WO2025153074A1 - Secure communication method and apparatus, and communication system - Google Patents
Secure communication method and apparatus, and communication systemInfo
- Publication number
- WO2025153074A1 WO2025153074A1 PCT/CN2025/073066 CN2025073066W WO2025153074A1 WO 2025153074 A1 WO2025153074 A1 WO 2025153074A1 CN 2025073066 W CN2025073066 W CN 2025073066W WO 2025153074 A1 WO2025153074 A1 WO 2025153074A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- security protection
- session
- integrity security
- integrity
- drb
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/10—Integrity
- H04W12/106—Packet or message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/10—Integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/121—Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
- H04W12/122—Counter-measures against attacks; Protection against rogue devices
Definitions
- the present application relates to the field of communications, and more specifically, to a secure communication method, device and communication system.
- a terminal device can communicate with a base station through a new radio (NR), and a base station can communicate with a core network through a ground gateway.
- 5G fifth generation
- NR new radio
- Uplink and downlink messages between the terminal device and the core network can be transmitted through the base station and the ground gateway.
- the communication link between the terminal device and the base station, and the communication link between the base station and the core network may not be in a connected state at the same time.
- the base station can perform a store and forward operation to store the uplink message from the terminal device, and after the communication link between the base station and the core network is restored, the stored uplink message is sent to the core network.
- the present application provides a secure communication method, device and communication system, which can reduce potential security risks and improve network communication security.
- a secure communication method is provided.
- the method is applied to the network device side, for example, the method can be executed by the network device, or it can also be executed by a chip or circuit in the network device, or it can also be executed by a functional module in the network device that can call and execute a program, or it can also be executed by a centralized unit (CU) or a distributed unit (DU) in the network device.
- CU centralized unit
- DU distributed unit
- the method includes: during the session establishment process of the terminal device, the network device determines whether to activate the integrity security protection of the session based on first information, the first information is used to indicate whether the network device supports storage and forwarding operations, and the session is used to transmit data between the terminal device and the core network; the network device sends first integrity security protection indication information to the terminal device, and the first integrity security protection indication information is used to indicate the activation result.
- the activation result is used to indicate whether to activate integrity security protection of the session, or in other words, the activation result is used to indicate whether to activate integrity security protection of one or more data radio bearers (DRBs) corresponding to the session.
- the activation result includes activating integrity security protection of the session, or not activating integrity security protection of the session.
- the first information may also be used to indicate whether the network device is configured to enable a store-and-forward operation, and/or the first information may also be used to indicate whether the network device is deployed on a satellite.
- the network equipment is deployed on the satellite, which can be understood as the network equipment (such as a base station) being physically deployed on the satellite, or the network equipment (such as a base station) and the satellite being co-located.
- the satellite has the capabilities of the network equipment, for example, the satellite supports the storage and forwarding operation of the network equipment.
- the integrity security protection of the session is turned on or activated to the maximum extent possible, so that the data subsequently received by the network device is protected by integrity security as much as possible.
- This facilitates the scenario where the communication link (such as a feeder link) between the network device and the core network is disconnected.
- the network device only stores user-plane data that has passed the integrity check, thereby alleviating the risk of potential denial of service DoS attacks while ensuring network communication security.
- a network device determines whether to activate integrity security protection for a session based on first information, including: when the first information indicates that the network device supports store-and-forward operations, the network device determines to activate integrity security protection for the session; and/or when the first information indicates that the network device does not support store-and-forward operations, the network device determines not to activate integrity security protection for the session.
- the network device when the network device supports store-and-forward operations, the network device activates the integrity security protection of the session; when the network device does not support store-and-forward operations, the network device does not activate the integrity security protection of the session, or may activate or not activate the integrity security protection of the session according to the user plane integrity security policy.
- the process before a network device determines whether to activate integrity security protection for a session based on first information, the process includes: the network device obtains a user plane integrity security policy corresponding to the session, where the user plane integrity security policy is used to indicate whether integrity security protection is activated for the session; the network device determines whether to activate integrity security protection for the session based on the first information, including: the network device determines whether to activate integrity security protection for the session based on the first information and the user plane integrity security policy.
- the network device determines whether to activate the integrity security protection of the session according to the first information, and can also consider the user plane integrity security policy in addition, and turn on or activate the integrity security protection of the session as much as possible, so that the user plane data received by the network device is protected by integrity security to the greatest extent.
- the feeder link is disconnected, only the user plane data that has passed the integrity check is stored, which not only alleviates the potential risk of denial of service DoS attacks, but also ensures the security of network communications.
- a network device determines whether to activate integrity security protection for a session based on first information and a user plane integrity security policy, including: when the first information indicates that the network device does not support store-and-forward operations and the user plane integrity security policy indicates that the session is activated or integrity security protection is optionally activated, the network device determines to activate integrity security protection for the session; and/or when the first information indicates that the network device does not support store-and-forward operations and the user plane integrity security policy indicates that integrity security protection is not activated for the session, the network device determines not to activate integrity security protection for the session.
- the network device determines whether to activate the integrity security protection of the session. It can be based on the user plane integrity security policy, or it can be based on whether the network device supports the store-and-forward operation.
- the integrity security protection of the session is turned on or activated to the maximum extent, so that the user plane data received by the network device is protected by integrity security to the greatest extent. In the scenario where the feeder link is disconnected, only the user plane data that has passed the integrity check is stored, which not only alleviates the potential risk of denial of service DoS attacks, but also ensures the security of network communications.
- a network device determines whether to activate integrity security protection for a session based on first information and a user plane integrity security policy, including: when the first information indicates that the network device supports store-and-forward operations and the user plane integrity security policy indicates that the session is activated or integrity security protection is optionally activated, the network device determines to activate integrity security protection for the session; and/or when the first information indicates that the network device supports store-and-forward operations and the user plane integrity security policy indicates that integrity security protection is not activated for the session, the network device determines to activate integrity security protection for the session.
- the network device determines to activate the integrity security protection of the session. That is, the network device determines whether to activate the integrity security protection of the session based on the first information, and turns on or activates the integrity security protection of the session to the maximum extent, so that the user plane data received by the network device is protected by integrity security to the maximum extent, so that in the scenario where the feeder link is disconnected, only the user plane data that passes the integrity check is stored, which not only alleviates the potential risk of DoS attacks, but also ensures the security of network communications.
- a secure communication method is provided.
- the method is applied to the terminal device side, for example, the method can be executed by the terminal device, or it can also be executed by a chip or circuit in the terminal device, or it can also be executed by a functional module in the terminal device that can call and execute a program.
- This application does not limit this.
- a terminal device such as a user equipment (UE)
- UE user equipment
- the method includes: during the session establishment process of the terminal device, the terminal device receives first integrity security protection indication information from the network device, the first integrity security protection indication information is used to indicate whether to activate the integrity security protection of the session, the first integrity security protection indication information is determined based on the first information, and the first information is used to indicate whether the network device supports the store-and-forward operation; the terminal device performs an integrity check on the first integrity security protection indication information, and the session is used to transmit data between the terminal device and the core network; when the integrity check passes, the terminal device determines whether to activate the integrity security protection of the session based on the first integrity security protection indication information.
- the method further includes: the terminal device performs an integrity check on the first integrity security protection indication information. Further, if the integrity check passes, the terminal device determines whether to activate the integrity security protection of the session according to the first integrity security protection indication information.
- the first integrity security protection indication information is used to indicate whether to activate the integrity security protection of the session, which can be understood as: the first integrity security protection indication information is used to indicate the activation result, and the activation result is used to indicate whether to activate the integrity security protection of the session.
- the first integrity security protection indication information when the first information indicates that the network device supports store-and-forward operations, the first integrity security protection indication information is used to indicate that integrity security protection of the session is activated; and/or, when the first information indicates that the network device does not support store-and-forward operations, the first integrity security protection indication information is used to indicate that integrity security protection of the session is not activated.
- the first integrity security protection indication information is determined according to the first information and a user plane integrity security policy, wherein the user plane integrity security policy is used to indicate whether integrity security protection is activated for the session.
- the first integrity security protection indication information is used to indicate activation of integrity security protection for the session; and/or, when the first information indicates that the network device does not support the store-and-forward operation and the user plane integrity security policy indicates that integrity security protection is not activated for the session, the first integrity security protection indication information is used to indicate deactivation of integrity security protection for the session.
- the first integrity security protection indication information when the first information indicates that the network device supports store-and-forward operations and the user plane integrity security policy indicates session activation or optional activation of integrity security protection, the first integrity security protection indication information is used to indicate the activation of integrity security protection for the session; and/or, when the first information indicates that the network device supports store-and-forward operations and the user plane integrity security policy indicates that integrity security protection is not activated for the session, the first integrity security protection indication information is used to indicate the activation of integrity security protection for the session.
- a secure communication method is provided.
- the method is applied to the network device side, for example, the method can be executed by the network device, or it can also be executed by a chip or circuit in the network device, or it can also be executed by a functional module in the network device that can call and execute a program, or it can also be executed by a CU or DU in the network device.
- This application is not limited to this.
- the following is an example of execution by a network device (such as a base station) for explanation.
- the method includes: during the session establishment process of the terminal device, the network device obtains the user plane integrity security policy corresponding to the session, the user plane integrity security policy is used to indicate whether the session activates integrity security protection, and the session is used to transmit data between the terminal device and the core network; the network device determines first integrity security protection indication information according to the user plane integrity security policy, the first integrity security protection indication information is used to indicate whether to activate the integrity security protection of the first DRB, the session corresponds to the first DRB, and the first DRB is used to carry data between the terminal device and the network device; according to the first integrity security protection indication information, the integrity security protection of the first DRB is activated or not activated; in the case of a first link disconnection, the network device determines whether to release the first DRB according to whether the integrity security protection of the first DRB is activated, or the network device determines whether to modify the integrity security protection status of the first DRB according to whether the integrity security protection of the first DRB is activated, and the first link is a link between the network device and
- the first link may be a feeder link.
- the network device may also determine whether to release the first DRB based on the first integrity security protection indication information, or the network device may determine whether to modify the integrity security protection status of the first DRB based on the first integrity security protection indication information.
- the network device determines whether to release the first DRB based on the user plane integrity security policy, or modifies the integrity security protection state of the first DRB to an activated state, so that the user plane data subsequently received by the network device is all protected by integrity security.
- the satellite base station In the scenario where the feeder link is disconnected, the satellite base station only stores the user plane data that has passed the integrity check, which can alleviate potential DoS risks and ensure network communication security.
- the network device determines whether to release the first DRB based on whether the integrity security protection of the first DRB is activated, including: if the integrity security protection of the first DRB is not activated, the network device determines to release the first DRB.
- the network device determines whether to modify the integrity security protection state of the first DRB based on whether the integrity security protection of the first DRB is activated, including: when the integrity security protection of the first DRB is not activated, the network device determines to modify the integrity security protection state of the first DRB to an activated state.
- the method also includes: when the first link resumes connection, the network device sends a second message to the terminal device, the second message is used to instruct the terminal device to establish a second DRB, the second message includes second integrity security protection indication information, the second integrity security protection indication information is used to indicate that the second DRB does not activate integrity security protection, and the second DRB is used to carry data between the terminal device and the network device.
- the second DRB is the first DRB
- the method further includes: the network device stores an identifier of the first DRB; and/or the network device records that the integrity security protection state of the first DRB before modification is in an inactivated state; wherein the second message includes the identifier of the first DRB, and/or the second integrity security protection indication information carried in the second message is determined based on the integrity security protection state of the first DRB before modification being in an inactivated state.
- the second DRB can be a DRB re-established between the terminal device and the network device, or it can be a first DRB determined based on the identifier of the first DRB.
- the present application does not limit the storage of the identifier of the first DRB; and/or the timing when the network device records that the integrity security protection state of the first DRB before modification is in an inactive state. This implementation method is to facilitate normal communication between subsequent terminal devices and network devices.
- the network device can determine not to activate or enable the integrity security protection of the second DRB based on the record that the integrity security protection state of the first DRB before modification is in an inactive state.
- the network device can also determine not to activate or enable the integrity security protection of the second DRB based on the user plane integrity security policy of the session, which is not limited in this application.
- the method also includes: the network device receives first data from the terminal device through the first DRB; when the first integrity security protection indication information indicates activation of the integrity security protection of the first DRB, the network device performs an integrity check on the first data; if the integrity check passes and the first link is disconnected, the network device stores the first data; or, if the integrity check fails, the network device does not store the first data, or the network device discards the first data.
- the method before storing the first data, the method further includes: if the integrity check passes, determining whether the first link is disconnected.
- the method before performing integrity check on the first data, the method further includes: determining whether the first link is disconnected.
- the present application does not limit the execution order of determining whether the first link is disconnected and determining whether the integrity check of the first data is required.
- the network device can determine whether the first link is disconnected by determining whether the network device and the core network are communicating normally. For example, the network device flies to the side away from the ground gateway station, such as the ground gateway station cannot receive the signal transmitted by the network device; or, the communication conditions between the network device and the core network deteriorate, such as encountering bad weather, or the signal quality is lower than a certain threshold, etc.;
- the method also includes: the network device receives first data from the terminal device through the first DRB; when the first integrity security protection indication information indicates that the first DRB does not activate integrity security protection and the first link is disconnected, the network device does not perform integrity verification on the first data, or the network device discards the first data.
- a secure communication method is provided.
- the method is applied to a terminal device side, for example, the method can be executed by the terminal device, or it can also be executed by a chip or circuit in the terminal device, or it can also be executed by a functional module in the terminal device that can call and execute a program.
- This application is not limited to this.
- the following is an example of execution by a terminal device (such as a UE).
- the method includes: when the first link is disconnected, the terminal device receives a first message from the network device, the first message is used to indicate the release result or modification result of the first DRB, the release result is used to indicate whether to activate the first DRB, the modification result is used to indicate whether to modify the integrity security protection status of the first DRB, the release result or the modification result is determined according to whether the integrity security protection of the first DRB is activated, the first DRB is used to carry data between the terminal device and the network device, and the first link is a link between the network device and the core network; the terminal device determines whether to release the first DRB according to the release result, or the terminal device determines whether to modify the integrity security protection status of the first DRB according to the modification result.
- whether the integrity security protection of the first DRB is activated is determined according to the user plane integrity security policy.
- the method further includes: the terminal device performs an integrity check on the first message. Furthermore, if the integrity check passes, the terminal device determines whether to release the first DRB according to the release result, or before the terminal device determines whether to modify the integrity security protection state of the first DRB according to the modification result.
- the release result indicates the release of the first DRB.
- the modification result indicates that the integrity security protection state of the first DRB is modified to an activated state.
- the method also includes: when the first link restores connection, the terminal device receives a second message from the network device, the second message is used to indicate the establishment of a second DRB, the second message includes second integrity security protection indication information, the second integrity security protection indication information is used to indicate that the second DRB does not activate integrity security protection, the second DRB is used to carry data between the terminal device and the network device, and the first link is a link between the network device and the core network.
- a secure communication method may be executed by a session management network element, or may be executed by a chip or circuit in the session management network element, or may be executed by a functional module in the session management network element that can call and execute a program.
- This application does not limit this.
- the following is an example of execution by a session management network element.
- the method includes: during the session establishment process of the terminal device, the session management network element obtains indication information, the indication information is used to indicate that the network device is deployed on the satellite; the session management network element determines the user plane integrity security policy corresponding to the session according to the indication information, the user plane integrity security policy is used to indicate the session activation or optional activation of integrity security protection; the session management network element sends the user plane integrity security policy to the network device.
- the indication information is further used to indicate that the network device supports a store-and-forward operation.
- the method also includes: the session management network element obtains contract information, and the contract information is used to indicate whether the terminal device has signed a contract for a store-and-forward operation service; the session management network element determines a user plane integrity security policy based on the indication information, including: the session management network element determines a user plane integrity security policy based on the indication information and the contract information.
- the session management network element determines a user plane integrity security policy according to the subscription information.
- the session management network element determines a user plane integrity security policy based on the indication information and the subscription information, including: when the subscription information indicates that the terminal device has subscribed to a store-and-forward operation service, the session management network element determines an integrity security policy to indicate that the session activates integrity security protection.
- a communication device such as a network device.
- the communication device includes: a processing unit, used to determine whether to activate integrity security protection of a session according to first information during a session establishment process of a terminal device, the first information being used to indicate whether the network device supports a store-and-forward operation; and a transceiver unit, used to send first integrity security protection indication information to the terminal device, the first integrity security protection indication information being used to indicate an activation result.
- the transceiver unit can perform the reception and transmission processing in the aforementioned first aspect, and the processing unit can perform other processing except reception and transmission in the aforementioned first aspect.
- a communication device such as a terminal device.
- the communication device includes: a transceiver unit, configured to receive first integrity security protection indication information from a network device during a session establishment process of the terminal device, the first integrity security protection indication information being used to indicate whether to activate integrity security protection of the session, the first integrity security protection indication information being determined based on first information, the first information being used to indicate whether the network device supports a store-and-forward operation; a processing unit, configured to perform an integrity check on the first integrity security protection indication information; and the processing unit is further configured to determine whether to activate integrity security protection of the session based on the first integrity security protection indication information when the integrity check passes.
- the transceiver unit can perform the reception and transmission processing in the aforementioned second aspect, and the processing unit can perform other processing except reception and transmission in the aforementioned second aspect.
- a communication device such as a network device.
- the communication device includes: a transceiver unit, which is used to obtain a user plane integrity security policy corresponding to a session during a session establishment process of a terminal device, and the user plane integrity security policy is used to indicate whether integrity security protection is activated for the session; a processing unit, which is used to determine first integrity security protection indication information according to the user plane integrity security policy, and the first integrity security protection indication information is used to indicate whether to activate integrity security protection of a first DRB, and the session corresponds to a first data radio bearer DRB; the processing unit is also used to determine whether to release the first DRB according to whether the integrity security protection of the first DRB is activated when the first link is disconnected, or to determine whether to modify the integrity security protection state of the first DRB according to whether the integrity security protection of the first DRB is activated, and the first link is a link between the network device and the core network; the transceiver unit is also used to send a first message to the terminal device
- the transceiver unit can perform the receiving and sending processing in the third aspect, and the processing unit can perform other processing except receiving and sending in the third aspect.
- a communication device such as a terminal device.
- the communication device includes: a transceiver unit, which is used to receive a first message from a network device when the first link is disconnected, the first message is used to indicate the release result or modification result of the first DRB, the first DRB is used to carry data between the terminal device and the network device, the release result is used to indicate whether to activate the first DRB, the modification result is used to indicate whether to modify the integrity security protection state of the first DRB, and the release result or modification result is determined according to whether the integrity security protection of the first DRB is activated; a processing unit, which is used to perform an integrity check on the first message; the processing unit is also used to determine whether to release the first DRB according to the release result when the integrity check passes, or to determine whether to modify the integrity security protection state of the first DRB according to the modification result.
- whether the integrity security protection of the first DRB is activated is determined according to the user plane integrity security policy.
- the transceiver unit can perform the receiving and sending processing in the fourth aspect, and the processing unit can perform other processing except receiving and sending in the fourth aspect.
- a communication device such as a session management network element.
- the communication device includes: a transceiver unit, used to receive indication information during the session establishment process of a terminal device, the indication information is used to indicate that a network device is deployed on a satellite; a processing unit, used to determine a user plane integrity security policy according to the indication information, the user plane integrity security policy is used to indicate session activation or optional activation of integrity security protection; the transceiver unit is also used to send the user plane integrity security policy to the network device.
- the transceiver unit can perform the receiving and sending processing in the fifth aspect, and the processing unit can perform other processing except receiving and sending in the fifth aspect.
- a communication device in an eleventh aspect, includes a transceiver, a processor, and a memory, wherein the processor is used to control the transceiver to send and receive signals, the memory is used to store a computer program, and the processor is used to call and run the computer program from the memory, so that the communication device performs the method in any possible implementation of the first to fifth aspects above.
- processors there are one or more processors and one or more memories.
- the memory may be integrated with the processor, or the memory may be provided separately from the processor.
- the communication device further includes a transmitter (transmitter) and a receiver (receiver).
- a communication system in a twelfth aspect, includes a network device and a session management network element, wherein the network device is used to execute the method in the first aspect or the third aspect and any possible implementation thereof, and the session management network element is used to execute the method in any possible implementation of the fifth aspect.
- the communication system further includes a terminal device, wherein the terminal device is used to execute the method in the above-mentioned second aspect or fourth aspect and any possible implementation manner thereof.
- a computer-readable storage medium stores computer program code instructions, and when the computer program code or instructions are executed, the method in any possible implementation of the first to fifth aspects is executed.
- a chip in a fourteenth aspect, includes at least one processor, the at least one processor is coupled to a memory, the memory is used to store a computer program, and the processor is used to call and run the computer program from the memory, so that a communication device equipped with the chip system performs the method in any possible implementation of the first to fifth aspects above.
- the chip may include an input circuit or interface for sending information or data, and an output circuit or interface for receiving information or data.
- a computer program product which includes: a computer program code, and when the computer program code is executed, the method in any possible implementation manner of the first to fifth aspects is executed.
- a computer program is provided.
- the method in any possible implementation manner of the first to fifth aspects is executed.
- the technical effects of the technical solutions of the sixth to sixteenth aspects can refer to the description of the corresponding technical effects of the first to fifth aspects and will not be repeated here.
- FIG1 is a schematic diagram of a communication system applicable to an embodiment of the present application.
- FIG2 is a schematic diagram of another communication system applicable to an embodiment of the present application.
- FIG3 is a schematic flow chart of a method for establishing a session of a terminal device
- FIG4 is a schematic flow chart of a communication method provided in an embodiment of the present application.
- FIG5 is a schematic flow chart of another communication method provided in an embodiment of the present application.
- FIG6 is a schematic flow chart of another communication method provided in an embodiment of the present application.
- FIG7 is a schematic flow chart of another communication method provided in an embodiment of the present application.
- FIG8 is a schematic flow chart of another communication method provided in an embodiment of the present application.
- FIG9 is a schematic flow chart of another communication method provided in an embodiment of the present application.
- FIG10 is a schematic block diagram of a communication device provided in an embodiment of the present application.
- FIG. 11 is a schematic block diagram of another communication device provided in an embodiment of the present application.
- the technical solution of the present application can be applied to satellite communication systems, high altitude platform station (HAPS) communications and other non-terrestrial network (NTN) systems, for example, integrated communication and navigation (ICaN) systems, global navigation satellite systems (GNSS), etc.
- HAPS high altitude platform station
- NTN non-terrestrial network
- IaN integrated communication and navigation
- GNSS global navigation satellite systems
- Satellite communication systems can be integrated with traditional mobile communication systems.
- the mobile communication system can be a 5G or NR system, a long term evolution (LTE) system, an LTE frequency division duplex (FDD) system, an LTE time division duplex (TDD) system, a universal mobile telecommunication system (UMTS), etc.
- LTE long term evolution
- FDD frequency division duplex
- TDD time division duplex
- UMTS universal mobile telecommunication system
- the technical solution provided in this application can also be applied to future communication systems, such as the sixth generation (6G) mobile communication system.
- the technical solution provided in this application can also be applied to device to device (D2D) communication, vehicle to everything (V2X) communication, machine to machine (M2M) communication, machine type communication (MTC), Internet of things (IoT) communication system, non-terrestrial network (NTN) communication system or other communication systems.
- D2D device to device
- V2X vehicle to everything
- M2M machine to machine
- MTC machine type communication
- Fig. 1 is a schematic diagram of a communication system applicable to an embodiment of the present application.
- the architecture 100 may include a terminal device 110, a network device 120, a core network (CN) 130, and an external network 140.
- CN core network
- the terminal device 110 may be referred to as a user equipment UE.
- the terminal device 110 in the present application is a device with wireless transceiver functions, which can communicate with one or more CN 130 through the network device 120.
- the terminal device 110 may also be referred to as an access terminal, a terminal, a user unit, a user station, a mobile station, a mobile station, a remote station, a remote terminal, a mobile device, a user terminal, a user agent or a user device, etc.
- the terminal device 110 may be deployed on land, including indoors or outdoors, handheld or vehicle-mounted; it may also be deployed on the water surface (such as a ship, etc.); it may also be deployed in the air (such as an airplane, a balloon, and a satellite, etc.).
- the terminal device 110 may be a cellular phone, a cordless phone, a session initiation protocol (SIP) phone, a smart phone, a mobile phone, a wireless local loop (WLL) station, a personal digital assistant (PDA), etc.
- the terminal device 110 may also be a handheld device with wireless communication function, a computing device or other device connected to a wireless modem, an in-vehicle device, a wearable device, an unmanned aerial vehicle (UAV) device or a terminal in the Internet of Things or Internet of Vehicles, a terminal in any form in a 5G network and future networks, a relay user device or a terminal in a future evolved 6G network, etc.
- SIP session initiation protocol
- WLL wireless local loop
- PDA personal digital assistant
- the terminal device 110 may also be a handheld device with wireless communication function, a computing device or other device connected to a wireless modem, an in-vehicle device, a wearable device, an unmanned aerial vehicle (UAV) device or a
- the relay user device may be, for example, a 5G residential gateway (RG).
- the terminal device 110 may be a virtual reality (VR) terminal, an augmented reality (AR) terminal, a wireless terminal in industrial control, a wireless terminal in unmanned driving, a wireless terminal in telemedicine, a wireless terminal in a smart grid, a wireless terminal in transportation safety, a wireless terminal in a smart city, a wireless terminal in a smart home, etc.
- VR virtual reality
- AR augmented reality
- a wireless terminal in industrial control a wireless terminal in unmanned driving
- a wireless terminal in telemedicine a wireless terminal in a smart grid
- a wireless terminal in transportation safety a wireless terminal in a smart city
- a wireless terminal in a smart home etc.
- the terminal device 110 may also be a terminal device such as a logical entity, a smart device (such as a mobile phone), a smart terminal, or a communication device such as a server, a gateway, a base station, a controller, or an IoT device such as an IoT device, a sensor, an electric meter, a water meter, etc.
- a terminal device such as a logical entity, a smart device (such as a mobile phone), a smart terminal, or a communication device such as a server, a gateway, a base station, a controller, or an IoT device such as an IoT device, a sensor, an electric meter, a water meter, etc.
- a smart device such as a mobile phone
- a smart terminal such as a mobile phone
- a communication device such as a server, a gateway, a base station, a controller, or an IoT device such as an IoT device, a sensor, an electric meter, a water meter
- the device for realizing the function of the terminal device can be the terminal device, or it can be a device that can support the terminal device to realize the function, such as a chip system or a chip, which can be installed in the terminal device.
- the chip system can be composed of a chip, or it can include a chip and other discrete devices.
- the network device 120 may be any device with a wireless transceiver function for communicating with a terminal device.
- the network device may also be referred to as an access network device or a wireless access network device, such as a base station.
- the network device in the embodiment of the present application may refer to a radio access network (RAN) node (or RAN device, or RAN entity) that connects the terminal device to a wireless network.
- RAN radio access network
- R may be regarded as a subnetwork of an operator network, and is an implementation system between a service node in the operator network and the terminal device 110. For example, if the terminal device 110 wants to access the operator network, it first passes through the network device 120, and then can connect to the service node of the operator network through the network device 120.
- the above-mentioned RAN may be a cellular system related to the third generation partnership project (3GPP), such as a 5G mobile communication system, or a future-oriented evolution system (such as a 6G mobile communication system).
- 3GPP third generation partnership project
- RAN may also be an open radio access network (open RAN, O-RAN or ORAN), a cloud radio access network (cloud radio access network, CRAN), or a wireless fidelity (WiFi) system.
- RAN can also be a communication system that integrates two or more of the above systems.
- the network device 120 includes, but is not limited to: a next generation node base station (gNB) in a 5G system, an evolved node B (eNB) in LTE, a radio network controller (RNC), a node B (NB), a base station controller (BSC), a base transceiver station (BTS), a home base station (e.g., home evolved node B, or home node B, HNB), a base band unit (BBU), a transmission point (TRP), a transmitting point (TP), a small base station device (pico), a mobile switching center, or a network device in a future network.
- gNB next generation node base station
- eNB evolved node B
- RNC radio network controller
- NB node B
- BSC base station controller
- BTS base transceiver station
- a home base station e.g., home evolved node B, or home node B, HNB
- BBU base band unit
- TRP transmitting point
- the above-mentioned device providing wireless communication function for the terminal device 110 is collectively referred to as access network equipment or RAN or AN for short. It should be understood that the specific type of access network equipment is not limited herein.
- the RAN node can be a CU, DU, central unit-control plane (CU-CP), central unit-user plane (CU-UP), or radio unit (RU).
- the CU and DU can be set separately, or they can also be included in the same network element, such as the BBU.
- the functions of the RU can be implemented by the radio frequency equipment of the base station.
- the radio frequency equipment of the base station can be a remote radio unit (RRU), a pico remote radio unit (pRRU), an active antenna unit (AAU), or other units, modules or devices with radio frequency processing functions.
- the communication interface protocol between the BBU and the radio frequency equipment can be the common public radio interface (CPRI) interface protocol, the enhanced common public radio interface (eCPRI) interface protocol, or the fronthaul interface protocol between the DU and RU in the O-RAN system, etc., without restriction.
- CPRI common public radio interface
- eCPRI enhanced common public radio interface
- fronthaul interface protocol between the DU and RU in the O-RAN system etc., without restriction.
- CU or CU-CP and CU-UP
- DU or RU may also have different names, but those skilled in the art can understand their meanings.
- CU may also be called O-CU (open CU)
- DU may also be called O-DU
- CU-CP may also be called O-CU-CP
- CU-UP may also be called O-CU-UP
- RU may also be called O-RU.
- Any unit in the CU (or CU-CP, CU-UP), DU and RU in this application may be implemented by a software module, a hardware module, or a combination of a software module and a hardware module.
- CU, CU-CP, CU-UP, DU and RU are used as examples for description in this application.
- the network device 120 may be fixed or mobile.
- a helicopter or drone may be configured to act as a mobile base station, and one or more cells may move according to the location of the mobile base station.
- a helicopter or drone may be configured to act as a device that communicates with another base station.
- the device for implementing the function of the access network device may be a network device, or a device capable of supporting the access network device to implement the function, such as a chip system or a chip, which may be installed in the access network device.
- the chip system may be composed of a chip, or may include a chip and other discrete devices.
- Network devices and terminal devices can be deployed on land, including indoors or outdoors, handheld or vehicle-mounted; they can also be deployed on the water; they can also be deployed on aircraft, balloons and satellites in the air.
- the scenarios in which network devices and terminal devices are located are not limited in the embodiments of the present application.
- terminal devices and network devices can be hardware devices, or they can be software functions running on dedicated hardware, software functions running on general-purpose hardware, such as virtualization functions instantiated on a platform (e.g., a cloud platform), or entities including dedicated or general-purpose hardware devices and software functions.
- a platform e.g., a cloud platform
- the present application does not limit the specific forms of terminal devices and network devices.
- the core network CN may include but is not limited to the following network functions (NF): user plane function (UPF), network exposure function (NEF), network function repository function (NRF), policy control function (PCF), unified data management function (UDM), unified data repository function (UDR), application function (AF), authentication server function (AUSF), access and mobility management function (AMF), and session management function (SMF).
- NF network functions
- UPF user plane function
- NEF network exposure function
- NRF network function repository function
- PCF policy control function
- UDM unified data management function
- UDR application function
- AF authentication server function
- AMF access and mobility management function
- SMF session management function
- UPF is a gateway provided by the operator. It is the gateway for the operator network to communicate with DN. It is mainly responsible for packet routing and transmission, packet detection, service usage reporting, quality of service (QoS) processing, legal monitoring, uplink packet detection, downlink packet storage, etc. UPF can also be called user plane equipment. It can receive user data from DN 240 and transmit it to terminal device 110 through network device 120; UPF can also receive user data from terminal device 110 through network device 120 and forward it to DN. The transmission resources and scheduling functions in UPF that provide services for terminal device 110 are managed and controlled by SMF.
- NEF is a control plane function provided by the operator, which mainly enables third parties to use the services provided by the network, supports the network to open its capabilities, event and data analysis, provide PLMN security configuration information from external applications, and convert the interactive information inside and outside the PLMN.
- NEF can also be called a network open device, which can provide Nnef services.
- NRF is a control plane function provided by the operator, which can be used to maintain real-time information of network functions and services in the network. For example, it supports network service discovery, maintains the services supported by the NF configuration data (NF profile) of the NF instance, supports service discovery of the communication proxy (SCP), maintains the SCP configuration data (SCP profile) of the SCP instance, sends notifications about newly registered, deregistered, and updated NFs and SCPs, and maintains the health status of NF and SCP operations.
- NF profile the services supported by the NF configuration data
- SCP communication proxy
- SCP profile SCP configuration data
- PCF is a control plane function provided by the operator. It supports a unified policy framework to govern network behavior, provide policy rules to other control functions, and contract information related to policy decisions.
- UDM is a control plane function provided by the operator, responsible for storing the subscriber permanent identifier (SUPI), the generic public subscription identifier (GPSI), and credentials of the subscribers in the operator network. This information can be used for authentication and authorization of the terminal device 110 to access the operator network. Among them, SUPI will be encrypted during transmission, and the encrypted SUPI is called a hidden user subscription identifier (SUCI). UDM can also be called a unified data management device, a unified data management network element, a data management device, a unified data management entity, etc.
- UDR is a control plane function provided by the operator, which provides the functions of storing and obtaining subscription data for UDM, storing and obtaining policy data for PCF, storing and obtaining user's NF group ID (group ID) information, etc.
- UDR can also be called user database equipment, user database entity, user database network element, etc.
- the user database mainly includes the following functions: storage and access functions of subscription data, policy data, application data and other types of data.
- AF is a control plane function provided by the operator. It mainly provides corresponding services by interacting with other NFs in the PLMN, such as providing roaming UE with access network selection information, guiding the routing of data flows, accessing NEF, etc. AF can be deployed by the operator inside the PLMN or outside the operator network.
- AUSF is a control plane function provided by the operator, which is usually used for primary authentication, that is, authentication between the terminal device 110 (subscriber) and the operator network. After receiving the authentication request initiated by the subscriber, AUSF can authenticate and/or authorize the subscriber through the authentication information and/or authorization information stored in the UDM, or generate the authentication and/or authorization information of the subscriber through the UDM. AUSF can feedback the authentication information and/or authorization information to the subscriber.
- AMF is a control plane network function provided by the operator network, responsible for access control and mobility management of the terminal device 110 accessing the operator network, including, for example, mobility status management, allocation of user temporary identity, authentication and authorization of users, etc.
- AMF may also be referred to as access and mobility management equipment, access and mobility management function entity, access and mobility management function network element, mobile management equipment, mobile management network element, mobile management entity, etc., and may provide Namf services.
- SMF is a control plane network function provided by the operator network, responsible for managing the protocol data unit (PDU) session of the terminal device 110.
- the terminal device transmits PDU to each other with the DN through the PDU session.
- the PDU session is established, maintained and deleted by SMF.
- SMF includes session management (such as session establishment, modification and release, including tunnel maintenance between the user plane function UPF and the network device 120), UPF selection and control, service and session continuity (SSC) mode selection, roaming and other session-related functions.
- SMF can also be called a session management device, which can provide Nsmf services.
- the external network 140 may be a data network (DN), also known as a packet data network (PDN), which is usually a network located outside the operator's network, such as a third-party network.
- DN data network
- PLMN packet data network
- the DN may also be deployed by the operator, that is, the DN is part of the public land mobile network (PLMN). This application does not restrict whether the DN belongs to the PLMN.
- PLMN public land mobile network
- a variety of services may be deployed on the DN, which may provide data and/or voice services to the terminal device 110.
- network elements or functions can be physical entities in hardware devices, software instances running on dedicated hardware, or virtualized functions instantiated on a shared platform (e.g., a cloud platform).
- a shared platform e.g., a cloud platform.
- an NF can be implemented by hardware or software.
- NTN communication system includes integrated communication and navigation (IcaN) system, global navigation satellite system (GNSS) and ultra-dense low-orbit satellite communication system.
- IcaN integrated communication and navigation
- GNSS global navigation satellite system
- NTN communication system includes satellite network, high-altitude platform and drone nodes, with significant advantages such as global coverage, long-distance transmission, flexible networking, convenient deployment and no geographical restrictions. It has been widely used in maritime communication, positioning navigation, disaster relief, scientific experiments, video broadcasting and earth observation.
- Ground communication network for example, LTE network, 5G communication network, future 6G communication network, etc.
- satellite network are integrated to form a global seamless coverage of sea, land, air, space and ground integrated integrated communication network, which can meet the various business needs of users.
- the current 5G network supports the regenerated satellite mode, that is, the NTN communication system provides seamless coverage for terminal devices by deploying the functions of access network devices or part of the access network devices on non-ground (for example, high-altitude platforms or satellites, etc.), which can also be called the access network device using the new air interface NR to provide satellite access to terminal devices.
- the satellite deployed with the access network function is referred to as a satellite access network device, or the base station deployed on the satellite is referred to as a satellite base station.
- FIG2 is a schematic diagram of a network architecture applicable to an embodiment of the present application.
- the satellite communication system includes a satellite base station 201 and a satellite base station 202, each of which can provide services to terminal devices through multiple beams, such as communication services, navigation services, and positioning services.
- the satellite in this scenario can be a low earth orbit (LEO) satellite, a medium earth orbit (MEO) satellite, a high elliptical orbit (HEO) satellite, a geostationary earth orbit (GEO) satellite, etc., and the embodiment of the present application does not specifically limit this.
- the satellite base station 202 is connected to a ground gateway station (such as NTN Gateway), which can also be called a gateway station, a signal gateway station, a ground station device, etc.
- the satellite uses multiple beams to cover the service area, and different beams can communicate through one or more of time division, frequency division, and space division.
- the terminal equipment on the ground can use the 5G new air interface to communicate with the satellite base station.
- the satellite base station can communicate wirelessly with the terminal equipment through broadcast communication signals and navigation signals.
- the connection between the terminal equipment and the satellite base station can be called a service link.
- the satellite base station can communicate wirelessly with the ground station (also called a gateway station, a ground gateway station, a signal gateway station, etc.) through the NG interface (for example, for signaling such as NAS for interactive core network, and user business data), and the satellite base station can also communicate with the core network through the ground gateway station.
- the ground station also called a gateway station, a ground gateway station, a signal gateway station, etc.
- the NG interface for example, for signaling such as NAS for interactive core network, and user business data
- the ground station is mainly responsible for forwarding the signaling and business data between the satellite base station and the core network, and the connection between the satellite base station and the ground station can be called a feeder link.
- ISL inter-satellite link
- the satellite base station 201 can communicate wirelessly with the satellite base station 202 through the Xn interface (for example, for signaling interaction such as switching).
- the communication system shown in Figure 2 is illustrated by taking the satellite communication system combined with the 5G system as an example.
- the network elements and interfaces involved may have other names, and the embodiments of the present application do not specifically limit this.
- the service link between the terminal device and the satellite base station and the feeder link between the satellite base station and the ground station are connected, that is, the uplink message and the downlink message between the terminal device and the core network can be transmitted through the satellite base station and the ground station.
- the session establishment between the terminal device and the core network is explained in conjunction with Figure 3.
- FIG3 is a flow chart of a method for establishing a session of a terminal device.
- the method 300 can be applied to the network architecture of FIG1 and FIG2 , and is mainly used for the user plane session establishment process in the satellite communication system, and for indicating the user plane security protection policy between the terminal device and the satellite base station in the user plane session establishment process.
- the terminal device as UE
- the access network device as a satellite base station
- the core network element as a session management element, such as AMF and SMF as an example
- the method includes the following multiple steps, and the parts not described in detail can refer to the existing protocol.
- the UE registers with the network and completes authentication and activates non-access stratum (NAS) and access stratum (AS) layer security.
- NAS non-access stratum
- AS access stratum
- the UE sends a registration request message to the network to request registration with the network, and the registration request message includes the UE ID.
- the UE and the network perform authentication, including: AMF triggers authentication of the UE.
- the AMF sends an authentication request #1 to the AUSF
- the AUSF sends an authentication request #2 to the UDM
- the authentication request #1 and the authentication request #2 are used to request authentication of the UE
- the UDM generates an authentication vector and sends an authentication response #1 to the AUSF
- the AUSF sends an authentication response #2 to the AMF
- the authentication response #1 and the authentication response #2 include an authentication vector, such as an authentication vector of 5G-AKA or an authentication vector of EAP-AKA’.
- the authentication method includes but is not limited to: 5G Authentication and Key Agreement (5G-AKA) authentication method, Extensible Authentication Protocol-Authentication and Key Agreement (EAP-AKA’) authentication method.
- 5G-AKA 5G Authentication and Key Agreement
- EAP-AKA Extensible Authentication Protocol-Authentication and Key Agreement
- AMF sends EAP Request/AKA′-Challenge message to UE through NAS message.
- UE After UE completes authentication and authentication of the network, it sends EAP-Response/AKA'-Challenge message to AMF through NAS message.
- AMF then sends Nausf_UE Authentication_Authenticate Request message to AUSF, carrying EAP-Response/AKA'-Challenge message.
- AUSF verifies the EAP-Response/AKA'-Challenge message. If the verification is successful, the authentication of the UE is completed, and EAP Success is sent to the UE through AMF to indicate that the authentication is successful.
- EAP-Response/AKA'-Challenge message For the specific authentication implementation method, please refer to the relevant description of the existing protocol TS 33.501.
- the UE and the AMF side usually generate or obtain a new NAS layer key (such as KAMF), wherein the NAS layer key (such as KAMF subkey) is activated for use by triggering the NAS SMC process, that is, the AMF sends a NAS SMC message to the UE, and the UE sends a NAS SMP message to the AMF.
- the NAS SMC message includes but is not limited to: integrity security protection algorithm identifier and/or confidentiality security protection algorithm identifier, ngKSI, replayed UE security capabilities, MAC#1.
- the NAS SMP message includes MAC#2.
- ngKSI is used to identify a specific NAS security context
- the NAS security context includes: key identifier, UE security capability, uplink and downlink NAS count value, confidentiality security protection key, integrity security protection key, selected integrity security protection algorithm identifier, confidentiality security protection algorithm identifier One or more.
- the UE sends a session establishment request message to the AMF, and correspondingly, the AMF receives the session establishment request message from the UE.
- the session establishment request message includes a session identifier for identifying the UE's session, and optionally, may also carry information such as session type and/or slice.
- the UE initiates a PDU session establishment request message, such as a PDU Session Establishment Request message, to the AMF via a satellite base station.
- a PDU session establishment request message such as a PDU Session Establishment Request message
- the session request message is a NAS message, which is transparently transmitted through the satellite base station, and the satellite base station does not parse the session establishment request message.
- AMF sends a session creation context request message to SMF, and correspondingly, SMF receives the session creation context request message from AMF.
- the session creation context request message includes a session identifier, and the session creation context request message may be an Nsmf_PDUSession_createSMContext Request message.
- the SMF may search for a corresponding user plane security policy (which may be referred to as a security protection policy or a user plane security protection policy) from the UDM or PCF or network management function network element according to the session identifier, to indicate whether the transport layer requires security protection.
- the user plane security policy includes a confidentiality security policy and/or an integrity security policy, wherein the confidentiality security policy is used to indicate whether the transport layer requires confidentiality security protection, and the integrity security policy is used to indicate whether the transport layer requires integrity security protection.
- the values of the security policy include required, preferred, and not needed. For example, when the value of the security policy is required, it indicates that the sender needs to perform security protection on the message and/or data to be sent; when the value of the security policy is not needed, it indicates that the sender does not need to perform security protection on the message and/or data to be sent; when the value of the security policy is preferred, it indicates that the sender needs to perform optional security protection on the message and/or data to be sent, that is, the sender can perform security protection on the message and/or data to be sent, or can perform no security protection on the message and/or data to be sent, and the security protection here includes confidentiality security protection and/or integrity security protection.
- the value of the integrity security policy when the value of the integrity security policy is required, it means that integrity security protection needs to be performed on the messages and/or data to be sent; when the value of the integrity security policy is not needed, it means that integrity security protection does not need to be performed on the messages and/or data to be sent; when the value of the integrity security policy is preferred, it means that integrity security protection can be performed on the messages and/or data to be sent, that is, integrity security protection can be performed on the messages and/or data to be sent, or integrity security protection can be omitted.
- the value of the confidentiality security policy when the value of the confidentiality security policy is required, it means that confidentiality security protection needs to be performed on the messages and/or data to be sent; when the value of the confidentiality security policy is not needed, it means that confidentiality security protection does not need to be performed on the messages and/or data to be sent; when the value of the confidentiality security policy is preferred, it means that confidentiality security protection can be performed on the messages and/or data to be sent, that is, confidentiality security protection can be performed on the messages and/or data to be sent, or confidentiality security protection can be omitted.
- integrity protection can be achieved by physical means or cryptographic methods to ensure that information and/or data are not tampered with or modified without authorization during generation, transmission, storage, and thereafter.
- cryptographic methods There are many ways to perform integrity protection on information through cryptographic methods, such as using a one-way function (such as a hash function) with a symmetric key (integrity security protection key) and a message as input parameters to generate a message authentication code (MAC) to achieve integrity protection of messages and/or data.
- integrity protection can refer to performing integrity protection on messages to be sent according to a selected integrity protection algorithm and integrity protection key.
- the integrity security protection key may be the NAS integrity key (NAS Integrity Key, Knasint), which is used to perform integrity security protection on the messages to be sent;
- the integrity security protection key may be the RRC integrity key (RRC Integrity Key, Krrcint), which is used to perform integrity security protection on the messages to be sent;
- the integrity security protection key may be the UP Integrity Key (Kupint), which is used to perform integrity security protection on the messages to be sent.
- confidentiality security protection may refer to encrypting messages and/or data to be sent according to a confidentiality security protection algorithm and a confidentiality security protection key.
- the security policy may be explicitly indicated, for example, using an independent information element (IE).
- IE independent information element
- “00” indicates that the value of the security policy is required
- "01” indicates that the value of the security policy is not needed
- "10” indicates that the value of the security policy is preferred
- “true” indicates that the value of the security policy is required
- “false” indicates that the value of the security policy is not needed, which is not limited in this application.
- the security algorithm includes an integrity security algorithm and/or a confidentiality security protection algorithm.
- the integrity security algorithm includes one or more of the following: AES integrity security protection algorithm, SNOW integrity security protection algorithm, ZUC integrity security protection algorithm, or null integrity security protection algorithm
- the confidentiality security protection algorithm includes one or more of the following: ZUC confidentiality security protection algorithm, AES confidentiality security protection algorithm, SNOW confidentiality security protection algorithm, or null integrity security protection algorithm.
- S304 SMF sends a session creation context response message to AMF, and correspondingly, AMF receives a session creation context response message from SMF.
- the session creation context response message includes a session identifier, a user plane security policy, and a session acceptance message.
- the session creation context response message may be an Nsmf_PDUSession_createSMContext Response message.
- the session acceptance message is carried in an N1 container.
- AMF sends a session resource establishment request message to the satellite base station, and correspondingly, the satellite base station receives the session resource establishment request message from AMF.
- the session resource establishment request message includes a session identifier, a user plane security policy and a session acceptance message
- the session resource establishment request message can be a PDU Session Resource Setup Request message.
- the satellite base station determines whether to activate security protection of the DRB corresponding to the session according to the user plane security policy.
- a session corresponds to one or more DRBs.
- one or more data #1 transmitted by a session can be carried by the one or more DRBs respectively, and usually one DRB carries one data #1.
- the user plane security policy is used to indicate whether to enable security protection of the DRB corresponding to the session.
- the satellite base station determines that the security protection of the DRB needs to be activated, that is, the security protection of the DRB is configured to be turned on; when the value of the user plane security policy is not needed, the satellite base station determines that the security protection of the DRB does not need to be activated, that is, the security protection of the DRB is configured to be not turned on; when the value of the user plane security policy is preferred, the satellite base station can determine whether to activate the security protection of the DRB according to the local policy, that is, determine whether to turn on the security protection according to the local policy.
- the local policy indicates that when the value of the user plane security policy is preferred, the satellite base station can choose to turn on the security protection, or the local policy indicates that when the value of the user plane security policy is preferred, the satellite base station can choose to turn on or not turn on the security protection according to its own load situation.
- the satellite base station when the value of the integrity security policy is required, the satellite base station activates the integrity security protection of the DRB corresponding to the session; when the value of the integrity security policy is not needed, the satellite base station activates the integrity security protection of the DRB corresponding to the session; when the value of the integrity security policy is preferred, the satellite base station activates or does not activate the integrity security protection of the DRB corresponding to the session according to the local policy.
- the satellite base station when the value of the confidentiality security policy is required, the satellite base station activates the confidentiality security protection of the DRB corresponding to the session; when the value of the confidentiality security policy is not needed, the satellite base station activates the confidentiality security protection of the DRB corresponding to the session; when the value of the confidentiality security policy is preferred, the satellite base station activates or does not activate the confidentiality security protection of the DRB corresponding to the session according to the local policy.
- the satellite base station and the UE can set the MAC to all 0s, which means that the satellite base station and the UE do not perform integrity security protection on the user plane messages and/or data carried on the DRB, and do not need to perform integrity verification on the user plane messages and/or data carried on the DRB.
- the MAC may not be included in the Packet Data Convergence Protocol (PDCP) data packet.
- the satellite base station sends an RRC reconfiguration message to the UE, and correspondingly, the UE receives the RRC reconfiguration message from the satellite base station.
- the RRC reconfiguration message may be an RRC Reconfiguration message.
- the RRC reconfiguration message includes a DRB identifier (e.g., DRB ID) and its corresponding user plane security indication (UP sec indication), such as an integrity security protection indication and/or a confidentiality security protection indication.
- DRB ID e.g., DRB ID
- UP sec indication user plane security indication
- the integrity security protection indication is used to indicate whether the integrity security protection of the DRB is enabled, or whether the integrity security protection of the DRB needs to be activated.
- the confidentiality security protection indication is used to indicate whether the confidentiality security protection of the DRB is enabled, or whether the confidentiality security protection of the DRB needs to be activated.
- the RRC reconfiguration message also includes the session acceptance message.
- the size of the integrity security protection indication and/or confidentiality security protection indication can be 1 bit.
- the value of the confidentiality indication information is "1", indicating that the confidentiality security protection of the DRB is enabled; the value of the confidentiality indication information is "0”, indicating that the confidentiality security protection of the DRB is not enabled.
- the value of the integrity indication information is "1”, indicating that the integrity security protection of the DRB is enabled; the value of the integrity indication information is "0”, indicating that the integrity security protection of the DRB is not enabled.
- the values of the integrity security protection indicator and the confidentiality security protection indicator may be determined according to a user plane security policy received by the satellite base station.
- the satellite base station can set the value of the integrity security protection indication corresponding to DRB#1 and DRB#2 to "1" and the value of the confidentiality security protection indication to "0", which are carried in the RRC reconfiguration message of step S307.
- the satellite base station configures the PDCP entity of the DRB corresponding to the session.
- the user plane security policy indicates to activate integrity security protection and not to activate confidentiality security protection
- the user plane security indication in the RRC reconfiguration message is used to instruct DRB#1 and DRB#2 to enable integrity security protection and not to enable confidentiality security protection.
- the satellite base station configures the integrity security protection key and integrity security protection algorithm corresponding to DRB#1 and DRB#2 in the PDCP entity, and activates the integrity check of the uplink user plane messages and/or data on the DRB#1 and DRB#2, and activates the integrity security protection of the downlink user plane messages and/or data on the DRB#1 and DRB#2.
- the UE performs an integrity check on the RRC reconfiguration message.
- the UE performs an integrity check on the received RRC reconfiguration message. For example, the UE compares the MAC#3 value carried in the RRC reconfiguration message with the MAC#4 calculated locally by the UE. If the two are the same, it can be considered that the integrity check has passed; otherwise, the integrity check has failed.
- the UE configures the PDCP entity corresponding to the DRB.
- the UE configures the integrity security protection key and integrity security protection algorithm corresponding to DRB#1 in the PDCP entity, and activates the integrity security protection of the uplink user plane message on the DRB#1, and activates the integrity check of the downlink user plane message on the DRB#1.
- the UE configures the confidentiality security protection key and confidentiality security protection algorithm corresponding to DRB#2 in the PDCP entity, and activates the confidentiality security protection of the uplink user plane message on the DRB#2, and activates the decryption operation of the downlink user plane message on the DRB#2.
- the UE sends an RRC reconfiguration completion message to the satellite base station, and correspondingly, the satellite base station receives the RRC reconfiguration completion message from the UE.
- the UE if the UE successfully verifies the integrity of the RRC reconfiguration message in step S309, the UE sends an RRC reconfiguration complete message to the satellite base station.
- the RRC reconfiguration complete message may be an RRC Reconfiguration Complete message.
- the UE may send a failure cause value to the satellite base station, which may indicate that the integrity check of the RRC reconfiguration message has failed.
- the satellite base station sends a session resource establishment response message to the AMF, and correspondingly, the AMF receives a session resource establishment response message from the satellite base station.
- the session resource establishment response message is used to inform the session resource establishment result, such as success or failure.
- the session resource establishment response message can be a PDU Session Resource Setup Response message. It should be understood that the technical solution of the present application is based on the successful establishment of the session resource.
- the core network element in the above method 300 may be a mobility management entity (Mobility Management Entity, MME), a serving gateway (Serving GateWays, S-GWs), or a public data network (Public Data Network, PDN GWs or P-GWs).
- MME mobility management entity
- S-GWs serving gateway
- PDN GWs Public Data Network
- P-GWs Public Data Network
- the service link and the feeder link may not be connected at the same time.
- the satellite base station can perform a store-and-forward operation (Store and Forward), that is, the satellite base station can store the received uplink message, that is, cache the uplink message on the satellite base station, and wait until the feeder link is restored, and then forward the stored uplink information to the ground network.
- Store and Forward a store-and-forward operation
- the object of the store-and-forward operation can be signaling plane data or user plane data. For ease of description and understanding, this application takes user plane data as an example for illustration.
- the storage area of the satellite base station may be filled up, and the control plane data and/or user plane data of normal UEs may not be cached.
- the control plane data and/or user plane data of normal UEs may not be cached.
- the present application provides a secure communication method and a communication device, which can reduce the risk of satellite base stations being maliciously attacked and improve network communication security.
- the communication method provided by the embodiment of the present application will be described in detail below with reference to the accompanying drawings.
- the embodiment provided by the present application can be applied to a communication scenario where a transmitting device and a receiving device communicate, such as being applied to the communication system shown in the above-mentioned Figures 1 and 2.
- Figure 4 is a flow chart of the communication method provided by an embodiment of the present application.
- the method 400 can be executed by the terminal device side, the network device side and the core network side.
- the method can be executed by the terminal device, the network device and the core network element (such as the session management element), or it can also be executed by the chip or circuit of the terminal device, the network device and the core network element (such as the session management element), or it can also be implemented by a logic module or software that can realize all or part of the functions of the communication device, and the present application does not limit this.
- the following is an example of the execution subject being the terminal device, the network device and the session management element.
- the method includes the following multiple steps. The part that is not described in detail can refer to the above method 300 or the existing protocol.
- the network device determines whether to activate the integrity security protection of the session according to the first information, and the first information is used to indicate whether the network device supports the store-and-forward operation (which may be referred to as capability information).
- a session is used to transmit data between the terminal device and the core network.
- a session corresponds to one or more DRBs, which means that one or more data transmitted by a session can be carried by the one or more DRBs respectively.
- one DRB carries one data, and the DRB is used to carry data between the terminal device and the network device.
- whether to activate the integrity security protection of the session can be understood as: whether to activate the integrity security protection of one or more DRBs corresponding to the session, and can also be understood as: whether the integrity security protection of the data transmitted between the terminal device and the network device is enabled.
- the method further includes: the network device acquires first information.
- the first information may be predefined, or configured or preconfigured through signaling.
- Predefinition may include predefinition, such as protocol definition, and preconfiguration may be implemented by pre-saving corresponding codes, tables, strings or other methods that can be used to indicate the first information in the network device, and the present application does not limit the specific implementation method thereof.
- the first information may also be used to indicate whether the network device is configured to enable a store-and-forward operation (which may be referred to as configuration information), and/or the first information may also be used to indicate whether the network device is deployed on a satellite (which may be referred to as location information).
- configuration information which may be referred to as configuration information
- location information may be used to indicate whether the network device is deployed on a satellite.
- the present application may refer to a network device deployed on a satellite as a satellite base station, and a network device not deployed on a satellite as a ground base station.
- the first information in the present application may include one or more of capability information, configuration information, or location information of the network device.
- a network device to determine whether to activate integrity security protection of a session based on first information, or a satellite base station to activate or not activate integrity security protection of a session based on a first message, including one or more of the following.
- the network device determines whether to activate the integrity security protection of the session according to the capability information. In other words, the network device determines whether to activate or not activate the integrity security protection of the session according to the capability information.
- the network device determines to activate the integrity security protection of the session, that is, the integrity security protection of the session can be directly activated without considering the integrity security policy; for another example, when the capability information indicates that the network device does not support the store-and-forward operation, the network device determines not to activate the integrity security protection of the session.
- the network device can determine whether to activate the integrity security protection of the session according to the user plane integrity security policy obtained in step S403.
- the network device when the network device supports store-and-forward operations, the network device activates the integrity security protection of the session; when the network device does not support store-and-forward operations, the network device does not activate the integrity security protection of the session, or may activate or not activate the integrity security protection of the session according to the user plane integrity security policy.
- the network device determines whether to activate the integrity security protection of the session according to the configuration information, or in other words, the network device activates or does not activate the integrity security protection of the session according to the configuration information.
- the network device determines to activate the integrity security protection of the session, that is, the integrity security protection of the session can be directly activated without considering the integrity security policy; for another example, when the configuration information indicates that the network device does not enable the store-and-forward operation, the network device determines not to activate the integrity security protection of the session.
- the network device can determine whether to activate the integrity security protection of the session according to the user plane integrity security policy obtained in step S403.
- the network device when the network device is configured to enable the store-and-forward operation, the network device activates the integrity security protection of the session; when the network device is configured not to enable the store-and-forward operation, the network device does not activate the integrity security protection of the session, or can activate or not activate the integrity security protection of the session according to the user plane integrity security policy.
- the network device determines whether to activate the integrity security protection of the session based on the location information. In other words, the network device activates or does not activate the integrity security protection of the session based on the location information.
- the network device determines to activate the integrity security protection of the session, that is, there is no need to consider the integrity security policy, and the integrity security protection of the session can be directly activated; for another example, when the location information indicates that the network device is deployed on a non-satellite, such as the network device is a ground base station, the network device does not activate the integrity security protection of the session, or can determine whether to activate the integrity security protection of the session according to the user plane integrity security policy obtained in step S403.
- the network device when the network device is deployed on a satellite, the network device activates the integrity security protection of the session; when the network device is deployed on the ground, the network device does not activate the integrity security protection of the session, or may activate or not activate the integrity security protection of the session according to the user plane integrity security policy.
- the network device determines whether to activate the integrity security protection of the session based on the first information, or in other words, the network device activates or does not activate the integrity security protection of the session based on the first information.
- the technical logic of the above (1)-(3) is the same, that is, the network device can activate or not activate the integrity security protection of the session based on the first information without considering the user plane integrity security policy.
- This method allows the user plane data to have integrity security protection as much as possible, which facilitates the subsequent network device to perform integrity verification on the received uplink message and/or data, thereby ensuring the security of network communications and reducing the risk of denial of service attacks.
- the network device may also consider the user plane integrity security policy corresponding to the session, that is, the network device may determine whether to activate the integrity security protection of the session based on the first information and the user plane integrity security policy.
- the method also includes the following step S404.
- S404 The network device determines whether to activate integrity security protection of the session according to the first information and the user plane integrity security policy.
- the user plane integrity security policy is used to indicate whether to activate the integrity security protection of the session.
- the user plane integrity security policy is used to indicate whether to activate the integrity security protection of the session.
- the session management network element obtains a user plane integrity security policy for the session, for example, see the following step S403.
- the network device obtains a user plane integrity security policy corresponding to the session.
- the values of the user plane integrity security policy include required, preferred, and not needed. For example, when the value of the user plane integrity security policy is required, it means that integrity security protection is enabled for the session; when the value of the user plane integrity security policy is not needed, it means that integrity security protection is not enabled for the session; when the value of the user plane integrity security policy is preferred, it means that integrity security protection can be enabled optionally for the session.
- the user plane integrity security policy can be explicitly indicated, for example, using an independent information element IE.
- an independent information element IE For example, through 2 bits of indication information, "00" indicates that the value of the user plane integrity security policy is required, "01” indicates that the value of the user plane integrity security policy is not needed, and “10” indicates that the value of the user plane integrity security policy is preferred; or, “true” indicates that the value of the user plane integrity security policy is required, and "false” indicates that the value of the user plane integrity security policy is not needed.
- This application does not limit its expression form.
- the network device obtains the user plane integrity security policy corresponding to the session from the session management network element, for example, see the following step S402.
- the session management network element sends a user plane integrity security policy corresponding to the session to the network device, and correspondingly, the network device receives the user plane integrity security policy corresponding to the session from the session management network element.
- the session management network element sends a user plane integrity security policy to a mobile access management network element (eg, AMF), and the mobile access management network element then sends the user plane integrity security policy to a network device.
- a mobile access management network element eg, AMF
- the session management network element may actively send the user plane integrity security policy corresponding to the session to the network device, or may send it based on a request from the network device.
- the network device sends a request message to the session management network element, and the request message is used to obtain the user plane integrity security policy corresponding to the session.
- the session management network element may send the user plane integrity security policy corresponding to the session to the network device after receiving the request message.
- the session management network element determines the user plane integrity security policy of the session.
- the session management network element may determine the user plane integrity security policy of the session through the acquired indication information, for example, see the following step S401.
- the session management network element obtains indication information.
- the indication information is used to indicate that the network device is deployed on a satellite.
- the indication information is also used to indicate that the network device supports a store-and-forward operation and/or that the network device is configured to enable a store-and-forward feature.
- the network equipment is deployed on the satellite, which can be understood as the network equipment (such as a base station) being physically deployed on the satellite, or the network equipment (such as a base station) and the satellite being co-located.
- the satellite has the capabilities of the network equipment, for example, the satellite supports the storage and forwarding operation of the network equipment.
- the session management network element receives indication information from the mobile access management network element (such as AMF). For example, during the session establishment process of the terminal device, the mobile access management network element sends a session creation context request message to the session management network element, and the session creation context request message carries the indication information.
- the mobile access management network element such as AMF
- the user plane integrity security policy corresponding to the session is determined according to the indication information, or the session management network element can determine the user plane integrity security policy corresponding to the session according to the indication information.
- the indication information determines that the network device is deployed on a satellite, or the network device supports store-and-forward operations, or the network device is configured to enable the store-and-forward feature, then considering the limited storage resources of the network device and to avoid potential DoS risks, the session management network element can set the value of the user integrity security policy to required, that is, the session management network element can determine to enable or activate integrity security protection according to the indication information, that is, the data subsequently transmitted between the terminal device and the network device are all protected by integrity security, that is, the data transmitted between the terminal device and the network device need to be integrity checked, and then the data that passes the integrity check is stored and forwarded.
- the user plane integrity security policy corresponding to the session can also be determined according to the contract information, or the session management network element can determine the user plane integrity security policy corresponding to the session according to the contract information.
- the contract information is used to indicate whether the terminal device has signed a contract for the store-and-forward operation service.
- the session management network element can set the value of the user plane integrity security policy corresponding to the session to required, that is, the session management network element can enable the integrity security protection of the session according to the contract information, that is, the subsequent uplink and downlink data transmitted between the terminal device and the network device are all protected by integrity security, that is, the terminal device and the network device need to perform integrity verification on the received user plane data; for another example, if the contract information indicates that the terminal device has not signed a contract for the store-and-forward operation service, the session management network element can set the value of the user plane integrity security policy corresponding to the session to preferred, that is, the session management network element can determine the optional opening of the integrity security protection of the session according to the contract information, and then the network device determines whether to open or not the integrity security protection of the session according to the local policy.
- the user plane integrity security policy corresponding to the session can also be determined based on the contract information and the indication information, or in other words, the session management network element can determine the user plane integrity security policy corresponding to the session based on the indication information and the contract information. For example, if the indication information determines that the network device is deployed on a satellite, or the network device supports store-and-forward operations, or the network device is configured to enable the store-and-forward feature, and the contract information indicates that the terminal device has signed a contract for the store-and-forward operation service, then the session management network element can set the value of the user plane integrity security policy corresponding to the session to required, indicating that integrity security protection for the session is enabled; for another example, if the indication information determines that the network device is not deployed on a satellite, or the network device does not support store-and-forward operations, or the network device is configured to disable the store-and-forward feature, and the contract information indicates that the terminal device has not signed a contract for the store-and-forward operation service, then the session management
- the session management network element may set the user plane integrity security policy corresponding to the session to a value of preferred, indicating that enabling integrity security protection for the session is optional, and the network device then determines whether to enable integrity security protection for the session based on local policies.
- the session management network element may obtain the above-mentioned subscription information from the UDM or PCF. For example, the session management network element sends a query message to the UDM or PCF to obtain the subscription information of the terminal device, and correspondingly, the UDM or PCF sends the subscription information of the terminal device to the session management network element.
- the present application does not limit the order in which the session management network element obtains the above-mentioned signing information and indication information.
- the network device determining whether to activate the integrity security protection of the session based on the first information and the user plane integrity security policy in the above step S404, or the satellite base station activating or not activating the integrity security protection of the session based on the first message and the user plane integrity security policy, including one or more of the following.
- the network device determines whether to activate the integrity security protection of the session based on the capability information and the user plane integrity security policy. In other words, the network device activates or does not activate the integrity security protection of the session based on the capability information and the user plane integrity security policy.
- the network device determines to activate the integrity security protection of the session; for another example, when the capability information indicates that the network device supports store-and-forward operations and the value of the user-plane integrity security policy is not needed, the network device determines not to activate the integrity security protection of the session. In this implementation, the network device determines whether to activate the integrity security protection of the session, mainly based on the user-plane integrity security policy; for another example, when the capability information indicates that the network device supports store-and-forward operations and the value of the user-plane integrity security policy is not needed, the network device determines to activate the integrity security protection of the session.
- the network device determines whether to activate the integrity security protection of the session, mainly based on whether the network device supports store-and-forward operations; for another example, when the capability information indicates that the network device does not support store-and-forward operations, regardless of the value of the user-plane integrity security policy is required, preferred or not needed, the network device determines not to activate the integrity security protection of the session.
- the network device determines whether to activate the integrity security protection of the session based on the configuration information of the network device and the user plane integrity security policy. In other words, the network device activates or does not activate the integrity security protection of the session based on the configuration information of the network device and the integrity security policy.
- the network device determines to activate the integrity security protection of the session; for another example, when the configuration information indicates that the network device is configured to enable a store-and-forward operation, and the value of the user-plane integrity security policy is not needed, the network device determines not to activate the integrity security protection of the session.
- the network device determines whether to activate the integrity security protection of the session, mainly based on the user-plane integrity security policy; for another example, when the configuration information indicates that the network device is configured to enable a store-and-forward operation, and the value of the user-plane integrity security policy is not needed, the network device determines to activate the integrity security protection of the session.
- the network device determines whether to activate the integrity security protection of the session, mainly based on whether the network device is configured to enable the store-and-forward operation; for another example, when the configuration information indicates that the network device is configured not to enable a store-and-forward operation, regardless of the value of the user-plane integrity security policy is required, preferred or not needed, the network device determines not to activate the integrity security protection of the session.
- the network device determines whether to activate the integrity security protection of the session based on the location information and the user plane integrity security policy. In other words, the network device activates or does not activate the integrity security protection of the session based on the location information and the user plane integrity security policy.
- the network device determines to activate the integrity security protection of the session; for another example, when the location information indicates that the network device is deployed on a satellite and the value of the user-plane integrity security policy is not needed, the network device determines not to activate the integrity security protection of the session.
- the network device determines whether to activate the integrity security protection of the session, mainly based on the user-plane integrity security policy; for another example, when the location information indicates that the network device is deployed on a satellite and the value of the user-plane integrity security policy is not needed, the network device determines not to activate the integrity security protection of the session.
- the network device determines whether to activate the integrity security protection of the session, mainly based on the network device being a satellite base station; for another example, when the location information indicates that the network device is deployed on a non-satellite (for example, the network device is a ground base station), regardless of the value of the user-plane integrity security policy is required, preferred or not needed, the network device determines not to activate the integrity security protection of the session.
- the network device determines whether to activate the integrity security protection of the session, mainly based on the network device being a satellite base station; for another example, when the location information indicates that the network device is deployed on a non-satellite (for example, the network device is a ground base station), regardless of the value of the user-plane integrity security policy is required, preferred or not needed, the network device determines not to activate the integrity security protection of the session.
- the network device determines whether to activate the integrity security protection of the session according to the first information user plane integrity security policy, or in other words, the network device activates or does not activate the integrity security protection of the session according to the first information user plane integrity security policy.
- the technical logic of the above (4)-(6) is the same, that is, the network device supports maximally activating the integrity security protection of the session, which can ensure that the integrity security protection of the user plane data is activated to the maximum extent, so that the subsequent network device can perform integrity verification on the received uplink message and/or data, ensure the security of network communication, and reduce the risk of denial of service attacks.
- steps S401-S404 may be executed before step S410, or steps S401-S404 may be executed after step S410, or steps S401-S403 may be executed before step S410 and step S404 may be completed after step S410, as long as steps S401-S404 are executed before the following step S420.
- the network device sends first integrity security protection indication information to the terminal device, and correspondingly, the terminal device receives the first integrity security protection indication information from the network device.
- the first integrity security protection indication information is used to indicate an activation result.
- the activation result is used to indicate whether to activate the integrity security protection of the session, or in other words, the activation result is used to indicate whether to activate the integrity security protection of one or more DRBs corresponding to the session.
- the activation result includes activating the integrity security protection of the session, or not activating the integrity security protection of the session.
- the network device sends an RRC reconfiguration message to the terminal device, such as an RRC Reconfiguration message, where the RRC reconfiguration message carries first integrity security protection indication information.
- the first integrity security protection indication information may be explicitly indicated, for example, using an independent information element IE to indicate.
- an independent information element IE For example, through 1-bit indication information, "1" indicates that the integrity security protection of the session is activated, and "0" indicates that the integrity security protection of the session is not activated; or, “true” indicates that the integrity security protection of the session is activated, and “false” indicates that the integrity security protection of the session is not activated.
- This application does not limit its expression form.
- the first integrity security protection indication information is determined based on the first information. For example, based on the above step S410, if the network device determines to activate the integrity security protection of the session based on the first information, the first integrity security protection indication information is used to indicate the activation of the integrity security protection of the session; if the network device determines not to activate the integrity security protection of the session based on the first information, the first integrity security protection indication information is used to indicate not to activate the integrity security protection of the session.
- the first integrity security protection indication information is determined according to the first information and the user plane security protection policy. For example, based on the above step S404, if the network device determines to activate the integrity security protection of the session according to the first information and the user plane security protection policy, the first integrity security protection indication information is used to indicate the integrity security protection of the activated session; if the network device determines not to activate the integrity security protection of the session according to the first information and the user plane security protection policy, the first integrity security protection indication information is used to indicate the integrity security protection of the not activated session.
- the size of the first integrity security protection indication information can be 1 bit.
- the value of the first integrity security protection indication information is "1", indicating that the integrity security protection corresponding to the session is turned on, or one or more DRBs corresponding to the session have integrity security protection turned on, that is, one or more data carried on the one or more DRBs between the terminal device and the network device are integrity-protected, and the terminal device or the network device needs to perform an integrity check after receiving the one or more data;
- the value of the first integrity security protection indication information is "0", indicating that the integrity security protection corresponding to the session is not turned on, or one or more DRBs corresponding to the session do not have integrity security protection turned on, that is, one or more data carried on the one or more DRBs between the terminal device and the network device are not integrity-protected, and the terminal device or the network device does not need to perform an integrity check after receiving the one or more data.
- the network device may configure the PDCP entity of one or more DRBs corresponding to the session.
- the terminal device performs an integrity check on the first integrity security protection indication information.
- the terminal device can configure the PDCP entity of one or more DRBs corresponding to the session.
- the terminal device configures the integrity security protection key and integrity security protection algorithm of the one or more DRBs corresponding to the session in the PDCP entity, and activates the integrity security protection of the uplink user plane messages and/or data carried by the one or more DRBs, and activates the integrity check of the downlink user plane messages and/or data carried by the one or more DRBs;
- the terminal device does not need to configure the integrity security protection key and integrity security protection algorithm of the one or more DRBs corresponding to the session in the PDCP entity, and does not need to activate the integrity security protection of the uplink user plane messages and/or data carried by the one or more DRBs, and does not need to activate
- the terminal device may send a response message to the network device to indicate whether the terminal device has successfully activated the integrity security protection of the session. For example, if the terminal device successfully activates the integrity security protection of the session, the terminal device sends a response message #1 to the network device to indicate that the terminal device has successfully activated the integrity security protection of the session.
- the terminal device may send an RRC reconfiguration completion message to the network device to indicate that the terminal device has successfully activated the integrity security protection of the session, or in other words, to indicate that the terminal device has successfully configured the PDCP entity of one or more DRBs corresponding to the session.
- the terminal device if the terminal device fails to successfully activate the integrity security protection of the session, the terminal device sends a response message #2 to the network device to indicate that the terminal device has failed to successfully activate the integrity security protection of the session.
- the response message #2 may carry a failure cause value, for example, the failure cause value may be used to indicate that the verification of the first integrity security protection indication information has failed.
- the network device performs an integrity check on the received uplink message and/or data, and stores the uplink data if the integrity check passes, and does not store the uplink data or discards the uplink data if the integrity check fails.
- This can ensure the security of network communications while reducing the risk of DoS attacks.
- the specific implementation method can refer to the relevant description of the following method 500, which will not be explained here.
- the above method 300 is described by taking user plane integrity security protection, user plane integrity security policy, or integrity verification as an example, which is only an example given for ease of understanding and does not constitute a limitation on the technical solution of the present application.
- the technical solution of the present application is also applicable to user plane confidentiality security protection, user plane confidentiality security policy, or decryption operation, etc.
- the specific implementation method can refer to the above related description, which will not be described here.
- the network device determines whether to activate the integrity security protection of the session based on the first information, and can also consider the user plane integrity security policy and/or the local policy of the network device in addition, and turn on or activate the integrity security protection of the session as much as possible, so that the user plane data received by the network device is protected by integrity security to the greatest extent, so that in the scenario where the feeder link is disconnected, only the user plane data that has passed the integrity check is stored, which not only alleviates the potential risk of denial of service DoS attacks, but also ensures the security of network communications.
- FIG5 is a flow chart of a communication method 500 provided in an embodiment of the present application.
- the terminal device is UE
- the network device is base station
- the core network element is AMF or SMF as the execution subject to interact.
- the present application may refer to the base station deployed on the satellite as a satellite base station, and the base station deployed on a non-satellite, such as a base station deployed on the ground as a ground base station.
- This method can be regarded as a further refinement of the above-mentioned method 400.
- the embodiment shown in FIG5 and the embodiment shown in FIG4 can be coupled with each other and can be used as a reference to each other.
- the relevant description in the above-mentioned method 400 is also applicable to this implementation method.
- the same or similar technical means may exist between the two.
- the content described in the embodiment shown in FIG4 will not be repeated.
- the method includes the following multiple steps. The part not described in detail can refer to the above-mentioned method 400 or the existing protocol.
- the embodiment of the present application does not limit the number of UEs registered to the same network. It should be understood that for the scenario where multiple UEs are registered to the network, the process of each UE establishing a session and the specific implementation of activating or not activating the user plane integrity security protection of the session are similar. For ease of description, this implementation is described by taking an example of a UE registering to the network, establishing a session, and determining whether to activate or not activate the user plane integrity security protection of the session.
- the UE sends a session establishment request message to the AMF, and correspondingly, the AMF receives the session establishment request message from the UE.
- one session can correspond to one or more DRBs. It should be understood that the session is used to transmit data between the UE and the core network. For example, one session is used to transmit one or more data.
- the one or more data can be carried by the one or more DRBs respectively, and usually one DRB carries one data.
- AMF sends a session creation context request message to SMF, and correspondingly, SMF receives the session creation context request message from AMF.
- AMF sends a session resource establishment request message to the satellite base station, and correspondingly, the satellite base station receives the session resource establishment request message from the AMF.
- the satellite base station determines whether to activate the integrity security protection of the session according to the first information. In other words, the satellite base station activates or does not activate the integrity security protection of the session according to the first information.
- whether to activate the integrity security protection of the session can be understood as whether to activate the integrity security protection of one or more DRBs corresponding to the session, or whether integrity security protection is enabled for the data transmitted between the terminal device and the network device.
- the satellite base station obtains first information, for example, the first information includes one or more of capability information, configuration information, or location information of the network device.
- the specific implementation of obtaining the first information and the meaning of the first information can refer to the relevant description of step S410 of the above method 400.
- the satellite base station determines whether to activate the integrity security protection of the session according to the capability information. In other words, the satellite base station determines whether to activate or not activate the integrity security protection of the session according to the capability information.
- the satellite base station determines whether to activate the integrity security protection of the session according to the configuration information. In other words, the satellite base station activates or does not activate the integrity security protection of the session according to the configuration information.
- the base station determines whether to activate the integrity security protection of the session according to the location information. In other words, the base station activates or does not activate the integrity security protection of the session according to the location information.
- the satellite base station may determine whether to activate the integrity security protection of the session based on the first information and the user plane integrity security policy carried in the above step S505. In other words, the satellite base station activates or does not activate the integrity security protection of the session based on the first information and the user plane integrity security policy.
- An example illustration includes one or more of the following. The specific implementation method may refer to the relevant description of step S404 of the above method 400.
- the satellite base station determines whether to activate the integrity security protection of the session based on the capability information and the user plane integrity security policy. In other words, the satellite base station activates or does not activate the integrity security protection of the session based on the capability information and the user plane integrity security policy.
- the satellite base station determines whether to activate the integrity security protection of the session based on the configuration information and the user plane integrity security policy. In other words, the satellite base station activates or does not activate the integrity security protection of the session based on the configuration information of the base station and the user plane integrity security policy.
- the base station determines whether to activate the integrity security protection of the session based on the location information and the user plane integrity security policy. In other words, the satellite base station activates or does not activate the integrity security protection of the session based on the location information and the user plane integrity security policy.
- the satellite base station sends an RRC reconfiguration message to the UE, and correspondingly, the UE receives the RRC reconfiguration message from the satellite base station.
- the RRC reconfiguration message may be an RRC Reconfiguration message.
- the RRC reconfiguration message includes one or more DRB identifiers (e.g., DRB ID) corresponding to the session, and an integrity security protection indication of the one or more DRBs, wherein the integrity security protection indication is used to indicate whether integrity security protection is enabled for the one or more DRBs, or whether integrity security protection needs to be activated for the one or more DRBs.
- DRB ID e.g., DRB ID
- integrity security protection indication is used to indicate whether integrity security protection is enabled for the one or more DRBs, or whether integrity security protection needs to be activated for the one or more DRBs.
- the RRC reconfiguration message may also include the session acceptance message carried in step S505.
- S508 The UE performs an integrity check on the RRC reconfiguration message.
- the UE configures the PDCP entity of the one or more DRBs.
- the UE sends an RRC reconfiguration completion message to the satellite base station, and correspondingly, the satellite base station receives the RRC reconfiguration completion message from the UE.
- the satellite base station sends a session resource establishment response message to the AMF, and correspondingly, the AMF receives a session resource establishment response message from the satellite base station.
- the satellite base station performs an integrity check on the received uplink data to determine whether to store the uplink data, thereby reducing the risk of DoS attacks while ensuring network communication security.
- connection between the satellite base station and the ground core network is disconnected, such as the feeder link is disconnected.
- the triggering condition for the feeder link disconnection includes one or more of the following:
- the satellite base station flies to the side away from the ground gateway station, that is, the ground gateway station cannot receive the signal transmitted by the satellite base station;
- the above triggering conditions may also include:
- the load of the satellite base station is greater than a first threshold.
- the first threshold may be predefined, such as defined by a protocol, or the first threshold may be configured or preconfigured, which is not limited in the present application.
- the specific implementation method of integrity verification includes any of the following:
- the satellite base station performs integrity check on all received uplink data
- the satellite base station determines whether to perform integrity check on the received uplink data based on the session granularity.
- the satellite base station determines in step S506 to activate the user plane integrity security protection of the session, the satellite base station needs to perform integrity check on the one or more uplink data received by the satellite base station through one or more DRBs corresponding to the session; or, if the satellite base station determines in step S506 not to activate the user plane integrity security protection of the session, the satellite base station does not need to perform integrity check on the one or more uplink data received by the satellite base station through one or more DRBs corresponding to the session, and optionally, the satellite base station may directly discard the one or more uplink data.
- the satellite base station determines whether to perform integrity check on the received uplink data based on the DRB granularity.
- the satellite base station can further determine whether to activate the user plane integrity security protection of the one or more DRBs based on local policies, such as its own load conditions. Assuming that the session corresponds to two DRBs (such as DRB#1 and DRB#2), when it is determined according to the first information and/or the user plane integrity security policy that the user plane integrity security protection of the session can be optionally enabled, the satellite base station determines according to its own load that DRB#1 enables user plane integrity security protection, and DRB#2 does not enable user plane integrity security protection.
- local policies such as its own load conditions.
- the satellite base station For uplink data #1 received by the satellite base station through DRB#1, the satellite base station needs to perform integrity check on uplink data #1, and for uplink data #2 received by the satellite base station through DRB#2, the satellite base station does not need to perform integrity check on uplink data #2. Optionally, the satellite base station can directly discard uplink data #2.
- the MAC value calculation and judgment method involved in the integrity verification process can refer to the relevant description of the above method 300, which will not be repeated here.
- the satellite base station determines whether to store the uplink data according to the verification result.
- the check result is used to indicate whether the integrity check of the received uplink data by the satellite base station in the above step S513 is passed, including whether the check is successful (passed) or failed (failed).
- the satellite base station stores uplink data that passes the integrity check, does not store or discards uplink data without integrity security protection, or does not store or discards uplink data that fails the integrity check.
- the satellite base station determines whether to activate the integrity security protection of the session based on one or more of the user plane integrity security policy, local policy, capability information, configuration information, or location information of the satellite base station, and turns on the session integrity security protection as much as possible, so that the user plane data received by the satellite base station is protected by integrity security to the greatest extent.
- the satellite base station In the scenario where the feeder link is disconnected, the satellite base station only stores data that has passed the integrity check, which can alleviate potential DoS risks and ensure network communication security.
- Figures 4 and 5 are in the process of establishing a session of the terminal device, and the satellite base station activates the integrity security protection of the session to the maximum extent according to the first information, thereby alleviating potential DoS risks and ensuring network communication security.
- the schemes shown in Figures 6 and 7 below when the feeder link is disconnected, the satellite base station and the UE release the session and/or DRB for which the integrity security protection is not activated, or the satellite base station and the UE modify the integrity security protection state of the session and/or DRB to an activated state, thereby reducing the processing load of the UE and the satellite base station, avoiding potential DoS risks, and ensuring network communication security.
- FIG6 is a flow chart of a communication method provided by an embodiment of the present application.
- the method 600 can be executed by a terminal device, a network device, and a core network element (such as a session management element), or it can also be executed by a chip or circuit of a terminal device, a network device, and a core network element (such as a session management element), or it can also be implemented by a logic module or software that can realize all or part of the functions of the communication device, and the present application does not limit this.
- the following is an example of an execution subject being a terminal device, a network device, and a session management element.
- the method includes the following multiple steps, and the part not described in detail can refer to the above methods 300-500, or the existing protocol.
- the network device determines to release the session and/or the first DRB.
- the network device determines that there is no need to modify the integrity security protection status of the session and/or the first DRB, that is, at this time the integrity security protection status of the session and/or the first DRB is activated.
- the network device determines to modify the integrity security protection state of the session and/or the first DRB, that is, to change it from an inactivated state to an activated state.
- the first link is a link between the network device and the core network.
- the first link may be a feeder link.
- the triggering condition for disconnection of the first link may refer to the relevant description of step S511 of the above method 500 and will not be described here.
- the network device determines whether to release the first DRB based on the first integrity security protection indication information, or the network device determines whether to modify the integrity security protection status of the first DRB based on the first integrity security protection indication information.
- the network device determines whether to release the first DRB based on the first integrity security protection indication information, or the network device determines whether to modify the integrity security protection status of the first DRB based on the first integrity security protection indication information.
- the network device determines to release the session and/or the first DRB.
- the network device determines not to release the session and/or the first DRB.
- the network device determines to keep the integrity security protection state of the session and/or the first DRB as activated.
- the corresponding triggering conditions may include one or more of the following:
- the network equipment supports store-and-forward operations and the feeder link is disconnected
- the load of the network device is greater than a first threshold.
- the first threshold may be predefined, such as a protocol definition, or the first threshold may be configured or preconfigured, which is not limited in the present application.
- the network device may store the identifier of the session and/or the first DRB; and/or record that the integrity security protection state of the session and/or the first DRB before modification is in an inactivated state, for subsequent targeted restoration of the session and/or the first DRB and its integrity security protection state before modification.
- the present application does not limit the storage of the identifier of the session and/or the first DRB; and/or, the timing of recording the inactive integrity security protection state of the session and/or the first DRB before modification.
- the network device may do so after sending the first message to the terminal device, that is, after step S640, and/or, the network device may do so before sending the second message to the terminal device.
- the specific implementation method may refer to the relevant description of the following step S660, which will not be explained here.
- the network device sends a first message to the terminal device, and correspondingly, the terminal device receives the first message from the network device.
- the first message is used to indicate the release result or modification result of the session and/or the first DRB.
- the first message may be an RRC reconfiguration message, such as an RRC Reconfiguration message.
- the release result indicates the release of the session and/or the first DRB.
- the release result indicates that the session and/or the first DRB will not be released.
- the modification result indicates that the integrity security protection state of the session and/or the first DRB is modified to an activated state.
- the modification result indicates that the integrity security protection state of the first DRB is kept activated.
- S650 The terminal device performs an integrity check on the first message.
- the terminal device may determine whether the integrity check passes by comparing the MAC value.
- the specific implementation method may refer to the relevant description of the above method 300 and will not be described again here.
- the terminal device determines whether to release the first DRB based on the release result, or determines whether to modify the integrity security protection status of the first DRB based on the modification result.
- the terminal device can further determine whether to release the session and/or the first DRB, or whether to modify the integrity security protection status of the session and/or the first DRB.
- the terminal device releases the session and/or the first DRB, and the terminal device cannot subsequently send uplink data through the session and/or the first DRB, and cannot receive downlink data through the session and/or the first DRB; for another example, if the first message indicates not to release the first DRB, the terminal device does not release the session and/or the first DRB, and the terminal device can subsequently still send uplink data through the session and/or the first DRB, and receive downlink data through the session and/or the first DRB.
- whether integrity security protection is enabled for the session and/or the first DRB depends on the user plane integrity security policy, and the specific implementation method can refer to the relevant description of the above method 300.
- the terminal device modifies the integrity security protection state of the session and/or the first DRB to an activated state; for another example, if the first message indicates to keep the integrity security protection state of the first DRB activated, the terminal device does not need to modify the integrity security protection state of the session and/or the first DRB.
- the terminal device can subsequently send uplink data through the session and/or the first DRB, and receive downlink data through the session and/or the first DRB. It should be noted that the uplink and downlink data carried on the first DRB are integrity security protected and need to be integrity checked.
- the terminal device can reconfigure the PDCP entity of the first DRB.
- the terminal device deletes the PDCP entity of the first DRB, including deleting the integrity security protection key and integrity security protection algorithm of the first DRB; if the first message indicates to modify the integrity security protection state of the first DRB to an activated state, the terminal device configures the integrity security protection key and integrity security protection algorithm in the PDCP entity corresponding to the first DRB, which means that it is necessary to activate the integrity security protection of the uplink user plane messages and/or data carried by the first DRB, and activate the integrity check of the downlink user plane messages and/or data carried by the first DRB.
- the terminal device may send a response message #1 to the network device, indicating that the terminal device has successfully released the first DRB, or indicating that the terminal device has successfully modified the integrity security protection state of the first DRB to an activated state.
- the terminal device may send an RRC reconfiguration completion message to the network device.
- the terminal device may send a response message #2 to the network device.
- the response message #2 may carry a failure cause value, for example, the failure cause value may be used to indicate that the verification of the first integrity security protection indication information has failed, etc.
- the network device performs an integrity check on the received uplink message and/or data, and stores the uplink data if the integrity check passes, and does not store the uplink data or discards the uplink data if the integrity check fails.
- This ensures the security of network communications while reducing the risk of DoS attacks.
- the network device may send a second message to the terminal device, where the second message is used to indicate establishment of a second DRB, and the second message includes second integrity security protection indication information, where the second integrity security protection indication information is used to indicate that the second DRB does not activate integrity security protection, and the second DRB is used to carry data between the terminal device and the network device.
- the second DRB can be a DRB re-established between the terminal device and the network device, or it can be the first DRB released as determined in the above step S630, or the first DRB whose integrity security protection state is modified to an activated state.
- This application does not limit this.
- This implementation method is to facilitate subsequent normal communication between the terminal device and the network device.
- the second message includes an identifier of the first DRB, and/or the second integrity security protection indication information is determined based on the fact that the integrity security protection state of the first DRB before modification is in an inactivated state. That is, the network device may determine that the integrity security protection of the re-established second DRB is inactivated or not enabled based on the fact that the integrity security protection state of the first DRB before modification recorded in the above step S630 is inactivated. Optionally, the network device may also determine not to activate or enable the integrity security protection of the second DRB based on the user plane integrity security policy of the session, which is not limited in the present application.
- the above method 600 is described by taking user plane integrity security protection, user plane integrity security policy, or integrity verification as an example, which is only an example given for ease of understanding and does not constitute a limitation on the technical solution of the present application.
- the technical solution of the present application is also applicable to user plane confidentiality security protection, user plane confidentiality security policy, or decryption operation, etc.
- the specific implementation method can refer to the above related description, which will not be described here.
- the network device determines whether to release the first DRB based on the user plane integrity security policy, or modifies the integrity security protection state of the first DRB to an activated state, so that the user plane data subsequently received by the network device is all protected by integrity security.
- the satellite base station In the scenario where the feeder link is disconnected, the satellite base station only stores user plane data that has passed the integrity check, which can alleviate potential DoS risks and ensure network communication security.
- Figure 7 is a flow chart of a communication method 700 provided in an embodiment of the present application.
- the terminal device is UE
- the core network element is AMF
- SMF is the execution subject for interaction.
- This method can be regarded as a further refinement of the above-mentioned method 600, and is mainly explained for the satellite base station and UE to release sessions and/or DRBs that do not activate integrity security protection.
- the embodiment shown in Figure 7 and the embodiment shown in Figure 6 can be coupled to each other and can be used as references to each other. Therefore, the relevant descriptions in the above-mentioned method 600 are also applicable to this implementation method.
- the same or similar technical means may exist between the two, and the contents described in the embodiment shown in Figure 6 will not be repeated.
- the method includes the following multiple steps, and the parts that are not fully described can refer to the above-mentioned method 600 or the existing protocol.
- the embodiment of the present application does not limit the number of UEs registered to the same network.
- this implementation is described by taking two UEs (e.g., UE1 and UE2) registering to the network, establishing a session, and determining whether to activate or not activate the user plane integrity security protection of the session as an example.
- the process of establishing a session between UE1 and UE2, and the specific implementation method of activating or not activating the user plane integrity security protection of the session are similar, and the following repeated parts will not be repeated.
- UE1 sends a session establishment request message to AMF, and correspondingly, AMF receives the session establishment request message from UE1.
- AMF sends a session creation context request message to SMF, and correspondingly, SMF receives the session creation context request message from AMF.
- SMF sends a session creation context response message to AMF, and correspondingly, AMF receives a session creation context response message from SMF.
- AMF sends a session resource establishment request message to the satellite base station, and correspondingly, the satellite base station receives the session resource establishment request message from AMF.
- the satellite base station sends an RRC reconfiguration message #1 to UE1, and correspondingly, UE1 receives the RRC reconfiguration message #1 from the satellite base station.
- UE1 sends an RRC reconfiguration completion message #1 to the satellite base station, and correspondingly, the satellite base station receives the RRC reconfiguration completion message #1 from UE1.
- the satellite base station sends a session resource establishment response message to the AMF, and correspondingly, the AMF receives a session resource establishment response message from the satellite base station.
- the following steps are for the satellite base station to release the session and/or DRB without integrity security protection between UE2 and the satellite base station after the feeder link is disconnected, thereby alleviating the potential DoS risk and reducing the processing load of UE2 and the satellite base station.
- the satellite base station triggers the addition of the previously released session and/or DRB without integrity security protection to ensure the communication connection between UE2 and the satellite base station.
- the connection between the satellite base station and the ground core network is disconnected, such as the feeder link is disconnected, wherein the triggering condition of the feeder link disconnection can refer to the relevant description of step S511 of the above method 500.
- the satellite base station releases the session and/or DRB for which integrity security protection is not activated.
- a session and/or DRB for which integrity security protection is not activated means that the integrity security protection of the session and/or DRB is not turned on, or in other words, the user plane data carried on the session and/or DRB is not security protected and no integrity check is required.
- the triggering conditions for the satellite base station to release the session and/or DRB for which integrity security protection is not activated can refer to the relevant description of the above-mentioned method 600 and will not be explained here.
- the satellite base station may determine the session and/or DRB that needs to be released according to the user plane integrity security policy received in step S705. For example, if the user plane integrity security policy indicates that integrity security protection is enabled for session #1 (or one or more DRB #1s corresponding to the session) between UE1 and the satellite base station, the satellite base station does not release the session #1 or the one or more DRB #1s; for another example, if the user plane integrity security policy indicates that integrity security protection is not enabled or can be optionally enabled for session #2 (or one or more DRB #2s corresponding to the session) between UE2 and the satellite base station, the satellite base station releases the session #2 or the one or more DRB #2s.
- the satellite base station can release the PDCP entities corresponding to the one or more DRB#2s.
- all uplink data subsequently received by the satellite base station are integrity-secured, such as uplink data received through one or more DRB#1s, so it is necessary to perform integrity checks on all received uplink data.
- the satellite base station sends an RRC reconfiguration message #2 to UE2, and correspondingly, UE2 receives the RRC reconfiguration message #2 from the satellite base station.
- the RRC reconfiguration message #2 includes a session ID and/or a DRB ID, for example, for identifying the session #2 or the one or more DRB #2s for which integrity security protection is not activated in the above step S711.
- the RRC reconfiguration message #2 may carry a drb-ToReleaseList information element, which includes a DRB ID for which integrity security protection is not activated, for example, DRB #2 ID.
- the integrity security protection activation state of the session #2 or the one or more DRB #2s is in an inactive state, or in other words, the integrity security protection of the session #2 or the one or more DRB #2s is not enabled, indicating that the user plane data carried on the session #2 or the one or more DRB #2s has not been integrity-secured and no integrity check is required.
- the satellite base station stores the released Session#2ID and/or DRB#2ID.
- the stored Session#2ID and/or DRB#2ID can be used to restore Session#2 and/or DRB#2 in the subsequent step S720.
- the UE releases the corresponding session #2 and/or DRB #2 according to the session #2ID and/or DRB #2ID.
- UE2 releases the PDCP entity corresponding to DRB #2. That is, UE2 cannot transmit user plane data with the satellite base station through the session #2 and/or DRB #2.
- the RRC reconfiguration message #2 in the above step S712 does not need to undergo integrity security protection.
- UE2 does not need to perform integrity check on RRC reconfiguration message #2.
- UE2 sends an RRC reconfiguration completion message #2 to the satellite base station, and correspondingly, the satellite base station receives the RRC reconfiguration completion message #2 from the UE.
- RRC reconfiguration complete message #2 is used to indicate that UE2 has released session #2 and/or DRB #2.
- UE1 sends uplink data to the satellite base station, and correspondingly, the satellite base station receives the uplink data from UE1.
- the satellite base station performs integrity check on the uplink data.
- the triggering conditions for the satellite base station to perform integrity check on uplink data include one or more of the following:
- the satellite base station supports store-and-forward operation and the feeder link is disconnected
- the satellite base station determines whether to store the uplink data according to the verification result.
- the verification result includes verification success (pass), or verification failure (failure). It should be understood that the satellite base station stores the uplink data that passes the integrity verification and discards the uplink data that fails the integrity security protection verification.
- the triggering conditions for feeder link recovery include one or more of the following:
- the satellite base station flies to the side close to the ground gateway station, that is, the ground gateway station can receive the signal transmitted by the satellite base station;
- the satellite base station sends an RRC reconfiguration message #3 to UE2, and correspondingly, UE2 receives the RRC reconfiguration message #3 from the satellite base station.
- RRC reconfiguration message #3 is used to instruct UE2 to add (or reestablish) session #3 and/or DRB #3, and the session #3 and/or DRB #3 are used to transmit data between UE2 and the satellite base station.
- session #3 and/or DRB #3 may be the same as or different from the above-mentioned released session #2 and/or DRB #2, and this application does not limit this.
- RRC reconfiguration message #3 carries a drb-ToAddModList information element, which includes session #3ID and/or DRB #3ID and its corresponding integrity security protection indication.
- DRB#3ID can be the released DRB ID (for example, DRB#2ID) stored by the satellite base station in the above step S712.
- the RRC reconfiguration message #3 is used to instruct UE2 to re-establish the previously released session #2 and/or DRB#2, and according to the integrity security protection indication carried in the RRC reconfiguration message #3, the integrity security protection of the session #2 and/or DRB#2 is not enabled.
- the triggering condition for the satellite base station to send the RRC reconfiguration message #3 includes one or more of the following:
- the load of the satellite base station itself is lower than a second threshold.
- the second threshold may be predefined, such as defined by a protocol, or the second threshold may be configured or preconfigured.
- the second threshold may be the same as or different from the first threshold in the above step S716, and this application does not limit this.
- UE2 establishes a session and/or DRB based on the session ID and/or DRB ID.
- UE2 re-establishes session #3 according to session #3ID, and determines that the integrity security protection of session #3 is not enabled according to the integrity security protection indication corresponding to session #3; in other words, UE2 re-establishes DRB #3 according to DRB #3ID, and determines that the integrity security protection of DRB #3 is not enabled according to the integrity security protection indication corresponding to DRB #3, that is, UE2 configures the PDCP entity corresponding to DRB #3. Since the integrity security protection of DRB #3 is not activated, UE2 does not need to configure the integrity security protection key and integrity security protection algorithm in the PDCP entity.
- whether the user plane integrity security protection of one or more DRBs corresponding to the session is enabled is consistent.
- whether the user plane integrity security protection of multiple DRBs corresponding to the session is enabled may be different.
- the integrity security protection of session #a is optionally enabled, which means that the user plane integrity security protection of DRB#a and DRB#b corresponding to session #a is optionally enabled.
- the satellite base station can determine to enable the user plane integrity security protection of DRB#a according to local policies or its own load conditions, and not to enable the user plane integrity security protection of DRB#b, that is, the satellite base station determines that DRB#b needs to be released. Furthermore, the satellite base station can notify UE1 to release DRB#b through an RRC reconfiguration message, and subsequently UE1 and the satellite base station can transmit data through DRB#a, and the transmitted data is integrity security protected, and the DRB#b cannot be used to transmit data between UE1 and the satellite base station.
- the satellite base station can instruct UE1 to add (or re-establish) DRB#c and the user plane integrity security protection of the DRB#c is not enabled.
- the DRB#c and DRB#b may be the same or different.
- the satellite base station and the UE when the feeder link between the satellite base station and the UE is disconnected, the satellite base station and the UE will modify the integrity security protection status of the inactivated integrity security-protected session and/or the DRB to an activated state, so that the uplink data transmitted between the UE and the satellite base station are all securely protected, avoiding potential DoS risks while ensuring normal communication between the UE and the satellite base station.
- FIG 8 is a flow chart of a communication method 800 provided in an embodiment of the present application.
- the terminal device is UE and the session management network element is SMF as the execution subject to interact.
- This method can be regarded as a further refinement of the above method 400.
- the embodiment shown in Figure 8 and the embodiment shown in Figure 6 can be coupled with each other and can refer to each other. Therefore, the relevant description in the above method 600 is also applicable to this implementation. There may be the same or similar technical means between the two, and the content described in the embodiment shown in Figure 6 or Figure 7 will not be repeated.
- the method includes the following multiple steps, and the part not described in detail can refer to the above methods 600-700, or the existing protocol.
- AMF sends a session creation context request message to SMF, and correspondingly, SMF receives the session creation context request message from AMF.
- S804 SMF sends a session creation context response message to AMF, and correspondingly, AMF receives a session creation context response message from SMF.
- AMF sends a session resource establishment request message to the satellite base station, and correspondingly, the satellite base station receives the session resource establishment request message from the AMF.
- the satellite base station sends an RRC reconfiguration message #1 to the UE, and correspondingly, the UE receives the RRC reconfiguration message #1 from the satellite base station.
- the UE performs an integrity check on the RRC reconfiguration message #1.
- the UE sends an RRC reconfiguration completion message #1 to the satellite base station, and correspondingly, the satellite base station receives the RRC reconfiguration completion message #1 from the UE.
- the satellite base station sends a session resource establishment response message to the AMF, and correspondingly, the AMF receives a session resource establishment response message from the satellite base station.
- steps S801 to S809 may refer to the related description of steps S701 to S709 of the above method 700.
- the following steps are for the satellite base station to modify the session without integrity security protection and/or DRB to activate integrity security protection after the feeder link is disconnected, thereby mitigating the potential DoS risk and reducing the processing load of the UE and the satellite base station.
- the satellite base station triggers the above-mentioned DRB with activated integrity security protection to restore to the previous state without integrity security protection, ensuring the communication connection between the UE and the satellite base station.
- the connection between the satellite base station and the ground core network is disconnected, such as the feeder link is disconnected, wherein the triggering condition of the feeder link disconnection can refer to the relevant description of step S511 of the above method 500.
- the satellite base station modifies the integrity security protection state of the session and/or DRB for which integrity security protection is not activated to an activated state.
- a session and/or DRB for which integrity security protection is not activated means that the integrity security protection of the session and/or DRB is not turned on, or in other words, the user plane data carried on the session and/or DRB is not security protected and no integrity check is required.
- the satellite base station modifies the PDCP entity corresponding to the DRB accordingly, for example, the satellite base station configures the integrity security protection key and the integrity security protection algorithm in the PDCP entity.
- the satellite base station activates the integrity security protection of the downlink data on the DRB, and activates the integrity check of the uplink data on the DRB.
- all uplink data subsequently received by the satellite base station through the DRB is integrity security protected, so it is necessary to perform integrity check on the uplink data received through the DRB.
- the satellite base station sends an RRC reconfiguration message #2 to the UE, and correspondingly, the UE receives the RRC reconfiguration message #2 from the satellite base station.
- the RRC reconfiguration message #2 includes a session ID and/or a DRB ID, and the integrity security protection activation state of the session and/or DRB corresponding to the session ID and/or DRB ID is an inactive state.
- the RRC reconfiguration message #2 also includes an integrity security protection indication corresponding to the session and/or DRB, and the integrity security protection indication is used to instruct the UE to activate (or turn on) the integrity security protection of the session and/or DRB.
- the RRC reconfiguration message #2 is used to instruct the UE to modify the integrity security protection state of the session and/or DRB, that is, to change it from an inactive state to an active state.
- the RRC reconfiguration message #2 carries a drb-ToAddModList information element, which includes a session ID and/or DRB ID for which integrity security protection is not activated.
- the satellite base station records the session ID and/or DRB ID whose integrity security protection state has been modified, or records that the integrity security protection state of the session and/or DRB before the modification is in an inactive state, or records that the integrity security policy of the session and/or DRB before the modification indicates that integrity security protection is not enabled, etc.
- the recorded session ID and/or DRB ID is used to restore the integrity security protection state of the session and/or DRB to an inactive state in the subsequent step S820.
- the UE modifies the integrity security protection state of the session and/or DRB to an activated state.
- the integrity security protection state of the session/DRB before the modification is in an inactive state
- the integrity security protection state of the session/DRB after the modification is in an active state
- the UE modifies the integrity security protection state of the corresponding session and/or DRB to an activated state according to the session ID and/or DRB ID.
- the UE modifies the PDCP entity corresponding to the DRB, including: configuring the integrity security protection key and the integrity security protection algorithm in the PDCP entity.
- the UE activates the integrity security protection of the uplink data on the DRB, and activates the integrity check of the downlink data on the DRB.
- all uplink data subsequently sent by the UE through the session and/or DRB are integrity security protected, so the satellite base station also needs to perform integrity check on the uplink data received through the session and/or DRB.
- the UE sends an RRC reconfiguration completion message #2 to the satellite base station, and correspondingly, the satellite base station receives the RRC reconfiguration completion message #2 from the UE.
- the RRC reconfiguration complete message #2 is used to indicate that the UE has modified the integrity security protection state of the session and/or DRB to an activated state.
- the UE sends uplink data to the satellite base station, and correspondingly, the satellite base station receives the uplink data from the UE.
- the UE since the UE has modified the integrity security protection status of the session and/or DRB that has not activated integrity security protection to an activated state, the UE needs to perform integrity security protection on the uplink data before sending the uplink data.
- the specific implementation method please refer to the relevant description of the above method 300.
- the satellite base station determines whether to store the uplink data according to the verification result.
- the session ID is the session ID of the session whose integrity security protection state has been modified recorded by the satellite base station in the above step S812.
- the RRC reconfiguration message #3 is used to instruct the UE to modify the integrity security protection state of the session and/or DRB, that is, from an activated state to an inactivated state.
- the integrity security protection indication is used to indicate that the integrity security protection of the session and/or DRB is not enabled.
- the UE modifies the integrity security protection status of the session and/or DRB to an inactivated state based on the session ID and/or DRB ID.
- the UE modifies the integrity security protection state of the corresponding session and/or DRB according to the session ID and/or DRB ID to an inactive state, that is, the integrity security protection of the session and/or DRB is not enabled.
- the UE modifies the PDCP entity corresponding to the DRB. Since the integrity security protection of the DRB is not enabled, the UE does not need to configure the integrity security protection key and integrity security protection algorithm in the PDCP entity.
- the satellite base station deletes the integrity security protection key and integrity security protection algorithm corresponding to the PDCP entity.
- whether the user plane integrity security protection of one or more DRBs corresponding to the session is enabled is consistent.
- whether the user plane integrity security protection of multiple DRBs corresponding to the session is enabled may be different.
- the integrity security protection of session #a is optionally enabled, which means that the integrity security protection of DRB#a and DRB#b corresponding to session #a is optionally enabled.
- the satellite base station can determine to activate the integrity security protection of DRB#a according to local policies or its own load conditions, and not to activate the integrity security protection of DRB#b, that is, the satellite base station determines that the integrity security protection state of DRB#b needs to be modified to an activated state, that is, the modified DRB#b turns on integrity security protection. Further, the satellite base station can notify the UE to modify the integrity security protection state of DRB#b to an activated state through an RRC reconfiguration message, and subsequently the UE and the satellite base station can transmit data through DRB#a and DRB#b, and the transmitted data is integrity security protected.
- the satellite base station can instruct the UE to modify the integrity security protection status of the DRB#b to an inactivated state.
- the specific implementation method can refer to steps S810 to S814 of method 800, and the relevant descriptions of steps S818 to S820. For the sake of brevity, they will not be repeated here.
- the solution provided by the present application is that in the scenario where the feeder link is disconnected, the satellite base station modifies the integrity security protection state of the session without integrity security protection and/or DRB to an activated state, so that the uplink data subsequently received by the satellite base station are all integrity-protected, and the satellite base station also avoids receiving uplink data without integrity security protection, alleviating the potential DoS risk.
- the satellite base station triggers the above-mentioned session and/or DRB that have been modified to enable integrity security protection to be restored to an inactivated state, ensuring the communication connection between the UE and the satellite base station.
- Figure 9 is a flow chart of a communication method 900 provided in an embodiment of the present application.
- the terminal device is UE
- the core network element is AMF
- SMF is the execution subject for interaction.
- This method can be regarded as a further refinement of the above-mentioned method 400 or 600, and is mainly described for SMF to determine the user plane integrity security policy according to the indication information and/or the contract information.
- the embodiment shown in Figure 9 and the embodiments shown in Figures 4 to 8 can be coupled with each other and can be used as references to each other. Therefore, the relevant descriptions in the above-mentioned methods 400 to 800 are also applicable to this implementation method.
- the same or similar technical means may exist between the two, and the contents described in the embodiments shown in Figures 4 to 8 will not be repeated.
- the method includes the following multiple steps, and the parts that are not fully described can refer to the existing protocol.
- the UE sends a session establishment request message to the AMF, and correspondingly, the AMF receives the session establishment request message from the UE.
- the session creation context request message carries indication information, where the indication information is used to indicate that the base station is deployed on a satellite (referred to as a satellite base station for short).
- the indication information is also used to indicate that the satellite base station supports a store-and-forward feature.
- the AMF obtains one or more of the capability information, configuration information or location information of the base station through local query or by sending a query message to the OAM or UDM.
- the AMF can determine that the base station is deployed on a satellite through the query.
- the AMF can also determine that the satellite base station supports the store-and-forward feature.
- SMF determines the user plane integrity security policy of the session based on the indication information and/or contract information.
- the indication information may be obtained by the SMF from the AMF, or may be obtained by the SMF from the OAM or UDM.
- the contract information can be obtained by SMF from UDM or PCF.
- the SMF determines the user plane integrity security policy of the session based on the indication information.
- the SMF determines the user plane integrity security policy based on the subscription information.
- the UE's subscription information is used to indicate whether the UE has subscribed to the store-and-forward operation service.
- this application does not limit the order in which the SMF obtains the contract information and indication information.
- the SMF determines the user plane integrity security policy based on the indication information and the subscription information.
- step S401 of the above method 400 can refer to the relevant description of step S401 of the above method 400.
- SMF sends a session creation context response message to AMF, and correspondingly, AMF receives a session creation context response message from SMF.
- AMF sends a session resource establishment request message to the satellite base station, and correspondingly, the satellite base station receives the session resource establishment request message from the AMF.
- the satellite base station sends an RRC reconfiguration message to the UE, and correspondingly, the UE receives the RRC reconfiguration message from the satellite base station.
- the satellite base station can further determine whether the integrity security policy is required or not needed based on the local policy.
- the specific implementation method can refer to the relevant description of the above method 300.
- the UE performs an integrity check on the RRC reconfiguration message.
- the UE sends an RRC reconfiguration completion message to the satellite base station, and correspondingly, the satellite base station receives the RRC reconfiguration completion message from the UE.
- the satellite base station sends a session resource establishment response message to the AMF, and correspondingly, the AMF receives a session resource establishment response message from the satellite base station.
- the connection between the satellite base station and the ground core network is disconnected, such as the feeder link is disconnected, wherein the triggering condition of the feeder link disconnection can refer to the relevant description of step S511 of the above method 500.
- the UE sends uplink data to the satellite base station, and correspondingly, the satellite base station receives the uplink data from the UE.
- the satellite base station performs integrity check on the uplink data.
- the triggering conditions for the satellite base station to perform integrity check on the uplink data and the specific implementation method of the satellite base station to perform integrity check on the uplink data can refer to the relevant description of step S513 of the above method 500, which will not be repeated here.
- the satellite base station determines whether to store the uplink data according to the verification result.
- step S514 of the above method 500 please refer to the relevant description of step S514 of the above method 500.
- the solution provided by this application sets an integrity security policy through indication information, so that the user plane data subsequently received by the satellite base station is protected by integrity security to the maximum extent, alleviating potential DoS risks and reducing the processing load of UE and base station.
- the satellite base station can only store data that has passed the integrity check to ensure network security.
- FIG 10 is a schematic diagram of a communication device provided by an embodiment of the present application.
- the communication device 1000 includes a processing module 1010 and a communication module 1020.
- the communication device 1000 can be a terminal device, or a communication device applied to a terminal device or used in combination with a terminal device, which can implement a method executed by the terminal device, such as a chip, a chip system or a circuit; or, the communication device 1000 can be a network device, or a communication device applied to a network device or used in combination with a network device, which can implement a method executed by the network device, such as a chip, a chip system or a circuit; or, the communication device 1000 can be a session management network element, or a communication device applied to a session management network element or used in combination with a session management network element, which can implement a method executed by the session management network element, such as a chip, a chip system or a circuit.
- the communication module may also be referred to as a transceiver module, a transceiver, a transceiver, or a transceiver device, etc.
- the processing module may also be referred to as a processor, a processing board, a processing unit, or a processing device, etc.
- the communication module is used to perform the sending operation and the receiving operation of the terminal device and the network device in the above method, and the device used to implement the receiving function in the communication module may be regarded as a receiving unit, and the device used to implement the sending function in the communication module may be regarded as a sending unit, that is, the communication module includes a receiving unit and a sending unit.
- the processing module 1010 can be used to implement the processing function of the terminal device in the above embodiments, and the communication module 1020 can be used to implement the transceiver function of the terminal device in the above embodiments.
- the processing module 1010 can be used to implement the processing function of the network device in the above embodiments, and the communication module 1020 can be used to implement the transceiver function of the network device in the above embodiments.
- indication or “used to indicate” may include being used for direct indication and being used for indirect indication.
- indication information When describing that a certain indication information is used to indicate A, it may include that the indication information directly indicates A or indirectly indicates A, but it does not mean that the indication information must carry A.
- the disclosed systems, devices and methods can be implemented in other ways.
- the device embodiments described above are only schematic.
- the division of the units is only a logical function division. There may be other division methods in actual implementation, such as multiple units or components can be combined or integrated into another system, or some features can be ignored or not executed.
- Another point is that the mutual coupling or direct coupling or communication connection shown or discussed can be through some interfaces, indirect coupling or communication connection of devices or units, which can be electrical, mechanical or other forms.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
本申请要求在2024年01月19日提交中国国家知识产权局、申请号为202410083047.2,发明名称为“一种安全通信方法、装置和通信系统”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。This application claims priority to a Chinese patent application filed with the State Intellectual Property Office of China on January 19, 2024, with application number 202410083047.2, and invention name “A secure communication method, device and communication system”, the entire contents of which are incorporated by reference into this application.
本申请涉及通信领域,并且更具体地,涉及一种安全通信方法、装置和通信系统。The present application relates to the field of communications, and more specifically, to a secure communication method, device and communication system.
在通信系统,例如第五代(5th generation,5G)通信系统或卫星通信系统中,终端设备可以通过新空口(new radio,NR)与基站进行通信,基站可以通过地面关口站与核心网进行通信。In a communication system, such as a fifth generation (5G) communication system or a satellite communication system, a terminal device can communicate with a base station through a new radio (NR), and a base station can communicate with a core network through a ground gateway.
终端设备和核心网之间的上行消息和下行消息可以通过基站和地面关口站传输。在某些时刻,终端设备与基站之间的通信链路,以及基站与核心网之间的通信链路可能不同时处于连通状态。例如,当终端设备与基站之间的通信链路处于连通状态,且基站与核心网之间的通信链路处于断开状态时,基站可以执行存储转发(store and forward)操作,将来自终端设备的上行消息进行存储,并且在基站与核心网之间的通信链路恢复之后,将存储的上行消息发送给核心网。这种情况下,如果攻击者向基站发送大量恶意的数据或消息,可能导致网络安全无法得到保障,同时存在基站被拒绝服务(denial of service,DoS)攻击的风险。因此,亟需采取额外的措施来应对,以减少潜在的安全风险。Uplink and downlink messages between the terminal device and the core network can be transmitted through the base station and the ground gateway. At certain moments, the communication link between the terminal device and the base station, and the communication link between the base station and the core network may not be in a connected state at the same time. For example, when the communication link between the terminal device and the base station is in a connected state, and the communication link between the base station and the core network is in a disconnected state, the base station can perform a store and forward operation to store the uplink message from the terminal device, and after the communication link between the base station and the core network is restored, the stored uplink message is sent to the core network. In this case, if an attacker sends a large amount of malicious data or messages to the base station, network security may not be guaranteed, and there is a risk of denial of service (DoS) attacks on the base station. Therefore, additional measures are urgently needed to reduce potential security risks.
本申请提供了一种安全通信方法、装置和通信系统,能够减少潜在的安全风险,提高网络通信安全。The present application provides a secure communication method, device and communication system, which can reduce potential security risks and improve network communication security.
第一方面,提供了一种安全通信方法。该方法应用于网络设备侧,例如该方法可以由网络设备执行,或者,也可以由网络设备中的芯片或电路等执行,或者,也可以由网络设备中能够调用并执行程序的功能模块等执行,或者,也可以由网络设备中的集中式单元(centralized unit,CU)或分布式单元(distributed unit,DU)执行等。本申请对此不作限定。为了便于描述,下面以由网络设备(例如基站)执行为例进行说明。In the first aspect, a secure communication method is provided. The method is applied to the network device side, for example, the method can be executed by the network device, or it can also be executed by a chip or circuit in the network device, or it can also be executed by a functional module in the network device that can call and execute a program, or it can also be executed by a centralized unit (CU) or a distributed unit (DU) in the network device. This application does not limit this. For the sake of ease of description, the following is an example of execution by a network device (such as a base station) for explanation.
该方法包括:在终端设备的会话建立过程中,网络设备根据第一信息确定是否激活会话的完整性安全保护,第一信息用于指示网络设备是否支持存储转发操作,所述会话用于传输终端设备与核心网之间的数据;网络设备向终端设备发送第一完整性安全保护指示信息,第一完整性安全保护指示信息用于指示激活结果。The method includes: during the session establishment process of the terminal device, the network device determines whether to activate the integrity security protection of the session based on first information, the first information is used to indicate whether the network device supports storage and forwarding operations, and the session is used to transmit data between the terminal device and the core network; the network device sends first integrity security protection indication information to the terminal device, and the first integrity security protection indication information is used to indicate the activation result.
示例性地,激活结果用于指示是否激活会话的完整性安全保护,或者说,激活结果用于指示是否激活会话对应的一个或多个数据无线承载(data radio bearer,DRB)的完整性安全保护。例如,激活结果包括激活会话的完整性安全保护,或者不激活会话的完整性安全保护。Exemplarily, the activation result is used to indicate whether to activate integrity security protection of the session, or in other words, the activation result is used to indicate whether to activate integrity security protection of one or more data radio bearers (DRBs) corresponding to the session. For example, the activation result includes activating integrity security protection of the session, or not activating integrity security protection of the session.
示例性地,第一信息还可以用于指示网络设备是否配置开启存储转发操作,和/或,第一信息还可以用于指示网络设备是否部署于卫星上。Exemplarily, the first information may also be used to indicate whether the network device is configured to enable a store-and-forward operation, and/or the first information may also be used to indicate whether the network device is deployed on a satellite.
应理解,网络设备部署于卫星上,可以理解为网络设备(例如基站)在物理位置上部署在卫星上,或者网络设备(例如基站)和卫星合设。此时,所述卫星具备所述网络设备的能力,例如所述卫星支持网络设备的存储转发操作。It should be understood that the network equipment is deployed on the satellite, which can be understood as the network equipment (such as a base station) being physically deployed on the satellite, or the network equipment (such as a base station) and the satellite being co-located. In this case, the satellite has the capabilities of the network equipment, for example, the satellite supports the storage and forwarding operation of the network equipment.
根据本申请提供的方案,在考虑第一信息的情况下,最大限度地开启或激活会话的完整性安全保护,使得网络设备后续接收的数据尽可能地经过完整性安全保护,便于在网络设备与核心网之间的通信链路(例如馈线链路)断开的场景下,网络设备只存储完整性校验通过的用户面数据,缓解了潜在的拒绝服务DoS攻击风险,同时保障了网络通信安全。According to the solution provided in the present application, taking the first information into consideration, the integrity security protection of the session is turned on or activated to the maximum extent possible, so that the data subsequently received by the network device is protected by integrity security as much as possible. This facilitates the scenario where the communication link (such as a feeder link) between the network device and the core network is disconnected. The network device only stores user-plane data that has passed the integrity check, thereby alleviating the risk of potential denial of service DoS attacks while ensuring network communication security.
在某些实现方式中,网络设备根据第一信息确定是否激活会话的完整性安全保护,包括:在第一信息指示网络设备支持存储转发操作的情况下,网络设备确定激活会话的完整性安全保护;和/或,在第一信息指示网络设备不支持存储转发操作的情况下,网络设备确定不激活会话的完整性安全保护。In certain implementations, a network device determines whether to activate integrity security protection for a session based on first information, including: when the first information indicates that the network device supports store-and-forward operations, the network device determines to activate integrity security protection for the session; and/or when the first information indicates that the network device does not support store-and-forward operations, the network device determines not to activate integrity security protection for the session.
也就是说,在网络设备支持存储转发操作的情况下,网络设备激活会话的完整性安全保护;在网络设备不支持存储转发操作的情况下,网络设备不激活会话的完整性安全保护,或者可以根据用户面完整性安全策略激活或不激活会话的完整性安全保护。That is to say, when the network device supports store-and-forward operations, the network device activates the integrity security protection of the session; when the network device does not support store-and-forward operations, the network device does not activate the integrity security protection of the session, or may activate or not activate the integrity security protection of the session according to the user plane integrity security policy.
在某些实现方式中,在网络设备根据第一信息确定是否激活会话的完整性安全保护之前,包括:网络设备获取会话对应的用户面完整性安全策略,用户面完整性安全策略用于指示会话是否激活完整性安全保护;网络设备根据第一信息确定是否激活会话的完整性安全保护,包括:网络设备根据第一信息和用户面完整性安全策略确定是否激活会话的完整性安全保护。In some implementations, before a network device determines whether to activate integrity security protection for a session based on first information, the process includes: the network device obtains a user plane integrity security policy corresponding to the session, where the user plane integrity security policy is used to indicate whether integrity security protection is activated for the session; the network device determines whether to activate integrity security protection for the session based on the first information, including: the network device determines whether to activate integrity security protection for the session based on the first information and the user plane integrity security policy.
基于上述方案,网络设备根据第一信息确定是否激活会话的完整性安全保护,额外的还可以考虑用户面完整性安全策略,尽可能地开启或激活会话的完整性安全保护,使得网络设备接收的用户面数据最大程度地经过完整性安全保护,便于在馈线链路断开的场景下,只存储完整性校验通过的用户面数据,不仅缓解了潜在的拒绝服务DoS攻击风险,同时可以保障网络通信安全。Based on the above scheme, the network device determines whether to activate the integrity security protection of the session according to the first information, and can also consider the user plane integrity security policy in addition, and turn on or activate the integrity security protection of the session as much as possible, so that the user plane data received by the network device is protected by integrity security to the greatest extent. In the scenario where the feeder link is disconnected, only the user plane data that has passed the integrity check is stored, which not only alleviates the potential risk of denial of service DoS attacks, but also ensures the security of network communications.
在某些实现方式中,网络设备根据第一信息和用户面完整性安全策略确定是否激活会话的完整性安全保护,包括:在第一信息指示网络设备不支持存储转发操作,且用户面完整性安全策略指示会话激活或可选激活完整性安全保护的情况下,网络设备确定激活会话的完整性安全保护;和/或,在第一信息指示网络设备不支持存储转发操作,且用户面完整性安全策略指示会话不激活完整性安全保护的情况下,网络设备确定不激活会话的完整性安全保护。In certain implementations, a network device determines whether to activate integrity security protection for a session based on first information and a user plane integrity security policy, including: when the first information indicates that the network device does not support store-and-forward operations and the user plane integrity security policy indicates that the session is activated or integrity security protection is optionally activated, the network device determines to activate integrity security protection for the session; and/or when the first information indicates that the network device does not support store-and-forward operations and the user plane integrity security policy indicates that integrity security protection is not activated for the session, the network device determines not to activate integrity security protection for the session.
基于上述方案,在网络设备不支持存储转发操作的情况下,网络设备确定是否激活会话的完整性安全保护,可以以用户面完整性安全策略为准,或者,也可以以网络设备是否支持存储转发操作为准,最大限度地开启或激活会话的完整性安全保护,使得网络设备接收的用户面数据最大程度地经过完整性安全保护,便于在馈线链路断开的场景下,只存储完整性校验通过的用户面数据,不仅缓解了潜在的拒绝服务DoS攻击风险,同时可以保障网络通信安全。Based on the above scheme, when the network device does not support the store-and-forward operation, the network device determines whether to activate the integrity security protection of the session. It can be based on the user plane integrity security policy, or it can be based on whether the network device supports the store-and-forward operation. The integrity security protection of the session is turned on or activated to the maximum extent, so that the user plane data received by the network device is protected by integrity security to the greatest extent. In the scenario where the feeder link is disconnected, only the user plane data that has passed the integrity check is stored, which not only alleviates the potential risk of denial of service DoS attacks, but also ensures the security of network communications.
在某些实现方式中,网络设备根据第一信息和用户面完整性安全策略确定是否激活会话的完整性安全保护,包括:在第一信息指示网络设备支持存储转发操作,且用户面完整性安全策略指示会话激活或可选激活完整性安全保护的情况下,网络设备确定激活会话的完整性安全保护;和/或,在第一信息指示网络设备支持存储转发操作,且用户面完整性安全策略指示会话不激活完整性安全保护的情况下,网络设备确定激活会话的完整性安全保护。In certain implementations, a network device determines whether to activate integrity security protection for a session based on first information and a user plane integrity security policy, including: when the first information indicates that the network device supports store-and-forward operations and the user plane integrity security policy indicates that the session is activated or integrity security protection is optionally activated, the network device determines to activate integrity security protection for the session; and/or when the first information indicates that the network device supports store-and-forward operations and the user plane integrity security policy indicates that integrity security protection is not activated for the session, the network device determines to activate integrity security protection for the session.
基于上述方案,在网络设备支持存储转发操作的情况下,无论用户面完整性安全策略指示会话激活或可选激活或不激活完整性安全保护,网络设备确定激活会话的完整性安全保护。也即是,网络设备以第一信息为依据确定是否激活会话的完整性安全保护,最大限度地开启或激活会话的完整性安全保护,使得网络设备接收的用户面数据最大程度地经过完整性安全保护,便于在馈线链路断开的场景下,只存储完整性校验通过的用户面数据,不仅缓解了潜在的拒绝服务DoS攻击风险,同时可以保障网络通信安全。Based on the above scheme, when the network device supports the store-and-forward operation, regardless of whether the user plane integrity security policy indicates that the session is activated or the integrity security protection is optionally activated or not activated, the network device determines to activate the integrity security protection of the session. That is, the network device determines whether to activate the integrity security protection of the session based on the first information, and turns on or activates the integrity security protection of the session to the maximum extent, so that the user plane data received by the network device is protected by integrity security to the maximum extent, so that in the scenario where the feeder link is disconnected, only the user plane data that passes the integrity check is stored, which not only alleviates the potential risk of DoS attacks, but also ensures the security of network communications.
第二方面,提供了一种安全通信方法。该方法应用于终端设备侧,例如该方法可以由终端设备执行,或者,也可以由终端设备中的芯片或电路等执行,或者,也可以由终端设备中能够调用并执行程序的功能模块等执行。本申请对此不作限定。为了便于描述,下面以由终端设备(例如用户设备(user equipment,UE))执行为例进行说明。In the second aspect, a secure communication method is provided. The method is applied to the terminal device side, for example, the method can be executed by the terminal device, or it can also be executed by a chip or circuit in the terminal device, or it can also be executed by a functional module in the terminal device that can call and execute a program. This application does not limit this. For ease of description, the following is an example of execution by a terminal device (such as a user equipment (UE)).
该方法包括:在终端设备的会话建立过程中,终端设备接收来自网络设备的第一完整性安全保护指示信息,第一完整性安全保护指示信息用于指示是否激活会话的完整性安全保护,第一完整性安全保护指示信息根据第一信息确定,第一信息用于指示网络设备是否支持存储转发操作;终端设备对第一完整性安全保护指示信息进行完整性检验,所述会话用于传输终端设备与核心网之间的数据;在完整性检验通过的情况下,终端设备根据第一完整性安全保护指示信息确定是否激活会话的完整性安全保护。The method includes: during the session establishment process of the terminal device, the terminal device receives first integrity security protection indication information from the network device, the first integrity security protection indication information is used to indicate whether to activate the integrity security protection of the session, the first integrity security protection indication information is determined based on the first information, and the first information is used to indicate whether the network device supports the store-and-forward operation; the terminal device performs an integrity check on the first integrity security protection indication information, and the session is used to transmit data between the terminal device and the core network; when the integrity check passes, the terminal device determines whether to activate the integrity security protection of the session based on the first integrity security protection indication information.
可选地,在终端设备根据第一完整性安全保护指示信息确定是否激活会话的完整性安全保护之前,该方法还包括:终端设备对第一完整性安全保护指示信息进行完整性检验。进一步地,在完整性检验通过的情况下,终端设备根据第一完整性安全保护指示信息确定是否激活会话的完整性安全保护。Optionally, before the terminal device determines whether to activate the integrity security protection of the session according to the first integrity security protection indication information, the method further includes: the terminal device performs an integrity check on the first integrity security protection indication information. Further, if the integrity check passes, the terminal device determines whether to activate the integrity security protection of the session according to the first integrity security protection indication information.
可选地,第一完整性安全保护指示信息用于指示是否激活会话的完整性安全保护,可以理解为:第一完整性安全保护指示信息用于指示激活结果,激活结果用于指示是否激活会话的完整性安全保护。Optionally, the first integrity security protection indication information is used to indicate whether to activate the integrity security protection of the session, which can be understood as: the first integrity security protection indication information is used to indicate the activation result, and the activation result is used to indicate whether to activate the integrity security protection of the session.
在某些实现方式中,在第一信息指示网络设备支持存储转发操作的情况下,第一完整性安全保护指示信息用于指示激活会话的完整性安全保护;和/或,在第一信息指示网络设备不支持存储转发操作的情况下,第一完整性安全保护指示信息用于指示不激活会话的完整性安全保护。In some implementations, when the first information indicates that the network device supports store-and-forward operations, the first integrity security protection indication information is used to indicate that integrity security protection of the session is activated; and/or, when the first information indicates that the network device does not support store-and-forward operations, the first integrity security protection indication information is used to indicate that integrity security protection of the session is not activated.
在某些实现方式中,第一完整性安全保护指示信息根据第一信息和用户面完整性安全策略确定,其中,用户面完整性安全策略用于指示会话是否激活完整性安全保护。In some implementations, the first integrity security protection indication information is determined according to the first information and a user plane integrity security policy, wherein the user plane integrity security policy is used to indicate whether integrity security protection is activated for the session.
在某些实现方式中,在第一信息指示网络设备不支持存储转发操作,且用户面完整性安全策略指示会话激活或可选激活完整性安全保护的情况下,第一完整性安全保护指示信息用于指示激活会话的完整性安全保护;和/或,在第一信息指示网络设备不支持存储转发操作,且用户面完整性安全策略指示会话不激活完整性安全保护的情况下,第一完整性安全保护指示信息用于指示不激活会话的完整性安全保护。In some implementations, when the first information indicates that the network device does not support the store-and-forward operation and the user plane integrity security policy indicates session activation or optional activation of integrity security protection, the first integrity security protection indication information is used to indicate activation of integrity security protection for the session; and/or, when the first information indicates that the network device does not support the store-and-forward operation and the user plane integrity security policy indicates that integrity security protection is not activated for the session, the first integrity security protection indication information is used to indicate deactivation of integrity security protection for the session.
在某些实现方式中,在第一信息指示网络设备支持存储转发操作,且用户面完整性安全策略指示会话激活或可选激活完整性安全保护的情况下,第一完整性安全保护指示信息用于指示激活会话的完整性安全保护;和/或,在第一信息指示网络设备支持存储转发操作,且用户面完整性安全策略指示会话不激活完整性安全保护的情况下,第一完整性安全保护指示信息用于指示激活会话的完整性安全保护。In some implementations, when the first information indicates that the network device supports store-and-forward operations and the user plane integrity security policy indicates session activation or optional activation of integrity security protection, the first integrity security protection indication information is used to indicate the activation of integrity security protection for the session; and/or, when the first information indicates that the network device supports store-and-forward operations and the user plane integrity security policy indicates that integrity security protection is not activated for the session, the first integrity security protection indication information is used to indicate the activation of integrity security protection for the session.
上述第二方面及某些实现方式的有益效果可以对应参考第一方面相关的描述,在此不予赘述。The beneficial effects of the above-mentioned second aspect and certain implementation methods can be referred to the relevant description of the first aspect, and will not be repeated here.
第三方面,提供了一种安全通信方法。该方法应用于网络设备侧,例如该方法可以由网络设备执行,或者,也可以由网络设备中的芯片或电路等执行,或者,也可以由网络设备中能够调用并执行程序的功能模块等执行,或者,也可以由网络设备中的CU或DU执行等。本申请对此不作限定。为了便于描述,下面以由网络设备(例如基站)执行为例进行说明。In a third aspect, a secure communication method is provided. The method is applied to the network device side, for example, the method can be executed by the network device, or it can also be executed by a chip or circuit in the network device, or it can also be executed by a functional module in the network device that can call and execute a program, or it can also be executed by a CU or DU in the network device. This application is not limited to this. For the convenience of description, the following is an example of execution by a network device (such as a base station) for explanation.
该方法包括:在终端设备的会话建立过程中,网络设备获取会话对应的用户面完整性安全策略,用户面完整性安全策略用于指示会话是否激活完整性安全保护,所述会话用于传输终端设备与核心网之间的数据;网络设备根据用户面完整性安全策略确定第一完整性安全保护指示信息,第一完整性安全保护指示信息用于指示是否激活第一DRB的完整性安全保护,会话对应第一DRB,所述第一DRB用于承载终端设备与网络设备之间的数据;根据第一完整性安全保护指示信息激活或者不激活第一DRB的完整性安全保护;在第一链路断开的情况下,网络设备根据第一DRB的完整性安全保护是否激活确定是否释放第一DRB,或者,网络设备根据第一DRB的完整性安全保护是否激活确定是否修改第一DRB的完整性安全保护状态,第一链路是网络设备与核心网之间的链路;网络设备向终端设备发送第一消息,第一消息用于指示第一DRB的释放结果或修改结果。The method includes: during the session establishment process of the terminal device, the network device obtains the user plane integrity security policy corresponding to the session, the user plane integrity security policy is used to indicate whether the session activates integrity security protection, and the session is used to transmit data between the terminal device and the core network; the network device determines first integrity security protection indication information according to the user plane integrity security policy, the first integrity security protection indication information is used to indicate whether to activate the integrity security protection of the first DRB, the session corresponds to the first DRB, and the first DRB is used to carry data between the terminal device and the network device; according to the first integrity security protection indication information, the integrity security protection of the first DRB is activated or not activated; in the case of a first link disconnection, the network device determines whether to release the first DRB according to whether the integrity security protection of the first DRB is activated, or the network device determines whether to modify the integrity security protection status of the first DRB according to whether the integrity security protection of the first DRB is activated, and the first link is a link between the network device and the core network; the network device sends a first message to the terminal device, and the first message is used to indicate the release result or modification result of the first DRB.
示例性地,在卫星通信场景下,第一链路可以是馈线链路。Exemplarily, in a satellite communication scenario, the first link may be a feeder link.
可选地,在第一链路断开的情况下,网络设备也可以根据第一完整性安全保护指示信息确定是否释放第一DRB,或者,网络设备根据第一完整性安全保护指示信息确定是否修改第一DRB的完整性安全保护状态。Optionally, when the first link is disconnected, the network device may also determine whether to release the first DRB based on the first integrity security protection indication information, or the network device may determine whether to modify the integrity security protection status of the first DRB based on the first integrity security protection indication information.
根据本申请提供的方案,网络设备基于用户面完整性安全策略确定是否释放第一DRB,或者修改第一DRB的完整性安全保护状态为激活态,使得网络设备后续接收的用户面数据都是经过完整性安全保护的,便于在馈线链路断开的场景下,卫星基站只存储完整性校验通过的用户面数据,能够缓解潜在的DoS风险,保障网络通信安全。According to the solution provided in the present application, the network device determines whether to release the first DRB based on the user plane integrity security policy, or modifies the integrity security protection state of the first DRB to an activated state, so that the user plane data subsequently received by the network device is all protected by integrity security. In the scenario where the feeder link is disconnected, the satellite base station only stores the user plane data that has passed the integrity check, which can alleviate potential DoS risks and ensure network communication security.
在某些实现方式中,网络设备根据第一DRB的完整性安全保护是否激活确定是否释放第一DRB,包括:在第一DRB未激活完整性安全保护的情况下,网络设备确定释放第一DRB。In some implementations, the network device determines whether to release the first DRB based on whether the integrity security protection of the first DRB is activated, including: if the integrity security protection of the first DRB is not activated, the network device determines to release the first DRB.
在某些实现方式中,网络设备根据第一DRB的完整性安全保护是否激活确定是否修改第一DRB的完整性安全保护状态,包括:在第一DRB未激活完整性安全保护的情况下,网络设备确定修改第一DRB的完整性安全保护状态为激活态。In certain implementations, the network device determines whether to modify the integrity security protection state of the first DRB based on whether the integrity security protection of the first DRB is activated, including: when the integrity security protection of the first DRB is not activated, the network device determines to modify the integrity security protection state of the first DRB to an activated state.
在某些实现方式中,方法还包括:在第一链路恢复连接的情况下,网络设备向终端设备发送第二消息,第二消息用于指示终端设备建立第二DRB,第二消息包括第二完整性安全保护指示信息,第二完整性安全保护指示信息用于指示第二DRB不激活完整性安全保护,第二DRB用于承载终端设备与网络设备之间的数据。In some implementations, the method also includes: when the first link resumes connection, the network device sends a second message to the terminal device, the second message is used to instruct the terminal device to establish a second DRB, the second message includes second integrity security protection indication information, the second integrity security protection indication information is used to indicate that the second DRB does not activate integrity security protection, and the second DRB is used to carry data between the terminal device and the network device.
在某些实现方式中,第二DRB为第一DRB,在向终端设备发送第二消息之前,和/或,在向终端设备发送第一消息之后,所述方法还包括:网络设备存储第一DRB的标识;和/或,网络设备记录第一DRB在修改前的完整性安全保护状态为未激活态;其中,第二消息包括第一DRB的标识,和/或,所述第二消息中携带的第二完整性安全保护指示信息根据第一DRB在修改前的完整性安全保护状态为未激活态确定。In some implementations, the second DRB is the first DRB, and before sending the second message to the terminal device, and/or after sending the first message to the terminal device, the method further includes: the network device stores an identifier of the first DRB; and/or the network device records that the integrity security protection state of the first DRB before modification is in an inactivated state; wherein the second message includes the identifier of the first DRB, and/or the second integrity security protection indication information carried in the second message is determined based on the integrity security protection state of the first DRB before modification being in an inactivated state.
可选地,该第二DRB可以是终端设备与网络设备之间重新建立的DRB,也可以是根据第一DRB的标识确定的第一DRB。另外,本申请对存储第一DRB的标识;和/或,网络设备记录第一DRB在修改前的完整性安全保护状态为未激活态的时机不作限定,该实现方式为便于后续终端设备与网络设备之间的正常通信。Optionally, the second DRB can be a DRB re-established between the terminal device and the network device, or it can be a first DRB determined based on the identifier of the first DRB. In addition, the present application does not limit the storage of the identifier of the first DRB; and/or the timing when the network device records that the integrity security protection state of the first DRB before modification is in an inactive state. This implementation method is to facilitate normal communication between subsequent terminal devices and network devices.
也就是说,网络设备可以根据记录的第一DRB在修改前的完整性安全保护状态为未激活态,进而确定不激活或不开启第二DRB的完整性安全保护。可选地,网络设备也可以根据会话的用户面完整性安全策略确定不激活或不开启第二DRB的完整性安全保护,本申请对此不作限定。That is to say, the network device can determine not to activate or enable the integrity security protection of the second DRB based on the record that the integrity security protection state of the first DRB before modification is in an inactive state. Optionally, the network device can also determine not to activate or enable the integrity security protection of the second DRB based on the user plane integrity security policy of the session, which is not limited in this application.
基于该实现方式,在释放第一DRB或修改第一DRB的完整性安全保护状态为激活态之后,通过记录第一DRB的标识,和/或记录第一DRB在修改前的完整性安全保护状态为未激活态,便于在后续第一链路恢复之后,可以基于记录的第一DRB标识重新建立第一DRB(即,第二DRB的一例)。Based on this implementation method, after releasing the first DRB or modifying the integrity security protection state of the first DRB to an activated state, by recording the identifier of the first DRB, and/or recording the integrity security protection state of the first DRB before modification as an inactivated state, it is convenient to re-establish the first DRB (i.e., an example of the second DRB) based on the recorded first DRB identifier after the subsequent first link is restored.
在某些实现方式中,方法还包括:网络设备通过第一DRB接收来自终端设备的第一数据;当第一完整性安全保护指示信息指示激活第一DRB的完整性安全保护时,网络设备对第一数据进行完整性校验;在完整性检验通过且第一链路断开的情况下,网络设备存储第一数据;或者,在完整性检验不通过的情况下,网络设备不存储第一数据,或网络设备丢弃第一数据。In some implementations, the method also includes: the network device receives first data from the terminal device through the first DRB; when the first integrity security protection indication information indicates activation of the integrity security protection of the first DRB, the network device performs an integrity check on the first data; if the integrity check passes and the first link is disconnected, the network device stores the first data; or, if the integrity check fails, the network device does not store the first data, or the network device discards the first data.
在某些实现方式中,在存储第一数据之前,方法还包括:在完整性检验通过的情况下,判断第一链路是否断开。In some implementations, before storing the first data, the method further includes: if the integrity check passes, determining whether the first link is disconnected.
在某些实现方式中,在对第一数据进行完整性校验之前,方法还包括:判断第一链路是否断开。In some implementations, before performing integrity check on the first data, the method further includes: determining whether the first link is disconnected.
也就是说,本申请对判断第一联路是否断开,以及判断是否需要对第一数据进行完整性校验的执行顺序不作限定。示例性地,网络设备可以通过判断网络设备与核心网之间是否正常通信,确定第一链路是否断开。例如网络设备飞行到背离地面关口站的一侧,如地面关口站无法接收到网络设备发射的信号;或者,网络设备和核心网之间的通信条件变差,如遭遇恶劣天气、或者信号质量低于某一阈值等;That is to say, the present application does not limit the execution order of determining whether the first link is disconnected and determining whether the integrity check of the first data is required. Exemplarily, the network device can determine whether the first link is disconnected by determining whether the network device and the core network are communicating normally. For example, the network device flies to the side away from the ground gateway station, such as the ground gateway station cannot receive the signal transmitted by the network device; or, the communication conditions between the network device and the core network deteriorate, such as encountering bad weather, or the signal quality is lower than a certain threshold, etc.;
在某些实现方式中,方法还包括:网络设备通过第一DRB接收来自终端设备的第一数据;当第一完整性安全保护指示信息指示第一DRB不激活完整性安全保护且所述第一链路断开时,网络设备对第一数据不进行完整性校验,或网络设备丢弃第一数据。In some implementations, the method also includes: the network device receives first data from the terminal device through the first DRB; when the first integrity security protection indication information indicates that the first DRB does not activate integrity security protection and the first link is disconnected, the network device does not perform integrity verification on the first data, or the network device discards the first data.
上述第三方面及某些实现方式的有益效果可以对应参考第一方面相关的描述,在此不予赘述。The beneficial effects of the third aspect and some implementation methods mentioned above can be referred to the relevant description of the first aspect, which will not be repeated here.
第四方面,提供了一种安全通信方法。该方法应用于终端设备侧,例如该方法可以由终端设备执行,或者,也可以由终端设备中的芯片或电路等执行,或者,也可以由终端设备中能够调用并执行程序的功能模块等执行。本申请对此不作限定。为了便于描述,下面以由终端设备(例如UE)执行为例进行说明。In a fourth aspect, a secure communication method is provided. The method is applied to a terminal device side, for example, the method can be executed by the terminal device, or it can also be executed by a chip or circuit in the terminal device, or it can also be executed by a functional module in the terminal device that can call and execute a program. This application is not limited to this. For ease of description, the following is an example of execution by a terminal device (such as a UE).
该方法包括:在第一链路断开的情况下,终端设备接收来自网络设备的第一消息,第一消息用于指示第一DRB的释放结果或修改结果,释放结果用于指示是否激活第一DRB,修改结果用于指示是否修改第一DRB的完整性安全保护状态,释放结果或修改结果根据第一DRB的完整性安全保护是否激活确定,第一DRB用于承载终端设备与网络设备之间的数据,第一链路是网络设备与核心网之间的链路;终端设备根据释放结果确定是否释放第一DRB,或者,终端设备根据修改结果确定是否修改第一DRB的完整性安全保护状态。The method includes: when the first link is disconnected, the terminal device receives a first message from the network device, the first message is used to indicate the release result or modification result of the first DRB, the release result is used to indicate whether to activate the first DRB, the modification result is used to indicate whether to modify the integrity security protection status of the first DRB, the release result or the modification result is determined according to whether the integrity security protection of the first DRB is activated, the first DRB is used to carry data between the terminal device and the network device, and the first link is a link between the network device and the core network; the terminal device determines whether to release the first DRB according to the release result, or the terminal device determines whether to modify the integrity security protection status of the first DRB according to the modification result.
示例性地,第一DRB的完整性安全保护是否激活根据用户面完整性安全策略确定。Exemplarily, whether the integrity security protection of the first DRB is activated is determined according to the user plane integrity security policy.
可选地,在终端设备根据释放结果确定是否释放第一DRB,或者,终端设备根据修改结果确定是否修改第一DRB的完整性安全保护状态之前,该方法还包括:终端设备对第一消息进行完整性检验。进一步地,在完整性检验通过的情况下,终端设备根据释放结果确定是否释放第一DRB,或者,终端设备根据修改结果确定是否修改第一DRB的完整性安全保护状态。Optionally, before the terminal device determines whether to release the first DRB according to the release result, or before the terminal device determines whether to modify the integrity security protection state of the first DRB according to the modification result, the method further includes: the terminal device performs an integrity check on the first message. Furthermore, if the integrity check passes, the terminal device determines whether to release the first DRB according to the release result, or before the terminal device determines whether to modify the integrity security protection state of the first DRB according to the modification result.
在某些实现方式中,在第一完整性安全保护指示信息指示第一DRB不激活完整性安全保护的情况下,释放结果指示释放第一DRB。In some implementations, when the first integrity security protection indication information indicates that integrity security protection is not activated for the first DRB, the release result indicates the release of the first DRB.
在某些实现方式中,在第一完整性安全保护指示信息指示第一DRB不激活完整性安全保护的情况下,修改结果指示修改第一DRB的完整性安全保护状态为激活态。In some implementations, when the first integrity security protection indication information indicates that integrity security protection is not activated for the first DRB, the modification result indicates that the integrity security protection state of the first DRB is modified to an activated state.
在某些实现方式中,方法还包括:在第一链路恢复连接的情况下,终端设备接收来自网络设备的第二消息,第二消息用于指示建立第二DRB,第二消息包括第二完整性安全保护指示信息,第二完整性安全保护指示信息用于指示第二DRB不激活完整性安全保护,第二DRB用于承载终端设备与网络设备之间的数据,第一链路是网络设备与核心网之间的链路。In some implementations, the method also includes: when the first link restores connection, the terminal device receives a second message from the network device, the second message is used to indicate the establishment of a second DRB, the second message includes second integrity security protection indication information, the second integrity security protection indication information is used to indicate that the second DRB does not activate integrity security protection, the second DRB is used to carry data between the terminal device and the network device, and the first link is a link between the network device and the core network.
上述第四方面及某些实现方式的有益效果可以对应参考第一方面相关的描述,在此不予赘述。The beneficial effects of the fourth aspect and certain implementation methods mentioned above can be referred to the relevant description of the first aspect, and will not be repeated here.
第五方面,提供了一种安全通信方法。该方法可以由会话管理网元执行,或者,也可以由会话管理网元中的芯片或电路等执行,或者,也可以由会话管理网元中能够调用并执行程序的功能模块等执行。本申请对此不作限定。为了便于描述,下面以由会话管理网元执行为例进行说明。In a fifth aspect, a secure communication method is provided. The method may be executed by a session management network element, or may be executed by a chip or circuit in the session management network element, or may be executed by a functional module in the session management network element that can call and execute a program. This application does not limit this. For ease of description, the following is an example of execution by a session management network element.
该方法包括:在终端设备的会话建立过程中,会话管理网元获取指示信息,指示信息用于指示网络设备部署于卫星上;会话管理网元根据指示信息确定会话对应的用户面完整性安全策略,用户面完整性安全策略用于指示会话激活或可选激活完整性安全保护;会话管理网元向网络设备发送用户面完整性安全策略。The method includes: during the session establishment process of the terminal device, the session management network element obtains indication information, the indication information is used to indicate that the network device is deployed on the satellite; the session management network element determines the user plane integrity security policy corresponding to the session according to the indication information, the user plane integrity security policy is used to indicate the session activation or optional activation of integrity security protection; the session management network element sends the user plane integrity security policy to the network device.
在某些实现方式中,指示信息还用于指示网络设备支持存储转发操作。In some implementations, the indication information is further used to indicate that the network device supports a store-and-forward operation.
在某些实现方式中,方法还包括:会话管理网元获取签约信息,签约信息用于指示终端设备是否签约存储转发操作业务;会话管理网元根据指示信息确定用户面完整性安全策略,包括:会话管理网元根据指示信息和签约信息确定用户面完整性安全策略。In some implementations, the method also includes: the session management network element obtains contract information, and the contract information is used to indicate whether the terminal device has signed a contract for a store-and-forward operation service; the session management network element determines a user plane integrity security policy based on the indication information, including: the session management network element determines a user plane integrity security policy based on the indication information and the contract information.
可选地,会话管理网元根据签约信息确定用户面完整性安全策略。Optionally, the session management network element determines a user plane integrity security policy according to the subscription information.
在某些实现方式中,会话管理网元根据指示信息和签约信息确定用户面完整性安全策略,包括:在签约信息指示终端设备签约存储转发操作业务的情况下,会话管理网元确定完整性安全策略用于指示会话激活完整性安全保护。In some implementations, the session management network element determines a user plane integrity security policy based on the indication information and the subscription information, including: when the subscription information indicates that the terminal device has subscribed to a store-and-forward operation service, the session management network element determines an integrity security policy to indicate that the session activates integrity security protection.
上述第五方面及某些实现方式的有益效果可以对应参考第一方面相关的描述,在此不予赘述。The beneficial effects of the fifth aspect and certain implementation methods mentioned above can be referred to the relevant description of the first aspect, and will not be repeated here.
第六方面,提供了一种通信装置,例如网络设备。该通信装置包括:处理单元,用于在终端设备的会话建立过程中,根据第一信息确定是否激活会话的完整性安全保护,第一信息用于指示网络设备是否支持存储转发操作;收发单元,用于向终端设备发送第一完整性安全保护指示信息,第一完整性安全保护指示信息用于指示激活结果。In a sixth aspect, a communication device is provided, such as a network device. The communication device includes: a processing unit, used to determine whether to activate integrity security protection of a session according to first information during a session establishment process of a terminal device, the first information being used to indicate whether the network device supports a store-and-forward operation; and a transceiver unit, used to send first integrity security protection indication information to the terminal device, the first integrity security protection indication information being used to indicate an activation result.
该收发单元可以执行前述第一方面中的接收和发送的处理,处理单元可以执行前述第一方面中除了接收和发送之外的其他处理。The transceiver unit can perform the reception and transmission processing in the aforementioned first aspect, and the processing unit can perform other processing except reception and transmission in the aforementioned first aspect.
第七方面,提供了一种通信装置,例如终端设备。该通信装置包括:收发单元,用于在终端设备的会话建立过程中,接收来自网络设备的第一完整性安全保护指示信息,第一完整性安全保护指示信息用于指示是否激活会话的完整性安全保护,第一完整性安全保护指示信息根据第一信息确定,第一信息用于指示网络设备是否支持存储转发操作;处理单元,用于对第一完整性安全保护指示信息进行完整性检验;处理单元,还用于在完整性检验通过的情况下,根据第一完整性安全保护指示信息确定是否激活会话的完整性安全保护。In a seventh aspect, a communication device is provided, such as a terminal device. The communication device includes: a transceiver unit, configured to receive first integrity security protection indication information from a network device during a session establishment process of the terminal device, the first integrity security protection indication information being used to indicate whether to activate integrity security protection of the session, the first integrity security protection indication information being determined based on first information, the first information being used to indicate whether the network device supports a store-and-forward operation; a processing unit, configured to perform an integrity check on the first integrity security protection indication information; and the processing unit is further configured to determine whether to activate integrity security protection of the session based on the first integrity security protection indication information when the integrity check passes.
该收发单元可以执行前述第二方面中的接收和发送的处理,处理单元可以执行前述第二方面中除了接收和发送之外的其他处理。The transceiver unit can perform the reception and transmission processing in the aforementioned second aspect, and the processing unit can perform other processing except reception and transmission in the aforementioned second aspect.
第八方面,提供了一种通信装置,例如网络设备。该通信装置包括:收发单元,用于在终端设备的会话建立过程中,获取会话对应的用户面完整性安全策略,用户面完整性安全策略用于指示会话是否激活完整性安全保护;处理单元,用于根据用户面完整性安全策略确定第一完整性安全保护指示信息,第一完整性安全保护指示信息用于指示是否激活第一DRB的完整性安全保护,会话对应第一数据无线承载DRB;处理单元,还用于在第一链路断开的情况下,根据第一DRB的完整性安全保护是否激活确定是否释放第一DRB,或者,根据第一DRB的完整性安全保护是否激活确定是否修改第一DRB的完整性安全保护状态,第一链路是网络设备与核心网之间的链路;收发单元,还用于向终端设备发送第一消息,第一消息用于指示第一DRB的释放结果或修改结果。In an eighth aspect, a communication device is provided, such as a network device. The communication device includes: a transceiver unit, which is used to obtain a user plane integrity security policy corresponding to a session during a session establishment process of a terminal device, and the user plane integrity security policy is used to indicate whether integrity security protection is activated for the session; a processing unit, which is used to determine first integrity security protection indication information according to the user plane integrity security policy, and the first integrity security protection indication information is used to indicate whether to activate integrity security protection of a first DRB, and the session corresponds to a first data radio bearer DRB; the processing unit is also used to determine whether to release the first DRB according to whether the integrity security protection of the first DRB is activated when the first link is disconnected, or to determine whether to modify the integrity security protection state of the first DRB according to whether the integrity security protection of the first DRB is activated, and the first link is a link between the network device and the core network; the transceiver unit is also used to send a first message to the terminal device, and the first message is used to indicate a release result or a modification result of the first DRB.
该收发单元可以执行前述第三方面中的接收和发送的处理,处理单元可以执行前述第三方面中除了接收和发送之外的其他处理。The transceiver unit can perform the receiving and sending processing in the third aspect, and the processing unit can perform other processing except receiving and sending in the third aspect.
第九方面,提供了一种通信装置,例如终端设备。该通信装置包括:收发单元,用于在第一链路断开的情况下,接收来自网络设备的第一消息,第一消息用于指示第一DRB的释放结果或修改结果,第一DRB用于承载终端设备与网络设备之间的数据,释放结果用于指示是否激活第一DRB,修改结果用于指示是否修改第一DRB的完整性安全保护状态,释放结果或修改结果根据第一DRB的完整性安全保护是否激活确定;处理单元,用于对第一消息进行完整性检验;处理单元,还用于在完整性检验通过的情况下,根据释放结果确定是否释放第一DRB,或者,根据修改结果确定是否修改第一DRB的完整性安全保护状态。In the ninth aspect, a communication device is provided, such as a terminal device. The communication device includes: a transceiver unit, which is used to receive a first message from a network device when the first link is disconnected, the first message is used to indicate the release result or modification result of the first DRB, the first DRB is used to carry data between the terminal device and the network device, the release result is used to indicate whether to activate the first DRB, the modification result is used to indicate whether to modify the integrity security protection state of the first DRB, and the release result or modification result is determined according to whether the integrity security protection of the first DRB is activated; a processing unit, which is used to perform an integrity check on the first message; the processing unit is also used to determine whether to release the first DRB according to the release result when the integrity check passes, or to determine whether to modify the integrity security protection state of the first DRB according to the modification result.
示例性地,第一DRB的完整性安全保护是否激活根据用户面完整性安全策略确定。Exemplarily, whether the integrity security protection of the first DRB is activated is determined according to the user plane integrity security policy.
该收发单元可以执行前述第四方面中的接收和发送的处理,处理单元可以执行前述第四方面中除了接收和发送之外的其他处理。The transceiver unit can perform the receiving and sending processing in the fourth aspect, and the processing unit can perform other processing except receiving and sending in the fourth aspect.
第十方面,提供了一种通信装置,例如会话管理网元。该通信装置包括:收发单元,用于在终端设备的会话建立过程中,接收指示信息,指示信息用于指示网络设备部署于卫星上;处理单元,用于根据指示信息确定用户面完整性安全策略,用户面完整性安全策略用于指示会话激活或可选激活完整性安全保护;收发单元,还用于向网络设备发送用户面完整性安全策略。In a tenth aspect, a communication device is provided, such as a session management network element. The communication device includes: a transceiver unit, used to receive indication information during the session establishment process of a terminal device, the indication information is used to indicate that a network device is deployed on a satellite; a processing unit, used to determine a user plane integrity security policy according to the indication information, the user plane integrity security policy is used to indicate session activation or optional activation of integrity security protection; the transceiver unit is also used to send the user plane integrity security policy to the network device.
该收发单元可以执行前述第五方面中的接收和发送的处理,处理单元可以执行前述第五方面中除了接收和发送之外的其他处理。The transceiver unit can perform the receiving and sending processing in the fifth aspect, and the processing unit can perform other processing except receiving and sending in the fifth aspect.
第十一方面,提供了一种通信装置。该通信装置包括收发器、处理器和存储器,该处理器用于控制收发器收发信号,该存储器用于存储计算机程序,该处理器用于从存储器中调用并运行该计算机程序,使得该通信装置执行上述第一方面至第五方面中任一种可能实现方式中的方法。In an eleventh aspect, a communication device is provided. The communication device includes a transceiver, a processor, and a memory, wherein the processor is used to control the transceiver to send and receive signals, the memory is used to store a computer program, and the processor is used to call and run the computer program from the memory, so that the communication device performs the method in any possible implementation of the first to fifth aspects above.
可选地,处理器为一个或多个,存储器为一个或多个。Optionally, there are one or more processors and one or more memories.
可选地,存储器可以与处理器集成在一起,或者存储器与处理器分离设置。Optionally, the memory may be integrated with the processor, or the memory may be provided separately from the processor.
可选地,该通信装置还包括发射机(发射器)和接收机(接收器)。Optionally, the communication device further includes a transmitter (transmitter) and a receiver (receiver).
第十二方面,提供了一种通信系统。该通信系统包括网络设备和会话管理网元,其中,网络设备用于执行上述第一方面或第三方面及其中任一种可能实现方式中的方法,会话管理网元用于执行上述第五方面中任一种可能实现方式中的方法。In a twelfth aspect, a communication system is provided. The communication system includes a network device and a session management network element, wherein the network device is used to execute the method in the first aspect or the third aspect and any possible implementation thereof, and the session management network element is used to execute the method in any possible implementation of the fifth aspect.
可选地,该通信系统还包括终端设备,其中,终端设备用于执行上述第二方面或第四方面及其中任一种可能实现方式中的方法。Optionally, the communication system further includes a terminal device, wherein the terminal device is used to execute the method in the above-mentioned second aspect or fourth aspect and any possible implementation manner thereof.
第十三方面,提供了一种计算机可读存储介质。该计算机可读存储介质存储有计算机程序代码指令,当计算机程序代码或指令被运行时,使得上述第一方面至第五方面中任一种可能实现方式中的方法被执行。In a thirteenth aspect, a computer-readable storage medium is provided. The computer-readable storage medium stores computer program code instructions, and when the computer program code or instructions are executed, the method in any possible implementation of the first to fifth aspects is executed.
第十四方面,提供了一种芯片。该芯片包括至少一个处理器,至少一个处理器与存储器耦合,该存储器用于存储计算机程序,该处理器用于从存储器中调用并运行该计算机程序,使得安装有该芯片系统的通信装置执行上述第一方面至第五方面中任一种可能实现方式中的方法。In a fourteenth aspect, a chip is provided. The chip includes at least one processor, the at least one processor is coupled to a memory, the memory is used to store a computer program, and the processor is used to call and run the computer program from the memory, so that a communication device equipped with the chip system performs the method in any possible implementation of the first to fifth aspects above.
其中,该芯片可以包括用于发送信息或数据的输入电路或者接口,以及用于接收信息或数据的输出电路或者接口。The chip may include an input circuit or interface for sending information or data, and an output circuit or interface for receiving information or data.
第十五方面,提供了一种计算机程序产品。该计算机程序产品包括:计算机程序代码,当计算机程序代码运行时,使得上述第一方面至第五方面中任一种可能实现方式中的方法被执行。In a fifteenth aspect, a computer program product is provided, which includes: a computer program code, and when the computer program code is executed, the method in any possible implementation manner of the first to fifth aspects is executed.
第十六方面,提供了一种计算机程序。当计算机程序被运行时,使得上述第一方面至第五方面中任一种可能实现方式中的方法被执行。In a sixteenth aspect, a computer program is provided. When the computer program is executed, the method in any possible implementation manner of the first to fifth aspects is executed.
其中,第六方面至第十六方面的技术方案的技术效果,可以参考第一方面至第五方面的相应技术效果的说明,不再赘述。Among them, the technical effects of the technical solutions of the sixth to sixteenth aspects can refer to the description of the corresponding technical effects of the first to fifth aspects and will not be repeated here.
图1是适用于本申请实施例的一种通信系统的示意图;FIG1 is a schematic diagram of a communication system applicable to an embodiment of the present application;
图2是适用于本申请实施例的另一种通信系统的示意图;FIG2 is a schematic diagram of another communication system applicable to an embodiment of the present application;
图3是一种终端设备的会话建立方法的示意流程图;FIG3 is a schematic flow chart of a method for establishing a session of a terminal device;
图4是本申请实施例提供的一种通信方法的示意流程图;FIG4 is a schematic flow chart of a communication method provided in an embodiment of the present application;
图5是本申请实施例提供的另一种通信方法的示意流程图;FIG5 is a schematic flow chart of another communication method provided in an embodiment of the present application;
图6是本申请实施例提供的又一种通信方法的示意流程图;FIG6 is a schematic flow chart of another communication method provided in an embodiment of the present application;
图7是本申请实施例提供的又一种通信方法的示意流程图;FIG7 is a schematic flow chart of another communication method provided in an embodiment of the present application;
图8是本申请实施例提供的又一种通信方法的示意流程图;FIG8 is a schematic flow chart of another communication method provided in an embodiment of the present application;
图9是本申请实施例提供的又一种通信方法的示意流程图;FIG9 is a schematic flow chart of another communication method provided in an embodiment of the present application;
图10是本申请实施例提供的一种通信装置的示意性框图;FIG10 is a schematic block diagram of a communication device provided in an embodiment of the present application;
图11是本申请实施例提供的另一种通信装置的示意性框图。FIG. 11 is a schematic block diagram of another communication device provided in an embodiment of the present application.
下面将结合附图,对本申请中的技术方案进行描述。The technical solution in this application will be described below in conjunction with the accompanying drawings.
本申请的技术方案可以应用于卫星通信系统、高空平台(high altitude platform station,HAPS)通信等非地面网络(non-terrestrial network,NTN)系统,例如,通信、导航一体化(integrated communication and navigation,ICaN)系统、全球导航卫星系统(global navigation satellite system,GNSS)等。The technical solution of the present application can be applied to satellite communication systems, high altitude platform station (HAPS) communications and other non-terrestrial network (NTN) systems, for example, integrated communication and navigation (ICaN) systems, global navigation satellite systems (GNSS), etc.
卫星通信系统可以与传统的移动通信系统相融合。其中,移动通信系统可以为5G或NR系统、长期演进(long term evolution,LTE)系统、LTE频分双工(frequency division duplex,FDD)系统、LTE时分双工(time division duplex,TDD)系统、通用移动通信系统(universal mobile telecommunication system,UMTS)等。本申请提供的技术方案还可以应用于未来的通信系统,如第六代(6th generation,6G)移动通信系统。本申请提供的技术方案还可以应用于设备到设备(device to device,D2D)通信,车到万物(vehicle-to-everything,V2X)通信,机器到机器(machine to machine,M2M)通信,机器类型通信(machine type communication,MTC),物联网(internet of things,IoT)通信系统,非地面网络(non-terrestrial network,NTN)通信系统或者其他通信系统。Satellite communication systems can be integrated with traditional mobile communication systems. Among them, the mobile communication system can be a 5G or NR system, a long term evolution (LTE) system, an LTE frequency division duplex (FDD) system, an LTE time division duplex (TDD) system, a universal mobile telecommunication system (UMTS), etc. The technical solution provided in this application can also be applied to future communication systems, such as the sixth generation (6G) mobile communication system. The technical solution provided in this application can also be applied to device to device (D2D) communication, vehicle to everything (V2X) communication, machine to machine (M2M) communication, machine type communication (MTC), Internet of things (IoT) communication system, non-terrestrial network (NTN) communication system or other communication systems.
图1是适用于本申请实施例的通信系统的示意图。如图1所示,该架构100中可以包括终端设备110、网络设备120、核心网(core network,CN)130和外部网络140等。Fig. 1 is a schematic diagram of a communication system applicable to an embodiment of the present application. As shown in Fig. 1, the architecture 100 may include a terminal device 110, a network device 120, a core network (CN) 130, and an external network 140.
(1)终端设备110可以称为用户设备UE。本申请中的终端设备110一种具有无线收发功能的设备,可以经过网络设备120与一个或多个CN 130进行通信。终端设备110也可称为接入终端、终端、用户单元、用户站、移动站、移动台、远方站、远程终端、移动设备、用户终端、用户代理或用户装置等。终端设备110可以部署在陆地上,包括室内或室外、手持或车载;也可以部署在水面上(例如轮船等);还可以部署在空中(例如飞机、气球和卫星上等)。终端设备110可以是蜂窝电话、无绳电话、会话启动协议(session initiation protocol,SIP)电话、智能电话、手机(mobile phone)、无线本地环路(wireless local loop,WLL)站、个人数字处理(personal digital assistant,PDA)等。或者,终端设备110还可以是具有无线通信功能的手持设备、计算设备或连接到无线调制解调器的其它设备、车载设备、可穿戴设备、无人机(unmanned aerial vehicle/uncrewed aerial vehicle,UAV)设备或物联网、车联网中的终端、5G网络以及未来网络中的任意形态的终端、中继用户设备或者未来演进的6G网络中的终端等。其中,中继用户设备例如可以是5G家庭网关(residential gateway,RG)。例如,终端设备110可以是虚拟现实(virtual reality,VR)终端、增强现实(augmented reality,AR)终端、工业控制中的无线终端、无人驾驶中的无线终端、远程医疗中的无线终端、智能电网中的无线终端、运输安全中的无线终端、智慧城市中的无线终端、智慧家庭中的无线终端等。或者,终端设备110还可以是逻辑实体、智能设备(如手机)、智能终端等终端设备,或者服务器、网关、基站、控制器等通信设备,或者物联网设备、传感器、电表、水表等IoT设备。本申请实施例对终端设备的类型或种类等并不限定。(1) The terminal device 110 may be referred to as a user equipment UE. The terminal device 110 in the present application is a device with wireless transceiver functions, which can communicate with one or more CN 130 through the network device 120. The terminal device 110 may also be referred to as an access terminal, a terminal, a user unit, a user station, a mobile station, a mobile station, a remote station, a remote terminal, a mobile device, a user terminal, a user agent or a user device, etc. The terminal device 110 may be deployed on land, including indoors or outdoors, handheld or vehicle-mounted; it may also be deployed on the water surface (such as a ship, etc.); it may also be deployed in the air (such as an airplane, a balloon, and a satellite, etc.). The terminal device 110 may be a cellular phone, a cordless phone, a session initiation protocol (SIP) phone, a smart phone, a mobile phone, a wireless local loop (WLL) station, a personal digital assistant (PDA), etc. Alternatively, the terminal device 110 may also be a handheld device with wireless communication function, a computing device or other device connected to a wireless modem, an in-vehicle device, a wearable device, an unmanned aerial vehicle (UAV) device or a terminal in the Internet of Things or Internet of Vehicles, a terminal in any form in a 5G network and future networks, a relay user device or a terminal in a future evolved 6G network, etc. Among them, the relay user device may be, for example, a 5G residential gateway (RG). For example, the terminal device 110 may be a virtual reality (VR) terminal, an augmented reality (AR) terminal, a wireless terminal in industrial control, a wireless terminal in unmanned driving, a wireless terminal in telemedicine, a wireless terminal in a smart grid, a wireless terminal in transportation safety, a wireless terminal in a smart city, a wireless terminal in a smart home, etc. Alternatively, the terminal device 110 may also be a terminal device such as a logical entity, a smart device (such as a mobile phone), a smart terminal, or a communication device such as a server, a gateway, a base station, a controller, or an IoT device such as an IoT device, a sensor, an electric meter, a water meter, etc. The embodiment of the present application does not limit the type or category of the terminal device.
本申请实施例中,用于实现终端设备的功能的装置可以是终端设备,也可以是能够支持终端设备实现该功能的装置,例如芯片系统或芯片,该装置可以被安装在终端设备中。本申请实施例中,芯片系统可以由芯片构成,也可以包括芯片和其他分立器件。In the embodiment of the present application, the device for realizing the function of the terminal device can be the terminal device, or it can be a device that can support the terminal device to realize the function, such as a chip system or a chip, which can be installed in the terminal device. In the embodiment of the present application, the chip system can be composed of a chip, or it can include a chip and other discrete devices.
(2)网络设备120可以是任意一种具有无线收发功能的设备用于与终端设备通信的设备,该网络设备也可以称为接入网设备或无线接入网设备,如网络设备可以是基站。本申请实施例中的网络设备可以是指将终端设备接入到无线网络的无线接入网(radio access network,RAN)节点(或RAN设备、或RAN实体)。(R)AN可以看作是运营商网络的子网络,是运营商网络中业务节点与终端设备110之间的实施系统。例如,终端设备110要接入运营商网络,首先是经过网络设备120,进而可通过网络设备120与运营商网络的业务节点连接。上述RAN可以是第三代合作伙伴计划(3rd generation partnership project,3GPP)相关的蜂窝系统,例如5G移动通信系统、或面向未来的演进系统(如6G移动通信系统)。RAN还可以是开放式无线接入网(open RAN,O-RAN或ORAN)、云无线接入网络(cloud radio access network,CRAN)、或者无线保真(wireless fidelity,WiFi)系统。RAN还可以是以上两种或两种以上系统融合的通信系统。网络设备120包括但不限于:5G系统中的下一代基站节点(next generation node base station,gNB)、LTE中的演进型节点B(evolved node B,eNB)、无线网络控制器(radio network controller,RNC)、节点B(node B,NB)、基站控制器(base station controller,BSC)、基站收发台(base transceiver station,BTS)、家庭基站(例如,home evolved nodeB,或home node B,HNB)、基带单元(base band unit,BBU)、传输点(transmitting and receiving point,TRP)、发射点(transmitting point,TP)、小基站设备(pico)、移动交换中心,或者未来网络中的网络设备等。采用不同无线接入技术的系统中,具备接入网设备功能的设备的名称可能会有所不同。为方便描述,本申请所有实施例中,上述为终端设备110提供无线通信功能的装置统称为接入网设备或简称为RAN或AN。应理解,本文对接入网设备的具体类型不作限定。(2) The network device 120 may be any device with a wireless transceiver function for communicating with a terminal device. The network device may also be referred to as an access network device or a wireless access network device, such as a base station. The network device in the embodiment of the present application may refer to a radio access network (RAN) node (or RAN device, or RAN entity) that connects the terminal device to a wireless network. (R)AN may be regarded as a subnetwork of an operator network, and is an implementation system between a service node in the operator network and the terminal device 110. For example, if the terminal device 110 wants to access the operator network, it first passes through the network device 120, and then can connect to the service node of the operator network through the network device 120. The above-mentioned RAN may be a cellular system related to the third generation partnership project (3GPP), such as a 5G mobile communication system, or a future-oriented evolution system (such as a 6G mobile communication system). RAN may also be an open radio access network (open RAN, O-RAN or ORAN), a cloud radio access network (cloud radio access network, CRAN), or a wireless fidelity (WiFi) system. RAN can also be a communication system that integrates two or more of the above systems. The network device 120 includes, but is not limited to: a next generation node base station (gNB) in a 5G system, an evolved node B (eNB) in LTE, a radio network controller (RNC), a node B (NB), a base station controller (BSC), a base transceiver station (BTS), a home base station (e.g., home evolved node B, or home node B, HNB), a base band unit (BBU), a transmission point (TRP), a transmitting point (TP), a small base station device (pico), a mobile switching center, or a network device in a future network. In systems using different wireless access technologies, the names of devices with access network device functions may be different. For the convenience of description, in all embodiments of the present application, the above-mentioned device providing wireless communication function for the terminal device 110 is collectively referred to as access network equipment or RAN or AN for short. It should be understood that the specific type of access network equipment is not limited herein.
在一些部署中,由多个RAN节点协作协助终端实现无线接入,不同RAN节点分别实现基站的部分功能。例如,RAN节点可以是CU,DU,中央单元控制面(central unit-control plane,CU-CP),中央单元用户面(central unit-user plane,CU-UP),或者无线单元(radio unit,RU)等。CU和DU可以是单独设置,或者也可以包括在同一个网元中,例如BBU中。RU的功能可以由基站的射频设备实现。例如,基站的射频设备可以是射频远端处理单元(remote radio unit,RRU)、微型射频拉远单元(pico remote radio unit,pRRU)、有源天线处理单元(active antenna unit,AAU)或者其他具备射频处理功能的单元、模块或设备等。BBU和射频设备之间的通信接口协议可以是通用公共无线接口(common public radio interface,CPRI)接口协议、增强型通用公共无线电接口(enhanced common public radio interface,eCPRI)接口协议、或者O-RAN系统中DU和RU之间的前传接口协议等,不予限制。In some deployments, multiple RAN nodes collaborate to assist the terminal in achieving wireless access, and different RAN nodes implement part of the functions of the base station. For example, the RAN node can be a CU, DU, central unit-control plane (CU-CP), central unit-user plane (CU-UP), or radio unit (RU). The CU and DU can be set separately, or they can also be included in the same network element, such as the BBU. The functions of the RU can be implemented by the radio frequency equipment of the base station. For example, the radio frequency equipment of the base station can be a remote radio unit (RRU), a pico remote radio unit (pRRU), an active antenna unit (AAU), or other units, modules or devices with radio frequency processing functions. The communication interface protocol between the BBU and the radio frequency equipment can be the common public radio interface (CPRI) interface protocol, the enhanced common public radio interface (eCPRI) interface protocol, or the fronthaul interface protocol between the DU and RU in the O-RAN system, etc., without restriction.
在不同系统中,CU(或CU-CP和CU-UP)、DU或RU也可以有不同的名称,但是本领域的技术人员可以理解其含义。例如,在ORAN系统中,CU也可以称为O-CU(开放式CU),DU也可以称为O-DU,CU-CP也可以称为O-CU-CP,CU-UP也可以称为O-CU-UP,RU也可以称为O-RU。本申请中的CU(或CU-CP、CU-UP)、DU和RU中的任一单元,可以是通过软件模块、硬件模块、或者软件模块与硬件模块结合来实现。为描述方便,本申请中以CU,CU-CP,CU-UP、DU和RU为例进行描述。In different systems, CU (or CU-CP and CU-UP), DU or RU may also have different names, but those skilled in the art can understand their meanings. For example, in the ORAN system, CU may also be called O-CU (open CU), DU may also be called O-DU, CU-CP may also be called O-CU-CP, CU-UP may also be called O-CU-UP, and RU may also be called O-RU. Any unit in the CU (or CU-CP, CU-UP), DU and RU in this application may be implemented by a software module, a hardware module, or a combination of a software module and a hardware module. For the convenience of description, CU, CU-CP, CU-UP, DU and RU are used as examples for description in this application.
网络设备120可以是固定的,也可以是移动的。例如,直升机或无人机可以被配置成充当移动基站,一个或多个小区可以根据该移动基站的位置移动。在其它示例中,直升机或无人机可以被配置成用作与另一基站通信的设备。The network device 120 may be fixed or mobile. For example, a helicopter or drone may be configured to act as a mobile base station, and one or more cells may move according to the location of the mobile base station. In other examples, a helicopter or drone may be configured to act as a device that communicates with another base station.
本申请实施例中,用于实现接入网设备的功能的装置可以是网络设备,也可以是能够支持接入网设备实现该功能的装置,例如芯片系统或芯片,该装置可以被安装在接入网设备中。本申请实施例中,芯片系统可以由芯片构成,也可以包括芯片和其他分立器件。In the embodiment of the present application, the device for implementing the function of the access network device may be a network device, or a device capable of supporting the access network device to implement the function, such as a chip system or a chip, which may be installed in the access network device. In the embodiment of the present application, the chip system may be composed of a chip, or may include a chip and other discrete devices.
网络设备和终端设备可以部署在陆地上,包括室内或室外、手持或车载;也可以部署在水面上;还可以部署在空中的飞机、气球和卫星上。本申请实施例中对网络设备和终端设备所处的场景不做限定。此外,终端设备和网络设备可以是硬件设备,也可以是在专用硬件上运行的软件功能,通用硬件上运行的软件功能,比如,是平台(例如,云平台)上实例化的虚拟化功能,又或者,是包括专用或通用硬件设备和软件功能的实体,本申请对于终端设备和网络设备的具体形态不作限定。Network devices and terminal devices can be deployed on land, including indoors or outdoors, handheld or vehicle-mounted; they can also be deployed on the water; they can also be deployed on aircraft, balloons and satellites in the air. The scenarios in which network devices and terminal devices are located are not limited in the embodiments of the present application. In addition, terminal devices and network devices can be hardware devices, or they can be software functions running on dedicated hardware, software functions running on general-purpose hardware, such as virtualization functions instantiated on a platform (e.g., a cloud platform), or entities including dedicated or general-purpose hardware devices and software functions. The present application does not limit the specific forms of terminal devices and network devices.
(3)核心网CN可以包括但不限于如下网络功能(network function,NF):用户面功能(user plane function,UPF)、网络开放功能(network exposure function,NEF)、网络功能存储库功能(network function repository function,NRF)、策略控制功能(policy control function,PCF)、统一数据管理功能(unified data management,UDM)、统一数据存储库功能(unified data repository,UDR)、应用功能(application function,AF)、认证服务器功能(authentication server function,AUSF)、接入与移动性管理功能(access and mobility management function,AMF)、会话管理功能(session management function,SMF)。(3) The core network CN may include but is not limited to the following network functions (NF): user plane function (UPF), network exposure function (NEF), network function repository function (NRF), policy control function (PCF), unified data management function (UDM), unified data repository function (UDR), application function (AF), authentication server function (AUSF), access and mobility management function (AMF), and session management function (SMF).
下面对CN包含的NF功能进行进一步简要说明。The following is a brief description of the NF functions included in CN.
1、UPF是由运营商提供的网关,是运营商网络与DN通信的网关,主要负责数据包路由和传输、数据包检测、业务用量上报、服务质量(quality of service,QoS)处理、合法监听、上行数据包检测、下行数据包存储等。UPF也可以称为用户面设备,可以从DN 240接收用户数据,通过网络设备120传输给终端设备110;UPF还可以通过网络设备120从终端设备110接收用户数据,转发到DN。UPF中为终端设备110提供服务的传输资源和调度功能由SMF管理控制的。1. UPF is a gateway provided by the operator. It is the gateway for the operator network to communicate with DN. It is mainly responsible for packet routing and transmission, packet detection, service usage reporting, quality of service (QoS) processing, legal monitoring, uplink packet detection, downlink packet storage, etc. UPF can also be called user plane equipment. It can receive user data from DN 240 and transmit it to terminal device 110 through network device 120; UPF can also receive user data from terminal device 110 through network device 120 and forward it to DN. The transmission resources and scheduling functions in UPF that provide services for terminal device 110 are managed and controlled by SMF.
2、NEF是由运营商提供的控制面功能,主要使能第三方使用网络提供的服务,支持网络开放其能力、事件及数据分析、从外部应用给PLMN安全配备信息、PLMN内外交互信息的转换等。NEF也可以称为网络开放设备,可以提供Nnef服务。2. NEF is a control plane function provided by the operator, which mainly enables third parties to use the services provided by the network, supports the network to open its capabilities, event and data analysis, provide PLMN security configuration information from external applications, and convert the interactive information inside and outside the PLMN. NEF can also be called a network open device, which can provide Nnef services.
3、NRF是由运营商提供的控制面功能,可用于维护网络中网络功能、服务的实时信息。例如支持网络服务发现、维护NF实例的NF配置数据(NF profile)支持的服务、支持通信代理(service communication proxy,SCP)的服务发现、维护SCP实例的SCP配置数据(SCP profile)、发送有关新注册、去注册、更新的NF和SCP的通知、维护NF和SCP运行的健康状态等。3. NRF is a control plane function provided by the operator, which can be used to maintain real-time information of network functions and services in the network. For example, it supports network service discovery, maintains the services supported by the NF configuration data (NF profile) of the NF instance, supports service discovery of the communication proxy (SCP), maintains the SCP configuration data (SCP profile) of the SCP instance, sends notifications about newly registered, deregistered, and updated NFs and SCPs, and maintains the health status of NF and SCP operations.
4、PCF是由运营商提供的控制面功能,它支持统一的策略框架来治理网络行为、向其他控制功能提供策略规则、策略决策相关的签约信息等。4. PCF is a control plane function provided by the operator. It supports a unified policy framework to govern network behavior, provide policy rules to other control functions, and contract information related to policy decisions.
5、UDM是由运营商提供的控制面功能,负责存储运营商网络中签约用户的用户永久标识符(subscriber permanent identifier,SUPI)、签约用户的公开使用的签约标识(generic public subscription identifier,GPSI),信任状(credential)等信息,这些信息可用于终端设备110接入运营商网络的认证和授权。其中,SUPI在传输过程中会先进行加密,加密后的SUPI被称为隐藏的用户签约标识符(subscription concealed identifier,SUCI)。UDM也可以称为统一数据管理设备、统一数据管理网元、数据管理设备、统一数据管理实体等。5. UDM is a control plane function provided by the operator, responsible for storing the subscriber permanent identifier (SUPI), the generic public subscription identifier (GPSI), and credentials of the subscribers in the operator network. This information can be used for authentication and authorization of the terminal device 110 to access the operator network. Among them, SUPI will be encrypted during transmission, and the encrypted SUPI is called a hidden user subscription identifier (SUCI). UDM can also be called a unified data management device, a unified data management network element, a data management device, a unified data management entity, etc.
6、UDR是由运营商提供的控制面功能,为UDM提供存储和获取签约数据的功能、为PCF提供存储和获取策略数据、存储和获取用户的NF群组ID(group ID)信息等。UDR也可以称为用户数据库设备、用户数据库实体、用户数据库网元等,其中,用户数据库主要包括以下功能:签约数据、策略数据、应用数据等类型数据的存取功能。6. UDR is a control plane function provided by the operator, which provides the functions of storing and obtaining subscription data for UDM, storing and obtaining policy data for PCF, storing and obtaining user's NF group ID (group ID) information, etc. UDR can also be called user database equipment, user database entity, user database network element, etc. Among them, the user database mainly includes the following functions: storage and access functions of subscription data, policy data, application data and other types of data.
7、AF是由运营商提供的控制面功能,主要通过与PLMN中其他NF进行交互来提供相应服务,例如提供漫游UE拜访网络选择信息、引导数据流的路由、接入NEF等。AF可以由运营商部署在PLMN内部,也可以部署在运营商网络之外。7. AF is a control plane function provided by the operator. It mainly provides corresponding services by interacting with other NFs in the PLMN, such as providing roaming UE with access network selection information, guiding the routing of data flows, accessing NEF, etc. AF can be deployed by the operator inside the PLMN or outside the operator network.
8、AUSF是由运营商提供的控制面功能,通常用于一级认证,即终端设备110(签约用户)与运营商网络之间的认证。AUSF接收到签约用户发起的认证请求之后,可通过UDM中存储的认证信息和/或授权信息对签约用户进行认证和/或授权,或者通过UDM生成签约用户的认证和/或授权信息。AUSF可向签约用户反馈认证信息和/或授权信息。8. AUSF is a control plane function provided by the operator, which is usually used for primary authentication, that is, authentication between the terminal device 110 (subscriber) and the operator network. After receiving the authentication request initiated by the subscriber, AUSF can authenticate and/or authorize the subscriber through the authentication information and/or authorization information stored in the UDM, or generate the authentication and/or authorization information of the subscriber through the UDM. AUSF can feedback the authentication information and/or authorization information to the subscriber.
9、AMF是由运营商网络提供的控制面网络功能,负责终端设备110接入运营商网络的接入控制和移动性管理,例如包括移动状态管理,分配用户临时身份标识,认证和授权用户等功能。示例性地,AMF也可以称为接入与移动性管理设备、接入与移动性管理功能实体、接入与移动性管理功能网元、移动管理设备、移动管理网元、移动管理实体等,可以提供Namf服务。9. AMF is a control plane network function provided by the operator network, responsible for access control and mobility management of the terminal device 110 accessing the operator network, including, for example, mobility status management, allocation of user temporary identity, authentication and authorization of users, etc. Exemplarily, AMF may also be referred to as access and mobility management equipment, access and mobility management function entity, access and mobility management function network element, mobile management equipment, mobile management network element, mobile management entity, etc., and may provide Namf services.
10、SMF是由运营商网络提供的控制面网络功能,负责管理终端设备110的协议数据单元(protocol data unit,PDU)会话,终端设备通过PDU会话与DN互相传送PDU。PDU会话由SMF负责建立、维护和删除等。SMF包括会话管理(例如会话建立、修改和释放,包含用户面功能UPF和网络设备120之间的隧道维护)、UPF的选择和控制、业务和会话连续性(service and session continuity,SSC)模式选择、漫游等会话相关的功能。SMF也可以称为会话管理设备,可以提供Nsmf服务。10. SMF is a control plane network function provided by the operator network, responsible for managing the protocol data unit (PDU) session of the terminal device 110. The terminal device transmits PDU to each other with the DN through the PDU session. The PDU session is established, maintained and deleted by SMF. SMF includes session management (such as session establishment, modification and release, including tunnel maintenance between the user plane function UPF and the network device 120), UPF selection and control, service and session continuity (SSC) mode selection, roaming and other session-related functions. SMF can also be called a session management device, which can provide Nsmf services.
(4)外部网络140可以是数据网络(data network,DN),也可以称为分组数据网络(packet data network,PDN),通常是位于运营商网络之外的网络,例如第三方网络。在一些实现方式中,DN也可以由运营商进行部署,即DN属于公共陆地移动网络(public land mobile network,PLMN)中的一部分。本申请对DN是否属于PLMN不作限制。DN上可部署多种业务,可为终端设备110提供数据和/或语音等服务。(4) The external network 140 may be a data network (DN), also known as a packet data network (PDN), which is usually a network located outside the operator's network, such as a third-party network. In some implementations, the DN may also be deployed by the operator, that is, the DN is part of the public land mobile network (PLMN). This application does not restrict whether the DN belongs to the PLMN. A variety of services may be deployed on the DN, which may provide data and/or voice services to the terminal device 110.
可以理解的是,上述网元或者功能既可以是硬件设备中的物理实体,也可以是在专用硬件上运行的软件实例,或者是共享平台(例如,云平台)上实例化的虚拟化功能。简单来说,一个NF可以由硬件来实现,也可以由软件来实现。It is understandable that the above network elements or functions can be physical entities in hardware devices, software instances running on dedicated hardware, or virtualized functions instantiated on a shared platform (e.g., a cloud platform). In short, an NF can be implemented by hardware or software.
应理解,上述命名仅为便于区分不同的功能而定义,不应对本申请构成任何限定。本申请并不排除在5G网络以及未来其它的网络中采用其他命名的可能。例如,在6G网络中,上述各个网元中的部分或全部可以沿用5G中的术语,也可能采用其他名称等。It should be understood that the above naming is only defined for the convenience of distinguishing different functions and should not constitute any limitation to this application. This application does not exclude the possibility of using other naming in 5G networks and other future networks. For example, in a 6G network, some or all of the above network elements may use the terminology in 5G, or may use other names.
NTN通信系统包括通信、导航一体化(integrated communication and navigation,IcaN)系统、全球导航卫星系统(global navigation satellite system,GNSS)和超密低轨卫星通信系统等。例如,NTN通信系统包括卫星网络、高空平台和无人机等节点,具有全球覆盖、远距离传输、组网灵活、部署方便和不受地理条件限制等显著优点,已经被广泛应用于海上通信、定位导航、抗险救灾、科学实验、视频广播和对地观测等多个领域。地面通信网络(例如,LTE网络、5G通信网络、未来的6G通信网络等)和卫星网络等相互融,共同构成全球无缝覆盖的海、陆、空、天、地一体化综合通信网,可以满足用户的多种业务需求。当前5G网络支持再生星模式,即NTN通信系统通过将接入网设备或者部分接入网设备的功能部署在非地面(例如,高空平台或者卫星等)上为终端设备提供无缝覆盖,也可以称为接入网设备使用新空口NR向终端设备提供卫星接入。为便于描述,本申请实施例中将部署有接入网功能的卫星称为卫星接入网设备,或者将部署在卫星上的基站称为卫星基站。NTN communication system includes integrated communication and navigation (IcaN) system, global navigation satellite system (GNSS) and ultra-dense low-orbit satellite communication system. For example, NTN communication system includes satellite network, high-altitude platform and drone nodes, with significant advantages such as global coverage, long-distance transmission, flexible networking, convenient deployment and no geographical restrictions. It has been widely used in maritime communication, positioning navigation, disaster relief, scientific experiments, video broadcasting and earth observation. Ground communication network (for example, LTE network, 5G communication network, future 6G communication network, etc.) and satellite network are integrated to form a global seamless coverage of sea, land, air, space and ground integrated integrated communication network, which can meet the various business needs of users. The current 5G network supports the regenerated satellite mode, that is, the NTN communication system provides seamless coverage for terminal devices by deploying the functions of access network devices or part of the access network devices on non-ground (for example, high-altitude platforms or satellites, etc.), which can also be called the access network device using the new air interface NR to provide satellite access to terminal devices. For ease of description, in the embodiments of the present application, the satellite deployed with the access network function is referred to as a satellite access network device, or the base station deployed on the satellite is referred to as a satellite base station.
图2是适用于本申请实施例的网络架构的示意图。该卫星通信系统包括卫星基站201、卫星基站202,每颗卫星基站可以通过多波束为终端设备提供服务,例如通信服务、导航服务和定位服务等。该场景下的卫星可以为低地球轨道(low earth orbit,LEO)卫星、中地球轨道(medium earth orbit,MEO)卫星、高椭圆轨道(high elliptical orbit,HEO)卫星、地球同步(geostationary earth orbit,GEO)卫星等,本申请实施例对此不作具体限定。卫星基站202连接到地面关口站(如NTN Gateway),地面关口站也可以称为网关站、信关站、地面站设备等。卫星采用多个波束覆盖服务区域,不同的波束可通过时分、频分、空分中的一种或多种进行通信。FIG2 is a schematic diagram of a network architecture applicable to an embodiment of the present application. The satellite communication system includes a satellite base station 201 and a satellite base station 202, each of which can provide services to terminal devices through multiple beams, such as communication services, navigation services, and positioning services. The satellite in this scenario can be a low earth orbit (LEO) satellite, a medium earth orbit (MEO) satellite, a high elliptical orbit (HEO) satellite, a geostationary earth orbit (GEO) satellite, etc., and the embodiment of the present application does not specifically limit this. The satellite base station 202 is connected to a ground gateway station (such as NTN Gateway), which can also be called a gateway station, a signal gateway station, a ground station device, etc. The satellite uses multiple beams to cover the service area, and different beams can communicate through one or more of time division, frequency division, and space division.
如图2所示,以5G网络为例,地面的终端设备可以使用5G新空口与卫星基站进行通信,例如卫星基站可以通过广播通信信号和导航信号等与终端设备进行无线通信。其中,终端设备和卫星基站之间的连接可以称为服务链路(service link)。卫星基站可以通过NG接口(例如,用于交互核心网的NAS等信令,以及用户的业务数据)与地面站(也称为网关站、地面关口站、信关站等)进行无线通信,卫星基站也可以通过地面关口站与核心网进行通信。其中,地面站主要负责转发卫星基站和核心网之间的信令和业务数据,卫星基站和地面站之间的连接可以称为馈线链路(feeder link)。同时,在卫星之间存在星间链路(inter-satellite link,ISL),用于完成5G接入网设备与5G接入网设备之间的信令交互和用户数据传输,例如卫星基站201可以通过Xn接口(例如,用于切换等信令交互)与卫星基站202进行无线通信。As shown in FIG. 2 , taking the 5G network as an example, the terminal equipment on the ground can use the 5G new air interface to communicate with the satellite base station. For example, the satellite base station can communicate wirelessly with the terminal equipment through broadcast communication signals and navigation signals. Among them, the connection between the terminal equipment and the satellite base station can be called a service link. The satellite base station can communicate wirelessly with the ground station (also called a gateway station, a ground gateway station, a signal gateway station, etc.) through the NG interface (for example, for signaling such as NAS for interactive core network, and user business data), and the satellite base station can also communicate with the core network through the ground gateway station. Among them, the ground station is mainly responsible for forwarding the signaling and business data between the satellite base station and the core network, and the connection between the satellite base station and the ground station can be called a feeder link. At the same time, there is an inter-satellite link (ISL) between satellites, which is used to complete the signaling interaction and user data transmission between 5G access network equipment and 5G access network equipment. For example, the satellite base station 201 can communicate wirelessly with the satellite base station 202 through the Xn interface (for example, for signaling interaction such as switching).
需要说明的是,图2所示的通信系统中以卫星通信系统结合5G系统为例进行说明,当卫星通信系统结合其他地面通信系统时,涉及的网元、接口可以是其他的名称,本申请实施例对此不作具体限定。It should be noted that the communication system shown in Figure 2 is illustrated by taking the satellite communication system combined with the 5G system as an example. When the satellite communication system is combined with other terrestrial communication systems, the network elements and interfaces involved may have other names, and the embodiments of the present application do not specifically limit this.
通常情况下,终端设备和卫星基站之间的服务链路以及卫星基站和地面站之间的馈线链路是连通的,即终端设备和核心网之间的上行消息和下行消息可以通过卫星基站和地面站传输。下面,结合图3针对终端设备和核心网之间的会话建立进行说明。Normally, the service link between the terminal device and the satellite base station and the feeder link between the satellite base station and the ground station are connected, that is, the uplink message and the downlink message between the terminal device and the core network can be transmitted through the satellite base station and the ground station. Below, the session establishment between the terminal device and the core network is explained in conjunction with Figure 3.
图3是一种终端设备的会话建立方法的流程示意图。该方法300可应用于图1和图2的网络架构,主要针对卫星通信系统中的用户面会话建立流程,以及在用户面会话建立流程中指示终端设备与卫星基站之间的用户面安全保护策略进行说明。如图3所示,以终端设备为UE,接入网设备为卫星基站,核心网网元为会话管理网元,例如AMF、SMF为例,该方法包括如下多个步骤,未详尽说明的部分可参考现有协议。FIG3 is a flow chart of a method for establishing a session of a terminal device. The method 300 can be applied to the network architecture of FIG1 and FIG2 , and is mainly used for the user plane session establishment process in the satellite communication system, and for indicating the user plane security protection policy between the terminal device and the satellite base station in the user plane session establishment process. As shown in FIG3 , taking the terminal device as UE, the access network device as a satellite base station, and the core network element as a session management element, such as AMF and SMF as an example, the method includes the following multiple steps, and the parts not described in detail can refer to the existing protocol.
S301,UE注册到网络。S301, UE registers to the network.
示例性地,UE注册到网络,并完成鉴权、激活非接入层(non-access stratum,NAS)和接入层(access stratum,AS)层安全。Exemplarily, the UE registers with the network and completes authentication and activates non-access stratum (NAS) and access stratum (AS) layer security.
例如,UE向网络发送注册请求消息,用于请求注册到网络,该注册请求消息包括UE ID。进一步的,UE和网络进行鉴权,包括:AMF触发对UE的鉴权。例如,AMF向AUSF发送鉴权请求#1,AUSF向UDM发送鉴权请求#2,鉴权请求#1和鉴权请求#2用于请求对UE进行鉴权,UDM生成认证向量并向AUSF发送鉴权响应#1,AUSF向AMF发送鉴权响应#2,鉴权响应#1和鉴权响应#2包括认证向量,例如5G-AKA的认证向量或EAP-AKA’的认证向量。其中,鉴权方法包括但不限于:5G认证和密钥协商(5GAuthentication and Key Agreement,5G-AKA)鉴权方法、可扩展认证协议-认证和密钥协商(Extensible Authentication Protocol,EAP-AKA’)鉴权方法。以EAP-AKA’的认证向量为例,AMF通过NAS消息向UE发送EAP Request/AKA′-Challenge消息,UE对网络完成鉴权认证之后,通过NAS消息向AMF发送EAP-Response/AKA'-Challenge消息,AMF再向AUSF发送Nausf_UE Authentication_Authenticate Request消息,携带EAP-Response/AKA'-Challenge消息,AUSF验证该EAP-Response/AKA'-Challenge消息,若验证通过则完成对UE的鉴权,并通过AMF向UE发送EAP Success,以指示鉴权成功,具体鉴权的实现方式可参考现有协议TS 33.501的相关描述。For example, the UE sends a registration request message to the network to request registration with the network, and the registration request message includes the UE ID. Further, the UE and the network perform authentication, including: AMF triggers authentication of the UE. For example, the AMF sends an authentication request #1 to the AUSF, and the AUSF sends an authentication request #2 to the UDM, and the authentication request #1 and the authentication request #2 are used to request authentication of the UE, and the UDM generates an authentication vector and sends an authentication response #1 to the AUSF, and the AUSF sends an authentication response #2 to the AMF, and the authentication response #1 and the authentication response #2 include an authentication vector, such as an authentication vector of 5G-AKA or an authentication vector of EAP-AKA’. Among them, the authentication method includes but is not limited to: 5G Authentication and Key Agreement (5G-AKA) authentication method, Extensible Authentication Protocol-Authentication and Key Agreement (EAP-AKA’) authentication method. Taking the authentication vector of EAP-AKA’ as an example, AMF sends EAP Request/AKA′-Challenge message to UE through NAS message. After UE completes authentication and authentication of the network, it sends EAP-Response/AKA'-Challenge message to AMF through NAS message. AMF then sends Nausf_UE Authentication_Authenticate Request message to AUSF, carrying EAP-Response/AKA'-Challenge message. AUSF verifies the EAP-Response/AKA'-Challenge message. If the verification is successful, the authentication of the UE is completed, and EAP Success is sent to the UE through AMF to indicate that the authentication is successful. For the specific authentication implementation method, please refer to the relevant description of the existing protocol TS 33.501.
应理解,在上述鉴权流程之后,UE与AMF侧通常会生成或获得新的NAS层密钥(例如KAMF),其中,NAS层密钥(例如KAMF子密钥)通过触发NAS SMC流程激活使用,即AMF向UE发送NAS SMC消息,并且UE向AMF发送NAS SMP消息。其中,NAS SMC消息包括但不限于:完整性安全保护算法标识符和/或机密性安全保护算法标识符、ngKSI、重放的UE安全能力、MAC#1。NAS SMP消息包括MAC#2。其中,ngKSI用于标识特定的NAS安全上下文,NAS安全上下文包括:密钥标识符、UE安全能力、上下行NAS count值、机密性安全保护密钥、完整性安全保护密钥、选择的完整性安全保护算法标识符、机密性安全保护算法标识符中的一项或多项。It should be understood that after the above authentication process, the UE and the AMF side usually generate or obtain a new NAS layer key (such as KAMF), wherein the NAS layer key (such as KAMF subkey) is activated for use by triggering the NAS SMC process, that is, the AMF sends a NAS SMC message to the UE, and the UE sends a NAS SMP message to the AMF. Among them, the NAS SMC message includes but is not limited to: integrity security protection algorithm identifier and/or confidentiality security protection algorithm identifier, ngKSI, replayed UE security capabilities, MAC#1. The NAS SMP message includes MAC#2. Among them, ngKSI is used to identify a specific NAS security context, and the NAS security context includes: key identifier, UE security capability, uplink and downlink NAS count value, confidentiality security protection key, integrity security protection key, selected integrity security protection algorithm identifier, confidentiality security protection algorithm identifier One or more.
S302,UE向AMF发送会话建立请求消息,对应的,AMF接收来自UE的会话建立请求消息。S302, the UE sends a session establishment request message to the AMF, and correspondingly, the AMF receives the session establishment request message from the UE.
其中,该会话建立请求消息包括会话标识,用于标识UE的会话,可选地,还可以携带会话类型和/或切片等信息。示例性地,UE通过卫星基站向AMF发起PDU会话建立请求消息,例如PDU Session Establishment Request消息。应理解,该会话请求消息为NAS消息,通过卫星基站进行透传,卫星基站不解析该会话建立请求消息。The session establishment request message includes a session identifier for identifying the UE's session, and optionally, may also carry information such as session type and/or slice. Exemplarily, the UE initiates a PDU session establishment request message, such as a PDU Session Establishment Request message, to the AMF via a satellite base station. It should be understood that the session request message is a NAS message, which is transparently transmitted through the satellite base station, and the satellite base station does not parse the session establishment request message.
S303,AMF向SMF发送会话创建上下文请求消息,对应的,SMF接收来自AMF的会话创建上下文请求消息。S303, AMF sends a session creation context request message to SMF, and correspondingly, SMF receives the session creation context request message from AMF.
其中,该会话创建上下文请求消息包括会话标识,该会话创建上下文请求消息可以是Nsmf_PDUSession_createSMContext Request消息。对应的,SMF根据会话标识,可以从UDM或PCF或网络管理功能网元查找对应的用户面安全策略(可以简称为安全保护策略、或用户面安全保护策略),用于指示传输层是否需要安全保护。The session creation context request message includes a session identifier, and the session creation context request message may be an Nsmf_PDUSession_createSMContext Request message. Correspondingly, the SMF may search for a corresponding user plane security policy (which may be referred to as a security protection policy or a user plane security protection policy) from the UDM or PCF or network management function network element according to the session identifier, to indicate whether the transport layer requires security protection.
示例性地,用户面安全策略包括机密性安全策略和/或完整性安全策略,其中,机密性安全策略用于指示传输层是否需要机密性安全保护,完整性安全策略用于指示传输层是否需要完整性安全保护。Exemplarily, the user plane security policy includes a confidentiality security policy and/or an integrity security policy, wherein the confidentiality security policy is used to indicate whether the transport layer requires confidentiality security protection, and the integrity security policy is used to indicate whether the transport layer requires integrity security protection.
在一种实现方式中,安全策略的取值包括需要(required)、推荐(preferred)、不需要(not needed)。例如,在安全策略的取值为required的情况下,表示发送方需要对待发送的消息和/或数据进行安全保护;在安全策略的取值为not needed的情况下,表示发送方不需要对待发送的消息和/或数据进行安全保护;在安全策略的取值为preferred的情况下,表示发送方需要对待发送的消息和/或数据可选进行安全保护,即发送方可以对待发送的消息和/或数据进行安全保护,也可以对待发送的消息和/或数据不进行安全保护,这里安全保护包括机密性安全保护和/或完整性安全保护。例如,在完整性安全策略的取值为required的情况下,表示需要对待发送的消息和/或数据进行完整性安全保护;在完整性安全策略的取值为not needed的情况下,表示不需要对待发送的消息和/或数据进行完整性安全保护;在完整性安全策略的取值为preferred的情况下,表示对待发送的消息和/或数据可选进行完整性安全保护,即可以对待发送的消息和/或数据进行完整性安全保护,也可以对待发送的消息和/或数据不进行完整性安全保护。再例如,在机密性安全策略的取值为required的情况下,表示需要对待发送的消息和/或数据进行机密性安全保护;在机密性安全策略的取值为not needed的情况下,表示不需要对待发送的消息和/或数据进行机密性安全保护;在机密性安全策略的取值为preferred的情况下,表示对待发送的消息和/或数据可选进行机密性安全保护,即可以对待发送的消息和/或数据进行机密性安全保护,也可以对待发送的消息和/或数据不进行机密性安全保护。In one implementation, the values of the security policy include required, preferred, and not needed. For example, when the value of the security policy is required, it indicates that the sender needs to perform security protection on the message and/or data to be sent; when the value of the security policy is not needed, it indicates that the sender does not need to perform security protection on the message and/or data to be sent; when the value of the security policy is preferred, it indicates that the sender needs to perform optional security protection on the message and/or data to be sent, that is, the sender can perform security protection on the message and/or data to be sent, or can perform no security protection on the message and/or data to be sent, and the security protection here includes confidentiality security protection and/or integrity security protection. For example, when the value of the integrity security policy is required, it means that integrity security protection needs to be performed on the messages and/or data to be sent; when the value of the integrity security policy is not needed, it means that integrity security protection does not need to be performed on the messages and/or data to be sent; when the value of the integrity security policy is preferred, it means that integrity security protection can be performed on the messages and/or data to be sent, that is, integrity security protection can be performed on the messages and/or data to be sent, or integrity security protection can be omitted. For another example, when the value of the confidentiality security policy is required, it means that confidentiality security protection needs to be performed on the messages and/or data to be sent; when the value of the confidentiality security policy is not needed, it means that confidentiality security protection does not need to be performed on the messages and/or data to be sent; when the value of the confidentiality security policy is preferred, it means that confidentiality security protection can be performed on the messages and/or data to be sent, that is, confidentiality security protection can be performed on the messages and/or data to be sent, or confidentiality security protection can be omitted.
应理解,完整性安全保护(Integrity protection)可以是通过物理手段或密码学方法来确保信息和/或数据在生成、传输、存储过程中,以及之后没有被篡改或没有被未经授权的修改。其中,通过密码学方法对信息进行完整性安全保护可以有多种方式,例如使用单向函数(如哈希函数Hash),以对称密钥(完整性安全保护密钥)及消息作为输入参数,用来生成消息认证码(message authentication code,MAC),以实现对消息和/或数据的完整性安全保护。示例性地,完整性安全保护可以是指根据选择的完整性安全保护算法和完整性安全保护密钥对待发送的消息进行完整性安全保护。例如,对于NAS消息,完整性安全保护密钥可以为NAS完整性密钥(NAS Integrity Key,Knasint),Knasint用来对待发送的消息进行完整性安全保护;对于RRC消息,完整性安全保护密钥可以为RRC完整性密钥(RRC Integrity Key,Krrcint),Krrcint用来对待发送的消息进行完整性安全保护;对于用户面消息和/或数据,完整性安全保护密钥可以为完整性密钥(UP Integrity Key,Kupint),Kupint用来对待发送的消息进行完整性安全保护。It should be understood that integrity protection can be achieved by physical means or cryptographic methods to ensure that information and/or data are not tampered with or modified without authorization during generation, transmission, storage, and thereafter. There are many ways to perform integrity protection on information through cryptographic methods, such as using a one-way function (such as a hash function) with a symmetric key (integrity security protection key) and a message as input parameters to generate a message authentication code (MAC) to achieve integrity protection of messages and/or data. Exemplarily, integrity protection can refer to performing integrity protection on messages to be sent according to a selected integrity protection algorithm and integrity protection key. For example, for NAS messages, the integrity security protection key may be the NAS integrity key (NAS Integrity Key, Knasint), which is used to perform integrity security protection on the messages to be sent; for RRC messages, the integrity security protection key may be the RRC integrity key (RRC Integrity Key, Krrcint), which is used to perform integrity security protection on the messages to be sent; for user plane messages and/or data, the integrity security protection key may be the UP Integrity Key (Kupint), which is used to perform integrity security protection on the messages to be sent.
还应理解,机密性安全保护可以是指根据机密性安全保护算法和机密性安全保护密钥对待发送的消息和/或数据进行加密。It should also be understood that confidentiality security protection may refer to encrypting messages and/or data to be sent according to a confidentiality security protection algorithm and a confidentiality security protection key.
可选地,安全策略可以是显式指示的,例如使用独立的信息元素(information element,IE)来表示。例如,通过2比特的指示信息来指示,“00”表示安全策略的取值为required,“01”表示安全策略的取值为not needed,“10”表示安全策略的取值为preferred;或者,“true”表示安全策略的取值为required,“false”表示安全策略的取值为not needed,本申请对此不作限定。Optionally, the security policy may be explicitly indicated, for example, using an independent information element (IE). For example, by indicating with 2 bits of indication information, "00" indicates that the value of the security policy is required, "01" indicates that the value of the security policy is not needed, and "10" indicates that the value of the security policy is preferred; or, "true" indicates that the value of the security policy is required, and "false" indicates that the value of the security policy is not needed, which is not limited in this application.
示例性地,安全算法包括完整性安全算法和/或机密性安全保护算法。其中,完整性安全算法包括以下一项或多项:AES完整性安全保护算法、SNOW完整性安全保护算法、ZUC完整性安全保护算法、或空完整性安全保护算法,机密性安全保护算法包括以下一项或多项:ZUC机密性安全保护算法、AES机密性安全保护算法、SNOW机密性安全保护算法、或空完整性安全保护算法。Exemplarily, the security algorithm includes an integrity security algorithm and/or a confidentiality security protection algorithm. The integrity security algorithm includes one or more of the following: AES integrity security protection algorithm, SNOW integrity security protection algorithm, ZUC integrity security protection algorithm, or null integrity security protection algorithm, and the confidentiality security protection algorithm includes one or more of the following: ZUC confidentiality security protection algorithm, AES confidentiality security protection algorithm, SNOW confidentiality security protection algorithm, or null integrity security protection algorithm.
S304,SMF向AMF发送会话创建上下文响应消息,对应的,AMF接收来自SMF的会话创建上下文响应消息。S304, SMF sends a session creation context response message to AMF, and correspondingly, AMF receives a session creation context response message from SMF.
其中,该会话创建上下文响应消息包括会话标识、用户面安全策略和会话接受消息。例如,该会话创建上下文响应消息可以是Nsmf_PDUSession_createSMContext Response消息。其中,会话接受消息承载于N1容器中。The session creation context response message includes a session identifier, a user plane security policy, and a session acceptance message. For example, the session creation context response message may be an Nsmf_PDUSession_createSMContext Response message. The session acceptance message is carried in an N1 container.
S305,AMF向卫星基站发送会话资源建立请求消息,对应的,卫星基站接收来自AMF的会话资源建立请求消息。S305, AMF sends a session resource establishment request message to the satellite base station, and correspondingly, the satellite base station receives the session resource establishment request message from AMF.
其中,该会话资源建立请求消息包括会话标识、用户面安全策略和会话接受消息,该会话资源建立请求消息可以是PDU Session Resource Setup Request消息。Among them, the session resource establishment request message includes a session identifier, a user plane security policy and a session acceptance message, and the session resource establishment request message can be a PDU Session Resource Setup Request message.
S306,卫星基站根据用户面安全策略确定是否激活会话对应的DRB的安全保护。S306, the satellite base station determines whether to activate security protection of the DRB corresponding to the session according to the user plane security policy.
其中,一个会话对应一个或多个DRB,换句话说,一个会话传输的一个或多个数据#1可以分别由所述一个或多个DRB进行承载,通常一个DRB承载一个数据#1。需要说明的是,用户面安全策略用于指示是否开启所述会话对应的DRB的安全保护。Among them, a session corresponds to one or more DRBs. In other words, one or more data #1 transmitted by a session can be carried by the one or more DRBs respectively, and usually one DRB carries one data #1. It should be noted that the user plane security policy is used to indicate whether to enable security protection of the DRB corresponding to the session.
示例性地,在用户面安全策略的取值为required的情况下,卫星基站确定需要激活DRB的安全保护,即配置DRB的安全保护为开启;在用户面安全策略的取值为not needed的情况下,卫星基站确定不需要激活DRB的安全保护,即配置DRB的安全保护为不开启;在用户面安全策略的取值为preferred的情况下,卫星基站可以根据本地策略确定是否激活DRB的安全保护,也就是根据本地策略确定是否开启安全保护。例如,本地策略指示当用户面安全策略的取值为preferred时,卫星基站可以选择开启安全保护,或者,本地策略指示当用户面安全策略的取值为preferred时,卫星基站可以根据自身的负载情况选择开启或不开启安全保护。Exemplarily, when the value of the user plane security policy is required, the satellite base station determines that the security protection of the DRB needs to be activated, that is, the security protection of the DRB is configured to be turned on; when the value of the user plane security policy is not needed, the satellite base station determines that the security protection of the DRB does not need to be activated, that is, the security protection of the DRB is configured to be not turned on; when the value of the user plane security policy is preferred, the satellite base station can determine whether to activate the security protection of the DRB according to the local policy, that is, determine whether to turn on the security protection according to the local policy. For example, the local policy indicates that when the value of the user plane security policy is preferred, the satellite base station can choose to turn on the security protection, or the local policy indicates that when the value of the user plane security policy is preferred, the satellite base station can choose to turn on or not turn on the security protection according to its own load situation.
在一种实现方式中,在完整性安全策略的取值为required的情况下,卫星基站激活所述会话对应的DRB的完整性安全保护;在完整性安全策略的取值为not needed的情况下,卫星基站激活所述会话对应的DRB的完整性安全保护;在完整安全策略的取值为preferred的情况下,卫星基站根据本地策略激活或不激活所述会话对应的DRB的完整性安全保护。In one implementation, when the value of the integrity security policy is required, the satellite base station activates the integrity security protection of the DRB corresponding to the session; when the value of the integrity security policy is not needed, the satellite base station activates the integrity security protection of the DRB corresponding to the session; when the value of the integrity security policy is preferred, the satellite base station activates or does not activate the integrity security protection of the DRB corresponding to the session according to the local policy.
在另一种实现方式中,在机密性安全策略的取值为required的情况下,卫星基站激活所述会话对应的DRB的机密性安全保护;在机密性安全策略的取值为not needed的情况下,卫星基站激活所述会话对应的DRB的机密性安全保护;在机密安全策略的取值为preferred的情况下,卫星基站根据本地策略激活或不激活所述会话对应的DRB的机密性安全保护。In another implementation, when the value of the confidentiality security policy is required, the satellite base station activates the confidentiality security protection of the DRB corresponding to the session; when the value of the confidentiality security policy is not needed, the satellite base station activates the confidentiality security protection of the DRB corresponding to the session; when the value of the confidentiality security policy is preferred, the satellite base station activates or does not activate the confidentiality security protection of the DRB corresponding to the session according to the local policy.
需要说明的是,如果用户面安全策略指示不需要激活(或开启)DRB的完整性安全保护,则卫星基站和UE可以将MAC置为全0,也就说明卫星基站和UE不对承载于该DRB的用户面消息和/或数据进行完整性安全保护,也无需对承载于该DRB的用户面消息和/或数据进行完整性校验。可选地,也可以不将MAC放入分组数据汇聚协议(Packet Data Convergence Protocol,PDCP)数据包中。It should be noted that if the user plane security policy indicates that the integrity security protection of the DRB does not need to be activated (or turned on), the satellite base station and the UE can set the MAC to all 0s, which means that the satellite base station and the UE do not perform integrity security protection on the user plane messages and/or data carried on the DRB, and do not need to perform integrity verification on the user plane messages and/or data carried on the DRB. Optionally, the MAC may not be included in the Packet Data Convergence Protocol (PDCP) data packet.
S307,卫星基站向UE发送RRC重配置消息,对应的,UE接收来自卫星基站的RRC重配置消息。S307, the satellite base station sends an RRC reconfiguration message to the UE, and correspondingly, the UE receives the RRC reconfiguration message from the satellite base station.
示例性地,该RRC重配置消息可以是RRC Reconfiguration消息。Exemplarily, the RRC reconfiguration message may be an RRC Reconfiguration message.
其中,RRC重配置消息包括DRB标识(例如DRB ID)及其对应的用户面安全指示(UP sec indication),例如完整性安全保护指示和/或机密性安全保护指示,完整性安全保护指示用于指示所述DRB的完整性安全保护是否开启,或者说是否需要激活所述DRB的完整性安全保护,机密性安全保护指示用于指示所述DRB的机密性安全保护是否开启,或者说是否需要激活所述DRB的机密性安全保护。Among them, the RRC reconfiguration message includes a DRB identifier (e.g., DRB ID) and its corresponding user plane security indication (UP sec indication), such as an integrity security protection indication and/or a confidentiality security protection indication. The integrity security protection indication is used to indicate whether the integrity security protection of the DRB is enabled, or whether the integrity security protection of the DRB needs to be activated. The confidentiality security protection indication is used to indicate whether the confidentiality security protection of the DRB is enabled, or whether the confidentiality security protection of the DRB needs to be activated.
另外,该RRC重配置消息还包括所述会话接受消息。In addition, the RRC reconfiguration message also includes the session acceptance message.
可选地,该完整性安全保护指示和/或机密性安全保护指示的大小可以是1比特。例如,该机密性指示信息的取值为“1”,表示所述DRB的机密性安全保护开启;该机密性指示信息的取值为“0”,表示所述DRB的机密性安全保护不开启。再例如,该完整性指示信息的取值为“1”,表示所述DRB的完整性安全保护开启;该完整性指示信息的取值为“0”,表示所述DRB的完整性安全保护不开启。Optionally, the size of the integrity security protection indication and/or confidentiality security protection indication can be 1 bit. For example, the value of the confidentiality indication information is "1", indicating that the confidentiality security protection of the DRB is enabled; the value of the confidentiality indication information is "0", indicating that the confidentiality security protection of the DRB is not enabled. For another example, the value of the integrity indication information is "1", indicating that the integrity security protection of the DRB is enabled; the value of the integrity indication information is "0", indicating that the integrity security protection of the DRB is not enabled.
可选地,完整性安全保护指示和机密性安全保护指示的取值可以根据卫星基站接收的用户面安全策略确定。Optionally, the values of the integrity security protection indicator and the confidentiality security protection indicator may be determined according to a user plane security policy received by the satellite base station.
例如,该UE的会话对应两个DRB(例如DRB#1和DRB#2),则说明该会话用于传输的数据承载在DRB#1和DRB#2,例如数据#1承载在DRB#1,数据#2承载在DRB#2。其中,用户面安全策略指示激活完整性安全保护且不激活机密性安全保护,那么卫星基站可以将DRB#1和DRB#2对应的完整性安全保护指示的取值设置为“1”,机密性安全保护指示的取值设置为“0”,携带在步骤S307的RRC重配置消息中。For example, if the UE's session corresponds to two DRBs (e.g., DRB#1 and DRB#2), it means that the data used for transmission in the session is carried in DRB#1 and DRB#2, for example, data#1 is carried in DRB#1, and data#2 is carried in DRB#2. If the user plane security policy indicates that integrity security protection is activated but confidentiality security protection is not activated, the satellite base station can set the value of the integrity security protection indication corresponding to DRB#1 and DRB#2 to "1" and the value of the confidentiality security protection indication to "0", which are carried in the RRC reconfiguration message of step S307.
可选地,在确定是否激活DRB的安全保护之后,或者在确定用户面安全保护策略之后,卫星基站配置所述会话对应的DRB的PDCP实体。示例性地,如果用户面安全策略指示激活完整性安全保护且不激活机密性安全保护,则RRC重配置消息中用户面安全指示用于指示DRB#1和DRB#2开启完整性安全保护且不开启机密性安全保护,对应的,卫星基站在PDCP实体配置DRB#1和DRB#2对应的完整性安全保护密钥和完整性安全保护算法,并且激活该DRB#1和DRB#2上的上行用户面消息和/或数据的完整性校验,以及激活该DRB#1和DRB#2上的下行用户面消息和/或数据的完整性安全保护。Optionally, after determining whether to activate security protection of the DRB, or after determining the user plane security protection policy, the satellite base station configures the PDCP entity of the DRB corresponding to the session. Exemplarily, if the user plane security policy indicates to activate integrity security protection and not to activate confidentiality security protection, the user plane security indication in the RRC reconfiguration message is used to instruct DRB#1 and DRB#2 to enable integrity security protection and not to enable confidentiality security protection. Correspondingly, the satellite base station configures the integrity security protection key and integrity security protection algorithm corresponding to DRB#1 and DRB#2 in the PDCP entity, and activates the integrity check of the uplink user plane messages and/or data on the DRB#1 and DRB#2, and activates the integrity security protection of the downlink user plane messages and/or data on the DRB#1 and DRB#2.
S308,UE对RRC重配置消息进行完整性校验。S308, the UE performs an integrity check on the RRC reconfiguration message.
示例性地,UE对接收到的RRC重配置消息进行完整性校验,例如,UE将RRC重配置消息中携带的MAC#3值和UE本地计算得到的MAC#4进行比较,若二者相同,则可以认为完整性校验通过;反之,则完整性校验失败。Exemplarily, the UE performs an integrity check on the received RRC reconfiguration message. For example, the UE compares the MAC#3 value carried in the RRC reconfiguration message with the MAC#4 calculated locally by the UE. If the two are the same, it can be considered that the integrity check has passed; otherwise, the integrity check has failed.
进一步的,在完整性验证成功的情况下,UE配置DRB对应的PDCP实体。示例性地,如果RRC重配置消息中指示的DRB#1激活了完整性安全保护,则UE在PDCP实体配置DRB#1对应的完整性安全保护密钥和完整性安全保护算法,并且激活该DRB#1上的上行用户面消息的完整性安全保护,以及激活该DRB#1上的下行用户面消息的完整性校验。如果RRC重配置消息中指示的DRB#2激活了机密性安全保护,则UE在PDCP实体配置DRB#2对应的机密性安全保护密钥和机密性安全保护算法,并且激活该DRB#2上的上行用户面消息的机密性安全保护,以及激活该DRB#2上的下行用户面消息的解密操作。Further, in the case where the integrity verification is successful, the UE configures the PDCP entity corresponding to the DRB. Exemplarily, if DRB#1 indicated in the RRC reconfiguration message has integrity security protection activated, the UE configures the integrity security protection key and integrity security protection algorithm corresponding to DRB#1 in the PDCP entity, and activates the integrity security protection of the uplink user plane message on the DRB#1, and activates the integrity check of the downlink user plane message on the DRB#1. If DRB#2 indicated in the RRC reconfiguration message has confidentiality security protection activated, the UE configures the confidentiality security protection key and confidentiality security protection algorithm corresponding to DRB#2 in the PDCP entity, and activates the confidentiality security protection of the uplink user plane message on the DRB#2, and activates the decryption operation of the downlink user plane message on the DRB#2.
S309,UE向卫星基站发送RRC重配置完成消息,对应的,卫星基站接收来自UE的RRC重配置完成消息。S309, the UE sends an RRC reconfiguration completion message to the satellite base station, and correspondingly, the satellite base station receives the RRC reconfiguration completion message from the UE.
示例性地,如果UE在步骤S309中成功验证了RRC重配置消息的完整性,则UE向卫星基站发送RRC重配置完成消息。例如,RRC重配置完成消息可以是RRC Reconfiguration Complete消息。可选地,如果UE未成功激活DRB的安全保护,或者UE配置DRB的PDCP实体失败,则UE可以向卫星基站发送失败原因值,该失败原因值可以指示RRC重配置消息的完整性校验失败。Exemplarily, if the UE successfully verifies the integrity of the RRC reconfiguration message in step S309, the UE sends an RRC reconfiguration complete message to the satellite base station. For example, the RRC reconfiguration complete message may be an RRC Reconfiguration Complete message. Optionally, if the UE fails to successfully activate security protection for the DRB, or the UE fails to configure the PDCP entity of the DRB, the UE may send a failure cause value to the satellite base station, which may indicate that the integrity check of the RRC reconfiguration message has failed.
S310,卫星基站向AMF发送会话资源建立响应消息,对应的,AMF接收来自卫星基站的会话资源建立响应消息。S310, the satellite base station sends a session resource establishment response message to the AMF, and correspondingly, the AMF receives a session resource establishment response message from the satellite base station.
其中,该会话资源建立响应消息用于告知会话资源建立结果,例如建立成功或失败。示例性地,该会话资源建立响应消息可以是PDU Session Resource Setup Response消息。应理解,本申请技术方案是基于会话资源建立成功进行的。The session resource establishment response message is used to inform the session resource establishment result, such as success or failure. Exemplarily, the session resource establishment response message can be a PDU Session Resource Setup Response message. It should be understood that the technical solution of the present application is based on the successful establishment of the session resource.
可选地,在LTE网络中,上述方法300中的核心网网元可以是移动管理实体(Mobility Management Entity,MME)、服务网关(Serving GateWays,S-GWs)、或公共数据网络(Public Data Network,PDN GWs或P-GWs),具体实现方式类似,这里不再说明。Optionally, in an LTE network, the core network element in the above method 300 may be a mobility management entity (Mobility Management Entity, MME), a serving gateway (Serving GateWays, S-GWs), or a public data network (Public Data Network, PDN GWs or P-GWs). The specific implementation method is similar and will not be described here.
由于卫星的覆盖地面范围是有限的,在某些时刻,服务链路和馈线链路可能不同时处于连通状态。例如,卫星运转到地理位置A上空时,可以与处于地理位置B的UE之间建立服务链路,但此时可能无法与处于地理位置C的地面关口站之间建立馈线链路。此时,卫星基站可以执行存储转发操作(Store and Forward),即卫星基站可以将接收到的上行消息进行存储,也就是将上行消息缓存到卫星基站上,等到馈线链路恢复后,再将存储的上行信息转发到地面网络。应理解,存储转发操作主要适用于时延不敏感或者非实时的物联网卫星服务。存储转发操作的对象可以是信令面数据,也可以是用户面数据。为便于描述和理解,本申请以用户面数据为例进行说明。Since the ground coverage of the satellite is limited, at certain moments, the service link and the feeder link may not be connected at the same time. For example, when the satellite moves over geographical location A, it can establish a service link with the UE in geographical location B, but at this time it may not be able to establish a feeder link with the ground gateway in geographical location C. At this time, the satellite base station can perform a store-and-forward operation (Store and Forward), that is, the satellite base station can store the received uplink message, that is, cache the uplink message on the satellite base station, and wait until the feeder link is restored, and then forward the stored uplink information to the ground network. It should be understood that the store-and-forward operation is mainly suitable for delay-insensitive or non-real-time IoT satellite services. The object of the store-and-forward operation can be signaling plane data or user plane data. For ease of description and understanding, this application takes user plane data as an example for illustration.
针对存储转发操作场景,如果攻击者向卫星基站发送大量恶意的数据或消息,可能会导致卫星基站的存储区被占满,进而无法缓存正常UE的控制面数据和/或用户面数据,存在卫星基站被恶意攻击的风险,网络安全无法得到保障。因此,亟需采取额外的措施来应对,以减少潜在的安全风险。In the storage and forwarding operation scenario, if an attacker sends a large amount of malicious data or messages to the satellite base station, the storage area of the satellite base station may be filled up, and the control plane data and/or user plane data of normal UEs may not be cached. There is a risk of the satellite base station being maliciously attacked, and network security cannot be guaranteed. Therefore, additional measures are urgently needed to reduce potential security risks.
有鉴于此,本申请提供了一种安全通信方法和通信装置,能够降低卫星基站被恶意攻击的风险,提高网络通信安全。In view of this, the present application provides a secure communication method and a communication device, which can reduce the risk of satellite base stations being maliciously attacked and improve network communication security.
下面将结合附图详细说明本申请实施例提供的通信方法。本申请提供的实施例可以适用于发送端设备和接收端设备通信的通信场景,如可以应用于上述图1和图2所示的通信系统中。The communication method provided by the embodiment of the present application will be described in detail below with reference to the accompanying drawings. The embodiment provided by the present application can be applied to a communication scenario where a transmitting device and a receiving device communicate, such as being applied to the communication system shown in the above-mentioned Figures 1 and 2.
图4是本申请实施例提供的通信方法的流程示意图。该方法400可以由终端设备侧、网络设备侧和核心网侧执行,例如该方法可以由终端设备、网络设备和核心网网元(例如会话管理网元)执行,或者,也可以由终端设备、网络设备和核心网网元(例如会话管理网元)的芯片或电路执行,或者还可以由能实现全部或部分通信装置功能的逻辑模块或软件实现,本申请对此不作限制。下面以执行主体为终端设备、网络设备和会话管理网元为例进行说明,如图4所示,该方法包括如下多个步骤,未详尽说明的部分可参考上述方法300或现有协议。Figure 4 is a flow chart of the communication method provided by an embodiment of the present application. The method 400 can be executed by the terminal device side, the network device side and the core network side. For example, the method can be executed by the terminal device, the network device and the core network element (such as the session management element), or it can also be executed by the chip or circuit of the terminal device, the network device and the core network element (such as the session management element), or it can also be implemented by a logic module or software that can realize all or part of the functions of the communication device, and the present application does not limit this. The following is an example of the execution subject being the terminal device, the network device and the session management element. As shown in Figure 4, the method includes the following multiple steps. The part that is not described in detail can refer to the above method 300 or the existing protocol.
S410,在终端设备的会话建立过程中,网络设备根据第一信息确定是否激活会话的完整性安全保护,第一信息用于指示网络设备是否支持存储转发操作(可以称为能力信息)。S410, during the session establishment process of the terminal device, the network device determines whether to activate the integrity security protection of the session according to the first information, and the first information is used to indicate whether the network device supports the store-and-forward operation (which may be referred to as capability information).
应理解,所述会话用于传输终端设备与核心网之间的数据。例如,一个会话对应一个或多个DRB,则说明一个会话传输的一个或多个数据可以分别由所述一个或多个DRB进行承载,通常一个DRB承载一个数据,所述DRB用于承载终端设备与网络设备之间的数据。It should be understood that the session is used to transmit data between the terminal device and the core network. For example, a session corresponds to one or more DRBs, which means that one or more data transmitted by a session can be carried by the one or more DRBs respectively. Usually, one DRB carries one data, and the DRB is used to carry data between the terminal device and the network device.
需要说明的是,是否激活会话的完整性安全保护,可以理解为:是否激活所述会话对应的一个或多个DRB的完整性安全保护,也可以理解为:终端设备与网络设备之间传输的数据是否开启完整性安全保护。It should be noted that whether to activate the integrity security protection of the session can be understood as: whether to activate the integrity security protection of one or more DRBs corresponding to the session, and can also be understood as: whether the integrity security protection of the data transmitted between the terminal device and the network device is enabled.
其中,终端设备的会话建立过程的具体实现方式,以及存储转发操作(Store and Forward)的含义可参考上述方法300的相关描述,这里不再说明。Among them, the specific implementation method of the session establishment process of the terminal device and the meaning of the store and forward operation (Store and Forward) can be referred to the relevant description of the above method 300 and will not be explained here.
可选地,在执行步骤S410之前,该方法还包括:网络设备获取第一信息。Optionally, before executing step S410, the method further includes: the network device acquires first information.
示例性地,第一信息可以是预定义的,或者通过信令配置的或预配置的。其中,预定义可以包括预先定义,例如协议定义,预配置可以通过在网络设备中预先保存相应的代码、表格、字符串或其他可用于指示第一信息的方式来实现,本申请对于其具体的实现方式不作限定。Exemplarily, the first information may be predefined, or configured or preconfigured through signaling. Predefinition may include predefinition, such as protocol definition, and preconfiguration may be implemented by pre-saving corresponding codes, tables, strings or other methods that can be used to indicate the first information in the network device, and the present application does not limit the specific implementation method thereof.
可选地,第一信息还可以用于指示网络设备是否配置开启存储转发操作(可以称为配置信息),和/或,第一信息还可以用于指示网络设备是否部署于卫星上(可以称为位置信息)。为便于描述,本申请可以将部署于卫星上的网络设备称为卫星基站,将未部署于卫星上的网络设备称为地面基站。Optionally, the first information may also be used to indicate whether the network device is configured to enable a store-and-forward operation (which may be referred to as configuration information), and/or the first information may also be used to indicate whether the network device is deployed on a satellite (which may be referred to as location information). For ease of description, the present application may refer to a network device deployed on a satellite as a satellite base station, and a network device not deployed on a satellite as a ground base station.
也即,本申请中的第一信息可以包括网络设备的能力信息、配置信息、或位置信息中的一项或多项。That is, the first information in the present application may include one or more of capability information, configuration information, or location information of the network device.
下面,针对网络设备根据第一信息确定是否激活会话的完整性安全保护,或者说,卫星基站根据第一消息激活或不激活会话的完整性安全保护进行示例说明,包括以下一项或多项。Below, an example is given for a network device to determine whether to activate integrity security protection of a session based on first information, or a satellite base station to activate or not activate integrity security protection of a session based on a first message, including one or more of the following.
(1)网络设备根据能力信息确定是否激活会话的完整性安全保护,或者说,网络设备根据能力信息确定激活或不激活会话的完整性安全保护。(1) The network device determines whether to activate the integrity security protection of the session according to the capability information. In other words, the network device determines whether to activate or not activate the integrity security protection of the session according to the capability information.
例如,在能力信息指示网络设备支持存储转发操作的情况下,网络设备确定激活会话的完整性安全保护,即无需考虑完整性安全策略,可以直接激活会话的完整性安全保护;再例如,在能力信息指示网络设备不支持存储转发操作的情况下,网络设备确定不激活会话的完整性安全保护。可选地,网络设备可以根据步骤S403中获取的用户面完整性安全策略确定是否激活会话的完整性安全保护。For example, when the capability information indicates that the network device supports the store-and-forward operation, the network device determines to activate the integrity security protection of the session, that is, the integrity security protection of the session can be directly activated without considering the integrity security policy; for another example, when the capability information indicates that the network device does not support the store-and-forward operation, the network device determines not to activate the integrity security protection of the session. Optionally, the network device can determine whether to activate the integrity security protection of the session according to the user plane integrity security policy obtained in step S403.
也就是说,在网络设备支持存储转发操作的情况下,网络设备激活会话的完整性安全保护;在网络设备不支持存储转发操作的情况下,网络设备不激活会话的完整性安全保护,或者可以根据用户面完整性安全策略激活或不激活会话的完整性安全保护。That is to say, when the network device supports store-and-forward operations, the network device activates the integrity security protection of the session; when the network device does not support store-and-forward operations, the network device does not activate the integrity security protection of the session, or may activate or not activate the integrity security protection of the session according to the user plane integrity security policy.
(2)网络设备根据配置信息确定是否激活会话的完整性安全保护,或者说,网络设备根据配置信息激活或不激活会话的完整性安全保护。(2) The network device determines whether to activate the integrity security protection of the session according to the configuration information, or in other words, the network device activates or does not activate the integrity security protection of the session according to the configuration information.
例如,在配置信息指示网络设备配置开启存储转发操作的情况下,网络设备确定激活会话的完整性安全保护,即无需考虑完整性安全策略,可以直接激活会话的完整性安全保护;再例如,在配置信息指示网络设备不开启存储转发操作的情况下,网络设备确定不激活会话的完整性安全保护。可选地,网络设备可以根据步骤S403中获取的用户面完整性安全策略确定是否激活会话的完整性安全保护。For example, when the configuration information indicates that the network device is configured to enable the store-and-forward operation, the network device determines to activate the integrity security protection of the session, that is, the integrity security protection of the session can be directly activated without considering the integrity security policy; for another example, when the configuration information indicates that the network device does not enable the store-and-forward operation, the network device determines not to activate the integrity security protection of the session. Optionally, the network device can determine whether to activate the integrity security protection of the session according to the user plane integrity security policy obtained in step S403.
可以理解的是,在网络设备配置开启存储转发操作的情况下,网络设备激活会话的完整性安全保护;在网络设备配置不开启存储转发操作的情况下,网络设备不激活会话的完整性安全保护,或者可以根据用户面完整性安全策略激活或不激活会话的完整性安全保护。It can be understood that when the network device is configured to enable the store-and-forward operation, the network device activates the integrity security protection of the session; when the network device is configured not to enable the store-and-forward operation, the network device does not activate the integrity security protection of the session, or can activate or not activate the integrity security protection of the session according to the user plane integrity security policy.
(3)网络设备根据位置信息确定是否激活会话的完整性安全保护,或者说,网络设备根据位置信息激活或不激活会话的完整性安全保护。(3) The network device determines whether to activate the integrity security protection of the session based on the location information. In other words, the network device activates or does not activate the integrity security protection of the session based on the location information.
例如,在位置信息指示网络设备部署在卫星上,即网络设备为卫星基站的情况下,网络设备确定激活会话的完整性安全保护,即无需考虑完整性安全策略,可以直接激活会话的完整性安全保护;再例如,在位置信息指示网络设备部署在非卫星上,例如网络设备为地面基站的情况下,网络设备不激活会话的完整性安全保护,或者可以根据步骤S403中获取的用户面完整性安全策略确定是否激活会话的完整性安全保护。For example, when the location information indicates that the network device is deployed on a satellite, that is, the network device is a satellite base station, the network device determines to activate the integrity security protection of the session, that is, there is no need to consider the integrity security policy, and the integrity security protection of the session can be directly activated; for another example, when the location information indicates that the network device is deployed on a non-satellite, such as the network device is a ground base station, the network device does not activate the integrity security protection of the session, or can determine whether to activate the integrity security protection of the session according to the user plane integrity security policy obtained in step S403.
可以理解的是,在网络设备部署在卫星上的情况下,网络设备激活会话的完整性安全保护;在网络设备部署在地面的情况下,网络设备不激活会话的完整性安全保护,或者可以根据用户面完整性安全策略激活或不激活会话的完整性安全保护。It can be understood that when the network device is deployed on a satellite, the network device activates the integrity security protection of the session; when the network device is deployed on the ground, the network device does not activate the integrity security protection of the session, or may activate or not activate the integrity security protection of the session according to the user plane integrity security policy.
应理解,上述(1)-(3)中,网络设备根据第一信息确定是否激活会话的完整性安全保护,或者说,网络设备根据第一信息激活或不激活会话的完整性安全保护。其中,上述(1)-(3)的技术逻辑相同,即网络设备可以不考虑用户面完整性安全策略,根据第一信息激活或不激活会话的完整性安全保护,该方式使得用户面数据尽可能地具有完整性安全保护,便于后续网络设备对接收的上行消息和/或数据执行完整性校验,保障网络通信安全,同时可以降低被拒绝服务攻击的风险。It should be understood that in the above (1)-(3), the network device determines whether to activate the integrity security protection of the session based on the first information, or in other words, the network device activates or does not activate the integrity security protection of the session based on the first information. The technical logic of the above (1)-(3) is the same, that is, the network device can activate or not activate the integrity security protection of the session based on the first information without considering the user plane integrity security policy. This method allows the user plane data to have integrity security protection as much as possible, which facilitates the subsequent network device to perform integrity verification on the received uplink message and/or data, thereby ensuring the security of network communications and reducing the risk of denial of service attacks.
可选地,在确定是否激活会话的完整性安全保护时,网络设备也可以考虑该会话对应的用户面完整性安全策略,即网络设备可以根据第一信息和用户面完整性安全策略确定是否激活会话的完整性安全保护,此时该方法还包括如下步骤S404。Optionally, when determining whether to activate the integrity security protection of the session, the network device may also consider the user plane integrity security policy corresponding to the session, that is, the network device may determine whether to activate the integrity security protection of the session based on the first information and the user plane integrity security policy. At this time, the method also includes the following step S404.
S404,网络设备根据第一信息和用户面完整性安全策略确定是否激活会话的完整性安全保护。S404: The network device determines whether to activate integrity security protection of the session according to the first information and the user plane integrity security policy.
其中,用户面完整性安全策略用于指示是否激活会话的完整性安全保护,具体释义可参考上述步骤S410和上述方法300的相关描述。Among them, the user plane integrity security policy is used to indicate whether to activate the integrity security protection of the session. For specific interpretation, please refer to the relevant description of the above step S410 and the above method 300.
可选地,在执行步骤S404之前,会话管理网元获取该会话的用户面完整性安全策略,例如参见如下步骤S403。Optionally, before executing step S404, the session management network element obtains a user plane integrity security policy for the session, for example, see the following step S403.
S403,网络设备获取会话对应的用户面完整性安全策略。S403: The network device obtains a user plane integrity security policy corresponding to the session.
示例性地,用户面完整性安全策略的取值包括需要(required)、推荐(preferred)、不需要(not needed)。例如,在用户面完整性安全策略的取值为required的情况下,表示所述会话开启完整性安全保护;在用户面完整性安全策略的取值为not needed的情况下,表示所述会话不开启完整性安全保护;在用户面完整性安全策略的取值为preferred的情况下,表示所述会话可选开启完整性安全保护。Exemplarily, the values of the user plane integrity security policy include required, preferred, and not needed. For example, when the value of the user plane integrity security policy is required, it means that integrity security protection is enabled for the session; when the value of the user plane integrity security policy is not needed, it means that integrity security protection is not enabled for the session; when the value of the user plane integrity security policy is preferred, it means that integrity security protection can be enabled optionally for the session.
可选地,用户面完整性安全策略可以显式指示,例如使用独立的信息元素IE来表示。例如,通过2比特的指示信息来指示,“00”表示用户面完整性安全策略的取值为required,“01”表示用户面完整性安全策略的取值为not needed,“10”表示用户面完整性安全策略的取值为preferred;或者,“true”表示用户面完整性安全策略的取值为required,“false”表示用户面完整性安全策略的取值为not needed,本申请对其表现形式不作限定。Optionally, the user plane integrity security policy can be explicitly indicated, for example, using an independent information element IE. For example, through 2 bits of indication information, "00" indicates that the value of the user plane integrity security policy is required, "01" indicates that the value of the user plane integrity security policy is not needed, and "10" indicates that the value of the user plane integrity security policy is preferred; or, "true" indicates that the value of the user plane integrity security policy is required, and "false" indicates that the value of the user plane integrity security policy is not needed. This application does not limit its expression form.
在一种实现方式中,网络设备从会话管理网元获取该会话对应的用户面完整性安全策略,例如参见如下步骤S402。In one implementation, the network device obtains the user plane integrity security policy corresponding to the session from the session management network element, for example, see the following step S402.
S402,会话管理网元向网络设备发送会话对应的用户面完整性安全策略,对应的,网络设备接收来自会话管理网元的会话对应的用户面完整性安全策略。S402, the session management network element sends a user plane integrity security policy corresponding to the session to the network device, and correspondingly, the network device receives the user plane integrity security policy corresponding to the session from the session management network element.
在一种示例中,会话管理网元向移动接入管理网元(例如AMF)发送用户面完整性安全策略,再由移动接入管理网元向网络设备发送用户面完整性安全策略。In one example, the session management network element sends a user plane integrity security policy to a mobile access management network element (eg, AMF), and the mobile access management network element then sends the user plane integrity security policy to a network device.
可选地,会话管理网元向网络设备发送会话对应的用户面完整性安全策略可以是主动发送的,也可以是基于网络设备的请求发送的。例如,网络设备向会话管理网元发送请求消息,该请求消息用于获取会话对应的用户面完整性安全策略,对应的,会话管理网元可以在接收请求消息之后,向网络设备发送该会话对应的用户面完整性安全策略。Optionally, the session management network element may actively send the user plane integrity security policy corresponding to the session to the network device, or may send it based on a request from the network device. For example, the network device sends a request message to the session management network element, and the request message is used to obtain the user plane integrity security policy corresponding to the session. Correspondingly, the session management network element may send the user plane integrity security policy corresponding to the session to the network device after receiving the request message.
可选地,在执行步骤S402之前,会话管理网元确定该会话的用户面完整性安全策略,例如会话管理网元可以通过获取的指示信息确定该会话的用户面完整性安全策略,例如参见如下步骤S401。Optionally, before executing step S402, the session management network element determines the user plane integrity security policy of the session. For example, the session management network element may determine the user plane integrity security policy of the session through the acquired indication information, for example, see the following step S401.
S401,会话管理网元获取指示信息。S401, the session management network element obtains indication information.
其中,该指示信息用于指示网络设备部署于卫星上,可选地,该指示信息还用于指示网络设备支持存储转发操作,和/或,网络设备配置开启存储转发特性。The indication information is used to indicate that the network device is deployed on a satellite. Optionally, the indication information is also used to indicate that the network device supports a store-and-forward operation and/or that the network device is configured to enable a store-and-forward feature.
应理解,网络设备部署于卫星上,可以理解为网络设备(例如基站)在物理位置上部署在卫星上,或者网络设备(例如基站)和卫星合设。此时,所述卫星具备所述网络设备的能力,例如所述卫星支持网络设备的存储转发操作。It should be understood that the network equipment is deployed on the satellite, which can be understood as the network equipment (such as a base station) being physically deployed on the satellite, or the network equipment (such as a base station) and the satellite being co-located. In this case, the satellite has the capabilities of the network equipment, for example, the satellite supports the storage and forwarding operation of the network equipment.
在一种示例中,会话管理网元从移动接入管理网元(例如AMF)接收指示信息。例如,在终端设备的会话建立过程中,移动接入管理网元向会话管理网元发送会话创建上下文请求消息,该会话创建上下文请求消息中携带所述指示信息。In one example, the session management network element receives indication information from the mobile access management network element (such as AMF). For example, during the session establishment process of the terminal device, the mobile access management network element sends a session creation context request message to the session management network element, and the session creation context request message carries the indication information.
在另一种示例中,会话管理网元从操作维护管理(Operation Administration and Maintenance,OAM)或UDM获取指示信息。例如,会话管理网元向OAM或UDM发送查询消息,用于获取网络设备的能力信息、位置信息或配置信息中的一项或多项,对应的,OAM或UDM向会话管理网元发送该指示信息。其中,能力信息、位置信息和配置信息的具体释义可参考上文相关描述,这里不再说明。In another example, the session management network element obtains indication information from Operation Administration and Maintenance (OAM) or UDM. For example, the session management network element sends a query message to OAM or UDM to obtain one or more of the capability information, location information or configuration information of the network device, and correspondingly, OAM or UDM sends the indication information to the session management network element. The specific interpretation of the capability information, location information and configuration information can be referred to the relevant description above, which will not be explained here.
示例性地,该会话对应的用户面完整性安全策略是根据指示信息确定的,或者说,会话管理网元可以根据指示信息确定该会话对应的用户面完整性安全策略。例如,在指示信息确定网络设备部署于卫星上,或者,网络设备支持存储转发操作,或者,网络设备配置开启存储转发特性的情况下,则考虑到网络设备的存储资源有限,以及避免潜在的DoS风险,会话管理网元可以将用户完整性安全策略的取值设置为required,也就是说,会话管理网元可以根据指示信息确定开启或激活完整性安全保护,即后续终端设备与网络设备之间传输的数据都是经过完整性安全保护的,也即终端设备与网络设备之间传输的数据都需要进行完整性校验,进而存储转发完整性校验通过的数据。Exemplarily, the user plane integrity security policy corresponding to the session is determined according to the indication information, or the session management network element can determine the user plane integrity security policy corresponding to the session according to the indication information. For example, when the indication information determines that the network device is deployed on a satellite, or the network device supports store-and-forward operations, or the network device is configured to enable the store-and-forward feature, then considering the limited storage resources of the network device and to avoid potential DoS risks, the session management network element can set the value of the user integrity security policy to required, that is, the session management network element can determine to enable or activate integrity security protection according to the indication information, that is, the data subsequently transmitted between the terminal device and the network device are all protected by integrity security, that is, the data transmitted between the terminal device and the network device need to be integrity checked, and then the data that passes the integrity check is stored and forwarded.
可选地,该会话对应的用户面完整性安全策略也可以根据签约信息确定,或者说,会话管理网元可以根据签约信息确定该会话对应的用户面完整性安全策略。其中,签约信息用于指示终端设备是否签约存储转发操作业务。例如,如果签约信息指示终端设备签约存储转发操作业务,则会话管理网元可以设置会话对应的用户面完整性安全策略的取值为required,也就是说,会话管理网元可以根据签约信息开启会话的完整性安全保护,即后续终端设备与网络设备之间传输的上下行数据都是经过完整性安全保护的,也即终端设备与网络设备需要对接收的用户面数据进行完整性校验;再例如,如果签约信息指示终端设备未签约存储转发操作业务,则会话管理网元可以设置会话对应的用户面完整性安全策略的取值为preferred,也就是说,会话管理网元可以根据签约信息确定可选开启会话的完整性安全保护,进而网络设备再根据本地策略确定开启或不开启会话的完整性安全保护。Optionally, the user plane integrity security policy corresponding to the session can also be determined according to the contract information, or the session management network element can determine the user plane integrity security policy corresponding to the session according to the contract information. The contract information is used to indicate whether the terminal device has signed a contract for the store-and-forward operation service. For example, if the contract information indicates that the terminal device has signed a contract for the store-and-forward operation service, the session management network element can set the value of the user plane integrity security policy corresponding to the session to required, that is, the session management network element can enable the integrity security protection of the session according to the contract information, that is, the subsequent uplink and downlink data transmitted between the terminal device and the network device are all protected by integrity security, that is, the terminal device and the network device need to perform integrity verification on the received user plane data; for another example, if the contract information indicates that the terminal device has not signed a contract for the store-and-forward operation service, the session management network element can set the value of the user plane integrity security policy corresponding to the session to preferred, that is, the session management network element can determine the optional opening of the integrity security protection of the session according to the contract information, and then the network device determines whether to open or not the integrity security protection of the session according to the local policy.
可选地,该会话对应的用户面完整性安全策略还可以根据签约信息和指示信息确定,或者说,会话管理网元可以根据指示信息和签约信息确定该会话对应的用户面完整性安全策略。例如,如果指示信息确定网络设备部署于卫星上,或者,网络设备支持存储转发操作,或者,网络设备配置开启存储转发特性,同时,签约信息指示终端设备签约存储转发操作业务,则会话管理网元可以设置会话对应的用户面完整性安全策略的取值为required,表示开启该会话的完整性安全保护;再例如,如果指示信息确定网络设备不部署于卫星上,或者,网络设备不支持存储转发操作,或者,网络设备配置不开启存储转发特性,并且签约信息指示终端设备未签约存储转发操作业务,则会话管理网元可以设置会话对应的用户面完整性安全策略的取值为not needed,表示不开启该会话的完整性安全保护;又例如,如果指示信息确定网络设备不部署于卫星上,或者,网络设备不支持存储转发操作,或者,网络设备配置不开启存储转发特性,或者,签约信息指示终端设备未签约存储转发操作业务,则会话管理网元可以设置会话对应的用户面完整性安全策略的取值为preferred,表示可选开启该会话的完整性安全保护,进而网络设备再根据本地策略确定开启或不开启会话的完整性安全保护。Optionally, the user plane integrity security policy corresponding to the session can also be determined based on the contract information and the indication information, or in other words, the session management network element can determine the user plane integrity security policy corresponding to the session based on the indication information and the contract information. For example, if the indication information determines that the network device is deployed on a satellite, or the network device supports store-and-forward operations, or the network device is configured to enable the store-and-forward feature, and the contract information indicates that the terminal device has signed a contract for the store-and-forward operation service, then the session management network element can set the value of the user plane integrity security policy corresponding to the session to required, indicating that integrity security protection for the session is enabled; for another example, if the indication information determines that the network device is not deployed on a satellite, or the network device does not support store-and-forward operations, or the network device is configured to disable the store-and-forward feature, and the contract information indicates that the terminal device has not signed a contract for the store-and-forward operation service, then the session management network element The user plane integrity security policy corresponding to the session may be set to a value of not needed, indicating that integrity security protection for the session is not enabled. For example, if the indication information determines that the network device is not deployed on a satellite, or the network device does not support store-and-forward operations, or the network device is configured not to enable the store-and-forward feature, or the contract information indicates that the terminal device has not signed a contract for the store-and-forward operation service, then the session management network element may set the user plane integrity security policy corresponding to the session to a value of preferred, indicating that enabling integrity security protection for the session is optional, and the network device then determines whether to enable integrity security protection for the session based on local policies.
在一种实现方式中,会话管理网元可以从UDM或PCF获取上述签约信息。例如,会话管理网元向UDM或PCF发送查询消息,用于获取终端设备的签约信息,对应的,UDM或PCF向会话管理网元发送该终端设备的签约信息。In one implementation, the session management network element may obtain the above-mentioned subscription information from the UDM or PCF. For example, the session management network element sends a query message to the UDM or PCF to obtain the subscription information of the terminal device, and correspondingly, the UDM or PCF sends the subscription information of the terminal device to the session management network element.
可选地,本申请对会话管理网元获取上述签约信息和指示信息的先后顺序不作限定。Optionally, the present application does not limit the order in which the session management network element obtains the above-mentioned signing information and indication information.
下面,针对上述步骤S404中网络设备根据第一信息和用户面完整性安全策略确定是否激活会话的完整性安全保护,或者说,卫星基站根据第一消息和用户面完整性安全策略激活或不激活会话的完整性安全保护进行示例说明,包括以下一项或多项。Below, an example is given of the network device determining whether to activate the integrity security protection of the session based on the first information and the user plane integrity security policy in the above step S404, or the satellite base station activating or not activating the integrity security protection of the session based on the first message and the user plane integrity security policy, including one or more of the following.
(1)网络设备根据能力信息和用户面完整性安全策略确定是否激活会话的完整性安全保护,或者说,网络设备根据能力信息和用户面完整性安全策略激活或不激活会话的完整性安全保护。(1) The network device determines whether to activate the integrity security protection of the session based on the capability information and the user plane integrity security policy. In other words, the network device activates or does not activate the integrity security protection of the session based on the capability information and the user plane integrity security policy.
例如,在能力信息指示网络设备支持存储转发操作,且用户面完整性安全策略的取值为required或preferred的情况下,网络设备确定激活会话的完整性安全保护;再例如,在能力信息指示网络设备支持存储转发操作,且用户面完整性安全策略的取值为not needed的情况下,网络设备确定不激活会话的完整性安全保护,该实现方式中网络设备确定是否激活会话的完整性安全保护,主要以用户面完整性安全策略为准;又例如,在能力信息指示网络设备支持存储转发操作,且用户面完整性安全策略的取值为not needed的情况下,网络设备确定激活会话的完整性安全保护,该实现方式中网络设备确定是否激活会话的完整性安全保护,主要以网络设备是否支持存储转发操作为准;又例如,在能力信息指示网络设备不支持存储转发操作的情况下,无论用户面完整性安全策略的取值为required或preferred或not needed,网络设备确定不激活会话的完整性安全保护。For example, when the capability information indicates that the network device supports store-and-forward operations and the value of the user-plane integrity security policy is required or preferred, the network device determines to activate the integrity security protection of the session; for another example, when the capability information indicates that the network device supports store-and-forward operations and the value of the user-plane integrity security policy is not needed, the network device determines not to activate the integrity security protection of the session. In this implementation, the network device determines whether to activate the integrity security protection of the session, mainly based on the user-plane integrity security policy; for another example, when the capability information indicates that the network device supports store-and-forward operations and the value of the user-plane integrity security policy is not needed, the network device determines to activate the integrity security protection of the session. In this implementation, the network device determines whether to activate the integrity security protection of the session, mainly based on whether the network device supports store-and-forward operations; for another example, when the capability information indicates that the network device does not support store-and-forward operations, regardless of the value of the user-plane integrity security policy is required, preferred or not needed, the network device determines not to activate the integrity security protection of the session.
(2)网络设备根据网络设备的配置信息和用户面完整性安全策略确定是否激活会话的完整性安全保护,或者说,网络设备根据网络设备的配置信息和完整性安全策略激活或不激活会话的完整性安全保护。(2) The network device determines whether to activate the integrity security protection of the session based on the configuration information of the network device and the user plane integrity security policy. In other words, the network device activates or does not activate the integrity security protection of the session based on the configuration information of the network device and the integrity security policy.
例如,在配置信息指示网络设备配置开启存储转发操作,且用户面完整性安全策略的取值为required或preferred的情况下,网络设备确定激活会话的完整性安全保护;再例如,在配置信息指示网络设备配置开启存储转发操作,且用户面完整性安全策略的取值为not needed的情况下,网络设备确定不激活会话的完整性安全保护,该实现方式中网络设备确定是否激活会话的完整性安全保护,主要以用户面完整性安全策略为准;又例如,在配置信息指示网络设备配置开启存储转发操作,且用户面完整性安全策略的取值为not needed的情况下,网络设备确定激活会话的完整性安全保护,该实现方式中网络设备确定是否激活会话的完整性安全保护,主要以网络设备是否配置开启存储转发操作为准;又例如,在配置信息指示网络设备配置不开启存储转发操作的情况下,无论用户面完整性安全策略的取值为required或preferred或not needed,网络设备确定不激活会话的完整性安全保护。For example, when the configuration information indicates that the network device is configured to enable a store-and-forward operation, and the value of the user-plane integrity security policy is required or preferred, the network device determines to activate the integrity security protection of the session; for another example, when the configuration information indicates that the network device is configured to enable a store-and-forward operation, and the value of the user-plane integrity security policy is not needed, the network device determines not to activate the integrity security protection of the session. In this implementation, the network device determines whether to activate the integrity security protection of the session, mainly based on the user-plane integrity security policy; for another example, when the configuration information indicates that the network device is configured to enable a store-and-forward operation, and the value of the user-plane integrity security policy is not needed, the network device determines to activate the integrity security protection of the session. In this implementation, the network device determines whether to activate the integrity security protection of the session, mainly based on whether the network device is configured to enable the store-and-forward operation; for another example, when the configuration information indicates that the network device is configured not to enable a store-and-forward operation, regardless of the value of the user-plane integrity security policy is required, preferred or not needed, the network device determines not to activate the integrity security protection of the session.
(3)网络设备根据位置信息和用户面完整性安全策略确定是否激活会话的完整性安全保护,或者说,网络设备根据位置信息和用户面完整性安全策略激活或不激活会话的完整性安全保护。(3) The network device determines whether to activate the integrity security protection of the session based on the location information and the user plane integrity security policy. In other words, the network device activates or does not activate the integrity security protection of the session based on the location information and the user plane integrity security policy.
例如,在位置信息指示网络设备部署于卫星上(例如,网络设备为卫星基站),且用户面完整性安全策略的取值为required或preferred的情况下,网络设备确定激活会话的完整性安全保护;再例如,在位置信息指示网络设备部署于卫星上,且用户面完整性安全策略的取值为not needed的情况下,网络设备确定不激活会话的完整性安全保护,该实现方式中网络设备确定是否激活会话的完整性安全保护,主要以用户面完整性安全策略为准;又例如,在位置信息指示网络设备部署于卫星上,且用户面完整性安全策略的取值为not needed的情况下,网络设备确定不激活会话的完整性安全保护,该实现方式中网络设备确定是否激活会话的完整性安全保护,主要以网络设备为卫星基站为准;又例如,在位置信息指示网络设备部署于非卫星上(例如,网络设备为地面基站)的情况下,无论用户面完整性安全策略的取值为required或preferred或not needed,网络设备确定不激活会话的完整性安全保护。For example, when the location information indicates that the network device is deployed on a satellite (for example, the network device is a satellite base station) and the value of the user-plane integrity security policy is required or preferred, the network device determines to activate the integrity security protection of the session; for another example, when the location information indicates that the network device is deployed on a satellite and the value of the user-plane integrity security policy is not needed, the network device determines not to activate the integrity security protection of the session. In this implementation, the network device determines whether to activate the integrity security protection of the session, mainly based on the user-plane integrity security policy; for another example, when the location information indicates that the network device is deployed on a satellite and the value of the user-plane integrity security policy is not needed, the network device determines not to activate the integrity security protection of the session. In this implementation, the network device determines whether to activate the integrity security protection of the session, mainly based on the network device being a satellite base station; for another example, when the location information indicates that the network device is deployed on a non-satellite (for example, the network device is a ground base station), regardless of the value of the user-plane integrity security policy is required, preferred or not needed, the network device determines not to activate the integrity security protection of the session.
应理解,上述(4)-(6)中,网络设备根据第一信息用户面完整性安全策略确定是否激活会话的完整性安全保护,或者说,网络设备根据第一信息用户面完整性安全策略激活或不激活会话的完整性安全保护。其中,上述(4)-(6)的技术逻辑相同,即网络设备支持最大限度地激活会话的完整性安全保护,能够保证用户面数据最大限度地被激活完整性安全保护,便于后续网络设备对接收的上行消息和/或数据执行完整性校验,保障网络通信安全,同时可以降低被拒绝服务攻击的风险。It should be understood that in the above (4)-(6), the network device determines whether to activate the integrity security protection of the session according to the first information user plane integrity security policy, or in other words, the network device activates or does not activate the integrity security protection of the session according to the first information user plane integrity security policy. Among them, the technical logic of the above (4)-(6) is the same, that is, the network device supports maximally activating the integrity security protection of the session, which can ensure that the integrity security protection of the user plane data is activated to the maximum extent, so that the subsequent network device can perform integrity verification on the received uplink message and/or data, ensure the security of network communication, and reduce the risk of denial of service attacks.
需要说明的是,本申请对上述步骤S401-S404的执行先后顺序不作具体限定。例如,步骤S401-S404可以在步骤S410之前执行,或者,步骤S401-S404也可以在步骤S410之后执行,或者,步骤S401-S403在步骤S410之前执行且步骤S404在步骤S410之后完成,只要保证步骤S401-S404在下列步骤S420之前执行即可。It should be noted that the present application does not specifically limit the execution order of the above steps S401-S404. For example, steps S401-S404 may be executed before step S410, or steps S401-S404 may be executed after step S410, or steps S401-S403 may be executed before step S410 and step S404 may be completed after step S410, as long as steps S401-S404 are executed before the following step S420.
S420,网络设备向终端设备发送第一完整性安全保护指示信息,对应的,终端设备接收来自网络设备的第一完整性安全保护指示信息。S420, the network device sends first integrity security protection indication information to the terminal device, and correspondingly, the terminal device receives the first integrity security protection indication information from the network device.
其中,第一完整性安全保护指示信息用于指示激活结果。示例性地,激活结果用于指示是否激活会话的完整性安全保护,或者说,激活结果用于指示是否激活会话对应的一个或多个DRB的完整性安全保护。例如,激活结果包括激活会话的完整性安全保护,或者不激活会话的完整性安全保护。The first integrity security protection indication information is used to indicate an activation result. Exemplarily, the activation result is used to indicate whether to activate the integrity security protection of the session, or in other words, the activation result is used to indicate whether to activate the integrity security protection of one or more DRBs corresponding to the session. For example, the activation result includes activating the integrity security protection of the session, or not activating the integrity security protection of the session.
可选地,网络设备向终端设备发送RRC重配置消息,例如RRC Reconfiguration消息,该RRC重配置消息中携带第一完整性安全保护指示信息。Optionally, the network device sends an RRC reconfiguration message to the terminal device, such as an RRC Reconfiguration message, where the RRC reconfiguration message carries first integrity security protection indication information.
可选地,第一完整性安全保护指示信息可以显式指示,例如使用独立的信息元素IE来表示。例如,通过1比特的指示信息来指示,“1”表示激活会话的完整性安全保护,“0”表示不激活会话的完整性安全保护;或者,“true”表示激活会话的完整性安全保护,“false”表示不激活会话的完整性安全保护,本申请对其表现形式不作限定。Optionally, the first integrity security protection indication information may be explicitly indicated, for example, using an independent information element IE to indicate. For example, through 1-bit indication information, "1" indicates that the integrity security protection of the session is activated, and "0" indicates that the integrity security protection of the session is not activated; or, "true" indicates that the integrity security protection of the session is activated, and "false" indicates that the integrity security protection of the session is not activated. This application does not limit its expression form.
在一种实现方式中,第一整性安全保护指示信息是根据第一信息确定的。例如,基于上述步骤S410,如果网络设备根据第一信息确定激活会话的完整性安全保护,则第一整性安全保护指示信息用于指示激活会话的完整性安全保护;如果网络设备根据第一信息确定不激活会话的完整性安全保护,则第一整性安全保护指示信息用于指示不激活会话的完整性安全保护。In one implementation, the first integrity security protection indication information is determined based on the first information. For example, based on the above step S410, if the network device determines to activate the integrity security protection of the session based on the first information, the first integrity security protection indication information is used to indicate the activation of the integrity security protection of the session; if the network device determines not to activate the integrity security protection of the session based on the first information, the first integrity security protection indication information is used to indicate not to activate the integrity security protection of the session.
在另一种实现方式中,第一整性安全保护指示信息是根据第一信息和用户面安全保护策略确定的。例如,基于上述步骤S404,如果网络设备根据第一信息和用户面安全保护策略确定激活会话的完整性安全保护,则第一整性安全保护指示信息用于指示激活会话的完整性安全保护;如果网络设备根据第一信息和用户面安全保护策略确定不激活会话的完整性安全保护,则第一整性安全保护指示信息用于指示不激活会话的完整性安全保护。In another implementation, the first integrity security protection indication information is determined according to the first information and the user plane security protection policy. For example, based on the above step S404, if the network device determines to activate the integrity security protection of the session according to the first information and the user plane security protection policy, the first integrity security protection indication information is used to indicate the integrity security protection of the activated session; if the network device determines not to activate the integrity security protection of the session according to the first information and the user plane security protection policy, the first integrity security protection indication information is used to indicate the integrity security protection of the not activated session.
可选地,该第一整性安全保护指示信息的大小可以是1比特。例如,该第一整性安全保护指示信息的取值为“1”,表示该会话对应的完整性安全保护开启,或者说,该会话对应的一个或多个DRB开启完整性性安全保护,也就是说,终端设备与网络设备之间承载于所述一个或多个DRB的一个或多个数据是经过完整性安全保护的,终端设备或网络设备在接收所述一个或多个数据之后需要进行完整性校验;再例如,该第一整性安全保护指示信息的取值为“0”,表示该会话对应的完整性安全保护不开启,或者说,该会话对应的一个或多个DRB不开启完整性性安全保护,也就是说,终端设备与网络设备之间承载于所述一个或多个DRB的一个或多个数据未经过完整性安全保护,终端设备或网络设备在接收所述一个或多个数据之后也无需进行完整性校验。Optionally, the size of the first integrity security protection indication information can be 1 bit. For example, the value of the first integrity security protection indication information is "1", indicating that the integrity security protection corresponding to the session is turned on, or one or more DRBs corresponding to the session have integrity security protection turned on, that is, one or more data carried on the one or more DRBs between the terminal device and the network device are integrity-protected, and the terminal device or the network device needs to perform an integrity check after receiving the one or more data; for another example, the value of the first integrity security protection indication information is "0", indicating that the integrity security protection corresponding to the session is not turned on, or one or more DRBs corresponding to the session do not have integrity security protection turned on, that is, one or more data carried on the one or more DRBs between the terminal device and the network device are not integrity-protected, and the terminal device or the network device does not need to perform an integrity check after receiving the one or more data.
可选地,在确定是否激活会话的完整性安全保护之后,或者在确定第一整性安全保护指示信息之后,或者,在向终端设备发送第一整性安全保护指示信息之后,网络设备可以配置所述会话对应的一个或多个DRB的PDCP实体。示例性地,如果确定激活会话的完整性安全保护,网络设备在PDCP实体配置所述一个或多个DRB的完整性安全保护密钥和完整性安全保护算法,并且激活所述一个或多个DRB承载的上行用户面消息和/或数据的完整性校验,以及激活所述一个或多个DRB承载的下行用户面消息和/或数据的完整性安全保护;如果确定不激活会话的完整性安全保护,网络设备在PDCP实体无需配置所述一个或多个DRB的完整性安全保护密钥和完整性安全保护算法,也就无需激活所述一个或多个DRB承载的上行用户面消息和/或数据的完整性校验,以及无需激活所述一个或多个DRB承载的下行用户面消息和/或数据的完整性安全保护。Optionally, after determining whether to activate integrity security protection for the session, or after determining the first integrity security protection indication information, or after sending the first integrity security protection indication information to the terminal device, the network device may configure the PDCP entity of one or more DRBs corresponding to the session. Exemplarily, if it is determined to activate integrity security protection for the session, the network device configures the integrity security protection key and integrity security protection algorithm of the one or more DRBs in the PDCP entity, and activates the integrity check of the uplink user plane messages and/or data carried by the one or more DRBs, and activates the integrity security protection of the downlink user plane messages and/or data carried by the one or more DRBs; if it is determined not to activate integrity security protection for the session, the network device does not need to configure the integrity security protection key and integrity security protection algorithm of the one or more DRBs in the PDCP entity, and does not need to activate the integrity check of the uplink user plane messages and/or data carried by the one or more DRBs, and does not need to activate the integrity security protection of the downlink user plane messages and/or data carried by the one or more DRBs.
S430,终端设备对第一完整性安全保护指示信息进行完整性校验。S430, the terminal device performs an integrity check on the first integrity security protection indication information.
示例性地,终端设备可以通过比较MAC值判断完整性校验是否通过,具体实现方式可参考上述方法300的相关描述,这里不再说明。Exemplarily, the terminal device may determine whether the integrity check passes by comparing the MAC value. The specific implementation method may refer to the relevant description of the above method 300 and will not be described again here.
S440,在完整性校验通过的情况下,终端设备根据第一完整性安全保护指示信息确定是否激活会话的完整性安全保护。S440: When the integrity check passes, the terminal device determines whether to activate integrity security protection for the session according to the first integrity security protection indication information.
也就是说,终端设备在接收第一完整性安全保护指示信息之后,当第一完整性安全保护指示信息的完整性校验通过,则终端设备可以进一步确定开启或不开启会话的完整性安全保护。例如,第一完整性安全保护指示信息指示激活会话的完整性安全保护,则终端设备开启会话的完整性安全保护,也即后续终端设备向网络设备发送的上行消息和/或数据都需要经过完整性安全保护,后续终端设备从网络设备接收的上行消息和/或数据都需要进行完整性校验;再例如,第一完整性安全保护指示信息指示不激活会话的完整性安全保护,则终端设备不开启会话的完整性安全保护,也即后续终端设备向网络设备发送的上行消息和/或数据无需经过完整性安全保护,后续终端设备从网络设备接收的上行消息和/或数据也无需进行完整性校验。That is to say, after the terminal device receives the first integrity security protection indication information, when the integrity check of the first integrity security protection indication information passes, the terminal device can further determine whether to turn on or off the integrity security protection of the session. For example, if the first integrity security protection indication information indicates to activate the integrity security protection of the session, the terminal device turns on the integrity security protection of the session, that is, the subsequent uplink messages and/or data sent by the terminal device to the network device need to be subject to integrity security protection, and the subsequent uplink messages and/or data received by the terminal device from the network device need to be integrity checked; for another example, if the first integrity security protection indication information indicates not to activate the integrity security protection of the session, the terminal device does not turn on the integrity security protection of the session, that is, the subsequent uplink messages and/or data sent by the terminal device to the network device do not need to be subject to integrity security protection, and the subsequent uplink messages and/or data received by the terminal device from the network device do not need to be integrity checked.
可选地,在完整性验证通过的情况下,在确定是否激活会话的完整性安全保护之后,终端设备可以配置所述会话对应的一个或多个DRB的PDCP实体。示例性地,如果第一完整性安全保护指示信息指示激活会话的完整性安全保护,终端设备在PDCP实体配置所述会话对应的一个或多个DRB的完整性安全保护密钥和完整性安全保护算法,并且激活所述一个或多个DRB承载的上行用户面消息和/或数据的完整性安全保护,以及激活所述一个或多个DRB承载的下行用户面消息和/或数据的完整性校验;如果第一完整性安全保护指示信息指示不激活会话的完整性安全保护,终端设备在PDCP实体无需配置所述会话对应的一个或多个DRB的完整性安全保护密钥和完整性安全保护算法,也就无需激活所述一个或多个DRB承载的上行用户面消息和/或数据的完整性安全保护,以及无需激活所述一个或多个DRB承载的下行用户面消息和/或数据的完整性校验。Optionally, when the integrity verification passes, after determining whether to activate the integrity security protection of the session, the terminal device can configure the PDCP entity of one or more DRBs corresponding to the session. Exemplarily, if the first integrity security protection indication information indicates to activate the integrity security protection of the session, the terminal device configures the integrity security protection key and integrity security protection algorithm of the one or more DRBs corresponding to the session in the PDCP entity, and activates the integrity security protection of the uplink user plane messages and/or data carried by the one or more DRBs, and activates the integrity check of the downlink user plane messages and/or data carried by the one or more DRBs; if the first integrity security protection indication information indicates not to activate the integrity security protection of the session, the terminal device does not need to configure the integrity security protection key and integrity security protection algorithm of the one or more DRBs corresponding to the session in the PDCP entity, and does not need to activate the integrity security protection of the uplink user plane messages and/or data carried by the one or more DRBs, and does not need to activate the integrity check of the downlink user plane messages and/or data carried by the one or more DRBs.
可选地,终端设备可以向网络设备发送响应消息,用于指示终端设备是否成功激活会话的完整性安全保护。例如,如果终端设备成功激活会话的完整性安全保护,则终端设备向网络设备发送响应消息#1,用于指示终端设备成功激活会话的完整性安全保护。可选地,如果上述步骤S420的第一完整性安全保护指示信息携带在RRC重配置消息,则终端设备可以向网络设备发送RRC重配置完成消息,用于指示终端设备成功激活会话的完整性安全保护,或者说,用于指示终端设备成功配置所述会话对应的一个或多个DRB的PDCP实体。再例如,如果终端设备未成功激活会话的完整性安全保护,则终端设备向网络设备发送响应消息#2,用于指示终端设备未成功激活会话的完整性安全保护。可选地,该响应消息#2中可以携带失败原因值,例如失败原因值可以用于指示第一完整性安全保护指示信息校验失败。Optionally, the terminal device may send a response message to the network device to indicate whether the terminal device has successfully activated the integrity security protection of the session. For example, if the terminal device successfully activates the integrity security protection of the session, the terminal device sends a response message #1 to the network device to indicate that the terminal device has successfully activated the integrity security protection of the session. Optionally, if the first integrity security protection indication information of the above step S420 is carried in the RRC reconfiguration message, the terminal device may send an RRC reconfiguration completion message to the network device to indicate that the terminal device has successfully activated the integrity security protection of the session, or in other words, to indicate that the terminal device has successfully configured the PDCP entity of one or more DRBs corresponding to the session. For another example, if the terminal device fails to successfully activate the integrity security protection of the session, the terminal device sends a response message #2 to the network device to indicate that the terminal device has failed to successfully activate the integrity security protection of the session. Optionally, the response message #2 may carry a failure cause value, for example, the failure cause value may be used to indicate that the verification of the first integrity security protection indication information has failed.
可选地,针对网络设备和地面核心网之间的连接断开的场景,网络设备通过对接收的上行消息和/或数据进行完整性校验,并且在完整性校验通过的情况下存储该上行数据,在完整性检验不通过的情况下,不存储该上行数据或丢弃该上行数据,能够保证网络通信安全,同时降低被DoS攻击的风险,具体实现方式可参考下列方法500的相关描述,这里先不做说明。Optionally, in the scenario where the connection between the network device and the ground core network is disconnected, the network device performs an integrity check on the received uplink message and/or data, and stores the uplink data if the integrity check passes, and does not store the uplink data or discards the uplink data if the integrity check fails. This can ensure the security of network communications while reducing the risk of DoS attacks. The specific implementation method can refer to the relevant description of the following method 500, which will not be explained here.
需要说明的是,以上方法300中以用户面完整性安全保护、用户面完整性安全策略、或完整性校验等为例进行说明,仅是为便于理解给出的示例,不构成对本申请技术方案的限定。可选地,本申请技术方案同样适用于用户面机密性安全保护、用户面机密性安全策略、或解密操作等,具体实现方式可参考上述相关描述,这里不再说明。It should be noted that the above method 300 is described by taking user plane integrity security protection, user plane integrity security policy, or integrity verification as an example, which is only an example given for ease of understanding and does not constitute a limitation on the technical solution of the present application. Optionally, the technical solution of the present application is also applicable to user plane confidentiality security protection, user plane confidentiality security policy, or decryption operation, etc. The specific implementation method can refer to the above related description, which will not be described here.
本申请上述提供的方案,网络设备根据第一信息确定是否激活会话的完整性安全保护,额外的还可以考虑用户面完整性安全策略和/或网络设备的本地策略,尽可能地开启或激活会话的完整性安全保护,使得网络设备接收的用户面数据最大程度地经过完整性安全保护,便于在馈线链路断开的场景下,只存储完整性校验通过的用户面数据,不仅缓解了潜在的拒绝服务DoS攻击风险,同时可以保障网络通信安全。In the solution provided above in the present application, the network device determines whether to activate the integrity security protection of the session based on the first information, and can also consider the user plane integrity security policy and/or the local policy of the network device in addition, and turn on or activate the integrity security protection of the session as much as possible, so that the user plane data received by the network device is protected by integrity security to the greatest extent, so that in the scenario where the feeder link is disconnected, only the user plane data that has passed the integrity check is stored, which not only alleviates the potential risk of denial of service DoS attacks, but also ensures the security of network communications.
图5是本申请实施例提供的通信方法500的流程示意图,如图5所示,以终端设备为UE、网络设备为基站、核心网网元为AMF或SMF为执行主体进行交互,为便于描述,本申请可以将部署在卫星上的基站称为卫星基站,将部署在非卫星上的基站,例如部署在地面上的基站称为地面基站。该方法可以看作是上述方法400的进一步细化,应理解,图5所示的实施例与图4所示的实施例可以彼此耦合,且可以互为参考,因此上述方法400中的相关描述同样适用于该实现方式,二者之间可以存在相同或类似的技术手段,与图4所示的实施例中已描述的内容不再赘述,该方法包括如下多个步骤,未详尽说明的部分可参考上述方法400或现有协议。FIG5 is a flow chart of a communication method 500 provided in an embodiment of the present application. As shown in FIG5, the terminal device is UE, the network device is base station, and the core network element is AMF or SMF as the execution subject to interact. For the convenience of description, the present application may refer to the base station deployed on the satellite as a satellite base station, and the base station deployed on a non-satellite, such as a base station deployed on the ground as a ground base station. This method can be regarded as a further refinement of the above-mentioned method 400. It should be understood that the embodiment shown in FIG5 and the embodiment shown in FIG4 can be coupled with each other and can be used as a reference to each other. Therefore, the relevant description in the above-mentioned method 400 is also applicable to this implementation method. The same or similar technical means may exist between the two. The content described in the embodiment shown in FIG4 will not be repeated. The method includes the following multiple steps. The part not described in detail can refer to the above-mentioned method 400 or the existing protocol.
S501,UE注册到网络。S501, UE registers to the network.
可选地,本申请实施例对注册到同一网络的UE的数量不作限定,应理解,针对多个UE注册到网络的场景,每个UE建立会话的流程,以及激活或不激活所述会话的用户面完整性安全保护的具体实现方式类似。为便于描述,该实现方式以一个UE注册到网络、建立会话、确定是否激活或不激活所述会话的用户面完整性安全保护为例进行说明。Optionally, the embodiment of the present application does not limit the number of UEs registered to the same network. It should be understood that for the scenario where multiple UEs are registered to the network, the process of each UE establishing a session and the specific implementation of activating or not activating the user plane integrity security protection of the session are similar. For ease of description, this implementation is described by taking an example of a UE registering to the network, establishing a session, and determining whether to activate or not activate the user plane integrity security protection of the session.
S502,UE向AMF发送会话建立请求消息,对应的,AMF接收来自UE的会话建立请求消息。S502, the UE sends a session establishment request message to the AMF, and correspondingly, the AMF receives the session establishment request message from the UE.
其中,一个会话可以对应一个或多个DRB,应理解,会话用于传输UE和核心网之间的数据,例如,一个会话用于传输一个或多个数据,所述一个或多个数据可以分别由所述一个或多个DRB承载,通常一个DRB承载一个数据。Among them, one session can correspond to one or more DRBs. It should be understood that the session is used to transmit data between the UE and the core network. For example, one session is used to transmit one or more data. The one or more data can be carried by the one or more DRBs respectively, and usually one DRB carries one data.
S503,AMF向SMF发送会话创建上下文请求消息,对应的,SMF接收来自AMF的会话创建上下文请求消息。S503, AMF sends a session creation context request message to SMF, and correspondingly, SMF receives the session creation context request message from AMF.
S504,SMF向AMF发送会话创建上下文响应消息,对应的,AMF接收来自SMF的会话创建上下文响应消息。S504, SMF sends a session creation context response message to AMF, and correspondingly, AMF receives a session creation context response message from SMF.
S505,AMF向卫星基站发送会话资源建立请求消息,对应的,卫星基站接收来自AMF的会话资源建立请求消息。S505, AMF sends a session resource establishment request message to the satellite base station, and correspondingly, the satellite base station receives the session resource establishment request message from the AMF.
其中,上述步骤S501至S505的具体实现方式可参考上述方法300的相关描述。The specific implementation of the above steps S501 to S505 may refer to the relevant description of the above method 300.
S506,卫星基站根据第一信息确定是否激活会话的完整性安全保护,或者说,卫星基站根据第一信息激活或不激活会话的完整性安全保护。S506: The satellite base station determines whether to activate the integrity security protection of the session according to the first information. In other words, the satellite base station activates or does not activate the integrity security protection of the session according to the first information.
应理解,是否激活会话的完整性安全保护,可以理解为,是否激活所述会话对应的一个或多个DRB的完整性安全保护,也可以理解为,终端设备与网络设备之间传输的数据是否开启完整性安全保护。It should be understood that whether to activate the integrity security protection of the session can be understood as whether to activate the integrity security protection of one or more DRBs corresponding to the session, or whether integrity security protection is enabled for the data transmitted between the terminal device and the network device.
可选地,在执行步骤S506之前,卫星基站获取第一信息,例如,第一信息包括网络设备的能力信息、配置信息、或位置信息中的一项或多项。其中,获取第一信息的具体实现方式,以及第一信息的含义可以参考上述方法400的步骤S410的相关描述。Optionally, before executing step S506, the satellite base station obtains first information, for example, the first information includes one or more of capability information, configuration information, or location information of the network device. The specific implementation of obtaining the first information and the meaning of the first information can refer to the relevant description of step S410 of the above method 400.
下面,针对卫星基站根据第一信息确定是否激活会话的完整性安全保护,或者说,卫星基站根据第一信息激活或不激活会话的完整性安全保护进行示例说明,包括以下一项或多项,具体实现方式可参考上述方法400的相关描述。Below, an example is given for a satellite base station to determine whether to activate the integrity security protection of a session based on the first information, or in other words, the satellite base station to activate or not activate the integrity security protection of a session based on the first information, including one or more of the following. The specific implementation method can refer to the relevant description of the above method 400.
(1)卫星基站根据能力信息确定是否激活会话的完整性安全保护,或者说,卫星基站根据能力信息确定激活或不激活会话的完整性安全保护。(1) The satellite base station determines whether to activate the integrity security protection of the session according to the capability information. In other words, the satellite base station determines whether to activate or not activate the integrity security protection of the session according to the capability information.
(2)卫星基站根据配置信息确定是否激活会话的完整性安全保护,或者说,卫星基站根据配置信息激活或不激活会话的完整性安全保护。(2) The satellite base station determines whether to activate the integrity security protection of the session according to the configuration information. In other words, the satellite base station activates or does not activate the integrity security protection of the session according to the configuration information.
(3)基站根据位置信息确定是否激活会话的完整性安全保护,或者说,基站根据位置信息激活或不激活会话的完整性安全保护。(3) The base station determines whether to activate the integrity security protection of the session according to the location information. In other words, the base station activates or does not activate the integrity security protection of the session according to the location information.
可选地,卫星基站可以根据第一信息和上述步骤S505中携带的用户面完整性安全策略,确定是否激活会话的完整性安全保护,或者说,卫星基站根据第一信息和用户面完整性安全策略激活或不激活会话的完整性安全保护进行示例说明,包括以下一项或多项,具体实现方式可参考上述方法400的步骤S404的相关描述。Optionally, the satellite base station may determine whether to activate the integrity security protection of the session based on the first information and the user plane integrity security policy carried in the above step S505. In other words, the satellite base station activates or does not activate the integrity security protection of the session based on the first information and the user plane integrity security policy. An example illustration includes one or more of the following. The specific implementation method may refer to the relevant description of step S404 of the above method 400.
(1)卫星基站根据能力信息和用户面完整性安全策略确定是否激活会话的完整性安全保护,或者说,卫星基站根据能力信息和用户面完整性安全策略激活或不激活会话的完整性安全保护。(1) The satellite base station determines whether to activate the integrity security protection of the session based on the capability information and the user plane integrity security policy. In other words, the satellite base station activates or does not activate the integrity security protection of the session based on the capability information and the user plane integrity security policy.
(2)卫星基站根据配置信息和用户面完整性安全策略确定是否激活会话的完整性安全保护,或者说,卫星基站根据基站的配置信息和用户面完整性安全策略激活或不激活会话的完整性安全保护。(2) The satellite base station determines whether to activate the integrity security protection of the session based on the configuration information and the user plane integrity security policy. In other words, the satellite base station activates or does not activate the integrity security protection of the session based on the configuration information of the base station and the user plane integrity security policy.
(3)基站根据位置信息和用户面完整性安全策略确定是否激活会话的完整性安全保护,或者说,卫星基站根据位置信息和用户面完整性安全策略激活或不激活会话的完整性安全保护。(3) The base station determines whether to activate the integrity security protection of the session based on the location information and the user plane integrity security policy. In other words, the satellite base station activates or does not activate the integrity security protection of the session based on the location information and the user plane integrity security policy.
S507,卫星基站向UE发送RRC重配置消息,对应的,UE接收来自卫星基站的RRC重配置消息。S507, the satellite base station sends an RRC reconfiguration message to the UE, and correspondingly, the UE receives the RRC reconfiguration message from the satellite base station.
示例性地,该RRC重配置消息可以是RRC Reconfiguration消息。Exemplarily, the RRC reconfiguration message may be an RRC Reconfiguration message.
其中,RRC重配置消息包括所述会话对应的一个或多个DRB标识(例如DRB ID),以及所述一个或多个DRB的完整性安全保护指示,其中,完整性安全保护指示用于指示所述一个或多个DRB是否开启完整性安全保护,或者说所述一个或多个DRB是否需要激活完整性安全保护。The RRC reconfiguration message includes one or more DRB identifiers (e.g., DRB ID) corresponding to the session, and an integrity security protection indication of the one or more DRBs, wherein the integrity security protection indication is used to indicate whether integrity security protection is enabled for the one or more DRBs, or whether integrity security protection needs to be activated for the one or more DRBs.
另外,该RRC重配置消息还可以包括步骤S505中携带的会话接受消息。In addition, the RRC reconfiguration message may also include the session acceptance message carried in step S505.
S508,UE对RRC重配置消息进行完整性校验。S508: The UE performs an integrity check on the RRC reconfiguration message.
可选地,在完整性校验通过的情况下,UE配置所述一个或多个DRB的PDCP实体。Optionally, if the integrity check passes, the UE configures the PDCP entity of the one or more DRBs.
S509,UE向卫星基站发送RRC重配置完成消息,对应的,卫星基站接收来自UE的RRC重配置完成消息。S509, the UE sends an RRC reconfiguration completion message to the satellite base station, and correspondingly, the satellite base station receives the RRC reconfiguration completion message from the UE.
示例性地,RRC重配置完成消息可以是RRC Reconfiguration Complete消息。Exemplarily, the RRC reconfiguration completion message may be an RRC Reconfiguration Complete message.
S510,卫星基站向AMF发送会话资源建立响应消息,对应的,AMF接收来自卫星基站的会话资源建立响应消息。S510, the satellite base station sends a session resource establishment response message to the AMF, and correspondingly, the AMF receives a session resource establishment response message from the satellite base station.
其中,上述步骤S509至S510的具体实现方式可参考上述方法300的相关描述。The specific implementation of the above steps S509 to S510 may refer to the relevant description of the above method 300.
以下步骤S511-S514,针对卫星基站和地面核心网之间的连接断开的场景,卫星基站通过对接收的上行数据进行完整性校验,以确定是否存储该上行数据,在保证网络通信安全的情况下,降低被DoS攻击的风险。In the following steps S511-S514, for the scenario where the connection between the satellite base station and the ground core network is disconnected, the satellite base station performs an integrity check on the received uplink data to determine whether to store the uplink data, thereby reducing the risk of DoS attacks while ensuring network communication security.
S511,卫星基站和地面核心网之间的连接断开,如馈线链路断开。S511, the connection between the satellite base station and the ground core network is disconnected, such as the feeder link is disconnected.
示例性地,馈线链路断开的触发条件包括以下一项或多项:Exemplarily, the triggering condition for the feeder link disconnection includes one or more of the following:
(1)卫星基站飞行到背离地面关口站的一侧,即地面关口站无法接收到卫星基站发射的信号;(1) The satellite base station flies to the side away from the ground gateway station, that is, the ground gateway station cannot receive the signal transmitted by the satellite base station;
(2)卫星基站和地面关口站之间的通信条件变差,如遭遇恶劣天气、或信号质量低于某一阈值等;(2) The communication conditions between the satellite base station and the ground gateway station deteriorate, such as encountering bad weather or the signal quality falling below a certain threshold;
(3)其他条件。(3)Other conditions.
S512,UE向卫星基站发送上行数据,对应的,卫星基站接收来自UE的上行数据。S512, the UE sends uplink data to the satellite base station, and correspondingly, the satellite base station receives the uplink data from the UE.
需要说明的是,如果上述步骤S507的RRC重配置消息中携带的完整性安全保护指示用于指示所述会话对应的一个或多个DRB开启完整性安全保护,则UE在发送上行数据之前,需要对上行数据进行完整性安全保护;或者,如果RRC重配置消息中携带的完整性安全保护指示用于指示所述会话对应的一个或多个DRB不开启完整性安全保护,则UE在发送上行数据之前,无需对上行数据进行完整性安全保护。It should be noted that if the integrity security protection indication carried in the RRC reconfiguration message of the above step S507 is used to indicate that one or more DRBs corresponding to the session have integrity security protection enabled, the UE needs to perform integrity security protection on the uplink data before sending the uplink data; or, if the integrity security protection indication carried in the RRC reconfiguration message is used to indicate that one or more DRBs corresponding to the session do not have integrity security protection enabled, the UE does not need to perform integrity security protection on the uplink data before sending the uplink data.
S513,卫星基站对上行数据进行完整性校验。S513, the satellite base station performs integrity check on the uplink data.
示例性地,卫星基站对上行数据进行完整性校验的触发条件包括以下一项或多项:Exemplarily, the triggering conditions for the satellite base station to perform integrity check on uplink data include one or more of the following:
(1)卫星基站支持存储转发操作,且馈线链路断开;(1) The satellite base station supports store-and-forward operation and the feeder link is disconnected;
(2)卫星基站开启存储转发操作,且馈线链路断开。(2) The satellite base station starts the store-and-forward operation and the feeder link is disconnected.
可选地,上述触发条件还可以包括:Optionally, the above triggering conditions may also include:
(3)卫星基站的负载大于第一阈值,第一阈值可以是预定义的,例如协议定义,或者,第一阈值可以是配置或预配置的,本申请对此不作限定。(3) The load of the satellite base station is greater than a first threshold. The first threshold may be predefined, such as defined by a protocol, or the first threshold may be configured or preconfigured, which is not limited in the present application.
其中,完整性校验的具体实现方式包括下述任意一种:The specific implementation method of integrity verification includes any of the following:
(1)卫星基站对接收的所有的上行数据都进行完整性校验;(1) The satellite base station performs integrity check on all received uplink data;
(2)卫星基站以会话为粒度确定是否对接收的上行数据进行完整性校验。(2) The satellite base station determines whether to perform integrity check on the received uplink data based on the session granularity.
示例性地,如果卫星基站在步骤S506中确定激活会话的用户面完整性安全保护,则对于卫星基站通过该会话对应的一个或多个DRB上接收的一个或多个上行数据,卫星基站需要对该一个或多个上行数据进行完整性校验;或者,如果卫星基站在步骤S506中确定不激活会话的用户面完整性安全保护,则对于卫星基站通过该会话对应的一个或多个DRB上接收的一个或多个上行数据,卫星基站无需对该一个或多个上行数据进行完整性校验,可选地,卫星基站可以直接丢弃该一个或多个上行数据。Exemplarily, if the satellite base station determines in step S506 to activate the user plane integrity security protection of the session, the satellite base station needs to perform integrity check on the one or more uplink data received by the satellite base station through one or more DRBs corresponding to the session; or, if the satellite base station determines in step S506 not to activate the user plane integrity security protection of the session, the satellite base station does not need to perform integrity check on the one or more uplink data received by the satellite base station through one or more DRBs corresponding to the session, and optionally, the satellite base station may directly discard the one or more uplink data.
(3)卫星基站以DRB为粒度确定是否对接收的上行数据进行完整性校验。(3) The satellite base station determines whether to perform integrity check on the received uplink data based on the DRB granularity.
示例性地,如果卫星基站在步骤S506中确定可选激活会话的用户面完整性安全保护,进一步地,卫星基站可以根据本地策略,例如自身负载情况确定是否激活所述一个或多个DRB的用户面完整性安全保护。假设所述会话对应两个DRB(如DRB#1和DRB#2),在根据第一信息和/或用户面完整性安全策略确定可选开启该会话的用户面完整性安全保护的情况下,卫星基站根据自身负载确定DRB#1开启用户面完整性安全保护,且DRB#2不开启用户面完整性安全保护,则对于卫星基站通过该DRB#1上接收的上行数据#1,卫星基站需要对上行数据#1进行完整性校验,对于卫星基站通过该DRB#2上接收的上行数据#2,卫星基站无需对上行数据#2不进行完整性校验,可选地,卫星基站可以直接丢弃上行数据#2。Exemplarily, if the satellite base station determines in step S506 that the user plane integrity security protection of the session can be optionally activated, the satellite base station can further determine whether to activate the user plane integrity security protection of the one or more DRBs based on local policies, such as its own load conditions. Assuming that the session corresponds to two DRBs (such as DRB#1 and DRB#2), when it is determined according to the first information and/or the user plane integrity security policy that the user plane integrity security protection of the session can be optionally enabled, the satellite base station determines according to its own load that DRB#1 enables user plane integrity security protection, and DRB#2 does not enable user plane integrity security protection. For uplink data #1 received by the satellite base station through DRB#1, the satellite base station needs to perform integrity check on uplink data #1, and for uplink data #2 received by the satellite base station through DRB#2, the satellite base station does not need to perform integrity check on uplink data #2. Optionally, the satellite base station can directly discard uplink data #2.
其中,针对完整性校验过程中涉及的MAC值计算和判断方式可参考上述方法300的相关描述,这里不再赘述。Among them, the MAC value calculation and judgment method involved in the integrity verification process can refer to the relevant description of the above method 300, which will not be repeated here.
S514,卫星基站根据校验结果确定是否存储上行数据。S514, the satellite base station determines whether to store the uplink data according to the verification result.
其中,校验结果用于指示上述步骤S513中卫星基站对接收的上行数据的完整性校验是否通过,包括校验成功(通过),或校验失败(不通过)。The check result is used to indicate whether the integrity check of the received uplink data by the satellite base station in the above step S513 is passed, including whether the check is successful (passed) or failed (failed).
示例性地,卫星基站存储完整性校验通过的上行数据,不存储或丢弃无完整性安全保护的上行数据,或者,不存储或丢弃完整性校验失败的上行数据。Exemplarily, the satellite base station stores uplink data that passes the integrity check, does not store or discards uplink data without integrity security protection, or does not store or discards uplink data that fails the integrity check.
基于上述提供的方案,卫星基站基于用户面完整性安全策略、本地策略、卫星基站的能力信息、配置信息、或位置信息中的一项或多项确定是否激活会话的完整性安全保护,尽可能地开启会话完整性安全保护,使得卫星基站接收的用户面数据最大程度地经过完整性安全保护,便于在馈线链路断开的场景下,卫星基站只存储完整性校验通过的数据,能够缓解潜在的DoS风险,保障网络通信安全。Based on the above-provided solution, the satellite base station determines whether to activate the integrity security protection of the session based on one or more of the user plane integrity security policy, local policy, capability information, configuration information, or location information of the satellite base station, and turns on the session integrity security protection as much as possible, so that the user plane data received by the satellite base station is protected by integrity security to the greatest extent. In the scenario where the feeder link is disconnected, the satellite base station only stores data that has passed the integrity check, which can alleviate potential DoS risks and ensure network communication security.
应理解,上述图4和图5是在终端设备的会话建立过程中,卫星基站根据第一信息最大限度的开启会话的完整性安全保护,缓解潜在的DoS风险,同时保障网络通信安全。相比于图4和图5,下图6和图7所示的方案在馈线链路断开的情况下,卫星基站和UE通过释放未激活完整性安全保护的会话和/或DRB,或者卫星基站和UE通过修改会话和/或DRB的完整性安全保护状态为激活态,降低UE和卫星基站的处理负载,避免潜在的DoS风险,保障网络通信安全。It should be understood that the above Figures 4 and 5 are in the process of establishing a session of the terminal device, and the satellite base station activates the integrity security protection of the session to the maximum extent according to the first information, thereby alleviating potential DoS risks and ensuring network communication security. Compared with Figures 4 and 5, the schemes shown in Figures 6 and 7 below, when the feeder link is disconnected, the satellite base station and the UE release the session and/or DRB for which the integrity security protection is not activated, or the satellite base station and the UE modify the integrity security protection state of the session and/or DRB to an activated state, thereby reducing the processing load of the UE and the satellite base station, avoiding potential DoS risks, and ensuring network communication security.
图6是本申请实施例提供的通信方法的流程示意图。该方法600可以由终端设备、网络设备和核心网网元(例如会话管理网元)执行,或者,也可以由终端设备、网络设备和核心网网元(例如会话管理网元)的芯片或电路执行,或者还可以由能实现全部或部分通信装置功能的逻辑模块或软件实现,本申请对此不作限制。下面以执行主体为终端设备、网络设备和会话管理网元为例进行说明,如图6所示,该方法包括如下多个步骤,未详尽说明的部分可参考上述方法300-500,或现有协议。FIG6 is a flow chart of a communication method provided by an embodiment of the present application. The method 600 can be executed by a terminal device, a network device, and a core network element (such as a session management element), or it can also be executed by a chip or circuit of a terminal device, a network device, and a core network element (such as a session management element), or it can also be implemented by a logic module or software that can realize all or part of the functions of the communication device, and the present application does not limit this. The following is an example of an execution subject being a terminal device, a network device, and a session management element. As shown in FIG6, the method includes the following multiple steps, and the part not described in detail can refer to the above methods 300-500, or the existing protocol.
S610,网络设备获取会话对应的用户面完整性安全策略。S610: The network device obtains a user plane integrity security policy corresponding to the session.
其中,用户面完整性安全策略用于指示会话是否激活完整性安全保护,或者说,所述会话传输的数据是否需要开启完整性安全保护,有关用户面完整性安全策略的取值及其具体含义,以及表现形式可以参考上述方法300或400的相关描述,这里不再赘述。Among them, the user plane integrity security policy is used to indicate whether integrity security protection is activated for the session, or whether the data transmitted by the session needs to have integrity security protection enabled. The value of the user plane integrity security policy, its specific meaning, and its expression form can be referred to the relevant description of the above method 300 or 400, which will not be repeated here.
在一种实现方式中,网络设备从会话管理网元获取该会话对应的用户面完整性安全策略,例如参见如下步骤S602。In one implementation, the network device obtains the user plane integrity security policy corresponding to the session from the session management network element, for example, see the following step S602.
S602,会话管理网元向网络设备发送会话对应的用户面完整性安全策略,对应的,网络设备接收来自会话管理网元的会话对应的用户面完整性安全策略。S602, the session management network element sends a user plane integrity security policy corresponding to the session to the network device, and correspondingly, the network device receives the user plane integrity security policy corresponding to the session from the session management network element.
其中,具体实现方式可参考上述方法400的步骤S402的相关描述,这里不再说明。The specific implementation method may refer to the relevant description of step S402 of the above method 400, which will not be described again here.
可选地,在执行步骤S602之前,会话管理网元确定该会话的用户面完整性安全策略,例如会话管理网元可以通过获取的指示信息确定该会话的用户面完整性安全策略,例如参见如下步骤S601。Optionally, before executing step S602, the session management network element determines the user plane integrity security policy of the session. For example, the session management network element may determine the user plane integrity security policy of the session through the acquired indication information, for example, see the following step S601.
S601,会话管理网元获取指示信息。S601: The session management network element obtains instruction information.
其中,指示信息的具体含义,以及获取指示信息的具体实现方式可参考上述方法400的步骤S402的相关描述,这里不再说明。The specific meaning of the indication information and the specific implementation method of obtaining the indication information can refer to the relevant description of step S402 of the above method 400, which will not be described here.
在第一种实现方式中,会话管理网元可以根据指示信息确定该会话对应的用户面完整性安全策略。In a first implementation manner, the session management network element may determine the user plane integrity security policy corresponding to the session according to the indication information.
在第二种实现方式中,会话管理网元可以根据终端设备的签约信息开启会话的完整性安全保护。In the second implementation, the session management network element may enable session integrity security protection based on the contract information of the terminal device.
在第三种实现方式中,会话管理网元可以根据指示信息和终端设备的签约信息确定该会话对应的用户面完整性安全策略。In a third implementation, the session management network element may determine the user plane integrity security policy corresponding to the session based on the indication information and the subscription information of the terminal device.
其中,签约信息的具体含义,签约信息的获取方式,以及上述三种实现方式的示例说明可以参考方法400的步骤S401的相关描述。Among them, the specific meaning of the contract information, the method of obtaining the contract information, and examples of the above three implementation methods can refer to the relevant description of step S401 of method 400.
S620,网络设备根据用户面完整性安全策略确定第一完整性安全保护指示信息。S620: The network device determines first integrity security protection indication information according to the user plane integrity security policy.
其中,第一完整性安全保护指示信息用于指示是否激活第一DRB的完整性安全保护,也就是说,该第一完整性安全保护指示信息用于指示是否开启会话的完整性安全保护。所述第一DRB对应上述步骤S610的会话,应理解,会话用于传输终端设备与核心网之间的数据,第一DRB用于传输终端设备与网络设备之间的数据。The first integrity security protection indication information is used to indicate whether to activate the integrity security protection of the first DRB, that is, the first integrity security protection indication information is used to indicate whether to turn on the integrity security protection of the session. The first DRB corresponds to the session of step S610 above. It should be understood that the session is used to transmit data between the terminal device and the core network, and the first DRB is used to transmit data between the terminal device and the network device.
示例性地,用户面完整性安全策略的取值包括需要(required)、推荐(preferred)、不需要(not needed)。例如,在用户面完整性安全策略的取值为required的情况下,网络设备可以确定第一完整性安全保护指示信息用于指示所述会话开启完整性安全保护;在用户面完整性安全策略的取值为not needed的情况下,网络设备可以确定第一完整性安全保护指示信息用于指示所述会话不开启完整性安全保护;在用户面完整性安全策略的取值为preferred的情况下,网络设备可以确定第一完整性安全保护指示信息用于指示所述会话可选开启完整性安全保护,具体实现方式可参考上述方法300的相关描述。Exemplarily, the values of the user plane integrity security policy include required, preferred, and not needed. For example, when the value of the user plane integrity security policy is required, the network device can determine that the first integrity security protection indication information is used to indicate that the session turns on integrity security protection; when the value of the user plane integrity security policy is not needed, the network device can determine that the first integrity security protection indication information is used to indicate that the session does not turn on integrity security protection; when the value of the user plane integrity security policy is preferred, the network device can determine that the first integrity security protection indication information is used to indicate that the session can optionally turn on integrity security protection. For specific implementation methods, please refer to the relevant description of the above method 300.
可选地,本申请对第一完整性安全保护指示信息的表现形式不作具体限定,具体可参考上述方法400的步骤S420的相关描述。Optionally, the present application does not specifically limit the form of expression of the first integrity security protection indication information, and specific reference may be made to the relevant description of step S420 of the above method 400.
S621,网络设备根据第一完整性安全保护指示信息激活或者不激活第一DRB的完整性安全保护。S621, the network device activates or deactivates the integrity security protection of the first DRB according to the first integrity security protection indication information.
示例性地,在第一完整性安全保护指示信息指示所述会话开启完整性安全保护的情况下,网络设备激活第一DRB的完整性安全保护;在第一完整性安全保护指示信息指示所述会话不开启完整性安全保护,网络设备不激活第一DRB的完整性安全保护;在第一完整性安全保护指示信息指示所述会话可选开启完整性安全保护,网络设备可以根据本地策略激活第一DRB的完整性安全保护,具体实现方式可参考上述方法300的相关描述。Exemplarily, when the first integrity security protection indication information indicates that integrity security protection is enabled for the session, the network device activates the integrity security protection of the first DRB; when the first integrity security protection indication information indicates that integrity security protection is not enabled for the session, the network device does not activate the integrity security protection of the first DRB; when the first integrity security protection indication information indicates that integrity security protection is optionally enabled for the session, the network device may activate the integrity security protection of the first DRB according to local policies. For specific implementation methods, please refer to the relevant description of the above method 300.
其中,激活第一DRB的完整性安全保护,可以理解为:网络设备配置所述第一DRB的PDCP实体,在PDCP实体配置所述第一DRB的完整性安全保护密钥和完整性安全保护算法,并且激活所述第一DRB承载的上行用户面消息和/或数据的完整性校验,以及激活所述第一DRB承载的下行用户面消息和/或数据的完整性安全保护;不激活第一DRB的完整性安全保护,则可以理解为:网络设备配置所述第一DRB的PDCP实体,但是无需在PDCP实体配置所述第一DRB的完整性安全保护密钥和完整性安全保护算法,也无需激活所述第一DRB承载的上行用户面消息和/或数据的完整性校验,以及无需激活所述第一DRB承载的下行用户面消息和/或数据的完整性安全保护。Among them, activating the integrity security protection of the first DRB can be understood as: the network device configures the PDCP entity of the first DRB, configures the integrity security protection key and integrity security protection algorithm of the first DRB in the PDCP entity, and activates the integrity verification of the uplink user plane messages and/or data carried by the first DRB, and activates the integrity security protection of the downlink user plane messages and/or data carried by the first DRB; not activating the integrity security protection of the first DRB can be understood as: the network device configures the PDCP entity of the first DRB, but there is no need to configure the integrity security protection key and integrity security protection algorithm of the first DRB in the PDCP entity, and there is no need to activate the integrity verification of the uplink user plane messages and/or data carried by the first DRB, and there is no need to activate the integrity security protection of the downlink user plane messages and/or data carried by the first DRB.
S630,在第一链路断开的情况下,网络设备根据第一DRB的完整性安全保护是否激活确定是否释放第一DRB,或者,网络设备根据第一DRB的完整性安全保护是否激活确定是否修改第一DRB的完整性安全保护状态。S630, when the first link is disconnected, the network device determines whether to release the first DRB according to whether the integrity security protection of the first DRB is activated, or the network device determines whether to modify the integrity security protection status of the first DRB according to whether the integrity security protection of the first DRB is activated.
示例性地,在第一DRB的完整性安全保护激活或开启的情况下,网络设备确定无需释放所述会话和/或第一DRB。Exemplarily, when the integrity security protection of the first DRB is activated or turned on, the network device determines that there is no need to release the session and/or the first DRB.
示例性地,在第一DRB的完整性安全保护未激活或未开启的情况下,网络设备确定释放所述会话和/或第一DRB。Exemplarily, when the integrity security protection of the first DRB is not activated or turned on, the network device determines to release the session and/or the first DRB.
示例性地,在第一DRB的完整性安全保护激活或开启的情况下,网络设备确定无需修改所述会话和/或第一DRB的完整性安全保护状态,即此时所述会话和/或第一DRB的完整性安全保护状态为激活态。Exemplarily, when the integrity security protection of the first DRB is activated or turned on, the network device determines that there is no need to modify the integrity security protection status of the session and/or the first DRB, that is, at this time the integrity security protection status of the session and/or the first DRB is activated.
示例性地,在第一DRB激活完整性安全保护未激活或未开启的情况下,网络设备确定修改所述会话和/或第一DRB的完整性安全保护状态,即从未激活态修改为激活态。Exemplarily, when the integrity security protection activated by the first DRB is not activated or turned on, the network device determines to modify the integrity security protection state of the session and/or the first DRB, that is, to change it from an inactivated state to an activated state.
其中,第一链路是网络设备与核心网之间的链路,例如,第一链路可以是馈线链路,第一链路断开的触发条件可以参考上述方法500的步骤S511相关描述,这里不再说明。Among them, the first link is a link between the network device and the core network. For example, the first link may be a feeder link. The triggering condition for disconnection of the first link may refer to the relevant description of step S511 of the above method 500 and will not be described here.
可选地,在第一链路断开的情况下,网络设备根据第一完整性安全保护指示信息确定是否释放第一DRB,或者,网络设备根据第一完整性安全保护指示信息确定是否修改第一DRB的完整性安全保护状态。Optionally, when the first link is disconnected, the network device determines whether to release the first DRB based on the first integrity security protection indication information, or the network device determines whether to modify the integrity security protection status of the first DRB based on the first integrity security protection indication information.
换句话说,在第一链路断开的情况下,网络设备根据第一完整性安全保护指示信息确定是否释放所述第一DRB,或者,网络设备根据第一完整性安全保护指示信息确定是否修改所述第一DRB的完整性安全保护状态。In other words, when the first link is disconnected, the network device determines whether to release the first DRB based on the first integrity security protection indication information, or the network device determines whether to modify the integrity security protection status of the first DRB based on the first integrity security protection indication information.
示例性地,在第一完整性安全保护指示信息指示不激活或不开启第一DRB的完整性安全保护的情况下,网络设备确定释放所述会话和/或第一DRB。Exemplarily, when the first integrity security protection indication information indicates that the integrity security protection of the first DRB is not activated or turned on, the network device determines to release the session and/or the first DRB.
示例性地,在第一完整性安全保护指示信息指示激活或开启第一DRB的完整性安全保护的情况下,网络设备确定不释放所述会话和/或第一DRB。Exemplarily, when the first integrity security protection indication information indicates to activate or turn on the integrity security protection of the first DRB, the network device determines not to release the session and/or the first DRB.
示例性地,在第一完整性安全保护指示信息指示不激活或不开启第一DRB的完整性安全保护的情况下,网络设备确定修改所述会话和/或第一DRB的完整性安全保护状态为激活态。Exemplarily, when the first integrity security protection indication information indicates that the integrity security protection of the first DRB is not activated or turned on, the network device determines to modify the integrity security protection state of the session and/or the first DRB to an activated state.
示例性地,在第一完整性安全保护指示信息指示激活或开启第一DRB的完整性安全保护的情况下,网络设备确定保持所述会话和/或第一DRB的完整性安全保护状态为激活态。Exemplarily, when the first integrity security protection indication information indicates to activate or turn on the integrity security protection of the first DRB, the network device determines to keep the integrity security protection state of the session and/or the first DRB as activated.
针对上述网络设备释放未激活或可选激活完整性安全保护的会话和/或第一DRB,或者,网络设备修改所述会话和/或第一DRB的完整性安全保护状态为激活态,对应的触发条件可以包括以下一项或多项:For the above-mentioned network device, releasing the session and/or the first DRB for which integrity security protection is not activated or optionally activated, or the network device modifies the integrity security protection state of the session and/or the first DRB to an activated state, the corresponding triggering conditions may include one or more of the following:
(1)网络设备支持存储转发操作,且馈线链路断开;(1) The network equipment supports store-and-forward operations and the feeder link is disconnected;
(2)网络设备开启存储转发操作,且馈线链路断开。(2) The network device starts the store-and-forward operation and the feeder link is disconnected.
(3)网络设备的负载大于第一阈值,第一阈值可以是预定义的,例如协议定义,或者,第一阈值可以是配置或预配置的,本申请对此不作限定。(3) The load of the network device is greater than a first threshold. The first threshold may be predefined, such as a protocol definition, or the first threshold may be configured or preconfigured, which is not limited in the present application.
(4)卫星基站获取的用户面完整性安全策略的取值为preferred。(4) The value of the user plane integrity security policy obtained by the satellite base station is preferred.
可选地,网络设备可以存储所述会话和/或第一DRB的标识;和/或,记录所述会话和/或第一DRB在修改前的完整性安全保护状态为未激活态,用于后续有针对性地恢复所述会话和/或第一DRB及其修改前的完整性安全保护状态。Optionally, the network device may store the identifier of the session and/or the first DRB; and/or record that the integrity security protection state of the session and/or the first DRB before modification is in an inactivated state, for subsequent targeted restoration of the session and/or the first DRB and its integrity security protection state before modification.
可选地,本申请对存储会话和/或第一DRB的标识;和/或,记录所述会话和/或第一DRB在修改前的完整性安全保护状态为未激活态的时机不作限定,例如,网络设备可以在向终端设备发送第一消息之后,即在步骤S640之后,和/或,网络设备可以在向终端设备发送第二消息之前,具体实现方式可参考下列步骤S660的相关描述,这里先不做说明。Optionally, the present application does not limit the storage of the identifier of the session and/or the first DRB; and/or, the timing of recording the inactive integrity security protection state of the session and/or the first DRB before modification. For example, the network device may do so after sending the first message to the terminal device, that is, after step S640, and/or, the network device may do so before sending the second message to the terminal device. The specific implementation method may refer to the relevant description of the following step S660, which will not be explained here.
S640,网络设备向终端设备发送第一消息,对应的,终端设备接收来自网络设备的第一消息。S640, the network device sends a first message to the terminal device, and correspondingly, the terminal device receives the first message from the network device.
其中,第一消息用于指示所述会话和/或第一DRB的释放结果或修改结果。可选地,该第一消息可以是RRC重配置消息,例如RRC Reconfiguration消息。The first message is used to indicate the release result or modification result of the session and/or the first DRB. Optionally, the first message may be an RRC reconfiguration message, such as an RRC Reconfiguration message.
示例性地,在第一完整性安全保护指示信息指示第一DRB不激活完整性安全保护的情况下,释放结果指示释放所述会话和/或第一DRB。Exemplarily, when the first integrity security protection indication information indicates that the first DRB does not activate integrity security protection, the release result indicates the release of the session and/or the first DRB.
示例性地,在第一完整性安全保护指示信息指示第一DRB激活完整性安全保护的情况下,释放结果指示不释放所述会话和/或第一DRB。Exemplarily, when the first integrity security protection indication information indicates that the first DRB activates integrity security protection, the release result indicates that the session and/or the first DRB will not be released.
示例性地,在第一完整性安全保护指示信息指示第一DRB不激活完整性安全保护的情况下,修改结果指示修改所述会话和/或第一DRB的完整性安全保护状态为激活态。Exemplarily, when the first integrity security protection indication information indicates that integrity security protection is not activated for the first DRB, the modification result indicates that the integrity security protection state of the session and/or the first DRB is modified to an activated state.
示例性地,在第一完整性安全保护指示信息指示第一DRB激活完整性安全保护的情况下,修改结果指示保持第一DRB的完整性安全保护状态为激活态。Exemplarily, when the first integrity security protection indication information indicates that the integrity security protection of the first DRB is activated, the modification result indicates that the integrity security protection state of the first DRB is kept activated.
S650,终端设备对第一消息进行完整性检验。S650: The terminal device performs an integrity check on the first message.
示例性地,终端设备可以通过比较MAC值判断完整性校验是否通过,具体实现方式可参考上述方法300的相关描述,这里不再说明。Exemplarily, the terminal device may determine whether the integrity check passes by comparing the MAC value. The specific implementation method may refer to the relevant description of the above method 300 and will not be described again here.
S660,在完整性检验通过的情况下,终端设备根据释放结果确定是否释放第一DRB,或者,根据修改结果确定是否修改第一DRB的完整性安全保护状态。S660: When the integrity check passes, the terminal device determines whether to release the first DRB based on the release result, or determines whether to modify the integrity security protection status of the first DRB based on the modification result.
也就是说,终端设备在接收第一消息之后,当第一消息的完整性校验通过,则终端设备可以进一步确定是否释放所述会话和/或第一DRB,或者是否修改所述会话和/或第一DRB的完整性安全保护状态。That is to say, after the terminal device receives the first message, when the integrity check of the first message passes, the terminal device can further determine whether to release the session and/or the first DRB, or whether to modify the integrity security protection status of the session and/or the first DRB.
例如,第一消息指示释放第一DRB,则终端设备释放所述会话和/或第一DRB,后续终端设备无法通过所述会话和/或第一DRB发送上行数据,以及无法通过所述会话和/或第一DRB接收下行数据;再例如,第一消息指示不释放第一DRB,则终端设备不释放所述会话和/或第一DRB,后续终端设备依旧可以通过所述会话和/或第一DRB发送上行数据,以及通过所述会话和/或第一DRB接收下行数据。同时,所述会话和/或第一DRB是否开启完整性安全保护取决于用户面完整性安全策略,具体实现方式可参考上述方法300的相关描述。For example, if the first message indicates to release the first DRB, the terminal device releases the session and/or the first DRB, and the terminal device cannot subsequently send uplink data through the session and/or the first DRB, and cannot receive downlink data through the session and/or the first DRB; for another example, if the first message indicates not to release the first DRB, the terminal device does not release the session and/or the first DRB, and the terminal device can subsequently still send uplink data through the session and/or the first DRB, and receive downlink data through the session and/or the first DRB. At the same time, whether integrity security protection is enabled for the session and/or the first DRB depends on the user plane integrity security policy, and the specific implementation method can refer to the relevant description of the above method 300.
例如,第一消息指示修改第一DRB的完整性安全保护状态为激活态,则终端设备修改所述会话和/或第一DRB的完整性安全保护状态为激活态;再例如,第一消息指示保持第一DRB的完整性安全保护状态为激活态,则终端设备无需修改所述会话和/或第一DRB的完整性安全保护状态。后续终端设备可以通过所述会话和/或第一DRB发送上行数据,以及通过所述会话和/或第一DRB接收下行数据,需要注意的是,所述第一DRB上承载的上下行数据是经过完整性安全保护的,且需要进行完整性校验。For example, if the first message indicates to modify the integrity security protection state of the first DRB to an activated state, the terminal device modifies the integrity security protection state of the session and/or the first DRB to an activated state; for another example, if the first message indicates to keep the integrity security protection state of the first DRB activated, the terminal device does not need to modify the integrity security protection state of the session and/or the first DRB. The terminal device can subsequently send uplink data through the session and/or the first DRB, and receive downlink data through the session and/or the first DRB. It should be noted that the uplink and downlink data carried on the first DRB are integrity security protected and need to be integrity checked.
可选地,在完整性验证通过的情况下,终端设备可以重配置所述第一DRB的PDCP实体。示例性地,如果第一消息指示释放第一DRB,则终端设备删除所述第一DRB的PDCP实体,包括删除所述第一DRB的完整性安全保护密钥和完整性安全保护算法;如果第一消息指示修改第一DRB的完整性安全保护状态为激活态,则终端设备在所述第一DRB对应的PDCP实体中配置完整性安全保护密钥和完整性安全保护算法,也就意味着需要激活所述第一DRB承载的上行用户面消息和/或数据的完整性安全保护,以及激活所述第一DRB承载的下行用户面消息和/或数据的完整性校验。Optionally, if the integrity verification passes, the terminal device can reconfigure the PDCP entity of the first DRB. Exemplarily, if the first message indicates the release of the first DRB, the terminal device deletes the PDCP entity of the first DRB, including deleting the integrity security protection key and integrity security protection algorithm of the first DRB; if the first message indicates to modify the integrity security protection state of the first DRB to an activated state, the terminal device configures the integrity security protection key and integrity security protection algorithm in the PDCP entity corresponding to the first DRB, which means that it is necessary to activate the integrity security protection of the uplink user plane messages and/or data carried by the first DRB, and activate the integrity check of the downlink user plane messages and/or data carried by the first DRB.
可选地,终端设备可以向网络设备发送响应消息#1,用于指示终端设备成功释放第一DRB,或者,用于指示终端设备成功修改第一DRB的完整性安全保护状态为激活态。可选地,如果上述步骤S640的第一消息携带在RRC重配置消息,则终端设备可以向网络设备发送RRC重配置完成消息。如果终端设备未成功释放第一DRB,或者,终端设备未成功修改第一DRB的完整性安全保护状态为激活态,则终端设备可以向网络设备发送响应消息#2,可选地,该响应消息#2中可以携带失败原因值,例如失败原因值可以用于指示第一完整性安全保护指示信息校验失败等。Optionally, the terminal device may send a response message #1 to the network device, indicating that the terminal device has successfully released the first DRB, or indicating that the terminal device has successfully modified the integrity security protection state of the first DRB to an activated state. Optionally, if the first message of the above step S640 is carried in an RRC reconfiguration message, the terminal device may send an RRC reconfiguration completion message to the network device. If the terminal device fails to successfully release the first DRB, or the terminal device fails to successfully modify the integrity security protection state of the first DRB to an activated state, the terminal device may send a response message #2 to the network device. Optionally, the response message #2 may carry a failure cause value, for example, the failure cause value may be used to indicate that the verification of the first integrity security protection indication information has failed, etc.
可选地,针对网络设备和地面核心网之间的连接断开的场景,网络设备对接收的上行消息和/或数据进行完整性校验,并且在完整性校验通过的情况下存储该上行数据,在完整性检验不通过的情况下,不存储该上行数据或丢弃该上行数据,能够保证网络通信安全,同时降低被DoS攻击的风险,具体实现方式可参考下列方法700或800的相关描述,这里先不做说明。Optionally, in the scenario where the connection between the network device and the ground core network is disconnected, the network device performs an integrity check on the received uplink message and/or data, and stores the uplink data if the integrity check passes, and does not store the uplink data or discards the uplink data if the integrity check fails. This ensures the security of network communications while reducing the risk of DoS attacks. For the specific implementation method, please refer to the relevant description of the following method 700 or 800, which will not be explained here.
可选地,在一种实现方式中,在第一链路恢复连接的情况下,网络设备可以向终端设备发送第二消息,该第二消息用于指示建立第二DRB,第二消息包括第二完整性安全保护指示信息,第二完整性安全保护指示信息用于指示第二DRB不激活完整性安全保护,第二DRB用于承载终端设备与网络设备之间的数据。Optionally, in one implementation, when the first link resumes connection, the network device may send a second message to the terminal device, where the second message is used to indicate establishment of a second DRB, and the second message includes second integrity security protection indication information, where the second integrity security protection indication information is used to indicate that the second DRB does not activate integrity security protection, and the second DRB is used to carry data between the terminal device and the network device.
可选地,该第二DRB可以是终端设备与网络设备之间重新建立的DRB,也可以是上述步骤S630确定的被释放的第一DRB,或者完整性安全保护状态修改为激活态的第一DRB,本申请对此不作限定,该实现方式为便于后续终端设备与网络设备之间的正常通信。Optionally, the second DRB can be a DRB re-established between the terminal device and the network device, or it can be the first DRB released as determined in the above step S630, or the first DRB whose integrity security protection state is modified to an activated state. This application does not limit this. This implementation method is to facilitate subsequent normal communication between the terminal device and the network device.
可选地,所述第二消息包括第一DRB的标识,和/或,所述第二完整性安全保护指示信息根据所述第一DRB在修改前的完整性安全保护状态为未激活态确定。也就是说,网络设备可以根据上述步骤S630中记录的第一DRB在修改前的完整性安全保护状态为未激活态,进而确定重新建立的第二DRB的完整性安全保护不激活或不开启。可选地,网络设备也可以根据会话的用户面完整性安全策略确定不激活或不开启第二DRB的完整性安全保护,本申请对此不作限定。Optionally, the second message includes an identifier of the first DRB, and/or the second integrity security protection indication information is determined based on the fact that the integrity security protection state of the first DRB before modification is in an inactivated state. That is, the network device may determine that the integrity security protection of the re-established second DRB is inactivated or not enabled based on the fact that the integrity security protection state of the first DRB before modification recorded in the above step S630 is inactivated. Optionally, the network device may also determine not to activate or enable the integrity security protection of the second DRB based on the user plane integrity security policy of the session, which is not limited in the present application.
需要说明的是,以上方法600中以用户面完整性安全保护、用户面完整性安全策略、或完整性校验等为例进行说明,仅是为便于理解给出的示例,不构成对本申请技术方案的限定。可选地,本申请技术方案同样适用于用户面机密性安全保护、用户面机密性安全策略、或解密操作等,具体实现方式可参考上述相关描述,这里不再说明。It should be noted that the above method 600 is described by taking user plane integrity security protection, user plane integrity security policy, or integrity verification as an example, which is only an example given for ease of understanding and does not constitute a limitation on the technical solution of the present application. Optionally, the technical solution of the present application is also applicable to user plane confidentiality security protection, user plane confidentiality security policy, or decryption operation, etc. The specific implementation method can refer to the above related description, which will not be described here.
基于上述提供的方案,网络设备基于用户面完整性安全策略确定是否释放第一DRB,或者修改第一DRB的完整性安全保护状态为激活态,使得网络设备后续接收的用户面数据都是经过完整性安全保护的,便于在馈线链路断开的场景下,卫星基站只存储完整性校验通过的用户面数据,能够缓解潜在的DoS风险,保障网络通信安全。Based on the solution provided above, the network device determines whether to release the first DRB based on the user plane integrity security policy, or modifies the integrity security protection state of the first DRB to an activated state, so that the user plane data subsequently received by the network device is all protected by integrity security. In the scenario where the feeder link is disconnected, the satellite base station only stores user plane data that has passed the integrity check, which can alleviate potential DoS risks and ensure network communication security.
图7是本申请实施例提供的通信方法700的流程示意图。如图7所示,以终端设备为UE、核心网网元为AMF、SMF为执行主体进行交互,该方法可以看作是上述方法600的进一步细化,主要针对卫星基站和UE释放未激活完整性安全保护的会话和/或DRB进行说明。应理解,图7所示的实施例与图6所示的实施例可以彼此耦合,且可以互为参考,因此上述方法600中的相关描述同样适用于该实现方式,二者之间可以存在相同或类似的技术手段,与图6所示的实施例中已描述的内容不再赘述。该方法包括如下多个步骤,未详尽说明的部分可参考上述方法600或现有协议。Figure 7 is a flow chart of a communication method 700 provided in an embodiment of the present application. As shown in Figure 7, the terminal device is UE, the core network element is AMF, and SMF is the execution subject for interaction. This method can be regarded as a further refinement of the above-mentioned method 600, and is mainly explained for the satellite base station and UE to release sessions and/or DRBs that do not activate integrity security protection. It should be understood that the embodiment shown in Figure 7 and the embodiment shown in Figure 6 can be coupled to each other and can be used as references to each other. Therefore, the relevant descriptions in the above-mentioned method 600 are also applicable to this implementation method. The same or similar technical means may exist between the two, and the contents described in the embodiment shown in Figure 6 will not be repeated. The method includes the following multiple steps, and the parts that are not fully described can refer to the above-mentioned method 600 or the existing protocol.
S701,UE1和UE2注册到网络。S701, UE1 and UE2 register with the network.
可选地,本申请实施例对注册到同一网络的UE的数量不作限定。为便于描述,该实现方式以两个UE(例如,UE1和UE2)注册到网络、建立会话、确定是否激活或不激活所述会话的用户面完整性安全保护为例进行说明。其中,UE1和UE2的建立会话的流程,以及激活或不激活所述会话的用户面完整性安全保护的具体实现方式类似,以下重复部分不再赘述。Optionally, the embodiment of the present application does not limit the number of UEs registered to the same network. For ease of description, this implementation is described by taking two UEs (e.g., UE1 and UE2) registering to the network, establishing a session, and determining whether to activate or not activate the user plane integrity security protection of the session as an example. Among them, the process of establishing a session between UE1 and UE2, and the specific implementation method of activating or not activating the user plane integrity security protection of the session are similar, and the following repeated parts will not be repeated.
S702,UE1向AMF发送会话建立请求消息,对应的,AMF接收来自UE1的会话建立请求消息。S702, UE1 sends a session establishment request message to AMF, and correspondingly, AMF receives the session establishment request message from UE1.
S703,AMF向SMF发送会话创建上下文请求消息,对应的,SMF接收来自AMF的会话创建上下文请求消息。S703, AMF sends a session creation context request message to SMF, and correspondingly, SMF receives the session creation context request message from AMF.
S704,SMF向AMF发送会话创建上下文响应消息,对应的,AMF接收来自SMF的会话创建上下文响应消息。S704, SMF sends a session creation context response message to AMF, and correspondingly, AMF receives a session creation context response message from SMF.
S705,AMF向卫星基站发送会话资源建立请求消息,对应的,卫星基站接收来自AMF的会话资源建立请求消息。S705, AMF sends a session resource establishment request message to the satellite base station, and correspondingly, the satellite base station receives the session resource establishment request message from AMF.
S706,卫星基站向UE1发送RRC重配置消息#1,对应的,UE1接收来自卫星基站的RRC重配置消息#1。S706, the satellite base station sends an RRC reconfiguration message #1 to UE1, and correspondingly, UE1 receives the RRC reconfiguration message #1 from the satellite base station.
S707,UE1对RRC重配置消息#1进行完整性校验。S707, UE1 performs integrity check on RRC reconfiguration message #1.
S708,UE1向卫星基站发送RRC重配置完成消息#1,对应的,卫星基站接收来自UE1的RRC重配置完成消息#1。S708, UE1 sends an RRC reconfiguration completion message #1 to the satellite base station, and correspondingly, the satellite base station receives the RRC reconfiguration completion message #1 from UE1.
S709,卫星基站向AMF发送会话资源建立响应消息,对应的,AMF接收来自卫星基站的会话资源建立响应消息。S709, the satellite base station sends a session resource establishment response message to the AMF, and correspondingly, the AMF receives a session resource establishment response message from the satellite base station.
其中,上述步骤S701至S709的具体实现方式可参考上述方法300的相关描述。The specific implementation of the above steps S701 to S709 may refer to the relevant description of the above method 300.
以下步骤是针对馈线链路断开后,卫星基站通过释放与UE2之间的无完整性安全保护的会话和/或DRB,缓解潜在的DoS风险,并降低UE2和卫星基站的处理负载。另外,在馈线链路重新恢复连接后,卫星基站触发增加先前释放的无完整性安全保护的会话和/或DRB,保证UE2与卫星基站的通信连接。The following steps are for the satellite base station to release the session and/or DRB without integrity security protection between UE2 and the satellite base station after the feeder link is disconnected, thereby alleviating the potential DoS risk and reducing the processing load of UE2 and the satellite base station. In addition, after the feeder link is restored, the satellite base station triggers the addition of the previously released session and/or DRB without integrity security protection to ensure the communication connection between UE2 and the satellite base station.
S710,卫星基站和地面核心网之间的连接断开,如馈线链路断开,其中,馈线链路断开的触发条件可参考上述方法500的步骤S511的相关描述。S710, the connection between the satellite base station and the ground core network is disconnected, such as the feeder link is disconnected, wherein the triggering condition of the feeder link disconnection can refer to the relevant description of step S511 of the above method 500.
S711,卫星基站释放未激活完整性安全保护的会话和/或DRB。S711, the satellite base station releases the session and/or DRB for which integrity security protection is not activated.
应理解,未激活完整性安全保护的会话和/或DRB是指:所述会话和/或DRB的完整性安全保护未开启,或者说,承载在所述会话和/或DRB上的用户面数据未经过安全保护,且无需进行完整性校验。It should be understood that a session and/or DRB for which integrity security protection is not activated means that the integrity security protection of the session and/or DRB is not turned on, or in other words, the user plane data carried on the session and/or DRB is not security protected and no integrity check is required.
其中,卫星基站释放未激活完整性安全保护的会话和/或DRB的触发条件可以参考上述方法600的相关描述,这里不再说明。Among them, the triggering conditions for the satellite base station to release the session and/or DRB for which integrity security protection is not activated can refer to the relevant description of the above-mentioned method 600 and will not be explained here.
示例性地,卫星基站可以根据步骤S705中接收的用户面完整性安全策略,确定需要释放的会话和/或DRB。例如,用户面完整性安全策略指示UE1与卫星基站之间的会话#1(或所述会话对应的一个或多个DRB#1)开启完整性安全保护,则卫星基站不释放所述会话#1或所述一个或多个DRB#1;再例如,用户面完整性安全策略指示UE2与卫星基站之间的会话#2(或所述会话对应的一个或多个DRB#2)不开启或可选开启完整性安全保护,则卫星基站释放所述会话#2或所述一个或多个DRB#2。Exemplarily, the satellite base station may determine the session and/or DRB that needs to be released according to the user plane integrity security policy received in step S705. For example, if the user plane integrity security policy indicates that integrity security protection is enabled for session #1 (or one or more DRB #1s corresponding to the session) between UE1 and the satellite base station, the satellite base station does not release the session #1 or the one or more DRB #1s; for another example, if the user plane integrity security policy indicates that integrity security protection is not enabled or can be optionally enabled for session #2 (or one or more DRB #2s corresponding to the session) between UE2 and the satellite base station, the satellite base station releases the session #2 or the one or more DRB #2s.
进一步的,卫星基站在确定需要释放的一个或多个DRB#2之后,可以释放所述一个或多个DRB#2对应的PDCP实体。也就是说,卫星基站后续接收的所有上行数据都是经过完整性安全保护的,例如通过一个或多个DRB#1接收的上行数据,因此也就需要对所有接收的上行数据进行完整性检验。Furthermore, after determining that one or more DRB#2s need to be released, the satellite base station can release the PDCP entities corresponding to the one or more DRB#2s. In other words, all uplink data subsequently received by the satellite base station are integrity-secured, such as uplink data received through one or more DRB#1s, so it is necessary to perform integrity checks on all received uplink data.
S712,卫星基站向UE2发送RRC重配置消息#2,对应的,UE2接收来自卫星基站的RRC重配置消息#2。S712, the satellite base station sends an RRC reconfiguration message #2 to UE2, and correspondingly, UE2 receives the RRC reconfiguration message #2 from the satellite base station.
在一种示例中,RRC重配置消息#2中包括会话ID和/或DRB ID,例如,用于标识上述步骤S711中未激活完整性安全保护的所述会话#2或所述一个或多个DRB#2。例如,该RRC重配置消息#2中可以携带drb-ToReleaseList信元,所述信元中包括未激活完整性安全保护的DRB ID,例如DRB#2ID。In one example, the RRC reconfiguration message #2 includes a session ID and/or a DRB ID, for example, for identifying the session #2 or the one or more DRB #2s for which integrity security protection is not activated in the above step S711. For example, the RRC reconfiguration message #2 may carry a drb-ToReleaseList information element, which includes a DRB ID for which integrity security protection is not activated, for example, DRB #2 ID.
应理解,在释放所述会话#2或所述一个或多个DRB#2之前,所述会话#2或所述一个或多个DRB#2的完整性安全保护激活状态为未激活态,或者说,所述会话#2或所述一个或多个DRB#2的完整性安全保护未开启,说明了承载在所述会话#2或所述一个或多个DRB#2上的用户面数据未经过完整性安全保护,且无需进行完整性校验。It should be understood that before releasing the session #2 or the one or more DRB #2s, the integrity security protection activation state of the session #2 or the one or more DRB #2s is in an inactive state, or in other words, the integrity security protection of the session #2 or the one or more DRB #2s is not enabled, indicating that the user plane data carried on the session #2 or the one or more DRB #2s has not been integrity-secured and no integrity check is required.
可选地,卫星基站存储已经释放的所述会话#2ID和/或DRB#2ID。可选地,所述存储的会话#2ID和/或DRB#2ID可以用于后续步骤S720中恢复会话#2和/或DRB#2。Optionally, the satellite base station stores the released Session#2ID and/or DRB#2ID. Optionally, the stored Session#2ID and/or DRB#2ID can be used to restore Session#2 and/or DRB#2 in the subsequent step S720.
S713,UE2释放未激活完整性安全保护的会话和/或DRB。S713, UE2 releases the session and/or DRB for which integrity security protection is not activated.
在一种示例中,UE根据所述会话#2ID和/或DRB#2ID释放对应的会话#2和/或DRB#2。例如,UE2释放所述DRB#2对应的PDCP实体。也就是说,UE2无法与卫星基站通过该会话#2和/或DRB#2传输用户面数据。In one example, the UE releases the corresponding session #2 and/or DRB #2 according to the session #2ID and/or DRB #2ID. For example, UE2 releases the PDCP entity corresponding to DRB #2. That is, UE2 cannot transmit user plane data with the satellite base station through the session #2 and/or DRB #2.
需要说明的是,由于在释放会话#2和/或DRB#2之前,会话#2和/或DRB#2的用户面完整性安全保护未开启,所以上述步骤S712中的RRC重配置消息#2无需经过完整性安全保护,对应的,UE2也就无需对RRC重配置消息#2进行完整性校验。It should be noted that since the user plane integrity security protection of session #2 and/or DRB #2 is not enabled before releasing session #2 and/or DRB #2, the RRC reconfiguration message #2 in the above step S712 does not need to undergo integrity security protection. Correspondingly, UE2 does not need to perform integrity check on RRC reconfiguration message #2.
S714,UE2向卫星基站发送RRC重配置完成消息#2,对应的,卫星基站接收来自UE的RRC重配置完成消息#2。S714, UE2 sends an RRC reconfiguration completion message #2 to the satellite base station, and correspondingly, the satellite base station receives the RRC reconfiguration completion message #2 from the UE.
示例性地,RRC重配置完成消息#2用于指示UE2已经释放会话#2和/或DRB#2。Exemplarily, RRC reconfiguration complete message #2 is used to indicate that UE2 has released session #2 and/or DRB #2.
S715,UE1向卫星基站发送上行数据,对应的,卫星基站接收来自UE1的上行数据。S715, UE1 sends uplink data to the satellite base station, and correspondingly, the satellite base station receives the uplink data from UE1.
需要说明的是,由于UE1与卫星基站之间的会话#1或DRB#1开启完整性安全保护,则UE1在发送上行数据之前,需要对该上行数据进行完整性安全保护,具体实现方式可参考上述方法300的相关描述。It should be noted that since integrity security protection is enabled for session #1 or DRB #1 between UE1 and the satellite base station, UE1 needs to perform integrity security protection on the uplink data before sending the uplink data. For the specific implementation method, please refer to the relevant description of the above method 300.
S716,卫星基站对上行数据进行完整性校验。S716, the satellite base station performs integrity check on the uplink data.
示例性地,卫星基站对上行数据进行完整性校验的触发条件包括以下一项或多项:Exemplarily, the triggering conditions for the satellite base station to perform integrity check on uplink data include one or more of the following:
(1)卫星基站支持存储转发操作,且馈线链路断开;(1) The satellite base station supports store-and-forward operation and the feeder link is disconnected;
(2)卫星基站开启存储转发操作,且馈线链路断开。(2) The satellite base station starts the store-and-forward operation and the feeder link is disconnected.
(3)卫星基站的负载大于第一阈值,第一阈值可以是预定义的,例如协议定义,或者,第一阈值可以是配置或预配置的,本申请对此不作限定;(3) The load of the satellite base station is greater than a first threshold value, where the first threshold value may be predefined, such as a protocol definition, or the first threshold value may be configured or preconfigured, which is not limited in the present application;
(4)卫星基站接收的完整性安全策略的取值为“preferred”。(4) The value of the integrity security policy received by the satellite base station is "preferred".
需要说明的是,基于上述步骤S711和S713,卫星基站和UE已经释放未激活完整性安全保护的会话和/或DRB,说明UE发送的上行数据是经过完整性安全保护的,也就说明卫星基站需要对上述步骤S715中接收所有的上行数据进行完整性检验,具体完整性校验的实现方式可参考上述方法300的相关描述,这里不再赘述。It should be noted that, based on the above steps S711 and S713, the satellite base station and the UE have released the session and/or DRB for which integrity security protection has not been activated, indicating that the uplink data sent by the UE is integrity security protected, which means that the satellite base station needs to perform integrity check on all uplink data received in the above step S715. For the specific implementation method of the integrity check, please refer to the relevant description of the above method 300, which will not be repeated here.
S717,卫星基站根据校验结果确定是否存储上行数据。S717, the satellite base station determines whether to store the uplink data according to the verification result.
其中,校验结果包括校验成功(通过),或者,校验失败(不通过)。应理解,卫星基站存储完整性校验通过的上行数据,丢弃完整性安全保护校验失败的上行数据。The verification result includes verification success (pass), or verification failure (failure). It should be understood that the satellite base station stores the uplink data that passes the integrity verification and discards the uplink data that fails the integrity security protection verification.
S718,卫星基站和地面核心网之间的连接恢复,如馈线链路恢复。S718, the connection between the satellite base station and the ground core network is restored, such as the feeder link is restored.
其中,馈线链路恢复的触发条件包括以下一项或多项:The triggering conditions for feeder link recovery include one or more of the following:
(1)卫星基站飞行到靠近地面关口站的一侧,即地面关口站能够接收到卫星基站发射的信号;(1) The satellite base station flies to the side close to the ground gateway station, that is, the ground gateway station can receive the signal transmitted by the satellite base station;
(2)卫星基站和地面关口站之间的通信条件较好。(2) The communication conditions between the satellite base station and the ground gateway station are good.
S719,卫星基站向UE2发送RRC重配置消息#3,对应的,UE2接收来自卫星基站的RRC重配置消息#3。S719, the satellite base station sends an RRC reconfiguration message #3 to UE2, and correspondingly, UE2 receives the RRC reconfiguration message #3 from the satellite base station.
示例性地,RRC重配置消息#3用于指示UE2增加(或重新建立)会话#3和/或DRB#3,所述会话#3和/或DRB#3用于UE2和卫星基站之间传输数据。可选地,会话#3和/或DRB#3可以与上述释放的会话#2和/或DRB#2相同,也可以不同,本申请对此不作限定。例如,RRC重配置消息#3中携带drb-ToAddModList信元,所述信元中包括会话#3ID和/或DRB#3ID及其对应的完整性安全保护指示。Exemplarily, RRC reconfiguration message #3 is used to instruct UE2 to add (or reestablish) session #3 and/or DRB #3, and the session #3 and/or DRB #3 are used to transmit data between UE2 and the satellite base station. Optionally, session #3 and/or DRB #3 may be the same as or different from the above-mentioned released session #2 and/or DRB #2, and this application does not limit this. For example, RRC reconfiguration message #3 carries a drb-ToAddModList information element, which includes session #3ID and/or DRB #3ID and its corresponding integrity security protection indication.
可选地,DRB#3ID可以为上述步骤S712中卫星基站存储的已经释放的DRB ID(例如DRB#2ID),此时该RRC重配置消息#3用于指示UE2重新建立先前释放的会话#2和/或DRB#2,且根据RRC重配置消息#3中携带的完整性安全保护指示,不开启所述会话#2和/或DRB#2的完整性安全保护。Optionally, DRB#3ID can be the released DRB ID (for example, DRB#2ID) stored by the satellite base station in the above step S712. At this time, the RRC reconfiguration message #3 is used to instruct UE2 to re-establish the previously released session #2 and/or DRB#2, and according to the integrity security protection indication carried in the RRC reconfiguration message #3, the integrity security protection of the session #2 and/or DRB#2 is not enabled.
示例性地,卫星基站发送RRC重配置消息#3的触发条件包括以下一项或多项:Exemplarily, the triggering condition for the satellite base station to send the RRC reconfiguration message #3 includes one or more of the following:
(1)馈线链路恢复;(1) Feeder link restoration;
(2)卫星基站的自身负载低于第二阈值,第二阈值可以是预定义的,例如协议定义,或者,第二阈值可以是配置或预配置的。(2) The load of the satellite base station itself is lower than a second threshold. The second threshold may be predefined, such as defined by a protocol, or the second threshold may be configured or preconfigured.
可选地,第二阈值与上述步骤S716中的第一阈值可以相同,也可以不相同,本申请对此不作限定。Optionally, the second threshold may be the same as or different from the first threshold in the above step S716, and this application does not limit this.
S720,UE2根据会话ID和/或DRB ID建立会话和/或DRB。S720, UE2 establishes a session and/or DRB based on the session ID and/or DRB ID.
示例性地,UE2根据会话#3ID重新建立会话#3,并根据该会话#3对应的完整性安全保护指示,确定所述会话#3的完整性安全保护为不开启;或者说,UE2根据DRB#3ID重新建立DRB#3,并根据该DRB#3对应的完整性安全保护指示,确定所述DRB#3的完整性安全保护为不开启,即UE2配置该DRB#3对应的PDCP实体,由于该DRB#3的完整性安全保护不激活,所以UE2无需在PDCP实体配置完整性安全保护密钥和完整性安全保护算法。Exemplarily, UE2 re-establishes session #3 according to session #3ID, and determines that the integrity security protection of session #3 is not enabled according to the integrity security protection indication corresponding to session #3; in other words, UE2 re-establishes DRB #3 according to DRB #3ID, and determines that the integrity security protection of DRB #3 is not enabled according to the integrity security protection indication corresponding to DRB #3, that is, UE2 configures the PDCP entity corresponding to DRB #3. Since the integrity security protection of DRB #3 is not activated, UE2 does not need to configure the integrity security protection key and integrity security protection algorithm in the PDCP entity.
需要说明的是,上述步骤S718-S720中针对馈线链路恢复的情况下,UE和卫星基站重新建立上述已经释放的未激活完整性安全保护的会话和/或DRB是可选操作,其中,卫星基站和UE是否重建所述会话和/或DRB取决于卫星基站策略,本申请对此不作限定。It should be noted that in the above steps S718-S720, in the case of feeder link recovery, it is an optional operation for the UE and the satellite base station to re-establish the above-mentioned released session and/or DRB with non-activated integrity security protection, wherein whether the satellite base station and the UE rebuild the session and/or DRB depends on the satellite base station policy, which is not limited in this application.
需要说明的是,上述示例中会话对应的一个或多个DRB的用户面完整性安全保护是否开启是一致的。可选地,会话对应的多个DRB的用户面完整性安全保护是否开启可以不同。例如,如果卫星基站与UE1之间建立的会话#a对应的完整性安全策略的取值为preferred,则说明该会话#a的完整性安全保护为可选开启,也就说明该会话#a对应的DRB#a和DRB#b的用户面完整性安全保护为可选开启,进一步的,卫星基站可以根据本地策略或自身负载情况确定开启DRB#a的用户面完整性安全保护,且不开启DRB#b的用户面完整性安全保护,也就是说,卫星基站确定需要释放DRB#b。进一步的,卫星基站可以通过RRC重配置消息通知UE1释放DRB#b,后续UE1和卫星基站可以通过DRB#a传输数据,且所述传输的数据是经过完整性安全保护的,所述DRB#b则无法用于UE1和卫星基站之间传输数据。进一步的,在馈线链路恢复的情况下,卫星基站可以指示UE1增加(或重新建立)DRB#c且所述DRB#c的用户面完整性安全保护不开启。可选地,该DRB#c与DRB#b可以相同,也可以不相同,具体实现方式可参考方法700的步骤S710至S714,以及步骤S718至S720的相关描述,为了简洁,此处不再赘述。It should be noted that in the above examples, whether the user plane integrity security protection of one or more DRBs corresponding to the session is enabled is consistent. Optionally, whether the user plane integrity security protection of multiple DRBs corresponding to the session is enabled may be different. For example, if the value of the integrity security policy corresponding to session #a established between the satellite base station and UE1 is preferred, it means that the integrity security protection of session #a is optionally enabled, which means that the user plane integrity security protection of DRB#a and DRB#b corresponding to session #a is optionally enabled. Further, the satellite base station can determine to enable the user plane integrity security protection of DRB#a according to local policies or its own load conditions, and not to enable the user plane integrity security protection of DRB#b, that is, the satellite base station determines that DRB#b needs to be released. Furthermore, the satellite base station can notify UE1 to release DRB#b through an RRC reconfiguration message, and subsequently UE1 and the satellite base station can transmit data through DRB#a, and the transmitted data is integrity security protected, and the DRB#b cannot be used to transmit data between UE1 and the satellite base station. Further, in the case where the feeder link is restored, the satellite base station can instruct UE1 to add (or re-establish) DRB#c and the user plane integrity security protection of the DRB#c is not enabled. Optionally, the DRB#c and DRB#b may be the same or different. For the specific implementation, please refer to steps S710 to S714 of method 700, and the relevant description of steps S718 to S720. For the sake of brevity, they will not be repeated here.
本申请提供的方案,在馈线链路断开的场景下,卫星基站通过释放无完整性安全保护的会话和/或DRB,使得卫星基站后续接收的上行数据都是经过完整性安全保护的,卫星基站也就避免了接收无完整性安全保护的上行数据,缓解了潜在的DoS风险,并且降低UE和卫星基站的处理负载。另外,在馈线链路重新恢复连接后,卫星基站触发新增无完整性安全保护的会话和/或DRB,保证UE与卫星基站的之间的正常通信。The solution provided by the present application is that in the scenario where the feeder link is disconnected, the satellite base station releases the session and/or DRB without integrity security protection, so that the uplink data subsequently received by the satellite base station is all integrity security protected. The satellite base station also avoids receiving uplink data without integrity security protection, alleviates the potential DoS risk, and reduces the processing load of the UE and the satellite base station. In addition, after the feeder link is restored, the satellite base station triggers a new session and/or DRB without integrity security protection to ensure normal communication between the UE and the satellite base station.
相比于上述图7所示的方案,下面结合图8,针对卫星基站和UE在馈线链路断开的情况下,卫星基站和UE将未激活完整性安全保护的会话和/或DRB的完整性安全保护状态修改为激活态,使得UE与卫星基站之间传输的上行数据都是经过安全保护的,避免潜在的DoS风险,同时保证UE与卫星基站之间的正常通信。Compared with the scheme shown in Figure 7 above, in combination with Figure 8 below, when the feeder link between the satellite base station and the UE is disconnected, the satellite base station and the UE will modify the integrity security protection status of the inactivated integrity security-protected session and/or the DRB to an activated state, so that the uplink data transmitted between the UE and the satellite base station are all securely protected, avoiding potential DoS risks while ensuring normal communication between the UE and the satellite base station.
图8是本申请实施例提供的通信方法800的流程示意图。如图8所示,以终端设备为UE、会话管理网元为SMF为执行主体进行交互,该方法可以看作是上述方法400的进一步细化,应理解,图8所示的实施例与图6所示的实施例可以彼此耦合,且可以互为参考,因此上述方法600中的相关描述同样适用于该实现方式,二者之间可以存在相同或类似的技术手段,与图6或图7所示的实施例中已描述的内容不再赘述。该方法包括如下多个步骤,未详尽说明的部分可参考上述方法600-700,或现有协议。Figure 8 is a flow chart of a communication method 800 provided in an embodiment of the present application. As shown in Figure 8, the terminal device is UE and the session management network element is SMF as the execution subject to interact. This method can be regarded as a further refinement of the above method 400. It should be understood that the embodiment shown in Figure 8 and the embodiment shown in Figure 6 can be coupled with each other and can refer to each other. Therefore, the relevant description in the above method 600 is also applicable to this implementation. There may be the same or similar technical means between the two, and the content described in the embodiment shown in Figure 6 or Figure 7 will not be repeated. The method includes the following multiple steps, and the part not described in detail can refer to the above methods 600-700, or the existing protocol.
S801,UE注册到网络。S801, UE registers to the network.
S802,UE向AMF发送会话建立请求消息,对应的,AMF接收来自UE的会话建立请求消息。S802, the UE sends a session establishment request message to the AMF, and correspondingly, the AMF receives the session establishment request message from the UE.
S803,AMF向SMF发送会话创建上下文请求消息,对应的,SMF接收来自AMF的会话创建上下文请求消息。S803, AMF sends a session creation context request message to SMF, and correspondingly, SMF receives the session creation context request message from AMF.
S804,SMF向AMF发送会话创建上下文响应消息,对应的,AMF接收来自SMF的会话创建上下文响应消息。S804, SMF sends a session creation context response message to AMF, and correspondingly, AMF receives a session creation context response message from SMF.
S805,AMF向卫星基站发送会话资源建立请求消息,对应的,卫星基站接收来自AMF的会话资源建立请求消息。S805, AMF sends a session resource establishment request message to the satellite base station, and correspondingly, the satellite base station receives the session resource establishment request message from the AMF.
S806,卫星基站向UE发送RRC重配置消息#1,对应的,UE接收来自卫星基站的RRC重配置消息#1。S806, the satellite base station sends an RRC reconfiguration message #1 to the UE, and correspondingly, the UE receives the RRC reconfiguration message #1 from the satellite base station.
S807,UE对RRC重配置消息#1进行完整性校验。S807, the UE performs an integrity check on the RRC reconfiguration message #1.
S808,UE向卫星基站发送RRC重配置完成消息#1,对应的,卫星基站接收来自UE的RRC重配置完成消息#1。S808, the UE sends an RRC reconfiguration completion message #1 to the satellite base station, and correspondingly, the satellite base station receives the RRC reconfiguration completion message #1 from the UE.
S809,卫星基站向AMF发送会话资源建立响应消息,对应的,AMF接收来自卫星基站的会话资源建立响应消息。S809, the satellite base station sends a session resource establishment response message to the AMF, and correspondingly, the AMF receives a session resource establishment response message from the satellite base station.
其中,上述步骤S801至S809的具体实现方式可参考上述方法700的步骤S701至S709相关描述。The specific implementation of the above steps S801 to S809 may refer to the related description of steps S701 to S709 of the above method 700.
以下步骤是针对馈线链路断开后,卫星基站通过修改无完整性安全保护的会话和/或DRB为激活完整性安全保护,缓解潜在的DoS风险,并降低UE和卫星基站的处理负载。另外,在馈线链路重新恢复连接后,卫星基站触发上述激活完整性安全保护的DRB恢复为先前无完整性安全保护的状态,保证UE与卫星基站的通信连接。The following steps are for the satellite base station to modify the session without integrity security protection and/or DRB to activate integrity security protection after the feeder link is disconnected, thereby mitigating the potential DoS risk and reducing the processing load of the UE and the satellite base station. In addition, after the feeder link is restored, the satellite base station triggers the above-mentioned DRB with activated integrity security protection to restore to the previous state without integrity security protection, ensuring the communication connection between the UE and the satellite base station.
S810,卫星基站和地面核心网之间的连接断开,如馈线链路断开,其中,馈线链路断开的触发条件可参考上述方法500的步骤S511的相关描述。S810, the connection between the satellite base station and the ground core network is disconnected, such as the feeder link is disconnected, wherein the triggering condition of the feeder link disconnection can refer to the relevant description of step S511 of the above method 500.
S811,卫星基站修改未激活完整性安全保护的会话和/或DRB的完整性安全保护状态为激活态。S811, the satellite base station modifies the integrity security protection state of the session and/or DRB for which integrity security protection is not activated to an activated state.
应理解,未激活完整性安全保护的会话和/或DRB是指:所述会话和/或DRB的完整性安全保护未开启,或者说,承载在所述会话和/或DRB上的用户面数据未经过安全保护,且无需进行完整性校验。It should be understood that a session and/or DRB for which integrity security protection is not activated means that the integrity security protection of the session and/or DRB is not turned on, or in other words, the user plane data carried on the session and/or DRB is not security protected and no integrity check is required.
其中,卫星基站修改未激活完整性安全保护的会话和/或DRB的完整性安全保护状态为激活态的触发条件可以参考上述方法600的相关描述,这里不再说明。Among them, the triggering conditions for the satellite base station to modify the integrity security protection state of the session and/or DRB that has not activated integrity security protection to an activated state can refer to the relevant description of the above-mentioned method 600 and will not be explained here.
示例性地,卫星基站可以根据步骤S805中接收的用户面完整性安全策略,确定需要修改完整性安全保护状态的会话和/或DRB。例如,用户面完整性安全策略指示UE与卫星基站之间的会话(或所述会话对应的一个或多个DRB)开启完整性安全保护,则卫星基站无需修改所述会话或所述一个或多个DRB的完整性安全保护状态;再例如,用户面完整性安全策略指示UE与卫星基站之间的会话或所述会话对应的一个或多个DRB)不开启或可选开启完整性安全保护,则卫星基站可以修改所述会话或所述一个或多个DRB的完整性安全保护状态为激活态。Exemplarily, the satellite base station may determine the session and/or DRB whose integrity security protection state needs to be modified based on the user plane integrity security policy received in step S805. For example, if the user plane integrity security policy indicates that integrity security protection is enabled for the session between the UE and the satellite base station (or one or more DRBs corresponding to the session), the satellite base station does not need to modify the integrity security protection state of the session or the one or more DRBs; for another example, if the user plane integrity security policy indicates that integrity security protection is not enabled or can be optionally enabled for the session between the UE and the satellite base station or one or more DRBs corresponding to the session, the satellite base station may modify the integrity security protection state of the session or the one or more DRBs to be activated.
进一步的,卫星基站在确定需要修改完整性安全保护状态为激活态的会话和/或DRB之后,对应修改该DRB对应的PDCP实体,例如卫星基站在所述PDCP实体中配置完整性安全保护密钥和完整性安全保护算法。同时,卫星基站激活该DRB上的下行数据的完整性安全保护,以及激活该DRB上的上行数据的完整性校验。也就是说,卫星基站后续通过该DRB接收的所有上行数据都是经过完整性安全保护的,因此也就需要对通过该DRB接收的上行数据进行完整性检验。Furthermore, after determining that the session and/or DRB whose integrity security protection state needs to be modified is activated, the satellite base station modifies the PDCP entity corresponding to the DRB accordingly, for example, the satellite base station configures the integrity security protection key and the integrity security protection algorithm in the PDCP entity. At the same time, the satellite base station activates the integrity security protection of the downlink data on the DRB, and activates the integrity check of the uplink data on the DRB. In other words, all uplink data subsequently received by the satellite base station through the DRB is integrity security protected, so it is necessary to perform integrity check on the uplink data received through the DRB.
S812,卫星基站向UE发送RRC重配置消息#2,对应的,UE接收来自卫星基站的RRC重配置消息#2。S812, the satellite base station sends an RRC reconfiguration message #2 to the UE, and correspondingly, the UE receives the RRC reconfiguration message #2 from the satellite base station.
在一种示例中,RRC重配置消息#2中包括会话ID和/或DRB ID,所述会话ID和/或DRB ID对应的会话和/或DRB的完整性安全保护激活状态为未激活态。另外,RRC重配置消息#2中还包含该所述会话和/或DRB对应的完整性安全保护指示,所述完整性安全保护指示用于指示UE激活(或开启)所述会话和/或DRB的完整性安全保护。也就是说,该RRC重配置消息#2用于指示UE修改该会话和/或DRB的完整性安全保护状态,即从未激活态修改为激活态。例如,该RRC重配置消息#2中携带drb-ToAddModList信元,所述信元中包括未激活完整性安全保护的会话ID和/或DRB ID。In one example, the RRC reconfiguration message #2 includes a session ID and/or a DRB ID, and the integrity security protection activation state of the session and/or DRB corresponding to the session ID and/or DRB ID is an inactive state. In addition, the RRC reconfiguration message #2 also includes an integrity security protection indication corresponding to the session and/or DRB, and the integrity security protection indication is used to instruct the UE to activate (or turn on) the integrity security protection of the session and/or DRB. In other words, the RRC reconfiguration message #2 is used to instruct the UE to modify the integrity security protection state of the session and/or DRB, that is, to change it from an inactive state to an active state. For example, the RRC reconfiguration message #2 carries a drb-ToAddModList information element, which includes a session ID and/or DRB ID for which integrity security protection is not activated.
可选地,卫星基站记录上述修改了完整性安全保护状态的会话ID和/或DRB ID,或者,记录修改前的会话和/或DRB的完整性安全保护状态为未激活态,或者记录修改前的会话和/或DRB的完整性安全策略指示不开启完整性安全保护等。可选地,所述记录的会话ID和/或DRB ID用于后续步骤S820中恢复会话和/或DRB的完整性安全保护状态为未激活态。Optionally, the satellite base station records the session ID and/or DRB ID whose integrity security protection state has been modified, or records that the integrity security protection state of the session and/or DRB before the modification is in an inactive state, or records that the integrity security policy of the session and/or DRB before the modification indicates that integrity security protection is not enabled, etc. Optionally, the recorded session ID and/or DRB ID is used to restore the integrity security protection state of the session and/or DRB to an inactive state in the subsequent step S820.
S813,UE修改会话和/或DRB的完整性安全保护状态为激活态。S813, the UE modifies the integrity security protection state of the session and/or DRB to an activated state.
也就是说,修改前的所述会话/DRB的完整性安全保护状态为未激活态,修改后的所述会话/DRB的完整性安全保护状态为激活态。That is to say, the integrity security protection state of the session/DRB before the modification is in an inactive state, and the integrity security protection state of the session/DRB after the modification is in an active state.
在一种示例中,UE根据所述会话ID和/或DRB ID修改对应的会话和/或DRB的完整性安全保护状态为激活态。例如,UE修改所述DRB对应的PDCP实体,包括:在所述PDCP实体中配置完整性安全保护密钥和完整性安全保护算法。同时,UE激活该DRB上的上行数据的完整性安全保护,以及激活该DRB上的下行数据的完整性校验。也就是说,UE后续通过所述会话和/或DRB发送的所有上行数据都是经过完整性安全保护的,因此卫星基站也就需要对通过所述会话和/或DRB接收的上行数据进行完整性检验。In one example, the UE modifies the integrity security protection state of the corresponding session and/or DRB to an activated state according to the session ID and/or DRB ID. For example, the UE modifies the PDCP entity corresponding to the DRB, including: configuring the integrity security protection key and the integrity security protection algorithm in the PDCP entity. At the same time, the UE activates the integrity security protection of the uplink data on the DRB, and activates the integrity check of the downlink data on the DRB. In other words, all uplink data subsequently sent by the UE through the session and/or DRB are integrity security protected, so the satellite base station also needs to perform integrity check on the uplink data received through the session and/or DRB.
S814,UE向卫星基站发送RRC重配置完成消息#2,对应的,卫星基站接收来自UE的RRC重配置完成消息#2。S814, the UE sends an RRC reconfiguration completion message #2 to the satellite base station, and correspondingly, the satellite base station receives the RRC reconfiguration completion message #2 from the UE.
示例性地,RRC重配置完成消息#2用于指示UE已经修改所述会话和/或DRB的完整性安全保护状态为激活态。Exemplarily, the RRC reconfiguration complete message #2 is used to indicate that the UE has modified the integrity security protection state of the session and/or DRB to an activated state.
S815,UE向卫星基站发送上行数据,对应的,卫星基站接收来自UE的上行数据。S815, the UE sends uplink data to the satellite base station, and correspondingly, the satellite base station receives the uplink data from the UE.
需要说明的是,由于UE已经修改未激活完整性安全保护的会话和/或DRB的完整性安全保护状态为激活态,则UE在发送上行数据之前,需要对所述上行数据进行完整性安全保护,具体实现方式可参考上述方法300的相关描述。It should be noted that since the UE has modified the integrity security protection status of the session and/or DRB that has not activated integrity security protection to an activated state, the UE needs to perform integrity security protection on the uplink data before sending the uplink data. For the specific implementation method, please refer to the relevant description of the above method 300.
S816,卫星基站对上行数据进行完整性校验。S816, the satellite base station performs integrity check on the uplink data.
S817,卫星基站根据校验结果确定是否存储上行数据。S817, the satellite base station determines whether to store the uplink data according to the verification result.
S818,卫星基站和地面核心网之间的连接恢复,如馈线链路恢复。S818, the connection between the satellite base station and the ground core network is restored, such as the feeder link is restored.
其中,上述步骤S816-S818的具体实现方式,完整性校验的触发条件,以及馈线链路恢复的触发条件可参考上述方法700的步骤S716-S718的相关描述。Among them, the specific implementation method of the above steps S816-S818, the triggering conditions of the integrity check, and the triggering conditions of the feeder link recovery can refer to the relevant description of steps S716-S718 of the above method 700.
S819,卫星基站向UE发送RRC重配置消息#3,对应的,UE接收来自卫星基站的RRC重配置消息#3。S819, the satellite base station sends an RRC reconfiguration message #3 to the UE, and correspondingly, the UE receives the RRC reconfiguration message #3 from the satellite base station.
其中,卫星基站发送RRC重配置消息#3的触发条件可参考上述方法700的步骤S719的相关描述。Among them, the triggering condition for the satellite base station to send the RRC reconfiguration message #3 can refer to the relevant description of step S719 of the above method 700.
示例性地,RRC重配置消息#3用于指示UE增加(或重新建立)会话和/或DRB,所述增加或重新建立的会话和/或DRB用于后续UE和卫星基站之间传输数据。可选地,所述增加或重新建立的会话和/或DRB可以与上述用户面完整性安全保护状态修改为激活态的会话和/或DRB相同,也可以不同,本申请对此不作限定。例如,RRC重配置消息#3中携带drb-ToAddModList信元,所述信元中包括会话ID和/或DRB ID,及其对应的完整性安全保护指示。Exemplarily, RRC reconfiguration message #3 is used to instruct the UE to add (or reestablish) a session and/or DRB, and the added or reestablished session and/or DRB are used for subsequent data transmission between the UE and the satellite base station. Optionally, the added or reestablished session and/or DRB may be the same as the session and/or DRB whose user plane integrity security protection state is modified to an activated state, or may be different, and this application does not limit this. For example, RRC reconfiguration message #3 carries a drb-ToAddModList information element, which includes a session ID and/or DRB ID, and its corresponding integrity security protection indication.
可选地,所述会话ID为上述步骤S812中卫星基站记录的已经修改了完整性安全保护状态的会话ID,此时该RRC重配置消息#3用于指示UE修改所述会话和/或DRB的完整性安全保护状态,即从激活态修改为不激活态,完整性安全保护指示用于指示不开启所述会话和/或DRB的完整性安全保护。Optionally, the session ID is the session ID of the session whose integrity security protection state has been modified recorded by the satellite base station in the above step S812. At this time, the RRC reconfiguration message #3 is used to instruct the UE to modify the integrity security protection state of the session and/or DRB, that is, from an activated state to an inactivated state. The integrity security protection indication is used to indicate that the integrity security protection of the session and/or DRB is not enabled.
S820,UE根据会话ID和/或DRB ID修改会话和/或DRB的完整性安全保护状态为未激活态。S820, the UE modifies the integrity security protection status of the session and/or DRB to an inactivated state based on the session ID and/or DRB ID.
示例性地,UE根据所述会话ID和/或DRB ID修改对应的会话和/或DRB的完整性安全保护状态为未激活态,即不开启所述会话和/或DRB的完整性安全保护。例如,UE修改该DRB对应的PDCP实体,由于该DRB的完整性安全保护不开启,所以UE无需在PDCP实体配置完整性安全保护密钥和完整性安全保护算法,例如卫星基站删除PDCP实体对应的完整性安全保护密钥和完整性安全保护算法。Exemplarily, the UE modifies the integrity security protection state of the corresponding session and/or DRB according to the session ID and/or DRB ID to an inactive state, that is, the integrity security protection of the session and/or DRB is not enabled. For example, the UE modifies the PDCP entity corresponding to the DRB. Since the integrity security protection of the DRB is not enabled, the UE does not need to configure the integrity security protection key and integrity security protection algorithm in the PDCP entity. For example, the satellite base station deletes the integrity security protection key and integrity security protection algorithm corresponding to the PDCP entity.
需要说明的是,上述步骤S818-S820中针对馈线链路恢复的情况下,UE和卫星基站修改会话和/或DRB的完整性安全保护状态是可选操作。其中,卫星基站和UE是否将所述会话和/或DRB的完整性安全保护状态修改为未激活态取决于卫星基站策略,本申请对此不作限定。It should be noted that in the above steps S818-S820, in the case of feeder link recovery, it is an optional operation for the UE and the satellite base station to modify the integrity security protection state of the session and/or DRB. Whether the satellite base station and the UE modify the integrity security protection state of the session and/or DRB to an inactive state depends on the satellite base station policy, which is not limited in this application.
需要说明的是,上述示例中会话对应的一个或多个DRB的用户面完整性安全保护是否开启是一致的。可选地,会话对应的多个DRB的用户面完整性安全保护是否开启可以不同。例如,如果卫星基站与UE之间建立的会话#a对应的完整性安全策略的取值为preferred,则说明该会话#a的完整性安全保护为可选开启,也就说明该会话#a对应的DRB#a和DRB#b的完整性安全保护为可选开启,进一步的,卫星基站可以根据本地策略或自身负载情况确定激活DRB#a的完整性安全保护,且不激活DRB#b的完整性安全保护,即卫星基站确定需要修改DRB#b的完整性安全保护状态为激活态,也就是说,修改后的DRB#b开启完整性安全保护。进一步的,卫星基站可以通过RRC重配置消息通知UE修改DRB#b完整性安全保护状态为激活态,后续UE和卫星基站可以通过DRB#a和DRB#b传输数据,且所述传输的数据是经过完整性安全保护的。进一步的,在馈线链路恢复的情况下,卫星基站可以指示UE修改所述DRB#b的完整性安全保护状态为未激活态,具体实现方式可参考方法800的步骤S810至S814,以及步骤S818至S820的相关描述,为了简洁,此处不再赘述。It should be noted that in the above examples, whether the user plane integrity security protection of one or more DRBs corresponding to the session is enabled is consistent. Optionally, whether the user plane integrity security protection of multiple DRBs corresponding to the session is enabled may be different. For example, if the value of the integrity security policy corresponding to session #a established between the satellite base station and the UE is preferred, it means that the integrity security protection of session #a is optionally enabled, which means that the integrity security protection of DRB#a and DRB#b corresponding to session #a is optionally enabled. Further, the satellite base station can determine to activate the integrity security protection of DRB#a according to local policies or its own load conditions, and not to activate the integrity security protection of DRB#b, that is, the satellite base station determines that the integrity security protection state of DRB#b needs to be modified to an activated state, that is, the modified DRB#b turns on integrity security protection. Further, the satellite base station can notify the UE to modify the integrity security protection state of DRB#b to an activated state through an RRC reconfiguration message, and subsequently the UE and the satellite base station can transmit data through DRB#a and DRB#b, and the transmitted data is integrity security protected. Furthermore, when the feeder link is restored, the satellite base station can instruct the UE to modify the integrity security protection status of the DRB#b to an inactivated state. The specific implementation method can refer to steps S810 to S814 of method 800, and the relevant descriptions of steps S818 to S820. For the sake of brevity, they will not be repeated here.
本申请提供的方案,在馈线链路断开的场景下,卫星基站通过修改无完整性安全保护的会话和/或DRB的完整性安全保护状态为激活态,使得卫星基站后续接收的上行数据都是经过完整性安全保护的,卫星基站也就避免了接收无完整性安全保护的上行数据,缓解了潜在的DoS风险。另外,在馈线链路重新恢复连接后,卫星基站触发将上述修改为开启完整性安全保护的会话和/或DRB恢复为未激活态,保证UE与卫星基站的通信连接。The solution provided by the present application is that in the scenario where the feeder link is disconnected, the satellite base station modifies the integrity security protection state of the session without integrity security protection and/or DRB to an activated state, so that the uplink data subsequently received by the satellite base station are all integrity-protected, and the satellite base station also avoids receiving uplink data without integrity security protection, alleviating the potential DoS risk. In addition, after the feeder link is restored to the connection, the satellite base station triggers the above-mentioned session and/or DRB that have been modified to enable integrity security protection to be restored to an inactivated state, ensuring the communication connection between the UE and the satellite base station.
图9是本申请实施例提供的通信方法900的流程示意图,如图9所示,以终端设备为UE、核心网网元为AMF、SMF为执行主体进行交互,该方法可以看作是上述方法400或600的进一步细化,主要针对SMF根据指示信息和/或签约信息确定用户面完整性安全策略进行说明。应理解,图9所示的实施例与图4至图8所示的实施例可以彼此耦合,且可以互为参考,因此上述方法400至800中的相关描述同样适用于该实现方式,二者之间可以存在相同或类似的技术手段,与图4至图8所示的实施例中已描述的内容不再赘述。该方法包括如下多个步骤,未详尽说明的部分可参考现有协议。Figure 9 is a flow chart of a communication method 900 provided in an embodiment of the present application. As shown in Figure 9, the terminal device is UE, the core network element is AMF, and SMF is the execution subject for interaction. This method can be regarded as a further refinement of the above-mentioned method 400 or 600, and is mainly described for SMF to determine the user plane integrity security policy according to the indication information and/or the contract information. It should be understood that the embodiment shown in Figure 9 and the embodiments shown in Figures 4 to 8 can be coupled with each other and can be used as references to each other. Therefore, the relevant descriptions in the above-mentioned methods 400 to 800 are also applicable to this implementation method. The same or similar technical means may exist between the two, and the contents described in the embodiments shown in Figures 4 to 8 will not be repeated. The method includes the following multiple steps, and the parts that are not fully described can refer to the existing protocol.
S901,UE注册到网络。S901, UE registers to the network.
S902,UE向AMF发送会话建立请求消息,对应的,AMF接收来自UE的会话建立请求消息。S902, the UE sends a session establishment request message to the AMF, and correspondingly, the AMF receives the session establishment request message from the UE.
其中,上述步骤S901和S902的具体实现方式可参考上述方法300的相关描述。The specific implementation of the above steps S901 and S902 may refer to the relevant description of the above method 300.
S903,AMF向SMF发送会话创建上下文请求消息,对应的,SMF接收来自AMF的会话创建上下文请求消息。S903, AMF sends a session creation context request message to SMF, and correspondingly, SMF receives the session creation context request message from AMF.
其中,会话创建上下文请求消息中携带指示信息,该指示信息用于指示基站部署于卫星上(简称为卫星基站),可选地,该指示信息还用于指示卫星基站支持存储转发特性。The session creation context request message carries indication information, where the indication information is used to indicate that the base station is deployed on a satellite (referred to as a satellite base station for short). Optionally, the indication information is also used to indicate that the satellite base station supports a store-and-forward feature.
可选地,AMF通过本地查询,或者向OAM或UDM发送查询消息,以获取该基站的能力信息、配置信息或位置信息中的一项或多项,具体释义可参考上述方法500的相关描述。AMF通过查询可以确定该基站部署于卫星上,可选地,AMF还可以确定该卫星基站支持存储转发特性。Optionally, the AMF obtains one or more of the capability information, configuration information or location information of the base station through local query or by sending a query message to the OAM or UDM. For specific interpretations, please refer to the relevant description of the above method 500. The AMF can determine that the base station is deployed on a satellite through the query. Optionally, the AMF can also determine that the satellite base station supports the store-and-forward feature.
S904,SMF根据指示信息和/或签约信息确定会话的用户面完整性安全策略。S904, SMF determines the user plane integrity security policy of the session based on the indication information and/or contract information.
可选地,指示信息可以是SMF从AMF获取的,也可以是SMF从OAM或UDM获取的。Optionally, the indication information may be obtained by the SMF from the AMF, or may be obtained by the SMF from the OAM or UDM.
可选地,签约信息可以是SMF从UDM或PCF获取的。Optionally, the contract information can be obtained by SMF from UDM or PCF.
在第一种示例中,SMF根据指示信息确定会话的用户面完整性安全策略。In the first example, the SMF determines the user plane integrity security policy of the session based on the indication information.
在第二种示例中,SMF根据签约信息确定用户面完整性安全策略。In the second example, the SMF determines the user plane integrity security policy based on the subscription information.
其中,UE的签约信息用于指示UE是否签约存储转发操作业务。Among them, the UE's subscription information is used to indicate whether the UE has subscribed to the store-and-forward operation service.
可选地,本申请对SMF获取签约信息和指示信息的先后顺序不作限定。Optionally, this application does not limit the order in which the SMF obtains the contract information and indication information.
在第三种示例中,SMF根据指示信息和签约信息确定用户面完整性安全策略。In the third example, the SMF determines the user plane integrity security policy based on the indication information and the subscription information.
其中,上述示例中的具体实现方式可参考上述方法400的步骤S401的相关描述。The specific implementation method in the above example can refer to the relevant description of step S401 of the above method 400.
S905,SMF向AMF发送会话创建上下文响应消息,对应的,AMF接收来自SMF的会话创建上下文响应消息。S905, SMF sends a session creation context response message to AMF, and correspondingly, AMF receives a session creation context response message from SMF.
S906,AMF向卫星基站发送会话资源建立请求消息,对应的,卫星基站接收来自AMF的会话资源建立请求消息。S906, AMF sends a session resource establishment request message to the satellite base station, and correspondingly, the satellite base station receives the session resource establishment request message from the AMF.
S907,卫星基站向UE发送RRC重配置消息,对应的,UE接收来自卫星基站的RRC重配置消息。S907, the satellite base station sends an RRC reconfiguration message to the UE, and correspondingly, the UE receives the RRC reconfiguration message from the satellite base station.
需要说明的是,针对上述步骤S904中确定的完整性安全策略的取值为preferred,卫星基站可以进一步根据本地策略确定完整性安全策略为required或not needed,具体实现方式可参考上述方法300的相关描述。It should be noted that, for the value of the integrity security policy determined in the above step S904 as preferred, the satellite base station can further determine whether the integrity security policy is required or not needed based on the local policy. The specific implementation method can refer to the relevant description of the above method 300.
S908,UE对RRC重配置消息进行完整性校验。S908, the UE performs an integrity check on the RRC reconfiguration message.
S909,UE向卫星基站发送RRC重配置完成消息,对应的,卫星基站接收来自UE的RRC重配置完成消息。S909, the UE sends an RRC reconfiguration completion message to the satellite base station, and correspondingly, the satellite base station receives the RRC reconfiguration completion message from the UE.
其中,上述步骤S905至S909的具体实现方式可参考上述方法300的相关描述。The specific implementation of the above steps S905 to S909 may refer to the relevant description of the above method 300.
S910,卫星基站向AMF发送会话资源建立响应消息,对应的,AMF接收来自卫星基站的会话资源建立响应消息。S910, the satellite base station sends a session resource establishment response message to the AMF, and correspondingly, the AMF receives a session resource establishment response message from the satellite base station.
S911,卫星基站和地面核心网之间的连接断开,如馈线链路断开,其中,馈线链路断开的触发条件可参考上述方法500的步骤S511的相关描述。S911, the connection between the satellite base station and the ground core network is disconnected, such as the feeder link is disconnected, wherein the triggering condition of the feeder link disconnection can refer to the relevant description of step S511 of the above method 500.
S912,UE向卫星基站发送上行数据,对应的,卫星基站接收来自UE的上行数据。S912, the UE sends uplink data to the satellite base station, and correspondingly, the satellite base station receives the uplink data from the UE.
S913,卫星基站对上行数据进行完整性校验。S913, the satellite base station performs integrity check on the uplink data.
其中,卫星基站对上行数据进行完整性校验的触发条件,以及卫星基站对上行数据进行完整性校验的具体实现方式可参考上述方法500的步骤S513的相关描述,这里不再赘述。Among them, the triggering conditions for the satellite base station to perform integrity check on the uplink data, and the specific implementation method of the satellite base station to perform integrity check on the uplink data can refer to the relevant description of step S513 of the above method 500, which will not be repeated here.
S914,卫星基站根据校验结果确定是否存储上行数据。S914, the satellite base station determines whether to store the uplink data according to the verification result.
其中,具体实现方式可参考上述方法500的步骤S514的相关描述。For the specific implementation, please refer to the relevant description of step S514 of the above method 500.
本申请提供的方案,通过指示信息设置完整性安全策略,使得卫星基站后续接收的用户面数据最大限度的经过完整性安全保护,缓解了潜在的DoS风险,降低了UE和基站的处理负载。在馈线链路断开的场景下,卫星基站可以只存储完整性校验通过的数据,以保证网络安全。The solution provided by this application sets an integrity security policy through indication information, so that the user plane data subsequently received by the satellite base station is protected by integrity security to the maximum extent, alleviating potential DoS risks and reducing the processing load of UE and base station. In the scenario where the feeder link is disconnected, the satellite base station can only store data that has passed the integrity check to ensure network security.
上文结合图1至图9详细描述了本申请的通信方法侧实施例,下面将结合图10和图11详细描述本申请的通信装置侧实施例。应理解,装置实施例的描述与方法实施例的描述相互对应,因此,未详细描述的部分可以参见前面方法实施例。The above describes in detail the communication method side embodiment of the present application in conjunction with Figures 1 to 9, and the following describes in detail the communication device side embodiment of the present application in conjunction with Figures 10 and 11. It should be understood that the description of the device embodiment corresponds to the description of the method embodiment, and therefore, the part not described in detail can refer to the previous method embodiment.
图10是本申请实施例提供一种通信装置的示意图。如图10所示,通信装置1000包括处理模块1010和通信模块1020。该通信装置1000可以是终端设备,也可以是应用于终端设备或者和终端设备匹配使用、能够实现终端设备执行的方法的通信装置,例如,芯片、芯片系统或电路;或者,该通信装置1000可以是网络设备,也可以是应用于网络设备或者和网络设备匹配使用、能够实现网络设备执行的方法的通信装置,例如芯片、芯片系统或电路;或者,该通信装置1000可以是会话管理网元,也可以是应用于会话管理网元或者和会话管理网元匹配使用、能够实现会话管理网元执行的方法的通信装置,例如芯片、芯片系统或电路。Figure 10 is a schematic diagram of a communication device provided by an embodiment of the present application. As shown in Figure 10, the communication device 1000 includes a processing module 1010 and a communication module 1020. The communication device 1000 can be a terminal device, or a communication device applied to a terminal device or used in combination with a terminal device, which can implement a method executed by the terminal device, such as a chip, a chip system or a circuit; or, the communication device 1000 can be a network device, or a communication device applied to a network device or used in combination with a network device, which can implement a method executed by the network device, such as a chip, a chip system or a circuit; or, the communication device 1000 can be a session management network element, or a communication device applied to a session management network element or used in combination with a session management network element, which can implement a method executed by the session management network element, such as a chip, a chip system or a circuit.
其中,通信模块也可以称为收发模块、收发器、收发机、或收发装置等。处理模块也可以称为处理器,处理单板,处理单元、或处理装置等。可选地,通信模块用于执行上述方法中终端设备、网络设备的发送操作和接收操作,可以将通信模块中用于实现接收功能的器件视为接收单元,将通信模块中用于实现发送功能的器件视为发送单元,即通信模块包括接收单元和发送单元。The communication module may also be referred to as a transceiver module, a transceiver, a transceiver, or a transceiver device, etc. The processing module may also be referred to as a processor, a processing board, a processing unit, or a processing device, etc. Optionally, the communication module is used to perform the sending operation and the receiving operation of the terminal device and the network device in the above method, and the device used to implement the receiving function in the communication module may be regarded as a receiving unit, and the device used to implement the sending function in the communication module may be regarded as a sending unit, that is, the communication module includes a receiving unit and a sending unit.
通信装置1000应用于终端设备时,处理模块1010可用于实现上述各实施例中终端设备的处理功能,通信模块1020可用于实现上述各实施例中终端设备的收发功能。When the communication device 1000 is applied to a terminal device, the processing module 1010 can be used to implement the processing function of the terminal device in the above embodiments, and the communication module 1020 can be used to implement the transceiver function of the terminal device in the above embodiments.
通信装置1000应用于网络设备时,处理模块1010可用于实现上述各实施例中网络设备的处理功能,通信模块1020可用于实现上述各实施例中网络设备的收发功能。When the communication device 1000 is applied to a network device, the processing module 1010 can be used to implement the processing function of the network device in the above embodiments, and the communication module 1020 can be used to implement the transceiver function of the network device in the above embodiments.
通信装置1000应用于会话管理网元时,处理模块1010可用于实现上述各实施例中会话管理网元的处理功能,通信模块1020可用于实现上述各实施例中会话管理网元的收发功能。When the communication device 1000 is applied to a session management network element, the processing module 1010 can be used to implement the processing function of the session management network element in the above embodiments, and the communication module 1020 can be used to implement the sending and receiving function of the session management network element in the above embodiments.
此外需要说明的是,前述通信模块和/或处理模块可通过虚拟模块实现,例如处理模块可通过软件功能单元或虚拟装置实现,通信模块可以通过软件功能或虚拟装置实现。或者,处理模块或通信模块也可以通过实体装置实现,例如若该装置采用芯片/电路(例如集成电路或者逻辑电路等)实现。所述通信模块可以是输入输出电路和/或通信接口,执行输入操作(对应前述接收操作)、输出操作(对应前述发送操作);处理模块为集成的处理器或者微处理器或者电路(例如集成电路或者逻辑电路等)。In addition, it should be noted that the aforementioned communication module and/or processing module can be implemented by a virtual module, for example, the processing module can be implemented by a software function unit or a virtual device, and the communication module can be implemented by a software function or a virtual device. Alternatively, the processing module or the communication module can also be implemented by a physical device, for example, if the device is implemented using a chip/circuit (such as an integrated circuit or a logic circuit, etc.). The communication module can be an input-output circuit and/or a communication interface, performing input operations (corresponding to the aforementioned receiving operations) and output operations (corresponding to the aforementioned sending operations); the processing module is an integrated processor or microprocessor or circuit (such as an integrated circuit or a logic circuit, etc.).
本申请中对模块的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,另外,在本申请各个示例中的各功能模块可以集成在一个处理器中,也可以是单独物理存在,也可以两个或两个以上模块集成在一个模块中。上述集成的模块既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。The division of modules in this application is schematic and is only a logical function division. There may be other division methods in actual implementation. In addition, each functional module in each example of this application may be integrated into one processor, or may exist physically separately, or two or more modules may be integrated into one module. The above-mentioned integrated modules may be implemented in the form of hardware or in the form of software functional modules.
图11是本申请实施例提供另一种通信装置的示意图。如图11所示,可选地,通信装置2000可以是前述终端设备或网络设备或会话管理网元,或者,用于前述终端设备或网络设备或会话管理网元的芯片或者芯片系统。可选地,在本申请中芯片系统可以由芯片构成,也可以包含芯片和其他分立器件。FIG11 is a schematic diagram of another communication device provided by an embodiment of the present application. As shown in FIG11, optionally, the communication device 2000 may be the aforementioned terminal device or network device or session management network element, or a chip or chip system for the aforementioned terminal device or network device or session management network element. Optionally, in the present application, the chip system may be composed of a chip, or may include a chip and other discrete devices.
通信装置2000可用于实现前述示例描述的通信系统中任一设备(例如终端设备、网络设备、或会话管理网元)的功能。通信装置2000可以包括至少一个处理电路2010。可选地,该处理电路2010与存储器耦合,存储器可以位于该装置之内,或,存储器可以和处理器集成在一起,或,存储器也可以位于该装置之外。例如,通信装置2000还可以包括至少一个存储器2020。存储器2020保存实施上述任一示例中必要计算机程序、计算机程序或指令和/或数据;处理电路2010可能执行存储器2020中存储的计算机程序,完成上述任一示例中的方法。The communication device 2000 can be used to implement the functions of any device (e.g., terminal device, network device, or session management network element) in the communication system described in the above examples. The communication device 2000 may include at least one processing circuit 2010. Optionally, the processing circuit 2010 is coupled to a memory, and the memory may be located within the device, or the memory may be integrated with the processor, or the memory may be located outside the device. For example, the communication device 2000 may also include at least one memory 2020. The memory 2020 stores the necessary computer programs, computer programs or instructions and/or data for implementing any of the above examples; the processing circuit 2010 may execute the computer program stored in the memory 2020 to complete the method in any of the above examples.
通信装置2000中还可以包括收发电路2030,通信装置2000可以通过收发电路2030和其它设备进行信息交互。示例性地,所述收发电路2030可以是收发器、电路、总线、模块、管脚或其它类型的通信接口。当通信装置2000为芯片类的装置或者电路时,装置2000中的收发电路2030也可以是输入输出电路,或接口电路,可以输入信息(或称,接收信息)和输出信息(或称,发送信息)。当通信装置2000为网络设备或终端设备时,收发电路2030可以为发送器,接收器或收发器,或者,通信接口,在此不予限定。The communication device 2000 may also include a transceiver circuit 2030, and the communication device 2000 may exchange information with other devices through the transceiver circuit 2030. Exemplarily, the transceiver circuit 2030 may be a transceiver, a circuit, a bus, a module, a pin, or other types of communication interfaces. When the communication device 2000 is a chip-type device or circuit, the transceiver circuit 2030 in the device 2000 may also be an input-output circuit, or an interface circuit, which may input information (or receive information) and output information (or send information). When the communication device 2000 is a network device or a terminal device, the transceiver circuit 2030 may be a transmitter, a receiver or a transceiver, or a communication interface, which is not limited here.
其中,处理电路2010可以为一个或多个处理器,或者,为一个或多个处理器中的全部或部分处理电路。处理电路2010为集成的处理器、微处理器、集成电路或逻辑电路等,处理器可以根据输入信息确定输出信息。The processing circuit 2010 may be one or more processors, or all or part of the processing circuits in one or more processors. The processing circuit 2010 is an integrated processor, microprocessor, integrated circuit or logic circuit, etc. The processor may determine output information based on input information.
本申请中的耦合是装置、单元或模块之间的间接耦合或通信连接,可以是电性,机械或其它的形式,用于装置、单元或模块之间的信息交互。处理电路2010可能和存储器2020、收发电路2030协同操作。本申请中不限定上述处理电路2010、存储器2020以及收发电路2030之间的具体连接介质。The coupling in this application is an indirect coupling or communication connection between devices, units or modules, which can be electrical, mechanical or other forms, and is used for information exchange between devices, units or modules. The processing circuit 2010 may cooperate with the memory 2020 and the transceiver circuit 2030. The specific connection medium between the above-mentioned processing circuit 2010, the memory 2020 and the transceiver circuit 2030 is not limited in this application.
可选地,如图11所示,所述处理电路2010、所述存储器2020以及所述收发电路2030之间通过总线2040相互连接。可选地,所述总线可以包括地址总线、数据总线、控制总线等类型的总线。此外,为便于表示,图11中示出一条总线2040,但并不表示仅有一根总线或一种类型的总线。Optionally, as shown in FIG11 , the processing circuit 2010, the memory 2020, and the transceiver circuit 2030 are interconnected via a bus 2040. Optionally, the bus may include an address bus, a data bus, a control bus, and other types of buses. In addition, for ease of representation, FIG11 shows a bus 2040, but does not mean that there is only one bus or one type of bus.
应理解,本申请实施例中提及的处理器可以是以下器件或是以下器件中用于处理功能的部分电路:中央处理单元(central processing unit,CPU),还可以是其他通用处理器、数字信号处理器(digital signal processor,DSP)、专用集成电路(application specific integrated circuit,ASIC)、现成可编程门阵列(field programmable gate array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。It should be understood that the processor mentioned in the embodiments of the present application can be the following devices or part of the circuit used for processing functions in the following devices: central processing unit (CPU), other general-purpose processors, digital signal processors (DSP), application-specific integrated circuits (ASIC), field programmable gate arrays (FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc. The general-purpose processor can be a microprocessor or the processor can also be any conventional processor, etc.
还应理解,本申请实施例中提及的存储器可以是易失性存储器和/或非易失性存储器。其中,非易失性存储器可以是只读存储器(read-only memory,ROM)、可编程只读存储器(programmable ROM,PROM)、可擦除可编程只读存储器(erasable PROM,EPROM)、电可擦除可编程只读存储器(electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(random access memory,RAM)。例如,RAM可以用作外部高速缓存。作为示例而非限定,RAM包括如下多种形式:静态随机存取存储器(static RAM,SRAM)、动态随机存取存储器(dynamic RAM,DRAM)、同步动态随机存取存储器(synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(double data rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(synchlink DRAM,SLDRAM)和直接内存总线随机存取存储器(direct rambus RAM,DR RAM)。It should also be understood that the memory mentioned in the embodiments of the present application may be a volatile memory and/or a non-volatile memory. Among them, the non-volatile memory may be a read-only memory (ROM), a programmable read-only memory (PROM), an erasable programmable read-only memory (EPROM), an electrically erasable programmable read-only memory (EEPROM), or a flash memory. The volatile memory may be a random access memory (RAM). For example, a RAM may be used as an external cache. By way of example and not limitation, RAM includes the following forms: static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), synchronous link DRAM (SLDRAM), and direct rambus RAM (DR RAM).
需要说明的是,当处理器为通用处理器、DSP、ASIC、FPGA或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件时,存储器(存储模块)可以集成在处理器中。It should be noted that when the processor is a general-purpose processor, DSP, ASIC, FPGA or other programmable logic device, discrete gate or transistor logic device, discrete hardware component, the memory (storage module) can be integrated into the processor.
还需要说明的是,本文描述的存储器旨在包括但不限于这些和任意其它适合类型的存储器。It should also be noted that the memory described herein is intended to include, but is not limited to, these and any other suitable types of memory.
本申请实施例还提供一种计算机可读存储介质,其上存储有用于实现上述各方法实施例中由终端设备、网络设备、或会话管理网元中至少一项执行的方法的计算机指令。An embodiment of the present application also provides a computer-readable storage medium on which computer instructions are stored for implementing the method executed by at least one of a terminal device, a network device, or a session management network element in the above-mentioned method embodiments.
本申请实施例还提供一种计算机程序产品,包含代码或指令,该代码或指令被计算机执行时以实现上述各方法实施例中由终端设备、网络设备、或会话管理网元中至少一项执行的方法。An embodiment of the present application also provides a computer program product, comprising codes or instructions, which, when executed by a computer, implement the method executed by at least one of the terminal device, network device, or session management network element in the above-mentioned method embodiments.
本申请实施例还提供一种通信系统,该通信系统包括上文各实施例中的核心网网元、会话管理网元、或网络设备中至少一项。An embodiment of the present application also provides a communication system, which includes at least one of the core network element, session management network element, or network device in the above embodiments.
可选地,该通信系统还包括上文各实施例中的终端设备。Optionally, the communication system also includes the terminal device in the above embodiments.
上述提供的任一种装置中相关内容的解释及有益效果均可参考上文提供的对应的方法实施例,此处不再说明。The explanation of the relevant contents and beneficial effects of any of the above-mentioned devices can be referred to the corresponding method embodiments provided above, which will not be described again here.
为了便于理解本申请提供的上述实施例,做出以下几点说明:In order to facilitate understanding of the above embodiments provided in this application, the following points are explained:
1)在本申请中,如果没有特殊说明以及逻辑冲突,不同的实施例之间的术语和/或描述具有一致性、且可以相互引用,不同的实施例中的技术特征根据其内在的逻辑关系可以组合形成新的实施例。1) In this application, unless otherwise specified or there is a logical conflict, the terms and/or descriptions between different embodiments are consistent and can be referenced to each other, and the technical features in different embodiments can be combined to form new embodiments according to their internal logical relationships.
2)在本申请中,“至少一个”是指一个或者多个,“多个”是指两个或两个以上。“和/或”,描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B的情况,其中A,B可以是单数或者复数。在本申请的文字描述中,字符“/”一般表示前后关联对象是一种“或”的关系。“以下至少一项(个)”或其类似表达,是指的这些项中的任意组合,包括单项(个)或复数项(个)的任意组合。例如,a、b和c中的至少一项(个),可以表示:a,或,b,或,c,或,a和b,或,a和c,或,b和c,或,a、b和c。其中a、b和c分别可以是单个,也可以是多个。2) In this application, "at least one" means one or more, and "more than one" means two or more. "And/or" describes the association relationship of associated objects, indicating that three relationships may exist. For example, A and/or B can mean: A exists alone, A and B exist at the same time, and B exists alone, where A and B can be singular or plural. In the text description of this application, the character "/" generally indicates that the associated objects before and after are in an "or" relationship. "At least one of the following" or similar expressions refers to any combination of these items, including any combination of single or plural items. For example, at least one of a, b and c can mean: a, or b, or c, or a and b, or a and c, or b and c, or a, b and c. Where a, b and c can be single or multiple, respectively.
3)在本申请中,“第一”、“第二”以及各种数字编号(例如,#1、#2等)指示为了描述方便进行的区分,并不用来限制本申请实施例的范围。例如,区分不同的消息等,而不是用于描述特定的顺序或先后次序。应理解,这样描述的对象在适当情况下可以互换,以便能够描述本申请的实施例以外的方案。3) In the present application, "first", "second" and various numerical numbers (e.g., #1, #2, etc.) indicate distinctions made for ease of description and are not used to limit the scope of the embodiments of the present application. For example, to distinguish between different messages, etc., rather than to describe a specific order or sequence. It should be understood that the objects described in this way can be interchanged where appropriate so as to be able to describe solutions other than the embodiments of the present application.
4)在本申请中,“当……时”、“在……的情况下”以及“如果”等描述均指在某种客观情况下设备会做出相应的处理,并非是限定时间,且也不要求设备在实现时一定要有判断的动作,也不意味着存在其它限定。4) In this application, descriptions such as "when...", "in the case of..." and "if" all mean that the device will take corresponding actions under certain objective circumstances. They do not limit the time, nor do they require the device to make judgments when implementing them, nor do they mean that there are other limitations.
5)在本申请中,“指示”或“用于指示”可以包括用于直接指示和用于间接指示。当描述某一指示信息用于指示A时,可以包括该指示信息直接指示A或间接指示A,而并不代表该指示信息中一定携带有A。5) In this application, "indication" or "used to indicate" may include being used for direct indication and being used for indirect indication. When describing that a certain indication information is used to indicate A, it may include that the indication information directly indicates A or indirectly indicates A, but it does not mean that the indication information must carry A.
本申请实施例涉及的指示方式应理解为涵盖可以使得待指示方获知待指示信息的各种方法。待指示信息可以作为整体一起发送,也可以分成多个子信息分开发送,而且这些子信息的发送周期和/或发送时机可以相同,也可以不同,本申请对例如发送方法不作限定。The indication method involved in the embodiments of the present application should be understood to include various methods that can enable the party to be indicated to know the information to be indicated. The information to be indicated can be sent as a whole or divided into multiple sub-information and sent separately, and the sending period and/or sending time of these sub-information can be the same or different. This application does not limit the sending method, for example.
本申请实施例中的“指示信息”可以是显式指示,即通过信令直接指示,或者根据信令指示的参数,结合其他规则或结合其他参数或通过推导获得。也可以是隐式指示,即根据规则或关系,或根据其他参数,或推导获得。本申请对此不作具体限定。The "indication information" in the embodiments of the present application may be an explicit indication, i.e., directly indicated by signaling, or obtained by combining other rules or other parameters or by deduction according to the parameters indicated by the signaling. It may also be an implicit indication, i.e., obtained by combining other rules or other parameters or by deduction according to a rule or relationship. The present application does not make any specific limitation on this.
6)在本申请中,“协议”可以是指通信领域的标准协议,例如可以包括5G协议、NR协议以及应用于未来的通信系统中的相关协议,本申请对此不作限定。“预定义”可以包括预先定义。例如,协议定义。“预配置”可以通过在设备中预先保存相应的代码、表格或其他可用于指示相关信息的方式来实现,本申请对于其例如实现方式不作限定。6) In this application, "protocol" may refer to a standard protocol in the field of communications, such as 5G protocol, NR protocol, and related protocols used in future communication systems, which are not limited in this application. "Predefined" may include pre-definition. For example, protocol definition. "Preconfiguration" may be implemented by pre-saving corresponding codes, tables, or other methods that can be used to indicate relevant information in the device, and this application does not limit its implementation method, for example.
7)在本申请中,“通信”还可以描述为“数据传输”、“信息传输”、“数据处理”等。“传输”包括“发送”和“接收”。7) In this application, "communication" may also be described as "data transmission", "information transmission", "data processing", etc. "Transmission" includes "sending" and "receiving".
8)在本申请中,“向XX(设备)发送信息”可以理解为该信息的目的端是该设备。可以包括直接或间接地向该设备发送信息。“从XX(设备)接收信息,或者接收来自XX(设备)的信息”可以理解为该信息的源端是该设备,可以包括直接或间接地从该设备接收信息。信息在信息发送的源端和目的端之间可能会被进行必要的处理,例如格式变化等,但目的端可以理解来自源端的有效信息。8) In this application, "sending information to XX (device)" can be understood as the destination of the information being the device. This can include sending information to the device directly or indirectly. "Receiving information from XX (device) or receiving information from XX (device)" can be understood as the source of the information being the device, which can include receiving information from the device directly or indirectly. The information may be processed as necessary between the source and destination of the information, such as format changes, but the destination can understand the valid information from the source.
在本申请的各种实施例中,上述各过程的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本申请实施例的实施过程构成任何限定。In various embodiments of the present application, the size of the serial numbers of the above-mentioned processes does not mean the order of execution. The execution order of each process should be determined by its function and internal logic, and should not constitute any limitation on the implementation process of the embodiments of the present application.
在本申请中,在无逻辑矛盾的前提下,各示例之间可以相互引用,例如方法实施例之间的方法和/或术语可以相互引用,例如装置实施例之间的功能和/或术语可以相互引用,例如装置示例和方法示例之间的功能和/或术语可以相互引用。In the present application, under the premise of no logical contradiction, the examples may reference each other, for example, the methods and/or terms between method embodiments may reference each other, for example, the functions and/or terms between device embodiments may reference each other, for example, the functions and/or terms between device examples and method examples may reference each other.
应理解,在上述一些实施例中,主要以现有的网络架构中的设备为例进行了示例性说明,对于设备的具体形式本申请实施例不作限定。例如,在未来可以实现同样功能的设备都适用于本申请实施例。It should be understood that in some of the above embodiments, the devices in the existing network architecture are mainly used as examples for exemplary description, and the specific form of the device is not limited in the embodiments of the present application. For example, devices that can achieve the same function in the future are applicable to the embodiments of the present application.
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。Those of ordinary skill in the art will appreciate that the units and algorithm steps of each example described in conjunction with the embodiments disclosed herein can be implemented in electronic hardware, or a combination of computer software and electronic hardware. Whether these functions are performed in hardware or software depends on the specific application and design constraints of the technical solution. Professional and technical personnel can use different methods to implement the described functions for each specific application, but such implementation should not be considered to be beyond the scope of this application.
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再说明。Those skilled in the art can clearly understand that, for the convenience and brevity of description, the specific working processes of the systems, devices and units described above can refer to the corresponding processes in the aforementioned method embodiments and will not be described again here.
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。In the several embodiments provided in the present application, it should be understood that the disclosed systems, devices and methods can be implemented in other ways. For example, the device embodiments described above are only schematic. For example, the division of the units is only a logical function division. There may be other division methods in actual implementation, such as multiple units or components can be combined or integrated into another system, or some features can be ignored or not executed. Another point is that the mutual coupling or direct coupling or communication connection shown or discussed can be through some interfaces, indirect coupling or communication connection of devices or units, which can be electrical, mechanical or other forms.
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。The units described as separate components may or may not be physically separated, and the components shown as units may or may not be physical units, that is, they may be located in one place or distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。In addition, each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、ROM、RAM、磁碟或者光盘等各种可以存储程序代码的介质。If the functions are implemented in the form of software functional units and sold or used as independent products, they can be stored in a computer-readable storage medium. Based on this understanding, the technical solution of the present application, or the part that contributes to the prior art or the part of the technical solution, can be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for a computer device (which can be a personal computer, server, or network device, etc.) to perform all or part of the steps of the methods described in each embodiment of the present application. The aforementioned storage medium includes: various media that can store program codes, such as USB flash drives, mobile hard drives, ROM, RAM, magnetic disks, or optical disks.
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以所述权利要求的保护范围为准。The above is only a specific implementation of the present application, but the protection scope of the present application is not limited thereto. Any person skilled in the art who is familiar with the present technical field can easily think of changes or substitutions within the technical scope disclosed in the present application, which should be included in the protection scope of the present application. Therefore, the protection scope of the present application should be based on the protection scope of the claims.
Claims (29)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202410083047.2A CN120358501A (en) | 2024-01-19 | 2024-01-19 | Secure communication method, device and communication system |
| CN202410083047.2 | 2024-01-19 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2025153074A1 true WO2025153074A1 (en) | 2025-07-24 |
Family
ID=96399266
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2025/073066 Pending WO2025153074A1 (en) | 2024-01-19 | 2025-01-17 | Secure communication method and apparatus, and communication system |
Country Status (2)
| Country | Link |
|---|---|
| CN (1) | CN120358501A (en) |
| WO (1) | WO2025153074A1 (en) |
Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN110830993A (en) * | 2018-08-10 | 2020-02-21 | 华为技术有限公司 | Data processing method and device |
| CN111641582A (en) * | 2019-03-01 | 2020-09-08 | 华为技术有限公司 | A safety protection method and device |
| CN113271558A (en) * | 2021-05-08 | 2021-08-17 | 东方红卫星移动通信有限公司 | Internet of things information transmission method, terminal and system in low-orbit satellite Internet of things |
| CN115868188A (en) * | 2021-07-19 | 2023-03-28 | 北京小米移动软件有限公司 | Method, device, communication equipment and storage medium for transmitting certificate |
| CN116830627A (en) * | 2023-04-07 | 2023-09-29 | 北京小米移动软件有限公司 | Communication method, device, equipment and storage medium |
-
2024
- 2024-01-19 CN CN202410083047.2A patent/CN120358501A/en active Pending
-
2025
- 2025-01-17 WO PCT/CN2025/073066 patent/WO2025153074A1/en active Pending
Patent Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN110830993A (en) * | 2018-08-10 | 2020-02-21 | 华为技术有限公司 | Data processing method and device |
| CN111641582A (en) * | 2019-03-01 | 2020-09-08 | 华为技术有限公司 | A safety protection method and device |
| CN113271558A (en) * | 2021-05-08 | 2021-08-17 | 东方红卫星移动通信有限公司 | Internet of things information transmission method, terminal and system in low-orbit satellite Internet of things |
| CN115868188A (en) * | 2021-07-19 | 2023-03-28 | 北京小米移动软件有限公司 | Method, device, communication equipment and storage medium for transmitting certificate |
| CN116830627A (en) * | 2023-04-07 | 2023-09-29 | 北京小米移动软件有限公司 | Communication method, device, equipment and storage medium |
Also Published As
| Publication number | Publication date |
|---|---|
| CN120358501A (en) | 2025-07-22 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN111586771B (en) | Network node selection method and device | |
| EP4154602B1 (en) | Sidelink adaptation protocol for remote ue connectivity | |
| US20220272620A1 (en) | Apparatus, system and method for enhancements to network slicing and the policy framework of a 5g network | |
| US20240298253A1 (en) | Network Slice for Access of Wireless Device to a Network | |
| US20240022952A1 (en) | Resource Allocation in Non-Public Network | |
| US20220303763A1 (en) | Communication method, apparatus, and system | |
| US20240187963A1 (en) | Dynamic user plane management | |
| CN116709168A (en) | A communication method and device | |
| KR20230011294A (en) | Method and apparatus for transmitting and receiving signals in a wireless communication system | |
| JP2024537675A (en) | Secured Packet Provisioning | |
| US12255829B2 (en) | Data unit processing | |
| WO2022155915A1 (en) | Network intercommunication method and apparatus | |
| WO2023213209A1 (en) | Key management method and communication apparatus | |
| US20250159641A1 (en) | Authentication Security | |
| CN116472757B (en) | Access mode indication method, terminal equipment, application server and network function entity | |
| WO2025167691A1 (en) | Satellite communication method and related device | |
| US20250071808A1 (en) | Multiple Registration Access Security | |
| CN115039390B (en) | Communication control method, device, equipment and storage medium | |
| US20230156839A1 (en) | Methods and Apparatus for Connection Setup of Sidelink Relays | |
| WO2025153074A1 (en) | Secure communication method and apparatus, and communication system | |
| WO2023213191A1 (en) | Security protection method and communication apparatus | |
| CN117835226A (en) | Method and apparatus for wireless communication | |
| CN119032628A (en) | Security establishment method, communication method and device | |
| CN116233957A (en) | A data transmission method and communication device | |
| US20250023740A1 (en) | Multi Access Security Handling |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 25741636 Country of ref document: EP Kind code of ref document: A1 |