This application pertains to the field of communications technologies, and specifically relates to a paging message processing method and apparatus, a communications device, and a readable storage medium.
In the related technology, a base station sends a paging message to a terminal (for example, a user equipment (UE)) through broadcast. Content of the paging message is sent in plaintext. If an unauthorized base station sends a paging message to indicate a terminal camping on the unauthorized base station to perform some operations (for example, falling back a fifth-generation mobile communications technology (5G) network to a fourth-generation mobile communications technology (4G) network based on an evolved packet system (EPS) fallback indicator), the terminal works based on an indication of the unauthorized base station. This leads to failure of related policies configured by an operator, and may even induce the UE to access the unauthorized base station, causing unpredictable losses to a user. Therefore, security of a paging process in the related technology is relatively low.
According to a first aspect, a paging message processing method is provided, including:
According to a second aspect, a paging message processing method is provided, including:
According to a third aspect, a paging message processing method is provided, including:
According to a fourth aspect, a paging message processing apparatus is provided, including:
According to a fifth aspect, a paging message apparatus is provided, including:
According to a sixth aspect, a paging message processing apparatus is provided, including:
According to a seventh aspect, a communications device is provided, including a processor and a memory, where the memory stores a program or instructions capable of running on the processor, and the program or instructions are executed by the processor to implement the steps of the method according to the first aspect, the second aspect, or the third aspect.
According to an eighth aspect, a readable storage medium is provided, where the readable storage medium stores a program or instructions, and the program or the instructions are executed by a processor to implement the steps of the method according to the first aspect, the second aspect, or the third aspect.
According to a ninth aspect, a chip is provided, where the chip includes a processor and a communications interface, the communications interface is coupled to the processor, the processor is configured to run a program or instructions to implement the steps of the method according to the first aspect, the second aspect, or the third aspect.
According to a tenth aspect, a computer program/program product is provided, where the computer program/program product is stored in a non-transitory storage medium, and the program/program product is executed by at least one processor to implement the steps of the method according to the first aspect, the second aspect, or the third aspect.
According to an eleventh aspect, a communications system is provided, where the communications system includes a terminal and a network-side device, the terminal is configured to perform the steps of the method according to the first aspect, and the network-side device is configured to perform the steps of the method according to the second aspect or the third aspect.
The following clearly describes technical solutions in embodiments of this application with reference to accompanying drawings in the embodiments of this application. Clearly, the described embodiments are merely some rather than all of the embodiments of this application. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments of this application shall fall within the protection scope of this application.
Terms “first”, “second”, and the like in the specification and claims of this application are used to distinguish between similar objects without having to describe a specific order or sequence. It should be understood that, terms used in this way may be interchangeable under appropriate circumstances, so that the embodiments of this application can be implemented in an order other than that illustrated or described herein. Moreover, the terms “first” and “second” typically distinguish between objects of one category rather than limiting a quantity of objects. For example, a first object may be one object or a plurality of objects. In addition, in the specification and claims, “and/or” represents at least one of connected objects, and the character “/” generally represents an “or” relationship between associated objects.
It should be noted that, a technology described in embodiments of this application is not limited to a long term evolution (LTE)/LTE-advanced (LTE-A) system, and may be further applied to other wireless communications systems, such as a code division multiple access (CDMA) system, a time division multiple access (TDMA) system, a frequency division multiple access (FDMA) system, an orthogonal frequency division multiple access (OFDMA) system, a single-carrier frequency division multiple access (SC-FDMA) system, and another system. The terms “system” and “network” are often used interchangeably in the embodiments of this application. A technology described may be used for the systems and radio technologies described above, as well as other systems and radio technologies. The following describes a new radio (NR) system for illustrative purposes, and NR terms are used in most of the following descriptions. However, these technologies may also be applicable to applications such as a 6th generation (6G) communications system other than NR system applications.
To facilitate understanding of the implementations of this application, the following technical points are first described below.
As shown in
The related technology discloses a method for digitally signing the system information. However, there is no encryption requirement for the system information, and integrity protection is mainly performed. Therefore, a mechanism for whether to encrypt a paging message and/or perform integrity protection on the paging message and how to encrypt a paging message and/or perform integrity protection on the paging message is unclear.
A network pages one or more UEs by using the paging message. One paging message includes at least one paging record, and each paging record corresponds to paging of one UE, and may carry the following information:
The terminal 21 may be a mobile phone, a tablet personal computer, a laptop computer or referred to as a notebook computer, a personal digital assistant (PDA), a palmtop computer, a netbook, an ultra-mobile personal computer (UMPC), a mobile internet device (MID), an augmented reality (AR)/virtual reality (VR) device, a robot, a wearable device, vehicle user equipment (VUE), pedestrian user equipment (PUE), a smart home (a home device with a wireless communications function, such as a refrigerator, a television, a laundry machine, or a furniture), a gaming console, a personal computer (PC), a teller machine, a self-service machine, or another terminal-side device. The wearable device includes: a smart watch, a smart band, a smart headset, smart glasses, smart jewelry (a smart bracelet, a smart chain bracelet, a smart ring, a smart necklace, a smart anklet, a smart chain anklet, and the like), a smart wrist strap, smart clothing, and the like. In addition to the foregoing terminal device, the terminal in this application may also be a chip in the terminal, such as a modem chip or a system on chip (SoC). It should be noted that a specific type of the terminal 21 is not limited in this embodiment of this application.
The network-side device 22 may include an access network device or a core network device. The access network device may also be referred to as a radio access network device, a radio access network (RAN), a radio access network function, or a radio access network unit. The access network device 12 may include a base station, a wireless local area network (WLAN) access point, a WiFi node, or the like. The base station may be referred to as a NodeB, an evolved NodeB (eNB), an access point, a base transceiver station (BTS), a radio base station, a radio transceiver, a basic service set (BSS), an extended service set (ESS), a home NodeB, a home evolved NodeB, a transmission reception point (TRP), or another appropriate term in the field. Provided that same technical effects are achieved, the base station is not limited to a specific technical term. It should be noted that in the embodiments of this application, only a base station in an NR system is used as an example for description, and a specific type of the base station is not limited.
The core network device may include but is not limited to at least one of the following: a core network node, a core network function, a mobility management entity (MME), an access and mobility management function (AMF), a session management function (SMF), a user plane function (UPF), a policy control function (PCF), a policy and charging rules function (PCRF) unit, an edge application service discovery function (EASDF), unified data management (UDM), a unified data repository (UDR), a home subscriber server (HSS), a centralized network configuration (CNC), a network repository function (NRF), a network exposure function (NEF), a local NEF (Local NEF or L-NEF), a binding support function (BSF), an application function (AF), and the like. It should be noted that in the embodiments of this application, only a core network device in the NR system is used as an example for description, and a specific type of the core network device is not limited.
With reference to the accompanying drawings, a paging message processing method and apparatus, a communications device, and a readable storage medium that are provided in the embodiments of this application are described in detail by using some embodiments and application scenarios thereof.
Referring to
Step 301: A terminal sends capability information related to security protection of a paging message.
For example, the terminal sends the capability information to a core network device or a serving base station. The core network device includes but is not limited to an AMF.
Step 302: The terminal receives configuration information, where the configuration information is used to enable or disable security protection for the paging message.
For example, the terminal may receive the configuration information from the core network device or the serving base station. The core network device or the serving base station may separately send corresponding configuration information to each terminal based on capability information reported by the terminal, so that security protection at a per-terminal (per UE) level can be implemented.
Optionally, security protection includes encryption and/or digital signing.
In this embodiment, security protection is performed on the paging message through negotiation between the terminal and the network-side device by using step 301 and step 302, thereby effectively improving paging security.
In an implementation of this application, the method further includes the following:
The terminal sends an acknowledgement message in response to the configuration information.
In an implementation of this application, the capability information includes at least one of the following:
In an implementation of this application, the configuration information is used to perform at least one of the following operations:
In an implementation of this application, the configuration information includes enabling the encryption function for the paging message, and the configuration information further includes at least one of the following:
In an implementation of this application, the first input parameter includes partial information carried in a paging record of the terminal, for example, the information may be any combination of a paging Cause and an access Type. With the first input parameter, security protection may be implemented on partial content specified in the paging message.
In an implementation of this application, the configuration information includes enabling the digital signature function for the paging message, and the configuration information further includes at least one of the following:
In an implementation of this application, the second input parameter includes any one of the following:
In an implementation of this application, the method further includes the following:
The terminal receives the paging message; and
In this embodiment, the terminal may determine the content of the paging message by using the capability information of the terminal and/or the configuration information, to verify validity of the base station.
In an implementation of this application, that the terminal determines content of the paging message based on the capability information of the terminal and/or the configuration information includes the following:
In a case that the configuration information includes enabling the encryption function for the paging message, the terminal determines that a paging record in the paging message includes at least one of the following: (1) a plaintext part of the paging record and (2) an encrypted part of the paging record.
In an implementation of this application, that the terminal determines content of the paging message based on the capability information of the terminal and/or the configuration information includes any one of the following:
In an implementation of this application, the digital signature corresponding to the paging record of the terminal is determined based on the encrypted paging record, or the digital signature corresponding to the paging message is determined based on the encrypted paging message.
In this embodiment of this application, security protection is performed on paging information, thereby reducing adverse impact of an unauthorized base station on the terminal, and improving paging security.
Referring to
Step 401: A network-side device receives capability information that is of a terminal and that is related to security protection of a paging message.
Step 402: The network-side device sends configuration information to the terminal, where the configuration information is used to enable or disable security protection for the paging message.
In an implementation of this application, the method further includes the following:
The network-side device receives an acknowledgement message sent by the terminal in response to the configuration information.
In an implementation of this application, the network-side device includes a core network device, and the method further includes the following:
The network-side device sends the configuration information to a first base station and/or at least one second base station.
The first base station includes a serving base station of the terminal, and the at least one second base station includes a base station to which a radio access network notification area (RNA) configuration or a tracking area (TA) configuration of the terminal belongs.
In an implementation of this application, that the network-side device sends the configuration information to a first base station and/or at least one second base station includes the following:
When the network-side device successfully receives the acknowledgement message, or when the network-side device pages the terminal, the network-side device sends the configuration information to the first base station and/or the at least one second base station.
In an implementation of this application, the method further includes the following:
When the network-side device fails to receive the acknowledgement message sent by the terminal in response to the configuration information, or when the network-side device pages the terminal, the network-side device sends indication information to the first base station and/or the at least one second base station, where the indication information is used to indicate not to enable security protection for the paging message of the terminal.
In an implementation of this application, the network-side device includes a first base station, the first base station includes a serving base station of the terminal, and the method further includes the following:
The network-side device sends the configuration information to at least one second base station, where the at least one second base station includes a base station to which a radio access network notification area RNA configuration or a tracking area TA configuration of the terminal belongs.
In an implementation of this application, that the network-side device sends the configuration information to at least one second base station includes the following:
When the network-side device successfully receives the acknowledgement message sent by the terminal in response to the configuration information, or when the network-side device pages the terminal, the network-side device sends the configuration information to the at least one second base station.
In an implementation of this application, the method further includes the following:
When the network-side device fails to receive the acknowledgement message sent by the terminal in response to the configuration information, or when the network-side device pages the terminal, the network-side device sends indication information to the at least one second base station, where the indication information is used to indicate not to enable security protection for the paging message of the terminal.
In an implementation of this application, the network-side device is a first base station, the first base station includes a serving base station of the terminal, and before the network-side device sends the configuration information to the terminal, the method further includes the following:
The network-side device sends the capability information to a core network device; and
In an implementation of this application, the network-side device is a first base station, and the method further includes the following:
The network-side device determines whether to enable security protection for the paging message of the terminal;
In an implementation of this application, that the network-side device determines whether to enable security protection for the paging message includes at least one of the following:
The network-side device sequentially determines, based on a sending sequence of paging records in the paging message, whether to enable security protection for the paging message; and
In an implementation of this application, that the network-side device determines content of the paging message based on a case that security protection is enabled includes the following:
The network-side device determines, in a case that an encryption function is enabled, that a paging record in the paging message includes at least one of the following:
In an implementation of this application, that the network-side device determines, based on a case that security protection is enabled, that a paging record in the paging message includes an encrypted part of the paging record includes at least one of the following:
The network-side device receives the encrypted part that is of the paging record and that is sent by a core network device; and
In an implementation of this application, that the network-side device determines content of the paging message based on a case that security protection is enabled includes any one of the following:
In an implementation of this application, the digital signature corresponding to the paging record of the terminal is determined based on the encrypted paging record.
In an implementation of this application, the method further includes the following:
The network-side device determines that the paging message includes a digital signature corresponding to the paging message; and
In an implementation of this application, the digital signature corresponding to the paging message is determined based on the encrypted paging message.
In an implementation of this application, the capability information includes at least one of the following:
In an implementation of this application, the configuration information is used to perform at least one of the following operations:
In an implementation of this application, the configuration information includes enabling the encryption function for the paging message, and the configuration information further includes at least one of the following:
In an implementation of this application, the configuration information includes enabling the digital signature function for the paging message, and the configuration information further includes at least one of the following:
In an implementation of this application, the first input parameter includes:
In an implementation of this application, the second input parameter includes any one of the following:
In the embodiments of this application, security protection is performed on the paging message through negotiation between the terminal and the network-side device, thereby reducing adverse impact of an unauthorized base station on the terminal, and improving paging security.
Referring to
Step 501: A third base station determines that a paging record in a paging message includes a digital signature corresponding to the paging message.
Step 502: The third base station sends the paging message.
Alternatively,
Step 503: A third base station determines whether to enable security protection for a paging message.
Step 504: The third base station determines content of the paging message based on a case that security protection is enabled or disabled.
Step 505: The third base station sends the paging message.
It may be understood that, when determining the content of the paging message, the third base station may determine the content of the paging message based on configuration information.
In an implementation of this application, that a third base station determines whether to enable security protection for a paging message includes at least one of the following:
The third base station sequentially determines, based on a sending sequence of paging records in the paging message, whether to enable security protection for the paging message; and
In an implementation of this application, that the third base station determines content of the paging message based on a case that security protection is enabled includes the following:
The third base station determines, in a case that an encryption function is enabled, that a paging record in the paging message includes at least one of the following:
In an implementation of this application, the third base station includes a first base station, the first base station includes a serving base station of the terminal, and that the third base station determines that a paging record in the paging message includes an encrypted part of the paging record includes at least one of the following:
The third base station receives the encrypted part that is of the paging record and that is sent by a core network device, where an encryption operation on the encrypted part of the paging record is performed by the core network device; and
In an implementation of this application, the third base station includes a second base station, the second base station includes a base station to which an RNA configuration or a TA configuration of the terminal belongs, and that the third base station determines that a paging record in the paging message includes an encrypted part of the paging record includes the following:
The third base station receives the encrypted part that is of the paging record and that is sent by an anchor base station of the terminal, where an encryption operation on the encrypted part of the paging record is performed by the anchor base station.
The anchor base station of the terminal includes a first base station.
In an implementation of this application, that the third base station determines, in a case that security protection is enabled, content of the paging message based on a case that security protection is enabled includes any one of the following:
In a case that a digital signature function is enabled, the third base station determines that a paging record in the paging message includes a digital signature corresponding to a paging record of the terminal; and
In an implementation of this application, the digital signature corresponding to the paging record of the terminal is determined based on the encrypted paging record.
In an implementation of this application, the digital signature corresponding to the paging message is determined based on the encrypted paging message.
In an implementation of this application, before a third base station determines whether to enable security protection for a paging message of a terminal, the method further includes the following:
The third base station receives configuration information, where the configuration information is used to enable or disable security protection for the paging message.
In an implementation of this application, the configuration information is used to perform at least one of the following operations:
In an implementation of this application, in a case that the configuration information includes enabling the encryption function for the paging message, the configuration information further includes at least one of the following:
In an implementation of this application, in a case that the configuration information includes enabling the digital signature function for the paging message, the configuration information further includes at least one of the following:
In an implementation of this application, the first input parameter includes: partial information carried in a paging record of the terminal.
In an implementation of this application, the second input parameter includes any one of the following:
In this embodiment, the third base station may send, to the terminal, the paging message including the digital signature or the paging message determined based on a case that security protection is enabled or disabled, so that the terminal can determine the content of the paging message by using the capability information of the terminal and/or configuration information, to verify validity of the base station, thereby reducing adverse impact of an unauthorized base station on the terminal, and improving paging security.
Embodiment 1: A negotiation procedure between a network-side device and a UE for whether and how to perform security protection on a paging message.
Example 1: The network-side device is a core network device (for example, an AMF) that serves the UE, and negotiation for security protection is implemented based on a non-access stratum (NAS) procedure. Example 1 is applicable to core network (CN) paging in a radio resource control (RRC) idle state and radio access network (RAN) paging in an inactive state.
Step 1: The UE sends, to the core network device, capability information for performing security protection on a paging message, where the capability information may include at least one of the following:
Step 2: The core network device sends, to the UE, configuration information for performing security protection on the paging message, where the configuration information may be used to perform at least one of the following operations:
Optionally, step 2-1: In a case that the configuration information includes enabling the encryption function for the paging message, the configuration information may further include at least one of the following:
Optionally, step 2-2: In a case that the configuration information includes enabling the digital signature function for the paging message, the configuration information may further include at least one of the following:
The second input parameter may include any one of the following:
Step 3: The UE sends, to the core network device, an acknowledgement message of the configuration information for performing security protection on the paging message.
Optionally, step 3-1: In a case that the core network device successfully receives the acknowledgement message of the UE, the core network device forwards the configuration information to a first base station and at least one second base station, so that the at least one second base station enables security protection for the paging message of the UE based on the configuration information.
The first base station is a serving base station.
Optionally, the at least one second base station may be a base station to which a TA configuration of the UE belongs (for CN Paging in an RRC idle state) or a base station to which an RNA configuration of the UE belongs (for RAN Paging in an RRC inactive state).
Optionally, when successfully receiving the acknowledgement message or at a moment of Paging the terminal, the core network device may forward the configuration information to the at least one second base station.
Optionally, step 3-2: In a case that the core network device fails to receive the acknowledgement message of the UE, the core network device determines that the configuration information fails. Further, the core network device may send indication information to at least one second base station, where the indication information is used to indicate not to enable security protection for the paging message of the UE, so that the at least one second base station does not enable security protection for the paging message of the UE.
Optionally, the at least one second base station is a base station to which an RNA configuration of the UE belongs (for CN Paging in an RRC idle state) or a base station to which a TA configuration of the UE belongs (for RAN Paging in an RRC INACTIVE state).
Optionally, the core network device may send the indication information to at least one base station at a Paging moment.
Example 2: The network-side device is a first base station (namely, a first base station) that serves the UE, and negotiation for security protection is implemented based on an RRC procedure.
Step 1: The UE sends, to the first base station, capability information for performing security protection on a paging message, where the capability information may include at least one of the following:
Optionally, after step 1, before step 2 is performed, the first base station forwards the capability information of the UE to a core network device, and receives, from the core network device, configuration information for performing security protection on the paging message.
Step 2: The first base station sends, to the UE, configuration information for performing security protection on the paging message, where the configuration information may be used to perform at least one of the following operations:
Optionally, step 2-1: In a case that the configuration information includes enabling the encryption function for the paging message, the configuration information may further include at least one of the following:
Optionally, step 2-2: In a case that the configuration information includes enabling the digital signature function for the paging message, the configuration information may further include at least one of the following:
The second input parameter may include any one of the following:
Step 3: The UE sends, to the first base station, an acknowledgement message of the configuration information for performing security protection on the paging message.
Optionally, step 3-1: In a case that the first base station successfully receives the acknowledgement message of the UE, the first base station forwards the configuration information to at least one second base station, so that the at least one second base station enables security protection for the paging message of the UE based on the configuration information.
Optionally, the at least one second base station is a base station to which an RNA configuration of the UE belongs (for RAN Paging in an RRC inactive state).
Optionally, when successfully receiving the acknowledgement message of the UE or at a moment of Paging the terminal, for example, when initiating RAN Paging on the UE, the first base station may forward the configuration information to the at least one second base station.
Optionally, step 3-2: In a case that the first base station fails to receive the acknowledgement message of the UE, the first base station determines that the configuration information fails. Further, the first base station may send indication information to at least one second base station, where the indication information is used to indicate not to enable security protection for the paging message of the UE, so that the at least one second base station does not enable security protection for the paging message of the UE.
Optionally, the at least one second base station is a base station to which an RNA configuration of the UE belongs (for RAN Paging in an RRC INACTIVE state).
Optionally, the first base station may send the indication information to at least one base station at a Paging moment.
Embodiment 2: Content and a sending manner of a Paging message.
Step 1: A third base station sequentially determines, based on a sending sequence of PagingRecords in a paging message, whether security protection is enabled for a paging message of each UE, and determines specific content of the paging message.
The third base station may include a first base station or a second base station. The first base station includes a serving base station of the terminal, and the second base station includes a base station to which an RNA configuration or a TA configuration of the terminal belongs.
Optionally, step 1-1: In a case that the encryption function is enabled for the paging message of the UE, a PagingRecord of the UE includes at least one of the following:
Further, in a case that the PagingRecord of the UE includes the encrypted part, any one of the following is further included:
An encryption operation is performed by a core network device, and then the encrypted PagingRecord is sent to the first base station (applicable to a case that the paging message is CN paging);
It should be noted that a setting sequence of the plaintext part and the encrypted part is not limited in the PagingRecord. In the PagingRecord, the plaintext part may be first set, and then the encrypted part is set, that is, the plaintext part is first sent, and then the ciphertext part is sent, for example, a PagingRecord {UE ID in plaintext; ciphertext obtained through joint encryption based on paging Cause and access Type}.
In the PagingRecord, the encrypted part may be first set, and then the plaintext part is set, that is, the ciphertext part is first sent, and then the plaintext part is sent, for example, a PagingRecord {ciphertext obtained through joint encryption based on paging Cause and access Type; UE ID in plaintext}.
It should be noted that the encrypted part of the PagingRecord may be obtained through joint encryption, or the encrypted part of the PagingRecord may be obtained through separate encryption, for example:
Optionally, step 1-2: In a case that the digital signature function (a signature per UE) is enabled for paging of the UE, a PagingRecord of the UE includes a DS corresponding to the PagingRecord of the UE (corresponding to step 2-2 in Embodiment 1).
The DS is calculated by using the encrypted PagingRecord, that is, a transmit end needs to perform encryption before performing signature.
For example, the paging message is {PagingRecord 1, PagingRecord 2, . . . , PagingRecord N}.
The PagingRecord 1 corresponds to a UE 1, the PagingRecord 2 corresponds to a UE 2, . . . , and the PagingRecord N corresponds to a UE N.
In a case that the digital signature is enabled for a specific UE, such as the UE 1 and the UE 2, the Paging message is {{PagingRecord 1, DS1}, {PagingRecord 2, DS2}, . . . , PagingRecord N}.
Optionally, step 1-3: In a case that the digital signature function (a signature per Paging message) is enabled for paging of the UE, the Paging message includes at least one of the following: a DS corresponding to the paging message (corresponding to step 2-2 in Embodiment 1).
The DS is calculated by using the encrypted Paging message, that is, a transmit end needs to perform encryption before performing signature.
For example, the Paging message is {PagingRecord 1, PagingRecord 2, . . . , PagingRecord N}.
The PagingRecord 1 corresponds to a UE 1, the PagingRecord 2 corresponds to a UE 2, . . . , and the PagingRecord N corresponds to a UE N.
In a case that the digital signature function is enabled for paging of the UE, the Paging message is {PagingRecord 1, PagingRecord 2, . . . , PagingRecord N, DS}. That is, the UE 1, the UE 2, . . . , the UE N verifies the Paging message based on a same DS.
Step 2: Send the Paging message based on content in steps 1-1, 1-2, and 1-3.
Optionally, content related to the DS may also be separately sent in another paging message.
For example, there are two paging messages, so that paging with the DS and paging without the DS can separately sent.
The Paging message is {PagingRecord 1, PagingRecord 2, . . . , PagingRecord N}.
The PagingRecord 1 corresponds to a UE 1, the PagingRecord 2 corresponds to a UE 2, . . . , and the PagingRecord N corresponds to a UE N.
If the digital signature is enabled only for a specific UE, such as the UE 1 and the UE 2, and the digital signature is not enabled for another UE, the UE for which the digital signature is not enabled and the UE for which the digital signature is enabled separately perform sending.
A Paging message 1 is {PagingRecord 3, . . . , PagingRecord N}.
A Paging message 2 is {{PagingRecord 1, DS1}, {PagingRecord 2, DS2}}.
Referring to
In an implementation of this application, the apparatus further includes:
In an implementation of this application, the capability information includes at least one of the following:
In an implementation of this application, the configuration information is used to perform at least one of the following operations:
In an implementation of this application, the configuration information includes enabling the encryption function for the paging message, and the configuration information further includes at least one of the following:
In an implementation of this application, the configuration information includes enabling the digital signature function for the paging message, and the configuration information further includes at least one of the following:
In an implementation of this application, the first input parameter includes partial information carried in a paging record of the terminal.
In an implementation of this application, the second input parameter includes any one of the following:
In an implementation of this application, the apparatus further includes:
In an implementation of this application, the first determining module is further configured to:
In an implementation of this application, the first determining module is further configured to perform any one of the following operations:
In an implementation of this application, the digital signature corresponding to the paging record of the terminal is determined based on the encrypted paging record, or the digital signature corresponding to the paging message is determined based on the encrypted paging message.
The apparatus provided in this embodiment of this application can implement processes implemented in the method embodiment in
Referring to
In an implementation of this application, the apparatus 700 further includes:
In an implementation of this application, the network-side device includes a core network device, and the apparatus 700 further includes:
The first base station includes a serving base station of the terminal, and the at least one second base station includes a base station to which a radio access network notification area RNA configuration or a tracking area TA configuration of the terminal belongs.
In an implementation of this application, the fourth sending module is further configured to:
In an implementation of this application, the fourth sending module is further configured to:
In an implementation of this application, the network-side device includes a first base station, the first base station includes a serving base station of the terminal, and the apparatus further includes:
In an implementation of this application, the fifth sending module is further configured to:
In an implementation of this application, the apparatus further includes:
In an implementation of this application, the network-side device is a first base station, the first base station includes a serving base station of the terminal, and the apparatus further includes:
In an implementation of this application, the network-side device is the first base station, and the apparatus further includes:
In an implementation of this application, the first determining module is further configured to perform at least one of the following operations:
In an implementation of this application, the second determining module is further configured to:
In an implementation of this application, the second determining module includes at least one of the following:
In an implementation of this application, the second determining module is further configured to perform any one of the following operations:
In an implementation of this application, the digital signature corresponding to the paging record of the terminal is determined based on the encrypted paging record.
In an implementation of this application, the apparatus further includes:
In an implementation of this application, the digital signature corresponding to the paging message is determined based on the encrypted paging message.
In an implementation of this application, the capability information includes at least one of the following:
In an implementation of this application, the configuration information is used to perform at least one of the following operations:
In an implementation of this application, the configuration information includes enabling the encryption function for the paging message, and the configuration information further includes at least one of the following:
In an implementation of this application, the configuration information includes enabling the digital signature function for the paging message, and the configuration information further includes at least one of the following:
In an implementation of this application, the first input parameter includes:
In an implementation of this application, the second input parameter includes any one of the following:
The apparatus provided in this embodiment of this application can implement processes implemented in the method embodiment in
Referring to
The fourth determining module 801 is configured to determine that a paging record in a paging message includes a digital signature corresponding to the paging message.
The tenth sending module 802 is configured to send the paging message.
Alternatively, the second determining module 803 is configured to determine whether to enable security protection for a paging message.
The fifth determining module 804 is configured to determine content of the paging message based on a case that security protection is enabled or disabled.
The eleventh sending module 805 is configured to send the paging message.
In an implementation of this application, the second determining module 803 is further configured to perform at least one of the following operations:
In an implementation of this application, the fifth determining module 804 is further configured to:
In an implementation of this application, the third base station includes a first base station, the first base station includes a serving base station of the terminal, and the fifth determining module 804 includes at least one of the following:
In an implementation of this application, the third base station includes a second base station, the second base station includes a base station to which an RNA configuration or a TA configuration of the terminal belongs, and the fifth determining module 804 includes:
The anchor base station of the terminal includes a first base station.
In an implementation of this application, the fifth determining module 804 is further configured to perform any one of the following operations:
In an implementation of this application, the digital signature corresponding to the paging record of the terminal is determined based on the encrypted paging record.
In an implementation of this application, the digital signature corresponding to the paging message is determined based on the encrypted paging message.
In an implementation of this application, the apparatus further includes:
In an implementation of this application, the configuration information is used to perform at least one of the following operations:
In an implementation of this application, in a case that the configuration information includes enabling the encryption function for the paging message, the configuration information further includes at least one of the following:
In an implementation of this application, in a case that the configuration information includes enabling the digital signature function for the paging message, the configuration information further includes at least one of the following:
In an implementation of this application, the first input parameter includes: partial information carried in a paging record of the terminal.
In an implementation of this application, the second input parameter includes any one of the following:
The apparatus provided in this embodiment of this application can implement processes implemented in the method embodiment in
A person skilled in the art may understand that, the terminal 900 may further include a power supply (for example, a battery) that supplies power to each component. The power supply may be logically connected to the processor 910 by using a power management system, so as to implement functions such as charging management, discharging management, and power consumption management by using the power management system. The structure of the terminal shown in
It should be understood that, in this embodiment of this application, the input unit 904 may include a graphics processing unit (GPU) 9041 and a microphone 9042. The graphics processing unit 9041 processes image data of a still picture or a video obtained by an image capture apparatus (such as a camera) in a video capture mode or an image capture mode. The display unit 906 may include a display panel 9061, and the display panel 9061 may be configured in a form of a liquid crystal display, an organic light-emitting diode, or the like. The user input unit 907 includes at least one of a touch panel 9071 or another input device 9072. The touch panel 9071 is also referred to as a touchscreen. The touch panel 9071 may include two parts: a touch detection apparatus and a touch controller. The another input device 9072 may include but is not limited to a physical keyboard, a function key (such as a volume control key or an on/off key), a trackball, a mouse, and an operating lever. Details are not described herein again.
In this embodiment of this application, after receiving downlink data from a network-side device, the radio frequency unit 901 may transmit the downlink data to the processor 910 for processing. In addition, the radio frequency unit 901 may send uplink data to a network-side device. Generally, the radio frequency unit 901 includes but is not limited to an antenna, an amplifier, a transceiver, a coupler, a low-noise amplifier, a duplexer, and the like.
The memory 909 may be configured to store a software program or instructions and various types of data. The memory 909 may mainly include a first storage area for storing a program or instructions and a second storage area for storing data. The first storage area may store an operating system, an application program or instructions required by at least one function (for example, a sound play function or an image play function), and the like. In addition, the memory 909 may include a volatile memory or a non-volatile memory, or the memory 909 may include both a volatile memory and a non-volatile memory. The non-volatile memory may be a read-only memory (ROM), a programmable read-only memory (PROM), an erasable programmable read-only memory (EPROM), an electrically erasable programmable read-only memory (EEPROM), or a flash memory. The volatile memory may be a random access memory (RAM), a static random access memory (SRAM), a dynamic random access memory (DRAM), a synchronous dynamic random access memory (SDRAM), a double data rate synchronous dynamic random access memory (DDRSDRAM), an enhanced synchronous dynamic random access memory (ESDRAM), a synch link dynamic random access memory (SLDRAM), and a direct rambus random access memory (DRRAM). The memory 909 in this embodiment of this application includes but is not limited to these memories and any other suitable type of memory.
The processor 910 may include one or more processing units. Optionally, the processor 910 integrates an application processor and a modem processor. The application processor mainly processes operations related to an operating system, a user interface, an application program, and the like. The modem processor, such as a baseband processor, mainly processes a wireless communication signal. It may be understood that, the foregoing modem processor may not be integrated into the processor 910.
The terminal provided in this embodiment of this application can implement processes implemented in the method embodiment in
In an embodiment of the present invention, the communications device 1000 further includes a program stored in the memory 1003 and capable of running on the processor 1001. The program is executed by the processor 1001 to implement the steps in the method shown in
In
Optionally, as shown in
An embodiment of this application further provides a readable storage medium. The readable storage medium stores a program or instructions. The program or the instructions are executed by a processor to implement the method in
The processor is a processor in the terminal in the foregoing embodiments. The readable storage medium may be non-volatile, or may be non-transitory. The readable storage medium may include a computer-readable storage medium, such as a computer read-only memory ROM, a random access memory RAM, a magnetic disk, or an optical disc.
An embodiment of this application further provides a chip. The chip includes a processor and a communications interface. The communications interface is coupled to the processor. The processor is configured to run a program or instructions to implement the processes shown in
It should be understood that, the chip mentioned in this embodiment of this application may also be referred to as a system-level chip, a system chip, a chip system, or a system on chip.
An embodiment of this application further provides a computer program/program product. The computer program/program product is stored in a storage medium. The computer program/program product is executed by at least one processor to implement the processes shown in
An embodiment of this application further provides a communications system. The communications system includes a terminal and a network-side device. The terminal is configured to execute the processes in
It should be noted that in this specification, the term “comprise”, “include”, or any of their variants are intended to cover a non-exclusive inclusion, so that a process, a method, an article, or an apparatus that includes a list of elements not only includes those elements but also includes other elements that are not expressly listed, or further includes elements inherent to such process, method, article, or apparatus. Without more constraints, an element preceded by “includes a . . . ” does not preclude the existence of additional identical elements in the process, method, article, or apparatus that includes the element. In addition, it should be noted that, the scope of the method and apparatus in the implementations of this application is not limited to performing functions in a sequence shown or discussed, and may further include performing functions in a basically simultaneous manner or in a reverse order based on the functions involved. For example, the described method may be performed in an order different from the order described, and various steps may be added, omitted, or combined. In addition, features described with reference to some examples may be combined in other examples.
According to the foregoing descriptions of the implementations, a person skilled in the art may clearly understand that the method in the foregoing embodiments may be implemented by software and a necessary general-purpose hardware platform, or certainly may be implemented by hardware. However, in many cases, the former is a better implementation. Based on such an understanding, the technical solutions of this application essentially or the part contributing to the related technologies can be embodied in a form of a computer software product. The computer software product is stored in a storage medium (such as a ROM/RAM, a magnetic disk, or an optical disc), and includes several instructions for enabling a terminal (which may be a mobile phone, a computer, a server, an air conditioner, a network device, or the like) to perform the method described in the embodiments of this application.
The foregoing describes the embodiments of this application with reference to the accompanying drawings. However, this application is not limited to the foregoing specific embodiments. The foregoing specific embodiments are merely illustrative rather than restrictive. Inspired by this application, a person of ordinary skill in the art may develop many other manners without departing from principles of this application and the protection scope of the claims, and all such manners fall within the protection scope of this application.
| Number | Date | Country | Kind |
|---|---|---|---|
| 202211035819.2 | Aug 2022 | CN | national |
This application is a continuation of International Application No. PCT/CN2023/113949 filed on Aug. 21, 2023, which claims priority to Chinese Patent Application No. 202211035819.2 filed on Aug. 26, 2022, which are incorporated herein by reference in their entireties.
| Number | Date | Country | |
|---|---|---|---|
| Parent | PCT/CN2023/113949 | Aug 2023 | WO |
| Child | 19064091 | US |