[go: up one dir, main page]

WO2025168047A1 - Procédé et appareil de communication sans fil, dispositif, et support de stockage - Google Patents

Procédé et appareil de communication sans fil, dispositif, et support de stockage

Info

Publication number
WO2025168047A1
WO2025168047A1 PCT/CN2025/076192 CN2025076192W WO2025168047A1 WO 2025168047 A1 WO2025168047 A1 WO 2025168047A1 CN 2025076192 W CN2025076192 W CN 2025076192W WO 2025168047 A1 WO2025168047 A1 WO 2025168047A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
key
algorithm
challenge
terminal device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
PCT/CN2025/076192
Other languages
English (en)
Chinese (zh)
Inventor
谢振华
胡力
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Publication of WO2025168047A1 publication Critical patent/WO2025168047A1/fr
Pending legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity
    • H04W12/106Packet or message integrity

Definitions

  • the terminal access network process includes: 1. The two-way authentication process between the terminal and the core network; 2. The Security Mode Control (SMC) process at the NAS level.
  • SMC Security Mode Control
  • the NAS process (SMC process) for enabling NAS security between the terminal and the core network includes: S7.
  • the AMF After the AMF successfully authenticates the terminal, the AMF sends a NAS message (msg) 4 to the terminal, and the msg4 includes: the algorithm information of the encryption algorithm and the algorithm information of the integrity protection algorithm selected by the AMF; S8.
  • the terminal verifies msg4. If the verification is successful, the terminal enables the confidentiality and integrity protection of the NAS message based on the above-selected encryption algorithm and integrity protection algorithm; S9.
  • the terminal sends a NAS message (msg) 5 to the AMF, and the msg5 includes: ciphertext and message authentication code (MAC); S10.
  • the AMF decrypts and performs integrity protection verification on msg5 based on the above-selected encryption algorithm and integrity protection algorithm.
  • the above msg1-msg5 are all NAS messages. It can be seen that currently, the terminal and the core network need to interact for at least 5 steps before the terminal can access the network and transmit information. However, the large number of interaction steps leads to low efficiency of terminal access to the network.
  • the embodiments of the present application provide a wireless communication method, apparatus, device, and storage medium, which can solve the problem of low efficiency of terminal access to the network.
  • a wireless communication method is provided, which is performed by a first terminal device.
  • the method includes: the first terminal device receiving first information; wherein the first information includes: first challenge information;
  • the first terminal device sends the first authentication information and the second information to the first communication node;
  • the second information includes: the third information and the first message integrity verification information; or the second information includes: the fourth information and the second message integrity verification information;
  • the first authentication information is generated based on the first challenge information and the first key
  • the first message integrity check information is generated based on the third key, the third information or the fifth information, and at least one of the following:
  • the second message integrity check information is generated based on the fourth key, the fourth information or the sixth information, and at least one of the following:
  • the sixth information is the encrypted information of the fourth information.
  • a wireless communication method is provided, which is performed by a first communication node.
  • the method includes: the first communication node sending first information by any one of the following:
  • the method further includes:
  • the first communication node receives the first authentication information and the second information sent by the first terminal device;
  • the first information includes: first challenge information
  • the second information includes: the third information and the first message integrity verification information; or the second information includes: the fourth information and the second message integrity verification information;
  • the first communication node performs a first operation and a second operation
  • the first operation includes verifying the first authentication information based on the third authentication information
  • the second operation includes at least one of the following:
  • the third authentication information is generated based on the first key and the first challenge information, and the first key is known to the first terminal device.
  • a wireless communication method is provided, which is performed by a first terminal device.
  • the method includes: the first terminal device receiving first information; wherein the first information includes: first challenge information;
  • the first terminal device sends second information to the first communication node
  • the second information includes: the third information and the first message integrity verification information; or the second information includes: the fourth information and the second message integrity verification information;
  • the third information is generated by encrypting the fifth information based on the second key
  • the first message integrity check information is generated based on the third key, the third information or the fifth information, and the first challenge information;
  • the second message integrity verification information is generated based on the fourth key, the fourth information or the sixth information, and the first challenge information;
  • the sixth information is the encrypted information of the fourth information.
  • a wireless communication method is provided, which is performed by a first communication node.
  • the method includes: the first communication node sending first information by any one of the following:
  • the method further includes:
  • the first communication node receives second information sent by the first terminal device
  • the first information includes: first challenge information
  • the second information includes: the third information and the first message integrity verification information; or the second information includes: the fourth information and the second message integrity verification information;
  • the first communication node performs a target operation
  • the target operation includes at least one of the following:
  • the second information includes: the third information and the first message integrity verification information; or the second information includes: the fourth information and the second message integrity verification information;
  • a wireless communication device comprising: a communication module and a processing module;
  • Communication modules are used for:
  • the communication module is further configured to:
  • the first information includes: first challenge information
  • the second information includes: the third information and the first message integrity verification information; or the second information includes: the fourth information and the second message integrity verification information;
  • the processing module is used to:
  • the first information includes: first challenge information;
  • the second information includes: the third information and the first message integrity verification information; or the second information includes: the fourth information and the second message integrity verification information;
  • the third information is generated by encrypting the fifth information based on the second key
  • the first information includes: first challenge information
  • the communication interface After the communication interface sends the first information, the communication interface is further used to: receive the first authentication information and the second information sent by the first terminal device;
  • the first information includes: first challenge information
  • the second information includes: the third information and the first message integrity verification information; or the second information includes: the fourth information and the second message integrity verification information;
  • the processor is configured to perform a first operation and a second operation
  • the first operation includes verifying the first authentication information based on the third authentication information
  • the second operation includes at least one of the following:
  • the fifth information is generated by decrypting the third information based on the second key
  • the sixth information is the encrypted information of the fourth information
  • the third authentication information is generated based on the first key and the first challenge information, and the first key is known to the first terminal device.
  • a communication device including a processor and a communication interface, wherein the communication interface is configured to:
  • the communication interface is further used to:
  • the first information includes: first challenge information
  • the second information includes: the third information and the first message integrity verification information; or the second information includes: the fourth information and the second message integrity verification information;
  • the processor is used to:
  • the target operation includes at least one of the following:
  • the fourth information can be understood as plain text, and the sixth information can be understood as cipher text of the fourth information, but is not limited thereto.
  • the second message integrity check information is also referred to as a second message authentication code (MAC), but is not limited thereto.
  • MAC second message authentication code
  • the second message integrity check information is generated based on the fourth key, the sixth information, and at least one of the following: the first challenge information; the first authentication information.
  • the calculation parameters of the second message integrity check information include: the fourth key, the fourth information, and at least one of the following: the first challenge information; the first authentication information.
  • the calculation parameters of the second message integrity check information include: the fourth key, the sixth information, and at least one of the following: the first challenge information; the first authentication information.
  • the fourth key may be an integrity protection key.
  • the third authentication information is also used for the first communication node to authenticate the first terminal device.
  • the difference between the third authentication information and the first authentication information is that the first authentication information is the authentication information calculated by the first terminal device, and the third authentication information is the authentication information calculated by the UDM.
  • the third authentication information is XRES or the hash value of XRES (HRES).
  • the first communication node verifies the first authentication information based on the third authentication information, including: the first communication node can compare whether the first authentication information is consistent with the third authentication information; if they are consistent, the first communication node determines that the authentication of the first terminal device is successful; if they are inconsistent, the first communication node determines that the authentication of the first terminal device has failed.
  • the first key and the subsequent fifth key are keys that are known in advance by the first terminal device and the core network side.
  • they can be derived from one or two keys that are known in advance by both parties, or they can be pre-configured on both parties.
  • the second key, third key, fourth key, sixth key and seventh key are all derived from the first key or the fifth key in an agreed/prescribed manner, so the two parties do not need to exchange the second key, third key, fourth key, sixth key and seventh key.
  • An embodiment of the present application provides a wireless communication method, wherein if S310 includes: S310-1A, then before executing S310-1A, the first terminal device may send an identifier of the first terminal device to the first communication node so that the first communication node can send the first information to the first terminal device.
  • the identifier of the first terminal device and the first information can both be understood as NAS messages, and the second information in S320 can also be a NAS message. Therefore, it can be seen that the wireless communication method provided by this implementable method includes three NAS messages. In other words, the first terminal device and the core network can interact in three steps before the first terminal device can access the network and transmit information.
  • S310 includes: S310-1B and S310-2B
  • the first information cannot be understood as a NAS message
  • the second information in S320 can be a NAS message.
  • the wireless communication method provided by this implementable method includes 1 NAS message.
  • the first terminal device can interact with the core network in 1 step, and the first terminal device can then access the network and transmit information. Since the interaction steps between the first terminal device and the core network are reduced, the efficiency of the first terminal device accessing the network can be improved.
  • the second information also includes at least one of the following: an identifier of the first terminal device, second challenge information, and first algorithm information; wherein the first algorithm information is used to indicate at least one of the following: an encryption algorithm, an integrity protection algorithm, a key derivation algorithm, and an authentication information generation algorithm.
  • the second challenge information is also referred to as second random information or a second random number (RAND2), etc., but is not limited thereto, such as character string information, sequentially increasing or decreasing quantity information, etc.
  • the first algorithm information is algorithm information of at least one of the following used by the first terminal device: an encryption algorithm, an integrity protection algorithm, a key derivation algorithm, and an authentication information generation algorithm.
  • the integrity protection algorithm is used to perform integrity protection on information, and can be used to calculate MAC, for example.
  • the key derivation algorithm is used to generate derived keys.
  • the second key, the third key, the fourth key, and at least one of the sixth key and the seventh key to be mentioned below can be generated based on the first key and the key derivation algorithm.
  • the authentication information generation algorithm is used to generate authentication information, for example, to generate the first authentication information or the second authentication information.
  • a first implementation method is that after the first terminal device sends the first authentication information to the first communication node, and before the first terminal device sends the second information to the first communication node, the wireless communication method also includes: the first terminal device receives seventh information from the first communication node; based on this, the first terminal device sends the second information to the first communication node, including: the first terminal device sends the second information to the first communication node based on the seventh information; wherein the seventh information includes at least one of the following: second authentication information, second algorithm information, ninth information, and third message integrity verification information.
  • the second authentication information is used for the first terminal device to authenticate the first communication node.
  • the second authentication information is an authentication token (AUTN).
  • the second algorithm information is used to indicate the algorithm supported, allowed or selected by the first communication node, and the algorithm supported, allowed or selected by the first communication node includes at least one of the following: encryption algorithm, integrity protection algorithm, key derivation algorithm, authentication information generation algorithm.
  • the ninth information may be plaintext or ciphertext, and may be, but is not limited to, application/service data sent by the first communication node.
  • the application data may be, for example, carried by, but is not limited to, an Application Container (AC) field.
  • AC Application Container
  • third message integrity check information is also referred to as a third message authentication code (MAC), but is not limited thereto.
  • MAC third message authentication code
  • the third message integrity check information is generated based on the seventh key, the ninth information or the eleventh information, and at least one of the following: the first challenge information, the second challenge information, the first authentication information, the second authentication information, the identification of the first terminal device, the first algorithm information, and the second algorithm information.
  • the third message integrity check information is generated based on the seventh key, the ninth information or the eleventh information, and at least one of the following: the first challenge information, the second challenge information, the first authentication information, the second authentication information, the identifier of the first terminal device, the first algorithm information, and the second algorithm information, including two cases:
  • the third message integrity verification information is generated based on the seventh key, the ninth information, and at least one of the following: the first challenge information, the second challenge information, the first authentication information, the second authentication information, the identification of the first terminal device, the first algorithm information, and the second algorithm information.
  • the third message integrity verification information is generated based on the seventh key, the eleventh information, and at least one of the following: the first challenge information, the second challenge information, the first authentication information, the second authentication information, the identification of the first terminal device, the first algorithm information, and the second algorithm information.
  • the calculation parameters of the third message integrity check information include: the seventh key, the ninth information, and at least one of the following: the first challenge information, the second challenge information, the first authentication information, the second authentication information, the identification of the first terminal device, the first algorithm information, and the second algorithm information.
  • the calculation parameters of the third message integrity check information include: the seventh key, the eleventh information, and at least one of the following: the first challenge information, the second challenge information, the first authentication information, the second authentication information, the identification of the first terminal device, the first algorithm information, and the second algorithm information.
  • the seventh key may be an integrity protection key.
  • the eleventh information is the ciphertext corresponding to the ninth information.
  • the eleventh information is the plain text corresponding to the ninth information.
  • the first terminal device when the seventh information includes: second authentication information, the first terminal device sends the second information to the first communication node based on the seventh information, including: the first terminal device sends the second information to the first communication node based on the authentication result of the second authentication information.
  • the first terminal device when the seventh information includes: second algorithm information, the first terminal device sends the second information to the first communication node based on the seventh information, including: the first terminal device selects the first algorithm information in the second algorithm information and sends the first algorithm information to the first communication node.
  • the first terminal device when the seventh information includes: the ninth information and the third message integrity verification information, the first terminal device sends the second information to the first communication node based on the seventh information, including: the first terminal device verifies the third message integrity verification information based on the ninth information, and when the third message integrity verification information is successfully verified, sends the second information to the first communication node.
  • the first information further includes at least one of the following: second authentication information and second algorithm information.
  • the wireless communication method when the first information also includes at least one of the following: second authentication information, second algorithm information, the wireless communication method also includes: the first terminal device receives tenth information sent by the first communication node; wherein the tenth information includes: ninth information, third message integrity verification information.
  • a third implementation method is that the wireless communication method further includes: the first terminal device receives the eighth information sent by the first communication node; wherein the eighth information includes at least one of the following: second authentication information, second algorithm information, ninth information, and third message integrity verification information.
  • the wireless communication method further includes: the first terminal device performing at least one of the following:
  • the eleventh information is the encrypted ninth information, or the eleventh information is the encrypted ninth information;
  • the fifth key is known by the first terminal device.
  • the second authentication information is generated based on the fifth key and at least one of the following: the first challenge information, the second challenge information, the identifier of the first terminal device, the first algorithm information, and the second algorithm information; or,
  • the third message integrity check information is generated based on the seventh key and the ninth information; or,
  • the third message integrity check information is generated based on the seventh key and the eleventh information; or,
  • the ninth information is generated by encrypting based on the sixth key
  • the eleventh information is the encrypted ninth information, or the eleventh information is the encrypted ninth information;
  • the fifth key is known by the first terminal device.
  • the fifth key is used to generate the second authentication information.
  • the fifth key is a shared key between the first terminal device and the UDM, or in other words, the fifth key is a shared key between the first terminal device and the core network side.
  • the fifth key may be the same as or different from the first key, and this embodiment of the present application does not impose any limitation on this.
  • verifying the third message integrity verification information based on the seventh key and the ninth information includes: verifying the third message integrity verification information based on the seventh key, the ninth information and at least one of the following: the first challenge information, the second challenge information, the first authentication information, the second authentication information, the identification of the first terminal device, the first algorithm information, and the second algorithm information.
  • verifying the third message integrity verification information based on the seventh key and the eleventh information includes: verifying the third message integrity verification information based on the seventh key, the eleventh information and at least one of the following: the seventh key, the first challenge information, the second challenge information, the first authentication information, the second authentication information, the identification of the first terminal device, the first algorithm information, and the second algorithm information.
  • the third message integrity verification information is also generated based on at least one of the following: the first challenge information, the second challenge information, the first authentication information, the second authentication information, the identifier of the first terminal device, the first algorithm information, and the second algorithm information.
  • decrypting the ninth information based on the sixth key includes: decrypting the ninth information based on the sixth key and at least one of the following: first challenge information, second challenge information, first authentication information, second authentication information, identification of the first terminal device, first algorithm information, and second algorithm information.
  • the ninth information is also generated based on encryption of at least one of the following: the first challenge information, the second challenge information, the first authentication information, the second authentication information, the identifier of the first terminal device, the first algorithm information, and the second algorithm information.
  • the second key is the first key, or the fifth key, or a derivative of the first key, or a derivative of the fifth key.
  • the third key is the first key, or the fifth key, or a derivative key of the first key, or a derivative key of the fifth key.
  • the fourth key is the first key, or the fifth key, or a derivative of the first key, or a derivative of the fifth key.
  • the sixth key is the first key, or the fifth key, or a derivative key of the first key, or a derivative key of the fifth key.
  • the seventh key is the first key, or the fifth key, or a derivative key of the first key, or a derivative key of the fifth key.
  • the second key is further generated based on at least one of the following: first challenge information, first authentication information, second challenge information, second authentication information, an identifier of the first terminal device, first algorithm information, and second algorithm information.
  • the third key is also generated based on at least one of the following: first challenge information, first authentication information, second challenge information, second authentication information, an identifier of the first terminal device, first algorithm information, and second algorithm information.
  • the fourth key is also generated based on at least one of the following: first challenge information, first authentication information, second challenge information, second authentication information, an identifier of the first terminal device, first algorithm information, and second algorithm information.
  • the sixth key is further derived based on at least one of the following: first challenge information, first authentication information, second challenge information, second authentication information, an identifier of the first terminal device, first algorithm information, and second algorithm information.
  • the seventh key is further derived based on at least one of the following: first challenge information, first authentication information, second challenge information, second authentication information, an identifier of the first terminal device, first algorithm information, and second algorithm information.
  • the first authentication information is further generated based on at least one of the following: second challenge information, an identifier of the first terminal device, first algorithm information, and second algorithm information.
  • the first message integrity check information is further generated based on at least one of the following: second authentication information, second challenge information, an identifier of the first terminal device, first algorithm information, and second algorithm information.
  • the wireless communication method further includes: the first communication node also verifies the first message integrity verification information based on at least one of the following: second authentication information, second challenge information, the identifier of the first terminal device, the first algorithm information, and the second algorithm information.
  • the second message integrity check information is further generated based on at least one of the following: second authentication information, second challenge information, an identifier of the first terminal device, first algorithm information, and second algorithm information.
  • the wireless communication method further includes: the first communication node also verifies the second message integrity verification information based on at least one of the following: second authentication information, second challenge information, the identifier of the first terminal device, the first algorithm information, and the second algorithm information.
  • the third authentication information is further generated based on at least one of the following: the second challenge information, the identifier of the first terminal device, the first algorithm information, and the second algorithm information.
  • the third information is also generated based on encryption of at least one of the following: first challenge information, first authentication information, second challenge information, second authentication information, an identifier of the first terminal device, first algorithm information, and second algorithm information.
  • the wireless communication method further includes: the first communication node also decrypts the third information based on at least one of the following: first challenge information, first authentication information, second challenge information, second authentication information, the identification of the first terminal device, first algorithm information, and second algorithm information.
  • An embodiment of the present application provides a wireless communication method, wherein, based on the method embodiment corresponding to FIG3 , in an implementable manner, after the first terminal device sends the first authentication information to the first communication node, and before the first terminal device sends the second information to the first communication node, the wireless communication method further includes: the first terminal device receives the seventh information from the first communication node; based on this, the first terminal device sends the second information to the first communication node, including: the first terminal device sends the second information to the first communication node based on the seventh information.
  • the seventh information can be understood as a NAS message.
  • the first terminal device and the core network can interact in 4 or 2 steps, and the first terminal device can then access the network and transmit information. Since the interaction steps between the first terminal device and the core network are reduced, the efficiency of the first terminal device accessing the network can be improved.
  • the first information also includes at least one of the following: second authentication information, second algorithm information.
  • the first terminal device and the core network can interact for 3 or 1 steps before the first terminal device can access the network and transmit information. Since the interaction steps between the first terminal device and the core network are reduced, the efficiency of the first terminal device accessing the network can be improved.
  • the wireless communication method also includes: the first terminal device receives the tenth information sent by the first communication node; wherein the tenth information includes: ninth information, third message integrity verification information.
  • the wireless communication method further includes: the first terminal device receiving eighth information sent by the first communication node; wherein the eighth information includes at least one of the following: second authentication information, second algorithm information, ninth information, and third message integrity check information. If the eighth information is understood as an NAS message, in conjunction with the method embodiment corresponding to FIG3 , the first terminal device and the core network can interact in four or two steps before the first terminal device can access the network and transmit information. Since the number of interaction steps between the first terminal device and the core network is reduced, the efficiency of the first terminal device's network access can be improved.
  • Example 1 a first shared key, namely, a first key, exists between the first terminal device and the UDM.
  • FIG4 is an interactive flow chart of another wireless communication method provided in an embodiment of the present application. As shown in FIG4 , the wireless communication method includes:
  • the first terminal device sends first information to the first communication node, where the first information includes: first challenge information, and optionally, the first information may further include: second algorithm information;
  • the first terminal device calculates first authentication information based on the first key and the first challenge information
  • the first terminal device encrypts the fifth information based on the second key to obtain third information, and generates first message integrity check information based on the third key, the third information or the fifth information, and at least one of the following: first challenge information and first authentication information; or generates second message integrity check information based on the fourth key, the fourth information or the sixth information, and at least one of the following: the first challenge information and the first authentication information;
  • the first terminal device sends first authentication information and second information, where the second information includes: third information and first message integrity verification information; or the second information includes: fourth information and second message integrity verification information; optionally, the second information further includes at least one of the following: an identifier of the first terminal device, second challenge information, and first algorithm information;
  • S450 The first communication node performs the first operation and the second operation
  • the first operation includes verifying the first authentication information based on the third authentication information
  • the second operation includes at least one of the following:
  • the second message integrity verification information is verified based on the fourth key, the fourth information or the sixth information, and at least one of the following: the first challenge information, the first authentication information.
  • the first authentication information and the second information can be transmitted through a NAS message, that is, the wireless communication method provided in Example 1 includes a NAS interaction, then the first terminal device and the core network can interact for one step, and the first terminal device can then access the network and transmit information. Since the interaction steps between the first terminal device and the core network are reduced, the efficiency of the first terminal device accessing the network can be improved.
  • Example 2 There is a first shared key, i.e., a first key, between the first terminal device and the UDM.
  • FIG5 is an interaction flow chart of another wireless communication method provided in an embodiment of the present application. As shown in FIG5 , the wireless communication method includes:
  • the first terminal device sends first information, including: first challenge information;
  • the first terminal device calculates first authentication information based on the first key and the first challenge information
  • the first terminal device sends first authentication information and an identifier of the first terminal device
  • S540 The first communication node verifies the first authentication information based on the third authentication information
  • the first communication node sends seventh information, including second authentication information.
  • the seventh information may further include second algorithm information.
  • the first terminal device verifies the second authentication information and, if the verification is successful, encrypts the fifth information based on the second key to obtain third information, and generates first message integrity check information based on the third key, the third information or the fifth information, and at least one of the following: the first challenge information and the first authentication information; or generates second message integrity check information based on the fourth key, the fourth information or the sixth information, and at least one of the following: the first challenge information and the first authentication information.
  • the first terminal device sends second information, where the second information includes: the third information and the first message integrity verification information; or the second information includes: the fourth information and the second message integrity verification information; optionally, the second information further includes at least one of the following: an identifier of the first terminal device, the second challenge information, and the first algorithm information;
  • S580 The first communication node performs a second operation
  • the second operation includes at least one of the following:
  • the second message integrity verification information is verified based on the fourth key, the fourth information or the sixth information, and at least one of the following: the first challenge information, the first authentication information.
  • the first authentication information and the identification of the first terminal device can be transmitted through a NAS message
  • the seventh information can be a NAS message
  • the second information can also be a NAS message. That is to say, the wireless communication method provided in Example 2 includes three NAS interactions, so the first terminal device and the core network can interact for 3 steps, and the first terminal device can then access the network and transmit information. Since the interaction steps between the first terminal device and the core network are reduced, the efficiency of the first terminal device accessing the network can be improved.
  • Example 3 There is a first shared key, i.e., a first key, between the first terminal device and the UDM.
  • FIG6 is an interaction flow chart of another wireless communication method provided in an embodiment of the present application. As shown in FIG6 , the wireless communication method includes:
  • the first terminal device sends an identifier of the first terminal device
  • the first communication node sends first information, including: first challenge information.
  • the first information may further include at least one of the following: second authentication information and second algorithm information.
  • the first terminal device calculates first authentication information based on the first key and the first challenge information
  • the first terminal device verifies the second authentication information and, if the verification is successful, encrypts the fifth information based on the second key to obtain third information, and generates first message integrity check information based on the third key, the third information or the fifth information, and at least one of the following: the first challenge information and the first authentication information; or generates second message integrity check information based on the fourth key, the fourth information or the sixth information, and at least one of the following: the first challenge information and the first authentication information.
  • the first terminal device sends first authentication information and second information, where the second information includes: third information and first message integrity verification information; or the second information includes: fourth information and second message integrity verification information; optionally, the second information further includes at least one of the following: second challenge information and first algorithm information;
  • S660 The first communication node performs the first operation and the second operation
  • the first operation includes verifying the first authentication information based on the third authentication information
  • the second operation includes at least one of the following:
  • the second message integrity verification information is verified based on the fourth key, the fourth information or the sixth information, and at least one of the following: the first challenge information, the first authentication information.
  • the identification of the first terminal device can be transmitted through a NAS message
  • the first information can be a NAS message
  • the second information and the first authentication information can also be transmitted through a NAS message. That is to say, the wireless communication method provided in Example 3 includes three NAS interactions, so the first terminal device and the core network can interact for 3 steps, and the first terminal device can then access the network and transmit information. Since the interaction steps between the first terminal device and the core network are reduced, the efficiency of the first terminal device accessing the network can be improved.
  • FIG7 is an interactive flow chart of a wireless communication method provided in an embodiment of the present application. As shown in FIG7 , the method includes:
  • the first communication node sends first information to the first terminal device; wherein the first information includes: first challenge information; or,
  • the first communication node sends first information to the second communication node, wherein the first information includes: first challenge information;
  • S710-2B The second communication node forwards or broadcasts the first information
  • the first terminal device sends second information to the first communication node; wherein the second information includes: third information and first message integrity verification information; or the second information includes: fourth information and second message integrity verification information; wherein the third information is generated by encrypting the fifth information based on the second key; wherein the first message integrity verification information is generated based on the third key, the third information or the fifth information, and the first challenge information; wherein the second message integrity verification information is generated based on the fourth key, the fourth information or the sixth information, and the first challenge information;
  • S730 The first communication node performs a target operation
  • the target operation includes at least one of the following:
  • the second message integrity verification information is verified based on the fourth key, the fourth information or the sixth information, and the first challenge information.
  • S710 - 1A is one possible implementation manner for the first communication node to send the first information
  • S710 - 1B and S710 - 2B constitute another possible implementation manner for the first communication node to send the first information.
  • the first terminal device may send an identifier of the first terminal device to the first communication node, so that the first communication node can send the first information to the first terminal device.
  • both the identifier of the first terminal device and the first information can be understood as NAS messages, that is, the first terminal device can transparently transmit the identifier of the first terminal device to the first communication node via the second communication node, and the first communication node can transparently transmit the first information to the first terminal device via the second communication node.
  • the first communication node before executing S710 - 1B, fails to obtain the identification of the first terminal device, and therefore, it may send the first information to the second communication node so that the second communication node forwards or broadcasts the first information.
  • the first communication node may also be referred to as a first communication device, a first communication entity, etc., but is not limited thereto.
  • the first communication node may be an AMF entity, a UDM entity, an AUSF entity, etc., but is not limited thereto.
  • the second communication node may also be referred to as a second communication device, a second communication entity, etc., but is not limited thereto.
  • the second communication node is a base station system, a second terminal device, or other access network device, etc., but is not limited thereto.
  • the base station system may include one or more base stations.
  • first challenge information is also referred to as first random information or a first random number (RAND1), etc., but is not limited thereto.
  • the third information can be understood as ciphertext
  • the fifth information can be understood as the plaintext corresponding to the third information, but is not limited thereto.
  • first message integrity check information is also referred to as a first message authentication code (MAC), but is not limited thereto.
  • MAC first message authentication code
  • the first message integrity check information is generated based on the third key, the third information or the fifth information, and the first challenge information in two cases:
  • Case 1 The first message integrity verification information is generated based on the third key, the third information, and the first challenge information.
  • Case 2 The first message integrity verification information is generated based on the third key, the fifth information, and the first challenge information.
  • the calculation parameters of the first message integrity check information include: the third key, the third information and the first challenge information.
  • the calculation parameters of the first message integrity check information include: the third key, the fifth information and the first challenge information.
  • the third key may be an integrity protection key.
  • sixth information can be understood as ciphertext
  • fourth information can be understood as plaintext corresponding to the sixth information, but is not limited thereto.
  • the second message integrity check information is also referred to as a second message authentication code (MAC), but is not limited thereto.
  • MAC second message authentication code
  • the second message integrity check information is generated based on the fourth key, the fourth information or the sixth information, and the first challenge information in two cases:
  • Case 1 The second message integrity verification information is generated based on the fourth key, the fourth information, and the first challenge information.
  • Case 2 The second message integrity verification information is generated based on the fourth key, the sixth information, and the first challenge information.
  • the calculation parameters of the second message integrity check information include: the fourth key, the fourth information, and the first challenge information.
  • the calculation parameters of the second message integrity check information include: the fourth key, the sixth information, and the first challenge information.
  • the fourth key may be an integrity protection key.
  • the first key is a shared key between the first terminal device and the first communication node, or in other words, the first key is a shared key between the first terminal device and the core network side.
  • the difference between the method embodiment corresponding to Figure 7 and the method embodiment corresponding to Figure 3 is that the function of the first challenge information is different.
  • the first challenge information can be used to generate first message integrity verification information or second message integrity verification information.
  • the first challenge information can be used to generate first authentication information, and then used to authenticate the first terminal device.
  • An embodiment of the present application provides a wireless communication method, wherein if S710 includes: S710-1A, then before executing S710-1A, the first terminal device may send an identifier of the first terminal device to the first communication node so that the first communication node can send the first information to the first terminal device.
  • the identifier of the first terminal device and the first information can both be understood as NAS messages, and the second information in S720 can also be a NAS message. Therefore, it can be seen that the wireless communication method provided by this implementable method includes three NAS messages. In other words, the first terminal device and the core network can interact in three steps before the first terminal device can access the network and transmit information.
  • S710 includes: S710-1B and S710-2B
  • the first information cannot be understood as a NAS message
  • the second information in S720 can be a NAS message.
  • the wireless communication method provided by this implementable method includes 1 NAS message.
  • the first terminal device can interact with the core network in 1 step, and the first terminal device can then access the network and transmit information. Since the interaction steps between the first terminal device and the core network are reduced, the efficiency of the first terminal device accessing the network can be improved.
  • the second information also includes at least one of the following: an identifier of the first terminal device, second challenge information, and first algorithm information; wherein the first algorithm information is used to indicate at least one of the following: an encryption algorithm, an integrity protection algorithm, a key derivation algorithm, and an authentication information generation algorithm.
  • the second challenge information is also referred to as second random information or a second random number (RAND2), etc., but is not limited thereto.
  • the first algorithm information is algorithm information of at least one of the following used by the first terminal device: an encryption algorithm, an integrity protection algorithm, a key derivation algorithm, and an authentication information generation algorithm.
  • the integrity protection algorithm is used to perform integrity protection on information, and can be used to calculate MAC, for example.
  • the key derivation algorithm is used to generate derived keys.
  • the second key, the third key, the fourth key, and at least one of the sixth key and the seventh key to be mentioned below can be generated based on the first key and the key derivation algorithm.
  • a first achievable method is that before the first terminal device sends the second information to the first communication node, the wireless communication method also includes: the first terminal device receives seventh information from the first communication node; based on this, the first terminal device sends the second information to the first communication node, including: the first terminal device sends the second information to the first communication node based on the seventh information; wherein the seventh information includes at least one of the following: second authentication information, second algorithm information.
  • the second authentication information is used for the first terminal device to authenticate the first communication node.
  • the second authentication information is an authentication token (AUTN).
  • the second algorithm information is used to indicate the algorithm supported, allowed or selected by the first communication node, and the algorithm supported, allowed or selected by the first communication node includes at least one of the following: encryption algorithm, integrity protection algorithm, key derivation algorithm, authentication information generation algorithm.
  • the first terminal device when the seventh information includes: second algorithm information, the first terminal device sends the second information to the first communication node based on the seventh information, including: the first terminal device selects the first algorithm information in the second algorithm information and sends the first algorithm information to the first communication node.
  • the wireless communication method when the first terminal device sends the second information to the first communication node based on the seventh information, the wireless communication method further includes: the first terminal device receiving tenth information sent by the first communication node; wherein the tenth information includes the ninth information and the third message integrity check information.
  • the first terminal device receiving the tenth information sent by the first communication node may be performed after the first terminal device sends the second information, but is not limited thereto.
  • the ninth information may be plain text or cipher text, and may be application/service data sent by the first communication node, but is not limited thereto.
  • the application data may be carried, for example, by the AC field, but is not limited thereto.
  • third message integrity check information is also referred to as a third message authentication code (MAC), but is not limited thereto.
  • MAC third message authentication code
  • the third message integrity check information is generated based on the seventh key, the ninth information or the eleventh information, and at least one of the following: the first challenge information, the second challenge information, the authentication information, the identifier of the first terminal device, the first algorithm information, and the second algorithm information.
  • the third message integrity verification information is generated based on the seventh key, the ninth information, and at least one of the following: the first challenge information, the second challenge information, the authentication information, the identifier of the first terminal device, the first algorithm information, and the second algorithm information.
  • the calculation parameters of the third message integrity check information include: the seventh key, the ninth information, and at least one of the following: the first challenge information, the second challenge information, the authentication information, the identification of the first terminal device, the first algorithm information, and the second algorithm information.
  • the calculation parameters of the third message integrity check information include: the seventh key, the eleventh information, and at least one of the following: the first challenge information, the second challenge information, the authentication information, the identification of the first terminal device, the first algorithm information, and the second algorithm information.
  • the seventh key may be an integrity protection key.
  • the eleventh information is the encrypted ninth information, or the eleventh information is the encrypted ninth information;
  • the fifth key is known by the first terminal device.
  • the authentication information is generated based on the fifth key and at least one of the following: the first challenge information, the second challenge information, the identifier of the first terminal device, the first algorithm information, and the second algorithm information; or,
  • the third message integrity check information is generated based on the seventh key and the ninth information; or,
  • the third message integrity check information is generated based on the seventh key and the eleventh information; or,
  • the ninth information is generated by encrypting based on the sixth key
  • the eleventh information is the encrypted ninth information, or the eleventh information is the encrypted ninth information;
  • the fifth key is known by the first terminal device.
  • the fifth key is used to generate the authentication information.
  • the fifth key is a shared key between the first terminal device and the first communication node, or in other words, the fifth key is a shared key between the first terminal device and the core network side.
  • the fifth key may be the same as or different from the first key, and this embodiment of the present application does not impose any limitation on this.
  • verifying the third message integrity verification information based on the seventh key and the ninth information includes: verifying the third message integrity verification information based on the seventh key, the ninth information and at least one of the following: first challenge information, second challenge information, authentication information, identification of the first terminal device, first algorithm information, and second algorithm information.
  • verifying the third message integrity verification information based on the seventh key and the eleventh information includes: verifying the third message integrity verification information based on the seventh key, the eleventh information and at least one of the following: the seventh key, the first challenge information, the second challenge information, the authentication information, the identification of the first terminal device, the first algorithm information, and the second algorithm information.
  • the third message integrity verification information is also generated based on at least one of the following: the first challenge information, the second challenge information, the authentication information, the identifier of the first terminal device, the first algorithm information, and the second algorithm information.
  • decrypting the ninth information based on the sixth key includes: decrypting the ninth information based on the sixth key and at least one of the following: first challenge information, second challenge information, authentication information, identification of the first terminal device, first algorithm information, and second algorithm information.
  • the ninth information is also generated based on encryption of at least one of the following: the first challenge information, the second challenge information, the authentication information, the identifier of the first terminal device, the first algorithm information, and the second algorithm information.
  • the second key is the first key, or the fifth key, or a derivative of the first key, or a derivative of the fifth key.
  • the third key is the first key, or the fifth key, or a derivative key of the first key, or a derivative key of the fifth key.
  • the fourth key is the first key, or the fifth key, or a derivative of the first key, or a derivative of the fifth key.
  • the sixth key is the first key, or the fifth key, or a derivative key of the first key, or a derivative key of the fifth key.
  • the seventh key is the first key, or the fifth key, or a derivative key of the first key, or a derivative key of the fifth key.
  • the second key is further generated based on at least one of the following: the first challenge information, the second challenge information, the authentication information, the identifier of the first terminal device, the first algorithm information, and the second algorithm information.
  • the third key is further generated based on at least one of the following: the first challenge information, the second challenge information, the authentication information, the identifier of the first terminal device, the first algorithm information, and the second algorithm information.
  • the fourth key is further generated based on at least one of the following: the first challenge information, the second challenge information, the authentication information, the identifier of the first terminal device, the first algorithm information, and the second algorithm information.
  • the sixth key is further derived based on at least one of the following: the first challenge information, the second challenge information, the authentication information, the identifier of the first terminal device, the first algorithm information, and the second algorithm information.
  • the seventh key is further derived based on at least one of the following: the first challenge information, the second challenge information, the authentication information, the identifier of the first terminal device, the first algorithm information, and the second algorithm information.
  • the first message integrity check information is further generated based on at least one of the following: authentication information, second challenge information, an identifier of the first terminal device, first algorithm information, and second algorithm information.
  • the wireless communication method further includes: the first communication node also verifies the first message integrity verification information based on at least one of the following: authentication information, second challenge information, identification of the first terminal device, first algorithm information, and second algorithm information.
  • the second message integrity check information is further generated based on at least one of the following: authentication information, second challenge information, an identifier of the first terminal device, first algorithm information, and second algorithm information.
  • the wireless communication method further includes: the first communication node also verifies the second message integrity verification information based on at least one of the following: authentication information, second challenge information, identification of the first terminal device, first algorithm information, and second algorithm information.
  • the third information is also generated by encryption based on at least one of the following: first challenge information, second challenge information, authentication information, an identifier of the terminal device, first algorithm information, and second algorithm information.
  • the wireless communication method further includes: the first communication node also decrypts the third information based on at least one of the following: first challenge information, second challenge information, authentication information, identification of the first terminal device, first algorithm information, and second algorithm information.
  • An embodiment of the present application provides a wireless communication method, wherein, based on the method embodiment corresponding to FIG7 , in an implementable manner, before the first terminal device sends the second information to the first communication node, the wireless communication method further includes: the first terminal device receives seventh information from the first communication node; based on this, the first terminal device sends the second information to the first communication node, including: the first terminal device sends the second information to the first communication node based on the seventh information.
  • the seventh information can be understood as a NAS message.
  • the first terminal device and the core network can interact in 4 or 2 steps, and the first terminal device can then access the network and transmit information. Since the interaction steps between the first terminal device and the core network are reduced, the efficiency of the first terminal device accessing the network can be improved.
  • the wireless communication method further includes: the first terminal device receiving eighth information sent by the first communication node; wherein the eighth information includes at least one of the following: authentication information, second algorithm information, ninth information, and third message integrity check information. If the eighth information is understood as an NAS message, in conjunction with the method embodiment corresponding to FIG7 , the first terminal device and the core network can interact in four or two steps before the first terminal device can access the network and transmit information. Since the number of interaction steps between the first terminal device and the core network is reduced, the efficiency of the first terminal device's network access can be improved.
  • the core idea of the embodiment of the present application is to improve the efficiency of the terminal accessing the network by reducing the interaction steps between the terminal and the core network.
  • the terminal may not need to receive the second authentication information
  • the terminal may not need to send the first authentication information
  • the first information received by the terminal may simultaneously carry the first challenge information and at least one of the following information: the second authentication information, the second algorithm information.
  • the following example illustrates the wireless communication method provided in the embodiment of the present application:
  • Example 4 a first shared key, namely a first key, is established between the first terminal device and the UDM.
  • FIG8 is an interactive flow chart of another wireless communication method provided in an embodiment of the present application. As shown in FIG8 , the wireless communication method includes:
  • the first communication node sends first information to the first terminal device, including first challenge information.
  • the first information may further include second algorithm information.
  • the first terminal device encrypts the fifth information based on the second key to obtain third information, and generates first message integrity verification information based on the third key, the third information or the fifth information, and the first challenge information; or generates second message integrity verification information based on the fourth key, the fourth information or the sixth information, and the first challenge information;
  • the first terminal device sends the second information, wherein the second information includes: the third information and the first message integrity verification information; or the second information includes: the fourth information and the second message integrity verification information; optionally, the second information also includes at least one of the following: the identification of the first terminal device, the second challenge information, and the first algorithm information.
  • S840 The first communication device performs a target operation
  • the target operation includes at least one of the following:
  • the second message integrity verification information is verified based on the fourth key, the fourth information or the sixth information, and the first challenge information.
  • the first terminal device can send the second information through a NAS message, that is, the wireless communication method provided in Example 4 includes a NAS interaction, then the first terminal device and the core network can interact for one step, and the first terminal device can then access the network and transmit information. Since the interaction steps between the first terminal device and the core network are reduced, the efficiency of the first terminal device accessing the network can be improved.
  • the wireless communication method provided in the embodiment of the present application can be executed by a wireless communication device.
  • the wireless communication device provided in the embodiment of the present application is described by taking the wireless communication method executed by the wireless communication device as an example.
  • FIG9 is a schematic diagram of a wireless communication device 900 provided in an embodiment of the present application.
  • the device 900 may be a first terminal device.
  • the device 900 includes: a communication module 910 for:
  • the first information includes: first challenge information;
  • the second information includes: the third information and the first message integrity verification information; or the second information includes: the fourth information and the second message integrity verification information;
  • the first authentication information is generated based on the first challenge information and the first key
  • the third information is generated by encrypting the fifth information based on the second key
  • the first message integrity check information is generated based on the third key, the third information or the fifth information, and at least one of the following:
  • the second message integrity check information is generated based on the fourth key, the fourth information or the sixth information, and at least one of the following:
  • the sixth information is the encrypted information of the fourth information.
  • the communication module 910 is specifically configured to:
  • First information is received from a first communication node.
  • the second communication node is a base station system or a second terminal device.
  • the second information also includes at least one of the following: an identifier of the first terminal device, second challenge information, and first algorithm information; wherein the first algorithm information is used to indicate at least one of the following: an encryption algorithm, an integrity protection algorithm, a key derivation algorithm, and an authentication information generation algorithm.
  • the communication module 910 is also used to: receive seventh information from the first communication node after sending the first authentication information to the first communication node and before sending the second information to the first communication node; accordingly, the communication module 910 is specifically used to: send the second information to the first communication node based on the seventh information; wherein the seventh information includes at least one of the following: second authentication information, second algorithm information, ninth information, and third message integrity verification information.
  • the first information further includes at least one of the following: second authentication information, and second algorithm information.
  • the communication module 910 is further used to: receive eighth information sent by the first communication node; wherein the eighth information includes at least one of the following: second authentication information, second algorithm information, ninth information, and third message integrity verification information.
  • the communication module 910 is further configured to: receive tenth information sent by the first communication node; wherein the tenth information includes: the ninth information and the third message integrity check information.
  • the second algorithm information is used to indicate the algorithm supported, allowed or selected by the first communication node, and the algorithm supported, allowed or selected by the first communication node includes at least one of the following: encryption algorithm, integrity protection algorithm, key derivation algorithm, authentication information generation algorithm.
  • the apparatus 900 further includes a processing module 920 configured to perform at least one of the following:
  • the eleventh information is the encrypted ninth information, or the eleventh information is the encrypted ninth information;
  • the fifth key is known by the first terminal device.
  • verifying the third message integrity verification information based on the seventh key and the ninth information includes: verifying the third message integrity verification information based on the seventh key, the ninth information, and at least one of the following: the first challenge information, the second challenge information, the first authentication information, the second authentication information, the identifier of the first terminal device, the first algorithm information, and the second algorithm information; or,
  • Verifying the third message integrity verification information based on the seventh key and the eleventh information includes: verifying the third message integrity verification information based on the seventh key, the eleventh information, and at least one of the following: the seventh key, the first challenge information, the second challenge information, the first authentication information, the second authentication information, the identifier of the first terminal device, the first algorithm information, and the second algorithm information; or
  • Decrypting the ninth information based on the sixth key includes: decrypting the ninth information based on the sixth key and at least one of the following: first challenge information, second challenge information, first authentication information, second authentication information, identification of the first terminal device, first algorithm information, and second algorithm information.
  • the second key is the first key, or the fifth key, or a derived key of the first key, or a derived key of the fifth key; or,
  • the third key is the first key, or the fifth key, or a derived key of the first key, or a derived key of the fifth key; or,
  • the fourth key is the first key, or the fifth key, or a derivative of the first key, or a derivative of the fifth key; or,
  • the sixth key is the first key, or the fifth key, or a derived key of the first key, or a derived key of the fifth key; or,
  • the seventh key is the first key, or the fifth key, or a derived key of the first key, or a derived key of the fifth key.
  • the second key is further generated based on at least one of the following: first challenge information, first authentication information, second challenge information, second authentication information, an identifier of the first terminal device, first algorithm information, and second algorithm information; or,
  • the third key is further generated based on at least one of the following: the first challenge information, the first authentication information, the second challenge information, the second authentication information, the identifier of the first terminal device, the first algorithm information, and the second algorithm information; or
  • the fourth key is further generated based on at least one of the following: the first challenge information, the first authentication information, the second challenge information, the second authentication information, the identifier of the first terminal device, the first algorithm information, and the second algorithm information; or,
  • the sixth key is further derived based on at least one of the following: the first challenge information, the first authentication information, the second challenge information, the second authentication information, the identifier of the first terminal device, the first algorithm information, and the second algorithm information; or,
  • the seventh key is also derived based on at least one of the following: first challenge information, first authentication information, second challenge information, second authentication information, an identifier of the first terminal device, first algorithm information, and second algorithm information.
  • the first authentication information is further generated based on at least one of the following: second challenge information, an identifier of the first terminal device, first algorithm information, and second algorithm information; or,
  • the first message integrity check information is further generated based on at least one of the following: the second authentication information, the second challenge information, the identifier of the first terminal device, the first algorithm information, and the second algorithm information; or
  • the second message integrity verification information is also generated based on at least one of the following: second authentication information, second challenge information, an identifier of the first terminal device, first algorithm information, and second algorithm information.
  • the third information is also generated based on encryption of at least one of the following: first challenge information, first authentication information, second challenge information, second authentication information, an identifier of the first terminal device, first algorithm information, and second algorithm information.
  • the wireless communication device in the embodiments of the present application may be an electronic device, such as an electronic device with an operating system, or a component in an electronic device, such as an integrated circuit or a chip.
  • the electronic device may be a terminal, or may be another device other than a terminal.
  • the terminal may include but is not limited to the types of the first terminal devices listed above, and the other devices may be a server, a network attached storage (NAS), etc., which are not specifically limited in the embodiments of the present application.
  • the wireless communication device provided in the embodiment of the present application can implement the various processes implemented by the first terminal device in the method embodiments shown in Figures 3 to 6, and achieve the same technical effects. To avoid repetition, they will not be repeated here.
  • FIG10 is a schematic diagram of a wireless communication device 1000 provided in an embodiment of the present application.
  • the device 1000 may be a first communication node.
  • the device 1000 includes: a communication module 1010 and a processing module 1020 .
  • the communication module 1010 is used to:
  • the communication module 1010 is further configured to:
  • the first information includes: first challenge information
  • the second information includes: the third information and the first message integrity verification information; or the second information includes: the fourth information and the second message integrity verification information;
  • the processing module 1020 is used to:
  • the first operation includes verifying the first authentication information based on the third authentication information
  • the second operation includes at least one of the following:
  • the fifth information is generated by decrypting the third information based on the second key
  • the sixth information is the encrypted information of the fourth information
  • the third authentication information is generated based on the first key and the first challenge information, and the first key is known to the first terminal device.
  • the communication module 1010 is further configured to: after receiving the first authentication information sent by the first terminal device and before receiving the second information sent by the first terminal device, send seventh information to the first terminal device;
  • the seventh information includes at least one of the following: second authentication information, second algorithm information, ninth information, and third message integrity verification information.
  • the communication module 1010 is further used to: send eighth information to the first terminal device; wherein the eighth information includes at least one of the following: second authentication information, second algorithm information, ninth information, and third message integrity verification information.
  • the second authentication information is generated based on the fifth key and at least one of the following: the first challenge information, the second challenge information, the identifier of the first terminal device, the first algorithm information, and the second algorithm information; or,
  • the third message integrity check information is generated based on the seventh key and the ninth information; or,
  • the third message integrity check information is generated based on the seventh key and the eleventh information; or,
  • the ninth information is generated by encrypting based on the sixth key
  • the eleventh information is the encrypted ninth information, or the eleventh information is the encrypted ninth information;
  • the fifth key is known by the first terminal device.
  • the third message integrity check information is further generated based on at least one of the following: the first challenge information, the second challenge information, the first authentication information, the second authentication information, the identifier of the first terminal device, the first algorithm information, and the second algorithm information; or,
  • the ninth information is also generated by encryption based on at least one of the following: the first challenge information, the second challenge information, the first authentication information, the second authentication information, the identifier of the first terminal device, the first algorithm information, and the second algorithm information.
  • the second key is the first key, or the fifth key, or a derived key of the first key, or a derived key of the fifth key; or,
  • the third key is the first key, or the fifth key, or a derived key of the first key, or a derived key of the fifth key; or,
  • the fourth key is the first key, or the fifth key, or a derivative of the first key, or a derivative of the fifth key; or,
  • the sixth key is the first key, or the fifth key, or a derived key of the first key, or a derived key of the fifth key; or,
  • the seventh key is the first key, or the fifth key, or a derived key of the first key, or a derived key of the fifth key.
  • the second key is further generated based on at least one of the following: first challenge information, first authentication information, second challenge information, second authentication information, an identifier of the first terminal device, first algorithm information, and second algorithm information; or,
  • the third key is further generated based on at least one of the following: the first challenge information, the first authentication information, the second challenge information, the second authentication information, the identifier of the first terminal device, the first algorithm information, and the second algorithm information; or
  • the fourth key is further generated based on at least one of the following: the first challenge information, the first authentication information, the second challenge information, the second authentication information, the identifier of the first terminal device, the first algorithm information, and the second algorithm information; or,
  • the sixth key is further derived based on at least one of the following: the first challenge information, the first authentication information, the second challenge information, the second authentication information, the identifier of the first terminal device, the first algorithm information, and the second algorithm information; or,
  • the seventh key is also derived based on at least one of the following: first challenge information, first authentication information, second challenge information, second authentication information, an identifier of the first terminal device, first algorithm information, and second algorithm information.
  • the processing module 1020 is further used to: decrypt third information based on at least one of the following: first challenge information, first authentication information, second challenge information, second authentication information, identification of the first terminal device, first algorithm information, and second algorithm information.
  • the wireless communication device in the embodiments of the present application can be an electronic device, such as an electronic device with an operating system, or a component in an electronic device, such as an integrated circuit or chip.
  • the electronic device can be a communication node or other device other than a communication device.
  • the communication node can include but is not limited to the first communication node listed above, and the other device can be a server, NAS, etc., which is not specifically limited in the embodiments of the present application.
  • the wireless communication device provided in the embodiment of the present application can implement the various processes implemented by the first communication node in the method embodiments shown in Figures 3 to 6, and achieve the same technical effects. To avoid repetition, they will not be described here.
  • the first information includes: first challenge information;
  • the second information includes: the third information and the first message integrity verification information; or the second information includes: the fourth information and the second message integrity verification information;
  • the third information is generated by encrypting the fifth information based on the second key
  • the first message integrity check information is generated based on the third key, the third information or the fifth information, and the first challenge information;
  • the second message integrity verification information is generated based on the fourth key, the fourth information or the sixth information, and the first challenge information;
  • the sixth information is the encrypted information of the fourth information.
  • First information is received from a first communication node.
  • the second communication node is a base station system or a second terminal device.
  • the second information also includes at least one of the following: an identifier of the first terminal device, second challenge information, and first algorithm information; wherein the first algorithm information is used to indicate at least one of the following: an encryption algorithm, an integrity protection algorithm, a key derivation algorithm, and an authentication information generation algorithm.
  • the communication module 1110 is also used to: receive seventh information from the first communication node before sending the second information to the first communication node; accordingly, the communication module 1110 is specifically used to: send the second information to the first communication node based on the seventh information; wherein the seventh information includes at least one of the following: authentication information, second algorithm information.
  • the communication module 1110 is further used to: receive eighth information sent by the first communication node; wherein the eighth information includes at least one of the following: authentication information, second algorithm information, ninth information, and third message integrity verification information.
  • the communication module 1110 is further configured to: receive tenth information sent by the first communication node; wherein the tenth information includes: the ninth information and the third message integrity check information.
  • the second algorithm information is used to indicate the algorithm supported, allowed or selected by the first communication node, and the algorithm supported, allowed or selected by the first communication node includes at least one of the following: encryption algorithm, integrity protection algorithm, key derivation algorithm, authentication information generation algorithm.
  • the apparatus 1100 further includes a processing module 1120 configured to perform at least one of the following:
  • the fifth key is known by the first terminal device.
  • verifying the third message integrity verification information based on the seventh key and the ninth information includes: verifying the third message integrity verification information based on the seventh key, the ninth information, and at least one of the following: the first challenge information, the second challenge information, the authentication information, the identifier of the first terminal device, the first algorithm information, and the second algorithm information; or,
  • Decrypting the ninth information based on the sixth key includes: decrypting the ninth information based on the sixth key and at least one of the following: first challenge information, second challenge information, authentication information, identification of the first terminal device, first algorithm information, and second algorithm information.
  • the second key is the first key, or the fifth key, or a derived key of the first key, or a derived key of the fifth key; or,
  • the third key is the first key, or the fifth key, or a derived key of the first key, or a derived key of the fifth key; or,
  • the sixth key is the first key, or the fifth key, or a derived key of the first key, or a derived key of the fifth key; or,
  • the seventh key is the first key, or the fifth key, or a derived key of the first key, or a derived key of the fifth key.
  • the second key is further generated based on at least one of the following: the first challenge information, the second challenge information, the authentication information, the identifier of the first terminal device, the first algorithm information, and the second algorithm information; or,
  • the third key is also generated based on at least one of the following: the first challenge information, the second challenge information, the authentication information, the identifier of the first terminal device, the first algorithm information, and the second algorithm information; or,
  • the fourth key is further generated based on at least one of the following: the first challenge information, the second challenge information, the authentication information, the identifier of the first terminal device, the first algorithm information, and the second algorithm information; or,
  • the sixth key is further derived based on at least one of the following: the first challenge information, the second challenge information, the authentication information, the identifier of the first terminal device, the first algorithm information, and the second algorithm information; or,
  • the seventh key is also derived based on at least one of the following: the first challenge information, the second challenge information, the authentication information, the identifier of the first terminal device, the first algorithm information, and the second algorithm information.
  • the first message integrity check information is further generated based on at least one of the following: authentication information, second challenge information, an identifier of the first terminal device, first algorithm information, and second algorithm information; or,
  • the second message integrity verification information is also generated based on at least one of the following: authentication information, second challenge information, an identifier of the first terminal device, first algorithm information, and second algorithm information.
  • the third information is further generated by encryption based on at least one of the following: the first challenge information, the second challenge information, the authentication information, the identifier of the terminal device, the first algorithm information, and the second algorithm information.
  • the wireless communication device in the embodiments of the present application may be an electronic device, such as an electronic device with an operating system, or a component in an electronic device, such as an integrated circuit or a chip.
  • the electronic device may be a terminal, or may be another device other than a terminal.
  • the terminal may include but is not limited to the types of the first terminal devices listed above, and the other devices may be a server, a network attached storage (NAS), etc., which are not specifically limited in the embodiments of the present application.
  • the wireless communication device provided in the embodiment of the present application can implement the various processes implemented by the first terminal device in the method embodiments shown in Figures 7 to 8, and achieve the same technical effects. To avoid repetition, they will not be repeated here.
  • FIG12 is a schematic diagram of a wireless communication device 1200 provided in an embodiment of the present application.
  • the device 1200 may be a first communication node.
  • the device 1200 includes: a communication module 1210 and a processing module 1220 .
  • the communication module 1210 is used to:
  • the communication module is further configured to:
  • the first information includes: first challenge information
  • the second information includes: the third information and the first message integrity verification information; or the second information includes: the fourth information and the second message integrity verification information;
  • the processing module 1220 is used to:
  • the target operation includes at least one of the following:
  • the fifth information is generated by decrypting the third information based on the second key
  • the sixth information is the encrypted information of the fourth information.
  • the second information also includes at least one of the following: an identifier of the first terminal device, second challenge information, and first algorithm information; wherein the first algorithm information is used to indicate at least one of the following: an encryption algorithm, an integrity protection algorithm, a key derivation algorithm, and an authentication information generation algorithm.
  • the communication module 1210 is further used to: before receiving the second information sent by the first terminal device, send seventh information to the first terminal device; wherein the seventh information includes at least one of the following: authentication information, second algorithm information.
  • the second algorithm information is used to indicate the algorithm supported, allowed or selected by the first communication node, and the algorithm supported, allowed or selected by the first communication node includes at least one of the following: encryption algorithm, integrity protection algorithm, key derivation algorithm, authentication information generation algorithm.
  • the authentication information is generated based on the fifth key and at least one of the following: the first challenge information, the second challenge information, the identifier of the first terminal device, the first algorithm information, and the second algorithm information; or,
  • the third message integrity check information is generated based on the seventh key and the ninth information; or,
  • the third message integrity check information is generated based on the seventh key and the eleventh information; or,
  • the ninth information is generated by encrypting based on the sixth key
  • the eleventh information is the encrypted ninth information, or the eleventh information is the encrypted ninth information;
  • the third message integrity check information is further generated based on at least one of the following: the first challenge information, the second challenge information, the authentication information, the identifier of the first terminal device, the first algorithm information, and the second algorithm information; or,
  • the ninth information is also generated by encryption based on at least one of the following: the first challenge information, the second challenge information, the authentication information, the identifier of the first terminal device, the first algorithm information, and the second algorithm information.
  • the second key is the first key, or the fifth key, or a derived key of the first key, or a derived key of the fifth key; or,
  • the third key is the first key, or the fifth key, or a derived key of the first key, or a derived key of the fifth key; or,
  • the fourth key is the first key, or the fifth key, or a derivative of the first key, or a derivative of the fifth key; or,
  • the sixth key is the first key, or the fifth key, or a derived key of the first key, or a derived key of the fifth key; or,
  • the seventh key is the first key, or the fifth key, or a derived key of the first key, or a derived key of the fifth key;
  • the first key is known by the first terminal device.
  • the second key is further generated based on at least one of the following: the first challenge information, the second challenge information, the authentication information, the identifier of the first terminal device, the first algorithm information, and the second algorithm information; or,
  • the third key is also generated based on at least one of the following: the first challenge information, the second challenge information, the authentication information, the identifier of the first terminal device, the first algorithm information, and the second algorithm information; or,
  • the fourth key is further generated based on at least one of the following: the first challenge information, the second challenge information, the authentication information, the identifier of the first terminal device, the first algorithm information, and the second algorithm information; or,
  • the sixth key is further derived based on at least one of the following: the first challenge information, the second challenge information, the authentication information, the identifier of the first terminal device, the first algorithm information, and the second algorithm information; or,
  • the seventh key is also derived based on at least one of the following: the first challenge information, the second challenge information, the authentication information, the identifier of the first terminal device, the first algorithm information, and the second algorithm information.
  • the second message integrity verification information is verified based on at least one of the following: authentication information, second challenge information, an identifier of the first terminal device, first algorithm information, and second algorithm information.
  • the processing module 1220 is further configured to: decrypt third information based on at least one of the following: first challenge information, second challenge information, authentication information, an identifier of the first terminal device, first algorithm information, and second algorithm information.
  • the wireless communication device in the embodiments of the present application can be an electronic device, such as an electronic device with an operating system, or a component in an electronic device, such as an integrated circuit or chip.
  • the electronic device can be a communication node or other device other than a communication device.
  • the communication node can include but is not limited to the first communication node listed above, and the other device can be a server, NAS, etc., which is not specifically limited in the embodiments of the present application.
  • the present application also provides a terminal comprising a processor and a communication interface, wherein the communication interface is coupled to the processor, and the processor is configured to execute a program or instruction to implement the various steps performed by the first terminal device in the method embodiments shown in Figures 3 to 8 above.
  • This terminal embodiment corresponds to the aforementioned terminal-side method embodiment, and the various implementation processes and implementation methods of the aforementioned method embodiments are applicable to this terminal embodiment and can achieve the same technical effects.
  • Figure 14 is a schematic diagram of the hardware structure of a terminal implementing an embodiment of the present application.
  • the terminal 1000 includes but is not limited to: a radio frequency unit 1401, a network module 1402, an audio output unit 1403, an input unit 1404, a sensor 1405, a display unit 1406, a user input unit 1407, an interface unit 1408, a memory 1409 and at least some of the components of the processor 1410.
  • the terminal 1000 may also include a power supply (such as a battery) to power various components.
  • the power supply may be logically connected to the processor 1410 via a power management system, thereby enabling the power management system to manage charging, discharging, and power consumption.
  • the terminal structure shown in FIG14 does not limit the terminal.
  • the terminal may include more or fewer components than shown, or combine certain components, or have different component arrangements, which will not be described in detail here.
  • the input unit 1404 may include a graphics processing unit (GPU) 14041 and a microphone 14042.
  • the graphics processor 14041 processes image data of a still picture or video obtained by an image capture device (such as a camera) in a video capture mode or an image capture mode.
  • the display unit 1406 may include a display panel 14061, which may be configured in the form of a liquid crystal display, an organic light emitting diode, etc.
  • the user input unit 1407 includes a touch panel 14071 and at least one of other input devices 14072.
  • the touch panel 14071 is also called a touch screen.
  • the touch panel 14071 may include two parts: a touch detection device and a touch controller.
  • Other input devices 14072 may include, but are not limited to, a physical keyboard, function keys (such as volume control keys, switch keys, etc.), a trackball, a mouse, and a joystick, which will not be described in detail here.
  • the radio frequency unit 1401 may transmit the data to the processor 1410 for processing. Furthermore, the radio frequency unit 1401 may send uplink data to the network device.
  • the radio frequency unit 1401 includes, but is not limited to, an antenna, an amplifier, a transceiver, a coupler, a low-noise amplifier, a duplexer, and the like.
  • the first information includes: first challenge information;
  • the second information includes: the third information and the first message integrity verification information; or the second information includes: the fourth information and the second message integrity verification information;
  • the first authentication information is generated based on the first challenge information and the first key
  • the first message integrity check information is generated based on the third key, the third information or the fifth information, and at least one of the following:
  • the second message integrity check information is generated based on the fourth key, the fourth information or the sixth information, and at least one of the following:
  • the sixth information is the encrypted information of the fourth information.
  • the first information includes: first challenge information;
  • the second information includes: the third information and the first message integrity verification information; or the second information includes: the fourth information and the second message integrity verification information;
  • the third information is generated by encrypting the fifth information based on the second key
  • the first message integrity check information is generated based on the third key, the third information or the fifth information, and the first challenge information;
  • the second message integrity verification information is generated based on the fourth key, the fourth information or the sixth information, and the first challenge information;
  • the sixth information is the encrypted information of the fourth information.
  • An embodiment of the present application further provides a communication device, comprising a processor and a communication interface, wherein the communication interface is coupled to the processor, and the processor is configured to execute a program or instruction to implement the various processes implemented by the first communication node in the method embodiments shown in Figures 3 to 8.
  • This communication device embodiment corresponds to the method embodiment executed by the first communication node, and each implementation process and implementation method of the aforementioned method embodiment are applicable to this communication device embodiment and can achieve the same technical effects.
  • the communication device 1500 includes: an antenna 151, a radio frequency device 152, a baseband device 153, a processor 154, and a memory 155.
  • the antenna 151 is connected to the radio frequency device 152.
  • the radio frequency device 152 receives information via the antenna 151 and sends the received information to the baseband device 153 for processing.
  • the baseband device 153 processes the information to be transmitted and sends it to the radio frequency device 152.
  • the radio frequency device 152 processes the received information and then sends it through the antenna 151.
  • the method executed by the communication device in the above embodiment may be implemented in the baseband device 153 , which includes a baseband processor.
  • the baseband device 153 may include, for example, at least one baseband board, on which multiple chips are arranged, as shown in Figure 15, one of the chips is, for example, a baseband processor, which is connected to the memory 155 through a bus interface to call the program in the memory 155 and execute the communication device operations shown in the above method embodiment.
  • the communication device may also include a network interface 156, which is, for example, a Common Public Radio Interface (CPRI).
  • a network interface 156 which is, for example, a Common Public Radio Interface (CPRI).
  • CPRI Common Public Radio Interface
  • the communication device 1500 of the embodiment of the present application also includes: instructions or programs stored in the memory 155 and executable on the processor 154.
  • the processor 154 calls the instructions or programs in the memory 155 to execute the steps performed by the first communication node in the method embodiments shown in Figures 3 to 8, and achieves the same technical effect. To avoid repetition, they will not be described here.
  • An embodiment of the present application also provides a readable storage medium, on which a program or instruction is stored.
  • a program or instruction is stored.
  • the various processes of the method embodiments shown in Figures 3 to 8 above are implemented, and the same technical effect can be achieved. To avoid repetition, they will not be repeated here.
  • the processor is the processor in the terminal described in the above embodiment.
  • the readable storage medium includes a computer-readable storage medium, such as a computer read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk.
  • ROM computer read-only memory
  • RAM random access memory
  • magnetic disk such as a hard disk, a hard disk, or a magnetic disk.
  • optical disk such as a hard disk, a hard disk, or an optical disk.
  • the readable storage medium may be a non-transitory readable storage medium.
  • An embodiment of the present application further provides a chip, which includes a processor and a communication interface, wherein the communication interface is coupled to the processor, and the processor is used to run programs or instructions to implement the various processes of the method embodiments shown in Figures 3 to 8 above, and can achieve the same technical effects. To avoid repetition, they will not be repeated here.
  • the chip mentioned in the embodiments of the present application can also be called a system-level chip, a system chip, a chip system or a system-on-chip chip, etc.
  • An embodiment of the present application further provides a computer program/program product, which is stored in a storage medium.
  • the computer program/program product is executed by at least one processor to implement the various processes of the method embodiments shown in Figures 3 to 8 above, and can achieve the same technical effects. To avoid repetition, they are not described here.
  • An embodiment of the present application also provides a wireless communication system, including: a first terminal device and a first communication node, wherein the first terminal device can be used to execute the various processes corresponding to the first terminal device in the method embodiments shown in Figures 3 to 8 as described above, and the first communication node can be used to execute the various processes corresponding to the first communication node in the method embodiments shown in Figures 3 to 8 as described above.
  • the computer software product is stored in a storage medium (such as ROM, RAM, magnetic disk, optical disk, etc.) and includes a number of instructions for causing the terminal or the first communication device to execute the methods described in each embodiment of the present application.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

La présente demande appartient au domaine technique des communications. Sont divulgués un procédé et un appareil de communication sans fil, ainsi qu'un dispositif et un support de stockage. Le procédé de communication sans fil dans les modes de réalisation de la présente demande consiste : à recevoir, par un premier dispositif terminal, des premières informations, les premières informations comprenant des premières informations de défi ; à envoyer des premières informations d'authentification et des deuxièmes informations à un premier nœud de communication ; et à exécuter, par le premier nœud de communication, une première opération et une seconde opération, la première opération comprenant la vérification des premières informations d'authentification en fonction de troisièmes informations d'authentification, et la seconde opération comprenant au moins l'un des éléments suivants : le déchiffrement de troisièmes informations en fonction d'une deuxième clé, la vérification de premières informations de contrôle d'intégrité de message en fonction d'une troisième clé, des troisièmes informations ou de cinquièmes informations, et d'au moins l'un des éléments suivants : les premières informations de défi et les premières informations d'authentification, et la vérification de secondes informations de contrôle d'intégrité de message en fonction d'une quatrième clé, de quatrièmes informations ou de sixièmes informations, et d'au moins l'un des éléments suivants : les premières informations de défi et les premières informations d'authentification.
PCT/CN2025/076192 2024-02-07 2025-02-07 Procédé et appareil de communication sans fil, dispositif, et support de stockage Pending WO2025168047A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202410175333.1A CN120456027A (zh) 2024-02-07 2024-02-07 无线通信方法、装置、设备及存储介质
CN202410175333.1 2024-02-07

Publications (1)

Publication Number Publication Date
WO2025168047A1 true WO2025168047A1 (fr) 2025-08-14

Family

ID=96619272

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2025/076192 Pending WO2025168047A1 (fr) 2024-02-07 2025-02-07 Procédé et appareil de communication sans fil, dispositif, et support de stockage

Country Status (2)

Country Link
CN (1) CN120456027A (fr)
WO (1) WO2025168047A1 (fr)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020194482A1 (en) * 2001-06-19 2002-12-19 Hewlett-Packard Company Multiple trusted computing environments with verifiable environment identities
CN101641976A (zh) * 2007-03-27 2010-02-03 英国电讯有限公司 认证方法
CN115380570A (zh) * 2020-03-29 2022-11-22 华为技术有限公司 一种通信方法、装置及系统
CN116208329A (zh) * 2023-02-23 2023-06-02 国网智能电网研究院有限公司 传感网络的节点认证方法、节点、系统、介质及设备

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020194482A1 (en) * 2001-06-19 2002-12-19 Hewlett-Packard Company Multiple trusted computing environments with verifiable environment identities
CN101641976A (zh) * 2007-03-27 2010-02-03 英国电讯有限公司 认证方法
CN115380570A (zh) * 2020-03-29 2022-11-22 华为技术有限公司 一种通信方法、装置及系统
CN116208329A (zh) * 2023-02-23 2023-06-02 国网智能电网研究院有限公司 传感网络的节点认证方法、节点、系统、介质及设备

Also Published As

Publication number Publication date
CN120456027A (zh) 2025-08-08

Similar Documents

Publication Publication Date Title
KR102847659B1 (ko) 검증된 디지털 아이덴티티를 사용한 가입 온보딩
US11895495B2 (en) Enhanced security for access stratum transmission
CN113395693B (zh) 用于802.1x载体热点和Wi-Fi呼叫认证的基于经加密的IMSI的方案
US12368701B2 (en) Subscription data management method and apparatus
US12362940B2 (en) Supporting remote unit reauthentication
WO2023202631A1 (fr) Procédé et appareil d'abonnement, dispositif de communication, dispositif de l'internet des objets et élément de réseau
WO2023143418A1 (fr) Procédé et appareil d'authentification de dispositif, ainsi que terminal et fonction de réseau
WO2023071836A1 (fr) Procédé et appareil de communication
WO2025168047A1 (fr) Procédé et appareil de communication sans fil, dispositif, et support de stockage
WO2025214273A1 (fr) Procédé et appareil de communication sans fil et dispositif
US20230328532A1 (en) Communication method and apparatus for trusted or untrusted relay, terminal, and network side device
WO2025119381A1 (fr) Procédé, appareil et système de communication sécurisée, terminal et dispositif côté réseau
WO2025055786A1 (fr) Procédé et appareil de traitement d'authentification, terminal et dispositif côté réseau
WO2025209485A1 (fr) Procédé d'activation de sécurité, terminal et dispositif côté réseau
US12452657B2 (en) Authentication between wireless devices and edge servers
WO2025185705A1 (fr) Procédés d'indication d'identifiant, appareil, dispositif terminal et premier nœud de réseau
US20250344065A1 (en) Message transmission method and apparatus, and device
WO2025119355A1 (fr) Procédé, appareil et système d'interaction, terminal et dispositif côté réseau
WO2025185719A1 (fr) Procédé et appareil de communication sans fil et dispositif
WO2025209362A1 (fr) Procédé et appareil de communication, dispositif, et support de stockage
WO2025146092A1 (fr) Procédé et appareil de traitement d'informations, et dispositif de communication
WO2025185746A1 (fr) Procédé et appareil de communication sans fil et dispositif associé
WO2025119357A1 (fr) Procédé et appareil d'interaction, système, terminal et dispositif côté réseau
WO2024235025A1 (fr) Procédé de communication pour une connexion de positionnement de plan utilisateur, et terminal et dispositif côté réseau
WO2024088552A1 (fr) Amélioration des performances de fonction de plan utilisateur dans un réseau de communication sans fil

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 25751646

Country of ref document: EP

Kind code of ref document: A1