is also used to send a paging message to the first terminal device if the first terminal device is in a connection management idle state.
- the paging message is used to page the first terminal device.
- the communication module 901 is also used to receive the seventh message from the first terminal device.
- the seventh message is used to activate the user plane session.
- the communication module 901 is also used to send an eighth message to the first terminal device.
- the eighth message includes the second key.
- the processing module 902 is used to save (or store) the second key.
- the processing module 902 is also used to determine the signed user to whom the second key needs to be pushed.
- the communication module 901 is used to receive the sixth message from the first network element if the first terminal device is in the connection management connection state.
- the sixth message is used to update the NAS parameters or to notify the first terminal device that the key has been updated;
- the sixth message includes the second key;
- the user associated with the first terminal device is a user who has signed a contract for the first service, and the first service includes a high-precision positioning service;
- the second key is a new key for encrypting the auxiliary data corresponding to the high-precision positioning service.
- the communication module 901 is also used to receive a paging message from the first network element if the first terminal device is in the connection management idle state. The paging message is used to page the first terminal device.
- the communication module 901 is also used to send a seventh message to the first network element. The seventh message is used to activate the user plane session.
- the communication module 901 is also used to receive an eighth message from the first network element. The eighth message includes the second key.
- the communication module 901 is used to send a broadcast key data notification message to the first network element, wherein the broadcast key data notification message includes the second key.
- the communication device 900 when the communication device 900 is used to implement the function of the first communication device or the second communication device or the third communication device in the method embodiments shown in Figures 3 to 8, for a more detailed description of the communication module 901 and the processing module 902, refer to the relevant description of the first communication device or the second communication device or the third communication device in the method embodiments shown in Figures 3 to 8 above, and will not be repeated here.
- the communication module 901 in the embodiment of the present application can be implemented by a transceiver or a transceiver-related circuit component
- the processing module 902 can be implemented by a processor or a processor-related circuit component.
- each functional unit in each embodiment of the present application may be integrated into a processing unit, or may exist physically separately, or two or more units may be integrated into one unit.
- the above-mentioned integrated unit may be implemented in the form of hardware or in the form of software functional units.
- the integrated unit is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a computer-readable storage medium.
- the computer software product is stored in a storage medium, including several instructions for a computer device (which can be a personal computer, or a server, etc.) or a processor (processor) to perform all or part of the steps of the various embodiments of the present application.
- the aforementioned storage medium includes: U disk, mobile hard disk, read-only memory (ROM), random access memory (RAM), disk or optical disk and other media that can store program codes.
- the embodiment of the present application also provides a possible communication device, which is applicable to the communication system architecture shown in Figure 1a or Figure 1b or Figure 2.
- the communication device may be a device (such as a first communication device or a second communication device or a third communication device) required for executing the communication method provided in the embodiment of the present application, or may be a device including a device required for executing the communication method provided in the embodiment of the present application.
- the communication device may also be arranged in a chip in the first communication device (or the second communication device or the third communication device).
- the communication device When the communication device is a chip arranged in the first communication device (or the second communication device or the third communication device), the communication device includes a transceiver and a processor, but does not include a memory.
- the transceiver exists as an input and output interface, and the input and output interface is used for the chip to realize the transceiver of the communication device.
- the input and output interface may include an input interface and/or an output interface, and the input interface can realize the reception of the communication device, and the output interface can be used to realize the sending of the communication device.
- the processor is used to read and execute corresponding computer programs or instructions so that the corresponding functions of the first communication device (or the second communication device or the third communication device) are realized.
- the input and output interface can implement the transceiver operation performed by the first communication device (or the second communication device or the third communication device) in the above embodiment; the processor can implement other operations except the transceiver operation performed by the first communication device (or the second communication device or the third communication device) in the above embodiment.
- the communication device is a first communication device (such as a terminal device or a first terminal device) or a second communication device (such as a first network element) or a third communication device (such as a second network element).
- the beneficial effects possessed by the first communication device in the above method embodiment can also be achieved.
- the technical solution involved in the second communication device in the embodiment can also achieve the beneficial effects of the second communication device in the above method embodiment.
- the beneficial effects of the third communication device in the above method embodiment can also be achieved.
- the communication device 1000 includes: a transceiver 1001 and a processor 1002.
- the communication device 1000 further includes a memory 1003.
- the transceiver 1001, the processor 1002 and the memory 1003 are interconnected.
- the transceiver 1001 can be used to implement the function of the above communication module 901 when executing the technical solution involved in the first communication device
- the processor 1002 is used to implement the function of the above processing module 902 when executing the technical solution involved in the first communication device.
- the transceiver 1001 can be used to implement the function of the above communication module 901 when executing the technical solution involved in the second communication device, and the processor 1002 is used to implement the function of the above processing module 902 when executing the technical solution involved in the second communication device.
- the transceiver 1001 can be used to implement the function of the above communication module 901 when executing the technical solution involved in the third communication device, and the processor 1002 is used to implement the function of the above processing module 902 when executing the technical solution involved in the third communication device.
- the transceiver 1001, the processor 1002 and the memory 1003 are interconnected via a bus 1004.
- the bus 1004 may be a peripheral component interconnect (PCI) bus or an extended industry standard architecture (EISA) bus.
- PCI peripheral component interconnect
- EISA extended industry standard architecture
- the bus may be divided into an address bus, a data bus, a control bus, etc.
- FIG10 is represented by only one thick line, but it does not mean that there is only one bus or one type of bus.
- the transceiver 1001 is used to receive and send data.
- the transceiver 1001 implements communication with the RAN device as shown in FIG. 1a, FIG. 1b or FIG. 2, or can also implement communication with other devices (such as vehicle-mounted devices or servers) outside the communication system architecture shown in FIG. 1a, FIG. 1b or FIG. 2.
- the transceiver can be a transceiver device with integrated data transceiver function.
- the transceiver can also be composed of a transmitter and a receiver, wherein the transmitter is used to send data and the receiver is used to receive data.
- the transceiver 1001 may include a transmitter and/or a receiver.
- the transmitter is used to send signals, messages, information, or data, etc.
- the receiver is used to receive signals, messages, information, or data, etc.
- the transmitter sends signals, messages, information, or data, etc. under the control of the processor 1002.
- the receiver receives signals, messages, information, or data, etc. under the control of the processor 1002.
- the functions of the processor 1002 can refer to the description of the corresponding functions involved in the first communication device or the second communication device or the third communication device in the above embodiments, and will not be repeated here.
- the processor 1002 can be a central processing unit (CPU), a network processor (NP) or a combination of CPU and NP, etc.
- the processor 1002 can further include a hardware chip.
- the above-mentioned hardware chip can be an application-specific integrated circuit (ASIC), a programmable logic device (PLD) or a combination thereof.
- the above-mentioned PLD can be a complex programmable logic device (CPLD), a field-programmable gate array (FPGA), a generic array logic (GAL) or any combination thereof.
- CPLD complex programmable logic device
- FPGA field-programmable gate array
- GAL generic array logic
- the memory 1003 is used to store program instructions, etc.
- the program instructions may include program codes, and the program codes include computer operation instructions.
- the memory 1003 may include random access memory (RAM), and may also include non-volatile memory (non-volatile memory), such as at least one disk memory.
- the processor 1002 executes the program instructions stored in the memory 1003 to implement the above functions, thereby implementing the method steps required to be executed by the first communication device, the second communication device, or the third communication device in the above embodiments.
- the embodiment of the present application also provides a possible communication system, which includes a first communication device (such as a terminal device or a first terminal device), a second communication device (such as a first network element) and a third communication device (such as a second network element).
- a first communication device such as a terminal device or a first terminal device
- a second communication device such as a first network element
- a third communication device such as a second network element.
- the first communication device can be used to implement the technical solution involved in the first communication device in the above embodiment
- the second communication device can be used to implement the technical solution involved in the second communication device in the above embodiment
- the third communication device can be used to implement the technical solution involved in the third communication device in the above embodiment.
- an embodiment of the present application further provides a computer program product, which includes a computer program or instructions.
- the computer program or instructions When the computer program or instructions are executed on a computer, the computer executes the method provided in the above embodiment.
- an embodiment of the present application also provides a computer-readable storage medium, in which a computer program or instruction is stored.
- a computer program or instruction is stored.
- the computer program or instruction is executed by a computer, the computer executes the method provided in the above embodiment.
- the storage medium may be any available medium that can be accessed by a computer.
- a computer-readable medium may include RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage medium or other magnetic storage device, or any other medium that can be used to carry or store the desired program code in the form of instructions or data structures and can be accessed by a computer.
- an embodiment of the present application further provides a chip, which is coupled to a memory and is used to read a computer program stored in the memory to implement the method provided in the above embodiment.
- an embodiment of the present application also provides a chip system, which includes a processor for supporting a computer device to implement the functions involved in the first communication device (such as a terminal device) or the second communication device (such as a first network element) or the third communication device (such as a second network element) in the above embodiments.
- the chip system also includes a memory, which is used to store the necessary programs and data for the computer device.
- the chip system can be composed of chips, or it can include chips and other discrete devices.
- the method provided in the embodiment of the present application it can be implemented in whole or in part by software, hardware, firmware or any combination thereof.
- software it can be implemented in whole or in part in the form of a computer program product.
- the computer program product includes one or more computer instructions. When the computer instructions are loaded and executed on a computer, the process or function described in the embodiment of the present application is generated in whole or in part.
- the computer can be a general-purpose computer, a special-purpose computer, a computer network, or other programmable device.
- the computer instructions can be stored in a computer-readable storage medium, or transmitted from one computer-readable storage medium to another computer-readable storage medium.
- the computer instructions can be transmitted from a website site, computer, server or data center by wired (e.g., coaxial cable, optical fiber, digital subscriber line (digital subscriber line, DSL)) or wireless (e.g., infrared, wireless, microwave, etc.) mode to another website site, computer, server or data center.
- the computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device such as a server or data center that includes one or more available media integrated.
- the available medium may be a magnetic medium (e.g., a floppy disk, a hard disk, a magnetic tape), an optical medium (e.g., a high-density digital video disc (DVD)), or a semiconductor medium (e.g., a solid state drive (SSD)), etc.
- a magnetic medium e.g., a floppy disk, a hard disk, a magnetic tape
- an optical medium e.g., a high-density digital video disc (DVD)
- DVD high-density digital video disc
- SSD solid state drive
- the steps of the method described in the embodiments of the present application can be directly embedded in the hardware, the software unit executed by the processor, or the combination of the two.
- the software unit can be stored in RAM, ROM, EEPROM, register, hard disk, removable disk, CD-ROM or other storage media of any form in the art.
- the storage medium can be connected to the processor so that the processor can read information from the storage medium and can write information to the storage medium.
- the storage medium can also be integrated into the processor.
- the processor and the storage medium can be arranged in an ASIC.
- These computer program instructions may also be loaded onto a computer or other programmable data processing device so that a series of operational steps are executed on the computer or other programmable device to produce a computer-implemented process, whereby the instructions executed on the computer or other programmable device provide steps for implementing the functions specified in one or more processes in the flowchart and/or one or more boxes in the block diagram.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
相关申请的交叉引用CROSS-REFERENCE TO RELATED APPLICATIONS
本申请要求在2023年09月28日提交中国国家知识产权局、申请号为202311294451.6、申请名称为“一种通信方法及装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。This application claims priority to the Chinese patent application filed with the State Intellectual Property Office of China on September 28, 2023, with application number 202311294451.6 and application name “A Communication Method and Device”, all contents of which are incorporated by reference in this application.
本申请涉及通信技术领域,尤其涉及一种通信方法及装置。The present application relates to the field of communication technology, and in particular to a communication method and device.
动态实时差分(real-time kinematic,RTK)定位技术是一种差分定位技术,又被称为载波相位差分技术。RTK定位技术中,基准站数据中心根据基准站上报的全球导航卫星系统(global navigation satellite system,GNSS)定位测量结果以及根据基站实际位置计算的GNSS定位数据的差值来获得辅助数据(比如RTK辅助数据)。之后,基准站数据中心通过位置管理功能(Location Management Function,LMF)网元和移动性管理(Access and Mobility Management Function,AMF)网元将辅助数据加密后下发给基站。然后,基站广播加密的辅助数据,使得基站范围内的终端设备等定位主体根据辅助数据对定位结果进行校准(或称为纠偏),以提高定位精度。Real-time kinematic (RTK) positioning technology is a differential positioning technology, also known as carrier phase differential technology. In RTK positioning technology, the base station data center obtains auxiliary data (such as RTK auxiliary data) based on the global navigation satellite system (GNSS) positioning measurement results reported by the base station and the difference between the GNSS positioning data calculated based on the actual position of the base station. After that, the base station data center encrypts the auxiliary data and sends it to the base station through the location management function (LMF) network element and the mobility management (AMF) network element. Then, the base station broadcasts the encrypted auxiliary data, so that the positioning subjects such as terminal devices within the base station range can calibrate the positioning results (or correct them) according to the auxiliary data to improve the positioning accuracy.
示例性地,以终端设备获取基站广播的RTK辅助数据进行定位校准为例。终端设备为了能够成功解析(或可理解为解密)基站广播的加密的RTK辅助数据,需要先通过接入与AMF网元获取加密的RTK辅助数据对应的RTK密钥。其中,PTK密钥是具有有效期的,超过有效期是无法使用的。然而,在终端设备获取RTK密钥的过程中,当终端设备向AMF网元请求RTK密钥时,AMF网元暂时没有RTK密钥,则会出现因终端设备盲目尝试发送RTK密钥获取请求而带来能耗损失的问题;或者当AMF网元在更新RTK密钥后没有及时发送给终端设备,则会出现终端设备因RTK密钥过期而无法解析加密的RTK辅助数据的问题。因此,目前对于终端设备获取RTK密钥的方案还有待进一步研究。Exemplarily, take the example of a terminal device obtaining RTK auxiliary data broadcast by a base station for positioning calibration. In order to successfully parse (or decrypt) the encrypted RTK auxiliary data broadcast by the base station, the terminal device must first obtain the RTK key corresponding to the encrypted RTK auxiliary data by accessing the AMF network element. Among them, the PTK key has a validity period and cannot be used after the validity period expires. However, in the process of the terminal device obtaining the RTK key, when the terminal device requests the RTK key from the AMF network element, the AMF network element temporarily does not have the RTK key, then there will be a problem of energy loss caused by the terminal device blindly trying to send the RTK key acquisition request; or when the AMF network element does not send the RTK key to the terminal device in time after updating the RTK key, the terminal device will be unable to parse the encrypted RTK auxiliary data due to the expiration of the RTK key. Therefore, the current solution for terminal devices to obtain RTK keys needs further study.
发明内容Summary of the invention
本申请提供一种通信方法及装置,用以实现终端设备能够有效地获取密钥而成功解析加密的辅助数据。The present application provides a communication method and apparatus for enabling a terminal device to effectively obtain a key and successfully parse encrypted auxiliary data.
第一方面,本申请提供一种通信方法,该方法可以由多个通信装置(比如第一通信装置、第二通信装置等)之间进行数据交互来实现。可选的,第一通信装置可以是终端设备或能够支持终端设备实现该方法所需的功能的部件(比如芯片、芯片系统或电路等),第二通信装置可以是第一网元或能够支持第一网元实现该方法所需的功能的部件(比如芯片、芯片系统或电路等)。示例性地,以终端设备与第一网元之间进行数据交互来实现通信方法为例,在该方法中,终端设备可以向第一网元发送第一信息,第一信息用于请求第一密钥,第一密钥用于加密辅助数据,之后,终端设备接收来自第一网元的第一消息,第一消息包括第一指示信息,第一指示信息用于指示第一密钥不存在(Not exist)或不可获得(Not available)或未配置或未存储,然后,若第一时间或计时器或定时器(timer)过期,则终端设备向第一网元发送第二信息,第二信息用于请求第一密钥,或者终端设备等待第一网元发送第一密钥。In a first aspect, the present application provides a communication method, which can be implemented by data interaction between multiple communication devices (such as a first communication device, a second communication device, etc.). Optionally, the first communication device can be a terminal device or a component (such as a chip, a chip system or a circuit, etc.) that can support the terminal device to implement the functions required by the method, and the second communication device can be a first network element or a component (such as a chip, a chip system or a circuit, etc.) that can support the first network element to implement the functions required by the method. Exemplarily, taking the data interaction between the terminal device and the first network element to implement the communication method as an example, in the method, the terminal device can send a first message to the first network element, the first message is used to request a first key, and the first key is used to encrypt auxiliary data. After that, the terminal device receives a first message from the first network element, the first message includes a first indication information, and the first indication information is used to indicate that the first key does not exist (Not exist) or is not available (Not available) or is not configured or stored. Then, if the first time or timer or timer (timer) expires, the terminal device sends a second message to the first network element, and the second information is used to request the first key, or the terminal device waits for the first network element to send the first key.
应理解,本申请中并不限定终端设备发送第二信息一定需要等到第一时间或计时器或定时器过期后发送,也可以是终端设备随机等待一段时间后发送,不限定。It should be understood that the present application does not limit the terminal device to sending the second information until the first time or the timer or the timer expires. The terminal device may also send the second information after randomly waiting for a period of time without limitation.
应理解,本申请中辅助数据(assistance data)可以理解为定位辅助数据、高精度定位辅助数据、RTK数据、GNSS辅助数据、定位数据、差分定位数据、高精度定位数据、GNSS定位数据、室外定位数据、卫星定位数据、定位业务数据、高精度定位业务数据、差分定位业务数据、GNSS定位业务数据、卫星定位业务数据、或RTK定位业务数据。当签约高精度业务的UE进行RTK定位时,需要根据网络设备(如基站)通过空口广播的RTK校准数据对自身的定位结果进行校准,以提高定位精度。应理解,本申请中第一信息或第二信息可以是密钥指示(例如,cipher key或ciphering key)。 It should be understood that the assistance data in the present application can be understood as positioning assistance data, high-precision positioning assistance data, RTK data, GNSS assistance data, positioning data, differential positioning data, high-precision positioning data, GNSS positioning data, outdoor positioning data, satellite positioning data, positioning service data, high-precision positioning service data, differential positioning service data, GNSS positioning service data, satellite positioning service data, or RTK positioning service data. When a UE that has signed a high-precision service performs RTK positioning, it is necessary to calibrate its own positioning result according to the RTK calibration data broadcast by the network device (such as a base station) through the air interface to improve the positioning accuracy. It should be understood that the first information or the second information in the present application can be a key indication (for example, a cipher key or a ciphering key).
在本方法中,在终端设备请求获取第一密钥的过程中,网络侧(比如第一网元)暂无第一密钥,通过发送用于指示第一密钥不存在或不可获得的指示信息给终端设备,可以实现在网络侧暂时没有终端设备请求的第一密钥时,及时地通知终端设备,有助于避免终端设备盲目频繁尝试发起获取第一密钥的请求,并可以降低终端设备因盲目频繁尝试请求第一密钥而产生的能耗,也可以实现帮助终端设备有效地获取最新的密钥进行解析加密的辅助数据,还可以减少网络的信令开销,尤其是终端数量较多的场景。In the present method, during the process of the terminal device requesting to obtain the first key, the network side (such as the first network element) temporarily does not have the first key. By sending an indication message to the terminal device indicating that the first key does not exist or is unavailable, it is possible to promptly notify the terminal device when the network side temporarily does not have the first key requested by the terminal device. This helps to avoid the terminal device from blindly and frequently attempting to initiate a request to obtain the first key, and can reduce the energy consumption of the terminal device due to blindly and frequently attempting to request the first key. It can also help the terminal device to effectively obtain the latest key to parse encrypted auxiliary data, and can also reduce the signaling overhead of the network, especially in scenarios with a large number of terminals.
在一种可能的设计中,终端设备向第一网元发送第一信息,包括:若辅助数据从通过终端设备的用户面接收转换为/切换为(switch to)通过控制面接收,则终端设备向第一网元发送第一信息,其中,用户面接收可以包括通过会话接收,例如,通过终端设备的PDU会话接收;控制面接收可以包括通过控制面信令接收,例如,通过接入网设备发送的系统消息接收,系统消息可以包括系统消息块(system information block,SIB)接收。In one possible design, the terminal device sends first information to the first network element, including: if the auxiliary data is converted/switched from being received through the user plane of the terminal device to being received through the control plane, the terminal device sends the first information to the first network element, wherein the user plane reception may include reception through a session, for example, reception through a PDU session of the terminal device; the control plane reception may include reception through control plane signaling, for example, reception of a system message sent by an access network device, and the system message may include reception of a system message block (SIB).
在一种可能的设计中,终端设备通过用户面(例如PDU会话)收到了控制面接收辅助数据的指示(例如,从第三方应用或者应用功能(Application Function,AF)或者应用服务器(Application Server,AS),其中,第三方应用或AF或AS可以是辅助数据中心),则向第一网元发送第一信息。应理解,在该设计中,由于第三方应用或AF或AS可以统计从其获取辅助数据的终端设备数(例如可以感知哪些终端设备通过PDU会话从其获取辅助数据),当第三方应用或AF或AS感知/确定需要通过控制面发送辅助数据时(例如用户面连接负载较高或出口流量压力较高等),向这些终端设备通过PDU会话发送用于通知控制面接收辅助数据的指示。In one possible design, when a terminal device receives an indication from a control plane to receive auxiliary data through a user plane (e.g., a PDU session) (e.g., from a third-party application or application function (Application Function, AF) or an application server (Application Server, AS), where the third-party application or AF or AS may be an auxiliary data center), the terminal device sends a first message to a first network element. It should be understood that in this design, since the third-party application or AF or AS can count the number of terminal devices from which auxiliary data is obtained (e.g., it can sense which terminal devices obtain auxiliary data from it through a PDU session), when the third-party application or AF or AS senses/determines that auxiliary data needs to be sent through the control plane (e.g., the user plane connection load is high or the outlet traffic pressure is high, etc.), an indication for notifying the control plane to receive auxiliary data is sent to these terminal devices through a PDU session.
在一种可能的设计中,终端设备收到了来自核心网或基站的通知信息,通知其通过控制面接收辅助数据,该场景可以是在第三方应用或AF或AS感知/确定需要通过控制面发送辅助数据时(例如,用户面连接负载较高或出口流量压力较高等)先通知核心网或基站,然后由核心网或基站通知终端设备切换/转换为通过控制面接收辅助数据。In one possible design, the terminal device receives a notification message from the core network or base station, notifying it to receive auxiliary data through the control plane. This scenario can be that when a third-party application or AF or AS perceives/determines that auxiliary data needs to be sent through the control plane (for example, the user plane connection load is high or the export traffic pressure is high, etc.), the core network or base station is first notified, and then the core network or base station notifies the terminal device to switch/convert to receiving auxiliary data through the control plane.
上述设计中,可以通过确定(determine)/感知(aware))/获知(known)辅助数据的接收方式是否发生变化来作为发送第一信息的触发条件,如此可以确保第一信息的发送更加符合终端设备的实际需求。In the above design, whether the receiving method of the auxiliary data has changed can be determined/perceived/known as a trigger condition for sending the first information, thereby ensuring that the sending of the first information is more in line with the actual needs of the terminal device.
在一种可能的设计中,第一消息还可以包括第二指示信息,第二指示信息可以用于指示第一时间或计时器或定时器,第一时间或计时器或定时器可以用于指示第一密钥的下一次请求时间,或用于指示第一密钥的下一次请求信息的发送时间,或用于指示第一密钥的下一次请求信息的启动时间。In one possible design, the first message may also include second indication information, which may be used to indicate a first time or a timer or a timer, and the first time or a timer or a timer may be used to indicate a next request time for the first key, or to indicate a sending time for the next request information for the first key, or to indicate a start time for the next request information for the first key.
上述设计中,在终端设备请求获取第一密钥的过程中,网络侧(比如第一网元)暂无第一密钥,通过选择性地生成第二指示信息并携带在第一消息中发送给终端设备,可以使得终端设备有效地根据第二指示信息进行请求第一密钥,从而可以进一步避免终端设备盲目频繁尝试发起获取第一密钥的请求,有助于降低终端设备因盲目频繁尝试请求第一密钥而产生的能耗,还可以减少网络的信令开销,尤其是终端数量较多的场景。In the above design, during the process of the terminal device requesting to obtain the first key, the network side (such as the first network element) does not have the first key temporarily. By selectively generating the second indication information and carrying it in the first message and sending it to the terminal device, the terminal device can effectively request the first key according to the second indication information, thereby further avoiding the terminal device from blindly and frequently attempting to initiate a request to obtain the first key, helping to reduce the energy consumption caused by the terminal device's blindly and frequently attempting to request the first key, and can also reduce the signaling overhead of the network, especially in scenarios with a large number of terminals.
在一种可能的设计中,第一消息还可以包括第三指示信息,第三指示信息用于指示终端设备等待第一网元发送第一密钥。In a possible design, the first message may also include third indication information, where the third indication information is used to instruct the terminal device to wait for the first network element to send the first key.
上述设计中,在终端设备请求获取第一密钥的过程中,网络侧(比如第一网元)暂无第一密钥,通过选择性地生成第三指示信息并携带在第一消息中发送给终端设备,可以使得终端设备根据第三指示信息等待第一密钥的下发,从而可以进一步避免终端设备盲目频繁尝试发起获取第一密钥的请求,有助于降低终端设备因盲目频繁尝试请求第一密钥而产生的能耗。In the above design, during the process of the terminal device requesting to obtain the first key, the network side (such as the first network element) temporarily does not have the first key. By selectively generating a third indication information and carrying it in the first message and sending it to the terminal device, the terminal device can wait for the first key to be issued according to the third indication information, thereby further avoiding the terminal device from blindly and frequently attempting to initiate a request to obtain the first key, which helps to reduce the energy consumption caused by the terminal device's blindly and frequently attempting to request the first key.
在一种可能的设计中,辅助数据从通过终端设备的用户面接收转换为通过控制面接收包括:接收接入网设备发送的系统消息块确定(或感知)辅助数据从终端设备的用户面接收转换为通过控制面接收;或者未接收接入网设备发送的系统消息块确定辅助数据从通过控制面接收转换为通过终端设备的用户面接收。In one possible design, the auxiliary data is converted from being received through the user plane of the terminal device to being received through the control plane, including: receiving a system message block sent by the access network device to determine (or perceive) that the auxiliary data is converted from being received through the user plane of the terminal device to being received through the control plane; or not receiving a system message block sent by the access network device to determine that the auxiliary data is converted from being received through the control plane to being received through the user plane of the terminal device.
上述设计中,确定辅助数据的接收方式是否发生变化的实现方式灵活多样,如此可以确保第一信息的发送更加准确,且更加符合实际发送情况。In the above design, the implementation methods for determining whether the receiving method of the auxiliary data has changed are flexible and diverse, which can ensure that the sending of the first information is more accurate and more in line with the actual sending situation.
在一种可能的设计中,计时器或定时器用于指示第一时长,第一时长为终端设备相邻两次请求第一密钥的时间间隔,第一时间为终端设备发送第一消息的时间与第一时长之和。In one possible design, a timer or timer is used to indicate a first duration, where the first duration is the time interval between two consecutive requests for the first key by the terminal device, and the first time is the sum of the time when the terminal device sends the first message and the first duration.
在一种可能的设计中,第一时间为终端设备发送第一消息的时间与终端设备设置的第二时长之和。In a possible design, the first time is the sum of the time when the terminal device sends the first message and a second time length set by the terminal device.
上述设计中,终端设备在根据第一信息未请求到第一密钥后,经过终端设备设置的一段时间后,再次发送请求第一密钥的信息,有助于降低终端设备因盲目尝试持续请求第一密钥而产生的能耗。 In the above design, after the terminal device fails to request the first key according to the first information, it sends the information requesting the first key again after a period of time set by the terminal device, which helps to reduce the energy consumption caused by the terminal device's blind attempts to continuously request the first key.
第二方面,本申请提供一种通信方法,该方法可以由多个通信装置(比如第一通信装置、第二通信装置等)之间进行数据交互来实现。可选的,第一通信装置可以是终端设备或能够支持终端设备实现该方法所需的功能的部件(比如芯片、芯片系统或电路等),第二通信装置可以是第一网元或能够支持第一网元实现该方法所需的功能的部件(比如芯片、芯片系统或电路等)。示例性地,以终端设备与第一网元之间进行数据交互来实现通信方法为例,在该方法中,第一网元接收来自终端设备的第一信息,其中,第一信息用于请求第一密钥,第一密钥用于加密辅助数据,之后,若第一密钥不存在或不可获得,第一网元可以向终端设备发送第一消息,其中,第一消息可以包括第一指示信息,第一指示信息可以用于指示第一密钥不存在或不可获得,然后,第一网元接收来自终端设备的第二信息,或者若获取到第一密钥,向终端设备发送第一密钥,其中,第二信息用于请求第一密钥。In a second aspect, the present application provides a communication method, which can be implemented by data interaction between multiple communication devices (such as a first communication device, a second communication device, etc.). Optionally, the first communication device can be a terminal device or a component (such as a chip, a chip system or a circuit, etc.) that can support the terminal device to implement the functions required by the method, and the second communication device can be a first network element or a component (such as a chip, a chip system or a circuit, etc.) that can support the first network element to implement the functions required by the method. Exemplarily, taking the data interaction between the terminal device and the first network element to implement the communication method as an example, in the method, the first network element receives first information from the terminal device, wherein the first information is used to request a first key, and the first key is used to encrypt auxiliary data. Afterwards, if the first key does not exist or is not available, the first network element can send a first message to the terminal device, wherein the first message can include first indication information, and the first indication information can be used to indicate that the first key does not exist or is not available. Then, the first network element receives second information from the terminal device, or if the first key is obtained, sends the first key to the terminal device, wherein the second information is used to request the first key.
第二方面所能达到的技术效果请参照上述第一方面所能达到的技术效果,在此不再赘述。For the technical effects that can be achieved in the second aspect, please refer to the technical effects that can be achieved in the first aspect mentioned above, and no further details will be given here.
在一种可能的设计中,第一密钥不存在或不可获得,包括:第一网元未存储第一密钥,例如,本地或远端分布式数据库未存储第一密钥;或者若第一网元本地未存储第一密钥,向第二网元发送第二消息,其中,第二消息用于请求第一密钥,之后,第一网元接收来自第二网元的第三消息,第三消息可以包括第四指示信息,第四指示信息可以用于指示第一密钥不存在或不可获得。In one possible design, the first key does not exist or is unavailable, including: the first network element does not store the first key, for example, the local or remote distributed database does not store the first key; or if the first network element does not store the first key locally, a second message is sent to a second network element, wherein the second message is used to request the first key, and then the first network element receives a third message from the second network element, the third message may include fourth indication information, and the fourth indication information may be used to indicate that the first key does not exist or is unavailable.
上述设计中,若第一网元本地未存储(或不存在或未配置或不可获得)第一密钥,第一网元向第二网元请求第一密钥,并根据来自第二网元的第三消息来进一步判断是否需要向终端设备发送用于指示第一密钥不存在或不可获得的指示信息,从而可以使得在终端设备能够准确地获知第一密钥的请求情况。In the above design, if the first network element does not store the first key locally (or does not exist or is not configured or is unavailable), the first network element requests the first key from the second network element, and further determines whether it is necessary to send an indication information to the terminal device to indicate that the first key does not exist or is unavailable based on the third message from the second network element, so that the terminal device can accurately know the request status of the first key.
在一种可能的设计中,第一网元获取到第一密钥,包括:第一网元接收来自第二网元的第五消息,第五消息可以包括第一密钥。In one possible design, the first network element obtains the first key, including: the first network element receives a fifth message from the second network element, and the fifth message may include the first key.
上述设计中,在第二网元获取到第一密钥后,会将第一密钥及时地下发给第一网元。In the above design, after the second network element obtains the first key, it will send the first key to the first network element in a timely manner.
在一种可能的设计中,第一消息还可以包括第二指示信息,第二指示信息可以用于指示第一时间或计时器或定时器,第一时间或计时器或定时器可以用于指示第一密钥的下一次请求时间,或用于指示第一密钥的下一次请求信息的发送时间,或用于指示第一密钥的下一次请求信息的启动时间。In one possible design, the first message may also include second indication information, which may be used to indicate a first time or a timer or a timer, and the first time or a timer or a timer may be used to indicate a next request time for the first key, or to indicate a sending time for the next request information for the first key, or to indicate a start time for the next request information for the first key.
上述设计的有益效果请参照第一方面的相关描述,此处不再赘述。For the beneficial effects of the above design, please refer to the relevant description of the first aspect, which will not be repeated here.
在一种可能的设计中,第一消息还可以包括第三指示信息,第三指示信息可以用于指示终端设备等待第一网元发送第一密钥。In a possible design, the first message may also include third indication information, and the third indication information may be used to instruct the terminal device to wait for the first network element to send the first key.
上述设计的有益效果请参照第一方面的相关描述,此处不再赘述。For the beneficial effects of the above design, please refer to the relevant description of the first aspect, which will not be repeated here.
第三方面,本申请提供一种通信方法,该方法可以由多个通信装置(比如第二通信装置、第三通信装置等)之间进行数据交互来实现。可选的,第二通信装置可以是第一网元或能够支持第一网元实现该方法所需的功能的部件(比如芯片、芯片系统或电路等),第三通信装置可以是第二网元或能够支持第二网元实现该方法所需的功能的部件(比如芯片、芯片系统或电路等)。示例性地,以第一网元与第二网元之间进行数据交互来实现通信方法为例,在该方法中,第二网元在接收来自第一网元的第二消息后,可以向第一网元发送第三消息,第二消息用于请求第一密钥,第三消息可以包括第四指示信息,第四指示信息可以用于指示第一密钥不存在或不可获得。In a third aspect, the present application provides a communication method, which can be implemented by data interaction between multiple communication devices (such as a second communication device, a third communication device, etc.). Optionally, the second communication device may be a first network element or a component (such as a chip, a chip system or a circuit, etc.) that can support the first network element to implement the functions required by the method, and the third communication device may be a second network element or a component (such as a chip, a chip system or a circuit, etc.) that can support the second network element to implement the functions required by the method. Exemplarily, taking the data interaction between the first network element and the second network element to implement the communication method as an example, in this method, after receiving the second message from the first network element, the second network element may send a third message to the first network element, the second message is used to request the first key, and the third message may include fourth indication information, and the fourth indication information may be used to indicate that the first key does not exist or is not available.
第三方面所能达到的技术效果请参照上述第一方面的相关描述,此处不再赘述。For the technical effects that can be achieved in the third aspect, please refer to the relevant description of the first aspect above, which will not be repeated here.
在一种可能的设计中,所述方法还包括:第二网元可以向第一网元发送第五消息,第五消息可以包括第一密钥。In one possible design, the method also includes: the second network element may send a fifth message to the first network element, and the fifth message may include the first key.
第四方面,本申请提供一种通信方法,该方法可以由多个通信装置(比如第一通信装置、第二通信装置等)之间进行数据交互来实现。可选的,第一通信装置可以是第一终端设备或能够支持第一终端设备实现该方法所需的功能的部件(比如芯片、芯片系统或电路等),第二通信装置可以是第一网元或能够支持第一网元实现该方法所需的功能的部件(比如芯片、芯片系统或电路等)。示例性地,以第一终端设备与第一网元之间进行数据交互来实现通信方法为例,在该方法中,若第一终端设备处于连接管理连接态,则第一网元可以向第一终端设备发送第六消息,第六消息可以用于更新NAS参数或用于通知第一终端设备密钥已更新,第六消息可以包括第二密钥;或者若第一终端设备处于连接管理空闲态,则第一网元可以向第一终端设备发送寻呼消息,寻呼消息用于寻呼第一终端设备;之后,第一网元若接收来自第一终端设备的第七消息,则可以向第一终端设备发送第八消息,第七消息可以用于激活用户面会话,第八消息可以包括第二密钥,第一终端设备关联用户为签约第一业务的用户,第一业务可以包括高精度定位业务,第二密钥为加密高精度定位业务对应的辅助数据的新密钥。 In a fourth aspect, the present application provides a communication method, which can be implemented by data interaction between multiple communication devices (such as a first communication device, a second communication device, etc.). Optionally, the first communication device can be a first terminal device or a component (such as a chip, a chip system or a circuit, etc.) that can support the first terminal device to implement the functions required by the method, and the second communication device can be a first network element or a component (such as a chip, a chip system or a circuit, etc.) that can support the first network element to implement the functions required by the method. Exemplarily, taking the communication method implemented by data interaction between the first terminal device and the first network element as an example, in this method, if the first terminal device is in a connection management connected state, the first network element can send a sixth message to the first terminal device, and the sixth message can be used to update NAS parameters or to notify the first terminal device that the key has been updated, and the sixth message may include the second key; or if the first terminal device is in a connection management idle state, the first network element can send a paging message to the first terminal device, and the paging message is used to page the first terminal device; thereafter, if the first network element receives a seventh message from the first terminal device, it can send an eighth message to the first terminal device, and the seventh message can be used to activate a user plane session, and the eighth message may include the second key. The user associated with the first terminal device is a user who has signed a contract for a first service, the first service may include a high-precision positioning service, and the second key is a new key for encrypting auxiliary data corresponding to the high-precision positioning service.
应理解,本申请中高精定位业务还可以替换为下述描述:RTK业务、室外卫星定位业务、室外定位业务、差分业务等,本申请对此并不作不限定。It should be understood that the high-precision positioning service in the present application can also be replaced by the following descriptions: RTK service, outdoor satellite positioning service, outdoor positioning service, differential service, etc., and the present application does not limit this.
应理解,第一终端设备关联用户可以理解为,第一终端设备的用户;或者可以理解为持有第一终端设备的用户;或者可以理解为拥有第一终端设备的用户;或者可以理解为第一终端本身指代第一用户,也即,第一用户可以互相替换,本申请不限定。It should be understood that the first terminal device associated user can be understood as the user of the first terminal device; or can be understood as the user holding the first terminal device; or can be understood as the user owning the first terminal device; or can be understood as the first terminal itself referring to the first user, that is, the first users can be replaced with each other, and this application is not limited.
应理解,加密高精定位业务对应的辅助数据可以理解为加密高精定位业务的辅助数据;新密钥可以理解为更新后的密钥。It should be understood that the auxiliary data corresponding to the encrypted high-precision positioning service can be understood as the auxiliary data of the encrypted high-precision positioning service; and the new key can be understood as the updated key.
在本方法中,第一网元在获取最新密钥(比如第二密钥)后,及时地将第二密钥推送给签约第一业务(比如高精度定位业务)的用户关联的终端设备,可以实现网络侧在获得最新密钥后,及时通知相关的终端设备,从而可以使得相关的终端设备能够利用最新密钥成功解密加密的辅助数据,有助于提高终端设备的定位精度。In this method, after obtaining the latest key (such as the second key), the first network element promptly pushes the second key to the terminal device associated with the user who has signed up for the first service (such as a high-precision positioning service). This allows the network side to promptly notify the relevant terminal devices after obtaining the latest key, so that the relevant terminal devices can use the latest key to successfully decrypt the encrypted auxiliary data, which helps to improve the positioning accuracy of the terminal devices.
在一种可能的设计中,第六消息或第七消息或第八消息为非接入层NAS消息。In one possible design, the sixth message, the seventh message, or the eighth message is a non-access stratum NAS message.
在一种可能的设计中,第六消息为配置更新消息(configuration update);第七消息为服务请求消息(service request);第八消息为服务接收消息(service accept)。In a possible design, the sixth message is a configuration update message (configuration update); the seventh message is a service request message (service request); and the eighth message is a service acceptance message (service accept).
第五方面,本申请提供一种通信方法,该方法可以由多个通信装置(比如第一通信装置、第二通信装置等)之间进行数据交互来实现。可选的,第一通信装置可以是第一终端设备或能够支持第一终端设备实现该方法所需的功能的部件(比如芯片、芯片系统或电路等),第二通信装置可以是第一网元或能够支持第一网元实现该方法所需的功能的部件(比如芯片、芯片系统或电路等)。示例性地,以第一终端设备与第一网元之间进行数据交互来实现通信方法为例,在该方法中,In a fifth aspect, the present application provides a communication method, which can be implemented by data interaction between multiple communication devices (such as a first communication device, a second communication device, etc.). Optionally, the first communication device may be a first terminal device or a component (such as a chip, a chip system or a circuit, etc.) that can support the first terminal device to implement the functions required for the method, and the second communication device may be a first network element or a component (such as a chip, a chip system or a circuit, etc.) that can support the first network element to implement the functions required for the method. Exemplarily, taking the example of implementing a communication method by data interaction between a first terminal device and a first network element, in this method,
第五方面所能达到的技术效果请参照上述第四方面所能达到的技术效果,在此不再赘述。For the technical effects that can be achieved in the fifth aspect, please refer to the technical effects that can be achieved in the fourth aspect mentioned above, and no further details will be given here.
在一种可能的设计中,第六消息或第七消息或第八消息为非接入层NAS消息。In one possible design, the sixth message, the seventh message, or the eighth message is a non-access stratum NAS message.
在一种可能的设计中,第六消息为配置更新消息;第七消息为服务请求消息;第八消息为服务接收消息。In one possible design, the sixth message is a configuration update message; the seventh message is a service request message; and the eighth message is a service reception message.
第六方面,本申请提供了一种可能的通信装置。可选的,该通信装置可以是通信设备(比如第一通信装置或第二通信装置或第三通信装置)或能够支持通信设备实现该通信方法所需的功能的部件(比如芯片、芯片系统或电路等)。示例性地,第一通信装置可以是终端设备或第一终端设备(比如UE),第二通信装置可以是第一网元(比如AMF网元或MME),第三通信装置可以是第二网元(比如LMF网元或E-SMLC)。当该通信装置是设置在第一通信装置(或第二通信装置或第三通信装置)中的芯片时,该通信装置中包括收发器和处理器,不包括存储器。其中,收发器以输入输出接口存在,输入输出接口用于芯片实现该通信装置的收发。该输入输出接口可以包括输入接口和/或输出接口,输入接口可以实现该通信装置的接收,输出接口可以用于实现该通信装置的发送。该处理器用于读取并执行相应的计算机程序或指令,使得第一通信装置(或第二通信装置或第三通信装置)的相应功能被实现。可选的,该芯片在实现本申请提供的通信方法实施例中第一通信装置(或第二通信装置或第三通信装置)的相应功能时,输入输出接口可以实现本申请提供的通信方法实施例中由第一通信装置(或第二通信装置或第三通信装置)执行的收发操作;处理器可以实现上述本申请提供的通信方法实施例中由第一通信装置(或第二通信装置或第三通信装置)执行的除收发操作以外的其他操作。In a sixth aspect, the present application provides a possible communication device. Optionally, the communication device may be a communication device (such as a first communication device or a second communication device or a third communication device) or a component (such as a chip, a chip system or a circuit, etc.) that can support the communication device to implement the functions required for the communication method. Exemplarily, the first communication device may be a terminal device or a first terminal device (such as a UE), the second communication device may be a first network element (such as an AMF network element or an MME), and the third communication device may be a second network element (such as an LMF network element or an E-SMLC). When the communication device is a chip arranged in the first communication device (or the second communication device or the third communication device), the communication device includes a transceiver and a processor, but does not include a memory. Among them, the transceiver exists as an input and output interface, and the input and output interface is used for the chip to implement the transceiver of the communication device. The input and output interface may include an input interface and/or an output interface, the input interface can implement the reception of the communication device, and the output interface can be used to implement the sending of the communication device. The processor is used to read and execute corresponding computer programs or instructions so that the corresponding functions of the first communication device (or the second communication device or the third communication device) are implemented. Optionally, when the chip implements the corresponding functions of the first communication device (or the second communication device or the third communication device) in the communication method embodiment provided by the present application, the input and output interface can implement the sending and receiving operations performed by the first communication device (or the second communication device or the third communication device) in the communication method embodiment provided by the present application; the processor can implement other operations other than the sending and receiving operations performed by the first communication device (or the second communication device or the third communication device) in the above-mentioned communication method embodiment provided by the present application.
在一个示例中,当通信装置用于实现上述第一方面或第二方面所示的方法实施例中终端设备的功能时,有益效果可以参见第一方面或第二方面中关于终端设备的描述,此处不再赘述。该通信装置具有实现上述第一方面或第二方面所示的方法实施例中关于终端设备的行为的功能。所述功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。所述硬件或软件包括一个或多个与上述功能相对应的模块。在一个可能的设计中,通信装置包括:通信模块(或可称为通信单元、收发模块或收发单元,用于发送和接收数据)和处理模块(或可称为处理单元)。通信模块,用于向第一网元发送第一信息。其中,第一信息用于请求第一密钥,第一密钥用于加密辅助数据。通信模块,还用于接收来自第一网元的第一消息。其中,第一消息包括第一指示信息,第一指示信息用于指示第一密钥不存在或不可获得。处理模块,用于若第一时间或计时器或定时器过期,向第一网元发送第二信息,或者等待第一网元发送第一密钥。其中,第二信息用于请求第一密钥。这些模块可以执行上述第一方面或第二方面所示的方法实施例中关于终端设备的相应功能,具体参见方法示例中关于终端设备的相应功能的详细描述,此处不做赘述。In one example, when the communication device is used to implement the function of the terminal device in the method embodiment shown in the first aspect or the second aspect, the beneficial effects can be referred to the description of the terminal device in the first aspect or the second aspect, which will not be repeated here. The communication device has the function of implementing the behavior of the terminal device in the method embodiment shown in the first aspect or the second aspect. The function can be implemented by hardware, or it can be implemented by hardware executing corresponding software. The hardware or software includes one or more modules corresponding to the above functions. In one possible design, the communication device includes: a communication module (or a communication unit, a transceiver module or a transceiver unit, used to send and receive data) and a processing module (or a processing unit). The communication module is used to send a first message to a first network element. The first information is used to request a first key, and the first key is used to encrypt auxiliary data. The communication module is also used to receive a first message from the first network element. The first message includes a first indication information, and the first indication information is used to indicate that the first key does not exist or is not available. The processing module is used to send a second message to the first network element if the first time or timer or timer expires, or wait for the first network element to send the first key. The second information is used to request the first key. These modules can execute the corresponding functions of the terminal device in the method embodiments shown in the first aspect or the second aspect above. Please refer to the detailed description of the corresponding functions of the terminal device in the method examples, which will not be repeated here.
在另一个示例中,当通信装置用于实现上述第一方面或第二方面或第三方面所示的方法实施例中第 一网元的功能时,有益效果可以参见第一方面或第二方面或第三方面中关于第一网元的描述,此处不再赘述。该通信装置具有实现上述第一方面或第二方面或第三方面所示的方法实施例中关于第一网元的行为的功能。所述功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。所述硬件或软件包括一个或多个与上述功能相对应的模块。在一个可能的设计中,通信装置包括:通信模块和处理模块。通信模块,用于接收来自终端设备的第一信息。其中,第一信息用于请求第一密钥,第一密钥用于加密辅助数据。处理模块,用于若第一密钥不存在或不可获得,向终端设备发送第一消息。其中,第一消息包括第一指示信息,第一指示信息用于指示第一密钥不存在或不可获得。通信模块,还用于接收来自终端设备的第二信息,或者若获取到第一密钥,向终端设备发送第一密钥。其中,第二信息用于请求第一密钥。这些模块可以执行上述第一方面或第二方面或第三方面所示的方法实施例中关于第一网元的相应功能,具体参见方法示例中关于第一网元的相应功能的详细描述,此处不做赘述。In another example, when the communication device is used to implement the method embodiment shown in the first aspect, the second aspect, or the third aspect, When the function of a network element is realized, the beneficial effects can refer to the description of the first network element in the first aspect, the second aspect or the third aspect, which will not be repeated here. The communication device has the function of realizing the behavior of the first network element in the method embodiment shown in the first aspect, the second aspect or the third aspect. The function can be realized by hardware, or by hardware executing corresponding software. The hardware or software includes one or more modules corresponding to the above functions. In one possible design, the communication device includes: a communication module and a processing module. The communication module is used to receive first information from a terminal device. The first information is used to request a first key, and the first key is used to encrypt auxiliary data. The processing module is used to send a first message to the terminal device if the first key does not exist or is not available. The first message includes first indication information, and the first indication information is used to indicate that the first key does not exist or is not available. The communication module is also used to receive second information from the terminal device, or if the first key is obtained, send the first key to the terminal device. The second information is used to request the first key. These modules can perform the corresponding functions of the first network element in the method embodiment shown in the first aspect, the second aspect or the third aspect, and specifically refer to the detailed description of the corresponding functions of the first network element in the method example, which will not be repeated here.
在又一个示例中,当通信装置用于实现上述第二方面或第三方面所示的方法实施例中第二网元的功能时,有益效果可以参见第二方面或第三方面中关于第二网元的描述,此处不再赘述。该通信装置具有实现上述第二方面或第三方面所示的方法实施例中关于第二网元的行为的功能。所述功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。所述硬件或软件包括一个或多个与上述功能相对应的模块。在一个可能的设计中,通信装置包括:通信模块和处理模块。通信模块,用于接收来自第一网元的第二消息。其中,第二消息用于请求第一密钥。处理模块,用于若本地不存在或不可获得第一密钥,向第一网元发送第三消息。其中,第三消息包括第四指示信息,第四指示信息用于指示第一密钥不存在或不可获得。这些模块可以执行上述第二方面或第三方面所示的方法实施例中关于第二网元的相应功能,具体参见方法示例中关于第二网元的相应功能的详细描述,此处不做赘述。In another example, when the communication device is used to implement the function of the second network element in the method embodiment shown in the second aspect or the third aspect, the beneficial effects can refer to the description of the second network element in the second aspect or the third aspect, which will not be repeated here. The communication device has the function of implementing the behavior of the second network element in the method embodiment shown in the second aspect or the third aspect. The function can be implemented by hardware, or it can be implemented by hardware executing corresponding software. The hardware or software includes one or more modules corresponding to the above functions. In one possible design, the communication device includes: a communication module and a processing module. The communication module is used to receive a second message from the first network element. The second message is used to request a first key. The processing module is used to send a third message to the first network element if the first key does not exist or is not available locally. The third message includes fourth indication information, and the fourth indication information is used to indicate that the first key does not exist or is not available. These modules can perform the corresponding functions of the second network element in the method embodiment shown in the second aspect or the third aspect, and specifically refer to the detailed description of the corresponding functions of the second network element in the method example, which will not be repeated here.
在又一个示例中,当通信装置用于实现上述第四方面或第五方面所示的方法实施例中第一网元的功能时,有益效果可以参见第四方面或第五方面中关于第一网元的描述,此处不再赘述。该通信装置具有实现上述第四方面或第五方面所示的方法实施例中关于第一网元的行为的功能。所述功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。所述硬件或软件包括一个或多个与上述功能相对应的模块。在一个可能的设计中,通信装置包括:通信模块和处理模块。通信模块,用于第一终端设备处于连接管理连接态,向第一终端设备发送第六消息。其中,第六消息用于更新NAS参数或用于通知第一终端设备密钥已更新;第六消息包括第二密钥;第一终端设备关联用户为签约第一业务的用户,第一业务包括高精度定位业务;第二密钥为加密高精度定位业务对应的辅助数据的新密钥。通信模块,还用于若第一终端设备处于连接管理空闲态,向第一终端设备发送寻呼消息。其中,寻呼消息用于寻呼第一终端设备。通信模块,还用于接收来自第一终端设备的第七消息。其中,第七消息用于激活用户面会话。通信模块,还用于向第一终端设备发送第八消息。其中,第八消息包括第二密钥。可选的,处理模块,用于保存(或存储)第二密钥。处理模块,还用于确定需要推送第二密钥的签约用户。这些模块可以执行上述第四方面或第五方面所示的方法实施例中关于第一网元的相应功能,具体参见方法示例中关于第一网元的相应功能的详细描述,此处不做赘述。In another example, when the communication device is used to implement the function of the first network element in the method embodiment shown in the fourth aspect or the fifth aspect, the beneficial effects can be referred to the description of the first network element in the fourth aspect or the fifth aspect, which will not be repeated here. The communication device has the function of implementing the behavior of the first network element in the method embodiment shown in the fourth aspect or the fifth aspect. The function can be implemented by hardware, or it can be implemented by hardware executing corresponding software. The hardware or software includes one or more modules corresponding to the above functions. In one possible design, the communication device includes: a communication module and a processing module. The communication module is used for the first terminal device to be in a connection management connection state, and send a sixth message to the first terminal device. The sixth message is used to update NAS parameters or to notify the first terminal device that the key has been updated; the sixth message includes a second key; the user associated with the first terminal device is a user who has signed a first service, and the first service includes a high-precision positioning service; the second key is a new key for encrypting auxiliary data corresponding to the high-precision positioning service. The communication module is also used to send a paging message to the first terminal device if the first terminal device is in a connection management idle state. The paging message is used to page the first terminal device. The communication module is also used to receive a seventh message from the first terminal device. Among them, the seventh message is used to activate the user plane session. The communication module is also used to send an eighth message to the first terminal device. Among them, the eighth message includes a second key. Optionally, the processing module is used to save (or store) the second key. The processing module is also used to determine the contracted user to whom the second key needs to be pushed. These modules can execute the corresponding functions of the first network element in the method embodiment shown in the fourth aspect or the fifth aspect above. Please refer to the detailed description of the corresponding functions of the first network element in the method example, which will not be repeated here.
在又一个示例中,当通信装置用于实现上述第四方面或第五方面所示的方法实施例中第一终端设备的功能时,有益效果可以参见第四方面或第五方面中关于第一终端设备的描述,此处不再赘述。该通信装置具有实现上述第四方面或第五方面所示的方法实施例中关于第一终端设备的行为的功能。所述功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。所述硬件或软件包括一个或多个与上述功能相对应的模块。在一个可能的设计中,通信装置包括通信模块。通信模块,用于若第一终端设备处于连接管理连接态,接收来自第一网元的第六消息。其中,第六消息用于更新NAS参数或用于通知第一终端设备密钥已更新;第六消息包括第二密钥;第一终端设备关联用户为签约第一业务的用户,第一业务包括高精度定位业务;第二密钥为加密高精度定位业务对应的辅助数据的新密钥。通信模块,还用于若第一终端设备处于连接管理空闲态,接收来自第一网元的寻呼消息。其中,寻呼消息用于寻呼第一终端设备。通信模块,还用于向第一网元发送第七消息。其中,第七消息用于激活用户面会话。通信模块,还用于接收来自第一网元的第八消息。其中,第八消息包括第二密钥。这些模块可以执行上述第四方面或第五方面所示的方法实施例中关于第一终端设备的相应功能,具体参见方法示例中关于第一终端设备的相应功能的详细描述,此处不做赘述。In another example, when the communication device is used to implement the function of the first terminal device in the method embodiment shown in the fourth aspect or the fifth aspect, the beneficial effect can refer to the description of the first terminal device in the fourth aspect or the fifth aspect, which will not be repeated here. The communication device has the function of implementing the behavior of the first terminal device in the method embodiment shown in the fourth aspect or the fifth aspect. The function can be implemented by hardware, or it can be implemented by hardware executing corresponding software. The hardware or software includes one or more modules corresponding to the above functions. In one possible design, the communication device includes a communication module. The communication module is used to receive a sixth message from the first network element if the first terminal device is in a connection management connection state. The sixth message is used to update NAS parameters or to notify the first terminal device that the key has been updated; the sixth message includes a second key; the user associated with the first terminal device is a user who has signed a first service, and the first service includes a high-precision positioning service; the second key is a new key for encrypting auxiliary data corresponding to the high-precision positioning service. The communication module is also used to receive a paging message from the first network element if the first terminal device is in a connection management idle state. The paging message is used to page the first terminal device. The communication module is also used to send a seventh message to the first network element. The seventh message is used to activate the user plane session. The communication module is further used to receive an eighth message from the first network element. The eighth message includes the second key. These modules can execute the corresponding functions of the first terminal device in the method embodiment shown in the fourth aspect or the fifth aspect above. For details, please refer to the detailed description of the corresponding functions of the first terminal device in the method example, which will not be repeated here.
在又一个示例中,当通信装置用于实现上述第四方面或第五方面所示的方法实施例中第二网元的功能时,有益效果可以参见第四方面或第五方面中关于第二网元的描述,此处不再赘述。该通信装置具有 实现上述第四方面或第五方面所示的方法实施例中关于第二网元的行为的功能。所述功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。所述硬件或软件包括一个或多个与上述功能相对应的模块。在一个可能的设计中,通信装置包括通信模块。通信模块,用于向第一网元发送广播密钥数据通知消息。其中,广播密钥数据通知消息包括第二密钥。这些模块可以执行上述第四方面或第五方面所示的方法实施例中关于第二网元的相应功能,具体参见方法示例中关于第二网元的相应功能的详细描述,此处不做赘述。In another example, when the communication device is used to implement the function of the second network element in the method embodiment shown in the fourth aspect or the fifth aspect, the beneficial effects can be referred to the description of the second network element in the fourth aspect or the fifth aspect, which will not be repeated here. Implement the function of the behavior of the second network element in the method embodiment shown in the fourth aspect or the fifth aspect above. The function can be implemented by hardware, or it can be implemented by hardware executing corresponding software. The hardware or software includes one or more modules corresponding to the above functions. In one possible design, the communication device includes a communication module. The communication module is used to send a broadcast key data notification message to the first network element. Among them, the broadcast key data notification message includes a second key. These modules can execute the corresponding functions of the second network element in the method embodiment shown in the fourth aspect or the fifth aspect above. Please refer to the detailed description of the corresponding functions of the second network element in the method example, which will not be repeated here.
第七方面,本申请提供一种可能的通信装置,该通信装置可以是用于执行本申请提供的通信方法所需的通信装置(比如第一通信装置或第二通信装置或第三通信装置),或者可以是包含有执行本申请提供的通信方法所需的通信装置的设备,或者可以是具有实现该通信方法所需的功能的设备。其中,通信装置可以包括收发器以及处理器。可选的,通信装置还可以包括存储器。其中,该存储器用于存储计算机程序或指令,处理器与存储器、收发器耦合,当处理器执行该计算机程序或指令时,使得该通信装置执行上述第一方面的任一种可能的设计中的方法或上述第二方面的任一种可能的设计中的方法或上述第三方面的任一种可能的设计中的方法或上述第四方面的任一种可能的设计中的方法或上述第五方面的任一种可能的设计中的方法。In the seventh aspect, the present application provides a possible communication device, which may be a communication device (such as a first communication device or a second communication device or a third communication device) required for executing the communication method provided in the present application, or may be a device including a communication device required for executing the communication method provided in the present application, or may be a device having the functions required to implement the communication method. Among them, the communication device may include a transceiver and a processor. Optionally, the communication device may also include a memory. Among them, the memory is used to store computer programs or instructions, and the processor is coupled to the memory and the transceiver. When the processor executes the computer program or instruction, the communication device executes any possible design method of the first aspect above, any possible design method of the second aspect above, any possible design method of the third aspect above, any possible design method of the fourth aspect above, or any possible design method of the fifth aspect above.
第八方面,本申请提供了一种可能的通信系统,该通信系统可以包括上述第一方面或第二方面或第三方面或第四方面或第五方面提及的第一通信装置、第二通信装置和第三通信装置等。其中,第一通信装置或第二通信装置或第三通信装置的相关功能实现可以参见上述第一方面或第二方面或第三方面或第四方面或第五方面提及的相关描述,此处不再赘述。In an eighth aspect, the present application provides a possible communication system, which may include the first communication device, the second communication device, and the third communication device mentioned in the first aspect, the second aspect, the third aspect, the fourth aspect, or the fifth aspect. The relevant functional implementation of the first communication device, the second communication device, or the third communication device can refer to the relevant description mentioned in the first aspect, the second aspect, the third aspect, the fourth aspect, or the fifth aspect, which will not be repeated here.
示例性地,该通信系统中可以包括一个或多个第一通信装置、一个或多个第二通信装置以及一个或多个第三通信装置。Exemplarily, the communication system may include one or more first communication devices, one or more second communication devices, and one or more third communication devices.
第九方面,本申请提供了一种计算机程序产品,该计算机程序产品包括计算机程序或指令,当该计算机程序或指令在计算机上运行时,使得该计算机执行上述第一方面的任一种可能的设计中的方法或上述第二方面的任一种可能的设计中的方法或上述第三方面的任一种可能的设计中的方法或上述第四方面的任一种可能的设计中的方法或上述第五方面的任一种可能的设计中的方法。In the ninth aspect, the present application provides a computer program product, which includes a computer program or instructions. When the computer program or instructions are run on a computer, the computer executes any possible method in the design of the first aspect or any possible method in the design of the second aspect or any possible method in the design of the third aspect or any possible method in the design of the fourth aspect or any possible method in the design of the fifth aspect.
第十方面,本申请提供了一种计算机可读存储介质,该计算机可读存储介质中存储有计算机程序或指令,当该计算机程序或指令被计算机执行时,使得该计算机执行上述第一方面的任一种可能的设计中的方法或上述第二方面的任一种可能的设计中的方法或上述第三方面的任一种可能的设计中的方法或上述第四方面的任一种可能的设计中的方法或上述第五方面的任一种可能的设计中的方法。In the tenth aspect, the present application provides a computer-readable storage medium, which stores a computer program or instruction. When the computer program or instruction is executed by a computer, the computer executes any possible design method of the first aspect or any possible design method of the second aspect or any possible design method of the third aspect or any possible design method of the fourth aspect or any possible design method of the fifth aspect.
第十一方面,本申请提供了一种芯片,该芯片可以包括处理器,还可以包括存储器(或者该芯片与储存器耦合),该芯片执行储存器中的程序指令,以执行上述第一方面的任一种可能的设计中的方法或上述第二方面的任一种可能的设计中的方法或上述第三方面的任一种可能的设计中的方法或上述第四方面的任一种可能的设计中的方法或上述第五方面的任一种可能的设计中的方法。其中,“耦合”是指两个部件彼此直接或间接地结合,如耦合可以是指两个部件之间电连接。In an eleventh aspect, the present application provides a chip, which may include a processor and a memory (or the chip is coupled to the memory), and the chip executes program instructions in the memory to execute the method in any possible design of the first aspect or the method in any possible design of the second aspect or the method in any possible design of the third aspect or the method in any possible design of the fourth aspect or the method in any possible design of the fifth aspect. Wherein, "coupling" refers to the direct or indirect combination of two components with each other, such as coupling can refer to an electrical connection between two components.
第十二方面,本申请还提供了一种芯片系统,该芯片系统包括处理器,用于支持计算机装置实现上述第一方面的任一种可能的设计中的方法或上述第二方面的任一种可能的设计中的方法或上述第三方面的任一种可能的设计中的方法或上述第四方面的任一种可能的设计中的方法或上述第五方面的任一种可能的设计中的方法。在一种可能的设计中,该芯片系统还包括存储器,该存储器用于保存该计算机装置必要的程序和数据。该芯片系统可以由芯片构成,也可以包含芯片和其他分立器件。In a twelfth aspect, the present application further provides a chip system, which includes a processor for supporting a computer device to implement any possible method in the design of the first aspect or any possible method in the design of the second aspect or any possible method in the design of the third aspect or any possible method in the design of the fourth aspect or any possible method in the design of the fifth aspect. In one possible design, the chip system also includes a memory, which is used to store the necessary programs and data of the computer device. The chip system can be composed of chips, or it can include chips and other discrete devices.
本申请在上述各方面提供的实现方式的基础上,还可以进行进一步组合以提供更多实现方式。Based on the implementations provided in the above aspects, this application can also be further combined to provide more implementations.
图1a示例性示出本申请实施例提供的一种可能的通信系统架构示意图;FIG. 1a exemplarily shows a possible communication system architecture diagram provided by an embodiment of the present application;
图1b示例性示出本申请实施例提供的另一种可能的通信系统架构示意图;FIG. 1b exemplarily shows another possible communication system architecture diagram provided in an embodiment of the present application;
图2示例性示出本申请实施例提供的又一种可能的通信系统架构示意图;FIG2 exemplarily shows a schematic diagram of another possible communication system architecture provided in an embodiment of the present application;
图3示例性示出本申请实施例一提供的一种通信方法的流程示意图;FIG3 exemplarily shows a flow chart of a communication method provided in Embodiment 1 of the present application;
图4示例性示出本申请实施例一提供的另一种通信方法的流程示意图;FIG4 exemplarily shows a flow chart of another communication method provided in Embodiment 1 of the present application;
图5示例性示出本申请实施例一提供的又一种通信方法的流程示意图;FIG5 exemplarily shows a flow chart of another communication method provided in Embodiment 1 of the present application;
图6示例性示出本申请实施例二提供的一种通信方法的流程示意图; FIG6 exemplarily shows a flow chart of a communication method provided in Embodiment 2 of the present application;
图7示例性示出本申请实施例二提供的另一种通信方法的流程示意图;FIG7 exemplarily shows a flow chart of another communication method provided in Embodiment 2 of the present application;
图8示例性示出本申请实施例二提供的又一种通信方法的流程示意图;FIG8 exemplarily shows a flow chart of another communication method provided in Embodiment 2 of the present application;
图9示例性示出本申请实施例提供的一种可能的通信装置的结构示意图;FIG9 exemplarily shows a schematic structural diagram of a possible communication device provided in an embodiment of the present application;
图10示例性示出本申请实施例提供的另一种可能的通信装置的结构示意图。FIG10 exemplarily shows a schematic structural diagram of another possible communication device provided in an embodiment of the present application.
下面将结合附图,对本申请实施例进行详细描述。The embodiments of the present application will be described in detail below with reference to the accompanying drawings.
以下,对本申请提供的通信方法适用的可能的通信系统架构进行介绍。需要说明的是,这些介绍是为了便于本领域技术人员理解,并不会对本申请所要求的保护范围构成限定。The following is an introduction to possible communication system architectures applicable to the communication method provided in this application. It should be noted that these introductions are for the convenience of understanding by those skilled in the art and do not limit the scope of protection claimed in this application.
图1a示例性示出本申请实施例适用的一种可能的通信系统架构示意图。其中,图1a所示意的通信系统架构为第三代合作伙伴计划(3rd generation partnership project,3GPP)标准制定的第五代(5th-generation,5G)通信系统架构,该通信系统架构中包括终端设备、接入网(比如(R)AN)、核心网(core network,CN)和数据网络(data network,DN)。可选的,终端设备可以通过无线的方式与接入网设备(比如(R)AN设备)相连,接入网设备可以通过无线或有线方式与核心网连接。核心网设备与无线接入网设备可以是独立的不同的物理设备,也可以是将核心网设备的功能与无线接入网设备的逻辑功能集成在同一个物理设备上,还可以是一个物理设备上集成了部分核心网设备的功能和部分的无线接入网设备的功能。终端设备和终端设备之间以及接入网设备和接入网设备之间可以通过有线或无线的方式相互连接。示例性地,该通信系统架构中还可以包括其它网络设备(比如无线中继设备或无线回传设备等)。FIG. 1a exemplarily shows a possible communication system architecture diagram applicable to the embodiment of the present application. Among them, the communication system architecture shown in FIG. 1a is the fifth-generation (5th-generation, 5G) communication system architecture formulated by the third generation partnership project (3GPP) standard, and the communication system architecture includes terminal equipment, access network (such as (R)AN), core network (CN) and data network (DN). Optionally, the terminal equipment can be connected to the access network equipment (such as (R)AN equipment) in a wireless manner, and the access network equipment can be connected to the core network in a wireless or wired manner. The core network equipment and the wireless access network equipment can be independent and different physical devices, or the functions of the core network equipment and the logical functions of the wireless access network equipment can be integrated on the same physical device, or the functions of some core network equipment and some wireless access network equipment can be integrated on one physical device. Terminal equipment and terminal equipment and access network equipment and access network equipment can be connected to each other in a wired or wireless manner. Exemplarily, the communication system architecture may also include other network devices (such as wireless relay devices or wireless backhaul devices, etc.).
下面对通信系统架构中包括的部分设备的功能进行简单介绍。The following is a brief introduction to the functions of some devices included in the communication system architecture.
终端设备:是用户侧的一种具有收发信号功能的实体,可以向用户提供视频、语音、数据连通性等服务功能。例如,终端设备是移动用户与网络交互的入口,能够提供基本的计算能力,存储能力,可以向用户显示业务窗口,接收用户操作输入。下一代终端设备(NextGen UE)可以采用新空口技术,与(R)AN设备建立信号连接,数据连接,从而传输控制信号和业务数据到移动网络。Terminal equipment: It is an entity on the user side that has the function of sending and receiving signals, and can provide users with service functions such as video, voice, and data connectivity. For example, the terminal equipment is the entrance for mobile users to interact with the network, and can provide basic computing and storage capabilities, display service windows to users, and receive user operation input. The next generation of terminal equipment (NextGen UE) can use new air interface technology to establish signal connections and data connections with (R)AN equipment, thereby transmitting control signals and service data to the mobile network.
可选的,终端设备也可以称为终端、用户设备(user equipment,UE)、接入终端设备、车载终端、工业控制终端、UE单元、UE站、移动站、移动台(mobile station,MS)、移动终端(mobile terminal,MT)、远方站、远程终端设备、移动设备、UE终端设备、终端设备、无线通信设备、UE代理或UE装置等。在本申请实施例中,终端设备可以是位置固定的,也可以是移动的,本申请实施对此并不作限定。示例性地,终端设备可以部署在陆地上,包括室内或室外、手持、穿戴或车载,或者也可以部署在水面上(比如轮船等),或者还可以部署在空中(比如飞机、气球或卫星上等)。Optionally, the terminal device may also be referred to as a terminal, user equipment (UE), access terminal equipment, vehicle-mounted terminal, industrial control terminal, UE unit, UE station, mobile station, mobile station (MS), mobile terminal (MT), remote station, remote terminal equipment, mobile device, UE terminal equipment, terminal equipment, wireless communication equipment, UE agent or UE device, etc. In the embodiment of the present application, the terminal device may be fixed or mobile, and the implementation of the present application does not limit this. Exemplarily, the terminal device may be deployed on land, including indoors or outdoors, handheld, wearable or vehicle-mounted, or may be deployed on the water (such as a ship, etc.), or may be deployed in the air (such as an airplane, a balloon or a satellite, etc.).
示例性地,终端设备可以是手机(mobile phone)、平板电脑(Pad)、用户单元(subscriber unit)、蜂窝电话(cellular phone)、智能电话(smart phone)、无线数据卡、个人数字助理(Personal Digital Assistant,PDA)电脑、无线调制解调器(modem)、手持设备(handset)、膝上型电脑(laptop computer)、带无线收发功能的电脑、虚拟现实(virtual reality,VR)终端设备、增强现实(augmented reality,AR)终端设备、工业控制(industrial control)中的无线终端、车载终端设备、无人驾驶(self driving)中的无线终端、远程医疗(remote medical)中的无线终端、智能电网(smart grid)中的无线终端、运输安全(transportation safety)中的无线终端、智慧城市(smart city)中的无线终端、智慧家庭(smart home)中的无线终端、可穿戴终端设备、车辆、无人机、直升机、飞机、工厂机器/设备、机器类通信(Machine Type Communication,MTC)终端、轮船或机器人等。本申请实施例对终端设备所采用的具体技术和具体设备形态不做限定。Exemplarily, the terminal device may be a mobile phone, a tablet computer, a subscriber unit, a cellular phone, a smart phone, a wireless data card, a personal digital assistant (PDA), a computer, a wireless modem, a handheld device (handset), a laptop computer, a computer with wireless transceiver function, a virtual reality (VR) terminal device, an augmented reality (AR) terminal device, Wireless terminals in industrial control, vehicle-mounted terminal equipment, wireless terminals in self-driving, wireless terminals in remote medical, wireless terminals in smart grid, wireless terminals in transportation safety, wireless terminals in smart city, wireless terminals in smart home, wearable terminal equipment, vehicles, drones, helicopters, airplanes, factory machines/equipment, machine type communication (MTC) terminals, ships or robots, etc. The embodiments of the present application do not limit the specific technology and specific device form adopted by the terminal equipment.
(R)AN设备:是一种将终端设备接入到无线网络的设备。例如,(R)AN设备可以为特定区域的授权用户提供入网功能,并可以根据用户的级别、业务的需求等确定不同质量的传输隧道来传输用户数据。(R)AN设备能够管理自身的资源,合理利用,按需为终端设备提供接入服务,并负责把控制信号和用户数据在终端设备和核心网之间转发。(R)AN equipment: is a device that connects terminal devices to wireless networks. For example, (R)AN equipment can provide network access functions for authorized users in a specific area, and can determine transmission tunnels of different qualities to transmit user data based on user levels, business requirements, etc. (R)AN equipment can manage its own resources, use them reasonably, provide access services to terminal devices on demand, and is responsible for forwarding control signals and user data between terminal devices and the core network.
示例性地,(R)AN设备可以包括但不限于:第五代(5th generation,5G)通信系统中的下一代基站(next generation NodeB,gNB)、第六代(6th generation,6G)通信系统中的下一代基站、未来通信系统中的基站、传输接收点(transmission reception point,TRP)、演进型节点B(evolved Node B,eNB)、无线网络控制器(radio network controller,RNC)、节点B(Node B,NB)、基站控制器(base station controller, BSC)、基站收发台(base transceiver station,BTS)、家庭基站(例如,home evolved Node B,或home Node B,HNB)、基带单元(base band unit,BBU),或无线保真(wireless fidelity,Wi-Fi)接入点(access point,AP)等。Exemplarily, (R)AN equipment may include, but is not limited to: a next generation base station (next generation NodeB, gNB) in a fifth generation (5G) communication system, a next generation base station in a sixth generation (6G) communication system, a base station in a future communication system, a transmission reception point (TRP), an evolved Node B (eNB), a radio network controller (RNC), a Node B (NB), a base station controller (base station controller, BSC), base transceiver station (BTS), home base station (e.g., home evolved Node B, or home Node B, HNB), base band unit (BBU), or wireless fidelity (Wi-Fi) access point (AP), etc.
可选的,在一种网络结构中,(R)AN设备还可以包括集中单元(centralized unit,CU)或分布式单元(distributed unit,DU)。这种结构可以将网络设备的协议层拆分开,部分协议层的功能放在CU集中控制,剩下部分或全部协议层的功能分布在DU中,由CU集中控制DU。例如,分组数据汇聚层协议(packet data convergence protocol,PDCP)层及以上协议层功能可以设置在CU,PDCP以下的协议层(例如RLC层和介质访问控制(medium access control,MAC)层等)的功能设置在DU。需要说明的是,这种协议层的划分仅仅是一种举例,还可以在其它协议层划分。射频装置可以拉远,不放在DU中,也可以集成在DU中,或者部分拉远部分集成在DU中,本申请实施例不作任何限制。另外,在一些实施例中,还可以将CU的控制面(control plan,CP)和用户面(user plan,UP)分离,分成不同实体来实现,分别为控制面CU实体(CU-CP实体)和用户面CU实体(CU-UP实体)。Optionally, in a network structure, the (R)AN device may also include a centralized unit (CU) or a distributed unit (DU). This structure can split the protocol layers of the network device, with the functions of some protocol layers being centrally controlled by the CU, and the functions of the remaining part or all of the protocol layers being distributed in the DU, which is centrally controlled by the CU. For example, the functions of the packet data convergence protocol (PDCP) layer and above can be set in the CU, and the functions of the protocol layers below the PDCP (such as the RLC layer and the medium access control (MAC) layer, etc.) are set in the DU. It should be noted that this division of the protocol layers is only an example, and it can also be divided in other protocol layers. The radio frequency device can be remote and not placed in the DU, or it can be integrated in the DU, or part of it can be remote and part of it can be integrated in the DU, and the embodiments of the present application do not impose any restrictions. In addition, in some embodiments, the control plane (CP) and user plane (UP) of the CU can be separated and implemented by different entities, namely, the control plane CU entity (CU-CP entity) and the user plane CU entity (CU-UP entity).
示例性地,以网络设备为基站为例,基站可以与终端设备进行通信,也可以通过中继站与终端设备进行通信。终端设备可以与不同接入技术中的多个基站进行通信。For example, taking the network device as a base station, the base station can communicate with the terminal device, or communicate with the terminal device through a relay station. The terminal device can communicate with multiple base stations in different access technologies.
在本申请实施例中,(R)AN设备可以是宏基站,也可以是微基站或室内站,还可以是中继节点或施主节点等。本申请实施例对无线接入网设备所采用的具体技术和具体设备形态不做限定。In the embodiment of the present application, the (R)AN device may be a macro base station, a micro base station or an indoor station, a relay node or a donor node, etc. The embodiment of the present application does not limit the specific technology and specific device form used by the wireless access network device.
数据网络:为用户提供业务服务的数据网络,一般客户端位于终端设备,服务端位于数据网络。数据网络可以是私有网络,比如局域网,也可以是不受运营商管控的外部网络,比如互联网(Internet),还可以是运营商共同部署的专有网络,比如提供IP多媒体网络子系统(IP multimedia core network subsystem,IMS)服务的网络。Data network: A data network that provides business services to users. Generally, the client is located in the terminal device and the server is located in the data network. The data network can be a private network, such as a local area network, or an external network that is not controlled by the operator, such as the Internet. It can also be a proprietary network jointly deployed by operators, such as a network that provides IP multimedia core network subsystem (IMS) services.
核心网:负责维护移动网络的签约数据,管理移动网络的网元,为终端设备提供会话管理、移动性管理、策略管理、安全认证等功能。在终端设备附着的时候,为终端设备提供入网认证;在终端设备有业务请求时,为终端设备分配网络资源;在终端设备移动的时候,为终端设备更新网络资源;在终端设备空闲的时候,为终端设备提供快恢复机制;在终端设备去附着的时候,为终端设备释放网络资源;在终端设备有业务数据时,为终端设备提供数据路由功能,如转发上行数据到数据网络;或者从数据网络接收终端设备的下行数据,转发到(R)AN设备,从而由(R)AN设备发送给终端设备。可选的,在功能逻辑上,核心网的网元可以分为用户面网元和控制面网元两部分。其中,用户面网元用于负责业务数据的传输,例如用户面网元可以包括但不限于用户面功能(user plane function,UPF)网元。控制面网元用于负责移动网络的管理,例如,控制面可以包括但不限于接入和移动性管理功能(access and mobility management function,AMF)网元、会话管理功能(session management function,SMF)网元、统一数据管理(unified data management,UDM)网元、策略控制功能(policy control function,PCF)网元、应用功能(application function,AF)网元、认证服务器功能(authentication server function,AUSF)网元、网络切片选择功能(network slice selection function,NSSF)网元。当然,核心网还可以包括其它网元(比如网络开放功能(network exposure function,NEF)网元、网络存储功能(network function repository function,NRF)网元、统一数据存储库(unified data repository,UDR)网元、网络切片选择的认证和授权功能(network slice-specific authentication and authorization function,NSSAAF)网元等),此处不再一一列举。Core network: responsible for maintaining the subscription data of the mobile network, managing the network elements of the mobile network, and providing functions such as session management, mobility management, policy management, and security authentication for terminal devices. When the terminal device is attached, it provides network access authentication for the terminal device; when the terminal device has a service request, it allocates network resources for the terminal device; when the terminal device moves, it updates network resources for the terminal device; when the terminal device is idle, it provides a fast recovery mechanism for the terminal device; when the terminal device is detached, it releases network resources for the terminal device; when the terminal device has service data, it provides data routing functions for the terminal device, such as forwarding uplink data to the data network; or receiving downlink data of the terminal device from the data network and forwarding it to the (R)AN device, so that the (R)AN device sends it to the terminal device. Optionally, in terms of functional logic, the network elements of the core network can be divided into two parts: user plane network elements and control plane network elements. Among them, the user plane network elements are responsible for the transmission of service data. For example, the user plane network elements can include but are not limited to user plane function (UPF) network elements. The control plane network elements are responsible for the management of the mobile network. For example, the control plane may include but is not limited to access and mobility management function (AMF) network elements, session management function (SMF) network elements, unified data management (UDM) network elements, policy control function (PCF) network elements, application function (AF) network elements, authentication server function (AUSF) network elements, and network slice selection function (NSSF) network elements. Of course, the core network can also include other network elements (such as network exposure function (NEF) network elements, network storage function (NRF) network elements, unified data repository (UDR) network elements, network slice-specific authentication and authorization function (NSSAAF) network elements, etc.), which are not listed here one by one.
可选的,核心网控制面采用服务化架构,控制面网元之间的交互采用服务调用的方式,来替换传统架构中的点对点通信方式。在服务化架构中,控制面网元会向其他控制面网元开放服务,供其他控制面网元调用;在点对点通信中,控制面网元之间通信接口会存储一套特定的消息,只能由接口两端的控制面网元在通信时使用。Optionally, the core network control plane adopts a service-oriented architecture, and the interaction between control plane network elements adopts the service call method to replace the point-to-point communication method in the traditional architecture. In the service-oriented architecture, the control plane network elements will open services to other control plane network elements for other control plane network elements to call; in point-to-point communication, the communication interface between control plane network elements will store a set of specific messages, which can only be used by the control plane network elements at both ends of the interface when communicating.
下面对核心网中包括的部分网元的功能进行简单介绍:The following is a brief introduction to the functions of some network elements included in the core network:
(1)SMF网元:主要用于会话管理、终端设备的IP地址分配和管理、选择可管理用户设备平面功能、策略控制、或收费功能接口的终结点以及下行数据通知等,比如可以完成与协议数据单元(protocol data unit,PDU)会话相关的建立、释放、更新等流程。在5G通信系统中,会话管理网元可以是SMF网元,在未来通信如第六代(6th-generation,6G)通信系统中,会话管理功能网元仍可以是SMF网元,或者有其它名称,本申请对此不作限定。Nsmf是SMF网元提供的基于服务的接口,SMF网元可以通过Nsmf与其他的网络功能通信。 (1) SMF network element: mainly used for session management, IP address allocation and management of terminal devices, selection of endpoints for manageable user equipment plane functions, policy control, or charging function interfaces, and downlink data notification, etc. For example, it can complete the establishment, release, and update processes related to protocol data unit (PDU) sessions. In 5G communication systems, session management network elements can be SMF network elements. In future communications such as the sixth-generation (6G) communication system, session management function network elements can still be SMF network elements, or have other names, which are not limited in this application. Nsmf is a service-based interface provided by SMF network elements. SMF network elements can communicate with other network functions through Nsmf.
(2)AMF网元:主要用于移动性管理和接入管理等,比如可以接收终端设备的非接入层(non-access stratum,NAS)信令(包括移动管理(mobility management,MM)信令和会话管理(session management,SM)信令)和接入网设备的相关信令(例如与AMF网元交互的基站粒度的N2信令),完成用户的注册流程和SM信令的转发以及移动性管理。例如可以是第四代(4th-generation,6G)通信系统中的移动性管理实体(mobility management entity,MME)或者5G通信系统中的AMF网元。在未来通信系统如6G通信系统中,接入管理网元仍可以是AMF网元,或者有其它名称,本申请对此不作限定。Namf是AMF网元提供的基于服务的接口,AMF网元可以通过Namf与其他的网络功能通信。(2) AMF network element: Mainly used for mobility management and access management, etc. For example, it can receive non-access stratum (NAS) signaling (including mobility management (MM) signaling and session management (SM) signaling) of terminal devices and related signaling of access network devices (such as N2 signaling at the base station granularity that interacts with AMF network elements), complete the user registration process and forwarding of SM signaling and mobility management. For example, it can be the mobility management entity (MME) in the fourth-generation (6G) communication system or the AMF network element in the 5G communication system. In future communication systems such as 6G communication systems, the access management network element can still be the AMF network element, or have other names, which is not limited in this application. Namf is a service-based interface provided by the AMF network element. The AMF network element can communicate with other network functions through Namf.
(3)UDM网元:用于处理用户标识、签约、接入鉴权、注册、或移动性管理等。在5G通信系统中,数据管理网元可以是UDM网元,在未来通信系统如6G通信系统中,数据管理网元仍可以是UDM网元,或者有其它名称,本申请对此不作限定。其中Nudm是UDM网元提供的基于服务的接口,UDM网元可以通过Nudm与其他的网络功能通信。(3) UDM network element: used to process user identification, contract signing, access authentication, registration, or mobility management. In a 5G communication system, the data management network element may be a UDM network element. In future communication systems such as a 6G communication system, the data management network element may still be a UDM network element, or may have other names, which are not limited in this application. Nudm is a service-based interface provided by the UDM network element, and the UDM network element can communicate with other network functions through Nudm.
(4)PCF网元:用于指导网络行为的统一策略框架,为控制平面功能网元(例如AMF、SMF等)提供策略规则信息(比如移动性相关策略或PDU会话相关策略(比如服务质量(quality of service,QoS)策略、计费策略等))等。在5G通信系统中,策略控制网元可以是PCF网元,在未来通信系统如6G通信系统中,策略控制网元仍可以是PCF网元,或者有其它名称,本申请对此不作限定。其中Npcf是PCF网元提供的基于服务的接口,PCF网元可以通过Npcf与其他的网络功能通信。(4) PCF network element: a unified policy framework for guiding network behavior, providing policy rule information (such as mobility-related policies or PDU session-related policies (such as quality of service (QoS) policies, billing policies, etc.)) to control plane functional network elements (such as AMF, SMF, etc.). In a 5G communication system, the policy control network element may be a PCF network element. In future communication systems such as a 6G communication system, the policy control network element may still be a PCF network element, or may have other names, which are not limited in this application. Npcf is a service-based interface provided by the PCF network element, and the PCF network element can communicate with other network functions through Npcf.
(5)AF网元:用于进行应用影响的数据路由,接入网络开放功能,或与策略框架交互进行策略控制等。在5G通信系统中,应用网元可以是AF网元,在未来通信系统如6G通信系统中,应用网元仍可以是AF网元,或者有其它名称,本申请对此不作限定。Naf是AF提供的基于服务的接口,AF网元可以通过Naf与其他的网络功能通信。(5) AF network element: used for data routing affected by applications, access to network open functions, or interacting with the policy framework for policy control, etc. In a 5G communication system, an application network element may be an AF network element. In future communication systems such as a 6G communication system, an application network element may still be an AF network element, or have other names, which are not limited in this application. Naf is a service-based interface provided by AF, and an AF network element can communicate with other network functions through Naf.
(6)UPF网元:用于分组路由和转发、或用户面数据的QoS处理等。在5G通信系统中,用户面网元可以是UPF网元,在未来通信系统如6G通信系统中,用户面网元仍可以是UPF网元,或者有其它名称,本申请对此不作限定。(6) UPF network element: used for packet routing and forwarding, or QoS processing of user plane data, etc. In a 5G communication system, the user plane network element may be a UPF network element. In future communication systems such as a 6G communication system, the user plane network element may still be a UPF network element, or have other names, which are not limited in this application.
(7)AUSF网元:主要用于用户鉴权等。在5G通信系统中,认证服务网元可以是AUSF网元,在未来通信系统如6G通信系统中,认证服务网元仍可以是AUSF网元,或者有其它名称,本申请对此不作限定。Nausf是AUSF网元提供的基于服务的接口,AUSF网元可以通过Nausf与其他的网络功能通信。(7) AUSF network element: mainly used for user authentication, etc. In the 5G communication system, the authentication service network element can be the AUSF network element. In future communication systems such as the 6G communication system, the authentication service network element can still be the AUSF network element, or have other names, which are not limited in this application. Nausf is a service-based interface provided by the AUSF network element. The AUSF network element can communicate with other network functions through Nausf.
(8)NSSF网元:用于为终端设备选择网络切片,在5G通信系统中,网络切片选择功能网元可以是NSSF网元,在未来通信系统如6G通信系统中,网络切片选择功能网元仍可以是NSSF网元,或者有其它名称,本申请对此不作限定。(8) NSSF network element: used to select a network slice for a terminal device. In a 5G communication system, the network slice selection function network element may be a NSSF network element. In future communication systems such as a 6G communication system, the network slice selection function network element may still be a NSSF network element, or may have other names, which is not limited in this application.
(9)NEF网元:用于安全地向外部开放由3GPP网络功能提供的业务和能力等。在5G通信系统中,网络开放网元可以是NEF网元,在未来通信系统如6G通信系统中,网络开放功能网元仍可以是NEF网元,或者有其它名称,本申请对此不作限定。其中Nnef是NEF网元提供的基于服务的接口,NEF网元可以通过Nnef与其他的网络功能通信。(9) NEF network element: used to securely open services and capabilities provided by 3GPP network functions to the outside. In a 5G communication system, a network open network element may be a NEF network element. In future communication systems such as a 6G communication system, a network open function network element may still be a NEF network element, or have other names, which are not limited in this application. Nnef is a service-based interface provided by the NEF network element, and the NEF network element can communicate with other network functions through Nnef.
(10)NRF网元:用于提供服务注册、发现和授权,并维护可用的网络功能(network function,NF)实例信息,可以实现网络功能和服务的按需配置以及NF之间的互连。在5G通信系统中,网络存储网元可以是NRF网元,在未来通信系统如6G通信系统中,网络存储功能网元仍可以是NRF网元,或者有其它名称,本申请对此不作限定。Nnrf是NRF网元提供的基于服务的接口,NRF网元可以通过Nnrf与其他的网络功能通信。(10) NRF network element: used to provide service registration, discovery and authorization, and maintain available network function (NF) instance information, which can realize on-demand configuration of network functions and services and interconnection between NFs. In the 5G communication system, the network storage network element can be an NRF network element. In future communication systems such as the 6G communication system, the network storage function network element can still be an NRF network element, or have other names, which is not limited in this application. Nnrf is a service-based interface provided by the NRF network element. The NRF network element can communicate with other network functions through Nnrf.
(11)NSSAAF网元:主要负责网络切片的认证和授权,可以通过认证、授权和计费代理(authentication,authorization,and accounting proxy,AAA-P)与认证、授权和计费服务器(authentication,authorization,and accounting server,AAA-S)交互。(11) NSSAAF network element: It is mainly responsible for the authentication and authorization of network slices and can interact with the authentication, authorization, and accounting server (AAA-S) through the authentication, authorization, and accounting proxy (AAA-P).
(12)UDR网元:用于UDM网元存储订阅数据或读取订阅数据以及PCF网元存储策略数据或者读取策略数据。(12) UDR network element: used by UDM network elements to store subscription data or read subscription data and PCF network elements to store policy data or read policy data.
可以理解的是,上述网元或者功能既可以是硬件设备中的网络元件,也可以是在专用硬件上运行软件功能,或者是平台(例如,云平台)上实例化的虚拟化功能。可选的,上述网元或者功能可以由一个设备实现,也可以由多个设备共同实现,还可以是一个设备内的一个功能模块,本申请实施例对此不作具体限定。 It is understandable that the above network element or function can be a network element in a hardware device, a software function running on dedicated hardware, or a virtualized function instantiated on a platform (e.g., a cloud platform). Optionally, the above network element or function can be implemented by one device, or by multiple devices, or a functional module in one device, which is not specifically limited in the embodiments of the present application.
其中,如图1a所示,终端设备可以通过(R)AN设备等接入网设备接入5G通信系统,终端设备可以通过下一代网络(Next generation,NG)1接口(简称N1)与AMF网元通信,接入网设备通过N2接口(简称N2)与AMF网元通信,接入网设备通过N3接口(简称N3)与UPF网元通信,AMF网元通过N11接口(简称N11)与SMF网元通信,AMF网元通过N8接口(简称N8)与UDM网元通信,AMF网元通过N12接口(简称N12)与AUSF网元通信,AMF网元通过N15接口(简称N15)与PCF网元通信,SMF网元通过N7接口(简称N7)与PCF网元通信,SMF网元通过N4接口(简称N4)与UPF网元通信,NEF网元通过N29接口(简称N29)与SMF网元通信,UPF网元通过N6接口(简称N6)接入数据网络(data network,DN)。As shown in Figure 1a, the terminal device can access the 5G communication system through access network devices such as (R)AN devices. The terminal device can communicate with the AMF network element through the next generation network (Next generation, NG) 1 interface (referred to as N1), the access network device communicates with the AMF network element through the N2 interface (referred to as N2), the access network device communicates with the UPF network element through the N3 interface (referred to as N3), the AMF network element communicates with the SMF network element through the N11 interface (referred to as N11), and the AMF network element communicates with the SMF network element through the N8 interface (referred to as N8). ) communicates with UDM network elements, AMF network elements communicate with AUSF network elements through N12 interface (N12 for short), AMF network elements communicate with PCF network elements through N15 interface (N15 for short), SMF network elements communicate with PCF network elements through N7 interface (N7 for short), SMF network elements communicate with UPF network elements through N4 interface (N4 for short), NEF network elements communicate with SMF network elements through N29 interface (N29 for short), and UPF network elements access the data network (DN) through N6 interface (N6 for short).
需要说明的是,图1a中的各个网元以及各个网元之间的接口名称只是作为一个示例,具体实施过程中各个网元以及各个网元之间的接口名称可能为其它名称,本申请实施例对此并不作限定。It should be noted that the names of the network elements and the interfaces between the network elements in Figure 1a are only used as an example. During the specific implementation process, the names of the network elements and the interfaces between the network elements may be other names, and the embodiments of the present application do not limit this.
图1b为当前技术规范提供的另一种可能的通信系统架构示意图(比如用于支撑定位的网络架构示意图)。该网络架构是在图1a所示意的通信系统架构的基础上进行扩展,例如,增加了网关移动定位中心(gateway mobile location center,GMLC)网元,位置提取功能(location retrieval function,LRF)网元,位置服务(location service,LCS)客户端(client),位置管理功能(Location Management Function,LMF)网元等多个功能实体,用于支持定位服务功能。FIG1b is a schematic diagram of another possible communication system architecture provided by the current technical specification (e.g., a schematic diagram of a network architecture for supporting positioning). This network architecture is an expansion of the communication system architecture shown in FIG1a. For example, multiple functional entities such as a gateway mobile location center (GMLC) network element, a location retrieval function (LRF) network element, a location service (LCS) client, and a location management function (LMF) network element are added to support positioning service functions.
下面对图1b所示意的网络架构中新增加的功能实体的功能进行简单介绍。The following is a brief introduction to the functions of the newly added functional entities in the network architecture shown in Figure 1b.
(1)GMLC网元:用于负责定位业务的定位请求处理,并为定位业务选择合适的AMF网元。(1) GMLC network element: responsible for processing positioning requests for positioning services and selecting appropriate AMF network elements for positioning services.
(2)LRF网元:可以与GMLC网元配置或单独配置,并且负责检索或验证终端设备的位置信息,为已经发起IMS紧急会话的终端设备提供路由及相关信息。(2) LRF network element: It can be configured with the GMLC network element or independently, and is responsible for retrieving or verifying the location information of the terminal device and providing routing and related information for the terminal device that has initiated the IMS emergency session.
(3)位置服务客户端(LCS client):可以通过GMLC网元与LCS客户端之间的Le接口,向GMLC网元发送定位请求,以发起针对UE的定位服务。(3) Location service client (LCS client): A positioning request can be sent to the GMLC network element through the Le interface between the GMLC network element and the LCS client to initiate positioning services for the UE.
(4)LMF网元:主要负责定位业务时进行定位请求管理,定位资源调配以及确定终端设备的位置。(4)LMF network element: Mainly responsible for managing positioning requests, allocating positioning resources, and determining the location of terminal devices during positioning services.
举例来说,如图1b所示,NL1为AMF网元与LMF网元之间的接口。NL7为LMF网元与LMF网元之间的接口。N52为UDM网元与NEF网元之间的接口。NL2为AMF网元与GMLC网元之间的接口。NL5为NEF网元与GMLC网元之间的接口。N33为NEF网元与AF网元之间的接口。N51为AMF网元与NEF网元的接口。NL6为UDM网元与GMLC网元之间的接口。一个Le为LCS client与GMLC网元之间的接口;一个Le为LCS client与LRF网元之间的接口。For example, as shown in Figure 1b, NL1 is the interface between the AMF network element and the LMF network element. NL7 is the interface between the LMF network element and the LMF network element. N52 is the interface between the UDM network element and the NEF network element. NL2 is the interface between the AMF network element and the GMLC network element. NL5 is the interface between the NEF network element and the GMLC network element. N33 is the interface between the NEF network element and the AF network element. N51 is the interface between the AMF network element and the NEF network element. NL6 is the interface between the UDM network element and the GMLC network element. One Le is the interface between the LCS client and the GMLC network element; one Le is the interface between the LCS client and the LRF network element.
应理解,上述RTK定位技术的应用架构的介绍是以5G通信系统架构为例进行的,而在4G通信系统架构下,AMF网元可以替换为MME,LMF网元可以替换为演进服务移动位置中心(evolved serving mobile location center,E-SMLC)。图2为本申请实施例提供的又一种可能的通信系统架构(比如4G通信系统的定位架构)示意图。如图2所示,E-SMLC类似于LMF网元的角色,MME类似于AMF网元的角色。MME可以通过S1应用协议(S1 application protocol,S1-AP)接口与接入网设备(比如演进型通用陆地无线接入网(Evolved Universal Terrestrial Radio Access Network,E-UTRAN))连接。本申请实施例中,LMF网元和E-SMLC可称为位置管理网元。举例来说,如图2所示,LTE-Uu为UE与E-UTRAN之间的接口;SLs为E-SMLC与MME之间的接口;SLg为MME与GMLC网元之间的接口;SLm为位置测量单元(Location measurement unit,LMU)与E-SMLC之间的接口。It should be understood that the introduction of the application architecture of the above-mentioned RTK positioning technology is based on the 5G communication system architecture as an example, while in the 4G communication system architecture, the AMF network element can be replaced by MME, and the LMF network element can be replaced by the evolved serving mobile location center (E-SMLC). Figure 2 is a schematic diagram of another possible communication system architecture (such as the positioning architecture of the 4G communication system) provided in an embodiment of the present application. As shown in Figure 2, the E-SMLC is similar to the role of the LMF network element, and the MME is similar to the role of the AMF network element. The MME can be connected to the access network device (such as the Evolved Universal Terrestrial Radio Access Network (Evolved Universal Terrestrial Radio Access Network, E-UTRAN)) through the S1 application protocol (S1 application protocol, S1-AP) interface. In the embodiment of the present application, the LMF network element and the E-SMLC can be referred to as location management network elements. For example, as shown in Figure 2, LTE-Uu is the interface between UE and E-UTRAN; SLs is the interface between E-SMLC and MME; SLg is the interface between MME and GMLC network element; SLm is the interface between location measurement unit (LMU) and E-SMLC.
下面基于图1a或图1b或图2所示意的通信系统架构,对本申请实施例中通信方法的具体实现进行详细介绍。The specific implementation of the communication method in the embodiment of the present application is described in detail below based on the communication system architecture shown in Figure 1a, Figure 1b or Figure 2.
【实施例一】[Example 1]
图3示例性示出本申请实施例一提供的一种通信方法的流程示意图。该方法适用于图1a或图1b或图2所示意的通信系统架构。该方法流程可以是通过多个通信装置(比如第一通信装置、第二通信装置和第三通信装置)之间进行数据交互来实现。可选的,第一通信装置可以是终端设备或能够支持终端设备实现该方法所需的功能的部件(比如芯片、芯片系统或电路等),第二通信装置可以是第一网元或能够支持第一网元实现该方法所需的功能的部件(比如芯片、芯片系统或电路等),第三通信装置可以是第二网元或能够支持第二网元实现该方法所需的功能的部件(比如芯片、芯片系统或电路等)。示例性地,当图3所示意的通信方法适用于图1a或图1b所示意的通信系统架构时,终端设备可以是图1a或图1b所示意的UE,第一网元可以是图1a或图1b所示意的AMF网元,第二网元可以是图1a或图 1b所示意的LMF网元。当图3所示意的通信方法适用于图2所示意的通信系统架构时,终端设备可以是图2所示意的UE,第一网元可以是图2所示意的MME,第二网元可以是图2所示意的E-SMLC。为了便于介绍本申请实施例一提供的技术方案,下面以第一通信装置为终端设备,第二通信装置为第一网元,第三通信装置为第二网元为例,介绍第一通信装置、第二通信装置以及第三通信装置之间进行数据交互来实现通信方法的流程。如图3所示,该方法包括:Figure 3 exemplarily shows a flow chart of a communication method provided in Example 1 of the present application. The method is applicable to the communication system architecture illustrated in Figure 1a or Figure 1b or Figure 2. The method flow can be implemented by data interaction between multiple communication devices (such as a first communication device, a second communication device and a third communication device). Optionally, the first communication device can be a terminal device or a component (such as a chip, a chip system or a circuit, etc.) that can support the terminal device to implement the functions required by the method, the second communication device can be a first network element or a component (such as a chip, a chip system or a circuit, etc.) that can support the first network element to implement the functions required by the method, and the third communication device can be a second network element or a component (such as a chip, a chip system or a circuit, etc.) that can support the second network element to implement the functions required by the method. Exemplarily, when the communication method illustrated in Figure 3 is applicable to the communication system architecture illustrated in Figure 1a or Figure 1b, the terminal device can be the UE illustrated in Figure 1a or Figure 1b, the first network element can be the AMF network element illustrated in Figure 1a or Figure 1b, and the second network element can be the AMF network element illustrated in Figure 1a or Figure 1b. 1b. When the communication method illustrated in FIG. 3 is applicable to the communication system architecture illustrated in FIG. 2, the terminal device may be the UE illustrated in FIG. 2, the first network element may be the MME illustrated in FIG. 2, and the second network element may be the E-SMLC illustrated in FIG. 2. In order to facilitate the introduction of the technical solution provided in Example 1 of the present application, the following takes the first communication device as the terminal device, the second communication device as the first network element, and the third communication device as the second network element as an example to introduce the process of implementing the communication method by data interaction between the first communication device, the second communication device, and the third communication device. As shown in FIG. 3, the method includes:
步骤301:终端设备向第一网元发送第一信息。第一网元接收第一信息。Step 301: A terminal device sends first information to a first network element, and the first network element receives the first information.
其中,第一信息用于请求第一密钥,第一密钥用于加密辅助数据。举例来说,终端设备请求的第一密钥可以是一个或多个。可选的,第一密钥也可以用于解密(或解析)加密的辅助数据。例如,第一密钥可以是RTK密钥或者是通过posSIB发送的GNSS辅助数据的密钥(GNSS assistance data)或者是辅助数据的密钥。示例性地,辅助数据可以是指用于辅助终端设备实现精准定位的数据,比如定位辅助数据。举例来说,定位辅助数据可以是RTK定位辅助数据。Among them, the first information is used to request the first key, and the first key is used to encrypt the assistance data. For example, the first key requested by the terminal device may be one or more. Optionally, the first key can also be used to decrypt (or parse) the encrypted assistance data. For example, the first key can be an RTK key or a key of GNSS assistance data (GNSS assistance data) sent through posSIB or a key of assistance data. Exemplarily, the assistance data may refer to data used to assist the terminal device in achieving precise positioning, such as positioning assistance data. For example, the positioning assistance data may be RTK positioning assistance data.
举例来说,当第一网元是AMF网元时,第一信息可以承载在注册请求消息(Registration Request)消息(message)或其它消息中。当第一网元是MME时,第一信息可以承载在跟踪区域更新请求(Tracing Area Update Request,TAU Request)消息或其它消息中。For example, when the first network element is an AMF network element, the first information may be carried in a registration request message (Registration Request) message or other messages. When the first network element is an MME, the first information may be carried in a tracking area update request (Tracing Area Update Request, TAU Request) message or other messages.
可选的,第一信息在由终端设备发送至第一网元的过程中,可以经过一个或多个接入网设备(比如基站)。例如,当图3所示意的适用于图1a或图1b所示意的通信系统架构时,接入网设备可以是5G通信系统中的下一代基站(比如gNB),当图3所示意的适用于图2所示意的通信系统架构时,接入网设备可以是4G通信系统中的基站(比如eNB)。Optionally, the first information may pass through one or more access network devices (such as base stations) during the process of being sent by the terminal device to the first network element. For example, when the diagram shown in FIG3 is applicable to the communication system architecture shown in FIG1a or FIG1b, the access network device may be a next-generation base station (such as gNB) in a 5G communication system, and when the diagram shown in FIG3 is applicable to the communication system architecture shown in FIG2, the access network device may be a base station (such as eNB) in a 4G communication system.
示例性地,下面通过以下几种可能的实现方式介绍终端设备向第一网元发送第一信息的实现过程。Exemplarily, the implementation process of a terminal device sending the first information to a first network element is introduced below through the following possible implementation methods.
方式一:若辅助数据由(或从)通过终端设备的用户面(例如PDU会话)接收转换为通过控制面接收,则终端设备可以向第一网元发送第一信息。举例来说,控制面接收可以包括通过接入网设备发送的系统消息块(systeminformation block,SIB)接收。Method 1: If the auxiliary data is converted from (or received from) a user plane (e.g., a PDU session) of the terminal device to a control plane, the terminal device may send the first information to the first network element. For example, the control plane reception may include receiving a system information block (SIB) sent by the access network device.
示例性地,在以下几种可能的情形下,辅助数据是从通过终端设备的用户面接收转换为通过控制面接收。Exemplarily, in the following possible situations, the auxiliary data is converted from being received through a user plane of the terminal device to being received through a control plane.
情形一:终端设备接收(或获得)接入网设备发送的系统消息块(或可称为系统信息块)确定(或感知)辅助数据(或第一密钥)从终端设备的用户面接收转换为通过控制面接收。例如,终端设备发现(或确定)辅助数据由原来通过终端设备的用户面接收转变为通过接入网设备发送的SIB接收(比如空口的定位(positioning)SIB)。Scenario 1: The terminal device receives (or obtains) a system message block (or may be referred to as a system information block) sent by the access network device and determines (or senses) that the auxiliary data (or the first key) is converted from being received by the user plane of the terminal device to being received by the control plane. For example, the terminal device discovers (or determines) that the auxiliary data is converted from being received by the user plane of the terminal device to being received by the SIB sent by the access network device (such as the positioning SIB of the air interface).
情形二:终端设备未接收(或未获得)接入网设备发送的系统消息块确定辅助数据从通过控制面接收转换为通过终端设备的用户面接收。Scenario 2: The terminal device does not receive (or does not obtain) the system message block sent by the access network device to determine that the auxiliary data is converted from being received through the control plane to being received through the user plane of the terminal device.
方式二:若终端设备确定第一密钥失效(比如第一密钥在终端设备所在区域不可用或第一密钥可用时间低于预设阈值T3512或第一密钥的使用期限超过有效期等),终端设备向第一网元发送第一信息。Method 2: If the terminal device determines that the first key is invalid (for example, the first key is not available in the area where the terminal device is located or the available time of the first key is lower than the preset threshold T3512 or the usage period of the first key exceeds the validity period, etc.), the terminal device sends the first information to the first network element.
步骤302:第一网元本地不存在第一密钥,向第二网元发送第二消息。第二网元接收第二消息。Step 302: The first network element does not have the first key locally, and sends a second message to the second network element. The second network element receives the second message.
在一个示例中,若第一网元确定本地不存在(或未配置或不可获得或未存储)终端设备请求的第一密钥,则第一网元可以向第二网元发送第一请求消息(比如第二消息)。示例性地,第一请求消息可以携带(或包括或包含)第一密钥的标识或名称或类型。In one example, if the first network element determines that the first key requested by the terminal device does not exist locally (or is not configured or is not available or stored), the first network element may send a first request message (such as a second message) to the second network element. Exemplarily, the first request message may carry (or include or contain) an identifier or name or type of the first key.
在另一个示例中,若第一网元确定本地存在(或配置有或可获得或存储)UE请求的RTK密钥,则第一网元可以向终端设备发送NAS消息,NAS消息中可以携带终端设备请求的第一密钥,NAS消息可以是注册接收(或可称为注册接受)(Registration Accept)消息。In another example, if the first network element determines that the RTK key requested by the UE exists locally (or is configured or can be obtained or stored), the first network element can send a NAS message to the terminal device. The NAS message can carry the first key requested by the terminal device. The NAS message can be a Registration Accept (or Registration Accept) message.
步骤303:第二网元本地不存在第一密钥,向第一网元发送第三消息。第一网元接收第三消息。Step 303: The second network element does not have the first key locally, and sends a third message to the first network element. The first network element receives the third message.
举例来说,第三消息可以是第二消息的响应消息。For example, the third message may be a response message of the second message.
在一个示例中,若第二网元确定本地不存在(或未配置或不可获得或未存储)终端设备请求的第一密钥,则第二网元可以向第一网元发送第三消息。第三消息可以作为第二消息的响应消息。示例性地,第三消息可以包括第四指示信息,第四指示信息用于指示第一密钥不存在(或未配置或不可获得或未存储)。In one example, if the second network element determines that the first key requested by the terminal device does not exist locally (or is not configured or is not available or is not stored), the second network element may send a third message to the first network element. The third message may be a response message to the second message. Exemplarily, the third message may include fourth indication information, and the fourth indication information is used to indicate that the first key does not exist (or is not configured or is not available or is not stored).
在另一个示例中,若第二网元确定本地存在(或配置有或可获得或存储)终端设备请求的第一密钥,则第二网元可以向第一网元发送响应消息。示例性地,响应消息可以携带第一密钥。In another example, if the second network element determines that the first key requested by the terminal device exists locally (or is configured or can be obtained or stored), the second network element may send a response message to the first network element. Exemplarily, the response message may carry the first key.
在又一个示例中,若第二网元确定本地当不存在终端设备请求的第一密钥,但经过一段时间后,第 二网元获取到终端设备请求的第一密钥,此时第二网元可以向第一网元发送第五消息。示例性地,第五消息可以携带第一密钥。In another example, if the second network element determines that the first key requested by the terminal device does not exist locally, but after a period of time, ... The second network element obtains the first key requested by the terminal device, and at this time the second network element may send a fifth message to the first network element. Exemplarily, the fifth message may carry the first key.
上述步骤302-步骤303为可选步骤,即在某些应用场景中不需要执行,在某些应用场景中需要执行。The above steps 302 to 303 are optional steps, that is, they do not need to be performed in some application scenarios, but need to be performed in some application scenarios.
步骤304:第一网元向终端设备发送第一消息。终端设备接收第一消息。Step 304: The first network element sends a first message to the terminal device. The terminal device receives the first message.
在一种可能的实现方式中,若第一网元本地不存在终端设备请求的第一密钥(比如第一网元在本地不存在终端设备请求的第一密钥时直接反馈第一消息,即不执行上述步骤302至步骤303)或者第一网元获知第二网元本地也不存在终端设备请求的第一密钥,则第一网元可以向终端设备发送第一消息。如此,该实现方式可以实现及时地通知终端设备,网络侧(比如第一网元或第二网元)暂时没有第一密钥,从而可以避免终端设备盲目尝试发起获取第一密钥的请求,有助于降低终端设备的能耗(比如资源消耗、电量消耗或信令开销等)。In one possible implementation, if the first network element does not have the first key requested by the terminal device locally (for example, the first network element directly feeds back the first message when the first key requested by the terminal device does not exist locally, i.e., does not execute the above steps 302 to 303) or the first network element learns that the first key requested by the terminal device does not exist locally in the second network element, then the first network element can send the first message to the terminal device. In this way, this implementation can timely notify the terminal device that the network side (such as the first network element or the second network element) does not have the first key temporarily, thereby avoiding the terminal device from blindly attempting to initiate a request to obtain the first key, which helps to reduce the energy consumption of the terminal device (such as resource consumption, power consumption, or signaling overhead, etc.).
示例性地,第一消息可以包括第一指示信息,第一指示信息用于指示第一密钥不存在(或未配置或不可获得或未存储)。举例来说,第一指示信息可以是一个用于指示第一密钥不存在(或未配置或不可获得或未存储)的原因值/原因(cause),比如原因值1用于表示第一密钥存在,原因值0用于表示第一密钥不存在;或者,原因值0用于表示第一密钥存在,原因值1用于表示第一密钥不存在;或者,携带原因值表示第一密钥不存在,不携带原因值表示第一密钥存在。原因/原因值可以是布尔类型或枚举类型或字符类型或整数类型,本申请实施例对此不做限定。Exemplarily, the first message may include first indication information, and the first indication information is used to indicate that the first key does not exist (or is not configured or is not available or is not stored). For example, the first indication information may be a reason value/cause (cause) used to indicate that the first key does not exist (or is not configured or is not available or is not stored), such as a reason value of 1 is used to indicate that the first key exists, and a reason value of 0 is used to indicate that the first key does not exist; or, a reason value of 0 is used to indicate that the first key exists, and a reason value of 1 is used to indicate that the first key does not exist; or, carrying a reason value indicates that the first key does not exist, and not carrying a reason value indicates that the first key exists. The reason/cause value may be a Boolean type or an enumeration type or a character type or an integer type, which is not limited in the embodiments of the present application.
在一个示例中,第一消息还可以包括第二指示信息,第二指示信息用于指示第一时间或计时器或定时器。可选的,第一时间或计时器(Timer)或定时器(Timer)用于指示第一密钥的下一次请求时间,或用于指示第一密钥的下一次请求信息的发送时间,或用于指示第一密钥的下一次请求信息的启动时间,或者用于指示第一密钥的下一次请求信息的开始时间。举例来说,计时器或定时器也可以用于指示第一时长,此时第一时间可以是指终端设备发送第一信息的时间与第一时长之和。其中,第一时长为终端设备相邻两次请求第一密钥的时间间隔。In one example, the first message may also include second indication information, and the second indication information is used to indicate a first time or a timer or a timer. Optionally, the first time or a timer (Timer) or a timer (Timer) is used to indicate the next request time of the first key, or to indicate the sending time of the next request information of the first key, or to indicate the start time of the next request information of the first key, or to indicate the start time of the next request information of the first key. For example, the timer or timer can also be used to indicate the first duration, in which case the first time may refer to the sum of the time when the terminal device sends the first information and the first duration. Among them, the first duration is the time interval between two adjacent requests for the first key by the terminal device.
此外,当第一消息未携带第二指示信息时,第一时间可以是指终端设备发送第一信息的时间与终端设备设置的第二时长之和。In addition, when the first message does not carry the second indication information, the first time may refer to the sum of the time when the terminal device sends the first information and the second time length set by the terminal device.
在另一个示例中,第一消息还可以包括第三指示信息,第三指示信息用于指示终端设备等待第一网元发送第一密钥。可选的,第一网元在生成第三指示信息后,可以标记终端设备关联的用户在等待下发第一密钥。之后,第一网元在获取到第二网元下发的第一密钥后,可以及时地将第一密钥发送给终端设备,从而可以避免终端设备盲目尝试发起获取第一密钥的请求,有助于降低终端设备的能耗。In another example, the first message may further include third indication information, and the third indication information is used to indicate that the terminal device is waiting for the first network element to send the first key. Optionally, after generating the third indication information, the first network element may mark the user associated with the terminal device as waiting for the first key to be sent. Afterwards, after obtaining the first key sent by the second network element, the first network element may promptly send the first key to the terminal device, thereby avoiding the terminal device from blindly attempting to initiate a request to obtain the first key, which helps to reduce the energy consumption of the terminal device.
举例来说,第一网元在获取到第二网元下发的第一密钥后,可以向终端设备发送第一密钥。示例性地,第一密钥可以承载在一个信息中,或者也可以携带在一个消息中。For example, after acquiring the first key sent by the second network element, the first network element may send the first key to the terminal device. Exemplarily, the first key may be carried in an information or may also be carried in a message.
在另一种可能的实现方式中,若第一网元本地存在终端设备请求的第一密钥或者第一网元获知第二网元本地存在终端设备请求的第一密钥,则第一网元可以向终端设备发送响应消息。示例性地,响应消息可以携带第一密钥。In another possible implementation, if the first network element locally stores the first key requested by the terminal device or the first network element learns that the second network element locally stores the first key requested by the terminal device, the first network element may send a response message to the terminal device. Exemplarily, the response message may carry the first key.
步骤305:第一时间或计时器或定时器过期,终端设备向第一网元发送第二信息;或者等待第一网元发送第一密钥。可选的,第一网元接收第二信息。Step 305: When the first time or the timer or the timer expires, the terminal device sends the second information to the first network element, or waits for the first network element to send the first key. Optionally, the first network element receives the second information.
示例性地,第二信息可以用于再次请求第一密钥,或者用于再次发起获取第一密钥的请求。Exemplarily, the second information may be used to request the first key again, or to initiate a request to obtain the first key again.
在一种可能的实现方式中,当第一消息包括第一指示信息,但不包括第二指示信息和第三指示信息时,此时第一时间可以是指终端设备发送第一信息的时间与终端设备设置的第二时长之和。终端设备可以在第一时间过期,向第一网元发送第二信息。In a possible implementation, when the first message includes the first indication information but does not include the second indication information and the third indication information, the first time may refer to the sum of the time when the terminal device sends the first information and the second time period set by the terminal device. The terminal device may send the second information to the first network element when the first time expires.
在另一种可能的实现方式中,当第一消息包括第一指示信息和第二指示信息时,终端设备可以在第一时间或计时器或定时器过期,向第一网元发送第二信息。举例来说,当计时器或定时器用于指示第一时长时,第一时间可以是指终端设备发送第一信息的时间与第一时长之和。In another possible implementation, when the first message includes the first indication information and the second indication information, the terminal device may send the second information to the first network element at the first time or when the timer or timer expires. For example, when the timer or timer is used to indicate the first duration, the first time may refer to the sum of the time when the terminal device sends the first information and the first duration.
在又一种可能的实现方式中,当第一消息包括第一指示信息和第三指示信息时,终端设备可以暂不向第一网元发送用于请求第一密钥的信息,而是等待第一网元发送第一密钥。如此,该实现方式可以避免终端设备盲目尝试发起获取第一密钥的请求,有助于降低终端设备的能耗。In another possible implementation, when the first message includes the first indication information and the third indication information, the terminal device may temporarily not send information for requesting the first key to the first network element, but wait for the first network element to send the first key. In this way, the implementation can avoid the terminal device from blindly attempting to initiate a request to obtain the first key, which helps to reduce the energy consumption of the terminal device.
通过上述步骤301至步骤305可以看出,在终端设备请求获取第一密钥的过程中,网络侧(比如第一网元或第二网元)暂无第一密钥,通过发送用于指示第一密钥不存在或不可获得的指示信息给终端设 备,可以实现在网络侧暂时没有终端设备请求的第一密钥时,及时地通知终端设备,有助于避免终端设备盲目频繁尝试发起获取第一密钥的请求,并可以降低终端设备因盲目频繁尝试请求第一密钥而产生的能耗,也可以实现帮助终端设备有效地获取密钥进行解析加密的辅助数据。It can be seen from the above steps 301 to 305 that in the process of the terminal device requesting to obtain the first key, the network side (such as the first network element or the second network element) does not have the first key, and sends an indication message indicating that the first key does not exist or is unavailable to the terminal device. The device can promptly notify the terminal device when the network side temporarily does not have the first key requested by the terminal device, which helps to avoid the terminal device from blindly and frequently trying to initiate a request for the first key, and can reduce the energy consumption caused by the terminal device blindly and frequently trying to request the first key. It can also help the terminal device effectively obtain the key for parsing encrypted auxiliary data.
基于上述图3所示意的通信方法的技术方案,下面通过图4至图5所示的具体示例,分别对于5G通信系统架构和4G通信系统架构下本申请实施例提供的通信方法的实现过程进行介绍。其中,图4所示的具体示例中,终端设备为UE,(R)AN设备为gNB(或可称为NG-(R)AN设备),第一密钥为RTK密钥,第一网元为AMF网元,第二网元为LMF网元,辅助数据为RTK定位辅助数据;图5所示的具体示例中,终端设备为UE,(R)AN设备为eNB(或可称为eNodeB),第一密钥为RTK密钥,第一网元为MME,第二网元为E-SMLC,辅助数据为RTK定位辅助数据。可以理解,在本申请实施例中,由某网元执行的动作也可以替换为由网元中的功能部件执行。本申请实施例中,功能部件例如可包括芯片、芯片系统、处理器、处理单元中的至少一种。Based on the technical solution of the communication method shown in FIG. 3 above, the following specific examples shown in FIG. 4 to FIG. 5 respectively introduce the implementation process of the communication method provided in the embodiment of the present application under the 5G communication system architecture and the 4G communication system architecture. In the specific example shown in FIG. 4, the terminal device is UE, the (R) AN device is gNB (or can be called NG-(R) AN device), the first key is RTK key, the first network element is AMF network element, the second network element is LMF network element, and the auxiliary data is RTK positioning auxiliary data; in the specific example shown in FIG. 5, the terminal device is UE, the (R) AN device is eNB (or can be called eNodeB), the first key is RTK key, the first network element is MME, the second network element is E-SMLC, and the auxiliary data is RTK positioning auxiliary data. It can be understood that in the embodiment of the present application, the action performed by a network element can also be replaced by the action performed by the functional component in the network element. In the embodiment of the present application, the functional component may, for example, include at least one of a chip, a chip system, a processor, and a processing unit.
图4为本申请实施例一提供的另一种通信方法的流程示意图。其中,图4所示意的通信方法适用于5G通信系统架构(或可理解为5G核心网(Core)架构)。如图4所示,该方法的具体流程可以包括:FIG4 is a flow chart of another communication method provided in Embodiment 1 of the present application. The communication method shown in FIG4 is applicable to a 5G communication system architecture (or can be understood as a 5G core network (Core) architecture). As shown in FIG4 , the specific flow of the method may include:
步骤401:UE向AMF网元发送注册请求消息。AMF网元接收注册请求消息。Step 401: The UE sends a registration request message to the AMF network element. The AMF network element receives the registration request message.
举例来说,注册请求消息可以是NAS消息。示例性地,注册请求消息中可以携带请求RTK密钥的信息或指示信息(比如请求Cipher Key的指示),用于请求RTK密钥(Cipher Key)。可选的,注册请求消息中还可以携带UE请求的RTK密钥的标识或名称或类型。可选的,UE请求的RTK密钥可以是一个或多个。For example, the registration request message may be a NAS message. Exemplarily, the registration request message may carry information or indication information requesting an RTK key (such as an indication requesting a Cipher Key) for requesting an RTK key (Cipher Key). Optionally, the registration request message may also carry an identifier, name, or type of the RTK key requested by the UE. Optionally, the RTK key requested by the UE may be one or more.
可选的,注册请求消息在由UE发送至AMF网元的过程中,可以经过一个或多个gNB。例如,以一个gNB为例,UE可以先将注册请求消息发送给所在区域的gNB,由gNB将该注册请求消息发送给AMF网元。Optionally, the registration request message may pass through one or more gNBs during the process of being sent from the UE to the AMF network element. For example, taking one gNB as an example, the UE may first send the registration request message to the gNB in its area, and the gNB may send the registration request message to the AMF network element.
示例性地,下面通过以下几种可能的实现方式介绍UE向AMF网元发送注册请求消息的实现过程。Exemplarily, the implementation process of the UE sending a registration request message to the AMF network element is introduced below through the following possible implementation methods.
方式一:UE在开始时通过UE的用户面(例如PDU会话)接收RTK定位辅助数据(或RTK密钥)。当UE需要由UE的用户面接收RTK定位辅助数据转换为由控制面接收RTK定位辅助数据(例如UE发现/确定RTK定位辅助数据由原来通过UE的用户面接收转变为通过空口的positioning SIB消息接收)时,UE向AMF网元发送注册请求消息。例如,注册请求消息中可以携带请求RTK密钥(Cipher Key)的指示,或者也可以携带RTK密钥的标识或名称或类型。Method 1: The UE receives RTK positioning assistance data (or RTK key) through the user plane of the UE (e.g., PDU session) at the beginning. When the UE needs to convert the RTK positioning assistance data received by the user plane of the UE to the RTK positioning assistance data received by the control plane (e.g., the UE discovers/determines that the RTK positioning assistance data is converted from being received through the user plane of the UE to being received through the positioning SIB message of the air interface), the UE sends a registration request message to the AMF network element. For example, the registration request message may carry an indication of requesting an RTK key (Cipher Key), or may also carry an identifier, name, or type of the RTK key.
方式二:当UE确定RTK密钥失效(比如在UE所在区域不可用或RTK密钥可用时间低于预设阈值T3512或RTK密钥的使用期限超过有效期等)时,UE向AMF网元发送注册请求消息。Method 2: When the UE determines that the RTK key is invalid (for example, it is not available in the area where the UE is located or the RTK key availability time is lower than the preset threshold T3512 or the RTK key usage period exceeds the validity period, etc.), the UE sends a registration request message to the AMF network element.
步骤402:若本地未存储UE请求的RTK密钥,AMF网元向LMF网元发送第一请求消息。LMF网元接收第一请求消息。Step 402: If the RTK key requested by the UE is not stored locally, the AMF network element sends a first request message to the LMF network element. The LMF network element receives the first request message.
可选的,若AMF网元确定本地存储有UE请求的RTK密钥,则AMF网元可以向UE发送注册接收(或可称为注册接受)(Registration Accept)消息。示例性地,注册接收消息中可以携带UE请求的RTK密钥。举例来说,注册接收消息可以是NAS消息。Optionally, if the AMF network element determines that the RTK key requested by the UE is stored locally, the AMF network element may send a Registration Accept message (or Registration Accept) to the UE. Exemplarily, the Registration Accept message may carry the RTK key requested by the UE. For example, the Registration Accept message may be a NAS message.
其中,第一请求消息用于请求RTK密钥。示例性地,第一请求消息中可以携带UE请求的RTK密钥的标识或名称。The first request message is used to request an RTK key. Exemplarily, the first request message may carry an identifier or name of the RTK key requested by the UE.
步骤403:LMF网元向AMF网元发送请求响应消息。AMF网元接收请求响应消息。Step 403: The LMF network element sends a request response message to the AMF network element. The AMF network element receives the request response message.
示例性地,LMF网元可以在请求响应消息中携带指示信息(比如数据可获得性(DataAvailability))。可选的,该指示信息可以用于指示LMF网元本地是否存储有UE请求的RTK密钥,或者可以用于指示LMF网元本地是否配置有UE请求的RTK密钥,或者用于指示LMF网元本地是否可获得UE请求的RTK密钥。举例来说,DataAvailability可以是一个用于指示RTK密钥存在或不存在的原因值,比如原因值1用于表示RTK密钥存在,原因值0用于表示RTK密钥不存在。Exemplarily, the LMF network element may carry indication information (such as data availability (DataAvailability)) in the request response message. Optionally, the indication information may be used to indicate whether the LMF network element locally stores the RTK key requested by the UE, or may be used to indicate whether the LMF network element is locally configured with the RTK key requested by the UE, or may be used to indicate whether the LMF network element locally can obtain the RTK key requested by the UE. For example, DataAvailability may be a cause value used to indicate the presence or absence of an RTK key, such as a cause value of 1 used to indicate that the RTK key exists, and a cause value of 0 used to indicate that the RTK key does not exist.
在一种可能的实现方式中,当LMF网元确定本地未存储UE请求的RTK密钥时,可以在请求响应消息中携带指示信息DataAvailability=“CIPHERING_KEY_DATA_NOT_AVAILABLE”,该指示信息用于指示UE请求的RTK密钥不可获得(或者用于指示UE请求的RTK密钥未查询到)。In one possible implementation, when the LMF network element determines that the RTK key requested by the UE is not stored locally, it can carry the indication information DataAvailability = "CIPHERING_KEY_DATA_NOT_AVAILABLE" in the request response message. The indication information is used to indicate that the RTK key requested by the UE is not available (or used to indicate that the RTK key requested by the UE has not been queried).
在另一种可能的实现方式中,当LMF网元确定本地存储有UE请求的RTK密钥时,可以在请求响应消息中携带指示信息DataAvailability=“CIPHERING_KEY_DATA_AVAILABLE”,该指示信息用于指示UE请求的RTK密钥可获得(或者用于指示UE请求的RTK密钥可查询到),且请求响应消息中也 可以携带UE请求的RTK密钥。In another possible implementation, when the LMF network element determines that the RTK key requested by the UE is stored locally, the indication information DataAvailability = "CIPHERING_KEY_DATA_AVAILABLE" can be carried in the request response message, and the indication information is used to indicate that the RTK key requested by the UE is available (or used to indicate that the RTK key requested by the UE can be queried), and the request response message is also It can carry the RTK key requested by the UE.
步骤404:AMF网元向UE发送注册接收消息。UE接收注册接收消息。Step 404: The AMF network element sends a registration reception message to the UE. The UE receives the registration reception message.
在一种可能的实现方式中,AMF网元在确定请求响应消息中携带指示信息DataAvailability=“CIPHERING_KEY_DATA_NOT_AVAILABLE”时,可以在注册接收消息中携带指示信息DataAvailability=“CIPHERING_KEY_DATA_NOT_AVAILABLE”。可选的,AMF网元还可以在注册接收消息中携带第一信息。在一个示例中,第一信息可以是指示计时器的信息,计时器用于指示UE下次尝试请求RTK密钥的时间,或者第一信息可以指示UE下次尝试请求RTK密钥的时间。在另一个示例中,第一信息可以指示第一时长,第一时长为UE相邻两次获取RTK密钥的时间间隔。在又一个示例中,第一信息可以指示UE等待AMF网元下发RTK密钥。此外,在该示例中,AMF网元可以标记UE关联用户在等待下发RTK密钥,AMF网元在获取到LMF网元下发的RTK密钥后,可以将RTK密钥发送给UE。In a possible implementation, when the AMF network element determines that the request response message carries the indication information DataAvailability = "CIPHERING_KEY_DATA_NOT_AVAILABLE", the AMF network element may carry the indication information DataAvailability = "CIPHERING_KEY_DATA_NOT_AVAILABLE" in the registration reception message. Optionally, the AMF network element may also carry the first information in the registration reception message. In one example, the first information may be information indicating a timer, where the timer is used to indicate the time when the UE attempts to request the RTK key next time, or the first information may indicate the time when the UE attempts to request the RTK key next time. In another example, the first information may indicate a first duration, where the first duration is the time interval between two consecutive acquisitions of the RTK key by the UE. In yet another example, the first information may indicate that the UE is waiting for the AMF network element to send the RTK key. In addition, in this example, the AMF network element may mark that the UE-associated user is waiting for the RTK key to be sent, and after obtaining the RTK key sent by the LMF network element, the AMF network element may send the RTK key to the UE.
在另一种可能的实现方式中,AMF网元在确定请求响应消息中携带DataAvailability=“CIPHERING_KEY_DATA_AVAILABLE”时,可以从请求响应消息中获取UE请求的RTK密钥,并可以在注册接收消息中携带UE请求的RTK密钥。In another possible implementation, when the AMF network element determines that the request response message carries DataAvailability = "CIPHERING_KEY_DATA_AVAILABLE", it can obtain the RTK key requested by the UE from the request response message, and can carry the RTK key requested by the UE in the registration reception message.
可选的,注册接收消息在由AMF网元发送至UE的过程中,可以经过一个或多个gNB。例如,以一个gNB为例,AMF网元可以先将注册接收消息发送给gNB,由gNB将该注册接收消息发送给UE。Optionally, the registration reception message may pass through one or more gNBs during the process of being sent from the AMF network element to the UE. For example, taking one gNB as an example, the AMF network element may first send the registration reception message to the gNB, and the gNB may send the registration reception message to the UE.
步骤405:若注册接收消息中包括的指示信息指示RTK密钥不可获得,UE向AMF网元发送第二请求消息或者等待AMF网元下发RTK密钥。Step 405: If the indication information included in the registration reception message indicates that the RTK key is not available, the UE sends a second request message to the AMF network element or waits for the AMF network element to send the RTK key.
示例性地,第二请求消息中可以携带再次请求RTK密钥的信息或指示信息(比如再次请求Cipher Key的指示),用于再次请求RTK密钥。可选的,第二请求消息中还可以携带UE请求的RTK密钥的标识或名称。举例来说,第二请求消息可以是新的注册请求消息,或者也可以是用于再次请求RTK密钥的消息。Exemplarily, the second request message may carry information or indication information for requesting the RTK key again (such as an indication for requesting the Cipher Key again) for requesting the RTK key again. Optionally, the second request message may also carry an identifier or name of the RTK key requested by the UE. For example, the second request message may be a new registration request message, or may be a message for requesting the RTK key again.
可选的,第二请求消息在由UE发送至AMF网元的过程中,可以经过一个或多个gNB。例如,以一个gNB为例,UE可以先将第二请求消息发送给所在区域的gNB,由gNB将第二请求消息发送给AMF网元。Optionally, the second request message may pass through one or more gNBs during the process of being sent by the UE to the AMF network element. For example, taking one gNB as an example, the UE may first send the second request message to the gNB in its area, and the gNB may send the second request message to the AMF network element.
示例性地,下面通过以下几种可能的实现方式介绍UE向AMF网元发送第二请求消息的实现过程。Exemplarily, the implementation process of the UE sending a second request message to the AMF network element is introduced below through the following possible implementation methods.
方式一:当注册接收消息中包括(或携带)的指示信息指示RTK密钥不可获得且注册接收消息中包括的第一信息指示UE下次尝试请求RTK密钥的时间时,UE可以在下次尝试请求RTK密钥的时间到达时,向AMF网元发送第二请求消息。Method 1: When the indication information included (or carried) in the registration reception message indicates that the RTK key is not available and the first information included in the registration reception message indicates the time when the UE will attempt to request the RTK key next time, the UE can send a second request message to the AMF network element when the time for the next attempt to request the RTK key arrives.
方式二:当注册接收消息中包括的指示信息指示RTK密钥不可获得且注册接收消息中包括的第一信息指示第一时长时,UE可以在上一次请求RTK密钥的时间经过第一时长后,向AMF网元发送第二请求消息。方式三:当注册接收消息中包括的指示信息指示RTK密钥不可获得时,UE可以在上一次请求RTK密钥的时间经过UE设置的第二时长后,向AMF网元发送第二请求消息。Method 2: When the indication information included in the registration reception message indicates that the RTK key is not available and the first information included in the registration reception message indicates a first duration, the UE can send a second request message to the AMF network element after the first duration has passed since the last time the RTK key was requested. Method 3: When the indication information included in the registration reception message indicates that the RTK key is not available, the UE can send a second request message to the AMF network element after the second duration set by the UE has passed since the last time the RTK key was requested.
此外,若注册接收消息中包括的指示信息指示RTK密钥不可获得且注册接收消息中包括的第一信息指示UE等待AMF网元下发RTK密钥,则UE可以不向AMF网元发送第二请求消息,而是等待AMF网元下发RTK密钥。In addition, if the indication information included in the registration reception message indicates that the RTK key is not available and the first information included in the registration reception message indicates that the UE is waiting for the AMF network element to send the RTK key, the UE may not send a second request message to the AMF network element, but wait for the AMF network element to send the RTK key.
通过上述步骤401至步骤405可以看出,针对5GC通信场景,在UE请求获取RTK密钥的过程中,网络侧(比如LMF网元或AMF网元)暂无RTK密钥,通过选择性的生成指示信息(比如用于指示UE请求的RTK密钥不可获得的指示信息或第二信息)并携带在注册接收消息中发送给UE。如此,该方法可以实现在网络侧暂时没有UE请求的RTK密钥时,及时地通知UE,有助于降低因UE盲目尝试请求RTK密钥而带来的能耗,从而可以有效地避免出现因UE盲目尝试请求RTK密钥而使得UE产生一定的能耗损失(比如信令开销或电量损失或通信资源消耗等)的问题。It can be seen from the above steps 401 to 405 that for the 5GC communication scenario, when the UE requests to obtain the RTK key, the network side (such as the LMF network element or the AMF network element) does not have the RTK key temporarily, and selectively generates indication information (such as indication information or second information for indicating that the RTK key requested by the UE is not available) and carries it in the registration reception message and sends it to the UE. In this way, the method can timely notify the UE when the network side temporarily does not have the RTK key requested by the UE, which helps to reduce the energy consumption caused by the UE blindly trying to request the RTK key, thereby effectively avoiding the problem that the UE generates certain energy consumption losses (such as signaling overhead or power loss or communication resource consumption, etc.) due to the UE blindly trying to request the RTK key.
图5为本申请实施例一提供的又一种通信方法的流程示意图。其中,图5所示意的通信方法适用于4G通信系统架构(或可理解为4G核心网络(Evolved Packet Core,EPC)或演进分组系统(Evolved Packet System,EPS))。如图5所示,该方法的具体流程可以包括:FIG5 is a flow chart of another communication method provided in Embodiment 1 of the present application. The communication method shown in FIG5 is applicable to a 4G communication system architecture (or can be understood as a 4G core network (Evolved Packet Core, EPC) or an Evolved Packet System (Evolved Packet System, EPS)). As shown in FIG5, the specific flow of the method may include:
步骤501:UE向MME发送跟踪区域更新请求消息。MME接收跟踪区域更新请求消息。Step 501: UE sends a tracking area update request message to MME. MME receives the tracking area update request message.
举例来说,跟踪区域更新请求消息在由UE发送至MME的过程中,可以经过一个或多个eNodeB。例如,以一个eNodeB为例,UE可以先将跟踪区域更新请求消息发送给所在区域的eNodeB,由eNodeB 将该跟踪区域更新请求消息发送给MME。For example, the tracking area update request message may pass through one or more eNodeBs during the process of being sent from the UE to the MME. For example, taking one eNodeB as an example, the UE may first send the tracking area update request message to the eNodeB in its area, and the eNodeB The tracking area update request message is sent to the MME.
可选的,步骤501中UE向MME发送跟踪区域更新请求消息的实现方式可以参考上述步骤401中UE向AMF网元发送注册请求消息的实现方式,此处不再赘述。Optionally, the implementation method of the UE sending the tracking area update request message to the MME in step 501 can refer to the implementation method of the UE sending the registration request message to the AMF network element in the above step 401, which will not be repeated here.
步骤502:若本地未存储UE请求的RTK密钥,MME向E-SMLC发送第三请求消息。E-SMLC接收第三请求消息。Step 502: If the RTK key requested by the UE is not stored locally, the MME sends a third request message to the E-SMLC. The E-SMLC receives the third request message.
可选的,若MME确定本地存储有UE请求的RTK密钥,则MME可以向UE发送跟踪区域更新接收(或可称为跟踪区域更新接受)(Tracing Area Update Accept,TAU Accept)消息。示例性地,跟踪区域更新接收消息中可以携带UE请求的RTK密钥。Optionally, if the MME determines that the RTK key requested by the UE is stored locally, the MME may send a Tracking Area Update Accept (or Tracking Area Update Accept) (TAU Accept) message to the UE. Exemplarily, the Tracking Area Update Accept message may carry the RTK key requested by the UE.
其中,第三请求消息用于请求RTK密钥。示例性地,第三请求消息中可以携带UE请求的RTK密钥的标识或名称。举例来说,第三请求消息可以是接口消息。The third request message is used to request the RTK key. Exemplarily, the third request message may carry an identifier or name of the RTK key requested by the UE. For example, the third request message may be an interface message.
步骤503:E-SMLC向MME发送请求响应消息。MME接收请求响应消息。Step 503: The E-SMLC sends a request response message to the MME. The MME receives the request response message.
示例性地,E-SMLC可以在请求响应消息中携带指示信息。可选的,指示信息可以用于指示E-SMLC本地是否存储有UE请求的RTK密钥,或者可以用于指示E-SMLC本地是否配置有UE请求的RTK密钥,或者用于指示E-SMLC本地是否可获得UE请求的RTK密钥。举例来说,指示信息可以是DataAvailability的指示,或者也可以是一个用于指示RTK密钥存在或不存在的信息,例如,可以是原因/原因值,比如,原因/原因值1用于表示RTK密钥存在,原因/原因值0用于表示RTK密钥不存在。再例如,原因/原因值0表示RTK密钥不存在,原因/原因值1用于表示RTK密钥存在。又例如,原因/原因值携带表示密钥不存在,原因/原因值不携带表示密钥存在。Exemplarily, the E-SMLC may carry indication information in the request response message. Optionally, the indication information may be used to indicate whether the E-SMLC locally stores the RTK key requested by the UE, or may be used to indicate whether the E-SMLC locally is configured with the RTK key requested by the UE, or may be used to indicate whether the E-SMLC locally can obtain the RTK key requested by the UE. For example, the indication information may be an indication of DataAvailability, or may be information used to indicate the presence or absence of the RTK key, for example, it may be a cause/cause value, such as a cause/cause value of 1 is used to indicate that the RTK key exists, and a cause/cause value of 0 is used to indicate that the RTK key does not exist. For another example, a cause/cause value of 0 indicates that the RTK key does not exist, and a cause/cause value of 1 is used to indicate that the RTK key exists. For another example, a cause/cause value carries an indication that the key does not exist, and a cause/cause value does not carry an indication that the key exists.
在一种可能的实现方式中,当E-SMLC确定本地存储有UE请求的RTK密钥时,E-SMLC可以在请求响应消息中携带指示信息,该指示信息用于指示UE请求的RTK密钥可获得(或者用于指示UE请求的RTK密钥可查询到),且请求响应消息中也可以携带UE请求的RTK密钥。In one possible implementation, when the E-SMLC determines that the RTK key requested by the UE is stored locally, the E-SMLC may carry indication information in the request response message, where the indication information is used to indicate that the RTK key requested by the UE is available (or used to indicate that the RTK key requested by the UE can be queried), and the request response message may also carry the RTK key requested by the UE.
在另一种可能的实现方式中,当E-SMLC确定本地未存储UE请求的RTK密钥时,E-SMLC可以在请求响应消息中携带指示信息,该指示信息用于指示UE请求的RTK密钥不可获得(或者用于指示UE请求的RTK密钥未查询到)。In another possible implementation, when the E-SMLC determines that the RTK key requested by the UE is not stored locally, the E-SMLC may carry indication information in the request response message, where the indication information is used to indicate that the RTK key requested by the UE is not available (or used to indicate that the RTK key requested by the UE is not queried).
步骤504:MME向UE发送跟踪区域更新接收消息。UE接收跟踪区域更新接收消息。Step 504: The MME sends a tracking area update reception message to the UE. The UE receives the tracking area update reception message.
在一种可能的实现方式中,若MME确定请求响应消息中包括的指示信息指示UE请求的RTK密钥可获得,则MME可以从请求响应消息中获取UE请求的RTK密钥,并可以在跟踪区域更新接收消息中携带UE请求的RTK密钥。In one possible implementation, if the MME determines that the indication information included in the request response message indicates that the RTK key requested by the UE is available, the MME can obtain the RTK key requested by the UE from the request response message and can carry the RTK key requested by the UE in the tracking area update reception message.
在另一种可能的实现方式中,若MME在确定请求响应消息中包括的指示信息指示UE请求的RTK密钥不可获得,则MME可以在跟踪区域更新接收消息中携带用于指示UE请求的RTK密钥不可获得的指示信息。可选的,MME还可以在跟踪区域更新接收消息中携带第二信息。在一个示例中,第二信息可以是指示计时器的信息,计时器用于指示UE下次尝试请求RTK密钥的时间,或者第二信息可以指示UE下次尝试请求RTK密钥的时间。在另一个示例中,第二信息可以指示第一时长,第一时长为UE相邻两次获取RTK密钥的时间间隔。在又一个示例中,第二信息可以指示UE等待MME下发RTK密钥。此外,在该示例中,MME可以标记UE关联用户在等待下发RTK密钥,MME在获取到E-SMLC下发的RTK密钥后,可以将RTK密钥发送给UE。In another possible implementation, if the indication information included in the determination request response message by the MME indicates that the RTK key requested by the UE is not available, the MME may carry the indication information for indicating that the RTK key requested by the UE is not available in the tracking area update reception message. Optionally, the MME may also carry the second information in the tracking area update reception message. In one example, the second information may be information indicating a timer, the timer being used to indicate the time when the UE attempts to request the RTK key next time, or the second information may indicate the time when the UE attempts to request the RTK key next time. In another example, the second information may indicate a first duration, the first duration being the time interval between two consecutive acquisitions of the RTK key by the UE. In yet another example, the second information may indicate that the UE is waiting for the MME to send the RTK key. In addition, in this example, the MME may mark the UE-associated user as waiting for the RTK key to be sent, and after obtaining the RTK key sent by the E-SMLC, the MME may send the RTK key to the UE.
步骤505:若跟踪区域更新接收消息中包括的指示信息指示RTK密钥不可获得,UE向MME发送第四请求消息或者等待MME下发RTK密钥。Step 505: If the indication information included in the tracking area update reception message indicates that the RTK key is unavailable, the UE sends a fourth request message to the MME or waits for the MME to send the RTK key.
示例性地,第四请求消息中可以携带再次请求RTK密钥的信息或指示信息(比如再次请求Cipher Key的指示),用于再次请求RTK密钥。可选的,第四请求消息中还可以携带UE请求的RTK密钥的标识或名称。举例来说,第四请求消息可以是新的跟踪区域更新请求消息,或者也可以是用于再次请求RTK密钥的消息。Exemplarily, the fourth request message may carry information or indication information for requesting the RTK key again (such as an indication for requesting the Cipher Key again) for requesting the RTK key again. Optionally, the fourth request message may also carry an identifier or name of the RTK key requested by the UE. For example, the fourth request message may be a new tracking area update request message, or may be a message for requesting the RTK key again.
举例来说,第四请求消息在由UE发送至MME的过程中,可以经过一个或多个eNodeB。例如,以一个eNodeB为例,UE可以先将第四请求消息发送给所在区域的eNodeB,由eNodeB将第二请求消息发送给MME。For example, the fourth request message may pass through one or more eNodeBs during the process of being sent from the UE to the MME. For example, taking one eNodeB as an example, the UE may first send the fourth request message to the eNodeB in its area, and the eNodeB may send the second request message to the MME.
可选的,步骤505中UE向MME发送第四请求消息的实现方式可以参考上述步骤405中UE向AMF网元发送第二请求消息的实现方式,此处不再赘述。Optionally, the implementation method of the UE sending the fourth request message to the MME in step 505 can refer to the implementation method of the UE sending the second request message to the AMF network element in the above step 405, which will not be repeated here.
此外,若跟踪区域更新接收消息中包括的指示信息指示RTK密钥不可获得且跟踪区域更新接收消 息中包括的第二信息指示UE等待MME下发RTK密钥,则UE可以不向MME发送第四请求消息,而是等待MME下发RTK密钥。In addition, if the indication information included in the tracking area update reception message indicates that the RTK key is not available and the tracking area update reception message If the second information included in the message indicates that the UE waits for the MME to send the RTK key, the UE may not send the fourth request message to the MME, but wait for the MME to send the RTK key.
通过上述步骤501至步骤505可以看出,针对EPC通信场景,在UE请求获取RTK密钥的过程中,网络侧(比如E-SMLC或MME)暂无RTK密钥,通过选择性的生成指示信息(比如用于指示UE请求的RTK密钥不可获得的指示信息或第二信息)并携带在跟踪区域更新接收消息中发送给UE。如此,该方法可以实现在网络侧暂时没有UE请求的RTK密钥时,及时地通知UE,有助于降低因UE盲目尝试请求RTK密钥而带来的能耗,从而可以有效地避免出现因UE盲目尝试请求RTK密钥而使得UE产生一定的能耗损失(比如信令开销或电量损失或通信资源消耗等)的问题。It can be seen from the above steps 501 to 505 that for the EPC communication scenario, when the UE requests to obtain the RTK key, the network side (such as E-SMLC or MME) does not have the RTK key temporarily, and selectively generates indication information (such as indication information or second information for indicating that the RTK key requested by the UE is not available) and carries it in the tracking area update reception message and sends it to the UE. In this way, the method can timely notify the UE when the network side temporarily does not have the RTK key requested by the UE, which helps to reduce the energy consumption caused by the UE blindly trying to request the RTK key, thereby effectively avoiding the problem that the UE generates certain energy consumption losses (such as signaling overhead or power loss or communication resource consumption, etc.) due to the UE blindly trying to request the RTK key.
【实施例二】[Example 2]
图6示例性示出本申请实施例二提供的一种通信方法的流程示意图。该方法适用于图2所示意的通信系统架构。该方法流程可以是通过多个通信装置(比如第一通信装置、第二通信装置和第三通信装置)之间进行数据交互来实现。可选的,第一通信装置可以是第一终端设备或能够支持第一终端设备实现该方法所需的功能的部件(比如芯片、芯片系统或电路等),第二通信装置可以是第一网元或能够支持第一网元实现该方法所需的功能的部件(比如芯片、芯片系统或电路等),第三通信装置可以是第二网元或能够支持第二网元实现该方法所需的功能的部件(比如芯片、芯片系统或电路等)。示例性地,当图6所示意的通信方法适用于图1a或图1b所示意的通信系统架构时,终端设备可以是图1a或图1b所示意的UE,第一网元可以是图1a或图1b所示意的AMF网元,第二网元可以是图1a或图1b所示意的LMF网元。当图6所示意的通信方法适用于图2所示意的通信系统架构时,终端设备可以是图2所示意的UE,第一网元可以是图2所示意的MME,第二网元可以是图2所示意的E-SMLC。为了便于介绍本申请实施例一提供的技术方案,下面以第一通信装置为终端设备,第二通信装置为第一网元,第三通信装置为第二网元为例,介绍第一通信装置、第二通信装置以及第三通信装置之间进行数据交互来实现通信方法的流程。如图6所示,该方法包括:FIG6 exemplarily shows a flow chart of a communication method provided in Embodiment 2 of the present application. The method is applicable to the communication system architecture illustrated in FIG2. The method flow may be implemented by data interaction between multiple communication devices (such as a first communication device, a second communication device, and a third communication device). Optionally, the first communication device may be a first terminal device or a component (such as a chip, a chip system, or a circuit, etc.) that can support the first terminal device to implement the functions required by the method, the second communication device may be a first network element or a component (such as a chip, a chip system, or a circuit, etc.) that can support the first network element to implement the functions required by the method, and the third communication device may be a second network element or a component (such as a chip, a chip system, or a circuit, etc.) that can support the second network element to implement the functions required by the method. Exemplarily, when the communication method illustrated in FIG6 is applicable to the communication system architecture illustrated in FIG1a or FIG1b, the terminal device may be the UE illustrated in FIG1a or FIG1b, the first network element may be the AMF network element illustrated in FIG1a or FIG1b, and the second network element may be the LMF network element illustrated in FIG1a or FIG1b. When the communication method illustrated in FIG6 is applicable to the communication system architecture illustrated in FIG2, the terminal device may be the UE illustrated in FIG2, the first network element may be the MME illustrated in FIG2, and the second network element may be the E-SMLC illustrated in FIG2. In order to facilitate the introduction of the technical solution provided in the first embodiment of the present application, the following takes the first communication device as the terminal device, the second communication device as the first network element, and the third communication device as the second network element as an example to introduce the process of implementing the communication method by data interaction between the first communication device, the second communication device, and the third communication device. As shown in FIG6, the method includes:
步骤601:第一网元从第二网元获取第二密钥并保存第二密钥。Step 601: A first network element obtains a second key from a second network element and stores the second key.
可选的,第一网元可以从第二网元获取第二密钥,并对获取的第二密钥进行保存(或存储)。示例性地,第二密钥可以为加密第一业务包括的高精度定位业务对应的辅助数据的新密钥。应理解,第二密钥也可以用于解密(或解析)加密的辅助数据。举例来说,第二密钥可以是新的/更新后的RTK密钥。Optionally, the first network element may obtain the second key from the second network element, and save (or store) the obtained second key. Exemplarily, the second key may be a new key for encrypting the auxiliary data corresponding to the high-precision positioning service included in the first service. It should be understood that the second key may also be used to decrypt (or parse) the encrypted auxiliary data. For example, the second key may be a new/updated RTK key.
当图6所示意的通信方法适用于图1a或图1b所示意的通信系统架构时,第二网元可以是图1a或图1b所示意的LMF网元。当图6所示意的通信方法适用于图2所示意的通信系统架构时,第二网元可以是图2所示意的E-SMLC。When the communication method illustrated in FIG6 is applicable to the communication system architecture illustrated in FIG1a or FIG1b, the second network element may be the LMF network element illustrated in FIG1a or FIG1b. When the communication method illustrated in FIG6 is applicable to the communication system architecture illustrated in FIG2, the second network element may be the E-SMLC illustrated in FIG2.
举例来说,第二网元可以通过广播密钥数据通知(Nlmf_Broadcast_CipheringKeyDataNotify)消息将用于加密高精度定位业务对应的辅助数据的最新密钥(比如第二密钥)发送给第一网元。For example, the second network element may send the latest key (such as the second key) used to encrypt the auxiliary data corresponding to the high-precision positioning service to the first network element through a broadcast key data notification (Nlmf_Broadcast_CipheringKeyDataNotify) message.
第一网元在获取第二密钥后,可以根据用户是否签约第一业务,确定需要推送/发送第二密钥的用户有哪些。只有签约了第一业务的用户,第一网元才会推送第二密钥。之后,第一网元可以根据签约用户使用的终端设备的连接管理状态(比如连接管理连接态或连接管理空闲态),选择对应的推送方式进行推送第二密钥。举例来说,第一网元推送的第二密钥可以是一个或多个。After obtaining the second key, the first network element can determine which users need to push/send the second key according to whether the users have signed up for the first service. The first network element will push the second key only to users who have signed up for the first service. Afterwards, the first network element can select a corresponding push method to push the second key according to the connection management state of the terminal device used by the contracted user (such as the connection management connected state or the connection management idle state). For example, the second key pushed by the first network element can be one or more.
在一个示例中,当签约用户使用的终端设备(比如第一终端设备)处于连接管理连接态,第一网元执行下述步骤602。在另一个示例中,当签约用户使用的终端设备(比如第一终端设备)处于连接管理空闲态,第一网元执行下述步骤603和步骤605。In one example, when the terminal device (such as the first terminal device) used by the subscriber is in the connection management connected state, the first network element performs the following step 602. In another example, when the terminal device (such as the first terminal device) used by the subscriber is in the connection management idle state, the first network element performs the following steps 603 and 605.
步骤602:若第一终端设备处于连接管理连接态,第一网元向第一终端设备发送第六消息。第一终端设备接收第六消息。Step 602: If the first terminal device is in the connection management connection state, the first network element sends a sixth message to the first terminal device. The first terminal device receives the sixth message.
可选的,第六消息可以用于更新NAS参数或可以用于通知第一终端设备密钥已更新。示例性地,第六消息可以携带第二密钥。Optionally, the sixth message may be used to update NAS parameters or may be used to notify the first terminal device that the key has been updated. Exemplarily, the sixth message may carry the second key.
举例来说,当图6所示意的通信方法适用于图1a或图1b所示意的通信系统架构时,第六消息可以是NAS消息。例如,NAS消息可以是配置更新(configuration update)消息。例如,配置更新消息可以是配置更新命令(configuration update command)消息或配置更新完成(configuration update complete)消息。当图6所示意的通信方法适用于图2所示意的通信系统架构时,第六消息也可以是NAS消息NAS消息可以是诸如更新终端设备参数配置的消息。For example, when the communication method illustrated in FIG. 6 is applicable to the communication system architecture illustrated in FIG. 1a or FIG. 1b, the sixth message may be a NAS message. For example, the NAS message may be a configuration update message. For example, the configuration update message may be a configuration update command message or a configuration update complete message. When the communication method illustrated in FIG. 6 is applicable to the communication system architecture illustrated in FIG. 2, the sixth message may also be a NAS message. The NAS message may be a message such as updating a terminal device parameter configuration.
步骤603:若第一终端设备处于连接管理空闲态,第一网元向第一终端设备发送寻呼消息。第一终 端设备接收寻呼消息。Step 603: If the first terminal device is in the connection management idle state, the first network element sends a paging message to the first terminal device. The end device receives the paging message.
其中,寻呼消息用于寻呼第一终端设备,以此触发服务请求流程,有助于实现将第一终端设备从连接管理空闲态寻呼回连接管理连接态,从而可以实现将第二密钥及时地推送给第一终端设备。Among them, the paging message is used to page the first terminal device to trigger the service request process, which helps to page the first terminal device from the connection management idle state back to the connection management connected state, so that the second key can be pushed to the first terminal device in a timely manner.
步骤604:第一终端设备根据寻呼消息,向第一网元发送第七消息。第一终端设备接收第七消息。Step 604: The first terminal device sends a seventh message to the first network element according to the paging message. The first terminal device receives the seventh message.
示例性地,第七消息可以用于激活用户面会话(比如PDU会话)。例如,第七消息可以是NAS消息,比如,NAS消息可以是服务请求消息。Exemplarily, the seventh message may be used to activate a user plane session (such as a PDU session). For example, the seventh message may be a NAS message, such as a service request message.
第一终端设备在接收到寻呼消息后,可以根据寻呼消息,启动服务请求流程,比如可以向第一网元发送第七消息,以此激活相应的PDU会话。After receiving the paging message, the first terminal device can start the service request process according to the paging message, for example, it can send the seventh message to the first network element to activate the corresponding PDU session.
步骤605:第一网元向第一终端设备发送第八消息。第一终端设备接收第八消息。Step 605: The first network element sends an eighth message to the first terminal device. The first terminal device receives the eighth message.
示例性地,第八消息可以携带第二密钥。举例来说,第八消息可以是第七消息的响应消息。Exemplarily, the eighth message may carry the second key.For example, the eighth message may be a response message to the seventh message.
在第一终端设备的用户面会话激活后,第一终端设备可以通过用户面连接进行接收来自第一网元的相应业务消息(比如NAS消息)。相应的,第一网元可以在第一终端设备的用户面会话激活后,可以通过向第一终端设备发送相应的服务响应消息(比如第八消息)将第二密钥发送给第一终端设备。示例性地,第六消息可以是NAS消息,比如,NAS消息可以是服务接收消息(或可称为服务接受消息)。After the user plane session of the first terminal device is activated, the first terminal device may receive a corresponding service message (such as a NAS message) from the first network element through the user plane connection. Accordingly, after the user plane session of the first terminal device is activated, the first network element may send the second key to the first terminal device by sending a corresponding service response message (such as the eighth message) to the first terminal device. Exemplarily, the sixth message may be a NAS message, for example, a NAS message may be a service reception message (or may be referred to as a service acceptance message).
通过上述步骤601至步骤605可以看出,第一网元在获取最新密钥(比如第二密钥)后,及时地将第二密钥推送给签约第一业务(比如高精度定位业务)的用户关联的终端设备,可以实现网络侧在获得最新密钥后,及时通知相关的终端设备,从而可以使得相关的终端设备能够利用最新密钥成功解密加密的辅助数据,有助于提高终端设备的定位精度。It can be seen from the above steps 601 to 605 that after obtaining the latest key (such as the second key), the first network element promptly pushes the second key to the terminal device associated with the user who has signed up for the first service (such as the high-precision positioning service). This enables the network side to promptly notify the relevant terminal devices after obtaining the latest key, so that the relevant terminal devices can use the latest key to successfully decrypt the encrypted auxiliary data, which helps to improve the positioning accuracy of the terminal devices.
基于上述图6所示意的通信方法的技术方案,下面通过图7至图8所示的具体示例,分别对于5G通信系统架构和4G通信系统架构下本申请实施例提供的通信方法的实现过程进行介绍。其中,图7所示的具体示例中,终端设备为UE,(R)AN设备为gNB(或可称为NG-(R)AN设备),第一密钥为RTK密钥,第一网元为AMF网元,第二网元为LMF网元,辅助数据为RTK定位辅助数据;图8所示的具体示例中,终端设备为UE,(R)AN设备为eNB(或可称为eNodeB),第一密钥为RTK密钥,第一网元为MME,第二网元为E-SMLC,辅助数据为RTK定位辅助数据。可以理解,在本申请实施例中,由某网元执行的动作也可以替换为由网元中的功能部件执行。本申请实施例中,功能部件例如可包括芯片、芯片系统、处理器、处理单元中的至少一种。Based on the technical solution of the communication method shown in FIG. 6 above, the following specific examples shown in FIG. 7 and FIG. 8 respectively introduce the implementation process of the communication method provided in the embodiment of the present application under the 5G communication system architecture and the 4G communication system architecture. In the specific example shown in FIG. 7, the terminal device is a UE, the (R) AN device is a gNB (or may be referred to as an NG-(R) AN device), the first key is an RTK key, the first network element is an AMF network element, the second network element is an LMF network element, and the auxiliary data is RTK positioning auxiliary data; in the specific example shown in FIG. 8, the terminal device is a UE, the (R) AN device is an eNB (or may be referred to as an eNodeB), the first key is an RTK key, the first network element is an MME, the second network element is an E-SMLC, and the auxiliary data is RTK positioning auxiliary data. It can be understood that in the embodiment of the present application, the action performed by a network element can also be replaced by the action performed by the functional component in the network element. In the embodiment of the present application, the functional component may, for example, include at least one of a chip, a chip system, a processor, and a processing unit.
图7为本申请实施例二提供的另一种通信方法的流程示意图。其中,图7所示意的通信方法适用于5G通信系统架构。如图7所示,该方法的具体流程可以包括:FIG7 is a flow chart of another communication method provided in Embodiment 2 of the present application. The communication method shown in FIG7 is applicable to a 5G communication system architecture. As shown in FIG7 , the specific flow of the method may include:
步骤701:LMF网元向AMF网元发送广播密钥数据通知消息。AMF网元接收广播密钥数据通知消息。Step 701: The LMF network element sends a broadcast key data notification message to the AMF network element. The AMF network element receives the broadcast key data notification message.
示例性地,广播密钥数据通知消息中可以包括RTK定位辅助数据对应的最新RTK密钥(或可理解为更新后的RTK密钥)。RTK密钥可以理解为辅助数据的密钥或GNSS辅助数据的密钥等。For example, the broadcast key data notification message may include the latest RTK key corresponding to the RTK positioning assistance data (or may be understood as the updated RTK key). The RTK key may be understood as the key of the assistance data or the key of the GNSS assistance data.
AMF网元在接收广播密钥数据通知消息后,从广播密钥数据通知消息中获取最新RTK密钥,并对最新RTK密钥进行存储(或保存)。After receiving the broadcast key data notification message, the AMF network element obtains the latest RTK key from the broadcast key data notification message and stores (or saves) the latest RTK key.
步骤702:AMF网元确定需要推送最新RTK密钥的目标UE。Step 702: The AMF network element determines the target UE to which the latest RTK key needs to be pushed.
其中,需要推送最新RTK密钥的目标UE关联用户为签约高精度定位业务的用户(以下简称“签约用户”)。Among them, the target UE-associated user to which the latest RTK key needs to be pushed is the user who has signed up for the high-precision positioning service (hereinafter referred to as the "signed user").
举例来说,AMF网元可以根据位置服务(location service,LCS)-广播协助(Broadcast assistance,BCA)的比特位图(bitmap),判断哪些用户签约了高精度定位业务。之后,AMF网元可以及时准确地将最新RTK密钥推送给这些用户对应的UE,以便这些用户对应的UE可以及时地利用最新RTK密钥成功解析(或成功解密)基站广播的加密的RTK定位辅助数据,从而可以有效地提高UE定位精度,并可以有效地避免出现签约用户对应的UE因RTK密钥过期而使得加密的RTK定位辅助数据无法成功解析,以此导致UE定位精度不准确的问题。For example, the AMF network element can determine which users have signed up for high-precision positioning services based on the bitmap of the location service (LCS)-broadcast assistance (BCA). After that, the AMF network element can promptly and accurately push the latest RTK key to the UEs corresponding to these users, so that the UEs corresponding to these users can promptly use the latest RTK key to successfully parse (or successfully decrypt) the encrypted RTK positioning assistance data broadcast by the base station, thereby effectively improving the UE positioning accuracy and effectively avoiding the problem that the encrypted RTK positioning assistance data cannot be successfully parsed due to the expiration of the RTK key of the UE corresponding to the contracted user, thereby causing inaccurate UE positioning accuracy.
步骤703:当确定目标UE处于连接管理连接态时,AMF网元向目标UE发送NAS消息。目标UE接收NAS消息。Step 703: When it is determined that the target UE is in the connection management connection state, the AMF network element sends a NAS message to the target UE. The target UE receives the NAS message.
示例性地,NAS消息可以是configuration update消息。例如,configuration update消息可以是configuration update command消息或configuration update complete消息。Exemplarily, the NAS message may be a configuration update message. For example, the configuration update message may be a configuration update command message or a configuration update complete message.
可选的,NAS消息中可以携带最新RTK密钥。 Optionally, the NAS message may carry the latest RTK key.
举例来说,针对签约用户中所使用的UE处于连接管理(connection management,CM)连接态(connected)的第一用户,AMF网元可以发送NAS消息给第一用户。其中,NAS消息中携带最新RTK密钥。示例性地,第一用户的数量可以是一个或多个,本申请实施例对此并不作限定。For example, for a first user whose UE is in a connection management (CM) connected state among the contracted users, the AMF network element may send a NAS message to the first user. The NAS message carries the latest RTK key. Exemplarily, the number of first users may be one or more, which is not limited in the embodiments of the present application.
可选的,NAS消息在由AMF网元发送至目标UE的过程中,可以经过一个或多个gNB。例如,以一个gNB为例,AMF网元可以先将NAS消息发送给gNB,由gNB将该NAS消息发送给目标UE。Optionally, the NAS message may pass through one or more gNBs during the process of being sent by the AMF network element to the target UE. For example, taking one gNB as an example, the AMF network element may first send the NAS message to the gNB, and the gNB may send the NAS message to the target UE.
步骤704:当确定目标UE处于连接管理空闲态时,AMF网元向目标UE发送寻呼消息。目标UE接收寻呼消息。Step 704: When it is determined that the target UE is in the connection management idle state, the AMF network element sends a paging message to the target UE. The target UE receives the paging message.
其中,寻呼消息用于寻呼目标UE,以便实现将目标UE从CM空闲态(idle)寻呼回CM_connected,从而可以实现将最新RTK密钥及时地推送给目标UE。The paging message is used to page the target UE, so as to page the target UE back from the CM idle state to the CM_connected state, thereby enabling the latest RTK key to be pushed to the target UE in a timely manner.
举例来说,针对签约用户中所使用的UE处于CM_idle的第二用户,AMF网元需要先发送寻呼消息给第二用户对应的UE。第二用户对应的UE在接收到寻呼消息后,发起服务请求(service request)流程。示例性地,第二用户的数量可以是一个或多个,本申请实施例对此并不作限定。For example, for the second user whose UE is in CM_idle among the contracted users, the AMF network element needs to first send a paging message to the UE corresponding to the second user. After receiving the paging message, the UE corresponding to the second user initiates a service request process. Exemplarily, the number of second users can be one or more, and the embodiments of the present application do not limit this.
可选的,寻呼消息在由AMF网元发送至目标UE的过程中,可以经过一个或多个gNB。例如,以一个gNB为例,AMF网元可以先将寻呼消息发送给gNB,由gNB将该寻呼消息发送给目标UE。Optionally, the paging message may pass through one or more gNBs during the process of being sent by the AMF network element to the target UE. For example, taking one gNB as an example, the AMF network element may first send the paging message to the gNB, and the gNB may send the paging message to the target UE.
步骤705:目标UE根据寻呼消息,向AMF网元发送服务请求消息。AMF网元接收服务请求消息。Step 705: The target UE sends a service request message to the AMF network element according to the paging message. The AMF network element receives the service request message.
举例来说,目标UE在接收到寻呼消息后,可以根据寻呼消息,发起service request流程。例如,目标UE可以向AMF网元发送服务请求消息。示例性地,服务请求消息可以是NAS消息。For example, after receiving the paging message, the target UE can initiate a service request process according to the paging message. For example, the target UE can send a service request message to the AMF network element. Exemplarily, the service request message can be a NAS message.
可选的,服务请求消息在由目标UE发送至AMF网元的过程中,可以经过一个或多个gNB。例如,以一个gNB为例,目标UE可以先将服务请求消息发送给所在区域的gNB,由gNB将该服务请求消息发送给AMF网元。Optionally, the service request message may pass through one or more gNBs during the process of being sent from the target UE to the AMF network element. For example, taking one gNB as an example, the target UE may first send the service request message to the gNB in its area, and the gNB may send the service request message to the AMF network element.
步骤706:AMF网元向目标UE发送服务接收消息。目标UE接收服务接收消息。Step 706: The AMF network element sends a service reception message to the target UE. The target UE receives the service reception message.
示例性地,服务接收(或可称为服务接受)(service accept)消息可以是NAS消息。Exemplarily, the service receive (or may be referred to as service accept) message may be a NAS message.
举例来说,AMF网元在接收到服务请求消息后,可以通过服务接收消息将最新RTK密钥推送给目标UE。For example, after receiving the service request message, the AMF network element can push the latest RTK key to the target UE through the service reception message.
可选的,服务接收消息在由AMF网元发送至目标UE的过程中,可以经过一个或多个gNB。例如,以一个gNB为例,AMF网元可以先将服务接收消息发送给gNB,由gNB将该服务接收消息发送给目标UE。Optionally, the service reception message may pass through one or more gNBs during the process of being sent by the AMF network element to the target UE. For example, taking one gNB as an example, the AMF network element may first send the service reception message to the gNB, and the gNB may send the service reception message to the target UE.
通过上述步骤701至步骤706可以看出,针对5GC通信场景,LMF网元在生成最新RTK密钥(或更新RTK密钥)后,可以将最新RTK密钥(或更新后的RTK密钥)推送给AMF网元。之后,AMF网元可以及时地将最新RTK密钥(或更新后的RTK密钥)推送给对应的目标UE(即签约用户使用的UE)。如此,该方法可以实现网络侧在生成最新RTK密钥(或更新RTK密钥)后,及时通知对应的目标UE,使得目标UE可以利用最新RTK密钥(或更新后的RTK密钥)成功解析加密的RTK定位辅助数据,从而可以有效地提高UE的定位精度,并可以有效地避免出现目标UE因RTK密钥过期而无法解析加密的RTK定位辅助数据,造成UE定位精度不准确的问题。It can be seen from the above steps 701 to 706 that for the 5GC communication scenario, after the LMF network element generates the latest RTK key (or updates the RTK key), it can push the latest RTK key (or updated RTK key) to the AMF network element. After that, the AMF network element can promptly push the latest RTK key (or updated RTK key) to the corresponding target UE (i.e., the UE used by the contracted user). In this way, the method can enable the network side to promptly notify the corresponding target UE after generating the latest RTK key (or updating the RTK key), so that the target UE can use the latest RTK key (or updated RTK key) to successfully parse the encrypted RTK positioning assistance data, thereby effectively improving the positioning accuracy of the UE, and effectively avoiding the problem that the target UE cannot parse the encrypted RTK positioning assistance data due to the expiration of the RTK key, resulting in inaccurate UE positioning accuracy.
图8为本申请实施例二提供的又一种通信方法的流程示意图。其中,图8所示意的通信方法适用于4G通信系统架构。如图8所示,该方法的具体流程可以包括:FIG8 is a flow chart of another communication method provided in Embodiment 2 of the present application. The communication method shown in FIG8 is applicable to a 4G communication system architecture. As shown in FIG8 , the specific flow of the method may include:
步骤801:E-SMLC向MME发送广播密钥数据通知消息。MME接收广播密钥数据通知消息。Step 801: E-SMLC sends a broadcast key data notification message to MME. MME receives the broadcast key data notification message.
可选的,步骤801的实现方式可以参考上述步骤701的实现方式,此处不再赘述。Optionally, the implementation of step 801 may refer to the implementation of step 701 described above, which will not be repeated here.
步骤802:MME确定需要推送最新RTK密钥的目标UE。Step 802: The MME determines the target UE to which the latest RTK key needs to be pushed.
可选的,步骤802的实现方式可以参考上述步骤702的实现方式,此处不再赘述。Optionally, the implementation of step 802 may refer to the implementation of step 702 described above, which will not be repeated here.
步骤803:在目标UE处于连接管理连接态时,MME向目标UE发送NAS消息。目标UE接收NAS消息。Step 803: When the target UE is in the connection management connected state, the MME sends a NAS message to the target UE. The target UE receives the NAS message.
可选的,步骤803的实现方式可以参考上述步骤703的实现方式,此处不再赘述。Optionally, the implementation of step 803 may refer to the implementation of step 703 described above, which will not be repeated here.
此外,因在EPS中暂无网络侧发起的configuration update流程,因此在步骤803中,NAS消息可以是更新UE参数配置的消息(比如配置消息)。举例来说,配置消息可以是configuration update command消息(或configuration update complete消息)。In addition, since there is no configuration update process initiated by the network side in EPS, the NAS message may be a message (such as a configuration message) for updating UE parameter configuration in step 803. For example, the configuration message may be a configuration update command message (or a configuration update complete message).
步骤804:在目标UE处于连接管理空闲态时,MME向目标UE发送寻呼消息。目标UE接收寻呼消息。 Step 804: When the target UE is in the connection management idle state, the MME sends a paging message to the target UE. The target UE receives the paging message.
可选的,步骤804的实现方式可以参考上述步骤704的实现方式,此处不再赘述。Optionally, the implementation of step 804 may refer to the implementation of step 704 described above, which will not be described in detail here.
步骤805:目标UE根据寻呼消息,向MME发送服务请求消息。MME接收服务请求消息。Step 805: The target UE sends a service request message to the MME according to the paging message. The MME receives the service request message.
可选的,步骤805的实现方式可以参考上述步骤705的实现方式,此处不再赘述。Optionally, the implementation of step 805 may refer to the implementation of step 705 described above, which will not be repeated here.
步骤806:MME向目标UE发送服务接收消息。目标UE接收服务接收消息。Step 806: The MME sends a service receiving message to the target UE. The target UE receives the service receiving message.
可选的,步骤806的实现方式可以参考上述步骤706的实现方式,此处不再赘述。Optionally, the implementation of step 806 may refer to the implementation of step 706 described above, which will not be described in detail here.
通过上述步骤801至步骤806可以看出,针对EPC通信场景,E-SMLC在生成最新RTK密钥(或更新RTK密钥)后,可以将最新RTK密钥(或更新后的RTK密钥)推送给MME。之后,MME可以及时地将最新RTK密钥(或更新后的RTK密钥)推送给对应的目标UE(即签约用户使用的UE)。如此,该方法可以实现网络侧在生成最新RTK密钥(或更新RTK密钥)后,及时通知对应的目标UE,使得目标UE可以利用最新RTK密钥(或更新后的RTK密钥)成功解析加密的RTK定位辅助数据,从而可以有效地提高UE的定位精度,并可以有效地避免出现目标UE因RTK密钥过期而无法解析加密的RTK定位辅助数据,造成UE定位精度不准确的问题。It can be seen from the above steps 801 to 806 that for the EPC communication scenario, after the E-SMLC generates the latest RTK key (or updates the RTK key), it can push the latest RTK key (or the updated RTK key) to the MME. After that, the MME can promptly push the latest RTK key (or the updated RTK key) to the corresponding target UE (i.e., the UE used by the contracted user). In this way, the method can realize that after the network side generates the latest RTK key (or updates the RTK key), it can promptly notify the corresponding target UE, so that the target UE can use the latest RTK key (or the updated RTK key) to successfully parse the encrypted RTK positioning assistance data, thereby effectively improving the positioning accuracy of the UE, and effectively avoiding the problem that the target UE cannot parse the encrypted RTK positioning assistance data due to the expiration of the RTK key, resulting in inaccurate UE positioning accuracy.
需要说明的是,在本申请的描述中“至少一个”是指一个或者多个,“多个”是指两个或两个以上。“和/或”,描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A、同时存在A和B、单独存在B的情况,其中A,B可以是单数或者复数。字符“/”一般表示前后关联对象是一种“或”的关系。“以下至少一项(个)”或其类似表达,是指的这些项中的任意组合,包括单项(个)或复数项(个)的任意组合。例如“A,B和C中的至少一个”包括A,B,C,AB,AC,BC或ABC。以及,除非有特别说明,本申请实施例提及“第一”、“第二”、“第三”等序数词是用于对多个对象进行区分,不用于限定多个对象的顺序、时序、优先级或者重要程度。此外,在本申请中出现的术语“包括”、“包含”、“具有”及它们的变形都意味着“包括但不限于”,除非是以其它方式另外特别强调。It should be noted that in the description of the present application, "at least one" refers to one or more, and "multiple" refers to two or more. "And/or" describes the association relationship of the associated objects, indicating that there may be three relationships, for example, A and/or B, which can represent: the situation where A exists alone, A and B exist at the same time, and B exists alone, wherein A and B can be singular or plural. The character "/" generally indicates that the associated objects before and after are an "or" relationship. "At least one of the following (individuals)" or its similar expression refers to any combination of these items, including any combination of single items (individuals) or plural items (individuals). For example, "at least one of A, B and C" includes A, B, C, AB, AC, BC or ABC. And, unless otherwise specified, the ordinal numbers such as "first", "second", and "third" mentioned in the embodiments of the present application are used to distinguish multiple objects, and are not used to limit the order, timing, priority or importance of multiple objects. In addition, the terms "including", "comprising", "having" and their variations appearing in the present application all mean "including but not limited to", unless otherwise specifically emphasized in other ways.
此外,需要说明的是,以上各个实施例中涉及的每个步骤可以为相应的设备执行,也可以是该设备内的芯片、处理器或芯片系统等部件执行,本申请实施例并不对其构成限定。以上各实施例仅以由相应设备执行为例进行说明。In addition, it should be noted that each step involved in the above embodiments can be performed by a corresponding device, or by a chip, processor, or chip system in the device, and the embodiments of the present application do not limit them. The above embodiments are only described by taking the corresponding device as an example.
需要说明的是,在以上各个实施例中,可以选择部分步骤进行实施,还可以调整图示中步骤的顺序进行实施,本申请对此不做限定。应理解,执行图示中的部分步骤、调整步骤的顺序或相互结合进行具体实施,均落在本申请的保护范围内。It should be noted that in the above embodiments, some steps can be selected for implementation, and the order of the steps in the diagram can be adjusted for implementation, and this application does not limit this. It should be understood that executing some steps in the diagram, adjusting the order of the steps, or combining them for specific implementation all fall within the scope of protection of this application.
可以理解的是,为了实现上述实施例中功能,上述实施例中涉及的各个设备包括了执行各个功能相应的硬件结构和/或软件模块。本领域技术人员应该很容易意识到,结合本申请中所公开的实施例描述的各示例的单元及方法步骤,本申请能够以硬件或硬件和计算机软件相结合的形式来实现。某个功能究竟以硬件还是计算机软件驱动硬件的方式来执行,取决于技术方案的特定应用场景和设计约束条件。It is understandable that, in order to implement the functions in the above embodiments, the various devices involved in the above embodiments include hardware structures and/or software modules corresponding to the execution of the various functions. It should be easily appreciated by those skilled in the art that, in combination with the units and method steps of the various examples described in the embodiments disclosed in this application, the present application can be implemented in the form of hardware or a combination of hardware and computer software. Whether a function is executed in the form of hardware or computer software driving hardware depends on the specific application scenario and design constraints of the technical solution.
应理解:本申请实施例中的“步骤”仅是个示意,是为了更好的理解实施例所采用的一种表现方法,不对本申请的方案的执行构成实质性限定,例如:该“步骤”还可以理解成“特征”。此外,该步骤不对本申请方案的执行顺序构成任何限定,任何在此基础上做出的不影响整体方案实现的步骤顺序改变或步骤合并或步骤拆分等操作,所形成的新的技术方案也在本申请公开的范围之内。It should be understood that the "steps" in the embodiments of the present application are only for illustration, and are a method of expression used to better understand the embodiments, and do not constitute a substantial limitation on the execution of the scheme of the present application. For example, the "steps" can also be understood as "features". In addition, the steps do not constitute any limitation on the execution order of the scheme of the present application. Any changes in the order of steps, step merging, or step splitting made on this basis that do not affect the implementation of the overall scheme, and the resulting new technical solutions are also within the scope of the disclosure of the present application.
基于相同的构思,本申请实施例还提供了一种可能的通信装置,通信装置适用于图1a或图1b或图2所示意的通信系统架构。可选的,通信装置可以是通信设备(比如终端设备(比如第一终端设备或其它终端设备)、第一网元或第二网元)或能够支持通信设备实现该通信方法所需的功能的装置。在一个示例中,当通信装置是终端设备(或第一终端设备)(比如UE)时,通信装置用于实现以上实施例中终端设备(或第一终端设备)涉及的技术方案,或者通信装置的模块(比如芯片)用于实现以上实施例中终端设备(或第一终端设备)涉及的技术方案,因此也能实现上述实施例中终端设备(或第一终端设备)所具备的有益效果。示例性地,当通信装置是设置在终端设备(或第一终端设备)中的芯片时,通信装置中包括收发器和处理器,不包括存储器。其中,收发器以输入输出接口存在,输入输出接口用于芯片实现通信设备(或第一终端设备)的收发。输入输出接口可以包括输入接口和/或输出接口,输入接口可以实现终端设备(或第一终端设备)的接收,输出接口可以用于实现终端设备(或第一终端设备)的发送。处理器用于读取并执行相应的计算机程序或指令,使得终端设备(或第一终端设备)的相应功能被实现。可选的,芯片在实现上述实施例中终端设备(或第一终端设备)的相应功能时,输入输出接 口可以实现上述实施例中由终端设备(或第一终端设备)执行的收发操作;处理器可以实现上述实施例中由终端设备(或第一终端设备)执行的除收发操作以外的其他操作。具体的相关具体描述可以参见上述实施例中终端设备(或第一终端设备)的相关描述,此处不再详细介绍。Based on the same concept, the embodiment of the present application also provides a possible communication device, which is applicable to the communication system architecture shown in Figure 1a or Figure 1b or Figure 2. Optionally, the communication device can be a communication device (such as a terminal device (such as a first terminal device or other terminal device), a first network element or a second network element) or a device that can support the communication device to implement the functions required by the communication method. In an example, when the communication device is a terminal device (or a first terminal device) (such as a UE), the communication device is used to implement the technical solutions involved in the terminal device (or the first terminal device) in the above embodiment, or the module (such as a chip) of the communication device is used to implement the technical solutions involved in the terminal device (or the first terminal device) in the above embodiment, so the beneficial effects possessed by the terminal device (or the first terminal device) in the above embodiment can also be achieved. Exemplarily, when the communication device is a chip set in the terminal device (or the first terminal device), the communication device includes a transceiver and a processor, but does not include a memory. Among them, the transceiver exists as an input and output interface, and the input and output interface is used for the chip to implement the transceiver of the communication device (or the first terminal device). The input/output interface may include an input interface and/or an output interface. The input interface may implement the reception of the terminal device (or the first terminal device), and the output interface may be used to implement the transmission of the terminal device (or the first terminal device). The processor is used to read and execute the corresponding computer program or instruction so that the corresponding function of the terminal device (or the first terminal device) is implemented. Optionally, when the chip implements the corresponding function of the terminal device (or the first terminal device) in the above embodiment, the input/output interface The port can implement the transceiver operation performed by the terminal device (or the first terminal device) in the above embodiment; the processor can implement other operations except the transceiver operation performed by the terminal device (or the first terminal device) in the above embodiment. For specific related descriptions, please refer to the related descriptions of the terminal device (or the first terminal device) in the above embodiment, which will not be described in detail here.
在另一个示例中,当通信装置是第一网元(比如AMF网元或MME)时,通信装置用于实现以上实施例中第一网元涉及的技术方案,或者通信装置的模块(比如芯片)用于实现以上实施例中第一网元涉及的技术方案,因此也能实现上述实施例中第一网元所具备的有益效果。示例性地,当通信装置是设置在第一网元中的芯片时,通信装置中包括收发器和处理器,不包括存储器。其中,收发器以输入输出接口存在,输入输出接口用于芯片实现通信设备的收发。输入输出接口可以包括输入接口和/或输出接口,输入接口可以实现第一网元的接收,输出接口可以用于实现第一网元的发送。处理器用于读取并执行相应的计算机程序或指令,使得第一网元的相应功能被实现。可选的,芯片在实现上述实施例中第一网元的相应功能时,输入输出接口可以实现上述实施例中由第一网元执行的收发操作;处理器可以实现上述实施例中由第一网元执行的除收发操作以外的其他操作。具体的相关具体描述可以参见上述实施例中第一网元的相关描述,此处不再详细介绍。In another example, when the communication device is a first network element (such as an AMF network element or an MME), the communication device is used to implement the technical solution involved in the first network element in the above embodiment, or the module (such as a chip) of the communication device is used to implement the technical solution involved in the first network element in the above embodiment, so the beneficial effects of the first network element in the above embodiment can also be achieved. Exemplarily, when the communication device is a chip set in the first network element, the communication device includes a transceiver and a processor, but does not include a memory. Among them, the transceiver exists as an input and output interface, and the input and output interface is used for the chip to implement the transceiver of the communication device. The input and output interface may include an input interface and/or an output interface, the input interface can implement the reception of the first network element, and the output interface can be used to implement the transmission of the first network element. The processor is used to read and execute the corresponding computer program or instruction so that the corresponding function of the first network element is implemented. Optionally, when the chip implements the corresponding function of the first network element in the above embodiment, the input and output interface can implement the transceiver operation performed by the first network element in the above embodiment; the processor can implement other operations except the transceiver operation performed by the first network element in the above embodiment. For specific related descriptions, please refer to the related descriptions of the first network element in the above embodiment, which will not be described in detail here.
在又一个示例中,当通信装置是第二网元(比如LMF网元或E-SMLC)时,通信装置用于实现以上实施例中第二网元涉及的技术方案,或者通信装置的模块(比如芯片)用于实现以上实施例中第二网元涉及的技术方案,因此也能实现上述实施例中第二网元所具备的有益效果。示例性地,当通信装置是设置在第二网元中的芯片时,通信装置中包括收发器和处理器,不包括存储器。其中,收发器以输入输出接口存在,输入输出接口用于芯片实现通信设备的收发。输入输出接口可以包括输入接口和/或输出接口,输入接口可以实现第二网元的接收,输出接口可以用于实现第二网元的发送。处理器用于读取并执行相应的计算机程序或指令,使得第二网元的相应功能被实现。可选的,芯片在实现上述实施例中第二网元的相应功能时,输入输出接口可以实现上述实施例中由第二网元执行的收发操作;处理器可以实现上述实施例中由第二网元执行的除收发操作以外的其他操作。具体的相关具体描述可以参见上述实施例中第二网元的相关描述,此处不再详细介绍。In another example, when the communication device is a second network element (such as an LMF network element or an E-SMLC), the communication device is used to implement the technical solution involved in the second network element in the above embodiment, or the module (such as a chip) of the communication device is used to implement the technical solution involved in the second network element in the above embodiment, so the beneficial effects of the second network element in the above embodiment can also be achieved. Exemplarily, when the communication device is a chip set in the second network element, the communication device includes a transceiver and a processor, but does not include a memory. Among them, the transceiver exists as an input and output interface, and the input and output interface is used for the chip to implement the transceiver of the communication device. The input and output interface may include an input interface and/or an output interface, the input interface can implement the reception of the second network element, and the output interface can be used to implement the transmission of the second network element. The processor is used to read and execute the corresponding computer program or instruction so that the corresponding function of the second network element is implemented. Optionally, when the chip implements the corresponding function of the second network element in the above embodiment, the input and output interface can implement the transceiver operation performed by the second network element in the above embodiment; the processor can implement other operations except the transceiver operation performed by the second network element in the above embodiment. For specific related descriptions, please refer to the related descriptions of the second network element in the above embodiment, which will not be described in detail here.
参见图9,通信装置900包括通信模块901(或可称为收发模块,用于发送和接收数据)和处理模块902。通信装置900用于实现上述图3至图8所示的方法实施例中第一通信装置(比如终端设备)或第二通信装置(比如第一网元)或第三通信装置(比如第二网元)的功能。9, the communication device 900 includes a communication module 901 (or may be referred to as a transceiver module, for sending and receiving data) and a processing module 902. The communication device 900 is used to implement the functions of the first communication device (such as a terminal device) or the second communication device (such as a first network element) or the third communication device (such as a second network element) in the method embodiments shown in the above-mentioned FIGS. 3 to 8.
可选的,通信模块901可以包括接收模块和/或发送模块。接收模块可以用于通信装置900接收信号(信息或数据等);发送模块可以用于通信装置900发送信号(信息或数据等)。发送模块可以在处理模块902的控制下发送信号(信息或数据等),接收模块可以在处理模块902的控制下接收信号(信息或数据等)。Optionally, the communication module 901 may include a receiving module and/or a sending module. The receiving module may be used for the communication device 900 to receive signals (information or data, etc.); the sending module may be used for the communication device 900 to send signals (information or data, etc.). The sending module may send signals (information or data, etc.) under the control of the processing module 902, and the receiving module may receive signals (information or data, etc.) under the control of the processing module 902.
当通信装置900用于实现上述图3至图5所示的方法实施例中终端设备的功能时:通信模块901,用于向第一网元发送第一信息。其中,第一信息用于请求第一密钥,第一密钥用于加密辅助数据。通信模块901,还用于接收来自第一网元的第一消息。其中,第一消息包括第一指示信息,第一指示信息用于指示第一密钥不存在或不可获得。处理模块902,用于若第一时间或计时器或定时器过期,向第一网元发送第二信息,或者等待第一网元发送第一密钥。其中,第二信息用于请求第一密钥。When the communication device 900 is used to implement the functions of the terminal device in the method embodiments shown in Figures 3 to 5 above: the communication module 901 is used to send a first message to the first network element. The first information is used to request a first key, and the first key is used to encrypt auxiliary data. The communication module 901 is also used to receive a first message from the first network element. The first message includes first indication information, and the first indication information is used to indicate that the first key does not exist or is not available. The processing module 902 is used to send a second message to the first network element, or wait for the first network element to send a first key if the first time or timer or timer expires. The second information is used to request the first key.
当通信装置900用于实现上述图3至图5所示的方法实施例中第一网元的功能时:通信模块901,用于接收来自终端设备的第一信息。其中,第一信息用于请求第一密钥,第一密钥用于加密辅助数据。处理模块902,用于若第一密钥不存在或不可获得,向终端设备发送第一消息。其中,第一消息包括第一指示信息,第一指示信息用于指示第一密钥不存在或不可获得。通信模块901,还用于接收来自终端设备的第二信息,或者若获取到第一密钥,向终端设备发送第一密钥。其中,第二信息用于请求第一密钥。When the communication device 900 is used to implement the function of the first network element in the method embodiment shown in Figures 3 to 5 above: the communication module 901 is used to receive the first information from the terminal device. The first information is used to request the first key, and the first key is used to encrypt auxiliary data. The processing module 902 is used to send a first message to the terminal device if the first key does not exist or is not available. The first message includes first indication information, and the first indication information is used to indicate that the first key does not exist or is not available. The communication module 901 is also used to receive the second information from the terminal device, or if the first key is obtained, send the first key to the terminal device. The second information is used to request the first key.
当通信装置900用于实现上述图3至图5所示的方法实施例中第二网元的功能时:通信模块901,用于接收来自第一网元的第二消息。其中,第二消息用于请求第一密钥。处理模块902,用于若本地不存在或不可获得第一密钥,向第一网元发送第三消息。其中,第三消息包括第四指示信息,第四指示信息用于指示第一密钥不存在或不可获得。When the communication device 900 is used to implement the function of the second network element in the method embodiments shown in Figures 3 to 5 above: the communication module 901 is used to receive a second message from the first network element. The second message is used to request the first key. The processing module 902 is used to send a third message to the first network element if the first key does not exist or is not available locally. The third message includes fourth indication information, and the fourth indication information is used to indicate that the first key does not exist or is not available.
当通信装置900用于实现上述图6至图8所示的方法实施例中第一网元的功能时:通信模块901,用于第一终端设备处于连接管理连接态,向第一终端设备发送第六消息。其中,第六消息用于更新NAS参数或用于通知第一终端设备密钥已更新;第六消息包括第二密钥;第一终端设备关联用户为签约第一 业务的用户,第一业务包括高精度定位业务;第二密钥为加密高精度定位业务对应的辅助数据的新密钥。通信模块901,还用于若第一终端设备处于连接管理空闲态,向第一终端设备发送寻呼消息。其中,寻呼消息用于寻呼第一终端设备。通信模块901,还用于接收来自第一终端设备的第七消息。其中,第七消息用于激活用户面会话。通信模块901,还用于向第一终端设备发送第八消息。其中,第八消息包括第二密钥。可选的,处理模块902,用于保存(或存储)第二密钥。处理模块902,还用于确定需要推送第二密钥的签约用户。When the communication device 900 is used to implement the function of the first network element in the method embodiment shown in Figures 6 to 8 above: the communication module 901 is used for the first terminal device to be in the connection management connection state, and send the sixth message to the first terminal device. The sixth message is used to update the NAS parameters or to notify the first terminal device that the key has been updated; the sixth message includes the second key; the first terminal device is associated with the user who signed the first The user of the service, the first service includes a high-precision positioning service; the second key is a new key for encrypting the auxiliary data corresponding to the high-precision positioning service. The communication module 901 is also used to send a paging message to the first terminal device if the first terminal device is in a connection management idle state. The paging message is used to page the first terminal device. The communication module 901 is also used to receive the seventh message from the first terminal device. The seventh message is used to activate the user plane session. The communication module 901 is also used to send an eighth message to the first terminal device. The eighth message includes the second key. Optionally, the processing module 902 is used to save (or store) the second key. The processing module 902 is also used to determine the signed user to whom the second key needs to be pushed.
当通信装置900用于实现上述图6至图8所示的方法实施例中第一终端设备的功能时:通信模块901,用于若第一终端设备处于连接管理连接态,接收来自第一网元的第六消息。其中,第六消息用于更新NAS参数或用于通知第一终端设备密钥已更新;第六消息包括第二密钥;第一终端设备关联用户为签约第一业务的用户,第一业务包括高精度定位业务;第二密钥为加密高精度定位业务对应的辅助数据的新密钥。通信模块901,还用于若第一终端设备处于连接管理空闲态,接收来自第一网元的寻呼消息。其中,寻呼消息用于寻呼第一终端设备。通信模块901,还用于向第一网元发送第七消息。其中,第七消息用于激活用户面会话。通信模块901,还用于接收来自第一网元的第八消息。其中,第八消息包括第二密钥。When the communication device 900 is used to implement the function of the first terminal device in the method embodiment shown in Figures 6 to 8 above: the communication module 901 is used to receive the sixth message from the first network element if the first terminal device is in the connection management connection state. The sixth message is used to update the NAS parameters or to notify the first terminal device that the key has been updated; the sixth message includes the second key; the user associated with the first terminal device is a user who has signed a contract for the first service, and the first service includes a high-precision positioning service; the second key is a new key for encrypting the auxiliary data corresponding to the high-precision positioning service. The communication module 901 is also used to receive a paging message from the first network element if the first terminal device is in the connection management idle state. The paging message is used to page the first terminal device. The communication module 901 is also used to send a seventh message to the first network element. The seventh message is used to activate the user plane session. The communication module 901 is also used to receive an eighth message from the first network element. The eighth message includes the second key.
当通信装置900用于实现上述图6至图8所示的方法实施例中第二网元的功能时:通信模块901,用于向第一网元发送广播密钥数据通知消息。其中,广播密钥数据通知消息包括第二密钥。When the communication device 900 is used to implement the function of the second network element in the method embodiments shown in Figures 6 to 8 above: the communication module 901 is used to send a broadcast key data notification message to the first network element, wherein the broadcast key data notification message includes the second key.
其中,当通信装置900用于实现图3至图8所示的方法实施例中第一通信装置或第二通信装置或第三通信装置的功能时,关于通信模块901和处理模块902更详细的描述,可参考上述图3至图8所示的方法实施例中关于第一通信装置或第二通信装置或第三通信装置的相关描述,在此不再赘述。Among them, when the communication device 900 is used to implement the function of the first communication device or the second communication device or the third communication device in the method embodiments shown in Figures 3 to 8, for a more detailed description of the communication module 901 and the processing module 902, refer to the relevant description of the first communication device or the second communication device or the third communication device in the method embodiments shown in Figures 3 to 8 above, and will not be repeated here.
应理解,本申请实施例中的通信模块901可以由收发器或收发器相关电路组件实现,处理模块902可以由处理器或处理器相关电路组件实现。It should be understood that the communication module 901 in the embodiment of the present application can be implemented by a transceiver or a transceiver-related circuit component, and the processing module 902 can be implemented by a processor or a processor-related circuit component.
需要说明的是,本申请实施例中对模块的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。It should be noted that the division of modules in the embodiments of the present application is schematic and is only a logical function division. There may be other division methods in actual implementation. In addition, each functional unit in each embodiment of the present application may be integrated into a processing unit, or may exist physically separately, or two or more units may be integrated into one unit. The above-mentioned integrated unit may be implemented in the form of hardware or in the form of software functional units.
集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,或者服务器等)或处理器(processor)执行本申请各个实施例方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(read-only memory,ROM)、随机存取存储器(random access memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。If the integrated unit is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a computer-readable storage medium. Based on this understanding, the technical solution of the present application, or the part that contributes to the prior art, or all or part of the technical solution can be embodied in the form of a software product. The computer software product is stored in a storage medium, including several instructions for a computer device (which can be a personal computer, or a server, etc.) or a processor (processor) to perform all or part of the steps of the various embodiments of the present application. The aforementioned storage medium includes: U disk, mobile hard disk, read-only memory (ROM), random access memory (RAM), disk or optical disk and other media that can store program codes.
基于相同的构思,本申请实施例还提供了一种可能的通信装置,该通信装置适用于图1a或图1b或图2所示意的通信系统架构。示例性地,该通信装置可以是用于执行本申请实施例提供的通信方法所需的装置(比如第一通信装置或第二通信装置或第三通信装置),或者可以是包含有执行本申请实施例提供的通信方法所需的装置的设备。可选的,该通信装置也可以设置在第一通信装置(或第二通信装置或第三通信装置)中的芯片,当该通信装置是设置在第一通信装置(或第二通信装置或第三通信装置)中的芯片时,该通信装置中包括收发器和处理器,不包括存储器。其中,收发器以输入输出接口存在,输入输出接口用于芯片实现该通信装置的收发。该输入输出接口可以包括输入接口和/或输出接口,输入接口可以实现该通信装置的接收,输出接口可以用于实现该通信装置的发送。该处理器用于读取并执行相应的计算机程序或指令,使得第一通信装置(或第二通信装置或第三通信装置)的相应功能被实现。可选的,该芯片在实现上述实施例中第一通信装置(或第二通信装置或第三通信装置)的相应功能时,输入输出接口可以实现上述实施例中由第一通信装置(或第二通信装置或第三通信装置)执行的收发操作;处理器可以实现上述实施例中由第一通信装置(或第二通信装置或第三通信装置)执行的除收发操作以外的其他操作。具体的相关具体描述可以参见上述实施例中的相关描述,此处不再详细介绍。示例性地,以该通信装置是第一通信装置(比如终端设备或第一终端设备)或第二通信装置(比如第一网元)或第三通信装置(比如第二网元)为例。当该通信装置用于实现以上实施例中第一通信装置涉及的技术方案,因此也能实现上述方法实施例中第一通信装置所具备的有益效果。当该通信装置用于实现以上实 施例中第二通信装置涉及的技术方案,因此也能实现上述方法实施例中第二通信装置所具备的有益效果。当该通信装置用于实现以上实施例中第三通信装置涉及的技术方案,因此也能实现上述方法实施例中第三通信装置所具备的有益效果。Based on the same concept, the embodiment of the present application also provides a possible communication device, which is applicable to the communication system architecture shown in Figure 1a or Figure 1b or Figure 2. Exemplarily, the communication device may be a device (such as a first communication device or a second communication device or a third communication device) required for executing the communication method provided in the embodiment of the present application, or may be a device including a device required for executing the communication method provided in the embodiment of the present application. Optionally, the communication device may also be arranged in a chip in the first communication device (or the second communication device or the third communication device). When the communication device is a chip arranged in the first communication device (or the second communication device or the third communication device), the communication device includes a transceiver and a processor, but does not include a memory. Among them, the transceiver exists as an input and output interface, and the input and output interface is used for the chip to realize the transceiver of the communication device. The input and output interface may include an input interface and/or an output interface, and the input interface can realize the reception of the communication device, and the output interface can be used to realize the sending of the communication device. The processor is used to read and execute corresponding computer programs or instructions so that the corresponding functions of the first communication device (or the second communication device or the third communication device) are realized. Optionally, when the chip implements the corresponding functions of the first communication device (or the second communication device or the third communication device) in the above embodiment, the input and output interface can implement the transceiver operation performed by the first communication device (or the second communication device or the third communication device) in the above embodiment; the processor can implement other operations except the transceiver operation performed by the first communication device (or the second communication device or the third communication device) in the above embodiment. For specific related descriptions, please refer to the relevant descriptions in the above embodiments, which will not be described in detail here. By way of example, it is taken that the communication device is a first communication device (such as a terminal device or a first terminal device) or a second communication device (such as a first network element) or a third communication device (such as a second network element). When the communication device is used to implement the technical solutions involved in the first communication device in the above embodiment, the beneficial effects possessed by the first communication device in the above method embodiment can also be achieved. When the communication device is used to implement the above implementation The technical solution involved in the second communication device in the embodiment can also achieve the beneficial effects of the second communication device in the above method embodiment. When the communication device is used to implement the technical solution involved in the third communication device in the above embodiment, the beneficial effects of the third communication device in the above method embodiment can also be achieved.
参见图10,通信装置1000包括:收发器1001、处理器1002。可选的,通信装置1000还包括存储器1003。其中,收发器1001、处理器1002以及存储器1003之间相互连接。当通信装置1000用于实现以上实施例提供中第一通信装置涉及的技术方案时,收发器1001可用于实现上述通信模块901在执行第一通信装置涉及的技术方案时的功能,处理器1002用于实现上述处理模块902在执行第一通信装置涉及的技术方案时的功能。当通信装置1000用于实现以上实施例提供中第二通信装置涉及的技术方案时,收发器1001可用于实现上述通信模块901在执行第二通信装置涉及的技术方案时的功能,处理器1002用于实现上述处理模块902在执行第二通信装置涉及的技术方案时的功能。当通信装置1000用于实现以上实施例提供中第三通信装置涉及的技术方案时,收发器1001可用于实现上述通信模块901在执行第三通信装置涉及的技术方案时的功能,处理器1002用于实现上述处理模块902在执行第三通信装置涉及的技术方案时的功能Referring to FIG. 10 , the communication device 1000 includes: a transceiver 1001 and a processor 1002. Optionally, the communication device 1000 further includes a memory 1003. The transceiver 1001, the processor 1002 and the memory 1003 are interconnected. When the communication device 1000 is used to implement the technical solution involved in the first communication device provided in the above embodiment, the transceiver 1001 can be used to implement the function of the above communication module 901 when executing the technical solution involved in the first communication device, and the processor 1002 is used to implement the function of the above processing module 902 when executing the technical solution involved in the first communication device. When the communication device 1000 is used to implement the technical solution involved in the second communication device provided in the above embodiment, the transceiver 1001 can be used to implement the function of the above communication module 901 when executing the technical solution involved in the second communication device, and the processor 1002 is used to implement the function of the above processing module 902 when executing the technical solution involved in the second communication device. When the communication device 1000 is used to implement the technical solution involved in the third communication device provided in the above embodiment, the transceiver 1001 can be used to implement the function of the above communication module 901 when executing the technical solution involved in the third communication device, and the processor 1002 is used to implement the function of the above processing module 902 when executing the technical solution involved in the third communication device.
可选的,收发器1001、处理器1002以及存储器1003之间通过总线1004相互连接。总线1004可以是外设部件互连标准(peripheral component interconnect,PCI)总线或扩展工业标准结构(extended industry standard architecture,EISA)总线等。总线可以分为地址总线、数据总线、控制总线等。为便于表示,图10中仅用一条粗线表示,但并不表示仅有一根总线或一种类型的总线。Optionally, the transceiver 1001, the processor 1002 and the memory 1003 are interconnected via a bus 1004. The bus 1004 may be a peripheral component interconnect (PCI) bus or an extended industry standard architecture (EISA) bus. The bus may be divided into an address bus, a data bus, a control bus, etc. For ease of representation, FIG10 is represented by only one thick line, but it does not mean that there is only one bus or one type of bus.
收发器1001,用于接收和发送数据。例如,当通信装置1000为如图1a、图1b或图2所示意的UE时,收发器1001实现与如图1a、图1b或图2所示意的RAN设备进行通信,或者也可以实现与图1a、图1b或图2所示意的通信系统架构以外的其它设备(比如车载设备或服务器)进行通信。在一个示例中,收发器可以是集成有数据收发功能的收发装置。在另一个示例中,收发器也可以是由发射器和接收器组成,其中,发射器用于发送数据,接收器用于接收数据。The transceiver 1001 is used to receive and send data. For example, when the communication device 1000 is a UE as shown in FIG. 1a, FIG. 1b or FIG. 2, the transceiver 1001 implements communication with the RAN device as shown in FIG. 1a, FIG. 1b or FIG. 2, or can also implement communication with other devices (such as vehicle-mounted devices or servers) outside the communication system architecture shown in FIG. 1a, FIG. 1b or FIG. 2. In one example, the transceiver can be a transceiver device with integrated data transceiver function. In another example, the transceiver can also be composed of a transmitter and a receiver, wherein the transmitter is used to send data and the receiver is used to receive data.
可选的,收发器1001可以包括发射器和/或接收器。发射器用于发送信号、消息、信息或数据等。接收器用于接收信号、消息、信息或数据等。示例性地,发射器在处理器1002的控制下发送信号、消息、信息或数据等。接收器在处理器1002的控制下接收信号、消息、信息或数据等。Optionally, the transceiver 1001 may include a transmitter and/or a receiver. The transmitter is used to send signals, messages, information, or data, etc. The receiver is used to receive signals, messages, information, or data, etc. Exemplarily, the transmitter sends signals, messages, information, or data, etc. under the control of the processor 1002. The receiver receives signals, messages, information, or data, etc. under the control of the processor 1002.
处理器1002的功能可以参照以上实施例中第一通信装置或第二通信装置或第三通信装置涉及的相应功能的描述,此处不再赘述。其中,处理器1002可以是中央处理器(central processing unit,CPU),网络处理器(network processor,NP)或者CPU和NP的组合等等。处理器1002还可以进一步包括硬件芯片。上述硬件芯片可以是专用集成电路(application-specific integrated circuit,ASIC),可编程逻辑器件(programmable logic device,PLD)或其组合。上述PLD可以是复杂可编程逻辑器件(complex programmable logic device,CPLD),现场可编程逻辑门阵列(field-programmable gate array,FPGA),通用阵列逻辑(generic array logic,GAL)或其任意组合。处理器1002在实现上述功能时,可以通过硬件实现,当然也可以通过硬件执行相应的软件实现。The functions of the processor 1002 can refer to the description of the corresponding functions involved in the first communication device or the second communication device or the third communication device in the above embodiments, and will not be repeated here. Among them, the processor 1002 can be a central processing unit (CPU), a network processor (NP) or a combination of CPU and NP, etc. The processor 1002 can further include a hardware chip. The above-mentioned hardware chip can be an application-specific integrated circuit (ASIC), a programmable logic device (PLD) or a combination thereof. The above-mentioned PLD can be a complex programmable logic device (CPLD), a field-programmable gate array (FPGA), a generic array logic (GAL) or any combination thereof. When the processor 1002 implements the above-mentioned functions, it can be implemented by hardware, and of course, it can also be implemented by executing the corresponding software through hardware.
存储器1003,用于存放程序指令等。具体地,程序指令可以包括程序代码,该程序代码包括计算机操作指令。存储器1003可能包含随机存取存储器(random access memory,RAM),也可能还包括非易失性存储器(non-volatile memory),例如至少一个磁盘存储器。处理器1002执行存储器1003所存放的程序指令,实现上述功能,从而实现上述实施例中第一通信装置或第二通信装置或第三通信装置所需执行的方法步骤。The memory 1003 is used to store program instructions, etc. Specifically, the program instructions may include program codes, and the program codes include computer operation instructions. The memory 1003 may include random access memory (RAM), and may also include non-volatile memory (non-volatile memory), such as at least one disk memory. The processor 1002 executes the program instructions stored in the memory 1003 to implement the above functions, thereby implementing the method steps required to be executed by the first communication device, the second communication device, or the third communication device in the above embodiments.
基于相同的构思,本申请实施例还提供了一种可能的通信系统,该通信系统中包含第一通信装置(比如终端设备或第一终端设备)、第二通信装置(比如第一网元)和第三通信装置(比如第二网元)。其中,第一通信装置可以用于实现以上实施例中第一通信装置涉及的技术方案,第二通信装置可以用于实现以上实施例中第二通信装置涉及的技术方案,第三通信装置可以用于实现以上实施例中第三通信装置涉及的技术方案。Based on the same concept, the embodiment of the present application also provides a possible communication system, which includes a first communication device (such as a terminal device or a first terminal device), a second communication device (such as a first network element) and a third communication device (such as a second network element). Among them, the first communication device can be used to implement the technical solution involved in the first communication device in the above embodiment, the second communication device can be used to implement the technical solution involved in the second communication device in the above embodiment, and the third communication device can be used to implement the technical solution involved in the third communication device in the above embodiment.
基于相同的构思,本申请实施例还提供了一种计算机程序产品,该计算机程序产品包括计算机程序或指令,当该计算机程序或指令在计算机上运行时,使得该计算机执行以上实施例提供的方法。Based on the same concept, an embodiment of the present application further provides a computer program product, which includes a computer program or instructions. When the computer program or instructions are executed on a computer, the computer executes the method provided in the above embodiment.
基于相同的构思,本申请实施例还提供了一种计算机可读存储介质,该计算机可读存储介质中存储有计算机程序或指令,当该计算机程序或指令被计算机执行时,使得该计算机执行以上实施例提供的方法。 Based on the same concept, an embodiment of the present application also provides a computer-readable storage medium, in which a computer program or instruction is stored. When the computer program or instruction is executed by a computer, the computer executes the method provided in the above embodiment.
其中,存储介质可以是计算机能够存取的任何可用介质。以此为例但不限于:计算机可读介质可以包括RAM、ROM、EEPROM、CD-ROM或其他光盘存储、磁盘存储介质或者其他磁存储设备、或者能够用于携带或存储具有指令或数据结构形式的期望的程序代码并能够由计算机存取的任何其他介质。The storage medium may be any available medium that can be accessed by a computer. For example, but not limited to, a computer-readable medium may include RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage medium or other magnetic storage device, or any other medium that can be used to carry or store the desired program code in the form of instructions or data structures and can be accessed by a computer.
基于相同的构思,本申请实施例还提供了一种芯片,该芯片与存储器耦合,该芯片用于读取存储器中存储的计算机程序,实现以上实施例提供的方法。Based on the same concept, an embodiment of the present application further provides a chip, which is coupled to a memory and is used to read a computer program stored in the memory to implement the method provided in the above embodiment.
基于相同的构思,本申请实施例还提供了一种芯片系统,该芯片系统包括处理器,用于支持计算机装置实现以上实施例中第一通信装置(比如终端设备)或第二通信装置(比如第一网元)或第三通信装置(比如第二网元)所涉及的功能。在一种可能的设计中,该芯片系统还包括存储器,所述存储器用于保存该计算机装置必要的程序和数据。该芯片系统,可以由芯片构成,也可以包含芯片和其他分立器件。Based on the same concept, an embodiment of the present application also provides a chip system, which includes a processor for supporting a computer device to implement the functions involved in the first communication device (such as a terminal device) or the second communication device (such as a first network element) or the third communication device (such as a second network element) in the above embodiments. In one possible design, the chip system also includes a memory, which is used to store the necessary programs and data for the computer device. The chip system can be composed of chips, or it can include chips and other discrete devices.
本申请实施例提供的方法中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机指令时,全部或部分地产生按照本申请实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(digital subscriber line,DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质(例如,软盘、硬盘、磁带)、光介质(例如,高密度数字视频光盘(digital video disc,DVD))、或者半导体介质(例如,固态硬盘(solid state drive,SSD))等。In the method provided in the embodiment of the present application, it can be implemented in whole or in part by software, hardware, firmware or any combination thereof. When implemented by software, it can be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When the computer instructions are loaded and executed on a computer, the process or function described in the embodiment of the present application is generated in whole or in part. The computer can be a general-purpose computer, a special-purpose computer, a computer network, or other programmable device. The computer instructions can be stored in a computer-readable storage medium, or transmitted from one computer-readable storage medium to another computer-readable storage medium. For example, the computer instructions can be transmitted from a website site, computer, server or data center by wired (e.g., coaxial cable, optical fiber, digital subscriber line (digital subscriber line, DSL)) or wireless (e.g., infrared, wireless, microwave, etc.) mode to another website site, computer, server or data center. The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device such as a server or data center that includes one or more available media integrated. The available medium may be a magnetic medium (e.g., a floppy disk, a hard disk, a magnetic tape), an optical medium (e.g., a high-density digital video disc (DVD)), or a semiconductor medium (e.g., a solid state drive (SSD)), etc.
本申请实施例中所描述的方法的步骤可以直接嵌入硬件、处理器执行的软件单元、或者这两者的结合。软件单元可以存储于RAM、ROM、EEPROM、寄存器、硬盘、可移动磁盘、CD-ROM或本领域中其它任意形式的存储媒介中。示例性地,存储媒介可以与处理器连接,以使得处理器可以从存储媒介中读取信息,并可以向存储媒介存写信息。可选的,存储媒介还可以集成到处理器中。处理器和存储媒介可以设置于ASIC中。The steps of the method described in the embodiments of the present application can be directly embedded in the hardware, the software unit executed by the processor, or the combination of the two. The software unit can be stored in RAM, ROM, EEPROM, register, hard disk, removable disk, CD-ROM or other storage media of any form in the art. Exemplarily, the storage medium can be connected to the processor so that the processor can read information from the storage medium and can write information to the storage medium. Optionally, the storage medium can also be integrated into the processor. The processor and the storage medium can be arranged in an ASIC.
本申请是参照根据本申请的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。The present application is described with reference to the flowchart and/or block diagram of the method, device (system), and computer program product according to the present application. It should be understood that each process and/or box in the flowchart and/or block diagram, as well as the combination of the process and/or box in the flowchart and/or block diagram can be implemented by computer program instructions. These computer program instructions can be provided to a processor of a general-purpose computer, a special-purpose computer, an embedded processor or other programmable data processing device to produce a machine, so that the instructions executed by the processor of the computer or other programmable data processing device produce a device for implementing the function specified in one process or multiple processes in the flowchart and/or one box or multiple boxes in the block diagram.
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。These computer program instructions may also be loaded onto a computer or other programmable data processing device so that a series of operational steps are executed on the computer or other programmable device to produce a computer-implemented process, whereby the instructions executed on the computer or other programmable device provide steps for implementing the functions specified in one or more processes in the flowchart and/or one or more boxes in the block diagram.
显然,本领域的技术人员可以对本申请进行各种改动和变型而不脱离本申请的精神和范围。这样,倘若本申请的这些修改和变型属于本申请权利要求及其等同技术的范围之内,则本申请也意图包含这些改动和变型在内。 Obviously, those skilled in the art can make various changes and modifications to the present application without departing from the spirit and scope of the present application. Thus, if these modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is also intended to include these modifications and variations.
Claims (24)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202311294451.6 | 2023-09-28 | ||
| CN202311294451.6A CN119729480A (en) | 2023-09-28 | 2023-09-28 | Communication method and device |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2025066165A1 true WO2025066165A1 (en) | 2025-04-03 |
Family
ID=95092141
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2024/092893 Pending WO2025066165A1 (en) | 2023-09-28 | 2024-05-13 | Communication method and apparatus |
Country Status (2)
| Country | Link |
|---|---|
| CN (1) | CN119729480A (en) |
| WO (1) | WO2025066165A1 (en) |
Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN111726800A (en) * | 2019-03-04 | 2020-09-29 | 华为技术有限公司 | Method and apparatus for protecting auxiliary information |
| CN112073177A (en) * | 2019-06-11 | 2020-12-11 | 大唐移动通信设备有限公司 | Key updating method and device |
| WO2021212413A1 (en) * | 2020-04-23 | 2021-10-28 | 华为技术有限公司 | Key transmission method and apparatus |
| CN115915132A (en) * | 2020-04-30 | 2023-04-04 | 华为技术有限公司 | Key management method, device and system |
| CN117528505A (en) * | 2021-01-11 | 2024-02-06 | 瑞典爱立信有限公司 | Method and apparatus for user equipment identifier request |
-
2023
- 2023-09-28 CN CN202311294451.6A patent/CN119729480A/en active Pending
-
2024
- 2024-05-13 WO PCT/CN2024/092893 patent/WO2025066165A1/en active Pending
Patent Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN111726800A (en) * | 2019-03-04 | 2020-09-29 | 华为技术有限公司 | Method and apparatus for protecting auxiliary information |
| CN112073177A (en) * | 2019-06-11 | 2020-12-11 | 大唐移动通信设备有限公司 | Key updating method and device |
| WO2021212413A1 (en) * | 2020-04-23 | 2021-10-28 | 华为技术有限公司 | Key transmission method and apparatus |
| CN115915132A (en) * | 2020-04-30 | 2023-04-04 | 华为技术有限公司 | Key management method, device and system |
| CN117528505A (en) * | 2021-01-11 | 2024-02-06 | 瑞典爱立信有限公司 | Method and apparatus for user equipment identifier request |
Also Published As
| Publication number | Publication date |
|---|---|
| CN119729480A (en) | 2025-03-28 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP6908720B2 (en) | Core network control plane device selection method and equipment | |
| EP3860176B1 (en) | Method, apparatus, and system for obtaining capability information of terminal | |
| WO2022257549A1 (en) | Network slicing method and device, and storage medium | |
| WO2020224622A1 (en) | Information configuration method and device | |
| US11729599B2 (en) | Communication system | |
| WO2021136211A1 (en) | Method and device for determining authorization result | |
| WO2023160624A1 (en) | Communication method and apparatus | |
| US20240172084A1 (en) | Data transmission method and apparatus | |
| US20240244107A1 (en) | Method for determining application server | |
| EP4185011A1 (en) | Relay communication method, and communication apparatus | |
| US20250088988A1 (en) | Time synchronization method and communication apparatus | |
| CN109936444A (en) | A method and device for generating a key | |
| EP3955614A1 (en) | Communication method and device | |
| US20240155325A1 (en) | Information obtaining method and apparatus, and system | |
| EP4274310A1 (en) | Network intercommunication method and apparatus | |
| CN114731731B (en) | Communication method and device | |
| CN116939505A (en) | A communication method and device | |
| US20240365265A1 (en) | Time service method, communication apparatus, and communication system | |
| US20240022907A1 (en) | Apparatus and method of coordinating a reauthentication/reauthorization procedure for access to uncrewed aerial services | |
| US20230336992A1 (en) | Method and apparatus for authenticating user equipment in wireless communication system | |
| WO2025066165A1 (en) | Communication method and apparatus | |
| WO2023179397A1 (en) | Licensing method and apparatus | |
| WO2023045741A1 (en) | Positioning method and apparatus, and readable storage medium | |
| US20250350942A1 (en) | Method for wireless communication, system for wireless communication, and communication device | |
| CN114642079B (en) | Communication method and device |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 24869733 Country of ref document: EP Kind code of ref document: A1 |