Integrity protection processing method and device, related equipment and storage medium

文档序号:196621 发布日期:2021-11-02 浏览:46次 中文

阅读说明:本技术 完整性保护的处理方法、装置、相关设备及存储介质 (Integrity protection processing method and device, related equipment and storage medium ) 是由 胡南 陈宁宇 徐晓东 刘亮 于 2020-04-14 设计创作,主要内容包括:本申请公开了一种完整性保护的处理方法、装置、通信节点及存储介质。其中,方法包括:第一通信节点接收第二通信节点发送的第一信息;利用接收的第一信息,调整完整性保护的相关参数。(The application discloses a processing method and device for integrity protection, a communication node and a storage medium. The method comprises the following steps: a first communication node receives first information sent by a second communication node; and adjusting the related parameters of the integrity protection by using the received first information.)

1. An integrity protection processing method applied to a first communication node includes:

receiving first information sent by a second communication node;

and adjusting the related parameters of the integrity protection by using the received first information.

2. The method of claim 1, wherein the first information sent by the second communication node is received by one of:

a packet data convergence protocol PDCP protocol data unit PDU;

radio resource control, RRC, signaling;

a control unit MAC CE of a media access control layer;

physical layer resources.

3. The method of claim 2, wherein the first information is in a header of the PDCP PDU or in a data field of the PDCP PDU in case the first information is transmitted to the first communication node through the PDCP PDU.

4. The method of claim 1, further comprising:

sending the second information to the second communication node; the second information is used for instructing the second communication node to adjust a relevant parameter of integrity protection of the first communication node.

5. The method of claim 4, wherein the second information is sent to the second communication node by one of:

PDCP PDU;

RRC signaling;

MAC CE;

physical layer resources.

6. The method of claim 5, wherein the second information is in a header of the PDCP PDU or the first information is in a data field of the PDCP PDU in case the second information is transmitted to the second communication node through the PDCP PDU.

7. The method of claim 1, wherein the adjusting the related parameters of integrity protection using the received first information comprises at least one of:

adjusting an integrity protection rate by using the first information;

adjusting an integrity protection algorithm by using the first information;

and utilizing the first information to perform interval of data packets with integrity protection.

8. The method of claim 7, wherein the first information comprises at least one of:

a first integrity protection rate; the first integrity protection rate is for the first communication node to adjust the integrity protection rate to a first integrity protection rate;

a difference between the current integrity protection rate and the first integrity protection rate; the difference is used for the first communication node to adjust the integrity protection rate to a first integrity protection rate;

an integrity protection rate gear corresponding to the first integrity protection rate; the integrity protection rate gear corresponding to the first integrity protection rate is used for the first communication node to adjust the integrity protection rate gear to an integrity protection rate gear corresponding to the first integrity protection rate;

a first integrity protection algorithm; the first integrity protection algorithm is used for the first communication node to adjust the integrity protection algorithm to the first integrity protection algorithm;

a first packet interval; the first packet interval is used for the first communication node to adjust the interval of the integrity-protected packets to be N; n is an integer greater than or equal to zero.

9. The method according to any one of claims 1 to 8, further comprising:

sending the capability information to the second communication node; the capability information indicates a capability related to integrity protection supported by the first communication node.

10. The method of claim 9, wherein the capability information comprises at least one of:

a maximum integrity protection rate supported by the first communication node;

at least one integrity protection algorithm supported by the first communication node; the integrity protection rate corresponding to each integrity protection algorithm in the at least one integrity protection algorithm is different;

and the integrity protection speed gear corresponding to the maximum integrity protection speed supported by the first communication node.

11. The method according to claim 10, wherein in case that the capability information includes a maximum integrity protection rate supported by the terminal, the capability information further includes one of:

the sum of the integrity protection rates of the plurality of data radio bearers DRB does not exceed the maximum integrity protection rate;

the sum of the integrity protection rates of the plurality of DRBs does not exceed the maximum integrity protection rate, and the integrity protection rate of each DRB in the plurality of DRBs cannot exceed a first value;

the sum of the integrity protection rates of the plurality of DRBs exceeds the maximum integrity protection rate;

the sum of the integrity protection rates of the plurality of DRBs exceeds the maximum integrity protection rate, and the integrity protection rate of each DRB of the plurality of DRBs cannot exceed the first value.

12. The method according to claim 10, wherein in case the capability information comprises at least one integrity protection algorithm supported by the first communication node, the capability information further comprises one of:

and the maximum integrity protection rate corresponding to the number of the DRBs for integrity protection is corresponding to each integrity protection algorithm.

13. The method according to any of claims 1 to 8, wherein the integrity-protection related parameters are adapted for at least one of the plurality of DRBs.

14. A processing method for integrity protection is applied to a second communication node, and comprises the following steps:

sending first information to a first communication node; the first information indicates the first communication node to adjust integrity protection related parameters.

15. The method of claim 14, wherein the first information is sent to the first communication node by one of:

PDCP PDU;

RRC signaling;

MAC CE;

physical layer resources.

16. The method of claim 15, wherein the first information is in a header of the PDCP PDU or in a data field of the PDCP PDU in case the first information is transmitted to the first communication node through the PDCP PDU.

17. The method of claim 14, further comprising:

receiving second information sent by the first communication node; the second information is used for instructing the second communication node to adjust a relevant parameter of integrity protection of the first communication node.

18. The method of claim 17, wherein the second information sent by the first communication node is received by one of:

PDCP PDU;

RRC signaling;

MAC CE;

physical layer resources.

19. The method of claim 18, wherein in case of receiving the second information transmitted by the first communication node through PDCP PDUs, the second information is in a header of the PDCP PDUs or the second information is in a data field of the PDCP PDUs.

20. The method of claim 14, wherein the first information is used to adjust at least one of the following parameters:

an integrity protection rate;

an integrity protection algorithm;

interval of data packets for integrity protection.

21. The method of claim 20, wherein the first information comprises at least one of:

a first integrity protection rate; the first integrity protection rate is for the first communication node to adjust the integrity protection rate to a first integrity protection rate;

a difference between the current integrity protection rate and the first integrity protection rate; the difference is used for the first communication node to adjust the integrity protection rate to a first integrity protection rate;

an integrity protection rate gear corresponding to the first integrity protection rate; the integrity protection rate gear corresponding to the first integrity protection rate is used for the first communication node to adjust the integrity protection rate gear to an integrity protection rate gear corresponding to the first integrity protection rate;

a first integrity protection algorithm; the first integrity protection algorithm is used for the first communication node to adjust the integrity protection algorithm to the first integrity protection algorithm;

a first packet interval; the first packet interval is used for the first communication node to adjust the interval of the integrity-protected packets to be N; n is an integer greater than or equal to zero.

22. The method of any one of claims 14 to 21, further comprising:

receiving capability information sent by a first communication node; the capability information indicates a capability related to integrity protection supported by the first communication node.

23. The method of claim 22, wherein the capability information comprises at least one of:

a maximum integrity protection rate supported by the first communication node;

at least one integrity protection algorithm supported by the first communication node; the integrity protection rate corresponding to each integrity protection algorithm in the at least one integrity protection algorithm is different;

and the integrity protection speed gear corresponding to the maximum integrity protection speed supported by the first communication node.

24. The method according to claim 23, wherein in case that the capability information includes a maximum integrity protection rate supported by the terminal, the capability information further includes one of:

the sum of the integrity protection rates of the plurality of DRBs does not exceed the maximum integrity protection rate;

the sum of the integrity protection rates of the plurality of DRBs does not exceed the maximum integrity protection rate, and the integrity protection rate of each DRB in the plurality of DRBs cannot exceed a first value;

the sum of the integrity protection rates of the plurality of DRBs exceeds the maximum integrity protection rate;

the sum of the integrity protection rates of the plurality of DRBs exceeds the maximum integrity protection rate, and the integrity protection rate of each DRB of the plurality of DRBs cannot exceed the first value.

25. The method according to claim 23, wherein in case the capability information comprises at least one integrity protection algorithm supported by the first communication node, the capability information further comprises one of:

and the maximum integrity protection rate corresponding to the number of the DRBs for integrity protection is corresponding to each integrity protection algorithm.

26. The method according to any of claims 14 to 21, wherein the first information is used for the terminal to adjust integrity protection related parameters for at least one DRB of a plurality of DRBs.

27. An integrity-protected processing apparatus, comprising:

a first receiving unit, configured to receive first information sent by a second communication node;

and the adjusting unit is used for adjusting the related parameters of the integrity protection by using the received first information.

28. An integrity-protected processing apparatus, comprising:

a second transmitting unit configured to transmit the first information to the first communication node; the first information indicates the first communication node to adjust integrity protection related parameters.

29. A first communications node, comprising:

the first communication interface is used for receiving first information sent by the second communication node;

and the first processor is used for adjusting the related parameters of the integrity protection by utilizing the received first information.

30. A second communications node, comprising: a second communication interface and a second processor; wherein the content of the first and second substances,

the second communication interface is used for sending first information to the first communication node; the first information indicates the first communication node to adjust integrity protection related parameters.

31. A first communications node, comprising: a first processor and a first memory for storing a computer program capable of running on the processor,

wherein the first processor is adapted to perform the steps of the method of any one of claims 1 to 13 when running the computer program.

32. A second communications node, comprising: a second processor and a second memory for storing a computer program capable of running on the processor,

wherein the second processor is adapted to perform the steps of the method of any of claims 14 to 26 when running the computer program.

33. A storage medium having stored thereon a computer program for performing the steps of the method of any one of claims 1 to 13 or the steps of the method of any one of claims 14 to 26 when executed by a processor.

Technical Field

The present application relates to the field of wireless communications, and in particular, to a method, an apparatus, a related device, and a storage medium for integrity protection.

Background

The fifth generation mobile communication technology (5G) introduces integrity protection (which may be simply referred to as "integrity protection") for user plane data, but is limited by the processing capability of the terminal, and not all terminals can transmit at the maximum rate, so that it is necessary to perform integrity protection at the rate of 64kbps in the related art, and it is an optional function to perform integrity protection at the full rate.

With the development of terminal technology, the computing power of a terminal is gradually improved, so that more terminals support integrity protection at a higher rate, and can support integrity protection resolution on data packets subjected to integrity protection at a higher rate.

Disclosure of Invention

In order to solve the related technical problem, embodiments of the present application provide a method, an apparatus, a related device, and a storage medium for integrity protection.

The technical scheme of the embodiment of the application is realized as follows:

at least one embodiment of the present application provides an integrity protection processing method, applied to a first communication node, including:

receiving first information sent by a second communication node;

and adjusting the related parameters of the integrity protection by using the received first information.

Further, according to at least one embodiment of the present application, the first information sent by the second communication node is received by one of the following ways:

a Packet Data Convergence Protocol (PDCP) Protocol Data Unit (PDU);

radio Resource Control (RRC) signaling;

a control unit (MAC CE) of a media access control layer;

physical layer resources.

Further, in accordance with at least one embodiment of the present application, in case that the first information is transmitted to the first communication node through the PDCP PDU, the first information is within a header of the PDCP PDU or the first information is within a data domain of the PDCP PDU.

Further, in accordance with at least one embodiment of the present application, the method further comprises:

sending the second information to the second communication node; the second information is used for instructing the second communication node to adjust a relevant parameter of integrity protection of the first communication node.

Further in accordance with at least one embodiment of the present application, the second information is sent to the second communication node by one of:

PDCP PDU;

RRC signaling;

MAC CE;

physical layer resources.

Further, according to at least one embodiment of the present application, in case that the second information is transmitted to the second communication node through the PDCP PDU, the second information is within a header of the PDCP PDU or the first information is within a data field of the PDCP PDU.

Furthermore, according to at least one embodiment of the present application, the adjusting, by using the received first information, the integrity-protection related parameter includes at least one of:

adjusting an integrity protection rate by using the first information;

adjusting an integrity protection algorithm by using the first information;

and utilizing the first information to perform interval of data packets with integrity protection.

Further, in accordance with at least one embodiment of the present application, the first information includes at least one of:

a first integrity protection rate; the first integrity protection rate is for the first communication node to adjust the integrity protection rate to a first integrity protection rate;

a difference between the current integrity protection rate and the first integrity protection rate; the difference is used for the first communication node to adjust the integrity protection rate to a first integrity protection rate;

an integrity protection rate gear corresponding to the first integrity protection rate; the integrity protection rate gear corresponding to the first integrity protection rate is used for the first communication node to adjust the integrity protection rate gear to an integrity protection rate gear corresponding to the first integrity protection rate;

a first integrity protection algorithm; the first integrity protection algorithm is used for the first communication node to adjust the integrity protection algorithm to the first integrity protection algorithm;

a first packet interval; the first packet interval is used for the first communication node to adjust the interval of the integrity-protected packets to be N; n is an integer greater than or equal to zero.

Further, in accordance with at least one embodiment of the present application, the method further comprises:

sending the capability information to the second communication node; the capability information indicates a capability related to integrity protection supported by the first communication node.

Further, in accordance with at least one embodiment of the present application, the capability information includes at least one of:

a maximum integrity protection rate supported by the first communication node;

at least one integrity protection algorithm supported by the first communication node; the integrity protection rate corresponding to each integrity protection algorithm in the at least one integrity protection algorithm is different;

and the integrity protection speed gear corresponding to the maximum integrity protection speed supported by the first communication node.

Furthermore, according to at least one embodiment of the present application, in a case that the capability information includes a maximum integrity protection rate supported by the terminal, the capability information further includes one of:

a sum of integrity protection rates of a plurality of Data Radio Bearers (DRBs) does not exceed the maximum integrity protection rate;

the sum of the integrity protection rates of the plurality of DRBs does not exceed the maximum integrity protection rate, and the integrity protection rate of each DRB in the plurality of DRBs cannot exceed a first value;

the sum of the integrity protection rates of the plurality of DRBs exceeds the maximum integrity protection rate;

the sum of the integrity protection rates of the plurality of DRBs exceeds the maximum integrity protection rate, and the integrity protection rate of each DRB of the plurality of DRBs cannot exceed the first value.

Furthermore, in accordance with at least one embodiment of the present application, in a case that the capability information includes at least one integrity protection algorithm supported by the first communication node, the capability information further includes one of:

and the maximum integrity protection rate corresponding to the number of the DRBs for integrity protection is corresponding to each integrity protection algorithm.

Further, according to at least one embodiment of the present application, a relevant parameter of integrity protection is adjusted for at least one DRB of the plurality of DRBs.

At least one embodiment of the present application further provides an integrity protection processing method, applied to a second communication node, including:

sending first information to a first communication node; the first information indicates the first communication node to adjust integrity protection related parameters.

Further in accordance with at least one embodiment of the present application, the first information is transmitted to the first communication node by one of:

PDCP PDU;

RRC signaling;

MAC CE;

physical layer resources.

Further, in accordance with at least one embodiment of the present application, in case that the first information is transmitted to the first communication node through the PDCP PDU, the first information is within a header of the PDCP PDU or the first information is within a data domain of the PDCP PDU.

Further, in accordance with at least one embodiment of the present application, the method further comprises:

receiving second information sent by the first communication node; the second information is used for instructing the second communication node to adjust a relevant parameter of integrity protection of the first communication node.

Further, according to at least one embodiment of the present application, the second information sent by the first communication node is received by one of the following ways:

PDCP PDU;

RRC signaling;

MAC CE;

physical layer resources.

Further, according to at least one embodiment of the present application, in case that the second information transmitted by the first communication node is received through a PDCP PDU, the second information is within a header of the PDCP PDU or within a data field of the PDCP PDU.

Further in accordance with at least one embodiment of the present application, the first information is used to adjust at least one of the following parameters:

an integrity protection rate;

an integrity protection algorithm;

interval of data packets for integrity protection.

Further, in accordance with at least one embodiment of the present application, the first information includes at least one of:

a first integrity protection rate; the first integrity protection rate is for the first communication node to adjust the integrity protection rate to a first integrity protection rate;

a difference between the current integrity protection rate and the first integrity protection rate; the difference is used for the first communication node to adjust the integrity protection rate to a first integrity protection rate;

an integrity protection rate gear corresponding to the first integrity protection rate; the integrity protection rate gear corresponding to the first integrity protection rate is used for the first communication node to adjust the integrity protection rate gear to an integrity protection rate gear corresponding to the first integrity protection rate;

a first integrity protection algorithm; the first integrity protection algorithm is used for the first communication node to adjust the integrity protection algorithm to the first integrity protection algorithm;

a first packet interval; the first packet interval is used for the first communication node to adjust the interval of the integrity-protected packets to be N; n is an integer greater than or equal to zero.

Further, in accordance with at least one embodiment of the present application, the method further comprises:

receiving capability information sent by a first communication node; the capability information indicates a capability related to integrity protection supported by the first communication node.

Further, in accordance with at least one embodiment of the present application, the capability information includes at least one of:

a maximum integrity protection rate supported by the first communication node;

at least one integrity protection algorithm supported by the first communication node; the integrity protection rate corresponding to each integrity protection algorithm in the at least one integrity protection algorithm is different;

and the integrity protection speed gear corresponding to the maximum integrity protection speed supported by the first communication node.

Furthermore, according to at least one embodiment of the present application, in a case that the capability information includes a maximum integrity protection rate supported by the terminal, the capability information further includes one of:

the sum of the integrity protection rates of the plurality of DRBs does not exceed the maximum integrity protection rate;

the sum of the integrity protection rates of the plurality of DRBs does not exceed the maximum integrity protection rate, and the integrity protection rate of each DRB in the plurality of DRBs cannot exceed a first value;

the sum of the integrity protection rates of the plurality of DRBs exceeds the maximum integrity protection rate;

the sum of the integrity protection rates of the plurality of DRBs exceeds the maximum integrity protection rate, and the integrity protection rate of each DRB of the plurality of DRBs cannot exceed the first value.

Furthermore, in accordance with at least one embodiment of the present application, in a case that the capability information includes at least one integrity protection algorithm supported by the first communication node, the capability information further includes one of:

and the maximum integrity protection rate corresponding to the number of the DRBs for integrity protection is corresponding to each integrity protection algorithm.

Further, according to at least one embodiment of the present application, the first information is used for the terminal to adjust a parameter related to integrity protection for at least one DRB of the plurality of DRBs.

At least one embodiment of the present application further provides an integrity-protected processing apparatus, including:

a first receiving unit, configured to receive first information sent by a second communication node;

and the adjusting unit is used for adjusting the related parameters of the integrity protection by using the received first information.

At least one embodiment of the present application further provides an integrity-protected processing apparatus, including:

a second transmitting unit configured to transmit the first information to the first communication node; the first information indicates the first communication node to adjust integrity protection related parameters.

At least one embodiment of the present application also provides a first communication node, comprising:

the first communication interface is used for receiving first information sent by the second communication node;

and the first processor is used for adjusting the related parameters of the integrity protection by utilizing the received first information.

At least one embodiment of the present application further provides a second communication node, including: a second communication interface and a second processor; wherein the content of the first and second substances,

the second communication interface is used for sending first information to the first communication node; the first information indicates the first communication node to adjust integrity protection related parameters.

At least one embodiment of the present application also provides a first communication node, comprising: a first processor and a first memory for storing a computer program capable of running on the processor,

wherein the first processor is configured to execute the steps of any of the above-mentioned methods at the first communication node side when running the computer program.

At least one embodiment of the present application further provides a second communication node, including: a second processor and a second memory for storing a computer program capable of running on the processor,

wherein the second processor is configured to execute the steps of any of the methods of the second communication node side when running the computer program.

At least one embodiment of the present application further provides a storage medium having a computer program stored thereon, where the computer program is executed by a processor to implement the steps of any of the methods of the first communication node side or to implement the steps of any of the methods of the second communication node side.

According to the integrity protection method, the integrity protection device, the related equipment and the storage medium, the second communication node sends first information to the first communication node; the first communication node adjusts the relevant parameters of integrity protection by using the received first information, and can timely avoid the occurrence of adverse consequences such as data packet loss, integrity protection failure, even link interruption and the like caused by insufficient terminal capability in the process of carrying out user plane integrity protection by adjusting the relevant parameters of integrity protection.

Drawings

Fig. 1 is a schematic flowchart of a processing method for integrity protection at a first communication node side according to an embodiment of the present application;

FIG. 2 is a diagram illustrating a PDCP PDU format according to an embodiment of the present application;

fig. 3 is a schematic flowchart of a processing method for integrity protection according to an embodiment of the present disclosure;

fig. 4 is a schematic flowchart of a processing method for integrity protection at a terminal side according to an embodiment of the present application;

fig. 5 is a flowchart illustrating a second integrity protection processing method according to an embodiment of the present application;

fig. 6 is a schematic flowchart of a processing method for integrity protection at a network device side according to an embodiment of the present application;

fig. 7 is a flowchart illustrating a third integrity protection processing method according to an embodiment of the present application;

FIG. 8 is a block diagram of an integrity-protected processing device according to an embodiment of the present disclosure;

FIG. 9 is a schematic structural diagram of another integrity-protected processing device according to an embodiment of the present disclosure;

fig. 10 is a schematic structural diagram of a first communication node according to an embodiment of the present application;

fig. 11 is a schematic structural diagram of a second communication node according to an embodiment of the present application;

fig. 12 is a schematic structural diagram of a processing system for integrity protection according to an embodiment of the present application.

Detailed Description

The present application will be described in further detail with reference to the following drawings and examples.

As terminals advance, the computing power increases, and therefore more terminals support integrity protection of user plane data at higher rates, even full rates. When the terminal performs integrity protection at a higher rate or a full rate, it may cause the terminal power consumption to be too high or exceed the current maximum capability of the terminal, and at this time, the terminal cannot maintain the current integrity protection rate, but the network side continues to use the rate to transmit user plane data, which may cause bad results such as data packet loss, integrity protection failure, and even link terminal.

Based on this, in various embodiments of the present application, when the power consumption of the terminal is too high, or exceeds the current integrity protection capability, or enters an energy saving mode, and the like, the terminal and/or the network side adjust the relevant parameters of the integrity protection, so that the integrity protection matches with the current capability of the terminal, thereby avoiding the occurrence of the above adverse consequences.

Of course, when the above situation of the terminal does not exist, the terminal and/or the network side may also adjust the relevant parameters of the integrity protection, so that the integrity protection matches with the current capability of the terminal.

In the embodiment of the present application, the integrity protection rate refers to: the rate that can be achieved when the terminal and the network side start user plane integrity protection (start integrity protection for user plane data) can also be understood as the rate used when the terminal and the network side start user plane integrity protection.

An embodiment of the present application provides an integrity protection processing method, which is applied to a first communication node, and as shown in fig. 1, the method includes:

step 101: receiving first information sent by a second communication node;

step 102: and adjusting the related parameters of the integrity protection by using the received first information.

Here, in practical application, the communication node performing integrity protection refers to a data sending device, that is, a device to send data, specifically, in a downlink direction, the first communication node is a network device, such as a base station, and the second communication node is a terminal; in the uplink direction, the first communication node is a terminal and the second communication device is a network device.

A communication node may also be understood as a communication device.

In an embodiment, the first information sent by the second communication node may be received by one of the following ways:

PDCP PDU;

RRC signaling;

MAC CE;

physical layer resources.

In practical application, when the second communication node sends the first information to the first communication node through the PDCP PDU (the first communication node receives the first information sent by the second communication node through the PDCP PDU), that is, if the second communication node sends the first information to the first communication node through the PDCP PDU, the first information is in a header of the PDCP PDU or in a Data field of the PDCP PDU (which may also be understood as a Data bit), of course, the first information may also be in another location in the PDCP PDU.

Here, when the first information is in the header of the PDCP PDU, the first information may be set in a reserved bit (which may also be understood as a reserved field) as shown in fig. 2.

When the first communication node is a terminal and the second communication node is a network device, the terminal may request the network side to adjust the adjustment of the related parameters of integrity protection.

Based on this, in an embodiment, the method may further include:

sending the second information to the second communication node; the second information is used to instruct the second communication node to adjust the parameter related to integrity protection of the first communication node, and may also be understood as the second information is used to request the second communication node to adjust the parameter related to integrity protection of the first communication node.

In one embodiment, the second information is sent to the second communication node by one of the following methods:

PDCP PDU;

RRC signaling;

MAC CE;

physical layer resources.

Here, in case of transmitting second information to the second communication node through the PDCP PDU, the second information is within a header of the PDCP PDU or the first information is within a data field of the PDCP PDU; of course, the second information may be in other locations in the PDCP PDU.

In an embodiment, the specific implementation of step 102 may include at least one of:

adjusting an integrity protection rate by using the first information;

adjusting an integrity protection algorithm by using the first information;

and utilizing the first information to perform interval of data packets with integrity protection.

That is, the first information is used to adjust at least one of the following parameters:

an integrity protection rate;

an integrity protection algorithm;

interval of data packets for integrity protection.

In an embodiment, the first information includes at least one of:

a first integrity protection rate; the first integrity protection rate is for the first communication node to adjust the integrity protection rate to a first integrity protection rate;

a difference between the current integrity protection rate and the first integrity protection rate; the difference is used for the first communication node to adjust the integrity protection rate to a first integrity protection rate;

an integrity protection rate gear corresponding to the first integrity protection rate; the integrity protection rate gear corresponding to the first integrity protection rate is used for the first communication node to adjust the integrity protection rate gear to an integrity protection rate gear corresponding to the first integrity protection rate;

a first integrity protection algorithm; the first integrity protection algorithm is used for the first communication node to adjust the integrity protection algorithm to the first integrity protection algorithm;

a first packet interval; the first packet interval is used for the first communication node to adjust the interval of the integrity-protected packets to be N; n is an integer greater than or equal to zero.

When the first communication node is a terminal and the second communication node is a network device, the first communication node may send its own capability to the network side, so that the second communication node may indicate a relevant parameter of integrity protection of the terminal based on the capability information, that is, may determine the first information based on the capability information.

Based on this, in an embodiment, the method may further include:

sending the capability information to the second communication node; the capability information indicates a capability related to integrity protection supported by the first communication node.

Wherein, in an embodiment, the capability information includes at least one of:

a maximum integrity protection rate supported by the first communication node;

at least one integrity protection algorithm supported by the first communication node; the integrity protection rate corresponding to each integrity protection algorithm in the at least one integrity protection algorithm is different;

and the integrity protection speed gear corresponding to the maximum integrity protection speed supported by the first communication node.

When the first communication node has only 1 DRB, the integrity protection rate M may be used, but when there are two DRBs both of which need integrity protection, the integrity rates M1 and M2 of the two DRBs will be reduced slightly compared to M, i.e. M1 and M2 are both smaller than M, and whether the sum of M1 and M2 can exceed M depends on the capability of the first communication node.

Based on this, in an embodiment, in the case that the capability information includes the maximum integrity protection rate supported by the terminal, the capability information further includes one of:

the sum of the integrity protection rates of the plurality of DRBs does not exceed the maximum integrity protection rate;

the sum of the integrity protection rates of the plurality of DRBs does not exceed the maximum integrity protection rate, and the integrity protection rate of each DRB in the plurality of DRBs cannot exceed a first value;

the sum of the integrity protection rates of the plurality of DRBs exceeds the maximum integrity protection rate;

the sum of the integrity protection rates of the plurality of DRBs exceeds the maximum integrity protection rate, and the integrity protection rate of each DRB of the plurality of DRBs cannot exceed the first value.

Wherein the first value can be set as desired.

Here, since integrity protection is configured for each DRB, the first information is used for the first communication node to adjust integrity-protected related parameters for at least one DRB of the plurality of DRBs. That is, the first communication node adjusts the integrity-protection related parameter for at least one DRB of the plurality of DRBs.

In practical application, for each integrity protection algorithm, when the number of DRBs performing integrity protection is different, the corresponding maximum integrity protection rate needs to be limited, and exemplarily, it is assumed that for the integrity protection algorithm a, when there are 1 DRBs performing integrity protection, the limited maximum rate is a1, and when there are 2 DRBs performing integrity protection, the limited maximum rate is a 2; for the integrity protection algorithm B, when there are 1 DRBs for integrity protection, the maximum rate is limited to B1, and when there are 2 DRBs for integrity protection, the maximum rate is limited to B2.

Based on this, in an embodiment, in case the capability information comprises at least one integrity protection algorithm supported by the first communication node, the capability information further comprises one of:

and the maximum integrity protection rate corresponding to the number of the DRBs for integrity protection is corresponding to each integrity protection algorithm.

Correspondingly, an embodiment of the present application further provides an integrity protection processing method, which is applied to a second communication node, and includes:

sending first information to a first communication node; the first information indicates the first communication node to adjust integrity protection related parameters.

In one embodiment, the first information is sent to the first communication node by one of:

PDCP PDU;

RRC signaling;

MAC CE;

physical layer resources.

In an embodiment, in case the first information is transmitted to the first communication node through a PDCP PDU, the first information is within a header of the PDCP PDU or the first information is within a data field of the PDCP PDU.

In an embodiment, the method may further comprise:

receiving second information sent by the first communication node; the second information is used for instructing the second communication node to adjust a relevant parameter of integrity protection of the first communication node.

In an embodiment, the second information sent by the first communication node is received by one of the following methods:

PDCP PDU;

RRC signaling;

MAC CE;

physical layer resources.

Here, in an embodiment, in case that the second information transmitted by the first communication node is received through a PDCP PDU, the second information is within a header of the PDCP PDU or the second information is within a data field of the PDCP PDU.

In an embodiment, the method may further comprise:

receiving capability information sent by a first communication node; the capability information indicates a capability related to integrity protection supported by the first communication node.

It should be noted that: in practical applications, the first information and the second information may be referred to as indication information, and may also be referred to as auxiliary information, request information, integrity protection adjustment information, or the like, which is not limited in this embodiment of the application.

An embodiment of the present application provides a processing method for integrity protection, as shown in fig. 3, the method includes:

step 301: the second communication node sends first information to the first communication node;

step 302: and the first communication node adjusts the related parameters of integrity protection by using the received first information.

It should be noted that: the specific processing procedures of the first communication node and the second communication node have been described in detail above, and are not described herein again.

In the integrity protection processing method provided by the embodiment of the application, the second communication node sends first information to the first communication node; the first communication node adjusts the relevant parameters of integrity protection by using the received first information, and can timely avoid the occurrence of adverse consequences such as data packet loss, integrity protection failure, even link interruption and the like caused by insufficient terminal capability in the process of carrying out user plane integrity protection by adjusting the relevant parameters of integrity protection.

The following describes a scheme of the embodiment of the present application in terms of adjusting related parameters of integrity protection for a terminal and a network device, respectively.

First, a process of adjusting the relevant parameters of integrity protection on the terminal side is described.

An embodiment of the present application provides a processing method for integrity protection, which is applied to a terminal, and as shown in fig. 4, the method includes:

step 401: receiving first information sent by a network side;

step 402: and adjusting the related parameters of the integrity protection by using the first information.

In actual application, in step 401, when the power consumption of the terminal itself is too high, or exceeds the current integrity protection capability, or enters an energy saving mode, or the like, the terminal may request the network side to adjust the related parameters of integrity protection, that is, the terminal requests the network side to adjust the related parameters of integrity protection.

Based on this, in an embodiment, the method may further include:

sending second information to a network side; the second information indicates a relevant parameter for adjusting integrity protection;

correspondingly, the terminal receives the first information sent by the network side based on the second information.

Here, in practical application, when the power consumption of the terminal is too high, exceeds the current capability, or enters an energy saving mode, the terminal may send the second information to the network side, and at this time, the second information may request to reduce the integrity protection rate, may request to adjust an integrity protection algorithm to reduce the processing capability of the terminal, and may also request to adjust an interval of a data packet for integrity protection to reduce the processing capability of the terminal.

Of course, after the terminal recovers from the above situations to a normal working state, the second information may also be sent to the network side, at this time, the second information may request to increase the integrity protection rate, may request to adjust the integrity protection algorithm to match the processing capability of the terminal, and may also request to adjust the interval of the integrity-protected data packets to match the processing capability of the terminal.

In an embodiment, the second information may be sent to the network side by one of the following methods:

PDCP PDU;

RRC signaling;

MAC CE;

and uplink physical layer resources.

In practical application, when the second information is sent to the network side through the PDCP PDU, that is, if the second information is sent to the network side through the PDCP PDU, the second information is in a header of the PDCP PDU or in a Data field (which may also be understood as a Data bit) of the PDCP PDU, and of course, the second information may be in other positions in the PDCP PDU.

In case of transmitting the second information to the network side through the PDCP PDU, the second information may include at least one of the following information:

whether integrity protection information is enabled;

integrity protection algorithm information;

speed adjustment indication information.

Wherein the information indicating whether to enable integrity protection indicates whether integrity protection is used for the data packet.

The integrity protection algorithm information is used for indicating which integrity protection algorithm is used by the data packet;

the speed adjustment indication information is used for indicating to increase the integrity protection rate or indicating to decrease the integrity protection rate, or indicating to adjust the integrity protection rate to a certain speed gear.

In a case where the second information is transmitted through a MAC CE, that is, if the second information is transmitted through a MAC CE, the MAC CE may be a newly defined MAC CE or an existing MAC CE, which is not limited in this embodiment of the present application.

In practical application, the uplink physical layer resource may include: uplink Control Information (UCI). The UCI may be carried in a Physical Uplink Control Channel (PUCCH) or a Physical Uplink Shared Channel (PUSCH).

In practical application, the network side may also actively send the first information to the terminal, that is, the network side directly sends the first information without the terminal sending the request message first.

Here, the network side may actively send the first information to the terminal as needed, for example, when the network side sends the reconfiguration message to the terminal, when adding, modifying or deleting the DRB, the first information may be sent; for another example, the network side has already reached the maximum processing capacity, and at this time, the network side may send the first information to the terminal, so as to reduce the processing complexity of the network side; for another example, when the network side knows that the current capability of the terminal cannot be matched with the current integrity protection parameter (for example, the terminal is overheated or overloaded) according to the obtained data, the network side actively sends the first information to the terminal, so as to reduce the processing complexity of the terminal.

In practical application, the network side may send the first information to the terminal in one of the following manners, that is, the terminal receives the first information sent by the network side in one of the following manners:

PDCP PDU;

RRC signaling;

MAC CE;

and (4) downlink physical layer resources.

Similarly to the second information, in the case that the network side sends the first information to the terminal through the PDCP PDU, the first information may be in the header of the PDCP PDU, or the first information may be in the data field of the PDCP PDU, and of course, may be in other positions in the PDCP PDU.

The downlink physical layer resources may include: downlink Control Information (DCI). Wherein the DCI may be carried in a Physical Downlink Control Channel (PDCCH).

In practice, the related parameters of integrity protection may include an integrity protection rate, so that an adjustable integrity protection rate may be adjusted.

Based on this, in an embodiment, the specific implementation of step 402 may include:

the integrity protection rate is adjusted using the first information.

Wherein the first information may include at least one of:

a first integrity protection rate;

a difference between the current integrity protection rate and the first integrity protection rate;

and the first integrity protection speed corresponds to an integrity protection speed gear.

Wherein the first integrity protection rate may be understood as a target integrity protection rate. That is, the integrity protection rate is adjusted to the first integrity protection rate.

For example, P (P is an integer greater than or equal to 2) integrity rate gears are set, and the terminal may request to increase or decrease the rate gear, or of course, the network side may directly increase or decrease the rate gear without a terminal request.

In practical application, the related parameters of integrity protection may further include an integrity protection algorithm, so that the integrity protection algorithm may be adjusted.

Based on this, in an embodiment, the specific implementation of step 402 may include:

and adjusting the integrity protection algorithm by using a first integrity protection algorithm contained in the first information.

Wherein the first integrity algorithm may be understood as a target integrity protection algorithm. That is, the integrity protection algorithm is adjusted to the first integrity protection algorithm.

The maximum integrity protection rates corresponding to different integrity algorithms are different, and by adjusting the integrity algorithms, lower integrity protection complexity can be realized while the same integrity protection rate is maintained; accordingly, by adjusting the integrity algorithm, a higher integrity protection rate may be used.

In practical application, the related parameters of integrity protection may further include a packet interval for integrity protection, so that the packet interval for integrity protection may be adjusted.

Based on this, in an embodiment, the specific implementation of step 402 may include:

adjusting the interval of the data packets subjected to integrity protection to be N by utilizing the interval of the first data packets contained in the first information; n is an integer greater than or equal to zero.

That is, the interval of the integrity-protected packets is adjusted to the target packet interval. I.e. the interval of the integrity protected data packets is adjusted to the first packet interval.

For example, integrity protection can be performed on each data packet, and the integrity protection is adjusted to be performed on every 1 data packet, or performed on every Q data packets, so as to reduce the complexity of integrity protection. Wherein Q is an integer greater than 1 and less than or equal to N.

In practical application, at least one of the above embodiments of adjusting the integrity protection rate, adjusting the integrity protection algorithm, and adjusting the interval of the integrity-protected data packet may be selected as needed to achieve the purpose of adjusting the related parameters of integrity protection.

In practical application, the terminal may report its capability to the network side, so that the network side may indicate the relevant parameters of integrity protection of the terminal based on the capability information.

Based on this, in an embodiment, the method may further include:

sending the capability information to a network side; the capability information indicates a related capability of integrity protection supported by the terminal.

In an embodiment, the capability information includes at least one of:

a maximum integrity protection rate supported by the terminal;

at least one integrity protection algorithm supported by the terminal;

the integrity protection rate corresponding to each integrity protection algorithm in the at least one integrity protection algorithm is different;

and the terminal supports an integrity protection rate gear corresponding to the maximum integrity protection rate.

Here, since integrity protection is configured for each DRB, the first information is used for the terminal to adjust an integrity protection related parameter for at least one DRB of the plurality of DRBs. That is, the terminal adjusts the integrity-protected related parameters for at least one DRB of the plurality of DRBs.

When the terminal has only 1 DRB, the integrity protection rate M may be used, but when there are two DRBs that need integrity protection, the integrity rates M1 and M2 of the two DRBs will be reduced a little compared to M, and whether the sum of M1 and M2 can exceed M depends on the terminal capability.

Based on this, in an embodiment, in case the capability information comprises a supported maximum integrity protection rate, the capability information further comprises one of:

the sum of the integrity protection rates of the plurality of DRBs does not exceed the maximum integrity protection rate;

the sum of the integrity protection rates of the plurality of DRBs does not exceed the maximum integrity protection rate, and the integrity protection rate of each DRB in the plurality of DRBs cannot exceed a first value;

the sum of the integrity protection rates of the plurality of DRBs exceeds the maximum integrity protection rate;

the sum of the integrity protection rates of the plurality of DRBs exceeds the maximum integrity protection rate, and the integrity protection rate of each DRB of the plurality of DRBs cannot exceed the first value.

In practical application, for each integrity protection algorithm, when the number of DRBs performing integrity protection is different, the corresponding maximum integrity protection rate needs to be limited, and exemplarily, it is assumed that for the integrity protection algorithm a, when there are 1 DRBs performing integrity protection, the limited maximum rate is a1, and when there are 2 DRBs performing integrity protection, the limited maximum rate is a 2; for the integrity protection algorithm B, when there are 1 DRBs for integrity protection, the maximum rate is limited to B1, and when there are 2 DRBs for integrity protection, the maximum rate is limited to B2.

Based on this, in an embodiment, in case the capability information includes at least one integrity protection algorithm supported by the terminal, the capability information further includes one of:

and the maximum integrity protection rate corresponding to the number of the DRBs for integrity protection is corresponding to each integrity protection algorithm.

Correspondingly, an embodiment of the present application further provides an integrity protection processing method, which is applied to a network device, and includes:

sending first information to a terminal; the first information is used for the terminal to adjust the related parameters of integrity protection.

In an embodiment, the method may further include:

receiving second information sent by the terminal;

and sending first information to the terminal based on the second information.

Here, in an embodiment, the second information sent by the terminal is received by one of the following methods:

PDCP PDU;

RRC signaling;

MAC CE;

and uplink physical layer resources.

Specifically, when the terminal sends the second information through a PDCP PDU, the network device receives the second information through the PDCP PDU; when the terminal sends the second information through RRC signaling, the network equipment receives the second information through RRC signaling; when the terminal sends the second information through the MAC CE, the network equipment receives the second information through the MAC CE; and when the terminal sends the second information through the uplink physical layer resource, the network equipment receives the second information through the uplink physical layer resource.

In an embodiment, the first information is used to adjust an integrity protection rate.

In an embodiment, the first information is used for adjusting an integrity protection algorithm, and the first information includes a first integrity protection algorithm.

In an embodiment, the first information is used for adjusting a data interval for integrity protection; the first information includes a first packet interval.

In an embodiment, the method may further comprise:

receiving the capability information reported by the terminal; the capability information indicates a related capability of integrity protection supported by the terminal.

Correspondingly, an embodiment of the present application further provides a processing method for integrity protection, as shown in fig. 5, the method includes:

step 501: the network equipment sends first information to the terminal;

step 502: and the terminal adjusts the related parameters of the integrity protection by using the received first information.

It should be noted that: the specific processing procedures of the network device and the terminal have been described in detail above, and are not described in detail here.

As can be seen from the above description, the relevant parameters of integrity protection are adjusted at the terminal side to avoid the occurrence of adverse consequences such as packet loss, integrity protection failure, and even link interruption.

In this process, the behavior of the terminal mainly includes:

the terminal reports the integrity protection rate related capability, namely the integrity protection related capability supported by the terminal, to the network side;

after the network starts the user plane integrity protection for the terminal, the terminal sends second information to the network side (including reporting the integrity protection rate to the network side (that is, the terminal requests to use the reported integrity protection rate as the rate of integrity protection), and a speed reduction or speed increase request message (the speed reduction request message is used for the terminal to indicate that the current rate exceeds the capability of the terminal integrity protection so as to cause bad results, the terminal requests to reduce the integrity protection rate, and the speed increase request message is used for the terminal to request to increase the integrity protection rate again after the bad results are relieved)).

And adjusting the relevant parameters of the integrity protection.

The network side behavior mainly comprises:

receiving the integrity protection rate related capability reported by the terminal;

the network side sends first information to the terminal (the network side requires the terminal to adjust the relevant parameters of integrity protection, and realize speed reduction or speed increase, etc.).

In the embodiment of the application, a terminal receives first information sent by a network side; the received first information is utilized to adjust the related parameters of the integrity protection, and the related parameters of the integrity protection are adjusted through the terminal, so that the occurrence of adverse consequences such as data packet loss, integrity protection failure, even link interruption and the like caused by insufficient capability of the terminal in the integrity protection process can be avoided in time.

Next, a process of adjusting the relevant parameters of integrity protection by the network side is described, and the occurrence of adverse consequences such as data packet loss, integrity protection failure, even link interruption and the like can also be avoided by adjusting the relevant parameters of integrity protection by the network side.

Based on this, an embodiment of the present application further provides a processing method for integrity protection, which is applied to a terminal, and includes:

sending first information to a network side; the first information indicates (also can be understood as a request) relevant parameters of the network side for adjusting the integrity protection.

In practical application, when the power consumption of the terminal is too high, exceeds the current capability, or enters an energy-saving mode, the terminal determines that first information needs to be sent to the network side, and the terminal can send the first information to the network side, at this time, the first information can request to reduce the network side integrity protection rate, can also request to adjust a network side integrity protection algorithm to reduce the processing capability of the terminal, and can also request to adjust the interval of data packets subjected to integrity protection by the network side to reduce the processing capability of the terminal.

Of course, after the terminal recovers from the above situations to a normal operating state, the terminal determines that the first information needs to be sent to the network side, and may send the first information to the network side, at this time, the first information may request to increase the network side integrity protection rate, may request to adjust the network side integrity protection algorithm to match the processing capability of the terminal, and may also request to adjust the interval of the data packet for integrity protection by the network side to match the processing capability of the terminal.

In an embodiment, the first information may be sent to the network side by one of the following methods:

PDCP PDU;

RRC signaling;

MAC CE;

and uplink physical layer resources.

In practical application, when the first information is sent to the network side through the PDCP PDU, that is, if the first information is sent to the network side through the PDCP PDU, the first information is in a header of the PDCP PDU or in a Data field (which may also be understood as a Data bit) of the PDCP PDU, and of course, the first information may be in other positions in the PDCP PDU.

Here, when the first information is in the header of the PDCP PDU, the second information may be set in a reserved bit (which may also be understood as a reserved field) as shown in fig. 2.

In a case where the first information is transmitted through a MAC CE, that is, if the first information is transmitted through a MAC CE, the MAC CE may be a newly defined MAC CE or an existing MAC CE, which is not limited in this embodiment of the present application.

In practical application, the uplink physical layer resource may include: and (4) UCI. The UCI may be carried in PUCCH or PUSCH.

Correspondingly, an embodiment of the present application further provides an integrity protection processing method, which is applied to a network device, and as shown in fig. 6, the method includes:

step 601: receiving first information sent by a terminal; the first information indicates (can be understood as a request) relevant parameters of network side adjustment integrity protection;

step 602: and adjusting the related parameters of integrity protection by using the first information.

In an embodiment, the first information sent by the terminal may be received by one of the following manners:

PDCP PDU;

RRC signaling;

MAC CE;

and (4) uplink physical resources.

Specifically, when the terminal sends the first information through a PDCP PDU, the network device receives the first information through the PDCP PDU; when the terminal sends the first information through RRC signaling, the network equipment receives the first information through RRC signaling; when the terminal sends the first information through the MAC CE, the network equipment receives the first information through the MAC CE; and when the terminal sends the first information through the uplink physical layer resource, the network equipment receives the first information through the uplink physical layer resource.

In practice, the related parameters of integrity protection may include an integrity protection rate, so that an adjustable integrity protection rate may be adjusted.

Based on this, in an embodiment, the adjusting the related parameters of integrity protection based on the first information includes:

based on the first information, an integrity protection rate is adjusted.

Wherein the first information may include at least one of:

a first integrity protection rate;

a difference between the current integrity protection rate and the first integrity protection rate;

and the first integrity protection speed corresponds to an integrity protection speed gear.

Here, in practical application, the terminal may instruct (may be understood as requesting) the network device to increase or decrease the integrity protection rate, and the network side may increase or decrease the integrity protection rate according to the instruction of the terminal.

In practical application, the related parameters of integrity protection may further include an integrity protection algorithm, so that the integrity protection algorithm may be adjusted.

Based on this, in an embodiment, the adjusting the integrity-protection related parameter by using the first information includes:

and adjusting the integrity protection algorithm by using a first integrity protection algorithm contained in the first information.

Here, in practical applications, when the terminal requests to reduce the integrity complexity, an integrity protection algorithm may be replaced to reduce the integrity protection complexity of the terminal. Of course, after the integrity algorithm is adjusted, when the terminal requests recovery, the network side may be requested to recover the integrity complexity, and at this time, the network device may adjust the integrity protection algorithm again.

In practical application, the related parameters of integrity protection may further include a packet interval for integrity protection, so that the packet interval for integrity protection adjustment may be adjusted.

Based on this, in an embodiment, the adjusting the integrity-protection related parameter by using the first information includes:

adjusting the interval of the data packets subjected to integrity protection to be N by utilizing the interval of the first data packets contained in the first information; n is an integer greater than or equal to zero.

Here, in practical application, when the terminal requests to reduce the integrity complexity, the data packet interval for integrity protection may be adjusted from 0 to 1, or may be adjusted to a larger data packet interval such as 2, so as to reduce the integrity protection complexity of the terminal. Of course, after the adjustment of the data packet interval for integrity protection, when the terminal requests recovery, the network side may be requested to recover the integrity complexity, and at this time, the network device may adjust the data packet interval for integrity protection again, for example, the data packet interval for integrity protection is adjusted from 1 to 0, that is, each data packet is integrity protected.

Since integrity protection is configured for each DRB, the network device may adjust the integrity protection related parameters for at least one DRB of the plurality of DRBs.

An embodiment of the present application provides a processing method for integrity protection, as shown in fig. 7, the method includes:

step 701: the terminal sends first information to the network equipment; the first information indicates a network side to adjust the related parameters of integrity protection;

step 702: and the network equipment adjusts the related parameters of integrity protection by using the first information.

It should be noted that: the specific processing procedures of the network device and the terminal have been described in detail above, and are not described in detail here.

According to the integrity protection processing method provided by the embodiment of the application, a terminal sends first information to network equipment; the first information indicates a network side to adjust the related parameters of integrity protection; the network equipment adjusts the related parameters of integrity protection based on the first information, and the terminal instructs the network side to adjust the related parameters of integrity protection of the network side, so that the occurrence of bad consequences such as data packet loss, integrity protection failure, even link terminal and the like caused by insufficient capability of the terminal can be avoided in time.

The present application will be described in further detail with reference to the following application examples.

Application embodiment 1

In the present embodiment, the communication system is provided with P integrity rate steps.

The terminal reports an integrity protection rate gear P of the terminal, wherein P is less than or equal to P, when the power consumption of the terminal is too high, or exceeds the current capability, or enters an energy-saving mode, and the like, the terminal sends a rate adjustment instruction to the network side for requesting to reduce the speed, and the instruction requests to adjust the integrity protection rate gear to q, wherein P is less than P. And after receiving the information, the network side sends first information to the terminal to indicate the terminal to adjust the integrity protection rate to q. Of course, the network side can also maintain the original rate, but cancel the user plane integrity protection.

Of course, the terminal may also send a rate adjustment indication to the network side for increasing the speed, and increase the gear of the integrity protection rate by p, for example, when the above situation disappears, that is, after an adverse consequence link, the speed may be increased.

Application example two

In this embodiment, the maximum integrity protection rates corresponding to different integrity protection algorithms are different. A higher integrity protection rate can be used by adjusting the integrity protection algorithm; alternatively, by replacing the integrity protection algorithm, less complexity is achieved while maintaining the same integrity protection rate.

When the terminal reports the related capacity of integrity protection, the rate corresponding to each integrity protection algorithm is reported, for example, the maximum rate which can be achieved by using the second integrity protection algorithm is A, and the maximum rate which can be achieved by using the third integrity protection algorithm is B. When the network side configures a second integrity protection algorithm for the terminal, ensuring that the rate does not exceed A; and when the network side configures a third integrity protection algorithm for the terminal, ensuring that the rate does not exceed B. Since the second integrity protection algorithm is more complex than the third integrity protection algorithm, a < B.

The network configures a second integrity protection algorithm for the terminal, uses the rate A, when the terminal runs badly, or the power consumption is too high, or the current capability is exceeded, or the terminal enters an energy-saving mode, and the like, the terminal sends an integrity protection algorithm replacement request (namely, sends second information) to the network side, and requests to change the algorithm into a third integrity protection algorithm, so as to reduce the complexity of integrity protection. Or when the terminal is overheated or the cache is overloaded, the network side sends an integrity protection algorithm change message to the terminal, and the integrity protection algorithm is changed into a second integrity protection algorithm.

In addition, when the network configures a second integrity protection algorithm for the terminal, the sending end and the receiving end can perform integrity protection on each data packet, and when the terminal runs badly, or has too high power consumption, or exceeds the current capability, or enters an energy-saving mode, and the like, the terminal can request the network side to adjust the integrity protection to 1 data packet at intervals for performing integrity protection, or to 2 or more data packets at intervals for performing integrity protection, so as to reduce the complexity of the integrity protection; or, when the above situation occurs, (without a terminal request), the network side actively sends an integrity protection configuration message to the terminal, and adjusts the integrity protection to be performed by 1 data packet at an interval, or to be performed by 2 or more data packets at an interval, so as to reduce the complexity of the integrity protection.

As can be seen from the above description, when the terminal performs integrity protection at a higher rate or at a full rate, it may cause that the terminal power consumption is too high, or the heat generation is too large, or the current maximum capability of the terminal is exceeded, and at this time, the terminal cannot maintain the current rate, and the terminal side sends the related capability related to integrity protection and the auxiliary indication message, so as to help the network side to adjust the related parameters of integrity protection in time, thereby avoiding the occurrence of adverse consequences such as data packet loss, integrity protection failure, even a link terminal, and the like.

In order to implement the method according to the embodiment of the present application, an embodiment of the present application further provides an integrity-protected processing apparatus, which is disposed on a first communication node, and as shown in fig. 8, the apparatus includes:

a first receiving unit 81, configured to receive first information sent by a second communication node;

an adjusting unit 82, configured to adjust a parameter related to integrity protection by using the received first information.

In an embodiment, the first receiving unit 81 is specifically configured to:

receiving first information sent by a second communication node through one of the following modes:

PDCP PDU;

RRC signaling;

MAC CE;

physical layer resources.

In an embodiment, the apparatus may further include:

a first sending unit, configured to send second information to a second communication node; the second information is used for instructing the second communication node to adjust a relevant parameter of integrity protection of the first communication node.

Here, the first sending unit is specifically configured to send the second information to the second communication node by one of the following manners:

PDCP PDU;

RRC signaling;

MAC CE;

physical layer resources.

In an embodiment, the adjusting unit 82 is specifically configured to perform at least one of the following operations:

adjusting an integrity protection rate by using the first information;

adjusting an integrity protection algorithm by using the first information;

and utilizing the first information to perform interval of data packets with integrity protection.

In an embodiment, the first sending unit is further configured to send capability information to a second communication node; the capability information indicates a capability related to integrity protection supported by the first communication node.

In an embodiment, the adjusting unit 82 is specifically configured to:

and adjusting the related parameters of the integrity protection aiming at least one DRB in the plurality of DRBs.

In practical application, the first receiving unit 81 and the first sending unit may be implemented by a communication interface in the integrity-protected processing device; the adjustment unit 82 may be implemented by a processor in an integrity protected processing device.

In order to implement the method at the second communication node side in the embodiment of the present application, an embodiment of the present application further provides a processing apparatus for integrity protection, which is disposed on the second communication node, and as shown in fig. 9, the apparatus includes:

a second sending unit 91, configured to send the first information to the first communication node; the first information is used for the first communication node to adjust the related parameters of integrity protection.

Wherein the second sending unit 91 has a function of sending the first information to the first communication node by one of:

PDCP PDU;

RRC signaling;

MAC CE;

physical layer resources.

In one embodiment, as shown in fig. 9, the apparatus may further include:

a second receiving unit 92, configured to receive second information sent by the first communication node; the second information is used for instructing the second communication node to adjust the related parameters of the integrity protection of the first communication node

The second sending unit 91 is configured to send the first information to the first communication node based on the second information.

In an embodiment, the second receiving unit 92 is specifically configured to receive the second information sent by the first communication node by one of the following manners:

PDCP PDU;

RRC signaling;

MAC CE;

physical layer resources.

In an embodiment, the second receiving unit 92 is further configured to receive capability information sent by the first communication node; the capability information indicates a capability related to integrity protection supported by the first communication node.

In practical applications, the second sending unit 91 and the second receiving unit 92 may be implemented by a processor in an integrity-protected processing device in combination with a communication interface.

It should be noted that: in the integrity-protected processing apparatus provided in the above embodiment, when performing the integrity protection processing, only the division of each program module is described as an example, and in practical applications, the processing may be distributed to different program modules according to needs, that is, the internal structure of the apparatus may be divided into different program modules to complete all or part of the processing described above. In addition, the integrity-protected processing apparatus and the integrity-protected processing method provided in the foregoing embodiments belong to the same concept, and specific implementation processes thereof are described in the method embodiments and are not described herein again.

Based on the hardware implementation of the program module, and in order to implement the method on the terminal side in the embodiment of the present application, an embodiment of the present application further provides a terminal, as shown in fig. 10, where the first communication node 100 includes:

a first communication interface 101 capable of performing information interaction with a second communication node;

the first processor 102 is connected to the first communication interface 101 to implement information interaction with the second communication node, and is configured to execute the method provided by one or more technical solutions of the first communication node side when running a computer program. And the computer program is stored on the first memory 103.

Specifically, the first communication interface 101 is configured to receive first information sent by a second communication node;

the first processor 102 is configured to adjust a parameter related to integrity protection by using the received first information.

In an embodiment, the first communication interface 101 is specifically configured to receive first information sent by a second communication node through one of the following manners:

PDCP PDU;

RRC signaling;

MAC CE;

physical layer resources.

In an embodiment, the first communication interface 101 is further configured to send second information to a second communication node; the second information is used for instructing the second communication node to adjust the related parameters of the integrity protection of the first communication node

In an embodiment, the first communication interface 101 is specifically configured to send the second information to the second communication node by one of the following methods:

PDCP PDU;

RRC signaling;

MAC CE;

physical layer resources.

In an embodiment, the first processor 102 is specifically configured to perform at least one of the following operations:

adjusting an integrity protection rate by using the first information;

adjusting an integrity protection algorithm by using the first information;

and utilizing the first information to perform interval of data packets with integrity protection.

In an embodiment, the first communication interface 101 is further configured to:

sending the capability information to the second communication node; the capability information indicates a capability related to integrity protection supported by the first communication node.

In an embodiment, the first processor 102 is specifically configured to:

and adjusting the related parameters of the integrity protection aiming at least one DRB in the plurality of DRBs.

It should be noted that: the specific processing procedures of the first processor 102 and the first communication interface 101 are detailed in the method embodiment, and are not described herein again.

Of course, in practice, the various components of the first communication node 100 are coupled together by the bus system 104. It is understood that the bus system 104 is used to enable communications among the components. The bus system 104 includes a power bus, a control bus, and a status signal bus in addition to a data bus. For clarity of illustration, however, the various buses are labeled as bus system 104 in fig. 10.

The first memory 103 in the embodiments of the present application is used to store various types of data to support the operation of the first communication node 100. Examples of such data include: any computer program for operating on the first communication node 100.

The method disclosed in the embodiment of the present application can be applied to the first processor 102, or implemented by the first processor 102. The first processor 102 may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be implemented by integrated logic circuits of hardware or instructions in the form of software in the first processor 102. The first Processor 102 may be a general purpose Processor, a Digital Signal Processor (DSP), or other programmable logic device, discrete gate or transistor logic device, discrete hardware components, etc. The first processor 102 may implement or perform the methods, steps and logic blocks disclosed in the embodiments of the present application. A general purpose processor may be a microprocessor or any conventional processor or the like. The steps of the method disclosed in the embodiments of the present application may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software module may be located in a storage medium located in the first memory 103, and the first processor 102 reads the information in the first memory 103 and completes the steps of the foregoing method in combination with its hardware.

In an exemplary embodiment, the first communication node 100 may be implemented by one or more Application Specific Integrated Circuits (ASICs), DSPs, Programmable Logic Devices (PLDs), Complex Programmable Logic Devices (CPLDs), Field Programmable Gate Arrays (FPGAs), general purpose processors, controllers, Micro Controllers (MCUs), microprocessors (microprocessors), or other electronic components for performing the aforementioned methods.

Based on the hardware implementation of the program module, and in order to implement the method on the second communication node side in the embodiment of the present application, as shown in fig. 11, the second communication node 110 includes:

a second communication interface 111, capable of performing information interaction with the first communication node;

and the second processor 112 is connected to the second communication interface 111 to implement information interaction with the first communication node, and is configured to execute the method provided by one or more technical solutions of the second communication node side when running a computer program. And the computer program is stored on the second memory 113.

Specifically, the second communication interface 111 is configured to send first information to a first communication node; the first information is used for the first communication node to adjust the related parameters of integrity protection.

In an embodiment, the second communication interface 111 is configured to send the first information to the first communication node by one of:

PDCP PDU;

RRC signaling;

MAC CE;

physical layer resources.

In an embodiment, the second communication interface 111 is further configured to receive second information sent by the first communication node; the second information is used for instructing the second communication node to adjust the related parameters of the integrity protection of the first communication node;

the second communication interface 111 is configured to send first information to the first communication node based on the second information.

In an embodiment, the second communication interface 111 is specifically configured to receive the second information sent by the first communication node by one of the following manners:

PDCP PDU;

RRC signaling;

MAC CE;

physical layer resources.

In an embodiment, the second communication interface 111 is further configured to receive capability information sent by the first communication node; the capability information indicates a capability related to integrity protection supported by the first communication node.

It should be noted that: the specific processing procedures of the second processor 112 and the second communication interface 111 are detailed in the method embodiment, and are not described herein again.

Of course, in practice, the various components in the second communication node 110 are coupled together by a bus system 114. It will be appreciated that the bus system 114 is used to enable communications among the components. The bus system 114 includes a power bus, a control bus, and a status signal bus in addition to a data bus. For clarity of illustration, however, the various buses are labeled as bus system 114 in FIG. 11.

The second memory 113 in the embodiments of the present application is used to store various types of data to support the operation of the second communication node 110. Examples of such data include: any computer program for operating on the second communication node 110.

The method disclosed in the embodiment of the present application can be applied to the second processor 112, or implemented by the second processor 112. The second processor 112 may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be implemented by integrated logic circuits of hardware or instructions in the form of software in the second processor 112. The second processor 112 described above may be a general purpose processor, a DSP, or other programmable logic device, discrete gate or transistor logic device, discrete hardware components, or the like. The second processor 112 may implement or perform the methods, steps and logic blocks disclosed in the embodiments of the present application. A general purpose processor may be a microprocessor or any conventional processor or the like. The steps of the method disclosed in the embodiments of the present application may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software module may be located in a storage medium located in the second memory 113, and the second processor 112 reads the information in the second memory 113 and, in conjunction with its hardware, performs the steps of the foregoing method.

The second communication node 110 may be implemented in an exemplary embodiment by one or more ASICs, DSPs, PLDs, CPLDs, FPGAs, general purpose processors, controllers, MCUs, microprocessors, or other electronic components for performing the aforementioned methods.

It is understood that the memories (the first memory 103 and the second memory 113) of the embodiments of the present application may be volatile memories or nonvolatile memories, and may include both volatile and nonvolatile memories. Among them, the nonvolatile Memory may be a Read Only Memory (ROM), a Programmable Read Only Memory (PROM), an Erasable Programmable Read-Only Memory (EPROM), an Electrically Erasable Programmable Read-Only Memory (EEPROM), a magnetic random access Memory (FRAM), a Flash Memory (Flash Memory), a magnetic surface Memory, an optical disk, or a Compact Disc Read-Only Memory (CD-ROM); the magnetic surface storage may be disk storage or tape storage. Volatile Memory can be Random Access Memory (RAM), which acts as external cache Memory. By way of illustration and not limitation, many forms of RAM are available, such as Static Random Access Memory (SRAM), Synchronous Static Random Access Memory (SSRAM), Dynamic Random Access Memory (DRAM), Synchronous Dynamic Random Access Memory (SDRAM), Double Data Rate Synchronous Dynamic Random Access Memory (DDRSDRAM), Enhanced Synchronous Dynamic Random Access Memory (ESDRAM), Enhanced Synchronous Dynamic Random Access Memory (Enhanced DRAM), Synchronous Dynamic Random Access Memory (SLDRAM), Direct Memory (DRmb Access), and Random Access Memory (DRAM). The memories described in the embodiments of the present application are intended to comprise, without being limited to, these and any other suitable types of memory.

To implement the method of the embodiment of the present application, an embodiment of the present application further provides an integrity-protected processing system, as shown in fig. 12, where the system includes: a first communication node 121 and a second communication node 122.

It should be noted that: the specific processing procedures of the first communication node 121 and the second communication node 122 have been described in detail above, and are not described herein again.

In an exemplary embodiment, the present application further provides a storage medium, specifically a computer storage medium, for example, a first memory 103 storing a computer program, which is executable by the first processor 102 of the first communication node 100 to perform the steps of the foregoing first communication node side method. For example, the second memory 113 may store a computer program, which may be executed by the second processor 112 of the second communication node 110 to perform the steps of the method at the second communication node side. The computer readable storage medium may be Memory such as FRAM, ROM, PROM, EPROM, EEPROM, Flash Memory, magnetic surface Memory, optical disk, or CD-ROM.

It should be noted that: "first," "second," and the like are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order.

The technical means described in the embodiments of the present application may be arbitrarily combined without conflict.

The above description is only a preferred embodiment of the present application, and is not intended to limit the scope of the present application.

32页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:一种基于数据信息的预警方法、装置、介质及电子设备

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!