WO2025066165A1 - Procédé et appareil de communication - Google Patents
Procédé et appareil de communication Download PDFInfo
- Publication number
- WO2025066165A1 WO2025066165A1 PCT/CN2024/092893 CN2024092893W WO2025066165A1 WO 2025066165 A1 WO2025066165 A1 WO 2025066165A1 CN 2024092893 W CN2024092893 W CN 2024092893W WO 2025066165 A1 WO2025066165 A1 WO 2025066165A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- message
- key
- network element
- terminal device
- communication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/069—Authentication using certificates or pre-shared keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W68/00—User notification, e.g. alerting and paging, for incoming communication, change of service or the like
Definitions
- the present application relates to the field of communication technology, and in particular to a communication method and device.
- RTK positioning technology is a differential positioning technology, also known as carrier phase differential technology.
- the base station data center obtains auxiliary data (such as RTK auxiliary data) based on the global navigation satellite system (GNSS) positioning measurement results reported by the base station and the difference between the GNSS positioning data calculated based on the actual position of the base station.
- GNSS global navigation satellite system
- the base station data center encrypts the auxiliary data and sends it to the base station through the location management function (LMF) network element and the mobility management (AMF) network element.
- LMF location management function
- AMF mobility management
- a terminal device taking the example of a terminal device obtaining RTK auxiliary data broadcast by a base station for positioning calibration.
- the terminal device In order to successfully parse (or decrypt) the encrypted RTK auxiliary data broadcast by the base station, the terminal device must first obtain the RTK key corresponding to the encrypted RTK auxiliary data by accessing the AMF network element.
- the PTK key has a validity period and cannot be used after the validity period expires.
- the terminal device when the terminal device requests the RTK key from the AMF network element, the AMF network element temporarily does not have the RTK key, then there will be a problem of energy loss caused by the terminal device blindly trying to send the RTK key acquisition request; or when the AMF network element does not send the RTK key to the terminal device in time after updating the RTK key, the terminal device will be unable to parse the encrypted RTK auxiliary data due to the expiration of the RTK key. Therefore, the current solution for terminal devices to obtain RTK keys needs further study.
- the present application provides a communication method and apparatus for enabling a terminal device to effectively obtain a key and successfully parse encrypted auxiliary data.
- the present application provides a communication method, which can be implemented by data interaction between multiple communication devices (such as a first communication device, a second communication device, etc.).
- the first communication device can be a terminal device or a component (such as a chip, a chip system or a circuit, etc.) that can support the terminal device to implement the functions required by the method
- the second communication device can be a first network element or a component (such as a chip, a chip system or a circuit, etc.) that can support the first network element to implement the functions required by the method.
- the terminal device can send a first message to the first network element, the first message is used to request a first key, and the first key is used to encrypt auxiliary data.
- the terminal device receives a first message from the first network element, the first message includes a first indication information, and the first indication information is used to indicate that the first key does not exist (Not exist) or is not available (Not available) or is not configured or stored.
- the terminal device sends a second message to the first network element, and the second information is used to request the first key, or the terminal device waits for the first network element to send the first key.
- the present application does not limit the terminal device to sending the second information until the first time or the timer or the timer expires.
- the terminal device may also send the second information after randomly waiting for a period of time without limitation.
- the assistance data in the present application can be understood as positioning assistance data, high-precision positioning assistance data, RTK data, GNSS assistance data, positioning data, differential positioning data, high-precision positioning data, GNSS positioning data, outdoor positioning data, satellite positioning data, positioning service data, high-precision positioning service data, differential positioning service data, GNSS positioning service data, satellite positioning service data, or RTK positioning service data.
- RTK positioning assistance data high-precision positioning assistance data
- GNSS positioning data positioning data
- the first information or the second information in the present application can be a key indication (for example, a cipher key or a ciphering key).
- the network side (such as the first network element) temporarily does not have the first key.
- the network side By sending an indication message to the terminal device indicating that the first key does not exist or is unavailable, it is possible to promptly notify the terminal device when the network side temporarily does not have the first key requested by the terminal device.
- This helps to avoid the terminal device from blindly and frequently attempting to initiate a request to obtain the first key, and can reduce the energy consumption of the terminal device due to blindly and frequently attempting to request the first key. It can also help the terminal device to effectively obtain the latest key to parse encrypted auxiliary data, and can also reduce the signaling overhead of the network, especially in scenarios with a large number of terminals.
- the terminal device sends first information to the first network element, including: if the auxiliary data is converted/switched from being received through the user plane of the terminal device to being received through the control plane, the terminal device sends the first information to the first network element, wherein the user plane reception may include reception through a session, for example, reception through a PDU session of the terminal device; the control plane reception may include reception through control plane signaling, for example, reception of a system message sent by an access network device, and the system message may include reception of a system message block (SIB).
- SIB system message block
- a terminal device when a terminal device receives an indication from a control plane to receive auxiliary data through a user plane (e.g., a PDU session) (e.g., from a third-party application or application function (Application Function, AF) or an application server (Application Server, AS), where the third-party application or AF or AS may be an auxiliary data center), the terminal device sends a first message to a first network element.
- a control plane e.g., a PDU session
- AF Application Function
- AS Application Server
- the third-party application or AF or AS can count the number of terminal devices from which auxiliary data is obtained (e.g., it can sense which terminal devices obtain auxiliary data from it through a PDU session), when the third-party application or AF or AS senses/determines that auxiliary data needs to be sent through the control plane (e.g., the user plane connection load is high or the outlet traffic pressure is high, etc.), an indication for notifying the control plane to receive auxiliary data is sent to these terminal devices through a PDU session.
- the control plane e.g., the user plane connection load is high or the outlet traffic pressure is high, etc.
- the terminal device receives a notification message from the core network or base station, notifying it to receive auxiliary data through the control plane.
- This scenario can be that when a third-party application or AF or AS perceives/determines that auxiliary data needs to be sent through the control plane (for example, the user plane connection load is high or the export traffic pressure is high, etc.), the core network or base station is first notified, and then the core network or base station notifies the terminal device to switch/convert to receiving auxiliary data through the control plane.
- whether the receiving method of the auxiliary data has changed can be determined/perceived/known as a trigger condition for sending the first information, thereby ensuring that the sending of the first information is more in line with the actual needs of the terminal device.
- the first message may also include second indication information, which may be used to indicate a first time or a timer or a timer, and the first time or a timer or a timer may be used to indicate a next request time for the first key, or to indicate a sending time for the next request information for the first key, or to indicate a start time for the next request information for the first key.
- second indication information may be used to indicate a first time or a timer or a timer, and the first time or a timer or a timer may be used to indicate a next request time for the first key, or to indicate a sending time for the next request information for the first key, or to indicate a start time for the next request information for the first key.
- the network side (such as the first network element) does not have the first key temporarily.
- the terminal device can effectively request the first key according to the second indication information, thereby further avoiding the terminal device from blindly and frequently attempting to initiate a request to obtain the first key, helping to reduce the energy consumption caused by the terminal device's blindly and frequently attempting to request the first key, and can also reduce the signaling overhead of the network, especially in scenarios with a large number of terminals.
- the first message may also include third indication information, where the third indication information is used to instruct the terminal device to wait for the first network element to send the first key.
- the network side (such as the first network element) temporarily does not have the first key.
- the terminal device can wait for the first key to be issued according to the third indication information, thereby further avoiding the terminal device from blindly and frequently attempting to initiate a request to obtain the first key, which helps to reduce the energy consumption caused by the terminal device's blindly and frequently attempting to request the first key.
- the auxiliary data is converted from being received through the user plane of the terminal device to being received through the control plane, including: receiving a system message block sent by the access network device to determine (or perceive) that the auxiliary data is converted from being received through the user plane of the terminal device to being received through the control plane; or not receiving a system message block sent by the access network device to determine that the auxiliary data is converted from being received through the control plane to being received through the user plane of the terminal device.
- the implementation methods for determining whether the receiving method of the auxiliary data has changed are flexible and diverse, which can ensure that the sending of the first information is more accurate and more in line with the actual sending situation.
- a timer or timer is used to indicate a first duration, where the first duration is the time interval between two consecutive requests for the first key by the terminal device, and the first time is the sum of the time when the terminal device sends the first message and the first duration.
- the first time is the sum of the time when the terminal device sends the first message and a second time length set by the terminal device.
- the terminal device after the terminal device fails to request the first key according to the first information, it sends the information requesting the first key again after a period of time set by the terminal device, which helps to reduce the energy consumption caused by the terminal device's blind attempts to continuously request the first key.
- the present application provides a communication method, which can be implemented by data interaction between multiple communication devices (such as a first communication device, a second communication device, etc.).
- the first communication device can be a terminal device or a component (such as a chip, a chip system or a circuit, etc.) that can support the terminal device to implement the functions required by the method
- the second communication device can be a first network element or a component (such as a chip, a chip system or a circuit, etc.) that can support the first network element to implement the functions required by the method.
- the first network element receives first information from the terminal device, wherein the first information is used to request a first key, and the first key is used to encrypt auxiliary data. Afterwards, if the first key does not exist or is not available, the first network element can send a first message to the terminal device, wherein the first message can include first indication information, and the first indication information can be used to indicate that the first key does not exist or is not available. Then, the first network element receives second information from the terminal device, or if the first key is obtained, sends the first key to the terminal device, wherein the second information is used to request the first key.
- the first key does not exist or is unavailable, including: the first network element does not store the first key, for example, the local or remote distributed database does not store the first key; or if the first network element does not store the first key locally, a second message is sent to a second network element, wherein the second message is used to request the first key, and then the first network element receives a third message from the second network element, the third message may include fourth indication information, and the fourth indication information may be used to indicate that the first key does not exist or is unavailable.
- the first network element if the first network element does not store the first key locally (or does not exist or is not configured or is unavailable), the first network element requests the first key from the second network element, and further determines whether it is necessary to send an indication information to the terminal device to indicate that the first key does not exist or is unavailable based on the third message from the second network element, so that the terminal device can accurately know the request status of the first key.
- the first network element obtains the first key, including: the first network element receives a fifth message from the second network element, and the fifth message may include the first key.
- the second network element After the second network element obtains the first key, it will send the first key to the first network element in a timely manner.
- the first message may also include second indication information, which may be used to indicate a first time or a timer or a timer, and the first time or a timer or a timer may be used to indicate a next request time for the first key, or to indicate a sending time for the next request information for the first key, or to indicate a start time for the next request information for the first key.
- second indication information may be used to indicate a first time or a timer or a timer, and the first time or a timer or a timer may be used to indicate a next request time for the first key, or to indicate a sending time for the next request information for the first key, or to indicate a start time for the next request information for the first key.
- the first message may also include third indication information, and the third indication information may be used to instruct the terminal device to wait for the first network element to send the first key.
- the present application provides a communication method, which can be implemented by data interaction between multiple communication devices (such as a second communication device, a third communication device, etc.).
- the second communication device may be a first network element or a component (such as a chip, a chip system or a circuit, etc.) that can support the first network element to implement the functions required by the method
- the third communication device may be a second network element or a component (such as a chip, a chip system or a circuit, etc.) that can support the second network element to implement the functions required by the method.
- the second network element may send a third message to the first network element, the second message is used to request the first key, and the third message may include fourth indication information, and the fourth indication information may be used to indicate that the first key does not exist or is not available.
- the method also includes: the second network element may send a fifth message to the first network element, and the fifth message may include the first key.
- the present application provides a communication method, which can be implemented by data interaction between multiple communication devices (such as a first communication device, a second communication device, etc.).
- the first communication device can be a first terminal device or a component (such as a chip, a chip system or a circuit, etc.) that can support the first terminal device to implement the functions required by the method
- the second communication device can be a first network element or a component (such as a chip, a chip system or a circuit, etc.) that can support the first network element to implement the functions required by the method.
- the first network element can send a sixth message to the first terminal device, and the sixth message can be used to update NAS parameters or to notify the first terminal device that the key has been updated, and the sixth message may include the second key; or if the first terminal device is in a connection management idle state, the first network element can send a paging message to the first terminal device, and the paging message is used to page the first terminal device; thereafter, if the first network element receives a seventh message from the first terminal device, it can send an eighth message to the first terminal device, and the seventh message can be used to activate a user plane session, and the eighth message may include the second key.
- the user associated with the first terminal device is a user who has signed a contract for a first service
- the first service may include a high-precision positioning service
- the second key is a new key for encrypting auxiliary data corresponding to the high-precision positioning service.
- the high-precision positioning service in the present application can also be replaced by the following descriptions: RTK service, outdoor satellite positioning service, outdoor positioning service, differential service, etc., and the present application does not limit this.
- the first terminal device associated user can be understood as the user of the first terminal device; or can be understood as the user holding the first terminal device; or can be understood as the user owning the first terminal device; or can be understood as the first terminal itself referring to the first user, that is, the first users can be replaced with each other, and this application is not limited.
- auxiliary data corresponding to the encrypted high-precision positioning service can be understood as the auxiliary data of the encrypted high-precision positioning service; and the new key can be understood as the updated key.
- the first network element after obtaining the latest key (such as the second key), the first network element promptly pushes the second key to the terminal device associated with the user who has signed up for the first service (such as a high-precision positioning service).
- the first service such as a high-precision positioning service.
- the sixth message, the seventh message, or the eighth message is a non-access stratum NAS message.
- the sixth message is a configuration update message (configuration update); the seventh message is a service request message (service request); and the eighth message is a service acceptance message (service accept).
- the present application provides a communication method, which can be implemented by data interaction between multiple communication devices (such as a first communication device, a second communication device, etc.).
- the first communication device may be a first terminal device or a component (such as a chip, a chip system or a circuit, etc.) that can support the first terminal device to implement the functions required for the method
- the second communication device may be a first network element or a component (such as a chip, a chip system or a circuit, etc.) that can support the first network element to implement the functions required for the method.
- the sixth message, the seventh message, or the eighth message is a non-access stratum NAS message.
- the sixth message is a configuration update message; the seventh message is a service request message; and the eighth message is a service reception message.
- the present application provides a possible communication device.
- the communication device may be a communication device (such as a first communication device or a second communication device or a third communication device) or a component (such as a chip, a chip system or a circuit, etc.) that can support the communication device to implement the functions required for the communication method.
- the first communication device may be a terminal device or a first terminal device (such as a UE)
- the second communication device may be a first network element (such as an AMF network element or an MME)
- the third communication device may be a second network element (such as an LMF network element or an E-SMLC).
- the communication device When the communication device is a chip arranged in the first communication device (or the second communication device or the third communication device), the communication device includes a transceiver and a processor, but does not include a memory.
- the transceiver exists as an input and output interface, and the input and output interface is used for the chip to implement the transceiver of the communication device.
- the input and output interface may include an input interface and/or an output interface, the input interface can implement the reception of the communication device, and the output interface can be used to implement the sending of the communication device.
- the processor is used to read and execute corresponding computer programs or instructions so that the corresponding functions of the first communication device (or the second communication device or the third communication device) are implemented.
- the input and output interface can implement the sending and receiving operations performed by the first communication device (or the second communication device or the third communication device) in the communication method embodiment provided by the present application; the processor can implement other operations other than the sending and receiving operations performed by the first communication device (or the second communication device or the third communication device) in the above-mentioned communication method embodiment provided by the present application.
- the beneficial effects can be referred to the description of the terminal device in the first aspect or the second aspect, which will not be repeated here.
- the communication device has the function of implementing the behavior of the terminal device in the method embodiment shown in the first aspect or the second aspect.
- the function can be implemented by hardware, or it can be implemented by hardware executing corresponding software.
- the hardware or software includes one or more modules corresponding to the above functions.
- the communication device includes: a communication module (or a communication unit, a transceiver module or a transceiver unit, used to send and receive data) and a processing module (or a processing unit).
- the communication module is used to send a first message to a first network element.
- the first information is used to request a first key, and the first key is used to encrypt auxiliary data.
- the communication module is also used to receive a first message from the first network element.
- the first message includes a first indication information, and the first indication information is used to indicate that the first key does not exist or is not available.
- the processing module is used to send a second message to the first network element if the first time or timer or timer expires, or wait for the first network element to send the first key.
- the second information is used to request the first key.
- the communication device when the communication device is used to implement the method embodiment shown in the first aspect, the second aspect, or the third aspect, the beneficial effects can refer to the description of the first network element in the first aspect, the second aspect or the third aspect, which will not be repeated here.
- the communication device has the function of realizing the behavior of the first network element in the method embodiment shown in the first aspect, the second aspect or the third aspect.
- the function can be realized by hardware, or by hardware executing corresponding software.
- the hardware or software includes one or more modules corresponding to the above functions.
- the communication device includes: a communication module and a processing module. The communication module is used to receive first information from a terminal device.
- the first information is used to request a first key, and the first key is used to encrypt auxiliary data.
- the processing module is used to send a first message to the terminal device if the first key does not exist or is not available.
- the first message includes first indication information, and the first indication information is used to indicate that the first key does not exist or is not available.
- the communication module is also used to receive second information from the terminal device, or if the first key is obtained, send the first key to the terminal device.
- the second information is used to request the first key.
- the beneficial effects can refer to the description of the second network element in the second aspect or the third aspect, which will not be repeated here.
- the communication device has the function of implementing the behavior of the second network element in the method embodiment shown in the second aspect or the third aspect.
- the function can be implemented by hardware, or it can be implemented by hardware executing corresponding software.
- the hardware or software includes one or more modules corresponding to the above functions.
- the communication device includes: a communication module and a processing module. The communication module is used to receive a second message from the first network element. The second message is used to request a first key.
- the processing module is used to send a third message to the first network element if the first key does not exist or is not available locally.
- the third message includes fourth indication information, and the fourth indication information is used to indicate that the first key does not exist or is not available.
- the beneficial effects can be referred to the description of the first network element in the fourth aspect or the fifth aspect, which will not be repeated here.
- the communication device has the function of implementing the behavior of the first network element in the method embodiment shown in the fourth aspect or the fifth aspect.
- the function can be implemented by hardware, or it can be implemented by hardware executing corresponding software.
- the hardware or software includes one or more modules corresponding to the above functions.
- the communication device includes: a communication module and a processing module. The communication module is used for the first terminal device to be in a connection management connection state, and send a sixth message to the first terminal device.
- the sixth message is used to update NAS parameters or to notify the first terminal device that the key has been updated; the sixth message includes a second key; the user associated with the first terminal device is a user who has signed a first service, and the first service includes a high-precision positioning service; the second key is a new key for encrypting auxiliary data corresponding to the high-precision positioning service.
- the communication module is also used to send a paging message to the first terminal device if the first terminal device is in a connection management idle state. The paging message is used to page the first terminal device.
- the communication module is also used to receive a seventh message from the first terminal device. Among them, the seventh message is used to activate the user plane session.
- the communication module is also used to send an eighth message to the first terminal device.
- the eighth message includes a second key.
- the processing module is used to save (or store) the second key.
- the processing module is also used to determine the contracted user to whom the second key needs to be pushed.
- the beneficial effect can refer to the description of the first terminal device in the fourth aspect or the fifth aspect, which will not be repeated here.
- the communication device has the function of implementing the behavior of the first terminal device in the method embodiment shown in the fourth aspect or the fifth aspect.
- the function can be implemented by hardware, or it can be implemented by hardware executing corresponding software.
- the hardware or software includes one or more modules corresponding to the above functions.
- the communication device includes a communication module. The communication module is used to receive a sixth message from the first network element if the first terminal device is in a connection management connection state.
- the sixth message is used to update NAS parameters or to notify the first terminal device that the key has been updated; the sixth message includes a second key; the user associated with the first terminal device is a user who has signed a first service, and the first service includes a high-precision positioning service; the second key is a new key for encrypting auxiliary data corresponding to the high-precision positioning service.
- the communication module is also used to receive a paging message from the first network element if the first terminal device is in a connection management idle state. The paging message is used to page the first terminal device.
- the communication module is also used to send a seventh message to the first network element.
- the seventh message is used to activate the user plane session.
- the communication module is further used to receive an eighth message from the first network element.
- the eighth message includes the second key.
- These modules can execute the corresponding functions of the first terminal device in the method embodiment shown in the fourth aspect or the fifth aspect above. For details, please refer to the detailed description of the corresponding functions of the first terminal device in the method example, which will not be repeated here.
- the beneficial effects can be referred to the description of the second network element in the fourth aspect or the fifth aspect, which will not be repeated here.
- the function can be implemented by hardware, or it can be implemented by hardware executing corresponding software.
- the hardware or software includes one or more modules corresponding to the above functions.
- the communication device includes a communication module.
- the communication module is used to send a broadcast key data notification message to the first network element. Among them, the broadcast key data notification message includes a second key.
- These modules can execute the corresponding functions of the second network element in the method embodiment shown in the fourth aspect or the fifth aspect above. Please refer to the detailed description of the corresponding functions of the second network element in the method example, which will not be repeated here.
- the present application provides a possible communication device, which may be a communication device (such as a first communication device or a second communication device or a third communication device) required for executing the communication method provided in the present application, or may be a device including a communication device required for executing the communication method provided in the present application, or may be a device having the functions required to implement the communication method.
- the communication device may include a transceiver and a processor.
- the communication device may also include a memory.
- the memory is used to store computer programs or instructions
- the processor is coupled to the memory and the transceiver.
- the communication device executes any possible design method of the first aspect above, any possible design method of the second aspect above, any possible design method of the third aspect above, any possible design method of the fourth aspect above, or any possible design method of the fifth aspect above.
- the present application provides a possible communication system, which may include the first communication device, the second communication device, and the third communication device mentioned in the first aspect, the second aspect, the third aspect, the fourth aspect, or the fifth aspect.
- the relevant functional implementation of the first communication device, the second communication device, or the third communication device can refer to the relevant description mentioned in the first aspect, the second aspect, the third aspect, the fourth aspect, or the fifth aspect, which will not be repeated here.
- the communication system may include one or more first communication devices, one or more second communication devices, and one or more third communication devices.
- the present application provides a computer program product, which includes a computer program or instructions.
- the computer program or instructions When the computer program or instructions are run on a computer, the computer executes any possible method in the design of the first aspect or any possible method in the design of the second aspect or any possible method in the design of the third aspect or any possible method in the design of the fourth aspect or any possible method in the design of the fifth aspect.
- the present application provides a computer-readable storage medium, which stores a computer program or instruction.
- the computer program or instruction executes any possible design method of the first aspect or any possible design method of the second aspect or any possible design method of the third aspect or any possible design method of the fourth aspect or any possible design method of the fifth aspect.
- the present application provides a chip, which may include a processor and a memory (or the chip is coupled to the memory), and the chip executes program instructions in the memory to execute the method in any possible design of the first aspect or the method in any possible design of the second aspect or the method in any possible design of the third aspect or the method in any possible design of the fourth aspect or the method in any possible design of the fifth aspect.
- a chip which may include a processor and a memory (or the chip is coupled to the memory), and the chip executes program instructions in the memory to execute the method in any possible design of the first aspect or the method in any possible design of the second aspect or the method in any possible design of the third aspect or the method in any possible design of the fourth aspect or the method in any possible design of the fifth aspect.
- coupling refers to the direct or indirect combination of two components with each other, such as coupling can refer to an electrical connection between two components.
- the present application further provides a chip system, which includes a processor for supporting a computer device to implement any possible method in the design of the first aspect or any possible method in the design of the second aspect or any possible method in the design of the third aspect or any possible method in the design of the fourth aspect or any possible method in the design of the fifth aspect.
- the chip system also includes a memory, which is used to store the necessary programs and data of the computer device.
- the chip system can be composed of chips, or it can include chips and other discrete devices.
- FIG. 1a exemplarily shows a possible communication system architecture diagram provided by an embodiment of the present application
- FIG. 1b exemplarily shows another possible communication system architecture diagram provided in an embodiment of the present application
- FIG2 exemplarily shows a schematic diagram of another possible communication system architecture provided in an embodiment of the present application.
- FIG3 exemplarily shows a flow chart of a communication method provided in Embodiment 1 of the present application
- FIG4 exemplarily shows a flow chart of another communication method provided in Embodiment 1 of the present application.
- FIG5 exemplarily shows a flow chart of another communication method provided in Embodiment 1 of the present application.
- FIG6 exemplarily shows a flow chart of a communication method provided in Embodiment 2 of the present application.
- FIG7 exemplarily shows a flow chart of another communication method provided in Embodiment 2 of the present application.
- FIG8 exemplarily shows a flow chart of another communication method provided in Embodiment 2 of the present application.
- FIG9 exemplarily shows a schematic structural diagram of a possible communication device provided in an embodiment of the present application.
- FIG10 exemplarily shows a schematic structural diagram of another possible communication device provided in an embodiment of the present application.
- FIG. 1a exemplarily shows a possible communication system architecture diagram applicable to the embodiment of the present application.
- the communication system architecture shown in FIG. 1a is the fifth-generation (5th-generation, 5G) communication system architecture formulated by the third generation partnership project (3GPP) standard, and the communication system architecture includes terminal equipment, access network (such as (R)AN), core network (CN) and data network (DN).
- the terminal equipment can be connected to the access network equipment (such as (R)AN equipment) in a wireless manner
- the access network equipment can be connected to the core network in a wireless or wired manner.
- the core network equipment and the wireless access network equipment can be independent and different physical devices, or the functions of the core network equipment and the logical functions of the wireless access network equipment can be integrated on the same physical device, or the functions of some core network equipment and some wireless access network equipment can be integrated on one physical device.
- Terminal equipment and terminal equipment and access network equipment and access network equipment can be connected to each other in a wired or wireless manner.
- the communication system architecture may also include other network devices (such as wireless relay devices or wireless backhaul devices, etc.).
- Terminal equipment It is an entity on the user side that has the function of sending and receiving signals, and can provide users with service functions such as video, voice, and data connectivity.
- the terminal equipment is the entrance for mobile users to interact with the network, and can provide basic computing and storage capabilities, display service windows to users, and receive user operation input.
- the next generation of terminal equipment (NextGen UE) can use new air interface technology to establish signal connections and data connections with (R)AN equipment, thereby transmitting control signals and service data to the mobile network.
- the terminal device may also be referred to as a terminal, user equipment (UE), access terminal equipment, vehicle-mounted terminal, industrial control terminal, UE unit, UE station, mobile station, mobile station (MS), mobile terminal (MT), remote station, remote terminal equipment, mobile device, UE terminal equipment, terminal equipment, wireless communication equipment, UE agent or UE device, etc.
- the terminal device may be fixed or mobile, and the implementation of the present application does not limit this.
- the terminal device may be deployed on land, including indoors or outdoors, handheld, wearable or vehicle-mounted, or may be deployed on the water (such as a ship, etc.), or may be deployed in the air (such as an airplane, a balloon or a satellite, etc.).
- the terminal device may be a mobile phone, a tablet computer, a subscriber unit, a cellular phone, a smart phone, a wireless data card, a personal digital assistant (PDA), a computer, a wireless modem, a handheld device (handset), a laptop computer, a computer with wireless transceiver function, a virtual reality (VR) terminal device, an augmented reality (AR) terminal device, Wireless terminals in industrial control, vehicle-mounted terminal equipment, wireless terminals in self-driving, wireless terminals in remote medical, wireless terminals in smart grid, wireless terminals in transportation safety, wireless terminals in smart city, wireless terminals in smart home, wearable terminal equipment, vehicles, drones, helicopters, airplanes, factory machines/equipment, machine type communication (MTC) terminals, ships or robots, etc.
- the embodiments of the present application do not limit the specific technology and specific device form adopted by the terminal equipment.
- (R)AN equipment is a device that connects terminal devices to wireless networks.
- (R)AN equipment can provide network access functions for authorized users in a specific area, and can determine transmission tunnels of different qualities to transmit user data based on user levels, business requirements, etc.
- (R)AN equipment can manage its own resources, use them reasonably, provide access services to terminal devices on demand, and is responsible for forwarding control signals and user data between terminal devices and the core network.
- (R)AN equipment may include, but is not limited to: a next generation base station (next generation NodeB, gNB) in a fifth generation (5G) communication system, a next generation base station in a sixth generation (6G) communication system, a base station in a future communication system, a transmission reception point (TRP), an evolved Node B (eNB), a radio network controller (RNC), a Node B (NB), a base station controller (base station controller, BSC), base transceiver station (BTS), home base station (e.g., home evolved Node B, or home Node B, HNB), base band unit (BBU), or wireless fidelity (Wi-Fi) access point (AP), etc.
- a next generation base station (next generation NodeB, gNB) in a fifth generation (5G) communication system
- 5G fifth generation
- 6G sixth generation
- TRP transmission reception point
- eNB evolved Node B
- RNC radio network controller
- NB Node B
- BSC base
- the (R)AN device may also include a centralized unit (CU) or a distributed unit (DU).
- This structure can split the protocol layers of the network device, with the functions of some protocol layers being centrally controlled by the CU, and the functions of the remaining part or all of the protocol layers being distributed in the DU, which is centrally controlled by the CU.
- the functions of the packet data convergence protocol (PDCP) layer and above can be set in the CU, and the functions of the protocol layers below the PDCP (such as the RLC layer and the medium access control (MAC) layer, etc.) are set in the DU.
- PDCP packet data convergence protocol
- MAC medium access control
- the radio frequency device can be remote and not placed in the DU, or it can be integrated in the DU, or part of it can be remote and part of it can be integrated in the DU, and the embodiments of the present application do not impose any restrictions.
- the control plane (CP) and user plane (UP) of the CU can be separated and implemented by different entities, namely, the control plane CU entity (CU-CP entity) and the user plane CU entity (CU-UP entity).
- the base station can communicate with the terminal device, or communicate with the terminal device through a relay station.
- the terminal device can communicate with multiple base stations in different access technologies.
- the (R)AN device may be a macro base station, a micro base station or an indoor station, a relay node or a donor node, etc.
- the embodiment of the present application does not limit the specific technology and specific device form used by the wireless access network device.
- Data network A data network that provides business services to users.
- the client is located in the terminal device and the server is located in the data network.
- the data network can be a private network, such as a local area network, or an external network that is not controlled by the operator, such as the Internet. It can also be a proprietary network jointly deployed by operators, such as a network that provides IP multimedia core network subsystem (IMS) services.
- IMS IP multimedia core network subsystem
- Core network responsible for maintaining the subscription data of the mobile network, managing the network elements of the mobile network, and providing functions such as session management, mobility management, policy management, and security authentication for terminal devices.
- the terminal device When the terminal device is attached, it provides network access authentication for the terminal device; when the terminal device has a service request, it allocates network resources for the terminal device; when the terminal device moves, it updates network resources for the terminal device; when the terminal device is idle, it provides a fast recovery mechanism for the terminal device; when the terminal device is detached, it releases network resources for the terminal device; when the terminal device has service data, it provides data routing functions for the terminal device, such as forwarding uplink data to the data network; or receiving downlink data of the terminal device from the data network and forwarding it to the (R)AN device, so that the (R)AN device sends it to the terminal device.
- the network elements of the core network can be divided into two parts: user plane network elements and control plane network elements.
- the user plane network elements are responsible for the transmission of service data.
- the user plane network elements can include but are not limited to user plane function (UPF) network elements.
- the control plane network elements are responsible for the management of the mobile network.
- the control plane may include but is not limited to access and mobility management function (AMF) network elements, session management function (SMF) network elements, unified data management (UDM) network elements, policy control function (PCF) network elements, application function (AF) network elements, authentication server function (AUSF) network elements, and network slice selection function (NSSF) network elements.
- AMF access and mobility management function
- SMF session management function
- UDM unified data management
- PCF policy control function
- AF application function
- AUSF authentication server function
- NSSF network slice selection function
- the core network can also include other network elements (such as network exposure function (NEF) network elements, network storage function (NRF) network elements, unified data repository (UDR) network elements, network slice-specific authentication and authorization function (NSSAAF) network elements, etc.), which are not listed here one by one.
- network exposure function NEF
- NRF network storage function
- UDR unified data repository
- NSSAAF network slice-specific authentication and authorization function
- the core network control plane adopts a service-oriented architecture, and the interaction between control plane network elements adopts the service call method to replace the point-to-point communication method in the traditional architecture.
- the control plane network elements will open services to other control plane network elements for other control plane network elements to call; in point-to-point communication, the communication interface between control plane network elements will store a set of specific messages, which can only be used by the control plane network elements at both ends of the interface when communicating.
- SMF network element mainly used for session management, IP address allocation and management of terminal devices, selection of endpoints for manageable user equipment plane functions, policy control, or charging function interfaces, and downlink data notification, etc. For example, it can complete the establishment, release, and update processes related to protocol data unit (PDU) sessions.
- session management network elements can be SMF network elements.
- session management function network elements can still be SMF network elements, or have other names, which are not limited in this application.
- Nsmf is a service-based interface provided by SMF network elements. SMF network elements can communicate with other network functions through Nsmf.
- AMF network element Mainly used for mobility management and access management, etc.
- NAS non-access stratum
- MM mobility management
- SM session management
- N2 access network devices
- MME mobility management entity
- the access management network element can still be the AMF network element, or have other names, which is not limited in this application.
- Namf is a service-based interface provided by the AMF network element.
- the AMF network element can communicate with other network functions through Namf.
- UDM network element used to process user identification, contract signing, access authentication, registration, or mobility management.
- the data management network element may be a UDM network element.
- the data management network element may still be a UDM network element, or may have other names, which are not limited in this application.
- Nudm is a service-based interface provided by the UDM network element, and the UDM network element can communicate with other network functions through Nudm.
- PCF network element a unified policy framework for guiding network behavior, providing policy rule information (such as mobility-related policies or PDU session-related policies (such as quality of service (QoS) policies, billing policies, etc.)) to control plane functional network elements (such as AMF, SMF, etc.).
- policy rule information such as mobility-related policies or PDU session-related policies (such as quality of service (QoS) policies, billing policies, etc.)
- control plane functional network elements such as AMF, SMF, etc.
- the policy control network element may be a PCF network element.
- the policy control network element may still be a PCF network element, or may have other names, which are not limited in this application.
- Npcf is a service-based interface provided by the PCF network element, and the PCF network element can communicate with other network functions through Npcf.
- AF network element used for data routing affected by applications, access to network open functions, or interacting with the policy framework for policy control, etc.
- an application network element may be an AF network element.
- an application network element may still be an AF network element, or have other names, which are not limited in this application.
- Naf is a service-based interface provided by AF, and an AF network element can communicate with other network functions through Naf.
- UPF network element used for packet routing and forwarding, or QoS processing of user plane data, etc.
- the user plane network element may be a UPF network element.
- the user plane network element may still be a UPF network element, or have other names, which are not limited in this application.
- AUSF network element mainly used for user authentication, etc.
- the authentication service network element can be the AUSF network element.
- the authentication service network element can still be the AUSF network element, or have other names, which are not limited in this application.
- Nausf is a service-based interface provided by the AUSF network element.
- the AUSF network element can communicate with other network functions through Nausf.
- NSSF network element used to select a network slice for a terminal device.
- the network slice selection function network element may be a NSSF network element.
- the network slice selection function network element may still be a NSSF network element, or may have other names, which is not limited in this application.
- NEF network element used to securely open services and capabilities provided by 3GPP network functions to the outside.
- a network open network element may be a NEF network element.
- a network open function network element may still be a NEF network element, or have other names, which are not limited in this application.
- Nnef is a service-based interface provided by the NEF network element, and the NEF network element can communicate with other network functions through Nnef.
- NRF network element used to provide service registration, discovery and authorization, and maintain available network function (NF) instance information, which can realize on-demand configuration of network functions and services and interconnection between NFs.
- the network storage network element can be an NRF network element.
- the network storage function network element can still be an NRF network element, or have other names, which is not limited in this application.
- Nnrf is a service-based interface provided by the NRF network element. The NRF network element can communicate with other network functions through Nnrf.
- NSSAAF network element It is mainly responsible for the authentication and authorization of network slices and can interact with the authentication, authorization, and accounting server (AAA-S) through the authentication, authorization, and accounting proxy (AAA-P).
- UDR network element used by UDM network elements to store subscription data or read subscription data and PCF network elements to store policy data or read policy data.
- the above network element or function can be a network element in a hardware device, a software function running on dedicated hardware, or a virtualized function instantiated on a platform (e.g., a cloud platform).
- a platform e.g., a cloud platform
- the above network element or function can be implemented by one device, or by multiple devices, or a functional module in one device, which is not specifically limited in the embodiments of the present application.
- the terminal device can access the 5G communication system through access network devices such as (R)AN devices.
- the terminal device can communicate with the AMF network element through the next generation network (Next generation, NG) 1 interface (referred to as N1), the access network device communicates with the AMF network element through the N2 interface (referred to as N2), the access network device communicates with the UPF network element through the N3 interface (referred to as N3), the AMF network element communicates with the SMF network element through the N11 interface (referred to as N11), and the AMF network element communicates with the SMF network element through the N8 interface (referred to as N8).
- N1 next generation network
- N2 Next generation network
- N3 Next generation interface
- N3 the access network device
- the access network device communicates with the UPF network element through the N3 interface (referred to as N3)
- the AMF network element communicates with the SMF network element through the N11 interface (referred to as N11)
- the AMF network element communicates with the SMF network element through the N
- AMF network elements communicate with AUSF network elements through N12 interface (N12 for short), AMF network elements communicate with PCF network elements through N15 interface (N15 for short), SMF network elements communicate with PCF network elements through N7 interface (N7 for short), SMF network elements communicate with UPF network elements through N4 interface (N4 for short), NEF network elements communicate with SMF network elements through N29 interface (N29 for short), and UPF network elements access the data network (DN) through N6 interface (N6 for short).
- N12 N12 interface
- AMF network elements communicate with PCF network elements through N15 interface (N15 for short)
- SMF network elements communicate with PCF network elements through N7 interface (N7 for short)
- SMF network elements communicate with UPF network elements through N4 interface (N4 for short)
- NEF network elements communicate with SMF network elements through N29 interface (N29 for short)
- UPF network elements access the data network (DN) through N6 interface (N6 for short).
- FIG1b is a schematic diagram of another possible communication system architecture provided by the current technical specification (e.g., a schematic diagram of a network architecture for supporting positioning).
- This network architecture is an expansion of the communication system architecture shown in FIG1a.
- multiple functional entities such as a gateway mobile location center (GMLC) network element, a location retrieval function (LRF) network element, a location service (LCS) client, and a location management function (LMF) network element are added to support positioning service functions.
- GMLC gateway mobile location center
- LRF location retrieval function
- LCS location service
- LMF location management function
- GMLC network element responsible for processing positioning requests for positioning services and selecting appropriate AMF network elements for positioning services.
- LRF network element It can be configured with the GMLC network element or independently, and is responsible for retrieving or verifying the location information of the terminal device and providing routing and related information for the terminal device that has initiated the IMS emergency session.
- LCS client Location service client
- (4)LMF network element Mainly responsible for managing positioning requests, allocating positioning resources, and determining the location of terminal devices during positioning services.
- NL1 is the interface between the AMF network element and the LMF network element.
- NL7 is the interface between the LMF network element and the LMF network element.
- N52 is the interface between the UDM network element and the NEF network element.
- NL2 is the interface between the AMF network element and the GMLC network element.
- NL5 is the interface between the NEF network element and the GMLC network element.
- N33 is the interface between the NEF network element and the AF network element.
- N51 is the interface between the AMF network element and the NEF network element.
- NL6 is the interface between the UDM network element and the GMLC network element.
- One Le is the interface between the LCS client and the GMLC network element; one Le is the interface between the LCS client and the LRF network element.
- FIG. 2 is a schematic diagram of another possible communication system architecture (such as the positioning architecture of the 4G communication system) provided in an embodiment of the present application.
- the E-SMLC is similar to the role of the LMF network element
- the MME is similar to the role of the AMF network element.
- the MME can be connected to the access network device (such as the Evolved Universal Terrestrial Radio Access Network (Evolved Universal Terrestrial Radio Access Network, E-UTRAN)) through the S1 application protocol (S1 application protocol, S1-AP) interface.
- the LMF network element and the E-SMLC can be referred to as location management network elements.
- LTE-Uu is the interface between UE and E-UTRAN
- SLs is the interface between E-SMLC and MME
- SLg is the interface between MME and GMLC network element
- SLm is the interface between location measurement unit (LMU) and E-SMLC.
- Figure 3 exemplarily shows a flow chart of a communication method provided in Example 1 of the present application.
- the method is applicable to the communication system architecture illustrated in Figure 1a or Figure 1b or Figure 2.
- the method flow can be implemented by data interaction between multiple communication devices (such as a first communication device, a second communication device and a third communication device).
- the first communication device can be a terminal device or a component (such as a chip, a chip system or a circuit, etc.) that can support the terminal device to implement the functions required by the method
- the second communication device can be a first network element or a component (such as a chip, a chip system or a circuit, etc.) that can support the first network element to implement the functions required by the method
- the third communication device can be a second network element or a component (such as a chip, a chip system or a circuit, etc.) that can support the second network element to implement the functions required by the method.
- the terminal device when the communication method illustrated in Figure 3 is applicable to the communication system architecture illustrated in Figure 1a or Figure 1b, the terminal device can be the UE illustrated in Figure 1a or Figure 1b, the first network element can be the AMF network element illustrated in Figure 1a or Figure 1b, and the second network element can be the AMF network element illustrated in Figure 1a or Figure 1b. 1b.
- the terminal device When the communication method illustrated in FIG. 3 is applicable to the communication system architecture illustrated in FIG. 2, the terminal device may be the UE illustrated in FIG. 2, the first network element may be the MME illustrated in FIG. 2, and the second network element may be the E-SMLC illustrated in FIG. 2.
- the following takes the first communication device as the terminal device, the second communication device as the first network element, and the third communication device as the second network element as an example to introduce the process of implementing the communication method by data interaction between the first communication device, the second communication device, and the third communication device.
- the method includes:
- Step 301 A terminal device sends first information to a first network element, and the first network element receives the first information.
- the first information is used to request the first key, and the first key is used to encrypt the assistance data.
- the first key requested by the terminal device may be one or more.
- the first key can also be used to decrypt (or parse) the encrypted assistance data.
- the first key can be an RTK key or a key of GNSS assistance data (GNSS assistance data) sent through posSIB or a key of assistance data.
- the assistance data may refer to data used to assist the terminal device in achieving precise positioning, such as positioning assistance data.
- the positioning assistance data may be RTK positioning assistance data.
- the first information may be carried in a registration request message (Registration Request) message or other messages.
- the first information may be carried in a tracking area update request (Tracing Area Update Request, TAU Request) message or other messages.
- the first information may pass through one or more access network devices (such as base stations) during the process of being sent by the terminal device to the first network element.
- the access network device may be a next-generation base station (such as gNB) in a 5G communication system
- the access network device may be a base station (such as eNB) in a 4G communication system.
- Method 1 If the auxiliary data is converted from (or received from) a user plane (e.g., a PDU session) of the terminal device to a control plane, the terminal device may send the first information to the first network element.
- the control plane reception may include receiving a system information block (SIB) sent by the access network device.
- SIB system information block
- the auxiliary data is converted from being received through a user plane of the terminal device to being received through a control plane.
- the terminal device receives (or obtains) a system message block (or may be referred to as a system information block) sent by the access network device and determines (or senses) that the auxiliary data (or the first key) is converted from being received by the user plane of the terminal device to being received by the control plane. For example, the terminal device discovers (or determines) that the auxiliary data is converted from being received by the user plane of the terminal device to being received by the SIB sent by the access network device (such as the positioning SIB of the air interface).
- a system message block or may be referred to as a system information block
- Scenario 2 The terminal device does not receive (or does not obtain) the system message block sent by the access network device to determine that the auxiliary data is converted from being received through the control plane to being received through the user plane of the terminal device.
- Method 2 If the terminal device determines that the first key is invalid (for example, the first key is not available in the area where the terminal device is located or the available time of the first key is lower than the preset threshold T3512 or the usage period of the first key exceeds the validity period, etc.), the terminal device sends the first information to the first network element.
- the terminal device determines that the first key is invalid (for example, the first key is not available in the area where the terminal device is located or the available time of the first key is lower than the preset threshold T3512 or the usage period of the first key exceeds the validity period, etc.).
- Step 302 The first network element does not have the first key locally, and sends a second message to the second network element.
- the second network element receives the second message.
- the first network element may send a first request message (such as a second message) to the second network element.
- a first request message such as a second message
- the first request message may carry (or include or contain) an identifier or name or type of the first key.
- the first network element can send a NAS message to the terminal device.
- the NAS message can carry the first key requested by the terminal device.
- the NAS message can be a Registration Accept (or Registration Accept) message.
- Step 303 The second network element does not have the first key locally, and sends a third message to the first network element.
- the first network element receives the third message.
- the third message may be a response message of the second message.
- the second network element may send a third message to the first network element.
- the third message may be a response message to the second message.
- the third message may include fourth indication information, and the fourth indication information is used to indicate that the first key does not exist (or is not configured or is not available or is not stored).
- the second network element may send a response message to the first network element.
- the response message may carry the first key.
- the second network element determines that the first key requested by the terminal device does not exist locally, but after a period of time, ...
- the second network element obtains the first key requested by the terminal device, and at this time the second network element may send a fifth message to the first network element.
- the fifth message may carry the first key.
- steps 302 to 303 are optional steps, that is, they do not need to be performed in some application scenarios, but need to be performed in some application scenarios.
- Step 304 The first network element sends a first message to the terminal device.
- the terminal device receives the first message.
- the first network element can send the first message to the terminal device.
- this implementation can timely notify the terminal device that the network side (such as the first network element or the second network element) does not have the first key temporarily, thereby avoiding the terminal device from blindly attempting to initiate a request to obtain the first key, which helps to reduce the energy consumption of the terminal device (such as resource consumption, power consumption, or signaling overhead, etc.).
- the first message may include first indication information, and the first indication information is used to indicate that the first key does not exist (or is not configured or is not available or is not stored).
- the first indication information may be a reason value/cause (cause) used to indicate that the first key does not exist (or is not configured or is not available or is not stored), such as a reason value of 1 is used to indicate that the first key exists, and a reason value of 0 is used to indicate that the first key does not exist; or, a reason value of 0 is used to indicate that the first key exists, and a reason value of 1 is used to indicate that the first key does not exist; or, carrying a reason value indicates that the first key does not exist, and not carrying a reason value indicates that the first key exists.
- the reason/cause value may be a Boolean type or an enumeration type or a character type or an integer type, which is not limited in the embodiments of the present application.
- the first message may also include second indication information, and the second indication information is used to indicate a first time or a timer or a timer.
- the first time or a timer (Timer) or a timer (Timer) is used to indicate the next request time of the first key, or to indicate the sending time of the next request information of the first key, or to indicate the start time of the next request information of the first key, or to indicate the start time of the next request information of the first key.
- the timer or timer can also be used to indicate the first duration, in which case the first time may refer to the sum of the time when the terminal device sends the first information and the first duration.
- the first duration is the time interval between two adjacent requests for the first key by the terminal device.
- the first time may refer to the sum of the time when the terminal device sends the first information and the second time length set by the terminal device.
- the first message may further include third indication information, and the third indication information is used to indicate that the terminal device is waiting for the first network element to send the first key.
- the first network element may mark the user associated with the terminal device as waiting for the first key to be sent. Afterwards, after obtaining the first key sent by the second network element, the first network element may promptly send the first key to the terminal device, thereby avoiding the terminal device from blindly attempting to initiate a request to obtain the first key, which helps to reduce the energy consumption of the terminal device.
- the first network element may send the first key to the terminal device.
- the first key may be carried in an information or may also be carried in a message.
- the first network element may send a response message to the terminal device.
- the response message may carry the first key.
- Step 305 When the first time or the timer or the timer expires, the terminal device sends the second information to the first network element, or waits for the first network element to send the first key. Optionally, the first network element receives the second information.
- the second information may be used to request the first key again, or to initiate a request to obtain the first key again.
- the first time may refer to the sum of the time when the terminal device sends the first information and the second time period set by the terminal device.
- the terminal device may send the second information to the first network element when the first time expires.
- the terminal device may send the second information to the first network element at the first time or when the timer or timer expires.
- the first time may refer to the sum of the time when the terminal device sends the first information and the first duration.
- the terminal device may temporarily not send information for requesting the first key to the first network element, but wait for the first network element to send the first key. In this way, the implementation can avoid the terminal device from blindly attempting to initiate a request to obtain the first key, which helps to reduce the energy consumption of the terminal device.
- the network side (such as the first network element or the second network element) does not have the first key, and sends an indication message indicating that the first key does not exist or is unavailable to the terminal device.
- the device can promptly notify the terminal device when the network side temporarily does not have the first key requested by the terminal device, which helps to avoid the terminal device from blindly and frequently trying to initiate a request for the first key, and can reduce the energy consumption caused by the terminal device blindly and frequently trying to request the first key. It can also help the terminal device effectively obtain the key for parsing encrypted auxiliary data.
- the terminal device is UE
- the (R) AN device is gNB (or can be called NG-(R) AN device)
- the first key is RTK key
- the first network element is AMF network element
- the second network element is LMF network element
- the auxiliary data is RTK positioning auxiliary data
- the terminal device is UE
- the (R) AN device is eNB (or can be called eNodeB)
- the first key is RTK key
- the first network element is MME
- the second network element is E-SMLC
- the auxiliary data is RTK positioning auxiliary data.
- the action performed by a network element can also be replaced by the action performed by the functional component in the network element.
- the functional component may, for example, include at least one of a chip, a chip system, a processor, and a processing unit.
- FIG4 is a flow chart of another communication method provided in Embodiment 1 of the present application.
- the communication method shown in FIG4 is applicable to a 5G communication system architecture (or can be understood as a 5G core network (Core) architecture).
- the specific flow of the method may include:
- Step 401 The UE sends a registration request message to the AMF network element.
- the AMF network element receives the registration request message.
- the registration request message may be a NAS message.
- the registration request message may carry information or indication information requesting an RTK key (such as an indication requesting a Cipher Key) for requesting an RTK key (Cipher Key).
- the registration request message may also carry an identifier, name, or type of the RTK key requested by the UE.
- the RTK key requested by the UE may be one or more.
- the registration request message may pass through one or more gNBs during the process of being sent from the UE to the AMF network element.
- the UE may first send the registration request message to the gNB in its area, and the gNB may send the registration request message to the AMF network element.
- Method 1 The UE receives RTK positioning assistance data (or RTK key) through the user plane of the UE (e.g., PDU session) at the beginning.
- the UE needs to convert the RTK positioning assistance data received by the user plane of the UE to the RTK positioning assistance data received by the control plane (e.g., the UE discovers/determines that the RTK positioning assistance data is converted from being received through the user plane of the UE to being received through the positioning SIB message of the air interface)
- the UE sends a registration request message to the AMF network element.
- the registration request message may carry an indication of requesting an RTK key (Cipher Key), or may also carry an identifier, name, or type of the RTK key.
- Method 2 When the UE determines that the RTK key is invalid (for example, it is not available in the area where the UE is located or the RTK key availability time is lower than the preset threshold T3512 or the RTK key usage period exceeds the validity period, etc.), the UE sends a registration request message to the AMF network element.
- Step 402 If the RTK key requested by the UE is not stored locally, the AMF network element sends a first request message to the LMF network element. The LMF network element receives the first request message.
- the AMF network element may send a Registration Accept message (or Registration Accept) to the UE.
- the Registration Accept message may carry the RTK key requested by the UE.
- the Registration Accept message may be a NAS message.
- the first request message is used to request an RTK key.
- the first request message may carry an identifier or name of the RTK key requested by the UE.
- Step 403 The LMF network element sends a request response message to the AMF network element.
- the AMF network element receives the request response message.
- the LMF network element may carry indication information (such as data availability (DataAvailability)) in the request response message.
- the indication information may be used to indicate whether the LMF network element locally stores the RTK key requested by the UE, or may be used to indicate whether the LMF network element is locally configured with the RTK key requested by the UE, or may be used to indicate whether the LMF network element locally can obtain the RTK key requested by the UE.
- DataAvailability may be a cause value used to indicate the presence or absence of an RTK key, such as a cause value of 1 used to indicate that the RTK key exists, and a cause value of 0 used to indicate that the RTK key does not exist.
- the indication information is used to indicate that the RTK key requested by the UE is not available (or used to indicate that the RTK key requested by the UE has not been queried).
- the indication information DataAvailability "CIPHERING_KEY_DATA_AVAILABLE" can be carried in the request response message, and the indication information is used to indicate that the RTK key requested by the UE is available (or used to indicate that the RTK key requested by the UE can be queried), and the request response message is also It can carry the RTK key requested by the UE.
- Step 404 The AMF network element sends a registration reception message to the UE.
- the UE receives the registration reception message.
- the AMF network element may also carry the first information in the registration reception message.
- the first information may be information indicating a timer, where the timer is used to indicate the time when the UE attempts to request the RTK key next time, or the first information may indicate the time when the UE attempts to request the RTK key next time.
- the first information may indicate a first duration, where the first duration is the time interval between two consecutive acquisitions of the RTK key by the UE.
- the first information may indicate that the UE is waiting for the AMF network element to send the RTK key.
- the AMF network element may mark that the UE-associated user is waiting for the RTK key to be sent, and after obtaining the RTK key sent by the LMF network element, the AMF network element may send the RTK key to the UE.
- the registration reception message may pass through one or more gNBs during the process of being sent from the AMF network element to the UE.
- the AMF network element may first send the registration reception message to the gNB, and the gNB may send the registration reception message to the UE.
- Step 405 If the indication information included in the registration reception message indicates that the RTK key is not available, the UE sends a second request message to the AMF network element or waits for the AMF network element to send the RTK key.
- the second request message may carry information or indication information for requesting the RTK key again (such as an indication for requesting the Cipher Key again) for requesting the RTK key again.
- the second request message may also carry an identifier or name of the RTK key requested by the UE.
- the second request message may be a new registration request message, or may be a message for requesting the RTK key again.
- the second request message may pass through one or more gNBs during the process of being sent by the UE to the AMF network element.
- the UE may first send the second request message to the gNB in its area, and the gNB may send the second request message to the AMF network element.
- Method 1 When the indication information included (or carried) in the registration reception message indicates that the RTK key is not available and the first information included in the registration reception message indicates the time when the UE will attempt to request the RTK key next time, the UE can send a second request message to the AMF network element when the time for the next attempt to request the RTK key arrives.
- Method 2 When the indication information included in the registration reception message indicates that the RTK key is not available and the first information included in the registration reception message indicates a first duration, the UE can send a second request message to the AMF network element after the first duration has passed since the last time the RTK key was requested.
- Method 3 When the indication information included in the registration reception message indicates that the RTK key is not available, the UE can send a second request message to the AMF network element after the second duration set by the UE has passed since the last time the RTK key was requested.
- the UE may not send a second request message to the AMF network element, but wait for the AMF network element to send the RTK key.
- the network side (such as the LMF network element or the AMF network element) does not have the RTK key temporarily, and selectively generates indication information (such as indication information or second information for indicating that the RTK key requested by the UE is not available) and carries it in the registration reception message and sends it to the UE.
- indication information such as indication information or second information for indicating that the RTK key requested by the UE is not available
- the method can timely notify the UE when the network side temporarily does not have the RTK key requested by the UE, which helps to reduce the energy consumption caused by the UE blindly trying to request the RTK key, thereby effectively avoiding the problem that the UE generates certain energy consumption losses (such as signaling overhead or power loss or communication resource consumption, etc.) due to the UE blindly trying to request the RTK key.
- energy consumption losses such as signaling overhead or power loss or communication resource consumption, etc.
- FIG5 is a flow chart of another communication method provided in Embodiment 1 of the present application.
- the communication method shown in FIG5 is applicable to a 4G communication system architecture (or can be understood as a 4G core network (Evolved Packet Core, EPC) or an Evolved Packet System (Evolved Packet System, EPS)).
- EPC Evolved Packet Core
- EPS Evolved Packet System
- Step 501 UE sends a tracking area update request message to MME.
- MME receives the tracking area update request message.
- the tracking area update request message may pass through one or more eNodeBs during the process of being sent from the UE to the MME. For example, taking one eNodeB as an example, the UE may first send the tracking area update request message to the eNodeB in its area, and the eNodeB The tracking area update request message is sent to the MME.
- the implementation method of the UE sending the tracking area update request message to the MME in step 501 can refer to the implementation method of the UE sending the registration request message to the AMF network element in the above step 401, which will not be repeated here.
- Step 502 If the RTK key requested by the UE is not stored locally, the MME sends a third request message to the E-SMLC. The E-SMLC receives the third request message.
- the MME may send a Tracking Area Update Accept (or Tracking Area Update Accept) (TAU Accept) message to the UE.
- TAU Accept Tracking Area Update Accept
- the Tracking Area Update Accept message may carry the RTK key requested by the UE.
- the third request message is used to request the RTK key.
- the third request message may carry an identifier or name of the RTK key requested by the UE.
- the third request message may be an interface message.
- Step 503 The E-SMLC sends a request response message to the MME.
- the MME receives the request response message.
- the E-SMLC may carry indication information in the request response message.
- the indication information may be used to indicate whether the E-SMLC locally stores the RTK key requested by the UE, or may be used to indicate whether the E-SMLC locally is configured with the RTK key requested by the UE, or may be used to indicate whether the E-SMLC locally can obtain the RTK key requested by the UE.
- the indication information may be an indication of DataAvailability, or may be information used to indicate the presence or absence of the RTK key, for example, it may be a cause/cause value, such as a cause/cause value of 1 is used to indicate that the RTK key exists, and a cause/cause value of 0 is used to indicate that the RTK key does not exist.
- a cause/cause value of 0 indicates that the RTK key does not exist, and a cause/cause value of 1 is used to indicate that the RTK key exists.
- a cause/cause value carries an indication that the key does not exist, and a cause/cause value does not carry an indication that the key exists.
- the E-SMLC may carry indication information in the request response message, where the indication information is used to indicate that the RTK key requested by the UE is available (or used to indicate that the RTK key requested by the UE can be queried), and the request response message may also carry the RTK key requested by the UE.
- the E-SMLC may carry indication information in the request response message, where the indication information is used to indicate that the RTK key requested by the UE is not available (or used to indicate that the RTK key requested by the UE is not queried).
- Step 504 The MME sends a tracking area update reception message to the UE.
- the UE receives the tracking area update reception message.
- the MME can obtain the RTK key requested by the UE from the request response message and can carry the RTK key requested by the UE in the tracking area update reception message.
- the MME may carry the indication information for indicating that the RTK key requested by the UE is not available in the tracking area update reception message.
- the MME may also carry the second information in the tracking area update reception message.
- the second information may be information indicating a timer, the timer being used to indicate the time when the UE attempts to request the RTK key next time, or the second information may indicate the time when the UE attempts to request the RTK key next time.
- the second information may indicate a first duration, the first duration being the time interval between two consecutive acquisitions of the RTK key by the UE.
- the second information may indicate that the UE is waiting for the MME to send the RTK key.
- the MME may mark the UE-associated user as waiting for the RTK key to be sent, and after obtaining the RTK key sent by the E-SMLC, the MME may send the RTK key to the UE.
- Step 505 If the indication information included in the tracking area update reception message indicates that the RTK key is unavailable, the UE sends a fourth request message to the MME or waits for the MME to send the RTK key.
- the fourth request message may carry information or indication information for requesting the RTK key again (such as an indication for requesting the Cipher Key again) for requesting the RTK key again.
- the fourth request message may also carry an identifier or name of the RTK key requested by the UE.
- the fourth request message may be a new tracking area update request message, or may be a message for requesting the RTK key again.
- the fourth request message may pass through one or more eNodeBs during the process of being sent from the UE to the MME. For example, taking one eNodeB as an example, the UE may first send the fourth request message to the eNodeB in its area, and the eNodeB may send the second request message to the MME.
- the implementation method of the UE sending the fourth request message to the MME in step 505 can refer to the implementation method of the UE sending the second request message to the AMF network element in the above step 405, which will not be repeated here.
- the UE may not send the fourth request message to the MME, but wait for the MME to send the RTK key.
- the network side (such as E-SMLC or MME) does not have the RTK key temporarily, and selectively generates indication information (such as indication information or second information for indicating that the RTK key requested by the UE is not available) and carries it in the tracking area update reception message and sends it to the UE.
- indication information such as indication information or second information for indicating that the RTK key requested by the UE is not available
- the method can timely notify the UE when the network side temporarily does not have the RTK key requested by the UE, which helps to reduce the energy consumption caused by the UE blindly trying to request the RTK key, thereby effectively avoiding the problem that the UE generates certain energy consumption losses (such as signaling overhead or power loss or communication resource consumption, etc.) due to the UE blindly trying to request the RTK key.
- energy consumption losses such as signaling overhead or power loss or communication resource consumption, etc.
- FIG6 exemplarily shows a flow chart of a communication method provided in Embodiment 2 of the present application.
- the method is applicable to the communication system architecture illustrated in FIG2.
- the method flow may be implemented by data interaction between multiple communication devices (such as a first communication device, a second communication device, and a third communication device).
- the first communication device may be a first terminal device or a component (such as a chip, a chip system, or a circuit, etc.) that can support the first terminal device to implement the functions required by the method
- the second communication device may be a first network element or a component (such as a chip, a chip system, or a circuit, etc.) that can support the first network element to implement the functions required by the method
- the third communication device may be a second network element or a component (such as a chip, a chip system, or a circuit, etc.) that can support the second network element to implement the functions required by the method.
- the terminal device when the communication method illustrated in FIG6 is applicable to the communication system architecture illustrated in FIG1a or FIG1b, the terminal device may be the UE illustrated in FIG1a or FIG1b, the first network element may be the AMF network element illustrated in FIG1a or FIG1b, and the second network element may be the LMF network element illustrated in FIG1a or FIG1b.
- the terminal device When the communication method illustrated in FIG6 is applicable to the communication system architecture illustrated in FIG2, the terminal device may be the UE illustrated in FIG2, the first network element may be the MME illustrated in FIG2, and the second network element may be the E-SMLC illustrated in FIG2.
- the following takes the first communication device as the terminal device, the second communication device as the first network element, and the third communication device as the second network element as an example to introduce the process of implementing the communication method by data interaction between the first communication device, the second communication device, and the third communication device.
- the method includes:
- Step 601 A first network element obtains a second key from a second network element and stores the second key.
- the first network element may obtain the second key from the second network element, and save (or store) the obtained second key.
- the second key may be a new key for encrypting the auxiliary data corresponding to the high-precision positioning service included in the first service. It should be understood that the second key may also be used to decrypt (or parse) the encrypted auxiliary data.
- the second key may be a new/updated RTK key.
- the second network element may be the LMF network element illustrated in FIG1a or FIG1b.
- the second network element may be the E-SMLC illustrated in FIG2.
- the second network element may send the latest key (such as the second key) used to encrypt the auxiliary data corresponding to the high-precision positioning service to the first network element through a broadcast key data notification (Nlmf_Broadcast_CipheringKeyDataNotify) message.
- Nlmf_Broadcast_CipheringKeyDataNotify broadcast key data notification
- the first network element can determine which users need to push/send the second key according to whether the users have signed up for the first service. The first network element will push the second key only to users who have signed up for the first service. Afterwards, the first network element can select a corresponding push method to push the second key according to the connection management state of the terminal device used by the contracted user (such as the connection management connected state or the connection management idle state). For example, the second key pushed by the first network element can be one or more.
- the first network element when the terminal device (such as the first terminal device) used by the subscriber is in the connection management connected state, the first network element performs the following step 602. In another example, when the terminal device (such as the first terminal device) used by the subscriber is in the connection management idle state, the first network element performs the following steps 603 and 605.
- Step 602 If the first terminal device is in the connection management connection state, the first network element sends a sixth message to the first terminal device. The first terminal device receives the sixth message.
- the sixth message may be used to update NAS parameters or may be used to notify the first terminal device that the key has been updated.
- the sixth message may carry the second key.
- the sixth message may be a NAS message.
- the NAS message may be a configuration update message.
- the configuration update message may be a configuration update command message or a configuration update complete message.
- the sixth message may also be a NAS message.
- the NAS message may be a message such as updating a terminal device parameter configuration.
- Step 603 If the first terminal device is in the connection management idle state, the first network element sends a paging message to the first terminal device. The end device receives the paging message.
- the paging message is used to page the first terminal device to trigger the service request process, which helps to page the first terminal device from the connection management idle state back to the connection management connected state, so that the second key can be pushed to the first terminal device in a timely manner.
- Step 604 The first terminal device sends a seventh message to the first network element according to the paging message.
- the first terminal device receives the seventh message.
- the seventh message may be used to activate a user plane session (such as a PDU session).
- the seventh message may be a NAS message, such as a service request message.
- the first terminal device After receiving the paging message, the first terminal device can start the service request process according to the paging message, for example, it can send the seventh message to the first network element to activate the corresponding PDU session.
- Step 605 The first network element sends an eighth message to the first terminal device.
- the first terminal device receives the eighth message.
- the eighth message may carry the second key.
- the eighth message may be a response message to the seventh message.
- the first terminal device may receive a corresponding service message (such as a NAS message) from the first network element through the user plane connection. Accordingly, after the user plane session of the first terminal device is activated, the first network element may send the second key to the first terminal device by sending a corresponding service response message (such as the eighth message) to the first terminal device.
- a NAS message may be a service reception message (or may be referred to as a service acceptance message).
- the first network element promptly pushes the second key to the terminal device associated with the user who has signed up for the first service (such as the high-precision positioning service).
- the first service such as the high-precision positioning service
- the terminal device is a UE
- the (R) AN device is a gNB (or may be referred to as an NG-(R) AN device)
- the first key is an RTK key
- the first network element is an AMF network element
- the second network element is an LMF network element
- the auxiliary data is RTK positioning auxiliary data
- the terminal device is a UE
- the (R) AN device is an eNB (or may be referred to as an eNodeB)
- the first key is an RTK key
- the first network element is an MME
- the second network element is an E-SMLC
- the auxiliary data is RTK positioning auxiliary data.
- the action performed by a network element can also be replaced by the action performed by the functional component in the network element.
- the functional component may, for example, include at least one of a chip, a chip system, a processor, and a processing unit.
- FIG7 is a flow chart of another communication method provided in Embodiment 2 of the present application.
- the communication method shown in FIG7 is applicable to a 5G communication system architecture. As shown in FIG7 , the specific flow of the method may include:
- Step 701 The LMF network element sends a broadcast key data notification message to the AMF network element.
- the AMF network element receives the broadcast key data notification message.
- the broadcast key data notification message may include the latest RTK key corresponding to the RTK positioning assistance data (or may be understood as the updated RTK key).
- the RTK key may be understood as the key of the assistance data or the key of the GNSS assistance data.
- the AMF network element After receiving the broadcast key data notification message, the AMF network element obtains the latest RTK key from the broadcast key data notification message and stores (or saves) the latest RTK key.
- Step 702 The AMF network element determines the target UE to which the latest RTK key needs to be pushed.
- the target UE-associated user to which the latest RTK key needs to be pushed is the user who has signed up for the high-precision positioning service (hereinafter referred to as the "signed user").
- the AMF network element can determine which users have signed up for high-precision positioning services based on the bitmap of the location service (LCS)-broadcast assistance (BCA). After that, the AMF network element can promptly and accurately push the latest RTK key to the UEs corresponding to these users, so that the UEs corresponding to these users can promptly use the latest RTK key to successfully parse (or successfully decrypt) the encrypted RTK positioning assistance data broadcast by the base station, thereby effectively improving the UE positioning accuracy and effectively avoiding the problem that the encrypted RTK positioning assistance data cannot be successfully parsed due to the expiration of the RTK key of the UE corresponding to the contracted user, thereby causing inaccurate UE positioning accuracy.
- LCS location service
- BCA bitmap of the location service
- Step 703 When it is determined that the target UE is in the connection management connection state, the AMF network element sends a NAS message to the target UE. The target UE receives the NAS message.
- the NAS message may be a configuration update message.
- the configuration update message may be a configuration update command message or a configuration update complete message.
- the NAS message may carry the latest RTK key.
- the AMF network element may send a NAS message to the first user.
- the NAS message carries the latest RTK key.
- the number of first users may be one or more, which is not limited in the embodiments of the present application.
- the NAS message may pass through one or more gNBs during the process of being sent by the AMF network element to the target UE.
- the AMF network element may first send the NAS message to the gNB, and the gNB may send the NAS message to the target UE.
- Step 704 When it is determined that the target UE is in the connection management idle state, the AMF network element sends a paging message to the target UE. The target UE receives the paging message.
- the paging message is used to page the target UE, so as to page the target UE back from the CM idle state to the CM_connected state, thereby enabling the latest RTK key to be pushed to the target UE in a timely manner.
- the AMF network element needs to first send a paging message to the UE corresponding to the second user. After receiving the paging message, the UE corresponding to the second user initiates a service request process.
- the number of second users can be one or more, and the embodiments of the present application do not limit this.
- the paging message may pass through one or more gNBs during the process of being sent by the AMF network element to the target UE.
- the AMF network element may first send the paging message to the gNB, and the gNB may send the paging message to the target UE.
- Step 705 The target UE sends a service request message to the AMF network element according to the paging message.
- the AMF network element receives the service request message.
- the target UE can initiate a service request process according to the paging message.
- the target UE can send a service request message to the AMF network element.
- the service request message can be a NAS message.
- the service request message may pass through one or more gNBs during the process of being sent from the target UE to the AMF network element.
- the target UE may first send the service request message to the gNB in its area, and the gNB may send the service request message to the AMF network element.
- Step 706 The AMF network element sends a service reception message to the target UE.
- the target UE receives the service reception message.
- the service receive (or may be referred to as service accept) message may be a NAS message.
- the AMF network element can push the latest RTK key to the target UE through the service reception message.
- the service reception message may pass through one or more gNBs during the process of being sent by the AMF network element to the target UE.
- the AMF network element may first send the service reception message to the gNB, and the gNB may send the service reception message to the target UE.
- the LMF network element after the LMF network element generates the latest RTK key (or updates the RTK key), it can push the latest RTK key (or updated RTK key) to the AMF network element. After that, the AMF network element can promptly push the latest RTK key (or updated RTK key) to the corresponding target UE (i.e., the UE used by the contracted user).
- the method can enable the network side to promptly notify the corresponding target UE after generating the latest RTK key (or updating the RTK key), so that the target UE can use the latest RTK key (or updated RTK key) to successfully parse the encrypted RTK positioning assistance data, thereby effectively improving the positioning accuracy of the UE, and effectively avoiding the problem that the target UE cannot parse the encrypted RTK positioning assistance data due to the expiration of the RTK key, resulting in inaccurate UE positioning accuracy.
- FIG8 is a flow chart of another communication method provided in Embodiment 2 of the present application.
- the communication method shown in FIG8 is applicable to a 4G communication system architecture. As shown in FIG8 , the specific flow of the method may include:
- Step 801 E-SMLC sends a broadcast key data notification message to MME.
- MME receives the broadcast key data notification message.
- step 801 may refer to the implementation of step 701 described above, which will not be repeated here.
- Step 802 The MME determines the target UE to which the latest RTK key needs to be pushed.
- step 802 may refer to the implementation of step 702 described above, which will not be repeated here.
- Step 803 When the target UE is in the connection management connected state, the MME sends a NAS message to the target UE. The target UE receives the NAS message.
- step 803 may refer to the implementation of step 703 described above, which will not be repeated here.
- the NAS message may be a message (such as a configuration message) for updating UE parameter configuration in step 803.
- the configuration message may be a configuration update command message (or a configuration update complete message).
- Step 804 When the target UE is in the connection management idle state, the MME sends a paging message to the target UE. The target UE receives the paging message.
- step 804 may refer to the implementation of step 704 described above, which will not be described in detail here.
- Step 805 The target UE sends a service request message to the MME according to the paging message.
- the MME receives the service request message.
- step 805 may refer to the implementation of step 705 described above, which will not be repeated here.
- Step 806 The MME sends a service receiving message to the target UE.
- the target UE receives the service receiving message.
- step 806 may refer to the implementation of step 706 described above, which will not be described in detail here.
- the E-SMLC after the E-SMLC generates the latest RTK key (or updates the RTK key), it can push the latest RTK key (or the updated RTK key) to the MME. After that, the MME can promptly push the latest RTK key (or the updated RTK key) to the corresponding target UE (i.e., the UE used by the contracted user).
- the method can realize that after the network side generates the latest RTK key (or updates the RTK key), it can promptly notify the corresponding target UE, so that the target UE can use the latest RTK key (or the updated RTK key) to successfully parse the encrypted RTK positioning assistance data, thereby effectively improving the positioning accuracy of the UE, and effectively avoiding the problem that the target UE cannot parse the encrypted RTK positioning assistance data due to the expiration of the RTK key, resulting in inaccurate UE positioning accuracy.
- At least one refers to one or more, and “multiple” refers to two or more.
- And/or describes the association relationship of the associated objects, indicating that there may be three relationships, for example, A and/or B, which can represent: the situation where A exists alone, A and B exist at the same time, and B exists alone, wherein A and B can be singular or plural.
- the character “/” generally indicates that the associated objects before and after are an “or” relationship.
- At least one of the following (individuals) or its similar expression refers to any combination of these items, including any combination of single items (individuals) or plural items (individuals).
- A, B and C includes A, B, C, AB, AC, BC or ABC.
- ordinal numbers such as “first”, “second”, and “third” mentioned in the embodiments of the present application are used to distinguish multiple objects, and are not used to limit the order, timing, priority or importance of multiple objects.
- the terms “including”, “comprising”, “having” and their variations appearing in the present application all mean “including but not limited to”, unless otherwise specifically emphasized in other ways.
- each step involved in the above embodiments can be performed by a corresponding device, or by a chip, processor, or chip system in the device, and the embodiments of the present application do not limit them.
- the above embodiments are only described by taking the corresponding device as an example.
- the various devices involved in the above embodiments include hardware structures and/or software modules corresponding to the execution of the various functions. It should be easily appreciated by those skilled in the art that, in combination with the units and method steps of the various examples described in the embodiments disclosed in this application, the present application can be implemented in the form of hardware or a combination of hardware and computer software. Whether a function is executed in the form of hardware or computer software driving hardware depends on the specific application scenario and design constraints of the technical solution.
- steps in the embodiments of the present application are only for illustration, and are a method of expression used to better understand the embodiments, and do not constitute a substantial limitation on the execution of the scheme of the present application.
- the steps can also be understood as “features”.
- the steps do not constitute any limitation on the execution order of the scheme of the present application. Any changes in the order of steps, step merging, or step splitting made on this basis that do not affect the implementation of the overall scheme, and the resulting new technical solutions are also within the scope of the disclosure of the present application.
- the embodiment of the present application also provides a possible communication device, which is applicable to the communication system architecture shown in Figure 1a or Figure 1b or Figure 2.
- the communication device can be a communication device (such as a terminal device (such as a first terminal device or other terminal device), a first network element or a second network element) or a device that can support the communication device to implement the functions required by the communication method.
- the communication device when the communication device is a terminal device (or a first terminal device) (such as a UE), the communication device is used to implement the technical solutions involved in the terminal device (or the first terminal device) in the above embodiment, or the module (such as a chip) of the communication device is used to implement the technical solutions involved in the terminal device (or the first terminal device) in the above embodiment, so the beneficial effects possessed by the terminal device (or the first terminal device) in the above embodiment can also be achieved.
- the communication device when the communication device is a chip set in the terminal device (or the first terminal device), the communication device includes a transceiver and a processor, but does not include a memory.
- the transceiver exists as an input and output interface, and the input and output interface is used for the chip to implement the transceiver of the communication device (or the first terminal device).
- the input/output interface may include an input interface and/or an output interface.
- the input interface may implement the reception of the terminal device (or the first terminal device), and the output interface may be used to implement the transmission of the terminal device (or the first terminal device).
- the processor is used to read and execute the corresponding computer program or instruction so that the corresponding function of the terminal device (or the first terminal device) is implemented.
- the input/output interface The port can implement the transceiver operation performed by the terminal device (or the first terminal device) in the above embodiment; the processor can implement other operations except the transceiver operation performed by the terminal device (or the first terminal device) in the above embodiment.
- the processor can implement other operations except the transceiver operation performed by the terminal device (or the first terminal device) in the above embodiment.
- the communication device when the communication device is a first network element (such as an AMF network element or an MME), the communication device is used to implement the technical solution involved in the first network element in the above embodiment, or the module (such as a chip) of the communication device is used to implement the technical solution involved in the first network element in the above embodiment, so the beneficial effects of the first network element in the above embodiment can also be achieved.
- the communication device when the communication device is a chip set in the first network element, the communication device includes a transceiver and a processor, but does not include a memory. Among them, the transceiver exists as an input and output interface, and the input and output interface is used for the chip to implement the transceiver of the communication device.
- the input and output interface may include an input interface and/or an output interface, the input interface can implement the reception of the first network element, and the output interface can be used to implement the transmission of the first network element.
- the processor is used to read and execute the corresponding computer program or instruction so that the corresponding function of the first network element is implemented.
- the input and output interface can implement the transceiver operation performed by the first network element in the above embodiment; the processor can implement other operations except the transceiver operation performed by the first network element in the above embodiment.
- the communication device when the communication device is a second network element (such as an LMF network element or an E-SMLC), the communication device is used to implement the technical solution involved in the second network element in the above embodiment, or the module (such as a chip) of the communication device is used to implement the technical solution involved in the second network element in the above embodiment, so the beneficial effects of the second network element in the above embodiment can also be achieved.
- the communication device when the communication device is a chip set in the second network element, the communication device includes a transceiver and a processor, but does not include a memory. Among them, the transceiver exists as an input and output interface, and the input and output interface is used for the chip to implement the transceiver of the communication device.
- the input and output interface may include an input interface and/or an output interface, the input interface can implement the reception of the second network element, and the output interface can be used to implement the transmission of the second network element.
- the processor is used to read and execute the corresponding computer program or instruction so that the corresponding function of the second network element is implemented.
- the input and output interface can implement the transceiver operation performed by the second network element in the above embodiment; the processor can implement other operations except the transceiver operation performed by the second network element in the above embodiment.
- the second network element in the above embodiment which will not be described in detail here.
- the communication device 900 includes a communication module 901 (or may be referred to as a transceiver module, for sending and receiving data) and a processing module 902.
- the communication device 900 is used to implement the functions of the first communication device (such as a terminal device) or the second communication device (such as a first network element) or the third communication device (such as a second network element) in the method embodiments shown in the above-mentioned FIGS. 3 to 8.
- the communication module 901 may include a receiving module and/or a sending module.
- the receiving module may be used for the communication device 900 to receive signals (information or data, etc.); the sending module may be used for the communication device 900 to send signals (information or data, etc.).
- the sending module may send signals (information or data, etc.) under the control of the processing module 902, and the receiving module may receive signals (information or data, etc.) under the control of the processing module 902.
- the communication module 901 is used to send a first message to the first network element.
- the first information is used to request a first key, and the first key is used to encrypt auxiliary data.
- the communication module 901 is also used to receive a first message from the first network element.
- the first message includes first indication information, and the first indication information is used to indicate that the first key does not exist or is not available.
- the processing module 902 is used to send a second message to the first network element, or wait for the first network element to send a first key if the first time or timer or timer expires.
- the second information is used to request the first key.
- the communication module 901 is used to receive the first information from the terminal device.
- the first information is used to request the first key, and the first key is used to encrypt auxiliary data.
- the processing module 902 is used to send a first message to the terminal device if the first key does not exist or is not available.
- the first message includes first indication information, and the first indication information is used to indicate that the first key does not exist or is not available.
- the communication module 901 is also used to receive the second information from the terminal device, or if the first key is obtained, send the first key to the terminal device.
- the second information is used to request the first key.
- the communication module 901 is used to receive a second message from the first network element.
- the second message is used to request the first key.
- the processing module 902 is used to send a third message to the first network element if the first key does not exist or is not available locally.
- the third message includes fourth indication information, and the fourth indication information is used to indicate that the first key does not exist or is not available.
- the communication module 901 is used for the first terminal device to be in the connection management connection state, and send the sixth message to the first terminal device.
- the sixth message is used to update the NAS parameters or to notify the first terminal device that the key has been updated;
- the sixth message includes the second key;
- the first terminal device is associated with the user who signed the first
- the user of the service, the first service includes a high-precision positioning service;
- the second key is a new key for encrypting the auxiliary data corresponding to the high-precision positioning service.
- the communication module 901 is also used to send a paging message to the first terminal device if the first terminal device is in a connection management idle state.
- the paging message is used to page the first terminal device.
- the communication module 901 is also used to receive the seventh message from the first terminal device.
- the seventh message is used to activate the user plane session.
- the communication module 901 is also used to send an eighth message to the first terminal device.
- the eighth message includes the second key.
- the processing module 902 is used to save (or store) the second key.
- the processing module 902 is also used to determine the signed user to whom the second key needs to be pushed.
- the communication module 901 is used to receive the sixth message from the first network element if the first terminal device is in the connection management connection state.
- the sixth message is used to update the NAS parameters or to notify the first terminal device that the key has been updated;
- the sixth message includes the second key;
- the user associated with the first terminal device is a user who has signed a contract for the first service, and the first service includes a high-precision positioning service;
- the second key is a new key for encrypting the auxiliary data corresponding to the high-precision positioning service.
- the communication module 901 is also used to receive a paging message from the first network element if the first terminal device is in the connection management idle state. The paging message is used to page the first terminal device.
- the communication module 901 is also used to send a seventh message to the first network element. The seventh message is used to activate the user plane session.
- the communication module 901 is also used to receive an eighth message from the first network element. The eighth message includes the second key.
- the communication module 901 is used to send a broadcast key data notification message to the first network element, wherein the broadcast key data notification message includes the second key.
- the communication device 900 when the communication device 900 is used to implement the function of the first communication device or the second communication device or the third communication device in the method embodiments shown in Figures 3 to 8, for a more detailed description of the communication module 901 and the processing module 902, refer to the relevant description of the first communication device or the second communication device or the third communication device in the method embodiments shown in Figures 3 to 8 above, and will not be repeated here.
- the communication module 901 in the embodiment of the present application can be implemented by a transceiver or a transceiver-related circuit component
- the processing module 902 can be implemented by a processor or a processor-related circuit component.
- each functional unit in each embodiment of the present application may be integrated into a processing unit, or may exist physically separately, or two or more units may be integrated into one unit.
- the above-mentioned integrated unit may be implemented in the form of hardware or in the form of software functional units.
- the integrated unit is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a computer-readable storage medium.
- the computer software product is stored in a storage medium, including several instructions for a computer device (which can be a personal computer, or a server, etc.) or a processor (processor) to perform all or part of the steps of the various embodiments of the present application.
- the aforementioned storage medium includes: U disk, mobile hard disk, read-only memory (ROM), random access memory (RAM), disk or optical disk and other media that can store program codes.
- the embodiment of the present application also provides a possible communication device, which is applicable to the communication system architecture shown in Figure 1a or Figure 1b or Figure 2.
- the communication device may be a device (such as a first communication device or a second communication device or a third communication device) required for executing the communication method provided in the embodiment of the present application, or may be a device including a device required for executing the communication method provided in the embodiment of the present application.
- the communication device may also be arranged in a chip in the first communication device (or the second communication device or the third communication device).
- the communication device When the communication device is a chip arranged in the first communication device (or the second communication device or the third communication device), the communication device includes a transceiver and a processor, but does not include a memory.
- the transceiver exists as an input and output interface, and the input and output interface is used for the chip to realize the transceiver of the communication device.
- the input and output interface may include an input interface and/or an output interface, and the input interface can realize the reception of the communication device, and the output interface can be used to realize the sending of the communication device.
- the processor is used to read and execute corresponding computer programs or instructions so that the corresponding functions of the first communication device (or the second communication device or the third communication device) are realized.
- the input and output interface can implement the transceiver operation performed by the first communication device (or the second communication device or the third communication device) in the above embodiment; the processor can implement other operations except the transceiver operation performed by the first communication device (or the second communication device or the third communication device) in the above embodiment.
- the communication device is a first communication device (such as a terminal device or a first terminal device) or a second communication device (such as a first network element) or a third communication device (such as a second network element).
- the beneficial effects possessed by the first communication device in the above method embodiment can also be achieved.
- the technical solution involved in the second communication device in the embodiment can also achieve the beneficial effects of the second communication device in the above method embodiment.
- the beneficial effects of the third communication device in the above method embodiment can also be achieved.
- the communication device 1000 includes: a transceiver 1001 and a processor 1002.
- the communication device 1000 further includes a memory 1003.
- the transceiver 1001, the processor 1002 and the memory 1003 are interconnected.
- the transceiver 1001 can be used to implement the function of the above communication module 901 when executing the technical solution involved in the first communication device
- the processor 1002 is used to implement the function of the above processing module 902 when executing the technical solution involved in the first communication device.
- the transceiver 1001 can be used to implement the function of the above communication module 901 when executing the technical solution involved in the second communication device, and the processor 1002 is used to implement the function of the above processing module 902 when executing the technical solution involved in the second communication device.
- the transceiver 1001 can be used to implement the function of the above communication module 901 when executing the technical solution involved in the third communication device, and the processor 1002 is used to implement the function of the above processing module 902 when executing the technical solution involved in the third communication device.
- the transceiver 1001, the processor 1002 and the memory 1003 are interconnected via a bus 1004.
- the bus 1004 may be a peripheral component interconnect (PCI) bus or an extended industry standard architecture (EISA) bus.
- PCI peripheral component interconnect
- EISA extended industry standard architecture
- the bus may be divided into an address bus, a data bus, a control bus, etc.
- FIG10 is represented by only one thick line, but it does not mean that there is only one bus or one type of bus.
- the transceiver 1001 is used to receive and send data.
- the transceiver 1001 implements communication with the RAN device as shown in FIG. 1a, FIG. 1b or FIG. 2, or can also implement communication with other devices (such as vehicle-mounted devices or servers) outside the communication system architecture shown in FIG. 1a, FIG. 1b or FIG. 2.
- the transceiver can be a transceiver device with integrated data transceiver function.
- the transceiver can also be composed of a transmitter and a receiver, wherein the transmitter is used to send data and the receiver is used to receive data.
- the transceiver 1001 may include a transmitter and/or a receiver.
- the transmitter is used to send signals, messages, information, or data, etc.
- the receiver is used to receive signals, messages, information, or data, etc.
- the transmitter sends signals, messages, information, or data, etc. under the control of the processor 1002.
- the receiver receives signals, messages, information, or data, etc. under the control of the processor 1002.
- the functions of the processor 1002 can refer to the description of the corresponding functions involved in the first communication device or the second communication device or the third communication device in the above embodiments, and will not be repeated here.
- the processor 1002 can be a central processing unit (CPU), a network processor (NP) or a combination of CPU and NP, etc.
- the processor 1002 can further include a hardware chip.
- the above-mentioned hardware chip can be an application-specific integrated circuit (ASIC), a programmable logic device (PLD) or a combination thereof.
- the above-mentioned PLD can be a complex programmable logic device (CPLD), a field-programmable gate array (FPGA), a generic array logic (GAL) or any combination thereof.
- CPLD complex programmable logic device
- FPGA field-programmable gate array
- GAL generic array logic
- the memory 1003 is used to store program instructions, etc.
- the program instructions may include program codes, and the program codes include computer operation instructions.
- the memory 1003 may include random access memory (RAM), and may also include non-volatile memory (non-volatile memory), such as at least one disk memory.
- the processor 1002 executes the program instructions stored in the memory 1003 to implement the above functions, thereby implementing the method steps required to be executed by the first communication device, the second communication device, or the third communication device in the above embodiments.
- the embodiment of the present application also provides a possible communication system, which includes a first communication device (such as a terminal device or a first terminal device), a second communication device (such as a first network element) and a third communication device (such as a second network element).
- a first communication device such as a terminal device or a first terminal device
- a second communication device such as a first network element
- a third communication device such as a second network element.
- the first communication device can be used to implement the technical solution involved in the first communication device in the above embodiment
- the second communication device can be used to implement the technical solution involved in the second communication device in the above embodiment
- the third communication device can be used to implement the technical solution involved in the third communication device in the above embodiment.
- an embodiment of the present application further provides a computer program product, which includes a computer program or instructions.
- the computer program or instructions When the computer program or instructions are executed on a computer, the computer executes the method provided in the above embodiment.
- an embodiment of the present application also provides a computer-readable storage medium, in which a computer program or instruction is stored.
- a computer program or instruction is stored.
- the computer program or instruction is executed by a computer, the computer executes the method provided in the above embodiment.
- the storage medium may be any available medium that can be accessed by a computer.
- a computer-readable medium may include RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage medium or other magnetic storage device, or any other medium that can be used to carry or store the desired program code in the form of instructions or data structures and can be accessed by a computer.
- an embodiment of the present application further provides a chip, which is coupled to a memory and is used to read a computer program stored in the memory to implement the method provided in the above embodiment.
- an embodiment of the present application also provides a chip system, which includes a processor for supporting a computer device to implement the functions involved in the first communication device (such as a terminal device) or the second communication device (such as a first network element) or the third communication device (such as a second network element) in the above embodiments.
- the chip system also includes a memory, which is used to store the necessary programs and data for the computer device.
- the chip system can be composed of chips, or it can include chips and other discrete devices.
- the method provided in the embodiment of the present application it can be implemented in whole or in part by software, hardware, firmware or any combination thereof.
- software it can be implemented in whole or in part in the form of a computer program product.
- the computer program product includes one or more computer instructions. When the computer instructions are loaded and executed on a computer, the process or function described in the embodiment of the present application is generated in whole or in part.
- the computer can be a general-purpose computer, a special-purpose computer, a computer network, or other programmable device.
- the computer instructions can be stored in a computer-readable storage medium, or transmitted from one computer-readable storage medium to another computer-readable storage medium.
- the computer instructions can be transmitted from a website site, computer, server or data center by wired (e.g., coaxial cable, optical fiber, digital subscriber line (digital subscriber line, DSL)) or wireless (e.g., infrared, wireless, microwave, etc.) mode to another website site, computer, server or data center.
- the computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device such as a server or data center that includes one or more available media integrated.
- the available medium may be a magnetic medium (e.g., a floppy disk, a hard disk, a magnetic tape), an optical medium (e.g., a high-density digital video disc (DVD)), or a semiconductor medium (e.g., a solid state drive (SSD)), etc.
- a magnetic medium e.g., a floppy disk, a hard disk, a magnetic tape
- an optical medium e.g., a high-density digital video disc (DVD)
- DVD high-density digital video disc
- SSD solid state drive
- the steps of the method described in the embodiments of the present application can be directly embedded in the hardware, the software unit executed by the processor, or the combination of the two.
- the software unit can be stored in RAM, ROM, EEPROM, register, hard disk, removable disk, CD-ROM or other storage media of any form in the art.
- the storage medium can be connected to the processor so that the processor can read information from the storage medium and can write information to the storage medium.
- the storage medium can also be integrated into the processor.
- the processor and the storage medium can be arranged in an ASIC.
- These computer program instructions may also be loaded onto a computer or other programmable data processing device so that a series of operational steps are executed on the computer or other programmable device to produce a computer-implemented process, whereby the instructions executed on the computer or other programmable device provide steps for implementing the functions specified in one or more processes in the flowchart and/or one or more boxes in the block diagram.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
La présente demande concerne un procédé et un appareil de communication. Le procédé comprend un dispositif terminal qui envoie de premières informations à un premier élément de réseau, les premières informations étant utilisées afin de demander une première clé, et la première clé étant utilisée pour chiffrer des données d'assistance ; et consiste à : recevoir un premier message provenant du premier élément de réseau, le premier message comprenant de premières informations d'indication, et les premières informations d'indication étant utilisées afin d'indiquer que la première clé n'existe pas ; si un premier temps ou un compteur de temps ou un temporisateur expire, envoyer de secondes informations au premier élément de réseau, les secondes informations étant utilisées afin de demander la première clé ; ou attendre que le premier élément de réseau envoie la première clé. Lorsqu'une première clé n'existe pas ou n'est pas disponible pour un côté réseau (par exemple, un premier élément de réseau), au moyen de l'envoi d'informations d'indication pour indiquer que la première clé n'existe pas ou n'est pas disponible, un dispositif terminal est notifié, de manière opportune, d'une situation dans laquelle il n'y a pas de première clé sur le côté réseau actuellement, de telle sorte que le dispositif terminal peut être empêché d'essayer aveuglement et fréquemment d'initier une demande d'acquisition de la première clé, et la consommation d'énergie et les surdébits de signalisation de réseau générés en raison du dispositif terminal essayant aveuglement et fréquemment de demander la première clé peuvent être réduits.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202311294451.6A CN119729480A (zh) | 2023-09-28 | 2023-09-28 | 一种通信方法及装置 |
| CN202311294451.6 | 2023-09-28 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2025066165A1 true WO2025066165A1 (fr) | 2025-04-03 |
Family
ID=95092141
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2024/092893 Pending WO2025066165A1 (fr) | 2023-09-28 | 2024-05-13 | Procédé et appareil de communication |
Country Status (2)
| Country | Link |
|---|---|
| CN (1) | CN119729480A (fr) |
| WO (1) | WO2025066165A1 (fr) |
Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN111726800A (zh) * | 2019-03-04 | 2020-09-29 | 华为技术有限公司 | 用于保护辅助信息的方法和装置 |
| CN112073177A (zh) * | 2019-06-11 | 2020-12-11 | 大唐移动通信设备有限公司 | 密钥更新方法及装置 |
| WO2021212413A1 (fr) * | 2020-04-23 | 2021-10-28 | 华为技术有限公司 | Procédé et appareil de transmission de clés |
| CN115915132A (zh) * | 2020-04-30 | 2023-04-04 | 华为技术有限公司 | 密钥管理方法、设备及系统 |
| CN117528505A (zh) * | 2021-01-11 | 2024-02-06 | 瑞典爱立信有限公司 | 用于用户设备标识符请求的方法和装置 |
-
2023
- 2023-09-28 CN CN202311294451.6A patent/CN119729480A/zh active Pending
-
2024
- 2024-05-13 WO PCT/CN2024/092893 patent/WO2025066165A1/fr active Pending
Patent Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN111726800A (zh) * | 2019-03-04 | 2020-09-29 | 华为技术有限公司 | 用于保护辅助信息的方法和装置 |
| CN112073177A (zh) * | 2019-06-11 | 2020-12-11 | 大唐移动通信设备有限公司 | 密钥更新方法及装置 |
| WO2021212413A1 (fr) * | 2020-04-23 | 2021-10-28 | 华为技术有限公司 | Procédé et appareil de transmission de clés |
| CN115915132A (zh) * | 2020-04-30 | 2023-04-04 | 华为技术有限公司 | 密钥管理方法、设备及系统 |
| CN117528505A (zh) * | 2021-01-11 | 2024-02-06 | 瑞典爱立信有限公司 | 用于用户设备标识符请求的方法和装置 |
Also Published As
| Publication number | Publication date |
|---|---|
| CN119729480A (zh) | 2025-03-28 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP6908720B2 (ja) | コアネットワーク制御プレーンデバイス選択方法および装置 | |
| EP3860176B1 (fr) | Procédé, appareil, et système d'obtention d'informations de capacité de terminal | |
| WO2022257549A1 (fr) | Procédé et dispositif de découpage en tranches de réseau, et support de stockage | |
| WO2020224622A1 (fr) | Procédé et dispositif de configuration d'informations | |
| US11729599B2 (en) | Communication system | |
| WO2021136211A1 (fr) | Procédé et dispositif pour déterminer un résultat d'autorisation | |
| WO2023160624A1 (fr) | Procédé et appareil de communication | |
| US20240172084A1 (en) | Data transmission method and apparatus | |
| US20240244107A1 (en) | Method for determining application server | |
| EP4185011A1 (fr) | Procédé de communication de relais, et appareil de communication | |
| US20250088988A1 (en) | Time synchronization method and communication apparatus | |
| CN109936444A (zh) | 一种密钥生成方法及装置 | |
| EP3955614A1 (fr) | Procédé et dispositif de communication | |
| US20240155325A1 (en) | Information obtaining method and apparatus, and system | |
| EP4274310A1 (fr) | Procédé et appareil d'intercommunication de réseau | |
| CN114731731B (zh) | 通信方法及装置 | |
| CN116939505A (zh) | 一种通信方法及装置 | |
| US20240365265A1 (en) | Time service method, communication apparatus, and communication system | |
| US20240022907A1 (en) | Apparatus and method of coordinating a reauthentication/reauthorization procedure for access to uncrewed aerial services | |
| US20230336992A1 (en) | Method and apparatus for authenticating user equipment in wireless communication system | |
| WO2025066165A1 (fr) | Procédé et appareil de communication | |
| WO2023179397A1 (fr) | Procédé et appareil de licence | |
| WO2023045741A1 (fr) | Procédé et appareil de positionnement, et support de stockage lisible | |
| US20250350942A1 (en) | Method for wireless communication, system for wireless communication, and communication device | |
| CN114642079B (zh) | 通信方法及装置 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 24869733 Country of ref document: EP Kind code of ref document: A1 |