Search

CN-122003896-A - Communication method, terminal, access network device, communication system, computer program product, and storage medium

CN122003896ACN 122003896 ACN122003896 ACN 122003896ACN-122003896-A

Abstract

Embodiments of the present disclosure provide a communication method, a terminal, an access network device, a communication system, a computer program product, and a storage medium. The method comprises the step of determining a key for a Radio Resource Control (RRC) connection reestablishment procedure, wherein the key is used for encryption and/or integrity protection of the message (MSG 4). The technical scheme provided by the embodiment of the disclosure can ensure that network communication is safer.

Inventors

  • WANG SHUKUN

Assignees

  • 北京小米移动软件有限公司

Dates

Publication Date
20260508
Application Date
20240903

Claims (20)

  1. A method of communication, the method being performed by a terminal, the method comprising: Determining a key for a radio resource control, RRC, connection re-establishment procedure; wherein the key is used for encryption and/or integrity protection of the message MSG 4.
  2. The method according to claim 1, wherein the method further comprises: Determining a derivation mode of the key; Wherein the derivatization mode is one of the following: a horizontal derivatization mode; vertical derivatization mode.
  3. The method of claim 2, wherein the determining the manner in which the key is derived comprises: determining the way in which the key is derived by at least one of: switching types; The received first information.
  4. A method according to claim 3, wherein said determining the manner of derivation of said key from said received first information comprises any one of: determining that the derivation mode of the key is a vertical derivation mode in the case that the first information indicates a vertical derivation mode; determining that the deriving means of the key is a horizontal deriving means in case the first information indicates the horizontal deriving means; Determining that the deriving mode of the key is a vertical deriving mode under the condition that the first information is not received; and determining that the deriving mode of the key is a horizontal deriving mode under the condition that the first information is not received.
  5. The method according to claim 3 or 4, wherein said determining the manner of derivation of said key by switching type comprises: Determining a deriving mode of the key based on the switching type indicated by the second information; the switching type is one of the following: the switching device comprises a first switching type, a second switching type and a third switching type, wherein the first switching type is Xn switching; The second switching type is NG switching; the third switching type is intra-gNB switching in the base station; and a fourth switching type, wherein the fourth switching type is intra-CU switching in a centralized unit.
  6. The method of claim 5, wherein the determining the manner in which the key is derived based on the type of handover indicated by the second information comprises one of: The second information indicates that the switching type of switching is the first switching type, and the deriving mode of the key is determined to be a vertical deriving mode; The second information indicates that the switching type of switching is the second switching type, and the deriving mode of the secret key is determined to be a horizontal deriving mode; The second information indicates that the switching type of switching is the third switching type, and the deriving mode of the secret key is determined to be a horizontal deriving mode; The second information indicates that the switching type of switching is the fourth switching type, and the deriving mode of the key is determined to be a horizontal deriving mode.
  7. The method according to claim 1, wherein the method further comprises: Receiving third information; the third information is used for indicating the next hop link count NCC used in the RRC connection reestablishment.
  8. The method of claim 7, wherein the method further comprises: and determining that the switching fails and the next jump parameter NH corresponding to the NCC is not used, and generating the NH based on the NCC.
  9. The method of claim 7, wherein the method further comprises: Determining that the handover is successful and the NCC indicated by the third information is the same as an NCC configured for RRC connection reestablishment and NH is not used, generating the NH based on the NCC.
  10. The method according to any one of claims 1 to 9, further comprising: Receiving fourth information while in the RRC connected state; the fourth information is used for indicating an inactive state radio network temporary identifier I-RNTI, wherein the I-RNTI is used for RRC connection reestablishment and/or RRC connection recovery.
  11. The method of claim 10, wherein the I-RNTI is an identifier configured for each access network device or is an identifier configured for access network devices in a first set, the first set comprising at least two access network devices.
  12. The method according to claim 10 or 11, wherein the I-RNTI is used for identifying context information of a terminal and/or determining an access network device in which the context information is located.
  13. The method according to claim 10 or 11, wherein the receiving fourth information comprises at least one of: Determining switching of access network equipment, and receiving the fourth information; and determining inter-CU switching in the centralized unit, and receiving the fourth information.
  14. A method of communication, the method performed by an access network device, the method comprising: Sending first information to a terminal; the first information is used for indicating the derivative mode of a key, and the key is used for encryption and/or integrity protection of a message MSG4 in the RRC connection reestablishment process.
  15. The method of claim 14, wherein the deriving means is one of: a horizontal derivatization mode; vertical derivatization mode.
  16. The method of claim 14, wherein the method further comprises: Transmitting third information to the terminal; the third information is used for indicating the number NCC of next hop links used in RRC connection reestablishment.
  17. The method of claim 14, wherein the method further comprises: Transmitting fourth information to the terminal in an RRC connected state; the fourth information is used for indicating an inactive state radio network temporary identifier I-RNTI, wherein the I-RNTI is used for RRC connection reestablishment and/or RRC connection recovery.
  18. The method of claim 17, wherein the I-RNTI is an identifier configured for each access network device or is an identifier configured for access network devices in a first set, the first set comprising at least two access network devices.
  19. The method according to claim 17 or 18, wherein the I-RNTI is used for identifying context information of a terminal and/or determining an access network device in which the context information is located.
  20. The method according to any of the claims 17 to 19, characterized in that said sending fourth information to the terminal comprises at least one of: Determining switching of access network equipment and sending fourth information to the terminal; And determining inter-CU switching in the centralized unit, and sending fourth information to the terminal.

Description

Communication method, terminal, access network device, communication system, computer program product, and storage medium Technical Field The present disclosure relates to the field of communications technologies, and in particular, to a communication method, a terminal, an access network device, a communication system, a computer program product, and a storage medium. Background In the field of communication technology, as a communication network evolves, network communication needs to be safer, and security requirements for radio resource control (RRC, radio Resource Control) connection reestablishment are raised, for example, to achieve the same high-level security level as RRC connection restoration. Disclosure of Invention In order to make network communications more secure. According to a first aspect of the disclosed embodiments, the disclosed embodiments provide a communication method, the method being performed by a terminal, the method comprising: Determining a key for a radio resource control, RRC, connection re-establishment procedure; wherein the key is used for encryption and/or integrity protection of the message MSG 4. According to a second aspect of embodiments of the present disclosure, there is provided a communication method performed by an access network device, the method comprising: Sending first information to a terminal; the first information is used for indicating the derivative mode of a key, and the key is used for encryption and/or integrity protection of a message MSG4 in the RRC connection reestablishment process. According to a third aspect of embodiments of the present disclosure, there is provided a communication method, the method comprising: the network equipment sends first information to the terminal; the first information is used for indicating the derivative mode of a key, and the key is used for encryption and/or integrity protection of a message MSG4 in the RRC connection reestablishment process. According to a fourth aspect of embodiments of the present disclosure, there is provided a terminal comprising: A transceiver module configured to: Determining a key used in a Radio Resource Control (RRC) connection reestablishment process; wherein the key is used for encryption and/or integrity protection of the message MSG 4. According to a fifth aspect of embodiments of the present disclosure, there is provided an access network device comprising: A transceiver module configured to: Sending first information to a terminal; The first information is used for indicating the derivative mode of a key, and the key is used for encrypting and/or protecting the integrity of the message MSG4 in the RRC connection reestablishment process. According to a sixth aspect of embodiments of the present disclosure, there is provided a communication system, wherein the communication system comprises a terminal configured to implement the method according to the first aspect and an access network device configured to implement the method according to the second aspect. According to a seventh aspect of embodiments of the present disclosure, there is provided a terminal comprising: One or more processors; wherein the terminal is configured to perform the method according to the first aspect. According to an eighth aspect of embodiments of the present disclosure, there is provided an access network device, the access network device comprising: One or more processors; Wherein the access network device is configured to perform the method according to the second aspect. According to a ninth aspect of embodiments of the present disclosure, there is provided a computer program product comprising a computer program or instructions which, when executed by a processor, implement the steps of the method of the first and/or second aspects. According to a tenth aspect of embodiments of the present disclosure, there is provided a storage medium storing instructions which, when executed on a communication device, cause the communication device to perform the method provided in the first and/or second aspects. The technical scheme provided by the embodiment of the disclosure can improve the safety of network communication. It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of embodiments of the disclosure. Drawings In order to more clearly illustrate the technical solutions in the embodiments of the present disclosure, the following description of the embodiments refers to the accompanying drawings, which are only some embodiments of the present disclosure, and do not limit the protection scope of the present disclosure in any way. FIG. 1a is a schematic diagram of a communication system architecture, shown according to one exemplary embodiment; FIG. 1b is a schematic diagram of a communication method shown according to an exemplary embodiment; FIG. 1c is a schematic diagram of a communication me