WO2024164349A1 - 侧链路通信方法及装置 - Google Patents

侧链路通信方法及装置 Download PDF

Info

Publication number
WO2024164349A1
WO2024164349A1 PCT/CN2023/075543 CN2023075543W WO2024164349A1 WO 2024164349 A1 WO2024164349 A1 WO 2024164349A1 CN 2023075543 W CN2023075543 W CN 2023075543W WO 2024164349 A1 WO2024164349 A1 WO 2024164349A1
Authority
WO
WIPO (PCT)
Prior art keywords
security
security context
layer
service code
code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2023/075543
Other languages
English (en)
French (fr)
Inventor
商正仪
陆伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to JP2025546369A priority Critical patent/JP2026505584A/ja
Priority to KR1020257030194A priority patent/KR20250143846A/ko
Priority to PCT/CN2023/075543 priority patent/WO2024164349A1/zh
Priority to CN202380008251.1A priority patent/CN116830623A/zh
Priority to EP23920556.0A priority patent/EP4664954A4/en
Publication of WO2024164349A1 publication Critical patent/WO2024164349A1/zh
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0431Key distribution or pre-distribution; Key agreement
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/033Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/90Services for handling of emergency or hazardous situations, e.g. earthquake and tsunami warning systems [ETWS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/005Discovery of network devices, e.g. terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W92/00Interfaces specially adapted for wireless communication networks
    • H04W92/16Interfaces between hierarchically similar devices
    • H04W92/18Interfaces between hierarchically similar devices between terminal devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/037Protecting confidentiality, e.g. by encryption of the control plane, e.g. signalling traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/14Direct-mode setup
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W80/00Wireless network protocols or protocol adaptations to wireless operation
    • H04W80/02Data link layer protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices
    • H04W88/04Terminal devices adapted for relaying to or from another terminal or user

Definitions

  • the present disclosure relates to the field of mobile communication technology, and in particular to a side link communication method and device.
  • the remote user equipment In sidelink (SL) communication, the remote user equipment (UE) encrypts the information used for sidelink communication in the direct communication request (DCR) using the security parameters used in the discovery process, and then sends the direct communication request to the UE to the network relay device. After receiving the direct communication request, the relay device needs to use the corresponding security parameters to decrypt to obtain the information used for sidelink communication.
  • DCR direct communication request
  • the relay device After receiving the direct communication request, the relay device needs to use the corresponding security parameters to decrypt to obtain the information used for sidelink communication.
  • the present disclosure proposes a side link communication method and device. After receiving a direct communication request, the UE can determine the security key used to decrypt the encrypted information in the direct communication request based on the destination layer 2 ID in the direct communication request, which helps to achieve secure side link communication.
  • a first aspect embodiment of the present disclosure provides a side link communication method, which is executed by a UE, and the method includes: receiving a direct communication request (DCR), wherein the DCR includes a destination layer 2 identification (ID) and encryption information for side link communication; determining a security key for decrypting the encryption information based on the destination layer 2 ID; and decrypting the encryption information using the security key for side link communication.
  • DCR direct communication request
  • ID destination layer 2 identification
  • determining the security key for decrypting the encrypted information based on the destination layer 2 ID includes: determining, based on the destination layer 2 ID, a security context that matches the destination layer 2 ID from one or more pre-stored security contexts; and determining the security key based on the matching security context.
  • each security context includes a service code for identifying a service type for side link communication, a layer 2 ID corresponding to the service code, and a security key associated with the service code.
  • the service code includes any one of the following: relay service code RSC; proximity service (ProSe) restriction code; ProSe query code; ProSe response code; ranging service code.
  • each security context also includes any one or more of the following: a UE to network relay layer indicator; a control plane security indicator.
  • the method further includes: creating and storing the security context based on the layer 2 ID, service code and security key determined during the discovery process.
  • the creating and storing the security context includes any one of the following: creating and storing the security context when determining a layer 2 ID for the discovery process; creating and storing the security context after sending a discovery message for the discovery process; creating and storing the security context after completing the discovery process.
  • the second aspect embodiment of the present disclosure provides a side link communication device for UE, the device comprising: a transceiver module for receiving a direct communication request DCR, wherein the DCR comprises a destination layer 2 ID and encryption information for side link communication; a processing module for determining a security key for decrypting the encryption information according to the destination layer 2 ID; and decrypting the encryption information using the security key for side link communication.
  • the processing module is used to: determine, based on the destination layer 2 ID, a security context that matches the destination layer 2 ID from one or more pre-stored security contexts; and determine the security key based on the matching security context.
  • each security context includes a service code for identifying a service type for side link communication, a layer 2 ID corresponding to the service code, and a security key associated with the service code.
  • the service code includes any one of the following: relay service code RSC; proximity service (ProSe) restriction code; ProSe query code; ProSe response code; Ranging service code.
  • each security context further includes any one or more of the following: a UE to network relay layer indicator; a control plane security indicator.
  • the processing module is also used to create and store the security context based on the layer 2 ID, service code and security key determined during the discovery process.
  • the processing module is used to perform any of the following steps: creating and storing the security context when determining the layer 2 ID for the discovery process; creating and storing the security context after sending the discovery message for the discovery process; creating and storing the security context after completing the discovery process.
  • the third aspect embodiment of the present disclosure provides a communication device, including: a transceiver; a memory; a processor, which is connected to the transceiver and the memory respectively, and is configured to control the wireless signal reception and transmission of the transceiver by executing computer-executable instructions on the memory, and can implement the method described in the first aspect of the present disclosure.
  • the fourth aspect embodiment of the present disclosure provides a computer storage medium, wherein the computer storage medium stores computer executable instructions; after the computer executable instructions are executed by a processor, the method described in the first aspect of the present disclosure can be implemented.
  • the disclosed embodiment provides a sidelink communication method and apparatus, wherein a UE receives a DCR, wherein the DCR includes a destination layer 2 ID and encryption information for sidelink communication, determines a security key according to the destination layer 2 ID, and uses the security key to decrypt the encryption information for sidelink communication. This helps to achieve secure sidelink communication.
  • FIG1 is a schematic diagram of the architecture of a communication system provided by an embodiment of the present disclosure.
  • FIG2 is a schematic diagram of a flow chart of a side link communication method according to an embodiment of the present disclosure
  • FIG3 is a schematic diagram of a flow chart of a side link communication method according to an embodiment of the present disclosure
  • FIG4 is a schematic diagram of a flow chart of a side link communication method according to an embodiment of the present disclosure
  • FIG5 is a schematic diagram of a process flow of a mode A discovery process according to an embodiment of the present disclosure
  • FIG6 is a flow chart of a mode B discovery process according to an embodiment of the present disclosure.
  • FIG7 is a block diagram of a side link communication device according to an embodiment of the present disclosure.
  • FIG8 is a schematic diagram of the structure of a communication device provided in an embodiment of the present disclosure.
  • FIG. 9 is a schematic diagram of the structure of a chip provided in an embodiment of the present disclosure.
  • first, second, third, etc. may be used to describe various information in the disclosed embodiments, these information should not be limited to these terms. These terms are only used to distinguish the same type of information from each other.
  • first information may also be referred to as the second information, and similarly, the second information may also be referred to as the first information.
  • the words "if” and “if” as used herein may be interpreted as “at” or "when” or "in response to determination”.
  • LTE Long Term Evolution
  • Side links can also be called side links or edge links. They are used for direct data transmission between UEs without going through network equipment.
  • the design of the LTE sidelink can be applied to specific public safety matters (for example, emergency communications in disaster sites such as fires or earthquakes), or vehicle-to-everything (V2X) communications.
  • Vehicle-to-everything communications can include various services, such as basic safety communications, autonomous driving, platooning, sensor expansion, etc. Since the LTE sidelink only supports broadcast communications, it is mainly used for basic safety communications. Other advanced V2X services with strict quality of service (QoS) requirements in terms of latency, reliability, etc. will be supported through the new radio (NR) sidelink.
  • QoS quality of service
  • 5G ProSe refers to sidelink communication between device-to-device or between nearby mobile devices. Through UE-to-UE relay, 5G ProSe can further extend the range of sidelink communication.
  • User Equipment to Network Relay (U2N Relay, UE to Network Relay)
  • the U2N relay mode enables a UE to access the network by connecting to another relay UE regardless of whether the UE is within coverage.
  • Ranging may be used to determine the distance and/or direction and/or relative position between two or more UEs.
  • FIG1 is a block diagram of a wireless communication system applicable to the embodiments of the present disclosure.
  • the wireless communication system includes a first user equipment (UE) 11, a second UE 12, and a network device 13.
  • the link for communication between the network device and the UE is an uplink and a downlink, and the link between the first UE and the second UE is a side link.
  • the wireless communication system shown in FIG1 is only for schematic illustration, and the wireless communication system may also include other network devices, such as core network devices, wireless relay devices, and wireless backhaul devices, which are not shown in FIG1.
  • the embodiments of the present disclosure do not limit the number of network devices and terminals included in the wireless communication system.
  • the wireless communication system of the embodiment of the present disclosure is a network that provides wireless communication functions.
  • the wireless communication system can adopt different communication technologies, such as code division multiple access (code division multiple access, CDMA), wideband code division multiple access (wideband code division multiple access, WCDMA), time division multiple access (time division multiple access, TDMA), frequency division multiple access (frequency division multiple access, FDMA), orthogonal frequency division multiple access (orthogonal frequency-division multiple access, OFDMA), single carrier frequency division multiple access (single carrier FDMA, SC-FDMA), carrier sense multiple access/collision avoidance (Carrier Sense Multiple Access with Collision Avoidance).
  • code division multiple access code division multiple access
  • CDMA code division multiple access
  • wideband code division multiple access wideband code division multiple access
  • WCDMA wideband code division multiple access
  • time division multiple access time division multiple access
  • FDMA frequency division multiple access
  • OFDMA orthogonal frequency division multiple access
  • single carrier frequency division multiple access single carrier frequency division multiple access
  • the network can be divided into 2G (English: generation) network, 3G network, 4G network or future evolution network, such as 5G network, 5G network can also be called new wireless network (New Radio, NR).
  • 2G International: generation
  • 3G network 3G network
  • 4G network 4G network
  • future evolution network such as 5G network
  • 5G network can also be called new wireless network (New Radio, NR).
  • NR New Radio
  • the present disclosure sometimes simply refers to a wireless communication network as a network.
  • the network equipment involved in the present disclosure may also be referred to as a wireless access network equipment.
  • the wireless access network equipment may be: a base station, an evolved node B (eNB), a home base station, an access point (AP) in a wireless fidelity (WIFI) system, a wireless relay node, a wireless backhaul node, a transmission point (TP) or a transmission and reception point (TRP), etc. It may also be a gNB in an NR system, or it may also be a component or a part of a device constituting a base station, etc. When it is a vehicle-to-everything (V2X) communication system, the network equipment may also be a vehicle-mounted device.
  • V2X vehicle-to-everything
  • the UE involved in the present disclosure may also be referred to as a terminal device, terminal, mobile station (MS), mobile terminal (MT), etc., which is a device that provides voice and/or data connectivity to users.
  • the terminal may be a handheld device with wireless connection function, a vehicle-mounted device, etc.
  • some examples of terminals are: smart phones (Mobile Phone), pocket computers (Pocket Personal Computer, PPC), PDAs, personal digital assistants (Personal Digital Assistant, PDA), laptops, tablet computers, wearable devices, or vehicle-mounted devices, etc.
  • V2X vehicle-to-everything
  • the terminal device may also be a vehicle-mounted device. It should be understood that the embodiments of the present disclosure do not limit the specific technology and specific device form adopted by the terminal.
  • the communication system described in the embodiment of the present application is for more clearly illustrating the technical solution of the embodiment of the present application, and does not constitute a limitation on the technical solution provided in the embodiment of the present application.
  • Ordinary technicians in this field can know that with the evolution of the system architecture and the emergence of new business scenarios, the technical solution provided in the embodiment of the present application is also applicable to similar technical problems.
  • 5G ProSe remote UE uses the code for the discovery process to receive security parameters to encrypt information such as user plane Prose remote UE key ID (User Plane Prose Remote User Key, UP-PRUK ID)/control plane Prose remote UE key ID (Control Plane Prose Remote User Key, CP-PRUK ID) and service code (which identifies the service type of side link communication) in the direct communication request (DCR).
  • DCR direct communication request
  • the relay device from the 5G ProSe UE to the network uses the code for the discovery process to send security parameters to decrypt the encrypted information.
  • the present application provides a side link communication method and device. After receiving the DCR, the UE can determine the security key used to decrypt the encrypted information in the DCR based on the layer 2 ID in the direct communication request, which helps to achieve secure side link communication.
  • code sending security parameters, code receiving security parameters, and code security parameters mentioned in this disclosure include security keys for encryption and decryption.
  • Fig. 2 shows a schematic flow chart of a side link communication method according to an embodiment of the present disclosure. As shown in Fig. 2, the method can be executed by a UE and can include the following steps.
  • DCR direct communication request
  • the DCR includes a destination layer 2 identification (ID) and encryption information for sidelink communication.
  • ID destination layer 2 identification
  • the remote UE sends a DCR to the relay UE to request the creation of a PC5 link for sidelink communication between the remote UE and the relay UE.
  • the remote UE uses its own layer 2 ID as the source layer 2 ID and the relay UE's layer 2 ID as the destination layer 2 ID.
  • Layer 2 ID DCR is sent to the relay UE.
  • the DCR also includes encryption information for sidelink communication to ensure secure sidelink communication.
  • the UE After receiving the DCR, the UE can determine the security key used to decrypt the encrypted information in the DCR based on the destination layer 2 ID included in the DCR.
  • the UE may use the security key to decrypt the encrypted information in the DCR to obtain information for side link communication, thereby achieving side link communication.
  • the UE receives a DCR, wherein the DCR includes a destination layer 2 ID and encryption information for sidelink communication, and the UE determines a security key according to the destination layer 2 ID and uses the security key to decrypt the encryption information for sidelink communication. This helps to achieve secure sidelink communication.
  • Fig. 3 shows a schematic flow chart of a side link communication method according to an embodiment of the present disclosure. As shown in Fig. 3, the method can be executed by a UE and includes the following steps.
  • the DCR includes the destination layer 2 ID and encryption information for sidelink communication.
  • step S301 For a detailed description of the above step S301 and its related details, please refer to the description of step S201 and its related details, which will not be repeated here.
  • the above step S302 may include the following steps.
  • At least one security context is pre-stored in the UE. After receiving the DCR, the UE can select a security context that matches the destination layer 2 ID from the at least one security context according to the destination layer 2 ID in the DCR. It should be noted that the security context may also be referred to as a discovery security context or the like, which is not limited in the present disclosure.
  • each security context includes a service code for identifying the service type of the side link communication, a layer 2 ID corresponding to the service code, and a security key associated with the service code.
  • the UE may store a list of security contexts, which includes three security contexts, namely Context1, Context2 and Context3.
  • Context1 includes service code 1, L2-ID1 (layer 2 ID corresponding to service code 1) and Key1 (security key associated with service code 1);
  • Context2 includes service code 2, L2-ID2 (layer 2 ID corresponding to service code 2) and Key2 (security key associated with service code 2);
  • Context3 includes service code 3, L2-ID3 (layer 2 ID corresponding to service code 3) and Key3 (security key associated with service code 3). If the destination layer 2 ID received by the UE in the DCR is L2-ID2, the UE can determine that the security context matching the destination layer 2 ID is Context2.
  • a security key may be determined based on the matching security context.
  • Context2 is determined to be a matching security context
  • Key2 included in Context2 may be used as a security key.
  • step S303 For a detailed description of the above step S303 and its related details, please refer to the description of step S203 and its related details, which will not be repeated here.
  • the 5G ProSe U2N relay uses the code-sending security parameters including the security key to decrypt the UP-PRUK ID/CP-PRUK ID and RSC therein.
  • the 5G ProSe U2N relay obtains the security key of the code-sending security parameters based on the security context, for example, by finding the security context including the layer 2 ID that matches the destination layer 2 ID in the DCR.
  • the 5G ProSe U2N relay verifies whether the RSC matches the RSC sent in the discovery message. If it does not match, the 5G ProSe U2N relay abandons the PC5 direct link communication process.
  • the UE receives a DCR, wherein the DCR includes a destination layer 2 ID and encryption information for sidelink communication, and the UE determines a security key according to the destination layer 2 ID and uses the security key to decrypt the encryption information for sidelink communication. This helps to achieve secure sidelink communication.
  • the service code may include any one of the following: a replay service code (RSC), a ProSe restriction code, a ProSe query code, a ProSe response code, and a ranging service code.
  • RSC replay service code
  • ProSe restriction code a ProSe query code
  • ProSe response code a ProSe response code
  • each security context may further include one or more of the following: a UE-to-network relay layer indicator, a control plane security indicator.
  • the UE to network relay layer indicator is used to indicate whether the associated service code provides 5G ProSe Layer 2 relay service or 5G ProSe Layer 3 relay service.
  • a control plane security indicator is provided for a service code
  • a control plane-based security procedure is performed for UE-to-network relay communications of the service code, otherwise a user plane-based security procedure is performed.
  • Fig. 4 shows a schematic flow chart of a side link communication method according to an embodiment of the present disclosure. As shown in Fig. 4, the method can be executed by a UE and includes the following steps.
  • S401 create and store a security context based on the layer 2 ID, service code, and security key determined during the discovery process.
  • the UE may create a security context including the layer 2 ID, service code and security key according to the layer 2 ID, service code and security key determined in the discovery process, and store the security context.
  • the security context may also be referred to as a discovery security context or the like, which is not limited in the present disclosure.
  • the UE may create and store a security context when determining a Layer 2 ID to be used in the discovery process.
  • the UE may create and store a security context after sending a discovery message for the discovery process.
  • the UE may create and store a security context after completing the discovery process.
  • Mode A Currently two modes are defined for the discovery process, Mode A and Mode B.
  • FIG. 5 shows a schematic diagram of the discovery process in Mode A.
  • Mode A two types of UEs participate in ProSe direct discovery, namely:
  • -Announcement UE A UE that announces specific information, which can be used by nearby UEs with discovery rights.
  • - Monitoring UE Listen to broadcast messages to discover nearby announcing UEs.
  • the announcement UE broadcasts a discovery message, which may include the type of discovery message, a service code identifying the service type of the side link communication (such as a ProSe application code or a ProSe restriction code or a relay service code), and other metadata, etc.
  • the application layer metadata may be used as metadata in the discovery message.
  • the content in the discovery message is protected by a code discovery security parameter or a code security parameter.
  • the UE declares that it selects the source layer 2 ID for the discovery process (such as 5G ProSe direct discovery/5G ProSe U2N discovery/ranging/SL positioning discovery process) by itself, and determines the destination layer 2 ID for the discovery process based on the network configuration information.
  • the source layer 2 ID for the discovery process such as 5G ProSe direct discovery/5G ProSe U2N discovery/ranging/SL positioning discovery process
  • the UE can create a security context including a self-selected source layer 2 ID, a service code, and a security key associated with the service code after broadcasting a discovery message, and store the security context.
  • the UE can create a security context including a self-selected source layer 2 ID, a service code, and a security key associated with the service code, and store the security context.
  • the UE may, after completing the discovery process, create a security context including a self-selected source layer 2 ID, a service code, and a security key associated with the service code, and store the security context.
  • FIG. 6 shows a flow chart of the discovery process of Mode B.
  • Mode B two types of UEs participate in ProSe direct discovery, namely:
  • - Discoverer UE The UE that sends a request containing specific information about what it is interested in discovering.
  • the UE that receives the request message may reply with some information related to the discoverer's request.
  • the discoverer UE sends information about other UEs that hope to receive responses, for example, the information may be about the UE's identification information, the information may be about the ProSe query code, and the information may also be about the ProSe application identity corresponding to the group, and members of the group may respond.
  • the information may be about the UE's identification information
  • the information may be about the ProSe query code
  • the information may also be about the ProSe application identity corresponding to the group, and members of the group may respond.
  • the discoverer UE broadcasts a discovery message, which may include the type of discovery message, a service code identifying the service type of the side link communication (such as a ProSe query code or a relay service code), etc.
  • the content in the discovery message is protected by code discovery security parameters or code security parameters.
  • the discoverer UE selects the source layer 2 ID used for the discovery process (such as 5G ProSe direct discovery/5G ProSe U2N discovery/ranging/SL positioning discovery) by itself, and determines the destination layer 2 ID used for the discovery process based on the network configuration.
  • the source layer 2 ID used for the discovery process such as 5G ProSe direct discovery/5G ProSe U2N discovery/ranging/SL positioning discovery
  • the discoverer UE may create a security context including a self-selected source layer 2 ID, a service code, and a security key associated with the service code, and store the security context.
  • the discoverer UE may create a security context including a self-selected source layer 2 ID, a service code, and a security key associated with the service code, and store the security context.
  • the discoverer UE may, after completing the discovery process, create a security context including a self-selected source layer 2 ID, a service code, and a security key associated with the service code, and store the security context.
  • the discoverer UE After receiving the discovery message, the discoverer UE that matches the discovery message can send a response message to the discoverer UE.
  • the response message may include the type of discovery message, a service code (such as a ProSe response code or a relay service code) that identifies the service type of the side link communication, metadata, etc.
  • the application layer metadata may be used as metadata in the discovery message.
  • the content in the discovery message is protected by a code reception security parameter or a code security parameter.
  • the discovered UE selects the source layer 2 ID for the discovery process (such as 5G ProSe direct discovery/5G ProSe U2N discovery/ranging/SL positioning discovery) by itself, and the source layer 2 ID of the received discovery message is set to the destination layer 2 ID.
  • the source layer 2 ID for the discovery process such as 5G ProSe direct discovery/5G ProSe U2N discovery/ranging/SL positioning discovery
  • the discoverer UE may, after sending a response message, create a security context including a self-selected source layer 2 ID, a service code, and a security key associated with the service code, and store the security context.
  • the discoverer UE can create a security context including a self-selected source layer 2 ID, a service code, and a security key associated with the service code, and store the security context.
  • the discoverer UE can create a security context including a self-selected source layer 2 ID, a service code, and a security key associated with the service code, and store the security context.
  • the DCR includes the destination layer 2 ID and encryption information for sidelink communication.
  • step S301 For a detailed description of the above step S301 and its related details, please refer to the description of step S201 and its related details, which will not be repeated here.
  • the UE receives a DCR, wherein the DCR includes a destination layer 2 ID and encryption information for sidelink communication, and the UE determines a security key according to the destination layer 2 ID and uses the security key to decrypt the encryption information for sidelink communication. This helps to achieve secure sidelink communication.
  • the service code may include any one of the following: replay service code (RSC), ProSe restriction code, ProSe query code, ProSe response code, and ranging service code.
  • RSC replay service code
  • ProSe restriction code ProSe query code
  • ProSe response code ProSe response code
  • each security context may further include one or more of the following: a UE-to-network relay layer indicator, a control plane security indicator.
  • the method provided by the embodiment of the present application is introduced from the perspective of the user equipment.
  • the user equipment may include a hardware structure and a software module, and implement the above functions in the form of a hardware structure, a software module, or a hardware structure plus a software module.
  • a certain function of the above functions can be executed in the form of a hardware structure, a software module, or a hardware structure plus a software module.
  • the present disclosure also provides a side link communication device. Since the side link communication device provided in the embodiment of the present disclosure corresponds to the side link communication methods provided in the above-mentioned embodiments, the implementation method of the side link communication method is also applicable to the side link communication device provided in this embodiment and will not be described in detail in this embodiment.
  • FIG7 is a schematic diagram of the structure of a side link communication device 700 provided in an embodiment of the present disclosure.
  • the side link communication device 700 can be used for a UE.
  • the device 700 may include a transceiver module 701 .
  • the transceiver module 701 is used to receive a direct communication request DCR, wherein the DCR includes a destination layer 2 ID and encryption information for side link communication.
  • Processing module 702 is used to determine the security key used to decrypt the encrypted information based on the destination layer 2 ID; and use the security key to decrypt the encrypted information for side link communication.
  • the UE receives the DCR, wherein the DCR includes the destination layer 2 ID and the encryption information for the sidelink communication, and the UE determines the security key according to the destination layer 2 ID and decrypts the encryption information using the security key for the sidelink communication.
  • the UE determines the security key according to the destination layer 2 ID and decrypts the encryption information using the security key for the sidelink communication.
  • the processing module 702 is used to: determine, based on the destination layer 2 ID, a security context that matches the destination layer 2 ID from one or more pre-stored security contexts; and determine the security key based on the matching security context.
  • each security context includes a service code for identifying a service type of the sidelink communication, a layer 2 ID corresponding to the service code, and a security key associated with the service code.
  • the service code includes any one of the following: a relay service code RSC; a proximity service (ProSe) restriction code; a ProSe query code; a ProSe response code; or a Ranging service code.
  • RSC relay service code
  • ProSe proximity service
  • ProSe query code ProSe query code
  • ProSe response code ProSe response code
  • Ranging service code any one of the following: a relay service code RSC; a proximity service (ProSe) restriction code; a ProSe query code; a ProSe response code; or a Ranging service code.
  • each security context further includes any one or more of the following: a UE-to-network relay layer indicator; a control plane security indicator.
  • the processing module 702 is also used to: create and store the security context based on the layer 2 ID, service code and security key determined during the discovery process.
  • the processing module 702 is used to perform any of the following steps: creating and storing the security context when determining the layer 2 ID for the discovery process; creating and storing the security context after sending the discovery message for the discovery process; creating and storing the security context after completing the discovery process.
  • FIG 8 is a schematic diagram of the structure of a communication device 800 provided in an embodiment of the present application.
  • the communication device 800 can be a user device, or a chip, a chip system, or a processor that supports a network device to implement the above method, or a chip, a chip system, or a processor that supports a user device to implement the above method.
  • the device can be used to implement the method described in the above method embodiment, and the details can be referred to the description in the above method embodiment.
  • the communication device 800 may include one or more processors 801.
  • the processor 801 may be a general-purpose processor or a dedicated processor, etc. For example, it may be a baseband processor or a central processing unit.
  • the baseband processor may be used to process the communication protocol and communication data
  • the central processing unit may be used to control the communication device (such as a base station, a baseband chip, a terminal device, a terminal device chip, a DU or a CU, etc.), execute a computer program, and process the data of the computer program.
  • the communication device 800 may further include one or more memories 802, on which a computer program 804 may be stored, and the processor 801 executes the computer program 804 so that the communication device 800 performs the method described in the above method embodiment.
  • data may also be stored in the memory 802.
  • the communication device 800 and the memory 802 may be provided separately or integrated together.
  • the communication device 800 may further include a transceiver 805 and an antenna 806.
  • the transceiver 805 may be referred to as a transceiver unit, a transceiver, or a transceiver circuit, etc., and is used to implement a transceiver function.
  • the transceiver 805 may include a receiver and a transmitter, the receiver may be referred to as a receiver or a receiving circuit, etc., and is used to implement a receiving function; the transmitter may be referred to as a transmitter or a transmitting circuit, etc., and is used to implement a transmitting function.
  • the communication device 800 may further include one or more interface circuits 807.
  • the interface circuit 807 is used to receive code instructions and transmit them to the processor 801.
  • the processor 801 runs the code instructions to enable the communication device 800 to perform the method described in the above method embodiment.
  • the processor 801 may include a transceiver for implementing receiving and sending functions.
  • the transceiver may be a transceiver circuit, an interface, or an interface circuit.
  • the transceiver circuit, interface, or interface circuit for implementing the receiving and sending functions may be separate or integrated.
  • the above-mentioned transceiver circuit, interface, or interface circuit may be used for reading and writing code/data, or the above-mentioned transceiver circuit, interface, or interface circuit may be used for transmitting or delivering signals.
  • the processor 801 may store a computer program 803, which runs on the processor 801 and enables the communication device 800 to perform the method described in the above method embodiment.
  • the computer program 803 may be fixed in the processor 801, in which case the processor 801 may be implemented by hardware.
  • the communication device 800 may include a circuit that can implement the functions of sending or receiving or communicating in the aforementioned method embodiment.
  • the processor and transceiver described in the present application can be implemented in an integrated circuit (IC), an analog IC, a radio frequency integrated circuit RFIC, a mixed signal IC, an application specific integrated circuit (ASIC), a printed circuit board (PCB), an electronic device, etc.
  • the processor and transceiver can also be manufactured using various IC process technologies, such as complementary metal oxide semiconductor (CMOS), N-type metal oxide semiconductor (nMetal-oxide-semiconductor, NMOS), P-type metal oxide semiconductor (positive channel metal oxide semiconductor, PMOS), bipolar junction transistor (bipolar junction transistor, BJT), bipolar CMOS (BiCMOS), silicon germanium (SiGe), gallium arsenide (GaAs), etc.
  • CMOS complementary metal oxide semiconductor
  • N-type metal oxide semiconductor nMetal-oxide-semiconductor
  • PMOS bipolar junction transistor
  • BJT bipolar junction transistor
  • BiCMOS bipolar CMOS
  • SiGe silicon germanium
  • GaAs gallium arsenide
  • the communication device described in the above embodiment may be a user equipment, but the scope of the communication device described in the present application is not limited thereto, and the structure of the communication device may not be limited by FIG. 8.
  • the communication device may be an independent device or may be part of a larger device.
  • the communication device may be:
  • the IC set may also include a storage component for storing data and computer programs;
  • ASIC such as modem
  • the communication device can be a chip or a chip system
  • the communication device can be a chip or a chip system
  • the schematic diagram of the chip structure shown in Figure 9 includes a processor 901 and an interface 902.
  • the number of processors 901 can be one or more, and the number of interfaces 902 can be multiple.
  • the chip further includes a memory 903, and the memory 903 is used to store necessary computer programs and data.
  • the present application also provides a readable storage medium having instructions stored thereon, which implement the functions of any of the above method embodiments when executed by a computer.
  • the present application also provides a computer program product, which implements the functions of any of the above method embodiments when executed by a computer.
  • the computer program product includes one or more computer programs.
  • the computer can be a general-purpose computer, a special-purpose computer, a computer network, or other programmable device.
  • the computer program can be stored in a computer-readable storage medium, or transmitted from one computer-readable storage medium to another computer-readable storage medium.
  • the computer program can be transmitted from a website site, computer, server or data center by wired (e.g., coaxial cable, optical fiber, digital subscriber line (digital subscriber line, DSL)) or wireless (e.g., infrared, wireless, microwave, etc.) mode to another website site, computer, server or data center.
  • the computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device such as a server or data center that includes one or more available media integrated.
  • the available medium may be a magnetic medium (e.g., a floppy disk, a hard disk, a magnetic tape), an optical medium (e.g., a high-density digital video disc (DVD)), or a semiconductor medium (e.g., a solid state disk (SSD)), etc.
  • a magnetic medium e.g., a floppy disk, a hard disk, a magnetic tape
  • an optical medium e.g., a high-density digital video disc (DVD)
  • DVD high-density digital video disc
  • SSD solid state disk
  • At least one in the present application can also be described as one or more, and a plurality can be two, three, four or more, which is not limited in the present application.
  • the technical features in the technical feature are distinguished by “first”, “second”, “third”, “A”, “B”, “C” and “D”, etc., and there is no order of precedence or size between the technical features described by the "first”, “second”, “third”, “A”, “B”, “C” and “D”.
  • machine-readable medium and “computer-readable medium” refer to any computer program product, apparatus, and/or device (e.g., disk, optical disk, memory, programmable logic device (PLD)) for providing machine instructions and/or data to a programmable processor, including a machine-readable medium that receives machine instructions as a machine-readable signal.
  • machine-readable signal refers to any signal for providing machine instructions and/or data to a programmable processor.
  • the systems and techniques described herein may be implemented in a computing system that includes back-end components (e.g., as a data server), or a computing system that includes middleware components (e.g., an application server), or a computing system that includes front-end components (e.g., a user computer with a graphical user interface or a web browser through which a user can interact with implementations of the systems and techniques described herein), or a computing system that includes any combination of such back-end components, middleware components, or front-end components.
  • the components of the system may be interconnected by any form or medium of digital data communication (e.g., a communications network). Examples of communications networks include: a local area network (LAN), a wide area network (WAN), and the Internet.
  • a computer system may include clients and servers.
  • Clients and servers are generally remote from each other and usually interact through a communication network.
  • the relationship of client and server is generated by computer programs running on respective computers and having a client-server relationship to each other.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • Business, Economics & Management (AREA)
  • Health & Medical Sciences (AREA)
  • Emergency Management (AREA)
  • Environmental & Geological Engineering (AREA)
  • Public Health (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本公开提出了一种侧链路通信方法及装置,涉及通信领域,该方法包括:接收直接通信请求,其中直接通信请求包括层2标识和用于侧链路通信的加密信息,根据层2标识确定用于对加密信息进行解密的安全密钥,以及利用安全密钥对加密信息进行解密以便进行侧链路通信。由此,有助于实现安全的侧链路通信。

Description

侧链路通信方法及装置 技术领域
本公开涉及移动通信技术领域,特别涉及一种侧链路通信方法及装置。
背景技术
在侧链路(SL,sidelink)通信中,远程用户设备(UE,user equipment)利用用于发现过程中使用的安全参数对直接通信请求(DCR,direct communication request)中用于进行侧链路通信的信息进行加密后,将该直接通信请求发送给UE到网络中继设备,而中继设备在接收到该直接通信请求后,需要利用对应的安全参数进行解密以获得用于侧链路通信的信息。然而,在现有技术规范中,并未规定中继设备如何获取对应的安全参数来进行解密。
发明内容
本公开提出了一种侧链路通信方法及装置,UE在接收到直接通信请求后,能够根据直接通信请求中的目的地层2 ID来确定用于对直接通信请求中的加密信息进行解密的安全密钥,有助于实现安全的侧链路通信。
本公开的第一方面实施例提供了一种侧链路通信方法,由UE执行,所述方法包括:接收直接通信请求(DCR,direct communication request),其中所述DCR包括目的地层2标识(ID,identification)以及用于侧链路通信的加密信息;根据所述目的地层2 ID,确定用于对所述加密信息进行解密的安全密钥;以及利用所述安全密钥对所述加密信息进行解密以便进行侧链路通信。
可选地,所述根据所述目的地层2 ID,确定用于对所述加密信息进行解密的安全密钥包括:根据所述目的地层2 ID,从预存储的一条或多条安全上下文中确定与所述目的地层2 ID匹配的安全上下文;根据所述匹配的安全上下文,确定所述安全密钥。
可选地,每条安全上下文包括用于标识侧链路通信的服务类型的服务代码、与所述服务代码对应的层2 ID、以及与所述服务代码相关联的安全密钥。
可选地,所述服务代码包括以下中任一个:中继服务代码RSC;邻近服务(ProSe,proximity based service)限制代码;ProSe查询代码;ProSe响应代码;测距(Ranging)服务代码。
可选地,每条安全上下文还包括以下中任一个或多个:UE到网络中继层指示符;控制面安全指示符。
可选地,所述方法还包括:根据在发现过程中确定的层2 ID、服务代码和安全密钥,创建并存储所述安全上下文。
可选地,所述创建并存储所述安全上下文包括以下中任一种:在确定用于所述发现过程的层2 ID时,创建并存储所述安全上下文;在发送用于所述发现过程的发现消息后,创建并存储所述安全上下文;在完成所述发现过程后,创建并存储所述安全上下文。
本公开的第二方面实施例提供了一种侧链路通信装置,用于UE,所述装置包括:收发模块,用于接收直接通信请求DCR,其中所述DCR包括目的地层2 ID以及用于侧链路通信的加密信息;处理模块,用于根据所述目的地层2 ID,确定用于对所述加密信息进行解密的安全密钥;以及利用所述安全密钥对所述加密信息进行解密以便进行侧链路通信。
可选地,所述处理模块用于:根据所述目的地层2 ID,从预存储的一条或多条安全上下文中确定与所述目的地层2 ID匹配的安全上下文;根据所述匹配的安全上下文,确定所述安全密钥。
可选地,每条安全上下文包括用于标识侧链路通信的服务类型的服务代码、与所述服务代码对应的层2 ID、以及与所述服务代码相关联的安全密钥。
可选地,所述服务代码包括以下中任一个:中继服务代码RSC;邻近服务(ProSe,proximity based service)限制代码;ProSe查询代码;ProSe响应代码;Ranging服务代码。
可选地,每条安全上下文还包括以下中任一个或多个:UE到网络中继层指示符;控制面安全指示符。
可选地,所述处理模块还用于:根据在发现过程中确定的层2 ID、服务代码和安全密钥,创建并存储所述安全上下文。
可选地,所述处理模块用于执行以下任一步:在确定用于所述发现过程的层2 ID时,创建并存储所述安全上下文;在发送用于所述发现过程的发现消息后,创建并存储所述安全上下文;在完成所述发现过程后,创建并存储所述安全上下文。
本公开的第三方面实施例提供了一种通信设备,包括:收发器;存储器;处理器,分别与所述收发器及所述存储器连接,配置为通过执行所述存储器上的计算机可执行指令,控制所述收发器的无线信号收发,并能够实现本公开的第一方面所述的方法。
本公开的第四方面实施例提供了一种计算机存储介质,其中,所述计算机存储介质存储有计算机可执行指令;所述计算机可执行指令被处理器执行后,能够实现本公开的第一方面所述的方法。
本公开实施例提供了一种侧链路通信方法及装置,UE接收DCR,其中DCR包括目的地层2 ID和用于侧链路通信的加密信息,根据目的地层2 ID确定安全密钥,以及利用安全密钥对加密信息进行解密以便进行侧链路通信。由此,有助于实现安全的侧链路通信。
本公开附加的方面和优点将在下面的描述中部分给出,部分将从下面的描述中变得明显,或通过本公开的实践了解到。
附图说明
本公开上述的和/或附加的方面和优点从下面结合附图对实施例的描述中将变得明显和容易理解,其中:
图1为本公开实施例提供的一种通信系统的架构示意图;
图2为根据本公开实施例的一种侧链路通信方法的流程示意图;
图3为根据本公开实施例的一种侧链路通信方法的流程示意图;
图4为根据本公开实施例的一种侧链路通信方法的流程示意图;
图5为根据本公开实施例的模式A发现过程的流程示意图;
图6为根据本公开实施例的模式B发现过程的流程示意图;
图7为根据本公开实施例的一种侧链路通信装置的框图;
图8为本公开实施例提供的一种通信装置的结构示意图;
图9为本公开实施例提供的一种芯片的结构示意图。
具体实施方式
下面详细描述本公开的实施例,所述实施例的示例在附图中示出,其中自始至终相同或类似的标号表示相同或类似的元件或具有相同或类似功能的元件。下面通过参考附图描述的实施例是示例性的,旨在用于解释本公开,而不能理解为对本公开的限制。
在本公开实施例使用的术语是仅仅出于描述特定实施例的目的,而非旨在限制本公开实施例。在本公开实施例和所附权利要求书中所使用的单数形式的“一种”和“该”也旨在包括多数形式,除非上下文清楚地表示其他含义。还应当理解,本文中使用的术语“和/或”是指并包含一个或多个相关联的列出项目的任何或所有可能组合。
应当理解,尽管在本公开实施例可能采用术语第一、第二、第三等来描述各种信息,但这些信息不应限于这些术语。这些术语仅用来将同一类型的信息彼此区分开。例如,在不脱离本公开实施例范围的情况下,第一信息也可以被称为第二信息,类似地,第二信息也可以被称为第一信息。取决于语境,如在此所使用的词语“如果”及“若”可以被解释成为“在……时”或“当……时”或“响应于确定”。
为了方便理解,以下对本申请实施例涉及的一些内容进行说明:
侧链路(SL,sidelink)
长期演进(LTE,Long Term Evolution)系统从第12个发布版本开始支持侧链路,也可称为旁链路、边链路等,用于UE之间不通过网络设备进行直接数据传输。
LTE侧链路的设计可适用于特定的公共安全事务(例如,火灾场所或地震等灾难场所进行紧急通讯),或车联网(V2X,Vehicle to Everything)通信等。车联网通信可以包括各种业务,例如,基本安全类通信,自动驾驶,编队,传感器扩展等等。由于LTE侧链路只支持广播通信,因此主要用于基本安全类通信,其他在时延、可靠性等方面具有严格服务质量(QoS,Quality of Service)需求的高级V2X业务将通过新空口(NR,New Radio)侧链路支持。
5G邻近服务(ProSe,Proximity Service)
ProSe是指设备到设备之间或附近移动设备之间的侧链路通信。通过UE到UE中继,5G ProSe可以进一步扩大侧链路通信的范围。
用户设备到网络中继(U2N Relay,UE to Network Relay)
U2N中继模式使得无论UE是否在覆盖范围内,UE都可以通过连接另一个中继UE来接入网络。
测距(Ranging)
测距可用于确定两个或更多个UE之间的距离和/或方向和/或相对位置。
为了更好的理解本申请实施例公开的侧链路通信方法及装置,下面首先对本申请实施例适用的通信系统进行描述。
图1为本公开实施例可应用的一种无线通信系统的框图。无线通信系统包括第一用户设备(UE,user equipment)11、第二UE 12和网络设备13。网络设备与UE之间进行通信的链路为上下行链路,第一UE与第二UE之间的链路是侧链路。
可以理解的是,图1所示的无线通信系统仅是进行示意性说明,无线通信系统中还可包括其它网络设备,例如还可以包括核心网设备、无线中继设备和无线回传设备等,在图1中未示出。本公开实施例对该无线通信系统中包括的网络设备数目和终端数目不做限定。
进一步可以理解的是,本公开实施例的无线通信系统,是一种提供无线通信功能的网络。无线通信系统可以采用不同的通信技术,例如码分多址(code division multipleaccess,CDMA)、宽带码分多址(wideband code division multiple access,WCDMA)、时分多址(time division multiple access,TDMA)、频分多址(frequency division multipleaccess,FDMA)、正交频分多址(orthogonal frequency-division multiple access,OFDMA)、单载波频分多址(single Carrier FDMA,SC-FDMA)、载波侦听多路访问/冲突避免(Carrier Sense Multiple Access with Collision Avoidance)。根据不同网络的容量、速率、时延等因素可以将网络分为2G(英文:generation)网络、3G网络、4G网络或者未来演进网络,如5G网络,5G网络也可称为是新无线网络(New Radio,NR)。为了方便描述,本公开有时会将无线通信网络简称为网络。
进一步的,本公开中涉及的网络设备也可以称为无线接入网设备。该无线接入网设备可以是:基站、演进型基站(evolved node B,eNB)、家庭基站、无线保真(wirelessfidelity,WIFI)系统中的接入点(access point,AP)、无线中继节点、无线回传节点、传输点(transmission point,TP)或者发送接收点(transmission and reception point,TRP)等,还可以为NR系统中的gNB,或者,还可以是构成基站的组件或一部分设备等。当为车联网(V2X)通信系统时,网络设备还可以是车载设备。应理解,本公开的实施例中,对网络设备所采用的具体技术和具体设备形态不做限定。
进一步的,本公开中涉及的UE,也可以称为终端设备、终端、移动台(Mobile Station,MS)、移动终端(Mobile Terminal,MT)等,是一种向用户提供语音和/或数据连通性的设备,例如,终端可以是具有无线连接功能的手持式设备、车载设备等。目前,一些终端的举例为:智能手机(Mobile Phone)、口袋计算机(PocketPersonal Computer,PPC)、掌上电脑、个人数字助理(Personal Digital Assistant,PDA)、笔记本电脑、平板电脑、可穿戴设备、或者车载设备等。此外,当为车联网(V2X)通信系统时,终端设备还可以是车载设备。应理解,本公开实施例对终端所采用的具体技术和具体设备形态不做限定。
可以理解的是,本申请实施例描述的通信系统是为了更加清楚的说明本申请实施例的技术方案,并不构成对于本申请实施例提供的技术方案的限定,本领域普通技术人员可知,随着系统架构的演变和新业务场景的出现,本申请实施例提供的技术方案对于类似的技术问题,同样适用。
目前,在侧链路通信中,5G ProSe远程UE使用用于发现过程的代码接收安全参数对直接通信请求(DCR,direct communication request)中的诸如用户平面Prose远端UE密钥ID(User Plane Prose Remote User Key,UP-PRUK ID)/控制平面Prose远端UE密钥ID(Control Plane Prose Remote User Key,CP-PRUK ID)和服务代码(其标识侧链路通信的服务类型)的信息进行加密,5G ProSe UE到网络的中继设备在接收到DCR后,使用用于发现过程的代码发送安全参数对加密信息进行解密。
为了对DCR中的加密信息进行解密,需要使用与服务代码相关联的代码发送安全参数,然而由于服务代码是加密的,中继设备无法获得对应的代码发送安全参数。因此,如何对DCR中的加密信息进行解密成为亟需解决的问题。
为此,本申请提供了一种侧链路通信方法及装置,UE在接收到DCR后,能够根据直接通信请求中的层2 ID来确定用于对DCR中的加密信息进行解密的安全密钥,有助于实现安全的侧链路通信。
请注意,在本公开中提及的代码发送安全参数、代码接收安全参数、代码安全参数包括用于加解密的安全密钥。
下面结合附图对本申请所提供的侧链路通信方法及装置进行详细地介绍。
图2示出了根据本公开实施例的一种侧链路通信方法的流程示意图。如图2所示,该方法可由UE执行,且可以包括以下步骤。
S201,接收直接通信请求(DCR,direct communication request)。
其中,DCR包括目的地层2标识(ID,identification)以及用于侧链路通信的加密信息。
在侧链路通信中,远程UE通过向中继UE发送DCR以请求在远程UE与中继UE之间创建用于进行侧链路通信的PC5链路。远程UE以其自身的层2 ID作为源层2ID,以中继UE的层2 ID作为目的 地层2 ID,向中继UE发送DCR。除了层2 ID之外,DCR还包括用于侧链路通信的加密信息,以确保安全的侧链路通信。
S202,根据目的地层2 ID,确定用于对加密信息进行解密的安全密钥。
UE在接收到DCR后,可以根据该DCR中包括的目的地层2 ID来确定用于对DCR中的加密信息进行解密的安全密钥。
S203,利用安全密钥对加密信息进行解密以便进行侧链路通信。
在确定安全密钥后,UE可以利用该安全密钥对DCR中的加密信息进行解密,以获得用于侧链路通信的信息,从而实现侧链路通信。
根据本公开实施例的侧链路通信方法,UE接收DCR,其中DCR包括目的地层2 ID和用于侧链路通信的加密信息,UE根据目的地层2 ID确定安全密钥并利用安全密钥对加密信息进行解密以便进行侧链路通信。由此,有助于实现安全的侧链路通信。
图3示出了根据本公开实施例的一种侧链路通信方法的流程示意图。如图3所示,该方法可由UE执行,且包括以下步骤。
S301,接收直接通信请求DCR。
其中,DCR包括目的地层2 ID以及用于侧链路通信的加密信息。
关于上述步骤S301及其相关细节的详细描述,可以参考关于步骤S201及其相关细节的描述,在此不再赘诉。
S302,根据目的地层2 ID,确定用于对加密信息进行解密的安全密钥。
在一些实施例中,上述步骤S302可以包括以下步骤。
S3021,根据目的地层2 ID,从预存储的一条或多条安全上下文中确定与目的地层2 ID匹配的安全上下文。
UE中预存储有至少一条安全上下文。UE在接收到DCR后,可以根据DCR中的目的地层2 ID,从至少一条安全上下文中选择与目的地层2 ID匹配的安全上下文。应注意,安全上下文也可被称为发现安全上下文或类似,在本公开中对此不做限制。
在一些实施例中,每条安全上下文包括用于标识侧链路通信的服务类型的服务代码、与该服务代码对应的层2 ID、以及与该服务代码相关联的安全密钥。
作为示例,UE可以存储有安全上下文的列表,该列表中包括三条安全上下文,分别为Context1、Context2和Context3。其中Context1包括服务代码1、L2-ID1(与服务代码1对应的层2 ID)以及Key1(与服务代码1相关联的安全密钥);Context2包括服务代码2、L2-ID2(与服务代码2对应的层2 ID)以及Key2(与服务代码2相关联的安全密钥);Context3包括服务代码3、L2-ID3(与服务代码3对应的层2 ID)以及Key3(与服务代码3相关联的安全密钥)。若UE接收到DCR中的目的地层2 ID为L2-ID2,则UE可以确定与该目的地层2 ID匹配的安全上下文为Context2。
S3022,根据匹配的安全上下文,确定安全密钥。
在确定匹配的安全上下文后,可以根据该匹配的安全上下文确定安全密钥。
如上述示例,在确定Context2为匹配的安全上下文后,可以将Context2包括的Key2作为安全密钥。
S303,利用安全密钥对加密信息进行解密以便进行侧链路通信。
关于上述步骤S303及其相关细节的详细描述,可以参考关于步骤S203及其相关细节的描述,在此不再赘诉。
例如,在一实际应用中,5G ProSe U2N中继在接收到DCR后,使用包括安全密钥的代码发送安全参数对其中的UP-PRUK ID/CP-PRUK ID和RSC进行解密。其中,5G ProSe U2N中继基于安全上下文来获取到代码发送安全参数的安全密钥,例如,通过查找包括与DCR中的目的地层2 ID匹配的层2 ID的安全上下文。
此外,5G ProSe U2N中继验证RSC是否与发现消息中发送的RSC匹配。如果不匹配,则5G ProSe U2N中继放弃PC5直接链路通信过程。
根据本公开实施例的侧链路通信方法,UE接收DCR,其中DCR包括目的地层2 ID和用于侧链路通信的加密信息,UE根据目的地层2 ID确定安全密钥并利用安全密钥对加密信息进行解密以便进行侧链路通信。由此,有助于实现安全的侧链路通信。
在一些实施例中,服务代码可以包括以下中的任一个:中继服务代码(RSC,replay service code)、ProSe限制代码、ProSe查询代码、ProSe响应代码、测距(Ranging)服务代码。
在一些实施例中,每条安全上下文还可以包括以下中的一个或多个:UE到网络中继层指示符、控制面安全指示符。
UE到网络中继层指示符用于指示相关联的服务代码是提供5G ProSe层2中继服务还是5G ProSe层3中继服务。
如果针对服务代码提供控制面安全指示符,则对于该服务代码的UE到网络中继通信执行基于控制面的安全过程,否则执行基于用户面的安全过程。
图4示出了根据本公开实施例的一种侧链路通信方法的流程示意图。如图4所示,该方法可由UE执行,且包括以下步骤。
S401,根据在发现过程中确定的层2 ID、服务代码和安全密钥,创建并存储安全上下文。
UE可以根据在发现过程中确定的层2 ID、服务代码和安全密钥,创建包括该层2 ID、服务代码和安全密钥的安全上下文,并存储该安全上下文。应注意,安全上下文也可被称为发现安全上下文或类似,在本公开中对此不做限制。
在一些实施例中,UE可以在确定用于发现过程中的层2 ID时,创建并存储安全上下文。
在另一些实施例中,UE可以在发送用于发现过程的发现消息后,创建并存储安全上下文。
在另一些实施例中,UE可以在完成发现过程后,创建并存储安全上下文。
当前限定了两种用于发现过程的模式,模式A和模式B。
图5示出了模式A发现过程的流程示意图。在模式A中,两种类型的UE参与了ProSe直接发现,分别是:
-宣告UE:宣告特定信息的UE,该特定信息可被附近拥有发现权限的UE使用。
-监控UE:监听广播消息以发现附近的宣告UE。
在此模型中,宣告UE广播发现消息,附近的监控UE读取并处理这些消息。
如图5所示,宣告UE广播发现消息,该发现消息可以包括发现消息的类型、标识侧链路通信的服务类型的服务代码(诸如ProSe应用代码或ProSe限制代码或中继服务代码)、以及其他元数据等。其中应用层元数据可被作为发现消息中的元数据。发现消息中的内容是被代码发现安全参数或代码安全参数所保护的。
为了实现发现过程,宣告UE自行选择用于发现过程(诸如5G ProSe直接发现/5G ProSe U2N发现/测距/SL定位发现过程)的源层2 ID,基于网络配置的信息确定用于发现过程的目的地层2 ID。
作为一个示例,宣告UE可以在广播发现消息之后,创建包括自行选择的源层2 ID、服务代码以及与该服务代码相关联的安全密钥的安全上下文,并存储该安全上下文。
作为另一示例,宣告UE可以在选择源层2 ID后,创建包括自行选择的源层2 ID、服务代码以及与该服务代码相关联的安全密钥的安全上下文,并存储该安全上下文。
作为又一示例,宣告UE可以在完成发现过程后,创建包括自行选择的源层2 ID、服务代码以及与该服务代码相关联的安全密钥的安全上下文,并存储该安全上下文。
图6示出了模式B发现过程的流程示意图。在模式B中,两种类型的UE参与ProSe直接发现,分别是:。
-发现者UE:发送请求的UE,该请求包含关于它感兴趣发现的内容的特定信息。
-被发现者UE:接收到请求消息的UE可以回复与发现者的请求相关的一些信息。
发现者UE发送关于希望接收到响应的其他UE的信息,例如,信息可以关于UE的标识信息,信息可以关于Prose查询代码,信息还可以关于对应于组的ProSe应用身份,并且该组的成员可以响应。
如图6所示,发现者UE广播发现消息,该发现消息可以包括发现消息的类型、标识侧链路通信的服务类型的服务代码(诸如ProSe查询代码或中继服务代码)等,发现消息中的内容是被代码发现安全参数或代码安全参数所保护的。
为了实现发现过程,发现者UE自行选择用于发现过程(诸如5G ProSe直接发现/5G ProSe U2N发现/测距/SL定位发现)的源层2 ID,基于网络配置确定用于发现过程的目的地层2 ID。
作为一个示例,发现者UE可以在广播发现消息之后,创建包括自行选择的源层2 ID、服务代码以及与该服务代码相关联的安全密钥的安全上下文,并存储该安全上下文。
作为另一示例,发现者UE可以在选择源层2 ID后,创建包括自行选择的源层2 ID、服务代码以及与该服务代码相关联的安全密钥的安全上下文,并存储该安全上下文。
作为又一示例,发现者UE可以在完成发现过程后,创建包括自行选择的源层2 ID、服务代码以及与该服务代码相关联的安全密钥的安全上下文,并存储该安全上下文。
被发现者UE在接收到发现消息后,匹配该发现消息的被发现者UE可以向发现者UE发送响应消息。响应消息可以包括发现消息的类型、标识侧链路通信的服务类型的服务代码(诸如ProSe响应代码或中继服务代码)、元数据等。其中应用层元数据可被作为发现消息中的元数据。发现消息中的内容是被代码接收安全参数或代码安全参数所保护的。
被发现者UE自行选择用于发现过程(诸如5G ProSe直接发现/5G ProSe U2N发现/测距/SL定位发现)的源层2 ID,所接收的发现消息的源层2 ID被设置为目的地层2 ID。
作为一个示例,被发现者UE可以在发送响应消息之后,创建包括自行选择的源层2 ID、服务代码以及与该服务代码相关联的安全密钥的安全上下文,并存储该安全上下文。
作为另一示例,被发现者UE可以在选择源层2 ID后,创建包括自行选择的源层2 ID、服务代码以及与该服务代码相关联的安全密钥的安全上下文,并存储该安全上下文。
作为又一示例,被发现者UE可以在完成发现过程后,创建包括自行选择的源层2 ID、服务代码以及与该服务代码相关联的安全密钥的安全上下文,并存储该安全上下文。
S402,接收直接通信请求DCR。
其中,DCR包括目的地层2 ID以及用于侧链路通信的加密信息。
关于上述步骤S301及其相关细节的详细描述,可以参考关于步骤S201及其相关细节的描述,在此不再赘诉。
S403,根据目的地层2 ID,从预存储的一条或多条安全上下文中确定与目的地层2 ID匹配的安全上下文。
S404,根据匹配的安全上下文,确定安全密钥。
S405,利用安全密钥对加密信息进行解密以便进行侧链路通信。
关于上述步骤S402-D405及其相关细节的详细描述,可以参考关于步骤S301-S303及其相关细节的描述,在此不再赘诉。
根据本公开实施例的侧链路通信方法,UE接收DCR,其中DCR包括目的地层2 ID和用于侧链路通信的加密信息,UE根据目的地层2 ID确定安全密钥并利用安全密钥对加密信息进行解密以便进行侧链路通信。由此,有助于实现安全的侧链路通信。
在一些实施例中,服务代码可以包括以下中的任一个:中继服务代码(RSC,replay service code)、ProSe限制代码、ProSe查询代码、ProSe响应代码、测距(Ranging)服务代码。
在一些实施例中,每条安全上下文还可以包括以下中的一个或多个:UE到网络中继层指示符、控制面安全指示符。
上述本申请提供的实施例中,从用户设备的角度对本申请实施例提供的方法进行了介绍。为了实现上述本申请实施例提供的方法中的各功能,用户设备可以包括硬件结构、软件模块,以硬件结构、软件模块、或硬件结构加软件模块的形式来实现上述各功能。上述各功能中的某个功能可以以硬件结构、软件模块、或者硬件结构加软件模块的方式来执行。
与上述几种实施例提供的侧链路通信方法相对应,本公开还提供一种侧链路通信装置,由于本公开实施例提供的侧链路通信装置与上述几种实施例提供的侧链路通信方法相对应,因此侧链路通信方法的实施方式也适用于本实施例提供的侧链路通信装置,在本实施例中不再详细描述。
图7为本公开实施例提供的一种侧链路通信装置700的结构示意图,该侧链路通信装置700可用于UE。
如图7所示,该装置700可以包括收发模块701。
收发模块701,用于接收直接通信请求DCR,其中所述DCR包括目的地层2 ID以及用于侧链路通信的加密信息。
处理模块702,用于根据所述目的地层2 ID,确定用于对所述加密信息进行解密的安全密钥;以及利用所述安全密钥对所述加密信息进行解密以便进行侧链路通信。
根据本公开实施例的侧链路通信装置,UE接收DCR,其中DCR包括目的地层2 ID和用于侧链路通信的加密信息,UE根据目的地层2 ID确定安全密钥并利用安全密钥对加密信息进行解密以便进行侧链路通信。由此,有助于实现安全的侧链路通信。
在一些实施例,所述处理模块702用于:根据所述目的地层2 ID,从预存储的一条或多条安全上下文中确定与所述目的地层2 ID匹配的安全上下文;根据所述匹配的安全上下文,确定所述安全密钥。
在一些实施例,每条安全上下文包括用于标识侧链路通信的服务类型的服务代码、与所述服务代码对应的层2 ID、以及与所述服务代码相关联的安全密钥。
在一些实施例,所述服务代码包括以下中任一个:中继服务代码RSC;邻近服务(ProSe,proximity based service)限制代码;ProSe查询代码;ProSe响应代码;Ranging服务代码。
在一些实施例,每条安全上下文还包括以下中任一个或多个:UE到网络中继层指示符;控制面安全指示符。
在一些实施例,所述处理模块702还用于:根据在发现过程中确定的层2 ID、服务代码和安全密钥,创建并存储所述安全上下文。
在一些实施例,所述处理模块702用于执行以下任一步:在确定用于所述发现过程的层2 ID时,创建并存储所述安全上下文;在发送用于所述发现过程的发现消息后,创建并存储所述安全上下文;在完成所述发现过程后,创建并存储所述安全上下文。
请参见图8,图8是本申请实施例提供的一种通信装置800的结构示意图。通信装置800可以是用户设备,也可以是支持网络设备实现上述方法的芯片、芯片系统、或处理器等,还可以是支持用户设备实现上述方法的芯片、芯片系统、或处理器等。该装置可用于实现上述方法实施例中描述的方法,具体可以参见上述方法实施例中的说明。
通信装置800可以包括一个或多个处理器801。处理器801可以是通用处理器或者专用处理器等。例如可以是基带处理器或中央处理器。基带处理器可以用于对通信协议以及通信数据进行处理,中央处理器可以用于对通信装置(如,基站、基带芯片,终端设备、终端设备芯片,DU或CU等)进行控制,执行计算机程序,处理计算机程序的数据。
可选的,通信装置800中还可以包括一个或多个存储器802,其上可以存有计算机程序804,处理器801执行所述计算机程序804,以使得通信装置800执行上述方法实施例中描述的方法。可选的,所述存储器802中还可以存储有数据。通信装置800和存储器802可以单独设置,也可以集成在一起。
可选的,通信装置800还可以包括收发器805、天线806。收发器805可以称为收发单元、收发机、或收发电路等,用于实现收发功能。收发器805可以包括接收器和发送器,接收器可以称为接收机或接收电路等,用于实现接收功能;发送器可以称为发送机或发送电路等,用于实现发送功能。
可选的,通信装置800中还可以包括一个或多个接口电路807。接口电路807用于接收代码指令并传输至处理器801。处理器801运行所述代码指令以使通信装置800执行上述方法实施例中描述的方法。
在一种实现方式中,处理器801中可以包括用于实现接收和发送功能的收发器。例如该收发器可以是收发电路,或者是接口,或者是接口电路。用于实现接收和发送功能的收发电路、接口或接口电路可以是分开的,也可以集成在一起。上述收发电路、接口或接口电路可以用于代码/数据的读写,或者,上述收发电路、接口或接口电路可以用于信号的传输或传递。
在一种实现方式中,处理器801可以存有计算机程序803,计算机程序803在处理器801上运行,可使得通信装置800执行上述方法实施例中描述的方法。计算机程序803可能固化在处理器801中,该种情况下,处理器801可能由硬件实现。
在一种实现方式中,通信装置800可以包括电路,所述电路可以实现前述方法实施例中发送或接收或者通信的功能。本申请中描述的处理器和收发器可实现在集成电路(integrated circuit,IC)、模拟IC、射频集成电路RFIC、混合信号IC、专用集成电路(application specific integrated circuit,ASIC)、印刷电路板(printed circuit board,PCB)、电子设备等上。该处理器和收发器也可以用各种IC工艺技术来制造,例如互补金属氧化物半导体(complementary metal oxide semiconductor,CMOS)、N型金属氧化物半导体(nMetal-oxide-semiconductor,NMOS)、P型金属氧化物半导体(positive channel metal oxide semiconductor,PMOS)、双极结型晶体管(bipolar junction transistor,BJT)、双极CMOS(BiCMOS)、硅锗(SiGe)、砷化镓(GaAs)等。
以上实施例描述中的通信装置可以是用户设备,但本申请中描述的通信装置的范围并不限于此,而且通信装置的结构可以不受图8的限制。通信装置可以是独立的设备或者可以是较大设备的一部分。例如所述通信装置可以是:
(1)独立的集成电路IC,或芯片,或,芯片系统或子系统;
(2)具有一个或多个IC的集合,可选的,该IC集合也可以包括用于存储数据,计算机程序的存储部件;
(3)ASIC,例如调制解调器(Modem);
(4)可嵌入在其他设备内的模块;
(5)接收机、终端设备、智能终端设备、蜂窝电话、无线设备、手持机、移动单元、车载设备、网络设备、云设备、人工智能设备等等;
(6)其他等等。
对于通信装置可以是芯片或芯片系统的情况,可参见图9所示的芯片的结构示意图。图9所示的芯片包括处理器901和接口902。其中,处理器901的数量可以是一个或多个,接口902的数量可以是多个。
可选的,芯片还包括存储器903,存储器903用于存储必要的计算机程序和数据。
本领域技术人员还可以了解到本申请实施例列出的各种说明性逻辑块(illustrative logical block)和步骤(step)可以通过电子硬件、电脑软件,或两者的结合进行实现。这样的功能是通过硬件还是软件来实现取决于特定的应用和整个系统的设计要求。本领域技术人员可以对于每种特定的应用,可以使用各种方法实现所述的功能,但这种实现不应被理解为超出本申请实施例保护的范围。
本申请还提供一种可读存储介质,其上存储有指令,该指令被计算机执行时实现上述任一方法实施例的功能。
本申请还提供一种计算机程序产品,该计算机程序产品被计算机执行时实现上述任一方法实施例的功能。
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机程序。在计算机上加载和执行所述计算机程序时,全部或部分地产生按照本申请实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机程序可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机程序可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(digital subscriber line,DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质(例如,软盘、硬盘、磁带)、光介质(例如,高密度数字视频光盘(digital video disc,DVD))、或者半导体介质(例如,固态硬盘(solid state disk,SSD))等。
本领域普通技术人员可以理解:本申请中涉及的第一、第二等各种数字编号仅为描述方便进行的区分,并不用来限制本申请实施例的范围,也表示先后顺序。
本申请中的至少一个还可以描述为一个或多个,多个可以是两个、三个、四个或者更多个,本申请不做限制。在本申请实施例中,对于一种技术特征,通过“第一”、“第二”、“第三”、“A”、“B”、“C”和“D”等区分该种技术特征中的技术特征,该“第一”、“第二”、“第三”、“A”、“B”、“C”和“D”描述的技术特征间无先后顺序或者大小顺序。
如本文使用的,术语“机器可读介质”和“计算机可读介质”指的是用于将机器指令和/或数据提供给可编程处理器的任何计算机程序产品、设备、和/或装置(例如,磁盘、光盘、存储器、可编程逻辑装置(PLD)),包括,接收作为机器可读信号的机器指令的机器可读介质。术语“机器可读信号”指的是用于将机器指令和/或数据提供给可编程处理器的任何信号。
可以将此处描述的系统和技术实施在包括后台部件的计算系统(例如,作为数据服务器)、或者包括中间件部件的计算系统(例如,应用服务器)、或者包括前端部件的计算系统(例如,具有图形用户界面或者网络浏览器的用户计算机,用户可以通过该图形用户界面或者该网络浏览器来与此处描述的系统和技术的实施方式交互)、或者包括这种后台部件、中间件部件、或者前端部件的任何组合的计算系统中。可以通过任何形式或者介质的数字数据通信(例如,通信网络)来将系统的部件相互连接。通信网络的示例包括:局域网(LAN)、广域网(WAN)和互联网。
计算机系统可以包括客户端和服务器。客户端和服务器一般远离彼此并且通常通过通信网络进行交互。通过在相应的计算机上运行并且彼此具有客户端-服务器关系的计算机程序来产生客户端和服务器的关系。
应该理解,可以使用上面所示的各种形式的流程,重新排序、增加或删除步骤。例如,本公开中记载的各步骤可以并行地执行也可以顺序地执行也可以不同的次序执行,只要能够实现本公开公开的技术方案所期望的结果,本文在此不进行限制。
此外,应该理解,本申请所述的各种实施例可以单独实施,也可以在方案允许的情况下与其他实施例组合实施。
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以所述权利要求的保护范围为准。

Claims (16)

  1. 一种侧链路通信方法,其特征在于,所述方法由用户设备UE执行,所述方法包括:
    接收直接通信请求DCR,其中所述DCR包括目的地层2标识ID以及用于侧链路通信的加密信息;
    根据所述目的地层2 ID,确定用于对所述加密信息进行解密的安全密钥;以及
    利用所述安全密钥对所述加密信息进行解密以便进行侧链路通信。
  2. 如权利要求1所述的方法,其特征在于,所述根据所述目的地层2 ID,确定用于对所述加密信息进行解密的安全密钥包括:
    根据所述目的地层2 ID,从预存储的一条或多条安全上下文中确定与所述目的地层2 ID匹配的安全上下文;
    根据所述匹配的安全上下文,确定所述安全密钥。
  3. 如权利要求2所述的方法,其特征在于,每条安全上下文包括用于标识侧链路通信的服务类型的服务代码、与所述服务代码对应的层2 ID、以及与所述服务代码相关联的安全密钥。
  4. 如权利要求3所述的方法,其特征在于,所述服务代码包括以下中任一个:
    中继服务代码RSC;
    邻近服务ProSe限制代码;
    ProSe查询代码;
    ProSe响应代码;
    测距Ranging服务代码。
  5. 如权利要求3或4所述的方法,其特征在于,每条安全上下文还包括以下中任一个或多个:
    UE到网络中继层指示符;
    控制面安全指示符。
  6. 如权利要求2-5中任一项所述的方法,其特征在于,还包括:
    根据在发现过程中确定的层2 ID、服务代码和安全密钥,创建并存储所述安全上下文。
  7. 如权利要求6所述的方法,其特征在于,所述创建并存储所述安全上下文包括以下中任一种:
    在确定用于所述发现过程的层2 ID时,创建并存储所述安全上下文;
    在发送用于所述发现过程的发现消息后,创建并存储所述安全上下文;
    在完成所述发现过程后,创建并存储所述安全上下文。
  8. 一种侧链路通信装置,其特征在于,用于用户设备UE,所述装置包括:
    收发模块,用于接收直接通信请求DCR,其中所述DCR包括目的地层2标识ID以及用于侧链路通信的加密信息;
    处理模块,用于根据所述目的地层2 ID,确定用于对所述加密信息进行解密的安全密钥;以及利用所述安全密钥对所述加密信息进行解密以便进行侧链路通信。
  9. 如权利要求8所述的装置,其特征在于,所述处理模块用于:
    根据所述目的地层2 ID,从预存储的一条或多条安全上下文中确定与所述目的地层2 ID匹配的安全上下文;
    根据所述匹配的安全上下文,确定所述安全密钥。
  10. 如权利要求9所述的装置,其特征在于,每条安全上下文包括用于标识侧链路通信的服务类型的服务代码、与所述服务代码对应的层2 ID、以及与所述服务代码相关联的安全密钥。
  11. 如权利要求10所述的装置,其特征在于,所述服务代码包括以下中任一个:
    中继服务代码RSC;
    邻近服务ProSe限制代码;
    ProSe查询代码;
    ProSe响应代码;
    测距Ranging服务代码。
  12. 如权利要求10或11所述的装置,其特征在于,每条安全上下文还包括以下中任一个或多个:
    UE到网络中继层指示符;
    控制面安全指示符。
  13. 如权利要求8-12中任一项所述的装置,其特征在于,所述处理模块还用于:
    根据在发现过程中确定的层2 ID、服务代码和安全密钥,创建并存储所述安全上下文。
  14. 如权利要求13所述的装置,其特征在于,所述处理模块用于执行以下任一步:
    在确定用于所述发现过程的层2 ID时,创建并存储所述安全上下文;
    在发送用于所述发现过程的发现消息后,创建并存储所述安全上下文;
    在完成所述发现过程后,创建并存储所述安全上下文。
  15. 一种通信设备,其中,包括:收发器;存储器;处理器,分别与所述收发器及所述存储器连接,配置为通过执行所述存储器上的计算机可执行指令,控制所述收发器的无线信号收发,并能够实现权利要求1-7任一项所述的方法。
  16. 一种计算机存储介质,其中,所述计算机存储介质存储有计算机可执行指令;所述计算机可执行指令被处理器执行后,能够实现权利要求1-7任一项所述的方法。
PCT/CN2023/075543 2023-02-10 2023-02-10 侧链路通信方法及装置 Ceased WO2024164349A1 (zh)

Priority Applications (5)

Application Number Priority Date Filing Date Title
JP2025546369A JP2026505584A (ja) 2023-02-10 2023-02-10 サイドリンク通信方法及び装置
KR1020257030194A KR20250143846A (ko) 2023-02-10 2023-02-10 사이드링크 통신 방법 및 장치
PCT/CN2023/075543 WO2024164349A1 (zh) 2023-02-10 2023-02-10 侧链路通信方法及装置
CN202380008251.1A CN116830623A (zh) 2023-02-10 2023-02-10 侧链路通信方法及装置
EP23920556.0A EP4664954A4 (en) 2023-02-10 2023-02-10 METHOD AND DEVICE FOR LATERAL LINK COMMUNICATION

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2023/075543 WO2024164349A1 (zh) 2023-02-10 2023-02-10 侧链路通信方法及装置

Publications (1)

Publication Number Publication Date
WO2024164349A1 true WO2024164349A1 (zh) 2024-08-15

Family

ID=88122570

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/075543 Ceased WO2024164349A1 (zh) 2023-02-10 2023-02-10 侧链路通信方法及装置

Country Status (5)

Country Link
EP (1) EP4664954A4 (zh)
JP (1) JP2026505584A (zh)
KR (1) KR20250143846A (zh)
CN (1) CN116830623A (zh)
WO (1) WO2024164349A1 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2025010738A1 (zh) * 2023-07-13 2025-01-16 北京小米移动软件有限公司 安全通信方法及装置、通信设备、通信系统及存储介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112491533A (zh) * 2019-09-12 2021-03-12 华为技术有限公司 一种密钥生成方法及装置
WO2022038292A1 (en) * 2020-08-21 2022-02-24 Koninklijke Philips N.V. Privacy of relay selection in cellular sliced networks
US20220303254A1 (en) * 2020-07-23 2022-09-22 Apple Inc. Protection of communications through user equipment relay
CN115413413A (zh) * 2020-05-01 2022-11-29 高通股份有限公司 用于安全链路建立的中继侧行链路通信

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111417092B (zh) * 2019-01-04 2023-03-24 华硕电脑股份有限公司 支持单个一对一侧链路通信链路车联网服务的方法和设备
US12587821B2 (en) * 2021-05-07 2026-03-24 Qualcomm Incorporated Secure link establishment

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112491533A (zh) * 2019-09-12 2021-03-12 华为技术有限公司 一种密钥生成方法及装置
CN115413413A (zh) * 2020-05-01 2022-11-29 高通股份有限公司 用于安全链路建立的中继侧行链路通信
US20220303254A1 (en) * 2020-07-23 2022-09-22 Apple Inc. Protection of communications through user equipment relay
WO2022038292A1 (en) * 2020-08-21 2022-02-24 Koninklijke Philips N.V. Privacy of relay selection in cellular sliced networks

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP4664954A4 *

Also Published As

Publication number Publication date
JP2026505584A (ja) 2026-02-16
EP4664954A4 (en) 2026-02-18
KR20250143846A (ko) 2025-10-02
CN116830623A (zh) 2023-09-29
EP4664954A1 (en) 2025-12-17

Similar Documents

Publication Publication Date Title
CN113892276A (zh) 一种信息传输方法和装置
EP3334194B1 (en) Connection information broadcast using beacon technology
WO2024229772A1 (zh) 接入指示方法、装置、设备及存储介质
WO2022032453A1 (zh) 寻呼优化方法和网络设备
WO2024164349A1 (zh) 侧链路通信方法及装置
WO2024182954A1 (zh) 感知节点发现方法及其装置
WO2024168935A1 (zh) 一种消息验证方法及其装置
CN117044379A (zh) 一种通信方法、装置及存储介质
WO2024207368A1 (zh) 一种卫星覆盖信息确定方法及其装置
WO2024092828A1 (zh) 一种连接建立的方法及装置
RU2859969C2 (ru) Способ и устройство прямой связи
WO2024065127A1 (zh) 控制中继设备信息发送的方法及其装置
WO2024065469A1 (zh) 一种直连链路建立方法、设备及存储介质
WO2023220941A1 (zh) 一种数据前转信息的传输方法及其装置
WO2024065129A1 (zh) 用于终端设备ue到ue中继场景中的目标ue确定方法及装置
CN115669182A (zh) 一种上报方法/装置/设备及存储介质
CN118104187A (zh) 一种侧行链路定位方法及装置
CN118056361A (zh) 基于轨道角动量的共享信道传输及装置
US20260101180A1 (en) Direct-communication key generation method and apparatus
CN114788311B (zh) 一种侧行链路干扰消除的方法及其装置
WO2024229863A1 (zh) 信息发送、信息接收方法、装置、设备及存储介质
WO2024092827A1 (zh) 一种测距方法及其装置
WO2024065131A1 (zh) 一种多路径传输方法/装置/设备及存储介质
CN119629599A (zh) 消息传输方法及装置
WO2024065198A1 (zh) 用于终端设备ue到ue中继场景的中继通信处理方法及装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23920556

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2025546369

Country of ref document: JP

Kind code of ref document: A

REG Reference to national code

Ref country code: BR

Ref legal event code: B01A

Ref document number: 112025016648

Country of ref document: BR

ENP Entry into the national phase

Ref document number: 1020257030194

Country of ref document: KR

Free format text: ST27 STATUS EVENT CODE: A-0-1-A10-A15-NAP-PA0105 (AS PROVIDED BY THE NATIONAL OFFICE)

WWE Wipo information: entry into national phase

Ref document number: 1020257030194

Country of ref document: KR

Ref document number: 202517086153

Country of ref document: IN

Ref document number: 2025124827

Country of ref document: RU

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 11202505280S

Country of ref document: SG

WWP Wipo information: published in national office

Ref document number: 11202505280S

Country of ref document: SG

WWP Wipo information: published in national office

Ref document number: 1020257030194

Country of ref document: KR

WWP Wipo information: published in national office

Ref document number: 202517086153

Country of ref document: IN

Ref document number: 2025124827

Country of ref document: RU

WWP Wipo information: published in national office

Ref document number: 2023920556

Country of ref document: EP