EP-4738903-A1 - COMMUNICATION METHOD AND DEVICES
Abstract
The present application relates to a communication method, and devices, a computer-readable storage medium, a computer program product and a computer program. The method comprises: a first device receiving a first media access control (MAC) protocol data unit (PDU) from a second device, wherein the first MAC PDU carries a first message check code, and the first message check code is calculated by the second device on the basis of one or more first loads of the first MAC PDU.
Inventors
- XIONG, Lihui
- GAN, LU
- YOU, Xin
- LIN, Xue
Assignees
- GUANGDONG OPPO MOBILE TELECOMMUNICATIONS CORP., LTD.
Dates
- Publication Date
- 20260506
- Application Date
- 20230628
Claims (20)
- A communication method, comprising: receiving, by a first device, a first media access control (MAC) protocol data unit (PDU) from a second device, wherein the first MAC PDU carries a first message check code, and the first message check code is calculated by the second device based on one or more first payloads of the first MAC PDU.
- The method according to claim 1, wherein the first MAC PDU comprises a first MAC subheader, the first MAC subheader carries the first message check code, and the first MAC subheader is one of one or more MAC subheaders of the first MAC PDU.
- The method according to claim 2, wherein the first MAC subheader further carries first indication information, and the first indication information is used to indicate each first payload of the one or more first payloads.
- The method according to any one of claims 1 to 3, further comprising: calculating, by the first device, an authentication code based on an integrity protection key and the one or more first payloads using an integrity protection algorithm, and authenticating, by the first device, integrity based on the authentication code and the first message check code.
- The method according to claim 4, wherein the integrity protection algorithm is predefined, or is indicated by the second device.
- The method according to claim 4 or 5, wherein the integrity protection key is predefined, or indicated by the second device.
- The method according to any one of claims 4 to 6, wherein the integrity protection key is one of the following: an access stratum security base key, an access stratum signaling plane integrity check key, a user plane integrity check key, a physical layer key, and a first key.
- The method according to claim 7, further comprising one of the following: calculating, by the first device, the first key based on the access stratum security base key; calculating, by the first device, the first key based on the access stratum signaling plane integrity check key; calculating, by the first device, the first key based on the user plane integrity check key; and calculating, by the first device, the first key based on the physical layer key.
- The method according to any one of claims 1 to 8, wherein each first payload is used to carry plaintext data.
- The method according to any one of claims 1 to 8, wherein each second payload of one or more second payloads of the first MAC PDU is used to carry ciphertext data, the ciphertext data carried by each second payload is calculated by the second device based on plaintext data corresponding to the second payload, and the one or more second payloads are comprised in the one or more first payloads.
- The method according to claim 10, wherein the first MAC subheader of the first MAC PDU further carries second indication information, and the second indication information is used to indicate the one or more second payloads.
- The method according to claim 10 or 11, further comprising: decrypting, by the first device, the ciphertext data corresponding to each second payload using an encryption algorithm and an encryption key, to obtain the plaintext data corresponding to each second payload.
- The method according to claim 12, wherein the encryption algorithm is predefined, or is indicated by the second device.
- The method according to claim 12 or 13, wherein the encryption key is predefined, or is indicated by the second device.
- The method according to any one of claims 12 to 14, wherein the encryption key is one of the following: an access stratum security base key, an access stratum signaling plane encryption key, a user plane encryption key, a physical layer key, and a second key.
- The method according to claim 15, further comprising one of the following: calculating, by the first device, the second key based on the access stratum security base key; calculating, by the first device, the second key based on the access stratum signaling plane encryption key; calculating, by the first device, the second key based on the user plane encryption key; and calculating, by the first device, the second key based on the physical layer key.
- The method according to any one of claims 9 to 16, wherein the plaintext data comprises device information, wherein the device information comprises at least one of relevant information of the first device or relevant information of the second device, and the relevant information comprises at least one of: an identifier, an address, a location, privacy data, or model training data.
- The method according to any one of claims 5, 6, 13, and 14, further comprising: receiving, by the first device, third indication information from the second device, wherein the third indication information is used to indicate at least one of: an identity of the integrity protection algorithm, an identity of the integrity protection key, an identity of an encryption algorithm, or an identity of an encryption key.
- The method according to claim 18, wherein the third indication information is carried by the first MAC PDU; or, the third indication information is carried by a second MAC PDU, and the second MAC PDU is different from the first MAC PDU.
- The method according to claim 19, wherein the third indication information is carried by a second MAC subheader of the first MAC PDU, and the second MAC subheader is one of one or more MAC subheaders of the first MAC PDU.
Description
TECHNICAL FIELD The present disclosure relates to the field of communication, and in particular, to communication methods, devices, a computer-readable storage medium, a computer program product, and a computer program. BACKGROUND In the related art, security mechanisms are mainly provided at the packet data convergence protocol (PDCP) layer. However, protocol layers below the PDCP layer, such as the media access control (MAC) layer, lack security protection mechanisms for the transmitted control signaling and data, which may lead to security issues such as privacy leakage in messages transmitted at the MAC layer, thereby affecting service quality. Therefore, how to ensure the security of MAC layer messages becomes a problem that needs to be solved. SUMMARY Embodiments of the present disclosure provide communication methods, devices, a computer-readable storage medium, a computer program product, and a computer program. The embodiments of the present disclosure provide a communication method, including: receiving, by a first device, a first media access control (MAC) protocol data unit (PDU) from a second device, where the first MAC PDU carries a first message check code, and the first message check code is calculated by the second device based on one or more first payloads of the first MAC PDU. The embodiments of the present disclosure provide a communication method, including: transmitting, by a second device, a first MAC PDU to a first device, where the first MAC PDU carries a first message check code, and the first message check code is calculated based on one or more first payloads of the first MAC PDU. The embodiments of the present disclosure provide a first device, including: a first communication unit used to receive a first media access control (MAC) protocol data unit (PDU) from a second device, where the first MAC PDU carries a first message check code, and the first message check code is calculated by the second device based on one or more first payloads of the first MAC PDU. The embodiments of the present disclosure provide a second device, including: a second communication unit used to transmit a first media access control (MAC) protocol data unit (PDU) to a first device, where the first MAC PDU carries a first message check code, and the first message check code is calculated based on one or more first payloads of the first MAC PDU. The embodiments of the present disclosure provide a first device, including a processor and a memory communicating with the processor. The memory is used to store instructions. When the instructions are executed by the processor, the instructions cause the first device to perform the above method. The embodiments of the present disclosure provide a second device, including a processor and a memory communicating with the processor. The memory is used to store instructions. When the instructions are executed by the processor, the instructions cause the second device to perform the above method. The embodiments of the present disclosure provide a chip for implementing the above method. Specifically, the chip includes: a processor used to call and run a computer program from a memory, to cause a device equipped with the chip to perform the above method. The embodiments of the present disclosure provide a computer-readable storage medium used to store a computer program which, when executed by a device, causes the device to perform the above method. The embodiments of the present disclosure provide a computer program product, including computer program instructions. The computer program instructions cause a computer to perform the above method. The embodiments of the present disclosure provide a computer program which, when executed by a computer, causes the computer to perform the above method. By adopting the solution provided in the embodiments, the message check code can be carried in the MAC PDU, and the message check code is calculated based on the payload(s) in the MAC PDU. In this way, a security protection mechanism will be introduced in the MAC layer to avoid security issues such as message leakage, making messages transmitted at the MAC layer more secure. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is a schematic diagram of an application scenario according to embodiments of the present disclosure.FIG. 2 is a schematic flowchart of a communication method according to an embodiment of the present disclosure.FIG. 3 is a schematic flowchart of a communication method according to another embodiment of the present disclosure.FIGS. 4 to 9 are schematic diagrams of various formats of MAC PDU in a communication method according to an embodiment of the present disclosure.FIG. 10 is a schematic block diagram of a first device according to an embodiment of the present disclosure.FIG. 11 is a schematic block diagram of a second device according to an embodiment of the present disclosure.FIG. 12 is a schematic block diagram of a communication device according to embodiment