[go: up one dir, main page]

WO2025209244A1 - Communication method and communication apparatus - Google Patents

Communication method and communication apparatus

Info

Publication number
WO2025209244A1
WO2025209244A1 PCT/CN2025/084588 CN2025084588W WO2025209244A1 WO 2025209244 A1 WO2025209244 A1 WO 2025209244A1 CN 2025084588 W CN2025084588 W CN 2025084588W WO 2025209244 A1 WO2025209244 A1 WO 2025209244A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
message
identification
network element
identifier
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
PCT/CN2025/084588
Other languages
French (fr)
Chinese (zh)
Inventor
李晨琬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Publication of WO2025209244A1 publication Critical patent/WO2025209244A1/en
Pending legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L5/00Arrangements affording multiple use of the transmission path
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/20Control channels or signalling for resource management
    • H04W72/25Control channels or signalling for resource management between terminals via a wireless link, e.g. sidelink
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/40Resource management for direct mode communication, e.g. D2D or sidelink

Definitions

  • the response message to the first message further includes second identification information associated with the first device.
  • the second identifier of the first device indicated by the second identification information is the same as the first identifier of the first device indicated by the above-mentioned first identification information, or the second identifier is part of the first identifier, or the second identifier is completely different from the first identifier, or the second identifier is a temporary identifier of the first device, or the second identifier is a permanently stored identifier of the first device.
  • the above-mentioned pre-configured key may be indicated by the core network to the first device, or configured by the core network to the first device, which is not limited in this application.
  • the first device obtains the first verification value based on the preconfigured key and the first parameter, including: the first device obtains the first verification value based on the preconfigured key, the first parameter and the second parameter, and the response message of the first message also includes the second parameter.
  • the first device can generate a verification value based on the pre-configured key, the parameters provided by the core network, and the parameters provided by the first device, and report it to the core network, so that the core network performs verification based on this verification value, thereby improving the level of security verification and further ensuring that the information received by the core network comes from the target device, thereby achieving secure transmission.
  • the first message may further include first indication information, where the first indication information instructs the first device to report the first verification value.
  • the first message may not include the above-mentioned first indication information, and the first device may actively report the first verification value after generating it.
  • the above-mentioned first device sends a response message to the first message to the second device, including: the first device receives first configuration information from the second device; the first device sends a response message to the first message to the second device based on the first configuration information.
  • the first configuration information may include at least one of the following:
  • Frequency domain resource information Frequency domain resource information, time domain resource information, modulation and coding information, repetition number information, bandwidth information, and rate information.
  • the second device can allocate resources for data transmission of the first device, and the first device directly transmits data on the allocated resources when determining that the core network only selects the first device as the target device.
  • the first configuration information may also be carried in the first message and sent.
  • a communication method is provided.
  • the method may be executed by a first device or a component of the first device (e.g., a chip, a circuit, or a chip system).
  • a first device e.g., a chip, a circuit, or a chip system.
  • the following description is based on the first device as an example.
  • the method includes: a first device receives first information; when the first device determines that the first network element only selects the first device as the target device based on the first information, the first device sends second identification information associated with the first device, and the second identification information is used by the first network element to perform identification verification on the first device; the first device receives a first operation instruction from the first network element, and the first operation instruction is sent after the first network element passes the identification verification on the first device; the first device sends the to-be-transmitted information of the first device requested by the first operation instruction based on the first operation instruction.
  • the first device determines that the core network is only paging one terminal, it reports its own identification information to the core network. After the core network verifies the identification of the first device, it will send an operation instruction to the first device. The first device can directly report the information to be transmitted requested by the operation instruction of the core network.
  • the above method is that the core network verifies the identification information of the target device before issuing the operation instruction, avoiding the potential risks that may be caused by sending the operation instruction in advance.
  • the first device determines that the core network is only paging one terminal, the first device does not need to perform the random access process to the second device. After receiving the operation instruction issued by the core network, it can directly report the information to be transmitted requested by the operation instruction of the core network. This can not only reduce the communication delay between the first device and the second device, but also save the energy consumption of the first device.
  • the first information is first identification information associated with the first device.
  • the first identifier indicated by the above-mentioned first identification information can uniquely identify the first device.
  • the second identification of the first device indicated by the above-mentioned second identification information is the same as the first identification of the first device indicated by the above-mentioned first identification information, or the second identification is part of the first identification, or the second identification is completely different from the first identification, or the second identification is a temporary identification of the first device, or the second identification is a permanently stored identification of the first device.
  • the first device can report part of the identifier for identifier verification, saving signaling overhead.
  • a communication method is provided.
  • the method may be executed by a first network element or by a component of the first network element (e.g., a chip, a circuit, or a chip system).
  • a component of the first network element e.g., a chip, a circuit, or a chip system.
  • the following description will be based on the first network element as an example.
  • the method includes: a first network element sends a second message to a second device, the second message including first information and a first operation instruction, the first information instructing the first network element to select only the first device as the target device; the first network element receives a response message to the second message from the second device, the response message to the second message including the information to be transmitted of the first device requested by the first operation instruction.
  • the target device when the core network only pages one target device, the target device does not need to perform the random access process to the second device, and can directly report the information to be transmitted requested by the core network's operation instruction, which not only reduces communication delay, but also saves energy consumption of the first device.
  • the first information is first identification information associated with the first device.
  • the first identifier indicated by the above-mentioned first identification information can uniquely identify the first device.
  • the response message to the above-mentioned first message also includes second identification information associated with the first device.
  • the second identifier of the first device indicated by the second identification information is the same as the first identifier of the first device indicated by the above-mentioned first identification information, or the second identifier is part of the first identifier, or the second identifier is completely different from the first identifier, or the second identifier is a temporary identifier of the first device, or the second identifier is a permanently stored identifier of the first device.
  • the first device reports its own identification information simultaneously with the information to be transmitted requested by the core network's operation instruction. This allows the core network to verify the source of the received information and achieve secure transmission. Furthermore, the first device can report only a partial identification, saving signaling overhead.
  • the second message also includes a first parameter, which is used by the first device to obtain a first verification value
  • the response message of the second message also includes the first verification value.
  • the method also includes: the first network element obtains a second verification value based on a preconfigured key and the first parameter, and determines whether the second verification value is consistent with the first verification value; if the second verification value is consistent with the first verification value, the security verification passes; if the second verification value is inconsistent with the first verification value, the security verification fails.
  • the core network can verify the verification value generated by the first device based on the preconfigured key and the parameters provided by the core network, thereby ensuring that the information received by the core network comes from the target device and achieving secure transmission.
  • the first parameter is used by the first device to obtain a first verification value, including: the first parameter and the second parameter are used by the first device to obtain the first verification value, and the response message to the second message also includes the second parameter.
  • the first network element obtains the second verification value based on a preconfigured key and the first parameter, including: the first network element obtains the second verification value based on the preconfigured key, the first parameter, and the second parameter.
  • the core network can verify the verification value generated by the first device based on the pre-configured key, the parameters provided by the core network, and the parameters provided by the first device, thereby improving the level of security verification and further ensuring that the information received by the core network comes from the target device, thereby achieving secure transmission.
  • the second message may further include first indication information, where the first indication information instructs the first device to report a first verification value.
  • the second message may not include the above-mentioned first indication information, and the first device may actively report the first verification value after generating it.
  • a communication method is provided.
  • the method can be executed by a first network element or by a component of the first network element (e.g., a chip, a circuit, or a chip system).
  • a component of the first network element e.g., a chip, a circuit, or a chip system.
  • the following description is based on the first network element as an example.
  • the method includes: a first network element receives first information, which instructs the first network element to select only the first device as the target device; the first network element receives second identification information associated with the first device; the first network element performs an identification verification on the first device based on the second identification information; when the identification verification passes, the first network element sends a first operation instruction; the first network element receives the to-be-transmitted information of the first device requested by the first operation instruction.
  • the second identifier of the first device indicated by the above-mentioned second identification information is the same as the first identifier of the first device indicated by the above-mentioned first identification information, or the second identifier is part of the first identifier, or the second identifier is completely different from the first identifier, or the second identifier is a temporary identifier of the first device, or the second identifier is a permanently stored identifier of the first device.
  • the above-mentioned transceiver unit is used to send a response message of the first message to the second device, including: the above-mentioned transceiver unit is used to receive first configuration information from the second device; the above-mentioned transceiver unit is used to send a response message of the first message to the second device based on the first configuration information.
  • a communication device which includes: a transceiver unit for sending a second message to a second device, the second message including first information and a first operation instruction, the first information instructing the first network element to only select the first device as the target device; the above-mentioned transceiver unit is also used to receive a response message to the second message from the second device, the response message to the second message including the information to be transmitted of the first device requested by the first operation instruction.
  • the above-mentioned second message also includes a first parameter, which is used by the first device to obtain a first verification value
  • the response message of the above-mentioned second message also includes the first verification value.
  • the above-mentioned communication device also includes: a processing unit, which is used to obtain a second verification value based on a preconfigured key and the first parameter, and to determine whether the second verification value is consistent with the above-mentioned first verification value; if the second verification value is consistent with the first verification value, the security verification passes; if the second verification value is inconsistent with the first verification value, the security verification fails.
  • the first parameter is used by the first device to obtain a first verification value, including: the first parameter and the second parameter are used by the first device to obtain the first verification value, and the response message to the second message also includes the second parameter.
  • the processing unit is used to obtain a second verification value based on a preconfigured key and the first parameter, including: the processing unit is used to obtain the second verification value based on the preconfigured key, the first parameter, and the second parameter.
  • a communication device which includes: a transceiver unit for receiving first information, which first information indicates that the first network element only selects the first device as the target device; the transceiver unit is also used to receive second identification information associated with the first device; the above-mentioned communication device also includes: a processing unit for performing identification verification on the first device based on the second identification information; when the identification verification is passed, the above-mentioned transceiver unit is also used to send a first operation instruction; the above-mentioned transceiver unit is also used to receive the to-be-transmitted information of the first device requested by the first operation instruction.
  • a computer program product which includes: a computer program (also referred to as code, or instructions), which, when executed, enables a computer to execute a method in any possible implementation of the first to fourth aspects above.
  • a computer-readable storage medium which stores a computer program (also referred to as code, or instructions) which, when run on a computer, enables the method in any possible implementation of the first to fourth aspects above to be executed.
  • a chip system comprising: a processor for calling and running a computer program or instruction from a memory, so that a communication device equipped with the chip system implements the method described in any possible implementation method of the first to fourth aspects.
  • a communication system including a first network element, a first device, and a second device, the first device being used to execute the method in the first aspect, the second aspect, and any possible implementation of the first aspect and the second aspect, and the first network element being used to execute the method in the third aspect, the fourth aspect, and any possible implementation of the third aspect and the fourth aspect.
  • FIG1 shows an architecture diagram of a communication system applied to an embodiment of the present application.
  • FIG4 is a schematic flowchart of a communication method 400 provided in an embodiment of the present application.
  • FIG5 is a schematic flowchart of a communication party 500 provided in an embodiment of the present application.
  • LTE long term evolution
  • FDD frequency division duplex
  • TDD LTE time division duplex
  • UMTS universal mobile telecommunication system
  • 5G fifth generation
  • NR new radio
  • NTN non-terrestrial network
  • Terminal equipment can be called user equipment (UE), access terminal, user unit, user station, mobile station, mobile station, remote station, remote terminal, mobile device, user terminal, terminal, wireless communication equipment, user agent or user device.
  • UE user equipment
  • access terminal user unit
  • user station mobile station
  • mobile station mobile station
  • remote station remote terminal
  • mobile device user terminal
  • terminal wireless communication equipment
  • user agent wireless communication equipment
  • a terminal device can be a device that provides voice/data connectivity to users, such as a handheld device or vehicle-mounted device with wireless connection capabilities.
  • terminals include: mobile phones, tablet computers, laptops, PDAs, mobile internet devices (MIDs), wearable devices, virtual reality (VR) devices, augmented reality (AR) devices, wireless terminals in industrial control, wireless terminals in self-driving, wireless terminals in remote medical surgery, wireless terminals in smart grids, wireless terminals in transportation safety, wireless terminals in smart cities, etc.
  • wearable smart devices include those that are fully functional, large in size, and can achieve complete or partial functions without relying on smartphones, such as smart watches or smart glasses, as well as those that only focus on a certain type of application function and need to be used in conjunction with other devices such as smartphones, such as various smart bracelets and smart jewelry for vital sign monitoring.
  • Access network provides network access functions for terminal devices and can use transmission tunnels of different qualities according to the user level, business requirements, etc.
  • the access network can be an access network that uses different access technologies.
  • 3GPP access technology such as the wireless access technology used in 3G, 4G or 5G systems
  • non-3GPP access technology 3GPP access technology refers to access technology that complies with 3GPP standards and specifications.
  • the access network equipment in the 5G system is called the next generation Node Base station (gNB).
  • Non-3GPP access technology refers to access technology that does not comply with 3GPP standards and specifications, for example, the air interface technology represented by the access point (AP) in wireless fidelity (WiFi).
  • AP access point
  • WiFi wireless fidelity
  • the access network can provide services for the cell.
  • the terminal device can communicate with the cell through the transmission resources (eg, frequency domain resources, or spectrum resources) allocated by the access network device.
  • Core Network Equipment This refers to a general term for various functional entities used on the network side for user management, data transmission, and access network device configuration. These entities can provide core network services to terminal devices connected to the access network.
  • Core network equipment can correspond to different devices in different systems.
  • MMEs mobility management entities
  • S-GWs serving gateways
  • core network equipment can correspond to access and mobility management function (AMF) entities, ambient IoT management function (AIoTMF) entities, session management function (SMF) entities, or user plane function (UPF) entities.
  • the AIoTMF is a core network element used to provide A-IoT services.
  • Reader/Writer Device This refers to a device with both reading and writing capabilities. It can be understood as a device that communicates with tags.
  • a reader/writer device can be a terminal device, an access network device (e.g., a base station), a relay node (e.g., an integrated access and backhaul (IAB)), or any other device with reading and writing capabilities.
  • an access network device e.g., a base station
  • a relay node e.g., an integrated access and backhaul (IAB)
  • IAB integrated access and backhaul
  • Tag A terminal that can respond to certain instructions or commands, such as paging messages. This terminal primarily refers to terminal devices in the ambient IoT (AIoT) system.
  • a tag can be an (electronic) tag, which is a marker or card-like chip containing information attached to a person or object and read and identified using radio waves.
  • Tags can be categorized as active, passive, and semi-active. Passive tags are also called passive IoT devices and can be considered a terminal.
  • Figure 1 illustrates an architecture diagram of a communication system applicable to embodiments of the present application.
  • architecture 101 includes a macro base station and a tag, enabling communication between the macro base station and the tag.
  • the macro base station can be considered a reader/writer, with the AIoT uu interface (i.e., air interface communication) between the macro base station and the tag.
  • AIoT uu interface i.e., air interface communication
  • the macro base station can also be replaced by a terminal, and the communication between the terminal and the tag can also reuse the AIoT uu interface communication mechanism.
  • architecture 102 includes a macro base station, a micro base station, and a tag.
  • the macro base station and the micro base station can communicate with each other.
  • the micro base station can send downlink transmission signals to the tag.
  • the micro base station can also send downlink excitation signals to the tag.
  • the tag then carries the signal it needs to send to the micro base station on the received downlink excitation signal and reflects it back to the micro base station.
  • the architecture 103 includes a macro base station, a micro base station, a helper, and a tag. Communication between the tag and the micro base station can be forwarded through the helper.
  • the macro base station in Figure 1 can be a gNB, and the micro base station can be a Pico base station; or, the macro base station in Figure 1 can be a gNB, and the micro base station can be an IAB node.
  • FIG1 is merely an exemplary illustration and does not limit the present application.
  • the present application may also be applied to other communication scenarios capable of reflection communication.
  • FIG. 2 shows a schematic diagram of an AIoT system.
  • the AIoT system consists of three parts: a reader/writer, an electronic tag, and a data management system. Its operating principle is: the reader/writer transmits radio wave energy of a specific frequency to drive the circuit, thereby transmitting the internal data. The reader/writer then receives and interprets the data in sequence, sending it to the application for processing.
  • Reader/Writer This device communicates wirelessly with the electronic tag via an antenna, enabling reading or writing of the tag's identification code and stored data.
  • a typical reader/writer includes a high-frequency module (e.g., a transmitter or receiver), a control unit, and a reader/writer antenna.
  • a reader/writer can also be understood as a device that communicates with the tag and can be a terminal, a base station, or a device with read/write capabilities.
  • Electronic tags consist of a tag antenna and a dedicated tag chip, as shown in the right image of Figure 2.
  • electronic tags can be divided into active, passive, and semi-passive tags based on how they are powered. Active tags have a built-in battery, passive tags do not, and semi-passive tags partially rely on batteries for operation. Based on frequency, electronic tags can be divided into low-frequency, high-frequency, ultra-high-frequency, and microwave tags. Of course, they can also be categorized based on packaging, but this will not be discussed in detail here. Passive tags can also be referred to as passive AIoT devices.
  • the device of this application may also be one of the two types of devices proposed for research in the 3GPP R19 Ambient IoT project: 1.
  • FIG 3 is a schematic diagram of a tag random access process. As shown in Figure 3, the random access process may include the following steps.
  • S301 The reader sends a Select command to the tag.
  • the tag receives the Select command from the reader.
  • the reader when it receives an inventory command from a service requester, it generates a Select command and sends it to the tag.
  • This Select command can carry information about a certain range in the tag's memory (e.g., an Electronic Product Code (EPC) within a specific range).
  • EPC Electronic Product Code
  • the tag determines whether it belongs to the tag range carried in the Select command. If so, it feeds back tag identification information after detecting a Query or QueryRep command.
  • the Query command may include a numerical value (denoted as a Q value), and the tag may generate a random number based on the Q value, for example, a random number between 0 and the power of 2. Subsequently, the tag may decrement the random number by 1 each time the reader sends a Query or QueryRep command. When the random number reaches 0, the tag initiates random access.
  • a Q value a numerical value
  • the tag may generate a random number based on the Q value, for example, a random number between 0 and the power of 2. Subsequently, the tag may decrement the random number by 1 each time the reader sends a Query or QueryRep command. When the random number reaches 0, the tag initiates random access.
  • S303 The tag sends a random number to the reader.
  • the reader receives the random number from the tag.
  • a tag when it finds that it belongs to the tag range carried in the Select command, it can send a random number, such as RN16, to the reader in a competitive manner (for example, when the random number is reduced to zero in S302, RN16 can be understood as a random number with a length of 16 bits).
  • RN16 can be understood as a random number with a length of 16 bits.
  • S304 The reader sends an Acknowledgement (ACK) command to the tag.
  • the tag receives the ACK command from the reader.
  • the reader After the reader receives the random number from the tag, the reader sends an ACK command to the tag, where the command includes the random number (RN16) received by the reader from the tag.
  • the reader can also use paging instructions to allow tags to randomly access the reader.
  • S410 The first network element sends a second message to the second device.
  • the second device receives the second message.
  • the second device may be a device with reading and/or writing functions, a read/write device, a relay node device (e.g., an IAB), a reader, a scanner, a reader head, a communicator, a reader, an interpreter, or a radio frequency module with transceiver functions.
  • the second device may be in the form of a terminal or an access network device.
  • the second device may refer to the description of the reader/writer above.
  • the application layer or upper layer data is directly sent to the second device.
  • the second message may be a service request message, for example, the second message may be an inventory request, a read request, a write request, an AIoT service request, an enable or disable request, etc.
  • the first operation instruction included in the second message may be an inventory command, a read command, a write command, a disable, a deactivation, a kill instruction, a lock instruction, a block write instruction, a block erase instruction, a block unlock instruction, an untraceable instruction, a secure communication instruction, a key update instruction, a tag privilege instruction, a file list instruction, a file privilege instruction, a file setup instruction, an authentication instruction, an authentication communication instruction, etc.
  • the first operation instruction may be an upper layer message or an application layer message, etc.
  • the first information may be indication information #1, which indicates that the first network element selects only the first device as the target device, or indication information #1 is used to indicate whether the first operation instruction is intended for one first device or multiple devices; or the first information may be first identification information associated with the first device, or the first information may be multiple identification information associated with multiple devices.
  • the first identification of the first device indicated by the first identification information may be the EPC of the first device, and the multiple identifications of the multiple devices indicated by the multiple identification information may be the EPCs of the multiple devices; or the first information may further include indication information #1 and the first identification information of the first device.
  • any identification information that can uniquely identify the first device may be used as the first identification information, and any identification information that can uniquely identify multiple devices may be used as the multiple identification information, and this application is not limited to this.
  • This application describes the case where the first information indicates that the first operation instruction is intended for the first device as an example, but the technical solution of this application is also applicable to the case where the first information indicates that the first operation instruction is intended for multiple devices, in which case the multiple devices do not transmit data simultaneously. This application is not limited to this.
  • the second message may also include the type information of the device being paged.
  • the type information of the device being paged may indicate a 1 microwatt-level device, a 100 microwatt-level device, a device based on reflection communication, or a device that can actively send radio frequency signals.
  • the device type information included in the second message indicates that a device meeting this type responds to the first operation instruction, or the device type information included in the second message indicates that the network supports this type of device for information transmission.
  • the device type information being paged indicates an A-IoT device of type 1 in the standard, or an A-IoT device of type 2.
  • the type 2 A-IoT device may also be divided into a type 2-1 A-IoT device or a type 2-2 A-IoT device, and the device type can be distinguished based on whether an active carrier is used.
  • the second message may further include a service type or a service type identifier or an interface identifier.
  • Step S412 The second device sends a first message to the first device, and correspondingly, the first device receives the first message.
  • the first message may be transmitted via a service logical channel or a control logical channel, such as a paging or common control channel. This application does not limit the name of the logical channel.
  • the first message may also be transmitted via a downlink data transmission channel, such as a physical downlink shared channel (PDSCH) or a physical reader to device shared channel (PDSCH), i.e., a channel for transmitting data. This application does not limit the name of the data transmission channel.
  • PDSCH physical downlink shared channel
  • PDSCH physical reader to device shared channel
  • the first message can be specifically distinguished by MAC layer indication information, such as the MAC layer indication information being a logical channel identifier (LCID) or other indication information in the MAC layer, which can be used to indicate that the channel or the data packet is transmitting the first message (such as a paging message, a selection message, a downlink trigger message, an initial downlink trigger message, etc.).
  • the terminal can distinguish whether the message is the first message or other messages or data transmission messages upon receiving the indication information.
  • the terminal is waiting to receive a paging message, if other messages are received, they are discarded. In subsequent processes, if data or information not required by this process is received, it can be directly ignored or discarded.
  • the second device may also send first configuration information to the first device, and accordingly, the first device receives the first configuration information.
  • the first configuration information is used to configure the configuration used when the first device sends data to the second device, or the configuration used when the second device sends data to the first device.
  • the first configuration information includes at least one of the following information:
  • Frequency domain resource information time domain resource information, modulation and coding information, line code configuration, repetition number information, bandwidth information, rate information, etc.
  • the first information may indicate a rule for the tag to report the identifier, such as reporting a partial identifier, reporting the last N bits, and which identifier to report, or reporting partial bits of which identifier.
  • the first device subsequently reports according to the indicated rule.
  • the rule may be obtained from the first network element.
  • the first message may also include the device type information being paged.
  • the device type information being paged may indicate a 1 microwatt-level device, a 100 microwatt-level device, a device based on reflection communication, or a device that can actively send radio frequency signals.
  • the device type information included in the first message indicates that a device meeting this type responds to the first operation instruction, or the device type information included in the first message indicates that the network supports this type of device for information transmission.
  • the device type information included in the first message can be determined or generated by the second device itself, and does not necessarily have to be obtained from the first network element.
  • the device type information being paged indicates an A-IoT device of type 1 in the standard, or an A-IoT device of type 2.
  • the type 2 A-IoT device can also be divided into a type 2-1 A-IoT device or a type 2-2 A-IoT device, and the device type can be distinguished based on whether an active carrier is used.
  • the first device before the first network element sends the first operation instruction to the second device, the first device indicates to the first network element whether there is storage space other than the storage identifier (such as EPC), or the size of the storage space other than the storage identifier (such as EPC), or the size of the storage identifier storage space, and at least one of the number of storage spaces.
  • the first network element or the application layer may send the first instruction or other instructions based on this.
  • Step S416 When the first device determines to select only the first device as the target device based on the first information, the first device sends a response message to the first message to the second device. Correspondingly, the second device receives the response message to the first message.
  • the first operation instruction may be only an instruction with low security requirements, such as a read instruction.
  • instructions with high security requirements such as a write instruction, may not be supported to be sent in the first message.
  • the first device determines that the first network element only selects the first device as the target device, it can immediately feedback the response message of the first message to the second device, that is, the first device does not have the random access process shown in Figure 3 above before feedback of the response message of the first message.
  • the first device may send a response message of the first message to the second device according to the first configuration information.
  • the first device also needs to determine whether it matches the device type requirement. If it matches, a response message to the first message may be sent.
  • the multiple devices may perform the above step S416 on their corresponding transmission opportunities (time domain resources and frequency domain resources).
  • the multiple devices may determine their respective transmission opportunities according to the order of their respective identifications.
  • Step S418 The second device sends a response message of the second message to the first network element based on the response message of the first message.
  • the first network element receives the response message of the second message.
  • the response message to the second message includes the to-be-transmitted information of the first device requested by the first operation instruction.
  • the response message to the above-mentioned first message and the response message to the above-mentioned second message may further include second identification information associated with the first device.
  • the second identification of the first device indicated by the second identification information may be the same as the first identification of the first device indicated by the above-mentioned first identification information; or, the second identification is part of the first identification; or, the second identification is completely different from the second identification; or, the second identification may be a temporary identification assigned to the first device or a permanently stored identification of the first device, such as a tag identity (TID) or an identification assigned by the core network.
  • TID tag identity
  • the first network element may perform identification verification on the first device based on the above-mentioned second identification information to ensure that the response message to the second message comes from the first device.
  • the first identification is EPC
  • the second identification may be a truncated EPC or a part of the EPC.
  • the first message may further include which part of the identification information the first device feeds back, or how many bits of identification information.
  • the response message to the second message may further include a service type or a service type identifier or an interface identifier.
  • the first device when the first device determines that the first message only pages itself, it can immediately respond to the first operation instruction, that is, immediately report the information to be transmitted requested by the first operation instruction, eliminating the random access process of the first device, which not only reduces the delay of information transmission but also saves the energy consumption of the first device.
  • the second device when the above-mentioned second device is a base station, the second device may include a CU module and a DU module.
  • the CU module receives the second message sent by the first network element, and then the CU module forwards the second message to the DU module.
  • the DU module sends the first message to the first device.
  • the first device sends a response message of the first message to the DU module, and the DU module forwards the response message of the first message to the CU module.
  • the CU module sends a response message of the second message to the first network element.
  • the specific description of the second message, the first message, the response message of the first message, and the response message of the second message can be referred to above and will not be repeated here.
  • the first device can send second identification information associated with the first device at the same time as sending the information to be transmitted requested by the first operation instruction, so that the first network element can perform identification verification.
  • the security level of the identification verification may not be sufficient.
  • the present application can also provide a communication method 500, in which the first network element can perform a higher level of security verification on the information reported by the first device to ensure that the information to be transmitted requested by the first operation instruction received by the first network element is from the first device.
  • S510 The first network element sends a second message to the second device.
  • the second device receives the second message.
  • the first information may indicate a rule for the tag to report the identifier, such as reporting a partial identifier, reporting the last N bits, and which identifier to report, or reporting partial bits of which identifier.
  • the first device subsequently reports according to the indicated rule.
  • the rule may be obtained from the first network element.
  • step S414 it may also be determined that only the first device is the target device based on the first identification information of the first device and the indication information #1 included in the first information.
  • step S524 the first network element obtains a second verification value according to the preconfigured key and the first parameter, and determines whether the second verification value is consistent with the first verification value.
  • the above-mentioned step S524 can be replaced by step S526, and the first network element obtains the second verification value according to the pre-configured key, first parameter and second parameter, and determines whether the second verification value is consistent with the first verification value.
  • the second device when the second device is a base station, the second device may include a CU module and a DU module.
  • the CU module receives the second message sent by the first network element. Subsequently, the CU module forwards the second message to the DU module.
  • the DU module sends the first message to the first device.
  • the first device sends a response message to the first message to the DU module, and the DU module forwards the response message to the first message to the CU module.
  • the CU module sends a response message to the second message to the first network element. It should be noted that the specific description of the second message, the first message, the response message to the first message, and the response message to the second message can be referred to above and will not be repeated here.
  • FIG. 6 is a schematic flow chart of a communication method 600 provided in an embodiment of the present application. As shown in Figure 6, the method may include at least the following steps:
  • the application layer or upper layer data is directly sent to the second device.
  • the first information may be indication information #1, which indicates that the first network element selects only the first device as the target device, or indication information #1 is used to indicate whether the subsequently issued first operation instruction is intended for one first device or multiple devices; or the first information may be first identification information associated with the first device, or the first information may be multiple identification information associated with multiple devices.
  • the first identification of the first device indicated by the first identification information may be the EPC of the first device, and the multiple identifications of the multiple devices indicated by the multiple identification information may be the EPCs of the multiple devices; or the first information may further include the indication information #1 and the first identification information of the first device.
  • the above-mentioned first information sent by the first network element to the second device can be carried in a service request message.
  • the first information can be carried in an inventory request, a read request, a write request or an AIoT service request, an enable or disable request, etc.
  • the first network element may further send a service type or service type identifier or interface identifier to the second device.
  • the service type or service type identifier or interface identifier may be carried in the same message as the first information and sent, which is not limited in this application.
  • Step S612 The second device sends the first information to the first device, and correspondingly, the first device receives the first information.
  • the first information sent by the second device to the first device may be carried in a Select message, a paging message, a downlink trigger message, an initial downlink trigger message, and the like.
  • the second device may also send first configuration information to the first device, and accordingly, the first device receives the first configuration information.
  • the first configuration information is used to configure the configuration used when the first device sends data to the second device, or the configuration used when the second device sends data to the first device.
  • the first configuration information includes at least one of the following information:
  • the second device may also send the paged device type information to the first device.
  • the paged device type information may indicate a 1 microwatt-level device, a 100 microwatt-level device, a device based on reflection communication, or a device that can actively send radio frequency signals.
  • the device type information indicates that a device that meets this type responds to a subsequent first operation instruction, or the device type information indicates that the network supports this type of device for information transmission.
  • the device type information sent by the second device to the first device may be determined or generated by the second device itself, and does not necessarily have to be obtained from the first network element.
  • the paged device type information indicates an A-IoT device of type 1 in the standard, or an A-IoT device of type 2.
  • the type 2 A-IoT device may also be divided into a type 2-1 A-IoT device or a type 2-2 A-IoT device, and the device type can be distinguished based on whether an active carrier is used.
  • the first device before the first network element sends the first operation instruction to the second device, the first device indicates to the first network element whether there is storage space other than the storage identifier (such as EPC), or the size of the storage space other than the storage identifier (such as EPC), or the size of the storage identifier storage space, and at least one of the number of storage spaces.
  • the first network element or the application layer may send the first instruction or other instructions based on this.
  • Step S614 The first device determines, based on the first information, that the first network element selects only the first device as a target device.
  • the above-mentioned first information is indication information #1, which is used to indicate that only the first device is selected as the target device.
  • the first device can determine that the first network element only selects itself as the target device based on the meaning indicated by the indication information #1; or, the above-mentioned first information is the EPC of the first device, and the first device determines that the first network element only selects itself as the target device based on the EPC that uniquely identifies itself, that is, when the first information completely matches the complete identification information of the first device, it is determined to be a paging for the first device; or, the first information can also include indication information #1 and the first identification information of the first device, and the first device can also determine that only the first device is the target device based on the first identification information of the first device and the indication information #1.
  • Step S616 When the first device determines that the first network element selects only the first device as the target device based on the first information, the first device sends second identification information associated with the first device to the second device. Correspondingly, the second device receives the second identification information.
  • the second identifier of the first device indicated by the second identification information may be the same as the first identifier of the first device indicated by the first identification information; or, the second identifier may be part of the first identifier; or, the second identifier may be completely different from the second identifier; or, the second identifier may be a temporary identifier assigned to the first device or a permanently stored identifier of the first device, such as a TID or an identifier assigned by the core network.
  • the first identifier is an EPC
  • the second identifier may be a truncated EPC or a portion of the EPC.
  • the first information may further include an indication of which portion of the identification information or how many bits of identification information the first device feeds back.
  • the first device also needs to determine whether it matches the device type requirement. If it matches, the second identification information associated with the first device may be sent.
  • Step S618 The second device forwards the second identification information to the first network element.
  • the first network element receives the second identification information.
  • Step S620 The first network element performs an identification verification on the first device based on the second identification information.
  • the data transmitted by the first device to the second device can be identified by carrying a first identification information identifier, a random number, or a unique identifier.
  • the first identification information can be carried at the MAC layer, the PDCP layer, the RRC layer, or the physical layer, or the first identification information can be carried in the transmitted message header, or in the transmitted data format.
  • the second device when the second device is a base station, the second device may include a CU module and a DU module.
  • the CU module receives the first information sent by the first network element, and then the CU module forwards the first information to the DU module.
  • the DU module sends the first information to the first device.
  • the first device sends the second identification information associated with the first device to the DU module, and the DU module forwards the second identification information associated with the first device to the CU module.
  • the CU module sends the second identification information associated with the first device to the first network element.
  • step S622 the CU module receives the first operation instruction sent by the first network element, and then the CU module forwards the first operation instruction to the DU module.
  • step S624 the DU module sends the first operation instruction to the first device.
  • step S626 the first device sends the information to be transmitted requested by the first operation instruction to the DU module, and the DU module forwards the information to be transmitted requested by the first operation instruction to the CU module.
  • step S628 above the CU module sends the information to be transmitted requested by the first operation instruction to the first network element. It should be noted that the specific description of the first information, the second identification information associated with the first device, the first operation instruction, and the information to be transmitted requested by the first operation instruction can be referred to above and will not be repeated here.
  • the network side may be configured to periodically report (eg, periodically report) the tag information, that is, the above process does not need to be triggered by the service requester.
  • the period may be configured by the first network element.
  • the network periodically reports tags within the enterprise campus or affixes them to products. This allows the network to periodically inventory products, monitor the status of products within the enterprise campus or factory, and implement automated warehouse management. Subsequently, the network reports the tag information to the service requester, enabling periodic inventory management.
  • first device may perform some or all of the steps in the above embodiments. These steps or operations are merely examples, and the embodiments of the present application may also perform other operations or variations of various operations. In addition, the various steps may be performed in a different order than those presented in the above embodiments, and it is possible that not all of the operations in the above embodiments need to be performed.
  • the transceiver unit 710 is used to receive the above-mentioned first message and the transceiver unit 710 is also used to send a response message to the first message; the processing unit 720 is used to determine that the first network element only selects the first device as the target device based on the first information.
  • the transceiver unit 710 is further configured to receive first information.
  • the transceiver unit 710 is further configured to receive second identification information associated with the first device.
  • the transceiver unit 710 is used to receive the second message from the first network element and the transceiver unit 710 is used to send the first message to the first device.
  • the transceiver unit 710 is also used to receive a response message to the first message from the first device and the transceiver unit 710 is also used to send a response message to the second message to the first network element.
  • the transceiver unit 710 is further configured to receive first information from the first network element and send the first information to the first device.
  • the transceiver unit 710 is further configured to receive second identification information associated with the first device from the first device, and the transceiver unit 710 is further configured to send the second identification information associated with the first device to the first network element.
  • the transceiver unit 710 is further configured to receive a first operation instruction from the first network element and the transceiver unit 710 is further configured to send the first operation instruction to the first device.
  • the transceiver unit 710 is further configured to receive information to be transmitted requested by the first operation instruction from the first device, and the transceiver unit 710 is further configured to send the information to be transmitted requested by the first operation instruction to the first network element.
  • transceiver unit 710 and the processing unit 720 as well as the meanings of terms such as the first message, the response message of the first message, the second message, the response message of the second message, the first information, the second identification information, the first operation instruction, and the information to be transmitted requested by the first operation instruction, please refer to the description in the method embodiments shown in Figures 4 to 6.
  • the device 700 here is embodied in the form of a functional unit.
  • the term "unit” here can refer to an application specific integrated circuit (ASIC), an electronic circuit, a processor (such as a shared processor, a dedicated processor, or a group processor, etc.) and memory for executing one or more software or firmware programs, a combined logic circuit, and/or other suitable components that support the described functions.
  • ASIC application specific integrated circuit
  • the device 700 can be specifically the first device, the second device, and the first network element in the above-mentioned embodiments, and can be used to execute the various processes and/or steps corresponding to the first device, the second device, and the first network element in the above-mentioned method embodiments.
  • the device 700 can be specifically the first device, the second device, and the first network element in the above-mentioned embodiments, and can be used to execute the various processes and/or steps corresponding to the first device, the second device, and the first network element in the above-mentioned method embodiments. To avoid repetition, it will not be described here.
  • the apparatus 700 of each of the above-mentioned solutions has the function of implementing the corresponding steps performed by the first device, the second device, and the first network element in the above-mentioned method, or the apparatus 700 of each of the above-mentioned solutions has the function of implementing the corresponding steps performed by the first device, the second device, and the first network element in the above-mentioned method.
  • the functions can be implemented by hardware, or can be implemented by hardware executing corresponding software.
  • the processor 810 is used to implement the functions of the processing unit 820 .
  • the memory 820 is integrated with the processor 810 or provided separately.
  • the apparatus 800 further includes a transceiver 830, which is configured to receive and/or transmit signals.
  • the processor 810 is configured to control the transceiver 830 to receive and/or transmit signals.
  • the processor is a general-purpose processor, DSP, ASIC, FPGA or other programmable logic device, discrete gate or transistor logic device, discrete hardware component, the memory (storage module) can be integrated into the processor.
  • memory described herein is intended to include, but is not limited to, these and any other suitable types of memory.
  • an embodiment of the present application provides a chip system 900.
  • the chip system 900 (or processing system) includes a logic circuit 910 and an input/output interface 920. It should be understood that the chip system 900 can be installed in the communication device 700 described above, or in other words, the communication device 700 described above can also include the chip system 900.
  • the logic circuit 910 may be a processing circuit in the chip system 900.
  • the logic circuit 910 may be coupled to a storage unit and call instructions in the storage unit so that the chip system 900 can implement the methods and functions of the various embodiments of the present application.
  • the input/output interface 920 may be an input/output circuit in the chip system 900, outputting information processed by the chip system 900 or inputting data or signaling information to be processed into the chip system 900 for processing.
  • the chip system 900 is used to implement the operations performed by the first device, the second device and the first network element in the above method embodiments.
  • the logic circuit 910 is used to implement operations related to processing by the first device, the second device and the first network element in the above method embodiments, such as operations related to processing by the first device, the second device and the first network element in any one of the embodiments shown in Figures 4 to 6, that is, the logic circuit 910 is used to implement the functions of the above-mentioned processing unit 720;
  • the input/output interface 920 is used to implement operations related to sending and/or receiving by the first device, the second device and the first network element in the above method embodiments, such as operations related to sending and/or receiving performed by the first device, the second device and the first network element in any one of the embodiments shown in Figures 4 to 6, that is, the input/output interface 920 is used to implement the functions of the above-mentioned transceiver unit 710.
  • An embodiment of the present application further provides a computer-readable storage medium storing computer instructions for implementing the methods executed by the first device, the second device, and the first network element in the above-mentioned method embodiments.
  • the computer when the computer program is executed by a computer, the computer can implement the methods performed by the first device, the second device, and the first network element in each embodiment of the above method.
  • An embodiment of the present application further provides a computer program product comprising instructions, which, when executed by a computer, implement the methods performed by the first device, the second device, and the first network element in the above-mentioned method embodiments.
  • the disclosed devices and methods can be implemented in other ways.
  • the device embodiments described above are only schematic.
  • the division of the units is only a logical function division.
  • the mutual coupling or direct coupling or communication connection shown or discussed can be through some interfaces, indirect coupling or communication connection of devices or units, which can be electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separate, and the components shown as units may or may not be physical units, that is, they may be located in one place or distributed across multiple network units. Some or all of these units may be selected to achieve the purpose of this embodiment according to actual needs.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
  • the functions are implemented in the form of software functional units and sold or used as independent products, they can be stored in a computer-readable storage medium.
  • the computer software product is stored in a storage medium and includes several instructions for enabling a computer device (which can be a personal computer, server, or network device, etc.) to execute all or part of the steps of the method described in each embodiment of the present application.
  • the aforementioned storage media include: U disk, mobile hard disk, read-only memory (ROM), random access memory (RAM), magnetic disk or optical disk, and other media that can store program codes.

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present application provides a communication method and a communication apparatus. The communication method comprises: when a terminal device confirms that a core network only selects the terminal device as a target device, the terminal device can directly report information requested by the core network to the core network, without needing to perform the random access procedure by the terminal device. By means of the communication method of embodiments of the present application, the communication delay can be reduced, and the power consumption of the terminal device can be saved.

Description

通信方法和通信装置Communication method and communication device

本申请要求于2024年04月03日提交中国国家知识产权局、申请号为202410405438.1、申请名称为“通信方法和通信装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。This application claims priority to the Chinese patent application filed with the State Intellectual Property Office of China on April 3, 2024, with application number 202410405438.1 and application name “Communication Method and Communication Device”, the entire contents of which are incorporated by reference into this application.

技术领域Technical Field

本申请涉及通信技术领域,并且更具体地,涉及一种通信方法和通信装置。The present application relates to the field of communication technology, and more particularly, to a communication method and a communication device.

背景技术Background Art

随着第五代(5th generation,5G)通信技术的演进和发展,在5G网络中支持更低功耗终端的需求越来越大,环境物联网(ambient internet of things,AIoT)通信技术能够支持微瓦级功耗,满足5G网络对更低功耗终端的需求。With the evolution and development of fifth - generation (5G) communication technology, the demand for supporting lower-power terminals in 5G networks is increasing. The ambient internet of things (AIoT) communication technology can support microwatt-level power consumption, meeting the 5G network's demand for lower-power terminals.

AIoT通信中的终端在与读写器通信之前需要执行随机接入流程,当前的随机接入流程较多导致通信时延较长并且较多的随机接入流程也会导致终端的能耗较高。因此,如何设计一种技术方案,能够使得终端与读写器高效通信是本申请亟待解决的问题。In AIoT communication, terminals must perform a random access procedure before communicating with a reader/writer. Currently, the large number of random access procedures results in long communication delays and high energy consumption for the terminal. Therefore, designing a technical solution that enables efficient communication between the terminal and the reader/writer is an urgent issue to be addressed in this application.

发明内容Summary of the Invention

本申请提供一种通信方法,能够减少终端与读写器之间的通信时延以及节省终端的能耗。The present application provides a communication method that can reduce the communication delay between a terminal and a reader and save energy consumption of the terminal.

第一方面,提供了一种通信方法,该方法可以由第一设备执行,也可以由第一设备的组成部件(例如芯片或者电路或芯片系统)执行。为了便于理解,下文中以第一设备执行为例进行描述。In a first aspect, a communication method is provided. The method may be executed by a first device or a component of the first device (e.g., a chip, a circuit, or a chip system). For ease of understanding, the following description is based on the first device as an example.

该方法包括:第一设备从第二设备接收第一消息,该第一消息包括第一信息和第一操作指令;当第一设备根据第一信息确定第一网元仅选择第一设备为目标设备时,第一设备向第二设备发送第一消息的响应消息,该第一消息的响应消息包括第一操作指令所请求的第一设备的待传输信息。The method includes: a first device receives a first message from a second device, the first message including first information and a first operation instruction; when the first device determines, based on the first information, that the first network element only selects the first device as the target device, the first device sends a response message to the first message to the second device, the response message to the first message including the information to be transmitted of the first device requested by the first operation instruction.

通过上述方法,第一设备确定核心网仅寻呼一个终端时,第一设备可以不用执行向第二设备的随机接入过程,直接上报核心网的操作指令所请求的待传输信息,不仅可以减少通信时延,还可以节省第一设备的能耗。Through the above method, when the first device determines that the core network only pages one terminal, the first device does not need to perform the random access process to the second device, and can directly report the information to be transmitted requested by the core network's operation instructions, which not only reduces communication delay, but also saves energy consumption of the first device.

结合第一方面,在第一方面的某些实现方式中,上述第一信息为与第一设备关联的第一标识信息。In combination with the first aspect, in some implementations of the first aspect, the first information is first identification information associated with the first device.

具体地,上述第一标识信息所指示的第一标识能够唯一标识第一设备。Specifically, the first identifier indicated by the above-mentioned first identification information can uniquely identify the first device.

结合第一方面,在第一方面的某些实现方式中,上述第一消息的响应消息还包括与第一设备关联的第二标识信息。In combination with the first aspect, in some implementations of the first aspect, the response message to the first message further includes second identification information associated with the first device.

具体地,该第二标识信息所指示的第一设备的第二标识与上述第一标识信息所指示的第一设备的第一标识相同,或者,该第二标识是第一标识的部分内容,或者,该第二标识与第一标识完全不同,或者,该第二标识为第一设备的临时标识,或者,该第二标识为永久保存的第一设备的标识。Specifically, the second identifier of the first device indicated by the second identification information is the same as the first identifier of the first device indicated by the above-mentioned first identification information, or the second identifier is part of the first identifier, or the second identifier is completely different from the first identifier, or the second identifier is a temporary identifier of the first device, or the second identifier is a permanently stored identifier of the first device.

通过上述方法,第一设备在上报核心网的操作指令所请求的待传输信息的同时也上报自身的标识信息,使得核心网可以对所接收信息的信息来源进行验证,实现安全传输。另外,第一设备上报的可以是部分标识,节省信令开销。Through the above method, the first device reports its own identification information simultaneously with the information to be transmitted requested by the core network's operation instruction. This allows the core network to verify the source of the received information and achieve secure transmission. Furthermore, the first device can report only a partial identification, saving signaling overhead.

结合第一方面,在第一方面的某些实现方式中,上述第一消息还包括第一参数,上述方法还包括:第一设备根据预配置的密钥和第一参数获取第一校验值,上述第一消息的响应消息还包括该第一校验值。In combination with the first aspect, in certain implementations of the first aspect, the above-mentioned first message also includes a first parameter, and the above-mentioned method also includes: the first device obtains a first verification value based on the preconfigured key and the first parameter, and the response message of the above-mentioned first message also includes the first verification value.

具体地,上述预配置的密钥可以是核心网指示给第一设备的,或者核心网配置的第一设备的,本申请对此不作限定。Specifically, the above-mentioned pre-configured key may be indicated by the core network to the first device, or configured by the core network to the first device, which is not limited in this application.

通过上述方法,第一设备可以基于预配置的密钥和核心网所提供的参数生成校验值,并上报给核心网,使得核心网基于此校验值进行校验,保证核心网所接收的信息来自于目标设备,实现安全传输。Through the above method, the first device can generate a verification value based on the preconfigured key and the parameters provided by the core network, and report it to the core network, so that the core network performs verification based on this verification value to ensure that the information received by the core network comes from the target device and achieve secure transmission.

结合第一方面,在第一方面的某些实现方式中,上述第一设备根据预配置的密钥和第一参数获取第一校验值包括:第一设备根据预配置的密钥、第一参数和第二参数获取第一校验值,上述第一消息的响应消息还包括第二参数。In combination with the first aspect, in certain implementations of the first aspect, the first device obtains the first verification value based on the preconfigured key and the first parameter, including: the first device obtains the first verification value based on the preconfigured key, the first parameter and the second parameter, and the response message of the first message also includes the second parameter.

通过上述方法,第一设备可以基于预配置的密钥、核心网所提供的参数以及第一设备所提供的参数生成校验值,并上报给核心网,使得核心网基于此校验值进行校验,提升了安全校验的等级,更加保证核心网所接收的信息来自于目标设备,实现安全传输。Through the above method, the first device can generate a verification value based on the pre-configured key, the parameters provided by the core network, and the parameters provided by the first device, and report it to the core network, so that the core network performs verification based on this verification value, thereby improving the level of security verification and further ensuring that the information received by the core network comes from the target device, thereby achieving secure transmission.

结合第一方面,在第一方面的某些实现方式中,上述第一消息还可以包括第一指示信息,该第一指示信息指示第一设备上报第一校验值。In combination with the first aspect, in some implementations of the first aspect, the first message may further include first indication information, where the first indication information instructs the first device to report the first verification value.

具体地,第一消息还可以不包括上述第一指示信息,第一设备生成第一校验值之后可以主动上报。Specifically, the first message may not include the above-mentioned first indication information, and the first device may actively report the first verification value after generating it.

结合第一方面,在第一方面的某些实现方式中,上述第一设备向第二设备发送第一消息的响应消息,包括:第一设备从第二设备接收第一配置信息;第一设备根据第一配置信息向第二设备发送第一消息的响应消息。In combination with the first aspect, in certain implementations of the first aspect, the above-mentioned first device sends a response message to the first message to the second device, including: the first device receives first configuration information from the second device; the first device sends a response message to the first message to the second device based on the first configuration information.

其中,上述第一配置信息可以包括以下至少一项信息:The first configuration information may include at least one of the following:

频域资源信息、时域资源信息、调制编码信息、重复次数信息、带宽信息、速率信息。Frequency domain resource information, time domain resource information, modulation and coding information, repetition number information, bandwidth information, and rate information.

通过上述方法,第二设备可以为第一设备的数据传输分配资源,第一设备在确定核心网仅选择该第一设备为目标设备时直接在所分配的资源上传输数据。Through the above method, the second device can allocate resources for data transmission of the first device, and the first device directly transmits data on the allocated resources when determining that the core network only selects the first device as the target device.

示例性地,上述第一配置信息也可以携带在上述第一消息中发送。Exemplarily, the first configuration information may also be carried in the first message and sent.

第二方面,提供了一种通信方法,该方法可以由第一设备执行,也可以由第一设备的组成部件(例如芯片或者电路或芯片系统)执行。为了便于理解,下文中以第一设备执行为例进行描述。In a second aspect, a communication method is provided. The method may be executed by a first device or a component of the first device (e.g., a chip, a circuit, or a chip system). For ease of understanding, the following description is based on the first device as an example.

该方法包括:第一设备接收第一信息;当第一设备根据第一信息确定第一网元仅选择第一设备为目标设备时,第一设备发送与第一设备关联的第二标识信息,该第二标识信息用于第一网元对第一设备进行标识校验;第一设备接收来自第一网元的第一操作指令,该第一操作指令是第一网元对第一设备进行标识校验通过后发送的;第一设备基于第一操作指令发送第一操作指令所请求的第一设备的待传输信息。The method includes: a first device receives first information; when the first device determines that the first network element only selects the first device as the target device based on the first information, the first device sends second identification information associated with the first device, and the second identification information is used by the first network element to perform identification verification on the first device; the first device receives a first operation instruction from the first network element, and the first operation instruction is sent after the first network element passes the identification verification on the first device; the first device sends the to-be-transmitted information of the first device requested by the first operation instruction based on the first operation instruction.

通过上述方法,第一设备确定核心网仅寻呼一个终端时,向核心网上报自身的标识信息,待核心网对第一设备的标识校验通过后,会向第一设备下发操作指令,第一设备可以直接上报核心网的操作指令所请求的待传输信息。上述方法是核心网对目标设备的标识信息校验通过后再下发操作指令,避免了操作指令提前发送可能会带来的潜在风险;另外,上述方法中的第一设备确定核心网仅寻呼一个终端时,第一设备可以不用执行向第二设备的随机接入过程,接收到核心网下发的操作指令后可以直接上报核心网的操作指令所请求的待传输信息,不仅可以减少第一设备与第二设备之间的通信时延,还可以节省第一设备的能耗。Through the above method, when the first device determines that the core network is only paging one terminal, it reports its own identification information to the core network. After the core network verifies the identification of the first device, it will send an operation instruction to the first device. The first device can directly report the information to be transmitted requested by the operation instruction of the core network. The above method is that the core network verifies the identification information of the target device before issuing the operation instruction, avoiding the potential risks that may be caused by sending the operation instruction in advance. In addition, in the above method, when the first device determines that the core network is only paging one terminal, the first device does not need to perform the random access process to the second device. After receiving the operation instruction issued by the core network, it can directly report the information to be transmitted requested by the operation instruction of the core network. This can not only reduce the communication delay between the first device and the second device, but also save the energy consumption of the first device.

结合第二方面,在第二方面的某些实现方式中,上述第一信息为与第一设备关联的第一标识信息。In combination with the second aspect, in some implementations of the second aspect, the first information is first identification information associated with the first device.

具体地,上述第一标识信息所指示的第一标识能够唯一标识第一设备。Specifically, the first identifier indicated by the above-mentioned first identification information can uniquely identify the first device.

结合第二方面,在第二方面的某些实现方式中,上述第二标识信息所指示的第一设备的第二标识与上述第一标识信息所指示的第一设备的第一标识相同,或者,该第二标识是第一标识的部分内容,或者,该第二标识与第一标识完全不同,或者,该第二标识为第一设备的临时标识,或者,该第二标识为永久保存的第一设备的标识。In combination with the second aspect, in certain implementations of the second aspect, the second identification of the first device indicated by the above-mentioned second identification information is the same as the first identification of the first device indicated by the above-mentioned first identification information, or the second identification is part of the first identification, or the second identification is completely different from the first identification, or the second identification is a temporary identification of the first device, or the second identification is a permanently stored identification of the first device.

通过上述方法,第一设备可以上报部分标识进行标识校验,节省信令开销。Through the above method, the first device can report part of the identifier for identifier verification, saving signaling overhead.

第三方面,提供了一种通信方法,该方法可以由第一网元执行,也可以由第一网元的组成部件(例如芯片或者电路或芯片系统)执行。为了便于理解,下文中以第一网元执行为例进行描述。In a third aspect, a communication method is provided. The method may be executed by a first network element or by a component of the first network element (e.g., a chip, a circuit, or a chip system). For ease of understanding, the following description will be based on the first network element as an example.

该方法包括:第一网元向第二设备发送第二消息,该第二消息包括第一信息和第一操作指令,该第一信息指示第一网元仅选择第一设备为目标设备;第一网元从第二设备接收第二消息的响应消息,该第二消息的响应消息包括第一操作指令所请求的第一设备的待传输信息。The method includes: a first network element sends a second message to a second device, the second message including first information and a first operation instruction, the first information instructing the first network element to select only the first device as the target device; the first network element receives a response message to the second message from the second device, the response message to the second message including the information to be transmitted of the first device requested by the first operation instruction.

通过上述方法,核心网仅寻呼一个目标设备时,该目标设备可以不用执行向第二设备的随机接入过程,直接上报核心网的操作指令所请求的待传输信息,不仅可以减少通信时延,还可以节省第一设备的能耗。Through the above method, when the core network only pages one target device, the target device does not need to perform the random access process to the second device, and can directly report the information to be transmitted requested by the core network's operation instruction, which not only reduces communication delay, but also saves energy consumption of the first device.

结合第三方面,在第三方面的某些实现方式中,上述第一信息为与第一设备关联的第一标识信息。In combination with the third aspect, in some implementations of the third aspect, the first information is first identification information associated with the first device.

具体地,上述第一标识信息所指示的第一标识能够唯一标识第一设备。Specifically, the first identifier indicated by the above-mentioned first identification information can uniquely identify the first device.

结合第三方面,在第三方面的某些实现方式中,上述第一消息的响应消息还包括与第一设备关联的第二标识信息。In combination with the third aspect, in some implementations of the third aspect, the response message to the above-mentioned first message also includes second identification information associated with the first device.

具体地,该第二标识信息所指示的第一设备的第二标识与上述第一标识信息所指示的第一设备的第一标识相同,或者,该第二标识是第一标识的部分内容,或者,该第二标识与第一标识完全不同,或者,该第二标识为第一设备的临时标识,或者,该第二标识为永久保存的第一设备的标识。Specifically, the second identifier of the first device indicated by the second identification information is the same as the first identifier of the first device indicated by the above-mentioned first identification information, or the second identifier is part of the first identifier, or the second identifier is completely different from the first identifier, or the second identifier is a temporary identifier of the first device, or the second identifier is a permanently stored identifier of the first device.

通过上述方法,第一设备在上报核心网的操作指令所请求的待传输信息的同时也上报自身的标识信息,使得核心网可以对所接收信息的信息来源进行验证,实现安全传输。另外,第一设备上报的可以是部分标识,节省信令开销。Through the above method, the first device reports its own identification information simultaneously with the information to be transmitted requested by the core network's operation instruction. This allows the core network to verify the source of the received information and achieve secure transmission. Furthermore, the first device can report only a partial identification, saving signaling overhead.

结合第三方面,在第三方面的某些实现方式中,上述第二消息还包括第一参数,该第一参数用于第一设备获取第一校验值,上述第二消息的响应消息还包括该第一校验值,上述方法还包括:第一网元根据预配置的密钥和第一参数获取第二校验值,并判断该第二校验值和上述第一校验值是否一致;若第二校验值和第一校验值一致,则安全校验通过,若第二校验值和第一校验值不一致,则安全校验不通过。In combination with the third aspect, in certain implementations of the third aspect, the second message also includes a first parameter, which is used by the first device to obtain a first verification value, and the response message of the second message also includes the first verification value. The method also includes: the first network element obtains a second verification value based on a preconfigured key and the first parameter, and determines whether the second verification value is consistent with the first verification value; if the second verification value is consistent with the first verification value, the security verification passes; if the second verification value is inconsistent with the first verification value, the security verification fails.

具体地,上述预配置的密钥可以是核心网指示给第一设备的,或者核心网配置的第一设备的,本申请对此不作限定。Specifically, the above-mentioned pre-configured key may be indicated by the core network to the first device, or configured by the core network to the first device, which is not limited in this application.

通过上述方法,核心网可以对第一设备基于预配置的密钥和核心网所提供的参数生成的校验值进行校验,可以保证核心网所接收的信息来自于目标设备,实现安全传输。Through the above method, the core network can verify the verification value generated by the first device based on the preconfigured key and the parameters provided by the core network, thereby ensuring that the information received by the core network comes from the target device and achieving secure transmission.

结合第三方面,在第三方面的某些实现方式中,上述第一参数用于第一设备获取第一校验值,包括:第一参数和第二参数用第一设备获取第一校验值,上述第二消息的响应消息还包括该第二参数。上述第一网元根据预配置的密钥和第一参数获取第二校验值,包括:第一网元根据预配置的密钥、第一参数和第二参数获取第二校验值。In conjunction with the third aspect, in certain implementations of the third aspect, the first parameter is used by the first device to obtain a first verification value, including: the first parameter and the second parameter are used by the first device to obtain the first verification value, and the response message to the second message also includes the second parameter. The first network element obtains the second verification value based on a preconfigured key and the first parameter, including: the first network element obtains the second verification value based on the preconfigured key, the first parameter, and the second parameter.

通过上述方法,核心网可以对第一设备基于预配置的密钥、核心网所提供的参数以及第一设备所提供的参数生成的校验值进行校验,提升了安全校验的等级,更加保证核心网所接收的信息来自于目标设备,实现安全传输。Through the above method, the core network can verify the verification value generated by the first device based on the pre-configured key, the parameters provided by the core network, and the parameters provided by the first device, thereby improving the level of security verification and further ensuring that the information received by the core network comes from the target device, thereby achieving secure transmission.

结合第三方面,在第三方面的某些实现方式中,上述第二消息还可以包括第一指示信息,该第一指示信息指示第一设备上报第一校验值。In combination with the third aspect, in some implementations of the third aspect, the second message may further include first indication information, where the first indication information instructs the first device to report a first verification value.

具体地,第二消息还可以不包括上述第一指示信息,第一设备生成第一校验值之后可以主动上报。Specifically, the second message may not include the above-mentioned first indication information, and the first device may actively report the first verification value after generating it.

第四方面,提供了一种通信方法,该方法可以由第一网元执行,也可以由第一网元的组成部件(例如芯片或者电路或芯片系统)执行。为了便于理解,下文中以第一网元执行为例进行描述。In a fourth aspect, a communication method is provided. The method can be executed by a first network element or by a component of the first network element (e.g., a chip, a circuit, or a chip system). For ease of understanding, the following description is based on the first network element as an example.

该方法包括:第一网元接收第一信息,该第一信息指示第一网元仅选择第一设备为目标设备;第一网元接收与第一设备关联的第二标识信息;第一网元基于第二标识信息对第一设备进行标识校验;当标识校验通过后,第一网元发送第一操作指令;第一网元接收第一操作指令所请求的第一设备的待传输信息。The method includes: a first network element receives first information, which instructs the first network element to select only the first device as the target device; the first network element receives second identification information associated with the first device; the first network element performs an identification verification on the first device based on the second identification information; when the identification verification passes, the first network element sends a first operation instruction; the first network element receives the to-be-transmitted information of the first device requested by the first operation instruction.

通过上述方法,核心网仅寻呼一个目标设备时,该目标设备向核心网上报自身的标识信息,待核心网对第一设备的标识校验通过后,会向第一设备下发操作指令,该目标设备可以不用执行向第二设备的随机接入过程,直接上报核心网的操作指令所请求的待传输信息,不仅可以减少通信时延,还可以节省第一设备的能耗。Through the above method, when the core network only pages one target device, the target device reports its own identification information to the core network. After the core network passes the identification verification of the first device, it will send an operation instruction to the first device. The target device does not need to perform the random access process to the second device, and can directly report the information to be transmitted requested by the operation instruction of the core network. This can not only reduce communication delay, but also save energy consumption of the first device.

结合第四方面,在第四方面的某些实现方式中,上述第一信息为与第一设备关联的第一标识信息。In combination with the fourth aspect, in some implementations of the fourth aspect, the first information is first identification information associated with the first device.

具体地,上述第一标识信息所指示的第一标识能够唯一标识第一设备。Specifically, the first identifier indicated by the above-mentioned first identification information can uniquely identify the first device.

结合第四方面,在第四方面的某些实现方式中,上述第二标识信息所指示的第一设备的第二标识与上述第一标识信息所指示的第一设备的第一标识相同,或者,该第二标识是第一标识的部分内容,或者,该第二标识与第一标识完全不同,或者,该第二标识为第一设备的临时标识,或者,该第二标识为永久保存的第一设备的标识。In combination with the fourth aspect, in certain implementations of the fourth aspect, the second identifier of the first device indicated by the above-mentioned second identification information is the same as the first identifier of the first device indicated by the above-mentioned first identification information, or the second identifier is part of the first identifier, or the second identifier is completely different from the first identifier, or the second identifier is a temporary identifier of the first device, or the second identifier is a permanently stored identifier of the first device.

通过上述方法,第一设备可以上报部分标识进行标识校验,节省信令开销。Through the above method, the first device can report part of the identifier for identifier verification, saving signaling overhead.

第五方面,提供了一种通信装置,该通信装置包括:收发单元,用于从第二设备接收第一消息,该第一消息包括第一信息和第一操作指令;处理单元,根据第一信息确定第一网元仅选择第一设备为目标设备;上述收发单元还用于当第一设备根据第一信息确定第一网元仅选择第一设备为目标设备时向第二设备发送第一消息的响应消息,该第一消息的响应消息包括第一操作指令所请求的第一设备的待传输信息。In a fifth aspect, a communication device is provided, which includes: a transceiver unit for receiving a first message from a second device, the first message including first information and a first operation instruction; a processing unit for determining, based on the first information, that the first network element only selects the first device as the target device; the above-mentioned transceiver unit is also used to send a response message of the first message to the second device when the first device determines, based on the first information, that the first network element only selects the first device as the target device, the response message of the first message including the information to be transmitted of the first device requested by the first operation instruction.

结合第五方面,在第五方面的某些实现方式中,上述第一消息还包括第一参数,上述处理单元还用于根据预配置的密钥和第一参数获取第一校验值,上述第一消息的响应消息还包括该第一校验值。In combination with the fifth aspect, in certain implementations of the fifth aspect, the above-mentioned first message also includes a first parameter, the above-mentioned processing unit is also used to obtain a first verification value based on the preconfigured key and the first parameter, and the response message of the above-mentioned first message also includes the first verification value.

结合第五方面,在第五方面的某些实现方式中,上述处理单元还用于根据预配置的密钥和第一参数获取第一校验值,包括:上述处理单元还用于根据预配置的密钥、第一参数和第二参数获取第一校验值,上述第一消息的响应消息还包括第二参数。In combination with the fifth aspect, in certain implementations of the fifth aspect, the above-mentioned processing unit is also used to obtain a first verification value based on a preconfigured key and a first parameter, including: the above-mentioned processing unit is also used to obtain a first verification value based on a preconfigured key, a first parameter and a second parameter, and the response message of the above-mentioned first message also includes a second parameter.

结合第五方面,在第五方面的某些实现方式中,上述收发单元用于向第二设备发送第一消息的响应消息,包括:上述收发单元用于从第二设备接收第一配置信息;上述收发单元用于根据第一配置信息向第二设备发送第一消息的响应消息。In combination with the fifth aspect, in certain implementations of the fifth aspect, the above-mentioned transceiver unit is used to send a response message of the first message to the second device, including: the above-mentioned transceiver unit is used to receive first configuration information from the second device; the above-mentioned transceiver unit is used to send a response message of the first message to the second device based on the first configuration information.

关于第五方面的相关解释以及有益效果的描述可以参见第一方面的描述。For the relevant explanation and description of the beneficial effects of the fifth aspect, please refer to the description of the first aspect.

第六方面,提供了一种通信装置,该通信装置包括:收发单元,用于接收第一信息;处理单元,用于根据第一信息确定第一网元仅选择第一设备为目标设备;上述收发单元还用于当第一设备根据第一信息确定第一网元仅选择第一设备为目标设备时发送与第一设备关联的第二标识信息,该第二标识信息用于第一网元对第一设备进行标识校验;上述收发单元还用于接收来自第一网元的第一操作指令,该第一操作指令是第一网元对第一设备进行标识校验通过后发送的;上述收发单元还用于基于第一操作指令发送第一操作指令所请求的第一设备的待传输信息。In a sixth aspect, a communication device is provided, which includes: a transceiver unit for receiving first information; a processing unit for determining, based on the first information, that the first network element only selects the first device as the target device; the above-mentioned transceiver unit is also used to send second identification information associated with the first device when the first device determines, based on the first information, that the first network element only selects the first device as the target device, and the second identification information is used by the first network element to perform identification verification on the first device; the above-mentioned transceiver unit is also used to receive a first operation instruction from the first network element, and the first operation instruction is sent after the first network element passes the identification verification on the first device; the above-mentioned transceiver unit is also used to send the to-be-transmitted information of the first device requested by the first operation instruction based on the first operation instruction.

关于第六方面的相关解释以及有益效果的描述可以参见第二方面的描述。For the relevant explanation and description of the beneficial effects of the sixth aspect, please refer to the description of the second aspect.

第七方面,提供了一种通信装置,该通信装置包括:收发单元,用于向第二设备发送第二消息,该第二消息包括第一信息和第一操作指令,该第一信息指示第一网元仅选择第一设备为目标设备;上述收发单元还用于从第二设备接收第二消息的响应消息,该第二消息的响应消息包括第一操作指令所请求的第一设备的待传输信息。In the seventh aspect, a communication device is provided, which includes: a transceiver unit for sending a second message to a second device, the second message including first information and a first operation instruction, the first information instructing the first network element to only select the first device as the target device; the above-mentioned transceiver unit is also used to receive a response message to the second message from the second device, the response message to the second message including the information to be transmitted of the first device requested by the first operation instruction.

结合第七方面,在第七方面的某些实现方式中,上述第二消息还包括第一参数,该第一参数用于第一设备获取第一校验值,上述第二消息的响应消息还包括该第一校验值,上述通信装置还包括:处理单元,用于根据预配置的密钥和第一参数获取第二校验值,并判断该第二校验值和上述第一校验值是否一致;若第二校验值和第一校验值一致,则安全校验通过,若第二校验值和第一校验值不一致,则安全校验不通过。In combination with the seventh aspect, in certain implementations of the seventh aspect, the above-mentioned second message also includes a first parameter, which is used by the first device to obtain a first verification value, and the response message of the above-mentioned second message also includes the first verification value. The above-mentioned communication device also includes: a processing unit, which is used to obtain a second verification value based on a preconfigured key and the first parameter, and to determine whether the second verification value is consistent with the above-mentioned first verification value; if the second verification value is consistent with the first verification value, the security verification passes; if the second verification value is inconsistent with the first verification value, the security verification fails.

结合第七方面,在第七方面的某些实现方式中,上述第一参数用于第一设备获取第一校验值,包括:第一参数和第二参数用第一设备获取第一校验值,上述第二消息的响应消息还包括该第二参数。上述处理单元用于根据预配置的密钥和第一参数获取第二校验值,包括:上述处理单元用于根据预配置的密钥、第一参数和第二参数获取第二校验值。In conjunction with the seventh aspect, in certain implementations of the seventh aspect, the first parameter is used by the first device to obtain a first verification value, including: the first parameter and the second parameter are used by the first device to obtain the first verification value, and the response message to the second message also includes the second parameter. The processing unit is used to obtain a second verification value based on a preconfigured key and the first parameter, including: the processing unit is used to obtain the second verification value based on the preconfigured key, the first parameter, and the second parameter.

关于第七方面的相关解释以及有益效果的描述可以参见第三方面的描述。For the relevant explanation and description of the beneficial effects of the seventh aspect, please refer to the description of the third aspect.

第八方面,提供了一种通信装置,该通信装置包括:收发单元,用于接收第一信息,该第一信息指示第一网元仅选择第一设备为目标设备;该收发单元还用于接收与第一设备关联的第二标识信息;上述通信装置还包括:处理单元,用于基于第二标识信息对第一设备进行标识校验;当标识校验通过后,上述收发单元还用于发送第一操作指令;上述收发单元还用于接收第一操作指令所请求的第一设备的待传输信息。In the eighth aspect, a communication device is provided, which includes: a transceiver unit for receiving first information, which first information indicates that the first network element only selects the first device as the target device; the transceiver unit is also used to receive second identification information associated with the first device; the above-mentioned communication device also includes: a processing unit for performing identification verification on the first device based on the second identification information; when the identification verification is passed, the above-mentioned transceiver unit is also used to send a first operation instruction; the above-mentioned transceiver unit is also used to receive the to-be-transmitted information of the first device requested by the first operation instruction.

关于第八方面的相关解释以及有益效果的描述可以参见第四方面的描述。For the relevant explanation and description of the beneficial effects of the eighth aspect, please refer to the description of the fourth aspect.

第九方面,提供了一种计算机程序产品,所述计算机程序产品包括:计算机程序(也可以称为代码,或指令),当所述计算机程序被运行时,使得计算机执行上述第一方面至第四方面中任一种可能实现方式中的方法。In the ninth aspect, a computer program product is provided, which includes: a computer program (also referred to as code, or instructions), which, when executed, enables a computer to execute a method in any possible implementation of the first to fourth aspects above.

第十方面,提供了一种计算机可读存储介质,所述计算机可读存储介质存储有计算机程序(也可以称为代码,或指令)当其在计算机上运行时,使得上述第一方面至第四方面中任一种可能实现方式中的方法被执行。In the tenth aspect, a computer-readable storage medium is provided, which stores a computer program (also referred to as code, or instructions) which, when run on a computer, enables the method in any possible implementation of the first to fourth aspects above to be executed.

第十一方面,提供了一种芯片系统,包括:处理器,用于从存储器中调用并运行计算机程序或指令,使得安装有所述芯片系统的通信装置实现如第一方面至第四方面中任一可能实现方式所述的方法。In the eleventh aspect, a chip system is provided, comprising: a processor for calling and running a computer program or instruction from a memory, so that a communication device equipped with the chip system implements the method described in any possible implementation method of the first to fourth aspects.

第十二方面,提供了一种通信系统,包括第一网元,第一设备,第二设备,该第一设备用于执行第一方面、第二方面及第一方面、第二方面中任一种可能的实现方式中的方法,该第一网元用于执行第三方面、第四方面及第三方面、第四方面中任一种可能的实现方式中的方法。In the twelfth aspect, a communication system is provided, including a first network element, a first device, and a second device, the first device being used to execute the method in the first aspect, the second aspect, and any possible implementation of the first aspect and the second aspect, and the first network element being used to execute the method in the third aspect, the fourth aspect, and any possible implementation of the third aspect and the fourth aspect.

附图说明BRIEF DESCRIPTION OF THE DRAWINGS

图1示出了应用于本申请实施例的通信系统的架构图。FIG1 shows an architecture diagram of a communication system applied to an embodiment of the present application.

图2示出了AIoT系统的示意图。FIG2 shows a schematic diagram of an AIoT system.

图3是一种标签的随机接入流程的示意图。FIG3 is a schematic diagram of a tag random access process.

图4是本申请实施例提供的一种通信方法400的示意性流程图。FIG4 is a schematic flowchart of a communication method 400 provided in an embodiment of the present application.

图5是本申请实施例提供的一种通信方500的示意性流程图。FIG5 is a schematic flowchart of a communication party 500 provided in an embodiment of the present application.

图6是本申请实施例提供的一种通信方法600的示意性流程图。FIG6 is a schematic flowchart of a communication method 600 provided in an embodiment of the present application.

图7是本申请实施例提供的通信装置700的示意性框图。FIG7 is a schematic block diagram of a communication device 700 provided in an embodiment of the present application.

图8是本申请实施例提供的又一通信装置800的示意性框图。FIG8 is a schematic block diagram of another communication device 800 provided in an embodiment of the present application.

图9是本申请实施例提供的芯片系统900的示意性框图。FIG9 is a schematic block diagram of a chip system 900 provided in an embodiment of the present application.

具体实施方式DETAILED DESCRIPTION

下面将结合附图,对本申请中的技术方案进行描述。The technical solution in this application will be described below with reference to the accompanying drawings.

本申请实施例的技术方案可以应用于各种通信系统,例如:长期演进(long term evolution,LTE)系统、LTE频分双工(frequency division duplex,FDD)系统、LTE时分双工(time division duplex,TDD)、通用移动通信系统(universal mobile telecommunication system,UMTS)、第五代(5th generation,5G)系统或新无线(new radio,NR)、物联网系统、非地面网络(non-terrestrial network,NTN)卫星通信系统或者其他演进的通信系统等。The technical solutions of the embodiments of the present application can be applied to various communication systems, such as: long term evolution (LTE) system, LTE frequency division duplex (FDD) system, LTE time division duplex (TDD), universal mobile telecommunication system (UMTS), fifth generation (5G) system or new radio (NR), Internet of Things system, non-terrestrial network (NTN) satellite communication system or other evolved communication systems.

本申请提供的技术方案还可以应用于未来的通信系统,如第六代移动通信系统等。本申请对此不作限定。The technical solution provided in this application can also be applied to future communication systems, such as the sixth generation mobile communication system, etc. This application does not limit this.

本申请提供的技术方案还可以应用于机器类通信(machine type communication,MTC)、机器间通信长期演进技术(long term evolution-machine,LTE-M)、设备到设备(device-to device,D2D)网络、机器到机器(machine to machine,M2M)网络、物联网(internet of things,IoT)网络或者其他网络。其中,IoT网络例如可以包括车联网。其中,车联网系统中的通信方式统称为车到其他设备(vehicle to X,V2X,X可以代表任何事物),例如,该V2X可以包括:车辆到车辆(vehicle to vehicle,V2V)通信,车辆与基础设施(vehicle to infrastructure,V2I)通信、车辆与行人之间的通信(vehicle to pedestrian,V2P)或车辆与网络(vehicle to network,V2N)通信等。The technical solutions provided in this application can also be applied to machine type communication (MTC), long term evolution-machine communication (LTE-M), device-to-device (D2D) networks, machine-to-machine (M2M) networks, Internet of Things (IoT) networks, or other networks. IoT networks, for example, may include Internet of Vehicles (IoV). The communication methods in IoV systems are collectively referred to as vehicle-to-X (V2X), where X can represent anything. For example, V2X may include vehicle-to-vehicle (V2V) communication, vehicle-to-infrastructure (V2I) communication, vehicle-to-pedestrian (V2P) communication, or vehicle-to-network (V2N) communication.

为便于理解,以下对本申请涉及的网元进行说明。For ease of understanding, the network elements involved in this application are described below.

1,终端设备:可以称作用户设备(user equipment,UE)、接入终端、用户单元、用户站、移动站、移动台、远方站、远程终端、移动设备、用户终端、终端、无线通信设备、用户代理或用户装置。1. Terminal equipment: can be called user equipment (UE), access terminal, user unit, user station, mobile station, mobile station, remote station, remote terminal, mobile device, user terminal, terminal, wireless communication equipment, user agent or user device.

终端设备可以是一种向用户提供语音/数据连通性的设备,例如,具有无线连接功能的手持式设备、车载设备等。目前,一些终端的举例为:手机(mobile phone)、平板电脑、笔记本电脑、掌上电脑、移动互联网设备(mobile internet device,MID)、可穿戴设备,虚拟现实(virtual reality,VR)设备、增强现实(augmented reality,AR)设备、工业控制(industrial control)中的无线终端、无人驾驶(self driving)中的无线终端、远程手术(remote medical surgery)中的无线终端、智能电网(smart grid)中的无线终端、运输安全(transportation safety)中的无线终端、智慧城市(smart city)中的无线终端、智慧家庭(smart home)中的无线终端、蜂窝电话、无绳电话、会话启动协议(session initiation protocol,SIP)电话、无线本地环路(wireless local loop,WLL)站、个人数字助理(personal digital assistant,PDA)、具有无线通信功能的手持设备、计算设备或连接到无线调制解调器的其它处理设备、车载设备、可穿戴设备,5G网络中的终端设备或者未来演进的公用陆地移动通信网络(public land mobile network,PLMN)中的终端设备等,本申请实施例对此并不限定。A terminal device can be a device that provides voice/data connectivity to users, such as a handheld device or vehicle-mounted device with wireless connection capabilities. Currently, some examples of terminals include: mobile phones, tablet computers, laptops, PDAs, mobile internet devices (MIDs), wearable devices, virtual reality (VR) devices, augmented reality (AR) devices, wireless terminals in industrial control, wireless terminals in self-driving, wireless terminals in remote medical surgery, wireless terminals in smart grids, wireless terminals in transportation safety, wireless terminals in smart cities, etc. The embodiments of the present application do not limit the wireless terminals in a smart city, a smart home, a cellular phone, a cordless phone, a session initiation protocol (SIP) phone, a wireless local loop (WLL) station, a personal digital assistant (PDA), a handheld device with wireless communication capabilities, a computing device or other processing device connected to a wireless modem, a vehicle-mounted device, a wearable device, a terminal device in a 5G network or a terminal device in a future evolved public land mobile network (PLMN), etc.

作为示例而非限定,在本申请实施例中,该终端设备还可以是可穿戴设备。可穿戴设备也可以称为穿戴式智能设备,是应用穿戴式技术对日常穿戴进行智能化设计、开发出可以穿戴的设备的总称,如眼镜、手套、手表、服饰及鞋等。可穿戴设备即直接穿在身上,或是整合到用户的衣服或配件的一种便携式设备。可穿戴设备不仅仅是一种硬件设备,更是通过软件支持以及数据交互、云端交互来实现强大的功能。广义穿戴式智能设备包括功能全、尺寸大、可不依赖智能手机实现完整或者部分的功能,例如:智能手表或智能眼镜等,以及只专注于某一类应用功能,需要和其它设备如智能手机配合使用,如各类进行体征监测的智能手环、智能首饰等。As an example and not a limitation, in the embodiments of the present application, the terminal device may also be a wearable device. Wearable devices may also be referred to as wearable smart devices, which are a general term for wearable devices that are intelligently designed and developed using wearable technology for daily wear, such as glasses, gloves, watches, clothing, and shoes. A wearable device is a portable device that is worn directly on the body or integrated into the user's clothes or accessories. Wearable devices are not only hardware devices, but also achieve powerful functions through software support, data interaction, and cloud interaction. Broadly speaking, wearable smart devices include those that are fully functional, large in size, and can achieve complete or partial functions without relying on smartphones, such as smart watches or smart glasses, as well as those that only focus on a certain type of application function and need to be used in conjunction with other devices such as smartphones, such as various smart bracelets and smart jewelry for vital sign monitoring.

此外,在本申请实施例中,终端设备还可以是IoT系统中的终端设备,IoT是未来信息技术发展的重要组成部分,其主要技术特点是将物品通过通信技术与网络连接,从而实现人机互连,物物互连的智能化网络。In addition, in the embodiments of the present application, the terminal device can also be a terminal device in an IoT system. IoT is an important part of the future development of information technology. Its main technical feature is to connect objects to the network through communication technology, thereby realizing an intelligent network of human-machine interconnection and object-to-object interconnection.

2,接入网:为终端设备提供入网功能,并能够根据用户的级别、业务的需求等使用不同质量的传输隧道。接入网络可以为采用不同接入技术的接入网络。目前的无线接入技术有两种类型:3GPP接入技术(例如3G、4G或5G系统中采用的无线接入技术)和非3GPP(non-3GPP)接入技术。3GPP接入技术是指符合3GPP标准规范的接入技术,例如,5G系统中的接入网设备称为下一代基站节点(next generation Node Base station,gNB)。非3GPP接入技术是指不符合3GPP标准规范的接入技术,例如,以无线保真(wireless fidelity,WiFi)中的接入点(access point,AP)为代表的空口技术。2. Access network: provides network access functions for terminal devices and can use transmission tunnels of different qualities according to the user level, business requirements, etc. The access network can be an access network that uses different access technologies. There are currently two types of wireless access technologies: 3GPP access technology (such as the wireless access technology used in 3G, 4G or 5G systems) and non-3GPP access technology. 3GPP access technology refers to access technology that complies with 3GPP standards and specifications. For example, the access network equipment in the 5G system is called the next generation Node Base station (gNB). Non-3GPP access technology refers to access technology that does not comply with 3GPP standards and specifications, for example, the air interface technology represented by the access point (AP) in wireless fidelity (WiFi).

基于无线通信技术实现接入网络功能的接入网可以称为无线接入网(radio access network,RAN)。RAN能够管理无线资源,为终端设备提供接入服务,进而完成控制信号和用户数据在终端和核心网之间的转发。RAN还可以是开放式RAN(open RAN,O-RAN)。A radio access network (RAN) is an access network that implements network access functions based on wireless communication technologies. The RAN manages radio resources, provides access services to terminal devices, and forwards control signals and user data between terminals and the core network. The RAN can also be an open RAN (O-RAN).

RAN节点,也称为无线接入网设备、RAN实体或接入节点,用以帮助终端通过无线方式接入到通信系统中。在一种应用场景中,RAN节点可以是基站(base station)、演进型基站(evolved NodeB,eNodeB)、发送接收点(transmission reception point,TRP)、第五代(5th generation,5G)移动通信系统中的下一代基站(next generation NodeB,gNB)、未来移动通信系统中的下一代基站、未来移动通信系统中的基站或WiFi系统中的接入节点。RAN节点可以是宏基站,也可以是微基站或室内站,还可以是中继节点或施主节点。A RAN node, also known as a radio access network device, RAN entity, or access node, facilitates wireless access to a communication system. In one application scenario, a RAN node can be a base station, an evolved NodeB (eNodeB), a transmission reception point (TRP), a next-generation NodeB (gNB) in a fifth-generation (5G) mobile communication system, a next-generation base station in a future mobile communication system, a base station in a future mobile communication system, or an access node in a Wi-Fi system. A RAN node can be a macro base station, a micro base station, an indoor station, a relay node, or a donor node.

在另一种应用场景中,可以通过多个RAN节点的协作来帮助终端实现无线接入,不同的RAN节点分别实现基站的部分功能。例如,RAN节点可以是集中式单元(central unit,CU),也可以是分布式单元(distributed unit,DU)或无线单元(radio unit,RU)。这里的CU完成基站的无线资源控制(radio resource control,RRC)协议和分组数据汇聚层协议(packet data convergence protocol,PDCP)的功能,还可以完成业务数据适配协议(service data adaptation protocol,SDAP)的功能;DU完成基站的无线链路控制(radio link control,RLC)层和介质访问控制(medium access control,MAC)层的功能,还可以完成部分物理层(physical,PHY)或全部物理层的功能,有关上述各个协议层的具体描述,可以参考3GPP的相关技术规范。RU可以用于实现射频信号的收发功能。CU和DU可以是两个独立的RAN节点,也可以是集成在同一个RAN节点中,例如集成在基带单元(baseband unit,BBU)中。RU可以包括在射频设备中,例如包括在射频拉远单元(remote radio unit,RRU)或有源天线单元(active antenna unit,AAU)。CU可以进一步划分为CU-控制面和CU-用户面两种类型的RAN节点。In another application scenario, multiple RAN nodes can collaborate to help terminals achieve wireless access, with different RAN nodes implementing portions of the base station's functions. For example, a RAN node can be a centralized unit (CU), a distributed unit (DU), or a radio unit (RU). The CU implements the base station's radio resource control (RRC) and packet data convergence protocol (PDCP) functions, as well as the service data adaptation protocol (SDAP). The DU implements the base station's radio link control (RLC) and medium access control (MAC) layer functions, as well as some or all of the physical layer (PHY) functions. For detailed descriptions of each of these protocol layers, please refer to the relevant 3GPP technical specifications. The RU is used to transmit and receive RF signals. The CU and DU can be two independent RAN nodes or integrated into the same RAN node, such as the baseband unit (BBU). The RU can be included in radio equipment, such as the remote radio unit (RRU) or active antenna unit (AAU). The CU can be further divided into two types of RAN nodes: the CU-control plane and the CU-user plane.

在不同系统中,RAN节点可以有不同的名称,例如,在O-RAN系统中,CU也可以称为开放式CU(open CU,O-CU),DU也可以称为开放式DU(open DU,O-DU),RU可以称为开放式RU(open RU,O-RU)。本申请中RAN节点可以通过软件模块、硬件模块、或者软件模块与硬件模块结合的方式来实现。例如,RAN节点可以是加载了相应软件模块的服务器。本申请的实施例对RAN节点所采用的具体技术和具体设备形态不做限定。RAN nodes may have different names in different systems. For example, in an O-RAN system, a CU may be called an open CU (O-CU), a DU may be called an open DU (O-DU), and a RU may be called an open RU (O-RU). In this application, a RAN node may be implemented using a software module, a hardware module, or a combination of software and hardware modules. For example, a RAN node may be a server loaded with the corresponding software module. The embodiments of this application do not limit the specific technology or device form used by the RAN node.

应理解,接入网可以为小区提供服务。终端设备可以通过接入网设备分配的传输资源(例如,频域资源,或者说,频谱资源)与小区通信。It should be understood that the access network can provide services for the cell. The terminal device can communicate with the cell through the transmission resources (eg, frequency domain resources, or spectrum resources) allocated by the access network device.

3,核心网设备:网络侧用于管理用户,数据传输以及接入网设备配置的多种功能实体的统称,可用于为接入到接入网设备的终端设备提供核心网服务。核心网设备在不同的系统下可对应不同的设备。比如在4G中核心网设备可以对应移动管理实体(mobilitymanagement entity,MME)和/或服务网关(serving gateway,S-GW)等。在5G中核心网设备可以对应接入和移动性管理功能(access and mobility management function,AMF)实体、环境物联网管理功能(ambient IoT management function,AIoTMF)实体、会话管理功能(session management function,SMF)实体或者用户面功能(user plane function,UPF)实体等。该AIoTMF为用于提供A-IoT服务的核心网网元。3. Core Network Equipment: This refers to a general term for various functional entities used on the network side for user management, data transmission, and access network device configuration. These entities can provide core network services to terminal devices connected to the access network. Core network equipment can correspond to different devices in different systems. For example, in 4G, core network equipment can correspond to mobility management entities (MMEs) and/or serving gateways (S-GWs). In 5G, core network equipment can correspond to access and mobility management function (AMF) entities, ambient IoT management function (AIoTMF) entities, session management function (SMF) entities, or user plane function (UPF) entities. The AIoTMF is a core network element used to provide A-IoT services.

4,读写设备(或称作读写器):是指具有阅读和写入功能的设备。可以理解为是与标签通信的设备,比如读写设备可以是终端设备,也可以是接入网设备(比如,基站),也可以是中继节点(比如,集成无线接入和回传(integrated access and backhaul,IAB)),或者是任意具有读写功能的设备。4. Reader/Writer Device (or Reader/Writer): This refers to a device with both reading and writing capabilities. It can be understood as a device that communicates with tags. For example, a reader/writer device can be a terminal device, an access network device (e.g., a base station), a relay node (e.g., an integrated access and backhaul (IAB)), or any other device with reading and writing capabilities.

5,标签:是指能够响应某种指令或者命令等寻呼消息的终端,该终端主要是指环境物联网(ambient IoT,AIoT)系统中的终端设备。示例性地,标签可以为(电子)标签,即,将存有信息的标记状或卡片状芯片附于人或物品上,用电波进行读取和识别,可分为有源标签、无源标签和半有源标签三种。其中,对于无源标签也可以称为是无源的物联网设备,可以看成是一种终端。5. Tag: A terminal that can respond to certain instructions or commands, such as paging messages. This terminal primarily refers to terminal devices in the ambient IoT (AIoT) system. For example, a tag can be an (electronic) tag, which is a marker or card-like chip containing information attached to a person or object and read and identified using radio waves. Tags can be categorized as active, passive, and semi-active. Passive tags are also called passive IoT devices and can be considered a terminal.

图1示出了可以应用于本申请实施例的通信系统的架构图。如图1的上图所示,架构101包括宏基站和标签,宏基站与标签之间可以进行通信。此时,可以将宏基站看做读写器,宏基站与标签之间为AIoT uu接口,即,空口通信。Figure 1 illustrates an architecture diagram of a communication system applicable to embodiments of the present application. As shown in the upper diagram of Figure 1 , architecture 101 includes a macro base station and a tag, enabling communication between the macro base station and the tag. The macro base station can be considered a reader/writer, with the AIoT uu interface (i.e., air interface communication) between the macro base station and the tag.

示例性地,宏基站也可以替换为终端,终端与标签之间的通信也可以复用AIoT uu接口通信机制。For example, the macro base station can also be replaced by a terminal, and the communication between the terminal and the tag can also reuse the AIoT uu interface communication mechanism.

如图1的中图所示,架构102包括宏基站、微基站以及标签。宏基站与微基站间可以进行通信。微基站可以向标签发送下行传输信号。微基站也可以向标签发送下行激励信号,标签将需要发送给微基站的信号承载在接收到的下行激励信号上反射给微基站。As shown in the middle diagram of Figure 1, architecture 102 includes a macro base station, a micro base station, and a tag. The macro base station and the micro base station can communicate with each other. The micro base station can send downlink transmission signals to the tag. The micro base station can also send downlink excitation signals to the tag. The tag then carries the signal it needs to send to the micro base station on the received downlink excitation signal and reflects it back to the micro base station.

如图1的下图所示,架构103包括宏基站、微基站、辅助设备(Helper)以及标签。标签与微基站的通信可以通过辅助设备转发。As shown in the lower diagram of Figure 1 , the architecture 103 includes a macro base station, a micro base station, a helper, and a tag. Communication between the tag and the micro base station can be forwarded through the helper.

示例性地,图1中的宏基站可以是gNB,微基站可以是Pico基站;或者,图1中的宏基站可以是gNB,微基站可以是IAB节点。Exemplarily, the macro base station in Figure 1 can be a gNB, and the micro base station can be a Pico base station; or, the macro base station in Figure 1 can be a gNB, and the micro base station can be an IAB node.

可以理解,上述图1仅是示例性说明,并不对本申请构成限定。比如,本申请还可以应用于能够进行反射通信的其他通信场景。It is understood that FIG1 is merely an exemplary illustration and does not limit the present application. For example, the present application may also be applied to other communication scenarios capable of reflection communication.

示例性地,图2示出了AIoT系统的一例示意图,如图2所示,AIoT系统包括读写器、电子标签及数据管理系统三个部分。其工作原理是:读写器发射特定频率的无线电波能量用以驱动电路,从而将内部的数据送出,此时读写器便可以依序接收解读数据,送给应用程序做相应的处理。For example, Figure 2 shows a schematic diagram of an AIoT system. As shown in Figure 2, the AIoT system consists of three parts: a reader/writer, an electronic tag, and a data management system. Its operating principle is: the reader/writer transmits radio wave energy of a specific frequency to drive the circuit, thereby transmitting the internal data. The reader/writer then receives and interprets the data in sequence, sending it to the application for processing.

读写器:可以通过天线与电子标签进行无线通信,可以实现对标签识别码和内存数据的读出或写入操作。如图2的左图所示,典型的读写器包含有高频模块(例如,发送器或者接收器)、控制单元以及读写器天线。读写器也可以理解为是与标签通信的设备,形态可以为终端,也可以是基站,或者是一个具有读写功能的设备。Reader/Writer: This device communicates wirelessly with the electronic tag via an antenna, enabling reading or writing of the tag's identification code and stored data. As shown in the left image of Figure 2, a typical reader/writer includes a high-frequency module (e.g., a transmitter or receiver), a control unit, and a reader/writer antenna. A reader/writer can also be understood as a device that communicates with the tag and can be a terminal, a base station, or a device with read/write capabilities.

电子标签:由标签天线和标签专用芯片组成,如图2的右图所示。通常情况下,依据电子标签供电方式的不同,电子标签可以分为有源电子标签(active tag)、无源电子标签(passive tag)和半无源电子标签(semi-passive tag)。有源电子标签内装有电池,无源电子标签没有内接电池,半无源电子标签部分依靠电池工作。依据频率的不同,电子标签可以分为低频电子标签、高频电子标签、超高频电子标签和微波电子标签。当然,也可以依据封装形式的不同进行分类,此处不再详细介绍。对于无源电子标签也可以称为是无源的AIoT设备。Electronic tags: These consist of a tag antenna and a dedicated tag chip, as shown in the right image of Figure 2. Generally, electronic tags can be divided into active, passive, and semi-passive tags based on how they are powered. Active tags have a built-in battery, passive tags do not, and semi-passive tags partially rely on batteries for operation. Based on frequency, electronic tags can be divided into low-frequency, high-frequency, ultra-high-frequency, and microwave tags. Of course, they can also be categorized based on packaging, but this will not be discussed in detail here. Passive tags can also be referred to as passive AIoT devices.

本申请的设备还可以是在3GPP R19 Ambient IoT立项中提出的两种待研究的设备类型:1.微瓦级功耗的标签:有能量存储;初始采样频率偏差10X次幂,通常理解X=4或者5;没有上行放大器或下行放大器,上行传输是基于外部提供的载波进行反射传输。2.百微瓦级功耗的标签:有能量存储;初始采样频率偏差10X次幂,通常理解X=4或者5;有上行放大器或者下行放大器或上行放大器和下行放大器都有,上行传输可以是终端主动发送的,也可以基于外部载波进行反向反射(backscatter)传输的。The device of this application may also be one of the two types of devices proposed for research in the 3GPP R19 Ambient IoT project: 1. A device with microwatt power consumption: with energy storage; an initial sampling frequency deviation of 10X power, usually understood as X = 4 or 5; no uplink or downlink amplifier, and uplink transmission is based on reflection transmission of an externally provided carrier. 2. A device with hundreds of microwatt power consumption: with energy storage; an initial sampling frequency deviation of 10X power, usually understood as X = 4 or 5; an uplink amplifier, a downlink amplifier, or both an uplink amplifier and a downlink amplifier, and uplink transmission can be actively sent by the terminal or transmitted via backscatter based on an external carrier.

为了便于理解,在介绍本申请之前,结合图3,先对读写器与标签的通信过程进行描述。For ease of understanding, before introducing this application, the communication process between the reader and the tag will be described in conjunction with FIG3 .

图3是一例标签的随机接入流程的示意图。如图3所示,该随机接入流程可以包括以下几个步骤。Figure 3 is a schematic diagram of a tag random access process. As shown in Figure 3, the random access process may include the following steps.

S301,读写器向标签发送选择(Select)命令。相应地,标签接收来自读写器的Select命令。S301: The reader sends a Select command to the tag. Correspondingly, the tag receives the Select command from the reader.

示例性地,在读写器接收到来自业务请求方的盘点指令的情况下,读写器生成Select命令,并向标签发送该Select命令。该命令中可以携带标签的内存某一范围信息(例如携带某些特定范围的电子产品码(electronic product code,EPC))。For example, when the reader receives an inventory command from a service requester, it generates a Select command and sends it to the tag. This Select command can carry information about a certain range in the tag's memory (e.g., an Electronic Product Code (EPC) within a specific range).

S302,读写器向标签发送查询(Query)命令。相应地,标签接收来自读写器的查询命令。S302: The reader sends a query command to the tag. Correspondingly, the tag receives the query command from the reader.

示例性地,在检测到Select命令后,标签判断自己是否属于该Select命令中携带的标签范围,若属于,则在检测到Query或者QueryRep命令后反馈标签的标识信息。For example, after detecting a Select command, the tag determines whether it belongs to the tag range carried in the Select command. If so, it feeds back tag identification information after detecting a Query or QueryRep command.

其中,Query命令中可以包括一个数值(记为Q值),标签可以根据Q值生成随机数,例如,生成0至2的Q次方之间的随机数。后续,标签可以在读写器每发送一次Query或者QueryRep的指令后,将该随机数减1,当随机数减至零0时,标签发起随机接入。The Query command may include a numerical value (denoted as a Q value), and the tag may generate a random number based on the Q value, for example, a random number between 0 and the power of 2. Subsequently, the tag may decrement the random number by 1 each time the reader sends a Query or QueryRep command. When the random number reaches 0, the tag initiates random access.

S303,标签向读写器发送随机数。相应地,读写器接收来自标签的随机数。S303: The tag sends a random number to the reader. Correspondingly, the reader receives the random number from the tag.

示例性地,当标签发现自己属于Select命令中携带的标签范围时,可以通过竞争的方式(例如在S302中随机数减至零时,向读写器发送随机数,例如RN16,RN16可以理解为一个长度为16比特的随机数。For example, when a tag finds that it belongs to the tag range carried in the Select command, it can send a random number, such as RN16, to the reader in a competitive manner (for example, when the random number is reduced to zero in S302, RN16 can be understood as a random number with a length of 16 bits).

S304,读写器向标签发送确认(Acknowledge,ACK)命令。相应地,标签接收来自读写器的ACK命令。S304: The reader sends an Acknowledgement (ACK) command to the tag. Correspondingly, the tag receives the ACK command from the reader.

当读写器接收到来自标签的随机数后,读写器向标签发送ACK命令,该命令中包括了读写器接收的来自标签的随机数(RN16)。After the reader receives the random number from the tag, the reader sends an ACK command to the tag, where the command includes the random number (RN16) received by the reader from the tag.

S305,标签向读写器发送标签的标识信息。相应地,读写器接收来自标签的标识信息。S305: The tag sends its identification information to the reader/writer. Correspondingly, the reader/writer receives the identification information from the tag.

当标签接收到来自读写器的ACK命令,并验证该随机数正确后,可以向读写器反馈标签的标识信息,例如,EPC。When the tag receives the ACK command from the reader and verifies that the random number is correct, it can feed back the tag's identification information, such as EPC, to the reader.

此外,读写器还可以通过寻呼(paging)指令使标签随机接入读写器。In addition, the reader can also use paging instructions to allow tags to randomly access the reader.

当前,终端设备需要完成上图3所示的随机接入流程才能执行读写器所指示的Select命令,较多的随机接入流程导致时延较长,并且标签的能耗也较高。因此,如何设计一种技术方案,使得标签能够高效执行读写器所指示的Select命令是本申请亟待解决的问题。Currently, a terminal device must complete the random access process shown in Figure 3 above before executing the Select command instructed by the reader. This frequent random access process results in longer latency and higher energy consumption for the tag. Therefore, designing a technical solution that enables the tag to efficiently execute the Select command instructed by the reader is an urgent issue to be addressed in this application.

下面结合附图,对本申请涉及的具体实施例进行详细介绍。图4为本申请实施例提供的一种通信方法400的示意性流程图,如图4所示,该方法至少可以包括以下步骤:The following is a detailed description of the specific embodiments involved in this application in conjunction with the accompanying drawings. Figure 4 is a schematic flow chart of a communication method 400 provided in an embodiment of this application. As shown in Figure 4, the method may include at least the following steps:

S410,第一网元向第二设备发送第二消息,相应地,第二设备接收第二消息。S410: The first network element sends a second message to the second device. Correspondingly, the second device receives the second message.

其中,该第二设备可以是具备读和/或写功能的设备、读写设备、中继节点设备(例如,IAB)、读出装置、扫描器、读头、通信器、阅读器、解读器、或具有收发功能的射频模块等,该第二设备的形态可以是终端,也可以是接入网设备。该第二设备可以参考上文对读写器的描述。The second device may be a device with reading and/or writing functions, a read/write device, a relay node device (e.g., an IAB), a reader, a scanner, a reader head, a communicator, a reader, an interpreter, or a radio frequency module with transceiver functions. The second device may be in the form of a terminal or an access network device. The second device may refer to the description of the reader/writer above.

第一网元可以是核心网侧的网元,例如,第一网元可以为AMF网元或AIoTMF网元。第一网元向第二设备发送第二消息,该第二消息包括第一信息和第一操作命令,该第一信息用于第二设备选择执行第一操作指令的第一设备并且该第一信息指示第一网元仅选择第一设备为目标设备。其中,该第一设备可以是应答设备、电子标签、射频标签、应答器、数据载体、记录媒体、射频卡、物联网设备、AIoT设备等,该第一设备可以参考上文中对标签的描述。The first network element may be a network element on the core network side, for example, the first network element may be an AMF network element or an AIoTMF network element. The first network element sends a second message to the second device, where the second message includes first information and a first operation command. The first information is used by the second device to select the first device to execute the first operation instruction, and the first information instructs the first network element to select only the first device as the target device. The first device may be a response device, an electronic tag, a radio frequency tag, a transponder, a data carrier, a recording medium, a radio frequency card, an Internet of Things device, an AIoT device, etc. The first device may refer to the description of the tag above.

可选的,若没有第一网元,可以理解为应用层或上层数据直接发送给第二设备。Optionally, if there is no first network element, it can be understood that the application layer or upper layer data is directly sent to the second device.

示例性地,上述第二消息可以为服务请求消息,例如,该第二消息可以为盘存请求、读请求、写请求、AIoT业务请求、使能或去使能请求等。相应地,第二消息中所包括的第一操作指令可以为盘存命令、读命令、写命令、去使能,去激活、灭活指令(kill)、锁定指令(locked)、块写指令(blockwrite)、块擦除指令(blockerase)、块解锁指令(blockpermalock)、非跟踪指令(untraceable)、安全通信指令(securecomm)、密钥更新指令(keyupdate)、标签特权指令(tagprivilege)、文件列表指令(filelist)、文件特权指令(fileprivilege)、文件设置指令(filesetup)、认证指令(authenticate)、认证通信指令(authcomm)等。该第一操作指令可以为上层消息或应用层消息等。Exemplarily, the second message may be a service request message, for example, the second message may be an inventory request, a read request, a write request, an AIoT service request, an enable or disable request, etc. Accordingly, the first operation instruction included in the second message may be an inventory command, a read command, a write command, a disable, a deactivation, a kill instruction, a lock instruction, a block write instruction, a block erase instruction, a block unlock instruction, an untraceable instruction, a secure communication instruction, a key update instruction, a tag privilege instruction, a file list instruction, a file privilege instruction, a file setup instruction, an authentication instruction, an authentication communication instruction, etc. The first operation instruction may be an upper layer message or an application layer message, etc.

具体的,上述第一信息可以为指示信息#1,该指示信息#1指示第一网元仅选择第一设备为目标设备,或者,该指示信息#1用于指示该第一操作指令是用于一个第一设备或多个设备;或者,该第一信息可以为与第一设备关联的第一标识信息,或者,该第一信息可以为与多个设备关联的多个标识信息,例如,该第一标识信息所指示的第一设备的第一标识可以为第一设备的EPC,该多个标识信息所指示的多个设备的多个标识可以为该多个设备的EPC;或者,该第一信息还可以包括上述指示信息#1和上述第一设备的第一标识信息。需要说明的是,能够唯一标识第一设备的任何标识信息都可以作为第一标识信息或者能够唯一标识多个设备的任何标识信息都可以作为多个标识信息,本申请对此不作限定。本申请以第一信息指示第一操作指令是用于第一设备为例进行描述,但是本申请的技术方案也适用于第一信息指示该第一操作指令用于多个设备,此时多个设备不同时传输数据。本申请对此不作限定。Specifically, the first information may be indication information #1, which indicates that the first network element selects only the first device as the target device, or indication information #1 is used to indicate whether the first operation instruction is intended for one first device or multiple devices; or the first information may be first identification information associated with the first device, or the first information may be multiple identification information associated with multiple devices. For example, the first identification of the first device indicated by the first identification information may be the EPC of the first device, and the multiple identifications of the multiple devices indicated by the multiple identification information may be the EPCs of the multiple devices; or the first information may further include indication information #1 and the first identification information of the first device. It should be noted that any identification information that can uniquely identify the first device may be used as the first identification information, and any identification information that can uniquely identify multiple devices may be used as the multiple identification information, and this application is not limited to this. This application describes the case where the first information indicates that the first operation instruction is intended for the first device as an example, but the technical solution of this application is also applicable to the case where the first information indicates that the first operation instruction is intended for multiple devices, in which case the multiple devices do not transmit data simultaneously. This application is not limited to this.

可选地,上述第二消息还可以包括所寻呼的设备类型信息,例如,所寻呼的设备类型信息可以指示1微瓦级别的设备、百微瓦级别的设备、基于反射通信的设备或者可以主动发送射频信号的设备等。第二消息所包括的设备类型信息指示满足该类型的设备响应第一操作指令,或者,第二消息所包括的设备类型信息指示网络支持该类型的设备进行信息传输。或者,所寻呼的设备类型信息指示标准中类型1的A-IoT设备,或类型2的A-IoT设备。该类型2的A-IoT设备也可以分为类型2-1的A-IoT设备或类型2-2的A-IoT设备,可以根据是否使用主动发送载波来区分设备类型。Optionally, the second message may also include the type information of the device being paged. For example, the type information of the device being paged may indicate a 1 microwatt-level device, a 100 microwatt-level device, a device based on reflection communication, or a device that can actively send radio frequency signals. The device type information included in the second message indicates that a device meeting this type responds to the first operation instruction, or the device type information included in the second message indicates that the network supports this type of device for information transmission. Alternatively, the device type information being paged indicates an A-IoT device of type 1 in the standard, or an A-IoT device of type 2. The type 2 A-IoT device may also be divided into a type 2-1 A-IoT device or a type 2-2 A-IoT device, and the device type can be distinguished based on whether an active carrier is used.

可选地,上述第二消息还可以包括业务类型或业务类型标识或接口标识。Optionally, the second message may further include a service type or a service type identifier or an interface identifier.

步骤S412,第二设备向第一设备发送第一消息,相应地,第一设备接收第一消息。Step S412: The second device sends a first message to the first device, and correspondingly, the first device receives the first message.

示例性地,上述第一消息可以为上述Select消息,或者,上述第一消息可以为上述寻呼(paging)消息,或者,上述第一消息可以为下行触发消息,或者,上述第一消息可以为初始下行触发消息等,本申请对上述第一消息的具体名称不作限定。示例性地,该第一消息可以为RRC层消息或PDCP层消息或RLC层消息或MAC层消息等,本申请对此不作限定。Exemplarily, the first message may be the Select message, or the first message may be the paging message, or the first message may be a downlink trigger message, or the first message may be an initial downlink trigger message, etc. This application does not limit the specific name of the first message. Exemplarily, the first message may be an RRC layer message, a PDCP layer message, an RLC layer message, or a MAC layer message, etc. This application does not limit this.

该第一消息可以通过业务逻辑信道或者控制逻辑信道传输,比如寻呼或公共控制信道等逻辑信道,本申请对逻辑信道的名称不限制。该第一消息还可以通过下行数据传输信道传输,比如物理下行共享信道(physical downlink shared channel,PDSCH),或者物理读写器到设备的共享信道(physical reader to device shared channel,PDSCH),即用于传输数据的信道,本申请对数据传输信道的名称不限。The first message may be transmitted via a service logical channel or a control logical channel, such as a paging or common control channel. This application does not limit the name of the logical channel. The first message may also be transmitted via a downlink data transmission channel, such as a physical downlink shared channel (PDSCH) or a physical reader to device shared channel (PDSCH), i.e., a channel for transmitting data. This application does not limit the name of the data transmission channel.

该第一消息具体可以通过MAC层指示信息来区分,比如该MAC层指示信息为MAC层中的逻辑信道标识(logical channel ID,LCID)或其他指示信息,可以用于指示该信道或者该数据包传输的是第一消息(如寻呼消息,选择消息、下行触发消息、初始下行触发消息等)。通过该指示信息,终端可以在接收到指示信息来区分该消息为第一消息还是其他消息或者数传消息等。当终端等待接收寻呼时,若收到其他消息,则丢弃。在后续流程中,若接收到非本流程所需要的数据或信息,可以直接忽略不处理或者丢弃。The first message can be specifically distinguished by MAC layer indication information, such as the MAC layer indication information being a logical channel identifier (LCID) or other indication information in the MAC layer, which can be used to indicate that the channel or the data packet is transmitting the first message (such as a paging message, a selection message, a downlink trigger message, an initial downlink trigger message, etc.). Through the indication information, the terminal can distinguish whether the message is the first message or other messages or data transmission messages upon receiving the indication information. When the terminal is waiting to receive a paging message, if other messages are received, they are discarded. In subsequent processes, if data or information not required by this process is received, it can be directly ignored or discarded.

具体地,上述第一消息包括上述第一信息和上述第一操作指令。Specifically, the first message includes the first information and the first operation instruction.

示例性地,上述第一操作指令可以为第一消息中的一个字段,或者,上述第一操作指令也可以作为一个容器包含在第一消息中。Illustratively, the first operation instruction may be a field in the first message, or the first operation instruction may also be included in the first message as a container.

可选地,第二设备还可以向第一设备发送第一配置信息,相应地,第一设备接收第一配置信息。第一配置信息用于配置第一设备向第二设备的数据时使用的配置,或第二设备向第一设备发送数据是使用的配置。Optionally, the second device may also send first configuration information to the first device, and accordingly, the first device receives the first configuration information. The first configuration information is used to configure the configuration used when the first device sends data to the second device, or the configuration used when the second device sends data to the first device.

示例性地,上述第一配置信息包括以下至少一项信息:Exemplarily, the first configuration information includes at least one of the following information:

频域资源信息、时域资源信息、调制编码信息、线路码配置、重复次数信息、带宽信息、速率信息等。Frequency domain resource information, time domain resource information, modulation and coding information, line code configuration, repetition number information, bandwidth information, rate information, etc.

可选地,第一信息可以指示标签上报标识的规则,比如上报部分标识,上报最后N比特,以及上报哪个标识,或上报哪个标识的部分比特。第一设备根据指示的规则在后续进行上报。该规则可以是从第一网元获取的。Optionally, the first information may indicate a rule for the tag to report the identifier, such as reporting a partial identifier, reporting the last N bits, and which identifier to report, or reporting partial bits of which identifier. The first device subsequently reports according to the indicated rule. The rule may be obtained from the first network element.

可选地,第二设备可以将上述第一配置信息携带在上述第一消息中发送给第一设备;或者,第二设备也可以将上述第一配置信息携带在一个单独的MAC层消息中发送给第一设备,例如,第二设备通过一个MAC控制单元(MAC control element,MAC CE)或一个MAC层指示将上述第一配置信息发送给第一设备,本申请对此不作限定。Optionally, the second device may carry the first configuration information in the first message and send it to the first device; or, the second device may carry the first configuration information in a separate MAC layer message and send it to the first device. For example, the second device sends the first configuration information to the first device through a MAC control element (MAC CE) or a MAC layer indication. This application does not limit this.

可选地,上述第一消息还可以包括所寻呼的设备类型信息,例如,所寻呼的设备类型信息可以指示1微瓦级别的设备、百微瓦级别的设备、基于反射通信的设备或者可以主动发送射频信号的设备等。第一消息所包括的设备类型信息指示满足该类型的设备响应第一操作指令,或者,第一消息所包括的设备类型信息指示网络支持该类型的设备进行信息传输。需要说明的是,第一消息中所包括的设备类型信息可以是第二设备自己确定或生成的,不一定要从第一网元处获取。或者,所寻呼的设备类型信息指示标准中类型1的A-IoT设备,或类型2的A-IoT设备。该类型2的A-IoT设备也可以分为类型2-1的A-IoT设备或类型2-2的A-IoT设备,可以根据是否使用主动发送载波来区分设备类型。Optionally, the first message may also include the device type information being paged. For example, the device type information being paged may indicate a 1 microwatt-level device, a 100 microwatt-level device, a device based on reflection communication, or a device that can actively send radio frequency signals. The device type information included in the first message indicates that a device meeting this type responds to the first operation instruction, or the device type information included in the first message indicates that the network supports this type of device for information transmission. It should be noted that the device type information included in the first message can be determined or generated by the second device itself, and does not necessarily have to be obtained from the first network element. Alternatively, the device type information being paged indicates an A-IoT device of type 1 in the standard, or an A-IoT device of type 2. The type 2 A-IoT device can also be divided into a type 2-1 A-IoT device or a type 2-2 A-IoT device, and the device type can be distinguished based on whether an active carrier is used.

可选地,在第一网元向第二设备发送第一操作指令之前,第一设备向第一网元指示是否有除了存储标识(如EPC)以外的存储空间,或除了存储标识(如EPC)以外其他存储空间的大小,或存储标识存储空间大小,以及有几个存储空间等至少一项。第一网元或应用层可以根据此发送第一指令或其他指令。Optionally, before the first network element sends the first operation instruction to the second device, the first device indicates to the first network element whether there is storage space other than the storage identifier (such as EPC), or the size of the storage space other than the storage identifier (such as EPC), or the size of the storage identifier storage space, and at least one of the number of storage spaces. The first network element or the application layer may send the first instruction or other instructions based on this.

步骤S414,第一设备根据上述第一信息确定仅选择该第一设备作为目标设备。Step S414: The first device determines to select only the first device as the target device according to the first information.

第一设备根据上述第一信息确定第一网元仅选择第一设备作为目标设备也可以理解为:第一设备根据上述第一信息确定第一网元仅寻呼第一设备。That the first device determines, according to the first information, that the first network element only selects the first device as the target device may also be understood as that the first device determines, according to the first information, that the first network element only pages the first device.

具体地,上述第一信息可以为指示信息#1,该指示信息#1用于指示只有该第一设备被选择为目标设备,第一设备可以根据该指示信息#1所指示的含义确定第一网元仅选择自己作为目标设备;或者,上述第一信息可以为第一设备的EPC,第一设备根据该唯一标识自己的EPC确定第一网元仅选择自己作为目标设备,即第一信息与第一设备的完整标识信息完全匹配时,即确定为针对该第一设备的寻呼;或者,第一信息还可以包括指示信息#1和第一设备的第一标识信息,第一设备也可以基于第一设备的第一标识信息和指示信息#1确定只有该第一设备为目标设备。Specifically, the above-mentioned first information may be indication information #1, which is used to indicate that only the first device is selected as the target device. The first device may determine that the first network element only selects itself as the target device based on the meaning indicated by the indication information #1; or, the above-mentioned first information may be the EPC of the first device. The first device determines that the first network element only selects itself as the target device based on the EPC that uniquely identifies itself, that is, when the first information completely matches the complete identification information of the first device, it is determined to be a paging for the first device; or, the first information may also include indication information #1 and the first identification information of the first device. The first device may also determine that only the first device is the target device based on the first identification information of the first device and the indication information #1.

步骤S416,当第一设备根据上述第一信息确定仅选择该第一设备作为目标设备时,第一设备向第二设备发送第一消息的响应消息。相应地,第二设备接收第一消息的响应消息。Step S416: When the first device determines to select only the first device as the target device based on the first information, the first device sends a response message to the first message to the second device. Correspondingly, the second device receives the response message to the first message.

具体地,上述第一消息的响应消息包括上述第一操作指令所请求的第一设备的待传输信息。Specifically, the response message to the first message includes the to-be-transmitted information of the first device requested by the first operation instruction.

示例性地,当第一操作指令为读指令时,第一消息的响应消息为读的数据内容;当第一操作为写指令时,第一消息的响应消息为写是否成功的反馈;当第一操作指令为去使能或去激活操作指令时,该第一消息的响应消息为确认或者指示是否可以正常执行。Exemplarily, when the first operation instruction is a read instruction, the response message of the first message is the read data content; when the first operation is a write instruction, the response message of the first message is feedback on whether the write is successful; when the first operation instruction is a disable or deactivate operation instruction, the response message of the first message is confirmation or an indication of whether it can be executed normally.

可选的,第一操作指令可以仅为对安全要求不是很高的指令,比如读指令。可选地,可以不支持对安全要求较高的指令在第一消息中发送,比如写指令。Optionally, the first operation instruction may be only an instruction with low security requirements, such as a read instruction. Optionally, instructions with high security requirements, such as a write instruction, may not be supported to be sent in the first message.

需要说明的是,当第一设备确定第一网元仅选择该第一设备作为目标设备时,可以立即向第二设备反馈第一消息的响应消息,也就是说第一设备在反馈第一消息的响应消息之前没有上述图3所示的随机接入过程。It should be noted that when the first device determines that the first network element only selects the first device as the target device, it can immediately feedback the response message of the first message to the second device, that is, the first device does not have the random access process shown in Figure 3 above before feedback of the response message of the first message.

可选地,当第二设备向第一设备发送了上述第一配置信息时,第一设备可以根据上述第一配置信息向第二设备发送上述第一消息的响应消息。Optionally, when the second device sends the first configuration information to the first device, the first device may send a response message of the first message to the second device according to the first configuration information.

可选地,若第一消息还携带设备类型信息,第一设备还需要判断是否匹配设备类型要求,若匹配则可以发送第一消息的响应消息。Optionally, if the first message also carries device type information, the first device also needs to determine whether it matches the device type requirement. If it matches, a response message to the first message may be sent.

若上述第一操作指令用于多个设备,该多个设备可在各自对应的传输机会(时域资源和频域资源)上执行上述步骤S416。该多个设备可以根据各自标识的顺序,确定各自的传输机会。If the first operation instruction is used for multiple devices, the multiple devices may perform the above step S416 on their corresponding transmission opportunities (time domain resources and frequency domain resources). The multiple devices may determine their respective transmission opportunities according to the order of their respective identifications.

步骤S418,第二设备基于第一消息的响应消息向第一网元发送第二消息的响应消息。相应地,第一网元接收第二消息的响应消息。Step S418: The second device sends a response message of the second message to the first network element based on the response message of the first message. Correspondingly, the first network element receives the response message of the second message.

具体地,上述第二消息的响应消息包括上述第一操作指令所请求的第一设备的待传输信息。Specifically, the response message to the second message includes the to-be-transmitted information of the first device requested by the first operation instruction.

可选地,上述第一消息的响应消息和上述第二消息的响应消息还可以包括与第一设备关联的第二标识信息。例如,该第二标识信息所指示的第一设备的第二标识可以与上述第一标识信息所指示的第一设备的第一标识相同;或者,第二标识是第一标识的部分内容;或者,第二标识完全不同于第二标识;或者,第二标识可以是为第一设备分配的临时标识或者第一设备的永久保存的标识如标签标识(tag identity,TID)或核心网分配的标识等。第一网元可以基于上述第二标识信息对第一设备进行标识验证,确保该第二消息的响应消息是来自于第一设备。示例性的,如果第一标识为EPC,第二标识可以为截断的EPC或某一部分EPC。可选的,第一消息中还可以包括第一设备反馈哪一部分的标识信息,或者多少比特标识信息。Optionally, the response message to the above-mentioned first message and the response message to the above-mentioned second message may further include second identification information associated with the first device. For example, the second identification of the first device indicated by the second identification information may be the same as the first identification of the first device indicated by the above-mentioned first identification information; or, the second identification is part of the first identification; or, the second identification is completely different from the second identification; or, the second identification may be a temporary identification assigned to the first device or a permanently stored identification of the first device, such as a tag identity (TID) or an identification assigned by the core network. The first network element may perform identification verification on the first device based on the above-mentioned second identification information to ensure that the response message to the second message comes from the first device. Exemplarily, if the first identification is EPC, the second identification may be a truncated EPC or a part of the EPC. Optionally, the first message may further include which part of the identification information the first device feeds back, or how many bits of identification information.

可选地,上述第二消息的响应消息还可以包括业务类型或业务类型标识或接口标识。Optionally, the response message to the second message may further include a service type or a service type identifier or an interface identifier.

通过上述通信方法400,第一设备在判断第一消息仅寻呼自己一个时可以立马响应第一操作指令,即立马上报第一操作指令所请求的待传输信息,省去第一设备的随机接入流程,不仅减少了信息传输的时延还可以节省第一设备的能耗。Through the above-mentioned communication method 400, when the first device determines that the first message only pages itself, it can immediately respond to the first operation instruction, that is, immediately report the information to be transmitted requested by the first operation instruction, eliminating the random access process of the first device, which not only reduces the delay of information transmission but also saves the energy consumption of the first device.

在一种可能的实现方式中,当上述第二设备为基站时,第二设备可以包括CU模块和DU模块,在上述步骤S410中,CU模块接收第一网元发送的第二消息,随后,CU模块将第二消息转发给DU模块,在上述步骤S412中,DU模块向第一设备发送第一消息。类似地,在上述步骤S416中,第一设备向DU模块发送第一消息的响应消息,DU模块将第一消息的响应消息转发给CU模块,在上述步骤S418中,CU模块向第一网元发送第二消息的响应消息。需要说明,关于第二消息、第一消息、第一消息的响应消息、第二消息的响应消息的具体描述可参考上文所述,这里不予赘述。In one possible implementation, when the above-mentioned second device is a base station, the second device may include a CU module and a DU module. In the above-mentioned step S410, the CU module receives the second message sent by the first network element, and then the CU module forwards the second message to the DU module. In the above-mentioned step S412, the DU module sends the first message to the first device. Similarly, in the above-mentioned step S416, the first device sends a response message of the first message to the DU module, and the DU module forwards the response message of the first message to the CU module. In the above-mentioned step S418, the CU module sends a response message of the second message to the first network element. It should be noted that the specific description of the second message, the first message, the response message of the first message, and the response message of the second message can be referred to above and will not be repeated here.

上述通信方法400中可以通过第一设备在发送第一操作指令所请求的待传输信息的同时也发送与第一设备关联的第二标识信息,用于第一网元进行标识验证,标识验证的安全等级可能还不够。本申请在上述通信方法400的基础之上还可以提供一种通信方法500,第一网元可以对第一设备上报的信息进行更高等级的安全校验,确保第一网元收到的第一操作指令所请求的待传输信息是来自第一设备的。In the above-mentioned communication method 400, the first device can send second identification information associated with the first device at the same time as sending the information to be transmitted requested by the first operation instruction, so that the first network element can perform identification verification. The security level of the identification verification may not be sufficient. Based on the above-mentioned communication method 400, the present application can also provide a communication method 500, in which the first network element can perform a higher level of security verification on the information reported by the first device to ensure that the information to be transmitted requested by the first operation instruction received by the first network element is from the first device.

需要说明的是,下文所述的通信方法500的技术方案所涉及的内容可以完全参照上述通信方法400的技术方案所涉及的内容,也就是说上述通信方法400的技术方案所涉及的内容全部都适用于下述通信方法500,本申请对此不再赘述。下文仅描述通信方法500不同于上述通信方法400的内容。It should be noted that the technical solutions of communication method 500 described below can be fully referenced to the technical solutions of communication method 400 described above. In other words, all the technical solutions of communication method 400 described above are applicable to communication method 500 described below, and this application will not elaborate on them. The following only describes the differences between communication method 500 and communication method 400 described above.

图5为本申请实施例提供的一种通信方法500的示意性流程图,如图5所示,该方法至少可以包括以下步骤:FIG5 is a schematic flow chart of a communication method 500 provided in an embodiment of the present application. As shown in FIG5 , the method may include at least the following steps:

S510,第一网元向第二设备发送第二消息,相应地,第二设备接收第二消息。S510: The first network element sends a second message to the second device. Correspondingly, the second device receives the second message.

具体地,上述第二消息还包括第一参数。Specifically, the above-mentioned second message also includes a first parameter.

可选地,上述第二消息还可以包括第一指示信息,该第一指示信息指示第一设备上报第一校验值。Optionally, the second message may further include first indication information, where the first indication information instructs the first device to report a first verification value.

可选地,上述第二消息中所包括的第一操作指令可以是使用第一参数进行加密的。Optionally, the first operation instruction included in the second message may be encrypted using a first parameter.

步骤S512,第二设备向第一设备发送第一消息,相应地,第一设备接收第一消息。Step S512: The second device sends a first message to the first device, and correspondingly, the first device receives the first message.

具体地,上述第一消息还包括上述第一参数。Specifically, the above-mentioned first message also includes the above-mentioned first parameter.

可选地,上述第一消息还可以包括上述第一指示信息。Optionally, the first message may further include the first indication information.

可选地,上述第一消息中所包括的第一操作指令可以是使用第一参数进行加密的。Optionally, the first operation instruction included in the first message may be encrypted using a first parameter.

可选地,第一信息可以指示标签上报标识的规则,比如上报部分标识,上报最后N比特,以及上报哪个标识,或上报哪个标识的部分比特。第一设备根据指示的规则在后续进行上报。该规则可以是从第一网元获取的。Optionally, the first information may indicate a rule for the tag to report the identifier, such as reporting a partial identifier, reporting the last N bits, and which identifier to report, or reporting partial bits of which identifier. The first device subsequently reports according to the indicated rule. The rule may be obtained from the first network element.

步骤S514,第一设备根据上述第一信息确定第一网元仅选择该第一设备作为目标设备。Step S514: The first device determines, based on the first information, that the first network element selects only the first device as the target device.

具体参考上述步骤S414,也可基于第一信息包括的第一设备的第一标识信息和指示信息#1确定只有第一设备为目标设备的。With specific reference to the above step S414, it may also be determined that only the first device is the target device based on the first identification information of the first device and the indication information #1 included in the first information.

步骤S516,第一设备根据预配置的密钥和上述第一参数获取第一校验值。Step S516: The first device obtains a first verification value according to the preconfigured key and the first parameter.

其中,上述预配置的密钥可以是协议规定的,或者,上述预配置的密钥可以是第一网元和第一设备提前对齐的,或者,在上述第二消息与上述第一消息中也可以指示使用的密钥索引,本申请对此不作限定。Among them, the above-mentioned preconfigured key may be specified by the protocol, or the above-mentioned preconfigured key may be aligned in advance between the first network element and the first device, or the key index to be used may also be indicated in the above-mentioned second message and the above-mentioned first message. This application does not limit this.

可选地,步骤S516还可以被替换为步骤S518,第一设备根据预配置的密钥、上述第一参数以及第二参数获取上述第一校验值。Optionally, step S516 may be replaced by step S518, where the first device obtains the first verification value according to the preconfigured key, the first parameter, and the second parameter.

步骤S520,当第一设备根据上述第一信息确定第一网元仅选择该第一设备作为目标设备时,第一设备向第二设备发送第一消息的响应消息。相应地,第二设备接收第一消息的响应消息。Step S520: When the first device determines that the first network element selects only the first device as the target device based on the first information, the first device sends a response message to the first message to the second device. Correspondingly, the second device receives the response message to the first message.

具体地,上述第一消息的响应消息包括上述第一校验值。第一设备在第一消息的响应消息中上报上述第一校验值可以无需上述第一指示信息的指示,也即第一设备在收到上述第一参数时可以默认需要上报根据该第一参数获取的第一校验值。Specifically, the response message to the first message includes the first check value. The first device may report the first check value in the response message to the first message without the need for the first indication information to indicate otherwise. That is, upon receiving the first parameter, the first device may default to reporting the first check value obtained based on the first parameter.

可选地,当上述步骤S516被替换为步骤S518时,上述第一消息的响应消息还可以包括上述第二参数。Optionally, when the above step S516 is replaced by step S518, the response message of the above first message may further include the above second parameter.

步骤S522,第二设备基于第一消息的响应消息向第一网元发送第二消息的响应消息。相应地,第一网元接收第二消息的响应消息。Step S522: The second device sends a response message of the second message to the first network element based on the response message of the first message. Correspondingly, the first network element receives the response message of the second message.

具体地,上述第二消息的响应消息包括上述第一校验值。Specifically, the response message to the second message includes the first check value.

可选地,当上述第一消息的响应消息中包括上述第二参数时,该第二消息的响应消息也包括上述第二参数。Optionally, when the response message of the first message includes the second parameter, the response message of the second message also includes the second parameter.

步骤S524,第一网元根据预配置的密钥和第一参数获取第二校验值,并判断该第二校验值与第一校验值是否一致。In step S524, the first network element obtains a second verification value according to the preconfigured key and the first parameter, and determines whether the second verification value is consistent with the first verification value.

具体地,若第一网元判断第二校验值与上述第一校验值一致,则安全校验通过;若第一网元判断第二校验值与上述第一校验值不一致,则安全校验不通过。当第一网元确定校验通过时可以将上述第一操作指令所请求的第一设备的待传输信息发送给AF或者应用层服务器。Specifically, if the first network element determines that the second verification value is consistent with the first verification value, the security verification passes; if the first network element determines that the second verification value is inconsistent with the first verification value, the security verification fails. When the first network element determines that the verification passes, the to-be-transmitted information of the first device requested by the first operation instruction can be sent to the AF or the application layer server.

示例性地,上述安全校验也可以理解为完整性保护。Exemplarily, the above security check can also be understood as integrity protection.

可选地,若上述第二消息的响应消息中包括上述第二参数,则上述步骤S524可以被替换为步骤S526,第一网元根据预配置的密钥、第一参数和第二参数获取第二校验值,并判断该第二校验值与第一校验值是否一致。Optionally, if the response message of the above-mentioned second message includes the above-mentioned second parameter, the above-mentioned step S524 can be replaced by step S526, and the first network element obtains the second verification value according to the pre-configured key, first parameter and second parameter, and determines whether the second verification value is consistent with the first verification value.

通过上述通信方法500,第一设备在判断第一消息仅寻呼自己一个时可以立马响应第一操作指令,即立马上报第一操作指令所请求的待传输信息,省去第一设备的随机接入流程,不仅减少了信息传输的时延还可以节省第一设备的能耗。另外,第一网元可以对第一设备上报的信息进行安全校验,可以确保第一设备是合法的用户。Through the above-described communication method 500, when the first device determines that the first message is intended only for the first device, it can immediately respond to the first operation instruction, namely, immediately report the information to be transmitted requested by the first operation instruction. This eliminates the need for a random access process for the first device, thereby reducing information transmission latency and energy consumption for the first device. Furthermore, the first network element can perform a security check on the information reported by the first device to ensure that the first device is a legitimate user.

在一种可能的实现方式中,当上述第二设备为基站时,第二设备可以包括CU模块和DU模块,在上述步骤S510中,CU模块接收第一网元发送的第二消息,随后,CU模块将第二消息转发给DU模块,在上述步骤S512中,DU模块向第一设备发送第一消息。类似地,在上述步骤S520中,第一设备向DU模块发送第一消息的响应消息,DU模块将第一消息的响应消息转发给CU模块,在上述步骤S522中,CU模块向第一网元发送第二消息的响应消息。需要说明,关于第二消息、第一消息、第一消息的响应消息、第二消息的响应消息的具体描述可参考上文所述,这里不予赘述。In one possible implementation, when the second device is a base station, the second device may include a CU module and a DU module. In the above step S510, the CU module receives the second message sent by the first network element. Subsequently, the CU module forwards the second message to the DU module. In the above step S512, the DU module sends the first message to the first device. Similarly, in the above step S520, the first device sends a response message to the first message to the DU module, and the DU module forwards the response message to the first message to the CU module. In the above step S522, the CU module sends a response message to the second message to the first network element. It should be noted that the specific description of the second message, the first message, the response message to the first message, and the response message to the second message can be referred to above and will not be repeated here.

上述通信方法400和上述通信方法500中的第一操作指令的发送和安全验证是同时进行的,可能存在不安全的问题,本申请还可以提供一种通信方法600,可以进一步保证网络安全。图6为本申请实施例提供的一种通信方法600的示意性流程图,如图6所示,该方法至少可以包括以下步骤:The sending and security verification of the first operation instruction in the above-mentioned communication method 400 and the above-mentioned communication method 500 are performed simultaneously, which may cause security issues. The present application may also provide a communication method 600 to further ensure network security. Figure 6 is a schematic flow chart of a communication method 600 provided in an embodiment of the present application. As shown in Figure 6, the method may include at least the following steps:

步骤S610,第一网元向第二设备发送第一信息,相应地,第二设备接收第一信息。Step S610: The first network element sends first information to the second device, and correspondingly, the second device receives the first information.

可选的,若没有第一网元,可以理解为应用层或上层数据直接发送给第二设备。Optionally, if there is no first network element, it can be understood that the application layer or upper layer data is directly sent to the second device.

具体地,上述第一信息用于第二设备选择执行后续的第一操作指令的第一设备并且该第一信息指示第一网元仅选择第一设备为目标设备。Specifically, the first information is used by the second device to select the first device for executing the subsequent first operation instruction, and the first information instructs the first network element to select only the first device as the target device.

具体的,上述第一信息可以为指示信息#1,该指示信息#1指示第一网元仅选择第一设备为目标设备,或者,该指示信息#1用于指示后续下发的第一操作指令是用于一个第一设备或多个设备;或者,该第一信息可以为与第一设备关联的第一标识信息,或者,该第一信息可以为与多个设备关联的多个标识信息,例如,该第一标识信息所指示的第一设备的第一标识可以为第一设备的EPC,该多个标识信息所指示的多个设备的多个标识可以为该多个设备的EPC;或者,该第一信息还可以包括上述指示信息#1和上述第一设备的第一标识信息。需要说明的是,能够唯一标识第一设备的任何标识信息都可以作为第一标识信息或者能够唯一标识多个设备的任何标识信息都可以作为多个标识信息,本申请对此不作限定。本申请以第一信息指示后续下发的第一操作指令是用于第一设备为例进行描述,但是本申请的技术方案也适用于第一信息指示后续下发的第一操作指令用于多个设备,此时多个设备不同时传输数据。本申请对此不作限定。Specifically, the first information may be indication information #1, which indicates that the first network element selects only the first device as the target device, or indication information #1 is used to indicate whether the subsequently issued first operation instruction is intended for one first device or multiple devices; or the first information may be first identification information associated with the first device, or the first information may be multiple identification information associated with multiple devices. For example, the first identification of the first device indicated by the first identification information may be the EPC of the first device, and the multiple identifications of the multiple devices indicated by the multiple identification information may be the EPCs of the multiple devices; or the first information may further include the indication information #1 and the first identification information of the first device. It should be noted that any identification information that can uniquely identify the first device may be used as the first identification information, and any identification information that can uniquely identify multiple devices may be used as the multiple identification information, and this application is not limited to this. This application describes the case where the first information indicates that the subsequently issued first operation instruction is intended for the first device as an example, but the technical solution of this application is also applicable to the case where the first information indicates that the subsequently issued first operation instruction is intended for multiple devices, in which case the multiple devices do not transmit data simultaneously. This application is not limited to this.

示例性地,第一网元向第二设备发送的上述第一信息可以携带在服务请求消息中,例如,该第一信息可以携带在盘存请求、读请求、写请求或AIoT业务请求、使能或去使能请求等中。Exemplarily, the above-mentioned first information sent by the first network element to the second device can be carried in a service request message. For example, the first information can be carried in an inventory request, a read request, a write request or an AIoT service request, an enable or disable request, etc.

可选地,第一网元还可以向第二设备发送所寻呼的设备类型信息,例如,所寻呼的设备类型信息指示1微瓦级别的设备、百微瓦级别的设备、基于反射通信的设备或者可以主动发送射频信号的设备等。设备类型信息指示满足该类型的设备响应后续的第一操作指令,或者,设备类型信息指示网络支持该类型的设备进行信息传输。或者,所寻呼的设备类型信息指示标准中类型1的A-IoT设备,或类型2的A-IoT设备。该类型2的A-IoT设备也可以分为类型2-1的A-IoT设备或类型2-2的A-IoT设备,可以根据是否使用主动发送载波来区分设备类型。Optionally, the first network element may also send the paged device type information to the second device. For example, the paged device type information indicates a 1 microwatt-level device, a 100 microwatt-level device, a device based on reflection communication, or a device that can actively send radio frequency signals. The device type information indicates that a device that meets this type responds to a subsequent first operation instruction, or the device type information indicates that the network supports this type of device for information transmission. Alternatively, the paged device type information indicates an A-IoT device of type 1 in the standard, or an A-IoT device of type 2. The type 2 A-IoT device can also be divided into a type 2-1 A-IoT device or a type 2-2 A-IoT device, and the device type can be distinguished based on whether an active carrier is used.

可选地,上述第一网元还可以向第二设备发送业务类型或业务类型标识或接口标识。该业务类型或业务类型标识或接口标识可以与上述第一信息携带在同一条消息中发送,本申请对此不作限定。Optionally, the first network element may further send a service type or service type identifier or interface identifier to the second device. The service type or service type identifier or interface identifier may be carried in the same message as the first information and sent, which is not limited in this application.

步骤S612,第二设备向第一设备发送上述第一信息,相应地,第一设备接收第一信息。Step S612: The second device sends the first information to the first device, and correspondingly, the first device receives the first information.

示例性地,第二设备向第一设备发送的上述第一信息可以携带在Select消息、寻呼(paging)消息、下行触发消息、初始下行触发消息等中。Exemplarily, the first information sent by the second device to the first device may be carried in a Select message, a paging message, a downlink trigger message, an initial downlink trigger message, and the like.

携带该第一信息的消息可以通过业务逻辑信道或者控制逻辑信道传输,比如寻呼或公共控制信道等逻辑信道,本申请对逻辑信道的名称不限制。携带该第一信息的消息还可以通过下行数据传输信道传输,比如物理下行共享信道(physical downlink shared channel,PDSCH),或者物理读写器到设备的共享信道(physical reader to device shared channel,PDSCH),即用于传输数据的信道,本申请对数据传输信道的名称不限。The message carrying the first information may be transmitted through a service logical channel or a control logical channel, such as a paging or common control channel. This application does not limit the name of the logical channel. The message carrying the first information may also be transmitted through a downlink data transmission channel, such as a physical downlink shared channel (PDSCH) or a physical reader to device shared channel (PDSCH), i.e., a channel used to transmit data. This application does not limit the name of the data transmission channel.

携带该第一信息的消息具体可以通过MAC层指示信息来区分,比如该MAC层指示信息为MAC层中的LCID或其他指示信息,可以用于指示该信道或者该数据包传输的是携带第一信息的消息(如寻呼消息,选择消息、下行触发消息、初始下行触发消息等)。通过该指示信息,终端可以在接收到指示信息来区分该消息为第一消息还是其他消息或者数传消息等。当终端等待接收寻呼时,若收到其他消息,则丢弃。The message carrying the first information can be specifically distinguished by MAC layer indication information, such as the MAC layer indication information being the LCID or other indication information in the MAC layer, which can be used to indicate that the channel or the data packet is transmitting a message carrying the first information (such as a paging message, a selection message, a downlink trigger message, an initial downlink trigger message, etc.). Through the indication information, the terminal can distinguish whether the message is the first message or other messages or data transmission messages after receiving the indication information. When the terminal is waiting to receive a paging message, if other messages are received, they are discarded.

可选地,第二设备还可以向第一设备发送第一配置信息,相应地,第一设备接收第一配置信息。第一配置信息用于配置第一设备向第二设备的数据时使用的配置,或第二设备向第一设备发送数据是使用的配置。Optionally, the second device may also send first configuration information to the first device, and accordingly, the first device receives the first configuration information. The first configuration information is used to configure the configuration used when the first device sends data to the second device, or the configuration used when the second device sends data to the first device.

示例性地,上述第一配置信息包括以下至少一项信息:Exemplarily, the first configuration information includes at least one of the following information:

频域资源信息、时域资源信息、调制编码信息、线路码配置、重复次数信息、带宽信息、速率信息等。Frequency domain resource information, time domain resource information, modulation and coding information, line code configuration, repetition number information, bandwidth information, rate information, etc.

可选地,第一信息可以指示标签上报标识的规则,比如上报部分标识,上报最后N比特,以及上报哪个标识,或上报哪个标识的部分比特。第一设备根据指示的规则在后续进行上报。该规则可以是从第一网元获取的。Optionally, the first information may indicate a rule for the tag to report the identifier, such as reporting a partial identifier, reporting the last N bits, and which identifier to report, or reporting partial bits of which identifier. The first device subsequently reports according to the indicated rule. The rule may be obtained from the first network element.

可选地,第二设备可以将上述第一配置信息携带在一个单独的MAC层消息中发送给第一设备,例如,第二设备通过一个MAC CE或一个MAC层指示将上述第一配置信息发送给第一设备,本申请对此不作限定。Optionally, the second device may carry the first configuration information in a separate MAC layer message and send it to the first device. For example, the second device may send the first configuration information to the first device through a MAC CE or a MAC layer indication. This application does not limit this.

可选地,上述第二设备还可以向第一设备发送所寻呼的设备类型信息,例如,所寻呼的设备类型信息可以指示1微瓦级别的设备、百微瓦级别的设备、基于反射通信的设备或者可以主动发送射频信号的设备等。设备类型信息指示满足该类型的设备响应后续的第一操作指令,或者,设备类型信息指示网络支持该类型的设备进行信息传输。需要说明的是,第二设备向第一设备发送的设备类型信息可以是第二设备自己确定或生成的,不一定要从第一网元处获取。或者,所寻呼的设备类型信息指示标准中类型1的A-IoT设备,或类型2的A-IoT设备。该类型2的A-IoT设备也可以分为类型2-1的A-IoT设备或类型2-2的A-IoT设备,可以根据是否使用主动发送载波来区分设备类型。Optionally, the second device may also send the paged device type information to the first device. For example, the paged device type information may indicate a 1 microwatt-level device, a 100 microwatt-level device, a device based on reflection communication, or a device that can actively send radio frequency signals. The device type information indicates that a device that meets this type responds to a subsequent first operation instruction, or the device type information indicates that the network supports this type of device for information transmission. It should be noted that the device type information sent by the second device to the first device may be determined or generated by the second device itself, and does not necessarily have to be obtained from the first network element. Alternatively, the paged device type information indicates an A-IoT device of type 1 in the standard, or an A-IoT device of type 2. The type 2 A-IoT device may also be divided into a type 2-1 A-IoT device or a type 2-2 A-IoT device, and the device type can be distinguished based on whether an active carrier is used.

可选地,在第一网元向第二设备发送第一操作指令之前,第一设备向第一网元指示是否有除了存储标识(如EPC)以外的存储空间,或除了存储标识(如EPC)以外其他存储空间的大小,或存储标识存储空间大小,以及有几个存储空间等至少一项。第一网元或应用层可以根据此发送第一指令或其他指令。Optionally, before the first network element sends the first operation instruction to the second device, the first device indicates to the first network element whether there is storage space other than the storage identifier (such as EPC), or the size of the storage space other than the storage identifier (such as EPC), or the size of the storage identifier storage space, and at least one of the number of storage spaces. The first network element or the application layer may send the first instruction or other instructions based on this.

步骤S614,第一设备根据上述第一信息确定第一网元仅选择该第一设备为目标设备。Step S614: The first device determines, based on the first information, that the first network element selects only the first device as a target device.

具体地,上述第一信息为指示信息#1,该指示信息#1用于指示只有该第一设备被选择为目标设备,第一设备可以根据该指示信息#1所指示的含义确定第一网元仅选择自己作为目标设备;或者,上述第一信息为第一设备的EPC,第一设备根据该唯一标识自己的EPC确定第一网元仅选择自己作为目标设备,即第一信息与第一设备的完整标识信息完全匹配时,即确定为针对该第一设备的寻呼;或者,第一信息还可以包括指示信息#1和第一设备的第一标识信息,第一设备也可以基于第一设备的第一标识信息和指示信息#1确定只有该第一设备为目标设备。Specifically, the above-mentioned first information is indication information #1, which is used to indicate that only the first device is selected as the target device. The first device can determine that the first network element only selects itself as the target device based on the meaning indicated by the indication information #1; or, the above-mentioned first information is the EPC of the first device, and the first device determines that the first network element only selects itself as the target device based on the EPC that uniquely identifies itself, that is, when the first information completely matches the complete identification information of the first device, it is determined to be a paging for the first device; or, the first information can also include indication information #1 and the first identification information of the first device, and the first device can also determine that only the first device is the target device based on the first identification information of the first device and the indication information #1.

步骤S616,当第一设备根据上述第一信息确定第一网元仅选择该第一设备作为目标设备时,第一设备向第二设备发送与第一设备关联的第二标识信息。相应地,第二设备接收该第二标识信息。Step S616: When the first device determines that the first network element selects only the first device as the target device based on the first information, the first device sends second identification information associated with the first device to the second device. Correspondingly, the second device receives the second identification information.

具体地,该第二标识信息所指示的第一设备的第二标识可以上述第一标识信息所指示的第一设备的第一标识相同;或者,第二标识是第一标识的部分内容;或者,第二标识完全不同于第二标识;或者,该第二标识可以是为第一设备分配的临时标识或者第一设备的永久保存的标识如TID或核心网分配的标识等。示例性的,如果第一标识为EPC,第二标识可以为截断的EPC或某一部分EPC。可选的,第一信息还可以包括第一设备反馈哪一部分的标识信息或者多少比特标识信息的指示。Specifically, the second identifier of the first device indicated by the second identification information may be the same as the first identifier of the first device indicated by the first identification information; or, the second identifier may be part of the first identifier; or, the second identifier may be completely different from the second identifier; or, the second identifier may be a temporary identifier assigned to the first device or a permanently stored identifier of the first device, such as a TID or an identifier assigned by the core network. For example, if the first identifier is an EPC, the second identifier may be a truncated EPC or a portion of the EPC. Optionally, the first information may further include an indication of which portion of the identification information or how many bits of identification information the first device feeds back.

可选地,若第一信息还携带设备类型信息,第一设备还需要判断是否匹配设备类型要求,若匹配则可以发送与第一设备关联的第二标识信息。Optionally, if the first information also carries device type information, the first device also needs to determine whether it matches the device type requirement. If it matches, the second identification information associated with the first device may be sent.

步骤S618,第二设备向第一网元转发上述第二标识信息。相应地,第一网元接收该第二标识信息。Step S618: The second device forwards the second identification information to the first network element. Correspondingly, the first network element receives the second identification information.

可选地,上述第二设备还可以向上述第一网元发送业务类型或业务类型标识或接口标识。该业务类型或业务类型标识或接口标识可以与上述第二标识信息携带在同一条消息中发送,本申请对此不作限定。Optionally, the second device may further send a service type or service type identifier or interface identifier to the first network element. The service type or service type identifier or interface identifier may be sent in the same message as the second identifier information, which is not limited in this application.

可选的,上述第二设备还可以向上述第一网元发送安全校验值,该安全校验值的获取方式可以与上述通信方法500中第一校验值的获取方式类似。示例性地,第一设备获取相关参数,并根据预配置的密钥和该参数获取安全校验值,并上报该安全校验值。第一设备获取的相关参数可以携带在第一信息中。Optionally, the second device may further send a security verification value to the first network element. The security verification value may be obtained in a manner similar to the method for obtaining the first verification value in the communication method 500. For example, the first device obtains relevant parameters, obtains the security verification value based on a preconfigured key and the parameters, and reports the security verification value. The relevant parameters obtained by the first device may be included in the first information.

步骤S620,第一网元基于第二标识信息对第一设备进行标识校验。Step S620: The first network element performs an identification verification on the first device based on the second identification information.

若标识校验通过,上述通信方法600还包括:步骤S622,第一网元向第二设备发送第一操作指令,相应地,第二设备接收该第一操作指令。If the identification verification passes, the above communication method 600 further includes: step S622, the first network element sends a first operation instruction to the second device, and accordingly, the second device receives the first operation instruction.

示例性地,上述标识校验也可以理解为安全校验。示例性地,第一网元还可以基于上述安全校验值进行安全校验。Exemplarily, the above-mentioned identification verification can also be understood as a security verification. Exemplarily, the first network element can also perform a security verification based on the above-mentioned security verification value.

或者,第一网元还可以基于第二标识信息和上述安全校验值进行校验。Alternatively, the first network element may also perform verification based on the second identification information and the above security verification value.

具体地,上述第一操作指令可以为盘存命令、读命令、写命令、去使能,去激活、灭活指令(kill)、锁定指令(locked)、块写指令(blockwrite)、块擦除指令(blockerase)、块解锁指令(blockpermalock)、非跟踪指令(untraceable)、安全通信指令(securecomm)、密钥更新指令(keyupdate)、标签特权指令(tagprivilege)、文件列表指令(filelist)、文件特权指令(fileprivilege)、文件设置指令(filesetup)、认证指令(authenticate)、认证通信指令(authcomm)等。该第一操作命令可以为上层消息或应用层消息等。Specifically, the first operation instruction may be an inventory command, a read command, a write command, a disable command, a deactivation command, a kill command, a lock command, a block write command, a block erase command, a block unlock command, an untraceable command, a secure communication command, a key update command, a tag privilege command, a file list command, a file privilege command, a file setup command, an authentication command, an authentication communication command, etc. The first operation command may be an upper layer message or an application layer message, etc.

可选地,上述第一网元还可以向第二设备发送业务类型或业务类型标识或接口标识。该业务类型或业务类型标识或接口标识可以与上述第一操作指令携带在同一条消息中发送,本申请对此不作限定。Optionally, the first network element may further send a service type or service type identifier or interface identifier to the second device. The service type or service type identifier or interface identifier may be carried in the same message as the first operation instruction and sent, which is not limited in this application.

步骤S624,第二设备向第一设备发送上述第一操作指令,相应地,第一设备接收该第一操作指令。Step S624: The second device sends the first operation instruction to the first device. Correspondingly, the first device receives the first operation instruction.

第一操作指令可以是第一网元通过标识校验和/或安全校验后发送给第二设备的;或者,也可以是第一网元通过标识校验和/或安全校验后指示第二设备上述第一设备可以进行后续传输(第一网元将第一操作指令先发送给第二设备了),第二设备再将第一操作指令发送给第一设备。The first operation instruction may be sent by the first network element to the second device after identification verification and/or security verification; or, the first network element may instruct the second device after identification verification and/or security verification that the first device can perform subsequent transmission (the first network element first sends the first operation instruction to the second device), and the second device then sends the first operation instruction to the first device.

可选的,第一网元向第二设备发送的第一信息是发送的第一操作指令,等待第一网元通过标识校验和/或安全校验后,向第二设备发送指示,即指示第二设备可以把该第一操作指令发送给第一设备。Optionally, the first information sent by the first network element to the second device is a first operation instruction. After the first network element passes the identification verification and/or security verification, it sends an indication to the second device, that is, instructs the second device to send the first operation instruction to the first device.

可选的,该第一操作指令加密或有完整性保护。Optionally, the first operation instruction is encrypted or integrity protected.

步骤S626,第一设备基于第一操作指令向第二设备发送该第一操作指令所请求的待传输信息,相应地,第二设备接收第一操作指令所请求的待传输信息。Step S626: The first device sends the information to be transmitted requested by the first operation instruction to the second device based on the first operation instruction. Correspondingly, the second device receives the information to be transmitted requested by the first operation instruction.

示例性地,当第一操作指令为读指令时,第一操作指令所请求的待传输信息为读的数据内容;当第一操作为写指令时,第一操作指令所请求的待传输信息为写是否成功的反馈;当第一操作指令为去使能或去激活操作指令时,该第一操作指令所请求的待传输信息为确认或者指示是否可以正常执行。Exemplarily, when the first operation instruction is a read instruction, the information to be transmitted requested by the first operation instruction is the read data content; when the first operation is a write instruction, the information to be transmitted requested by the first operation instruction is feedback on whether the write is successful; when the first operation instruction is a disable or deactivate operation instruction, the information to be transmitted requested by the first operation instruction is confirmation or indication of whether it can be executed normally.

可选的,该第一操作指令所请求的待传输信息加密或有完整性保护。Optionally, the information to be transmitted requested by the first operation instruction is encrypted or has integrity protection.

可选地,当第二设备向第一设备发送了上述第一配置信息时,第一设备可以根据上述第一配置信息向第二设备发送上述第一操作指令所请求的待传输信息。Optionally, when the second device sends the first configuration information to the first device, the first device may send the information to be transmitted requested by the first operation instruction to the second device according to the first configuration information.

若上述第一操作指令用于多个设备,该多个设备可在各自对应的传输机会(时域资源和频域资源)上执行上述步骤S626。该多个设备可以根据各自标识的顺序,确定各自的传输机会。If the first operation instruction is used for multiple devices, the multiple devices may perform the above step S626 on their corresponding transmission opportunities (time domain resources and frequency domain resources). The multiple devices may determine their respective transmission opportunities according to the order of their respective identifications.

步骤S628,第二设备向第一网元发送第一操作指令所请求的待传输信息,相应地,第一网元接收第一操作指令所请求的待传输信息。Step S628: The second device sends the information to be transmitted requested by the first operation instruction to the first network element. Correspondingly, the first network element receives the information to be transmitted requested by the first operation instruction.

可选地,上述第二设备还可以向上述第一网元发送业务类型或业务类型标识或接口标识。该业务类型或业务类型标识或接口标识可以与上述第一操作指令所请求的待传输信息携带在同一条消息中发送,本申请对此不作限定。Optionally, the second device may further send a service type, service type identifier, or interface identifier to the first network element. The service type, service type identifier, or interface identifier may be carried in the same message as the information to be transmitted requested by the first operation instruction and sent, and this application does not limit this.

需要注意的是,上述第一设备和上述第二设备之间传递消息时,可以通过携带第一标识信息标识或者随机数或者唯一标识来识别第一设备给第二设备传输的数据。该第一标识信息可以在MAC层或者PDCP层或者RRC层或者物理层携带,或者该第一标识信息可以携带在所传递的消息头中,或者携带在所传输的数据格式里。It should be noted that when the first device and the second device transmit messages, the data transmitted by the first device to the second device can be identified by carrying a first identification information identifier, a random number, or a unique identifier. The first identification information can be carried at the MAC layer, the PDCP layer, the RRC layer, or the physical layer, or the first identification information can be carried in the transmitted message header, or in the transmitted data format.

第二设备和第一网元之间传递消息时,可以通过携带第二标识信息或者第二设备/第一网元为第一设备分配的标识来识别。第二标识信息所指示的标识也可以和第一设备和第二设备通信过程中使用的第一标识信息所指示的标识相同。When a message is transmitted between the second device and the first network element, the second device can be identified by carrying the second identification information or the identification assigned by the second device/first network element to the first device. The identification indicated by the second identification information can also be the same as the identification indicated by the first identification information used during the communication between the first device and the second device.

通过上述通信方法600,操作指令的发送和安全验证分开进行,只有在安全验证通过后,第一网元才会下发操作指令,可以进一步保证网络安全。Through the above communication method 600, the sending of the operation instruction and the security verification are performed separately. Only after the security verification is passed, the first network element will send the operation instruction, which can further ensure network security.

在一种可能的实现方式中,当上述第二设备为基站时,第二设备可以包括CU模块和DU模块,在上述步骤S610中,CU模块接收第一网元发送的第一信息,随后,CU模块将第一信息转发给DU模块,在上述步骤S612中,DU模块向第一设备发送第一信息。类似地,在上述步骤S616中,第一设备向DU模块发送与第一设备关联的第二标识信息,DU模块将与第一设备关联的第二标识信息转发给CU模块,在上述步骤S618中,CU模块向第一网元发送与第一设备关联的第二标识信息。在上述步骤S622中,CU模块接收第一网元发送的第一操作指令,随后,CU模块将第一操作指令转发给DU模块,在上述步骤S624中,DU模块向第一设备发送第一操作指令。类似地,在上述步骤S626中,第一设备向DU模块发送第一操作指令所请求的待传输信息,DU模块将第一操作指令所请求的待传输信息转发给CU模块,在上述步骤S628中,CU模块向第一网元发送第一操作指令所请求的待传输信息。需要说明,关于第一信息、与第一设备关联的第二标识信息、第一操作指令、第一操作指令所请求的待传输信息的具体描述可参考上文所述,这里不予赘述。In one possible implementation, when the second device is a base station, the second device may include a CU module and a DU module. In the above step S610, the CU module receives the first information sent by the first network element, and then the CU module forwards the first information to the DU module. In the above step S612, the DU module sends the first information to the first device. Similarly, in the above step S616, the first device sends the second identification information associated with the first device to the DU module, and the DU module forwards the second identification information associated with the first device to the CU module. In the above step S618, the CU module sends the second identification information associated with the first device to the first network element. In the above step S622, the CU module receives the first operation instruction sent by the first network element, and then the CU module forwards the first operation instruction to the DU module. In the above step S624, the DU module sends the first operation instruction to the first device. Similarly, in step S626 above, the first device sends the information to be transmitted requested by the first operation instruction to the DU module, and the DU module forwards the information to be transmitted requested by the first operation instruction to the CU module. In step S628 above, the CU module sends the information to be transmitted requested by the first operation instruction to the first network element. It should be noted that the specific description of the first information, the second identification information associated with the first device, the first operation instruction, and the information to be transmitted requested by the first operation instruction can be referred to above and will not be repeated here.

可替换地,在一些场景中,网络侧可以被配置周期性上报(例如,配置为周期性上报)标签的信息,即上述流程无需业务请求方触发。该周期可以为第一网元配置的。Alternatively, in some scenarios, the network side may be configured to periodically report (eg, periodically report) the tag information, that is, the above process does not need to be triggered by the service requester. The period may be configured by the first network element.

例如,在盘存业务中,网络侧周期性上报园区内存在的标签,或者将标签贴在商品上,网络侧周期性地盘存商品,获知企业园区或者工厂内的商品状态,实现自动化地仓储管理。后续,由网络侧将标签的信息上报至业务请求方,实现周期性的盘存业务。For example, in inventory management, the network periodically reports tags within the enterprise campus or affixes them to products. This allows the network to periodically inventory products, monitor the status of products within the enterprise campus or factory, and implement automated warehouse management. Subsequently, the network reports the tag information to the service requester, enabling periodic inventory management.

应理解,本申请的各实施例中的一些可选的特征,在某些场景下,可以不依赖于其他特征,也可以在某些场景下,与其他特征进行结合,不作限定。It should be understood that some optional features in the embodiments of the present application may not depend on other features in some scenarios, and may also be combined with other features in some scenarios, without limitation.

还可以理解,本申请的各实施例中的方案可以进行合理的组合使用,或者,本申请的各实施例中的方案也可以进行合理的解耦,并且实施例中出现的各个术语的解释或说明可以在各个实施例中互相参考或解释,对此不作限定。It can also be understood that the solutions in the various embodiments of the present application can be reasonably combined and used, or the solutions in the various embodiments of the present application can be reasonably decoupled, and the explanations or descriptions of the various terms appearing in the embodiments can be referenced or explained with each other in the various embodiments, without limitation.

还可以理解,在本申请的各实施例中的各种数字序号的大小并不意味着执行顺序的先后,仅为描述方便进行的区分,不应对本申请实施例的实施过程构成任何限定。It can also be understood that the sizes of the various numerical serial numbers in the embodiments of the present application do not mean the order of execution, but are only distinguished for the convenience of description and should not constitute any limitation on the implementation process of the embodiments of the present application.

还可以理解,在本申请的各实施例中涉及到一些消息名称,如第一消息或第二消息,等等,应理解,其命名不对本申请实施例的保护范围造成限定。It can also be understood that in the various embodiments of the present application, some message names are involved, such as the first message or the second message, etc. It should be understood that their naming does not limit the scope of protection of the embodiments of the present application.

还可以理解,上述各个方法实施例中,由第一设备实现的方法和操作,也可以由第一设备的组成部件(例如芯片或者电路)来实现;由第二设备实现的方法和操作,也可以由第二设备的组成部件(例如芯片或者电路)来实现;此外,由第一网元实现的方法和操作,也可以由第一网元的组成部件(例如芯片或者电路)来实现,不作限定。相应于上述各方法实施例给出的方法,本申请实施例还提供了相应的通信装置,所述装置包括用于执行上述各个方法实施例相应的模块。该模块可以是软件,也可以是硬件,或者是软件和硬件结合。可以理解的是,上述各方法实施例所描述的技术特征同样适用于以下装置实施例。It can also be understood that in each of the above method embodiments, the methods and operations implemented by the first device can also be implemented by the components of the first device (such as a chip or circuit); the methods and operations implemented by the second device can also be implemented by the components of the second device (such as a chip or circuit); in addition, the methods and operations implemented by the first network element can also be implemented by the components of the first network element (such as a chip or circuit), without limitation. Corresponding to the methods given in the above method embodiments, the embodiments of the present application also provide corresponding communication devices, which include modules for executing the corresponding modules of the above method embodiments. The module can be software, hardware, or a combination of software and hardware. It can be understood that the technical features described in the above method embodiments are also applicable to the following device embodiments.

应理解,第一设备、第二设备和第一网元可以执行上述实施例中的部分或全部步骤,这些步骤或操作仅是示例,本申请实施例还可以执行其它操作或者各种操作的变形。此外,各个步骤可以按照上述实施例呈现的不同的顺序来执行,并且有可能并非要执行上述实施例中的全部操作。It should be understood that the first device, the second device, and the first network element may perform some or all of the steps in the above embodiments. These steps or operations are merely examples, and the embodiments of the present application may also perform other operations or variations of various operations. In addition, the various steps may be performed in a different order than those presented in the above embodiments, and it is possible that not all of the operations in the above embodiments need to be performed.

上面结合图4-图6详细介绍了本申请实施例提供的通信方法,下面结合图7-图9详细介绍本申请实施例提供的通信装置。应理解,装置实施例的描述与方法实施例的描述相互对应,因此,未详细描述的内容可以参见上文方法实施例,为了简洁,部分内容不再赘述。The communication method provided in the embodiment of the present application is described in detail above in conjunction with Figures 4-6. The communication device provided in the embodiment of the present application is described in detail below in conjunction with Figures 7-9. It should be understood that the description of the device embodiment corresponds to the description of the method embodiment. Therefore, for matters not described in detail, reference can be made to the method embodiment above. For the sake of brevity, some contents are not repeated here.

图7是本申请实施例提供的通信装置700的示意性框图。如图7所示,通信装置700包括收发单元710。收发单元710可以实现相应的通信功能,收发单元710还可以称为通信接口或通信单元。可选地,该通信装置700还包括处理单元720,用于进行数据处理。通信装置700用于实现前述图4至图6所示方法实施例中第一设备、第二设备或第一网元的功能。Figure 7 is a schematic block diagram of a communication device 700 provided in an embodiment of the present application. As shown in Figure 7, the communication device 700 includes a transceiver unit 710. The transceiver unit 710 can implement corresponding communication functions and can also be referred to as a communication interface or a communication unit. Optionally, the communication device 700 also includes a processing unit 720 for performing data processing. The communication device 700 is used to implement the functions of the first device, the second device, or the first network element in the method embodiments shown in Figures 4 to 6 above.

当该通信装置700用于实现图4至图6所示的方法实施例中第一设备的功能时,收发单元710用于接收上述第一消息以及收发单元710还用于发送第一消息的响应消息;处理单元720用于根据第一信息确定第一网元仅选择第一设备为目标设备。When the communication device 700 is used to implement the function of the first device in the method embodiments shown in Figures 4 to 6, the transceiver unit 710 is used to receive the above-mentioned first message and the transceiver unit 710 is also used to send a response message to the first message; the processing unit 720 is used to determine that the first network element only selects the first device as the target device based on the first information.

可选地,收发单元710还用于接收上述第一配置信息。Optionally, the transceiver unit 710 is further configured to receive the first configuration information.

可选地,处理单元720还用于根据预配置的密钥和第一参数获取第一校验值。Optionally, the processing unit 720 is further configured to obtain a first verification value according to a preconfigured key and a first parameter.

可选地,处理单元720还用于根据预配置的密钥、第一参数和第二参数获取第一校验值。Optionally, the processing unit 720 is further configured to obtain a first verification value according to a preconfigured key, a first parameter, and a second parameter.

可选地,收发单元710还用于接收第一信息。Optionally, the transceiver unit 710 is further configured to receive first information.

可选地,收发单元710还用于发送与第一设备关联的第二标识信息。Optionally, the transceiver unit 710 is further configured to send second identification information associated with the first device.

可选地,收发单元710还用于接收第一操作指令。Optionally, the transceiver unit 710 is further configured to receive a first operation instruction.

可选地,收发单元710还用于发送第一操作指令所请求的待传输信息。Optionally, the transceiver unit 710 is further configured to send information to be transmitted requested by the first operation instruction.

当该通信装置700用于实现图4至图6所示的方法实施例中第一网元的功能时,收发单元710用于发送上述第二消息以及收发单元710还用于接收上述第二消息的响应消息。When the communication device 700 is used to implement the function of the first network element in the method embodiments shown in Figures 4 to 6, the transceiver unit 710 is used to send the above-mentioned second message and the transceiver unit 710 is also used to receive a response message to the above-mentioned second message.

可选地,处理单元720还用于根据预配置的密钥和第一参数获取第二校验值,并判断第二校验值与第一校验值是否一致。Optionally, the processing unit 720 is further configured to obtain a second verification value according to the preconfigured key and the first parameter, and determine whether the second verification value is consistent with the first verification value.

可选地,处理单元720还用于根据预配置的密钥、第一参数和第二参数获取第二校验值,并判断第二校验值与第一校验值是否一致。Optionally, the processing unit 720 is further configured to obtain a second verification value according to a preconfigured key, the first parameter, and the second parameter, and determine whether the second verification value is consistent with the first verification value.

可选地,收发单元710还用于发送第一信息。Optionally, the transceiver unit 710 is further configured to send first information.

可选地,收发单元710还用于接收与第一设备关联的第二标识信息。Optionally, the transceiver unit 710 is further configured to receive second identification information associated with the first device.

可选地,处理单元720还用于基于第二标识信息对第一设备进行标识校验。Optionally, the processing unit 720 is further configured to perform identification verification on the first device based on the second identification information.

可选地,收发单元710还用于发送第一操作指令。Optionally, the transceiver unit 710 is further configured to send a first operation instruction.

可选地,收发单元710还用于接收第一操作指令所请求的待传输信息。Optionally, the transceiver unit 710 is further configured to receive information to be transmitted requested by the first operation instruction.

当该通信装置700用于实现图4至图6所示的方法实施例中第二设备的功能时,收发单元710用于从第一网元接收第二消息以及收发单元710用于向第一设备发送第一消息,收发单元710还用于从第一设备接收第一消息的响应消息以及收发单元710还用于向第一网元发送第二消息的响应消息。When the communication device 700 is used to implement the function of the second device in the method embodiments shown in Figures 4 to 6, the transceiver unit 710 is used to receive the second message from the first network element and the transceiver unit 710 is used to send the first message to the first device. The transceiver unit 710 is also used to receive a response message to the first message from the first device and the transceiver unit 710 is also used to send a response message to the second message to the first network element.

可选地,收发单元710还用于从第一网元接收第一信息以及收发单元710还用于向第一设备发送第一信息。Optionally, the transceiver unit 710 is further configured to receive first information from the first network element and send the first information to the first device.

可选地,收发单元710还用于从第一设备接收与第一设备关联的第二标识信息以及收发单元710还用于向第一网元发送与第一设备关联的第二标识信息。Optionally, the transceiver unit 710 is further configured to receive second identification information associated with the first device from the first device, and the transceiver unit 710 is further configured to send the second identification information associated with the first device to the first network element.

可选地,收发单元710还用于从第一网元接收第一操作指令以及收发单元710还用于向第一设备发送第一操作指令。Optionally, the transceiver unit 710 is further configured to receive a first operation instruction from the first network element and the transceiver unit 710 is further configured to send the first operation instruction to the first device.

可选地,收发单元710还用于从第一设备接收第一操作指令所请求的待传输信息以及收发单元710还用于向第一网元发送第一操作指令所请求的待传输信息。Optionally, the transceiver unit 710 is further configured to receive information to be transmitted requested by the first operation instruction from the first device, and the transceiver unit 710 is further configured to send the information to be transmitted requested by the first operation instruction to the first network element.

有关上述收发单元710和处理单元720更详细的描述、以及第一消息、第一消息的响应消息、第二消息、第二消息的响应消息、第一信息、第二标识信息、第一操作指令、第一操作指令所请求的待传输信息等术语的含义可以参考图4至图6所示的方法实施例中的描述。For a more detailed description of the above-mentioned transceiver unit 710 and the processing unit 720, as well as the meanings of terms such as the first message, the response message of the first message, the second message, the response message of the second message, the first information, the second identification information, the first operation instruction, and the information to be transmitted requested by the first operation instruction, please refer to the description in the method embodiments shown in Figures 4 to 6.

还应理解,这里的装置700以功能单元的形式体现。这里的术语“单元”可以指应用特有集成电路(application specific integrated circuit,ASIC)、电子电路、用于执行一个或多个软件或固件程序的处理器(例如共享处理器、专有处理器或组处理器等)和存储器、合并逻辑电路和/或其它支持所描述的功能的合适组件。在一个可选例子中,本领域技术人员可以理解,装置700可以具体为上述实施例中的第一设备、第二设备和第一网元,可以用于执行上述各方法实施例中与第一设备、第二设备和第一网元对应的各个流程和/或步骤,或者,装置700可以具体为上述实施例中的第一设备、第二设备和第一网元,可以用于执行上述各方法实施例中与第一设备、第二设备和第一网元对应的各个流程和/或步骤,为避免重复,在此不再赘述。It should also be understood that the device 700 here is embodied in the form of a functional unit. The term "unit" here can refer to an application specific integrated circuit (ASIC), an electronic circuit, a processor (such as a shared processor, a dedicated processor, or a group processor, etc.) and memory for executing one or more software or firmware programs, a combined logic circuit, and/or other suitable components that support the described functions. In an optional example, those skilled in the art will understand that the device 700 can be specifically the first device, the second device, and the first network element in the above-mentioned embodiments, and can be used to execute the various processes and/or steps corresponding to the first device, the second device, and the first network element in the above-mentioned method embodiments. Alternatively, the device 700 can be specifically the first device, the second device, and the first network element in the above-mentioned embodiments, and can be used to execute the various processes and/or steps corresponding to the first device, the second device, and the first network element in the above-mentioned method embodiments. To avoid repetition, it will not be described here.

上述各个方案的装置700具有实现上述方法中第一设备、第二设备和第一网元所执行的相应步骤的功能,或者,上述各个方案的装置700具有实现上述方法中第一设备、第二设备和第一网元所执行的相应步骤的功能。所述功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。所述硬件或软件包括一个或多个与上述功能相对应的模块;例如收发单元可以由收发机替代(例如,收发单元中的发送单元可以由发送机替代,收发单元中的接收单元可以由接收机替代),其它单元,如处理单元等可以由处理器替代,分别执行各个方法实施例中的收发操作以及相关的处理操作。The apparatus 700 of each of the above-mentioned solutions has the function of implementing the corresponding steps performed by the first device, the second device, and the first network element in the above-mentioned method, or the apparatus 700 of each of the above-mentioned solutions has the function of implementing the corresponding steps performed by the first device, the second device, and the first network element in the above-mentioned method. The functions can be implemented by hardware, or can be implemented by hardware executing corresponding software. The hardware or software includes one or more modules corresponding to the above-mentioned functions; for example, the transceiver unit can be replaced by a transceiver (for example, the sending unit in the transceiver unit can be replaced by a transmitter, and the receiving unit in the transceiver unit can be replaced by a receiver), and other units, such as the processing unit, can be replaced by a processor to respectively perform the sending and receiving operations and related processing operations in each method embodiment.

此外,上述收发单元710还可以是收发电路(例如可以包括接收电路和发送电路),处理单元可以是处理电路。In addition, the transceiver unit 710 may also be a transceiver circuit (for example, may include a receiving circuit and a sending circuit), and the processing unit may be a processing circuit.

需要指出的是,图7中的装置可以是前述实施例中的网元或设备,也可以是芯片或者芯片系统,例如:片上系统(system on chip,SoC)。其中,收发单元可以是输入输出电路、通信接口;处理单元为该芯片上集成的处理器或者微处理器或者集成电路。在此不做限定。It should be noted that the apparatus in FIG7 may be a network element or device in the aforementioned embodiments, or may be a chip or chip system, such as a system on a chip (SoC). The transceiver unit may be an input/output circuit or a communication interface, and the processing unit may be a processor, microprocessor, or integrated circuit integrated on the chip. This is not limited here.

如图8所示,本申请实施例提供另一种通信装置800。该装置800包括处理器810,处理器810与存储器820耦合,存储器820用于存储计算机程序或指令和/或数据,处理器810用于执行存储器820存储的计算机程序或指令,或读取存储器820存储的数据,以执行上文各方法实施例中的方法。As shown in Figure 8, an embodiment of the present application provides another communication device 800. The device 800 includes a processor 810, which is coupled to a memory 820. The memory 820 is used to store computer programs or instructions and/or data. The processor 810 is used to execute the computer programs or instructions stored in the memory 820, or read the data stored in the memory 820, to perform the methods in the above method embodiments.

当通信装置800用于实现图4至图6所示的方法时,处理器810用于实现上述处理单元820的功能。When the communication device 800 is used to implement the methods shown in FIG. 4 to FIG. 6 , the processor 810 is used to implement the functions of the processing unit 820 .

可选地,处理器810为一个或多个。Optionally, there are one or more processors 810 .

可选地,存储器820为一个或多个。Optionally, there are one or more memories 820 .

可选地,该存储器820与该处理器810集成在一起,或者分离设置。Optionally, the memory 820 is integrated with the processor 810 or provided separately.

可选地,如图8所示,该装置800还包括收发器830,收发器830用于信号的接收和/或发送。例如,处理器810用于控制收发器830进行信号的接收和/或发送。Optionally, as shown in Figure 8, the apparatus 800 further includes a transceiver 830, which is configured to receive and/or transmit signals. For example, the processor 810 is configured to control the transceiver 830 to receive and/or transmit signals.

当通信装置800用于实现图4至图6所示的方法时,收发器810用于实现上述收发单元710的功能。When the communication device 800 is used to implement the methods shown in FIG. 4 to FIG. 6 , the transceiver 810 is used to implement the functions of the above-mentioned transceiver unit 710 .

例如,处理器810用于执行存储器820存储的计算机程序或指令,以实现上文各个方法实施例中第一设备、第二设备和第一网元的相关操作。例如,图4至图6中任意一个所示实施例中的第一设备,或图4至图6中任意一个所示实施例中的第二设备,或图4至图6中任意一个所示实施例中的第一网元的方法。For example, the processor 810 is configured to execute a computer program or instruction stored in the memory 820 to implement the related operations of the first device, the second device, and the first network element in each of the above method embodiments. For example, the method of the first device in any one of the embodiments shown in Figures 4 to 6, or the second device in any one of the embodiments shown in Figures 4 to 6, or the method of the first network element in any one of the embodiments shown in Figures 4 to 6.

应理解,本申请实施例中提及的处理器可以是中央处理单元(central processing unit,CPU),还可以是其他通用处理器、数字信号处理器(digital signal processor,DSP)、专用集成电路(application specific integrated circuit,ASIC)、现成可编程门阵列(field programmable gate array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。It should be understood that the processor mentioned in the embodiments of the present application may be a central processing unit (CPU), or other general-purpose processors, digital signal processors (DSP), application-specific integrated circuits (ASIC), field programmable gate arrays (FPGA), or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc. The general-purpose processor may be a microprocessor or any conventional processor, etc.

还应理解,本申请实施例中提及的存储器可以是易失性存储器和/或非易失性存储器。其中,非易失性存储器可以是只读存储器(read-only memory,ROM)、可编程只读存储器(programmable ROM,PROM)、可擦除可编程只读存储器(erasable PROM,EPROM)、电可擦除可编程只读存储器(electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(random access memory,RAM)。例如,RAM可以用作外部高速缓存。作为示例而非限定,RAM包括如下多种形式:静态随机存取存储器(static RAM,SRAM)、动态随机存取存储器(dynamic RAM,DRAM)、同步动态随机存取存储器(synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(doubledata rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(synchlink DRAM,SLDRAM)和直接内存总线随机存取存储器(direct rambus RAM,DR RAM)。It should also be understood that the memory mentioned in the embodiments of the present application can be a volatile memory and/or a non-volatile memory. Among them, the non-volatile memory can be a read-only memory (ROM), a programmable read-only memory (PROM), an erasable programmable read-only memory (EPROM), an electrically erasable programmable read-only memory (EEPROM), or a flash memory. The volatile memory can be a random access memory (RAM). For example, RAM can be used as an external cache. By way of example and not limitation, RAM includes the following forms: static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate synchronous dynamic random access memory (DDR SDRAM), enhanced synchronous dynamic random access memory (ESDRAM), synchronous link dynamic random access memory (SLDRAM), and direct rambus RAM (DR RAM).

需要说明的是,当处理器为通用处理器、DSP、ASIC、FPGA或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件时,存储器(存储模块)可以集成在处理器中。It should be noted that when the processor is a general-purpose processor, DSP, ASIC, FPGA or other programmable logic device, discrete gate or transistor logic device, discrete hardware component, the memory (storage module) can be integrated into the processor.

还需要说明的是,本文描述的存储器旨在包括但不限于这些和任意其它适合类型的存储器。It should also be noted that the memory described herein is intended to include, but is not limited to, these and any other suitable types of memory.

如图9,本申请实施例提供一种芯片系统900。该芯片系统900(或者也可以称为处理系统)包括逻辑电路910以及输入/输出接口(input/output interface)920。应理解,芯片系统900可以安装于前文所述通信装置700中,或者说,前文所述通信装置700也可以包括芯片系统900。As shown in FIG9 , an embodiment of the present application provides a chip system 900. The chip system 900 (or processing system) includes a logic circuit 910 and an input/output interface 920. It should be understood that the chip system 900 can be installed in the communication device 700 described above, or in other words, the communication device 700 described above can also include the chip system 900.

其中,逻辑电路910可以为芯片系统900中的处理电路。逻辑电路910可以耦合连接存储单元,调用存储单元中的指令,使得芯片系统900可以实现本申请各实施例的方法和功能。输入/输出接口920,可以为芯片系统900中的输入输出电路,将芯片系统900处理好的信息输出,或将待处理的数据或信令信息输入芯片系统900进行处理。The logic circuit 910 may be a processing circuit in the chip system 900. The logic circuit 910 may be coupled to a storage unit and call instructions in the storage unit so that the chip system 900 can implement the methods and functions of the various embodiments of the present application. The input/output interface 920 may be an input/output circuit in the chip system 900, outputting information processed by the chip system 900 or inputting data or signaling information to be processed into the chip system 900 for processing.

作为一种方案,该芯片系统900用于实现上文各个方法实施例中由第一设备、第二设备和第一网元执行的操作。As a solution, the chip system 900 is used to implement the operations performed by the first device, the second device and the first network element in the above method embodiments.

例如,逻辑电路910用于实现上文方法实施例中由第一设备、第二设备和第一网元的处理相关的操作,如图4至图6中任意一个所示实施例中的第一设备、第二设备和第一网元的处理相关的操作,即是说,逻辑电路910用于实现上述处理单元720的功能;输入/输出接口920用于实现上文方法实施例中由第一设备、第二设备和第一网元的发送和/或接收相关的操作,如图4至图6中任意一个所示实施例中的第一设备、第二设备和第一网元执行的发送和/或接收相关的操作,即是说,输入/输出接口920用于实现上述收发单元710的功能。For example, the logic circuit 910 is used to implement operations related to processing by the first device, the second device and the first network element in the above method embodiments, such as operations related to processing by the first device, the second device and the first network element in any one of the embodiments shown in Figures 4 to 6, that is, the logic circuit 910 is used to implement the functions of the above-mentioned processing unit 720; the input/output interface 920 is used to implement operations related to sending and/or receiving by the first device, the second device and the first network element in the above method embodiments, such as operations related to sending and/or receiving performed by the first device, the second device and the first network element in any one of the embodiments shown in Figures 4 to 6, that is, the input/output interface 920 is used to implement the functions of the above-mentioned transceiver unit 710.

本申请实施例还提供一种计算机可读存储介质,其上存储有用于实现上述各方法实施例中由第一设备、第二设备和第一网元执行的方法的计算机指令。An embodiment of the present application further provides a computer-readable storage medium storing computer instructions for implementing the methods executed by the first device, the second device, and the first network element in the above-mentioned method embodiments.

例如,该计算机程序被计算机执行时,使得该计算机可以实现上述方法各实施例中由第一设备、第二设备和第一网元执行的方法。For example, when the computer program is executed by a computer, the computer can implement the methods performed by the first device, the second device, and the first network element in each embodiment of the above method.

本申请实施例还提供一种计算机程序产品,包含指令,该指令被计算机执行时以实现上述各方法实施例中由第一设备、第二设备和第一网元执行的方法。An embodiment of the present application further provides a computer program product comprising instructions, which, when executed by a computer, implement the methods performed by the first device, the second device, and the first network element in the above-mentioned method embodiments.

上述提供的任一种装置中相关内容的解释及有益效果均可参考上文提供的对应的方法实施例,此处不再赘述。The explanation of the relevant contents and beneficial effects of any of the above-mentioned devices can be referred to the corresponding method embodiments provided above, which will not be repeated here.

在本申请所提供的几个实施例中,应该理解到,所揭露的装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。此外,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。In the several embodiments provided in this application, it should be understood that the disclosed devices and methods can be implemented in other ways. For example, the device embodiments described above are only schematic. For example, the division of the units is only a logical function division. In actual implementation, there may be other division methods, such as multiple units or components can be combined or integrated into another system, or some features can be ignored or not executed. In addition, the mutual coupling or direct coupling or communication connection shown or discussed can be through some interfaces, indirect coupling or communication connection of devices or units, which can be electrical, mechanical or other forms.

本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。Those skilled in the art will appreciate that the units and algorithm steps of each example described in conjunction with the embodiments disclosed herein can be implemented in electronic hardware, or a combination of computer software and electronic hardware. Whether these functions are performed in hardware or software depends on the specific application and design constraints of the technical solution. Professional and technical personnel can use different methods to implement the described functions for each specific application, but such implementation should not be considered beyond the scope of this application.

所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。Those skilled in the art will clearly understand that, for the convenience and brevity of description, the specific working processes of the systems, devices and units described above can refer to the corresponding processes in the aforementioned method embodiments and will not be repeated here.

所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。The units described as separate components may or may not be physically separate, and the components shown as units may or may not be physical units, that is, they may be located in one place or distributed across multiple network units. Some or all of these units may be selected to achieve the purpose of this embodiment according to actual needs.

另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。In addition, each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.

所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(read-only memory,ROM)、随机存取存储器(random access memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。If the functions are implemented in the form of software functional units and sold or used as independent products, they can be stored in a computer-readable storage medium. Based on this understanding, the technical solution of the present application, or the part that contributes to the prior art, or the part of the technical solution, can be embodied in the form of a software product. The computer software product is stored in a storage medium and includes several instructions for enabling a computer device (which can be a personal computer, server, or network device, etc.) to execute all or part of the steps of the method described in each embodiment of the present application. The aforementioned storage media include: U disk, mobile hard disk, read-only memory (ROM), random access memory (RAM), magnetic disk or optical disk, and other media that can store program codes.

以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以所述权利要求的保护范围为准。The above description is merely a specific embodiment of the present application, but the scope of protection of the present application is not limited thereto. Any changes or substitutions that can be easily conceived by a person skilled in the art within the technical scope disclosed in this application should be included in the scope of protection of this application. Therefore, the scope of protection of this application should be based on the scope of protection of the claims.

Claims (29)

一种通信方法,其特征在于,包括:A communication method, comprising: 从第二设备接收第一消息,所述第一消息包括第一信息和第一操作指令;receiving a first message from a second device, where the first message includes first information and a first operation instruction; 当根据所述第一信息确定第一网元仅选择第一设备为目标设备时,向所述第二设备发送第一消息的响应消息,所述第一消息的响应消息包括所述第一操作指令所请求的所述第一设备的待传输信息。When it is determined based on the first information that the first network element only selects the first device as the target device, a response message of the first message is sent to the second device, where the response message of the first message includes the information to be transmitted of the first device requested by the first operation instruction. 根据权利要求1所述的方法,其特征在于,所述第一信息为与所述第一设备关联的第一标识信息。The method according to claim 1 is characterized in that the first information is first identification information associated with the first device. 根据权利要求1或2所述的方法,其特征在于,所述第一消息的响应消息还包括与所述第一设备关联的第二标识信息,所述第二标识信息所指示的所述第一设备的第二标识与所述第一标识信息所指示的所述第一设备的第一标识相同,或者,所述第二标识是所述第一标识的部分内容,或者,所述第二标识与第一标识完全不同,或者,所述第二标识为所述第一设备的临时标识,或者,所述第二标识为永久保存的所述第一设备的标识。The method according to claim 1 or 2 is characterized in that the response message of the first message also includes second identification information associated with the first device, and the second identification of the first device indicated by the second identification information is the same as the first identification of the first device indicated by the first identification information, or the second identification is part of the first identification, or the second identification is completely different from the first identification, or the second identification is a temporary identification of the first device, or the second identification is a permanently stored identification of the first device. 根据权利要求1至3中任一项所述的方法,其特征在于,所述第一消息还包括第一参数,所述方法还包括:The method according to any one of claims 1 to 3, wherein the first message further includes a first parameter, and the method further includes: 根据预配置的密钥和所述第一参数获取第一校验值,所述第一消息的响应消息还包括所述第一校验值。A first verification value is obtained according to a preconfigured key and the first parameter, and the response message to the first message also includes the first verification value. 根据权利要求4所述的方法,其特征在于,所述根据预配置的密钥和所述第一参数获取第一校验值,包括:The method according to claim 4, wherein obtaining the first check value according to the preconfigured key and the first parameter comprises: 根据所述预配置的密钥、所述第一参数和第二参数获取所述第一校验值,所述第一消息的响应消息还包括所述第二参数。The first verification value is obtained according to the preconfigured key, the first parameter and the second parameter, and the response message to the first message also includes the second parameter. 根据权利要求4或5所述的方法,其特征在于,所述第一消息还包括第一指示信息,所述第一指示信息指示上报所述第一校验值。The method according to claim 4 or 5 is characterized in that the first message also includes first indication information, and the first indication information indicates reporting the first verification value. 根据权利要求1至6中任一项所述的方法,其特征在于,所述向所述第二设备发送第一消息的响应消息,包括:The method according to any one of claims 1 to 6, wherein the sending a response message to the first message to the second device comprises: 从所述第二设备接收第一配置信息;receiving first configuration information from the second device; 根据所述第一配置信息向所述第二设备发送所述第一消息的响应消息。Send a response message to the first message to the second device according to the first configuration information. 根据权利要求7所述的方法,其特征在于,所述第一消息还包括所述第一配置信息。The method according to claim 7 is characterized in that the first message also includes the first configuration information. 根据权利要求7或8所述的方法,其特征在于,所述第一配置信息包括以下至少一项信息:The method according to claim 7 or 8, wherein the first configuration information includes at least one of the following information: 频域资源信息、时域资源信息、调制编码信息、重复次数信息、带宽信息、速率信息。Frequency domain resource information, time domain resource information, modulation and coding information, repetition number information, bandwidth information, and rate information. 一种通信方法,其特征在于,包括:A communication method, comprising: 接收第一信息;receiving a first message; 当根据所述第一信息确定第一网元仅选择第一设备为目标设备时,发送与所述第一设备关联的第二标识信息,所述第二标识信息用于所述第一网元对所述第一设备进行标识校验;When it is determined according to the first information that the first network element selects only the first device as the target device, sending second identification information associated with the first device, where the second identification information is used by the first network element to perform identification verification on the first device; 接收来自所述第一网元的第一操作指令,所述第一操作指令是所述第一网元对所述第一设备进行标识校验通过后发送的;receiving a first operation instruction from the first network element, where the first operation instruction is sent by the first network element after the first device passes the identity verification; 基于所述第一操作指令发送所述第一操作命令所请求的所述第一设备的待传输信息。Send the to-be-transmitted information of the first device requested by the first operation command based on the first operation instruction. 根据权利要求10所述的方法,其特征在于,所述第一信息为与所述第一设备关联的第一标识信息。The method according to claim 10 is characterized in that the first information is first identification information associated with the first device. 根据权利要求11所述的方法,其特征在于,所述第二标识信息所指示的所述第一设备的第二标识与所述第一标识信息所指示的所述第一设备的第一标识相同,或者,所述第二标识是所述第一标识的部分内容,或者,所述第二标识与第一标识完全不同,或者,所述第二标识为所述第一设备的临时标识,或者,所述第二标识为永久保存的所述第一设备的标识。The method according to claim 11 is characterized in that the second identifier of the first device indicated by the second identification information is the same as the first identifier of the first device indicated by the first identification information, or the second identifier is part of the first identifier, or the second identifier is completely different from the first identifier, or the second identifier is a temporary identifier of the first device, or the second identifier is a permanently stored identifier of the first device. 一种通信方法,其特征在于,包括:A communication method, comprising: 向第二设备发送第二消息,所述第二消息包括第一信息和第一操作指令,所述第一信息指示第一网元仅选择第一设备为目标设备;Sending a second message to the second device, where the second message includes the first information and the first operation instruction, where the first information instructs the first network element to select only the first device as a target device; 从所述第二设备接收第二消息的响应消息,所述第二消息的响应消息包括所述第一操作指令所请求的所述第一设备的待传输信息。A response message to the second message is received from the second device, where the response message to the second message includes the to-be-transmitted information of the first device requested by the first operation instruction. 根据权利要求13所述的方法,其特征在于,所述第一信息为与所述第一设备关联的第一标识信息。The method according to claim 13 is characterized in that the first information is first identification information associated with the first device. 根据权利要求13或14所述的方法,其特征在于,所述第二消息的响应消息还包括与所述第一设备关联的第二标识信息,所述第二标识信息所指示的所述第一设备的第二标识与所述第一标识信息所指示的所述第一设备的第一标识相同,或者,所述第二标识是所述第一标识的部分内容,或者,所述第二标识与第一标识完全不同,或者,所述第二标识为所述第一设备的临时标识,或者,所述第二标识为永久保存的所述第一设备的标识。The method according to claim 13 or 14 is characterized in that the response message of the second message also includes second identification information associated with the first device, and the second identification of the first device indicated by the second identification information is the same as the first identification of the first device indicated by the first identification information, or the second identification is part of the first identification, or the second identification is completely different from the first identification, or the second identification is a temporary identification of the first device, or the second identification is a permanently stored identification of the first device. 根据权利要求13至15中任一项所述的方法,其特征在于,所述第二消息还包括第一参数,所述第一参数用于所述第一设备获取第一校验值,所述第二消息的响应消息还包括所述第一校验值,所述方法还包括:The method according to any one of claims 13 to 15, wherein the second message further includes a first parameter, the first parameter is used by the first device to obtain a first verification value, the response message to the second message further includes the first verification value, and the method further includes: 根据预配置的密钥和所述第一参数获取第二校验值,并判断所述第二校验值和所述第一校验值是否一致;Obtaining a second verification value according to a preconfigured key and the first parameter, and determining whether the second verification value is consistent with the first verification value; 若所述第二校验值和所述第一校验值一致,则安全校验通过;若所述第二校验值和所述第一校验值不一致,则安全校验不通过。If the second verification value is consistent with the first verification value, the security check passes; if the second verification value is inconsistent with the first verification value, the security check fails. 根据权利要求16所述的方法,其特征在于,所述第一参数用于所述第一设备获取第一校验值包括:所述第一参数和第二参数用于所述第一设备获取所述第一校验值,所述第二消息的响应消息还包括所述第二参数,The method according to claim 16, wherein the first parameter is used by the first device to obtain the first verification value, comprising: the first parameter and the second parameter are used by the first device to obtain the first verification value, and the response message of the second message further includes the second parameter. 根据预配置的密钥和所述第一参数获取第二校验值,包括:Obtaining a second verification value according to a preconfigured key and the first parameter includes: 根据预配置的密钥、所述第一参数和所述第二参数获取所述第二校验值。The second verification value is obtained according to a preconfigured key, the first parameter, and the second parameter. 根据权利要求16或17所述的方法,其特征在于,所述第二消息还包括第一指示信息,所述第一指示信息指示所述第一设备上报所述第一校验值。The method according to claim 16 or 17 is characterized in that the second message also includes first indication information, and the first indication information instructs the first device to report the first verification value. 一种通信方法,其特征在于,包括:A communication method, comprising: 发送第一信息,所述第一信息指示第一网元仅选择第一设备为目标设备;Sending first information, where the first information instructs the first network element to select only the first device as a target device; 接收与所述第一设备关联的第二标识信息;receiving second identification information associated with the first device; 基于所述第二标识信息对所述第一设备进行标识校验;performing identification verification on the first device based on the second identification information; 当所述标识校验通过后,发送第一操作指令;When the identification verification is passed, sending a first operation instruction; 接收所述第一操作指令所请求的所述第一设备的待传输信息。Receive the information to be transmitted from the first device requested by the first operation instruction. 根据权利要求19所述的方法,其特征在于,所述第一信息为与所述第一设备关联的第一标识信息。The method according to claim 19 is characterized in that the first information is first identification information associated with the first device. 根据权利要求20所述的方法,其特征在于,所述第二标识信息所指示的所述第一设备的第二标识与所述第一标识信息所指示的所述第一设备的第一标识相同,或者,所述第二标识是所述第一标识的部分内容,或者,所述第二标识与第一标识完全不同,或者,所述第二标识为所述第一设备的临时标识,或者,所述第二标识为永久保存的所述第一设备的标识。The method according to claim 20 is characterized in that the second identifier of the first device indicated by the second identification information is the same as the first identifier of the first device indicated by the first identification information, or the second identifier is part of the first identifier, or the second identifier is completely different from the first identifier, or the second identifier is a temporary identifier of the first device, or the second identifier is a permanently stored identifier of the first device. 一种通信装置,其特征在于,包括:A communication device, comprising: 处理器,所述处理器用于执行存储器中存储的计算机程序,以使得所述通信装置执行如权利要求1至12中任一项所述的方法。A processor, wherein the processor is configured to execute a computer program stored in a memory, so that the communication device performs the method according to any one of claims 1 to 12. 一种通信装置,其特征在于,包括:A communication device, comprising: 处理器,所述处理器用于执行存储器中存储的计算机程序,以使得所述通信装置执行如权利要求13至21中任一项所述的方法。A processor, configured to execute a computer program stored in a memory, so that the communication device performs the method according to any one of claims 13 to 21. 一种通信系统,其特征在于,包括第一设备、第二设备和第一网元中的至少一个,A communication system, comprising at least one of a first device, a second device, and a first network element, 其中,所述第一设备用于执行如权利要求1至12中任一项所述的方法,所述第一网元用于执行如权利要求13至21中任一项所述的方法。The first device is used to execute the method according to any one of claims 1 to 12, and the first network element is used to execute the method according to any one of claims 13 to 21. 根据权利要求24所述的通信系统,其特征在于,The communication system according to claim 24, wherein: 所述第二设备用于从所述第一网元接收所述第二消息以及所述第二设备用于向所述第一设备发送所述第一消息;或者the second device is configured to receive the second message from the first network element and the second device is configured to send the first message to the first device; or 所述第二设备用于从所述第一设备接收所述第一消息的响应消息以及所述第二设备用于向所述第一网元发送所述第二消息的响应消息;或者,The second device is configured to receive a response message to the first message from the first device, and the second device is configured to send a response message to the second message to the first network element; or, 所述第二设备用于从所述第一网元接收所述第一信息以及所述第二设备用于向所述第一设备发送所述第一信息;或者,the second device is configured to receive the first information from the first network element and the second device is configured to send the first information to the first device; or, 所述第二设备用于从所述第一设备接收与所述第一设备关联的第二标识信息以及所述第二设备用于向所述第一网元发送与所述第一设备关联的第二标识信息;或者,the second device is configured to receive second identification information associated with the first device from the first device, and the second device is configured to send the second identification information associated with the first device to the first network element; or, 所述第二设备用于从所述第一网元接收第一操作指令以及所述第二设备用于向所述第一设备发送所述第一操作指令;或者,the second device is configured to receive a first operation instruction from the first network element and the second device is configured to send the first operation instruction to the first device; or, 所述第二设备用于从所述第一设备接收所述第一操作指令所请求的待传输信息以及所述第二设备用于向所述第一网元发送所述第一操作指令所请求的待传输信息。The second device is used to receive the to-be-transmitted information requested by the first operation instruction from the first device, and the second device is used to send the to-be-transmitted information requested by the first operation instruction to the first network element. 一种计算机可读存储介质,其上存储有计算机程序或指令,其特征在于,该计算机程序或指令被处理器执行时,使得如权利要求1至12中任一项所述方法被执行。A computer-readable storage medium having a computer program or instruction stored thereon, wherein when the computer program or instruction is executed by a processor, the method according to any one of claims 1 to 12 is executed. 一种计算机可读存储介质,其上存储有计算机程序或指令,其特征在于,该计算机程序或指令被处理器执行时,使得如权利要求13至21中任一项所述方法被执行。A computer-readable storage medium having a computer program or instruction stored thereon, wherein when the computer program or instruction is executed by a processor, the method according to any one of claims 13 to 21 is executed. 一种包含指令的计算机程序产品,其特征在于,当其在计算机上运行时,使得如权利要求1至12中任一项所述方法被执行。A computer program product comprising instructions, characterized in that when the computer program product is run on a computer, the method according to any one of claims 1 to 12 is executed. 一种包含指令的计算机程序产品,其特征在于,当其在计算机上运行时,使得如权利要求13至21中任一项所述方法被执行。A computer program product comprising instructions, characterized in that when the computer program product is run on a computer, the method according to any one of claims 13 to 21 is executed.
PCT/CN2025/084588 2024-04-03 2025-03-25 Communication method and communication apparatus Pending WO2025209244A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202410405438.1 2024-04-03
CN202410405438.1A CN120786685A (en) 2024-04-03 2024-04-03 Communication method and communication device

Publications (1)

Publication Number Publication Date
WO2025209244A1 true WO2025209244A1 (en) 2025-10-09

Family

ID=97266176

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2025/084588 Pending WO2025209244A1 (en) 2024-04-03 2025-03-25 Communication method and communication apparatus

Country Status (2)

Country Link
CN (1) CN120786685A (en)
WO (1) WO2025209244A1 (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190116613A1 (en) * 2017-06-08 2019-04-18 Qualcomm Incorporated Random access procedure in a wireless backhaul network
WO2021204845A1 (en) * 2020-04-07 2021-10-14 Telefonaktiebolaget Lm Ericsson (Publ) Random access in a wireless communication network
CN116321083A (en) * 2021-12-21 2023-06-23 华为技术有限公司 A terminal management method and device
CN116963276A (en) * 2022-04-11 2023-10-27 华为技术有限公司 Paging method and device
WO2024022012A1 (en) * 2022-07-27 2024-02-01 华为技术有限公司 Positioning method and apparatus

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190116613A1 (en) * 2017-06-08 2019-04-18 Qualcomm Incorporated Random access procedure in a wireless backhaul network
WO2021204845A1 (en) * 2020-04-07 2021-10-14 Telefonaktiebolaget Lm Ericsson (Publ) Random access in a wireless communication network
CN116321083A (en) * 2021-12-21 2023-06-23 华为技术有限公司 A terminal management method and device
CN116963276A (en) * 2022-04-11 2023-10-27 华为技术有限公司 Paging method and device
WO2024022012A1 (en) * 2022-07-27 2024-02-01 华为技术有限公司 Positioning method and apparatus

Also Published As

Publication number Publication date
CN120786685A (en) 2025-10-14

Similar Documents

Publication Publication Date Title
US20250211964A1 (en) Communication method and apparatus
US11838815B2 (en) Cell handover method, terminal device, and network device
EP3879876B1 (en) Wireless communication method and terminal device
US20230422021A1 (en) Communication method and communication apparatus
CN116095645A (en) A communication method and device
US20220225273A1 (en) Paging method and apparatus
CN113519183A (en) Wireless communication method and terminal device
US20250240835A1 (en) Communication method and apparatus
EP4462691A1 (en) Communication method and communication apparatus
CN117692975A (en) Cell switching methods, equipment, storage media and products
CN112449346B (en) Communication method, communication device and computer-readable storage medium
CN118044252A (en) Wireless communication method, terminal device and network device
WO2025209244A1 (en) Communication method and communication apparatus
WO2024140533A1 (en) Communication method and apparatus
JP7673205B2 (en) Data transmission method, terminal device and network device
WO2025209252A1 (en) Communication method and communication apparatus
CN115701728A (en) Method and communication device for updating security context
WO2025190135A1 (en) Communication method and communication apparatus
EP4622193A1 (en) Wireless communication method, terminal device, and network device
US20250202672A1 (en) Communication method and apparatus
WO2025232517A1 (en) Communication method and communication apparatus
WO2025098334A1 (en) Communication method and communication apparatus
WO2025208486A1 (en) Communication apparatus and communication system
WO2024093740A1 (en) Communication method and apparatus
WO2025092801A1 (en) Data transmission method and apparatus

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 25781541

Country of ref document: EP

Kind code of ref document: A1