WO2020024296A1 - 一种基站切换方法及装置、网络设备 - Google Patents

一种基站切换方法及装置、网络设备 Download PDF

Info

Publication number
WO2020024296A1
WO2020024296A1 PCT/CN2018/098673 CN2018098673W WO2020024296A1 WO 2020024296 A1 WO2020024296 A1 WO 2020024296A1 CN 2018098673 W CN2018098673 W CN 2018098673W WO 2020024296 A1 WO2020024296 A1 WO 2020024296A1
Authority
WO
WIPO (PCT)
Prior art keywords
base station
information
key information
key
security
Prior art date
Application number
PCT/CN2018/098673
Other languages
English (en)
French (fr)
Inventor
卢前溪
王淑坤
Original Assignee
Oppo广东移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Oppo广东移动通信有限公司 filed Critical Oppo广东移动通信有限公司
Priority to PCT/CN2018/098673 priority Critical patent/WO2020024296A1/zh
Priority to CN201880091251.1A priority patent/CN111869262B/zh
Publication of WO2020024296A1 publication Critical patent/WO2020024296A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements

Definitions

  • the embodiments of the present application relate to the field of mobile communication technologies, and in particular, to a base station handover method and device, and a network device.
  • the communication between the terminal and the network can be in the form of dual-link or multi-link, so that data can be successfully transmitted on at least one link.
  • Dual connectivity (DC, Dual Connectivity) network can realize dual-link communication.
  • DC network when the terminal (UE, User Equipment) is migrated, if two transmission links are switched at the same time, or one link is switched If the switchover of another link is not completed yet, data will be completely interrupted in a short period of time.
  • the embodiments of the present application provide a base station handover method and device, and a network device.
  • the first base station receives first instruction information sent by a second base station, where the first instruction information is used to instruct execution of a conversion process between a primary node and a secondary node, the first base station is a secondary node, and the second base station is The master node.
  • a receiving unit configured to receive first instruction information sent by a second base station, where the first instruction information is used to instruct execution of a conversion process between a primary node and a secondary node, where the first base station is a secondary node, and the second The base station is the master node.
  • the network device provided in the embodiment of the present application includes a processor and a memory.
  • the memory is used to store a computer program
  • the processor is used to call and run the computer program stored in the memory to execute the base station handover method described above.
  • the chip provided in the embodiment of the present application is used to implement the foregoing base station handover method.
  • the chip includes a processor for invoking and running a computer program from a memory, so that a device installed with the chip executes the base station handover method described above.
  • the computer-readable storage medium provided in the embodiment of the present application is used to store a computer program, and the computer program causes a computer to execute the foregoing base station handover method.
  • the computer program product provided in the embodiment of the present application includes computer program instructions, and the computer program instructions cause a computer to execute the foregoing base station handover method.
  • the computer program provided in the embodiment of the present application when run on a computer, causes the computer to execute the above-mentioned base station handover method.
  • the first base station receives the first instruction information sent by the second base station, where the first instruction information is used to instruct execution of a conversion process between the primary node and the secondary node, and the first base station is the secondary node, so
  • the second base station is described as the master node, so that the role switching between the primary node and the secondary node in the DC network is realized.
  • This role switching process can ensure that there is always a node that can normally perform data transmission, thus avoiding the terminal moving.
  • the occurrence of data interruption further solves the problem of how to use the key of each node during the role switching process and after the role switching is completed.
  • FIG. 1 is a schematic diagram of a communication system architecture according to an embodiment of the present application.
  • FIG. 3 is a flowchart of adding an SN by an MN according to an embodiment of the present application.
  • FIG. 5 is a schematic diagram of derivation of a secret key on the SN side according to an embodiment of the present application.
  • FIG. 6 is a schematic diagram of horizontal and vertical derivation of key derivation provided in an embodiment of the present application.
  • FIG. 7 is a flowchart of a handover based on an N2 interface according to an embodiment of the present application.
  • FIG. 8 is a flowchart of a handover based on an Xn interface according to an embodiment of the present application.
  • FIG. 9 is a first schematic flowchart of a base station handover method according to an embodiment of the present application.
  • FIG. 10 is a schematic diagram of forwarding information through AMF according to an embodiment of the present application.
  • FIG. 11 is a second schematic flowchart of a base station handover method according to an embodiment of the present application.
  • FIG. 12 is a third flowchart of a base station handover method according to an embodiment of the present application.
  • FIG. 13 is a schematic structural composition diagram of a base station switching device according to an embodiment of the present application.
  • FIG. 14 is a schematic structural diagram of a communication device according to an embodiment of the present application.
  • 15 is a schematic structural diagram of a chip according to an embodiment of the present application.
  • FIG. 16 is a schematic block diagram of a communication system according to an embodiment of the present application.
  • GSM Global System for Mobile
  • CDMA Code Division Multiple Access
  • Wideband Code Division Multiple Access Wideband Code Division Multiple Access
  • GPRS General Packet Radio Service
  • LTE Long Term Evolution
  • FDD Frequency Division Duplex
  • TDD Time Division Duplex
  • UMTS Universal Mobile Telecommunication System
  • WiMAX Worldwide Interoperability for Microwave Access
  • the communication system 100 may include a network device 110, and the network device 110 may be a device that communicates with a terminal device 120 (or a communication terminal or a terminal).
  • the network device 110 may provide communication coverage for a specific geographic area, and may communicate with terminal devices located within the coverage area.
  • the network device 110 may be a base station (Base Transceiver Station, BTS) in a GSM system or a CDMA system, or a base station (NodeB, NB) in a WCDMA system, or an evolved base station in an LTE system.
  • BTS Base Transceiver Station
  • NodeB NodeB
  • the network device may be a mobile switching center, relay station, access point, vehicle equipment, Wearable devices, hubs, switches, bridges, routers, network-side devices in 5G networks, or network devices in public land mobile networks (PLMN) that will evolve in the future.
  • PLMN public land mobile networks
  • the communication system 100 further includes at least one terminal device 120 located within a coverage area of the network device 110.
  • terminal equipment used herein includes, but is not limited to, connection via wired lines, such as via Public Switched Telephone Networks (PSTN), Digital Subscriber Line (DSL), digital cable, direct cable connection ; And / or another data connection / network; and / or via a wireless interface, such as for cellular networks, Wireless Local Area Networks (WLAN), digital television networks such as DVB-H networks, satellite networks, AM- FM broadcast transmitter; and / or another terminal device configured to receive / transmit communication signals; and / or Internet of Things (IoT) devices.
  • PSTN Public Switched Telephone Networks
  • DSL Digital Subscriber Line
  • WLAN Wireless Local Area Networks
  • DVB-H Digital Video Broadband
  • satellite networks satellite networks
  • AM- FM broadcast transmitter AM- FM broadcast transmitter
  • IoT Internet of Things
  • a terminal device configured to communicate through a wireless interface may be referred to as a “wireless communication terminal”, a “wireless terminal”, or a “mobile terminal”.
  • mobile terminals include, but are not limited to, satellite or cellular phones; personal communications systems (PCS) terminals that can combine cellular radiotelephones with data processing, facsimile, and data communications capabilities; can include radiotelephones, pagers, Internet / internal PDA with network access, web browser, notepad, calendar, and / or Global Positioning System (GPS) receiver; and conventional laptop and / or palm-type receivers or others including radiotelephone transceivers Electronic device.
  • PCS personal communications systems
  • GPS Global Positioning System
  • a terminal device can refer to an access terminal, user equipment (User Equipment), user unit, user station, mobile station, mobile station, remote station, remote terminal, mobile device, user terminal, terminal, wireless communication device, user agent, or User device.
  • the access terminal can be a cellular phone, a cordless phone, a Session Initiation Protocol (SIP) phone, a Wireless Local Loop (WLL) station, a Personal Digital Processing (PDA), and wireless communication.
  • terminal devices 120 may perform terminal direct device (D2D) communication.
  • D2D terminal direct device
  • the 5G system or the 5G network may also be referred to as a New Radio (NR) system or an NR network.
  • NR New Radio
  • FIG. 1 exemplarily shows one network device and two terminal devices.
  • the communication system 100 may include multiple network devices and the coverage of each network device may include other numbers of terminal devices. The embodiment does not limit this.
  • the communication system 100 may further include other network entities such as a network controller, a mobility management entity, and the like in this embodiment of the present application is not limited thereto.
  • network entities such as a network controller, a mobility management entity, and the like in this embodiment of the present application is not limited thereto.
  • the device having a communication function in the network / system in the embodiments of the present application may be referred to as a communication device.
  • the communication device may include a network device 110 and a terminal device 120 having a communication function, and the network device 110 and the terminal device 120 may be specific devices described above, and are not described herein again.
  • the communication device may also include other devices in the communication system 100, such as other network entities such as a network controller, a mobile management entity, and the like, which is not limited in the embodiments of the present application.
  • FIG. 2 shows a DC network architecture formed by a primary access network (M-RAN, Master RAN) node and a secondary access network (S-RAN, Secondary RAN) node.
  • M-RAN primary access network
  • S-RAN Secondary RAN
  • FIG. 3 is a flowchart of adding an SN to the MN
  • FIG. 4 is a flowchart of modifying the SN of the MN.
  • the embodiment of the present application can implement the MN And SN, and solve related key usage issues.
  • the secret key used by the MN and the SN for role switching (you can think of adding an SN first and then turning this SN into an MN) and the normal handover process (which can be considered as switching from one MN to another MN)
  • the mechanism of keys is different.
  • the key used on the SN side is the S-KgNB generated by the derivation method shown in Figure 5, which is not the same as the key generated by the ordinary MN handover process. same.
  • the key for handover is derived using the ⁇ NCC, NH ⁇ information, see FIG. 6.
  • Figure 6 shows the horizontal and vertical derivation of the secret key.
  • the base station When the base station has unused ⁇ NCC, NH ⁇ information, it will use the unused information to derive a new secret key KgNB when it is handed over.
  • the KgNB used derives KgNB *, which is a horizontal derivative.
  • the switching based on the N2 interface can be referred to FIG. 7, and the switching based on the Xn interface can be referred to FIG. 8.
  • FIG. 9 is a first flowchart of a base station handover method according to an embodiment of the present application. As shown in FIG. 9, the base station handover method includes the following steps:
  • Step 901 The first base station receives first instruction information sent by a second base station, where the first instruction information is used to instruct execution of a conversion process between a primary node and a secondary node, the first base station is a secondary node, and the first The second base station is the master node.
  • the first base station and the second base station are two base stations in a DC network, or two base stations in a multi-connection network, where the first base station is an SN and the second base station is an MN.
  • the MN decides to perform role conversion with the SN.
  • the MN sends first instruction information to the SN, where the first instruction information is used to instruct execution of a conversion process between the primary node and the secondary node.
  • the key of each node may be implemented in the following manner.
  • the first indication information carries first key information, and the first key information belongs to the master node key information, and is used by the first base station as a master node.
  • the MN derives KgNB * and sends it to the SN for use by the SN, so that the first base station becomes the MN to work.
  • the first key information is generated by the second base station in the following manner:
  • the first key information is generated according to the currently used second key information.
  • the first security information includes NCC (Next Hope Chaining) information and NH (Next Hop) information.
  • KgNB * may be derived in a horizontal or vertical mode.
  • the first base station may perform integrity protection and / or generate an encryption protection key based on the first key information.
  • the first key information such as KgNB *
  • the first base station serves as the primary node to generate third key information
  • the third The key information belongs to the master node key information, wherein the third key information is different from the first key information.
  • the first base station as a new MN derives a new KgNB, which is used to prevent the original MN (that is, the second base station) from knowing its secret key.
  • the first base station serves as the primary node to generate fourth key information, and the fourth The key information belongs to the secondary node key information; the first base station sends the fourth key information to the second base station.
  • the first base station After the roles of the first base station and the second base station are changed, the first base station generates a new S-KgNB and sends the new S-KgNB to the second base station for use.
  • the first key information (such as KgNB *) is sent to the terminal by the first base station or the second base station, so that the terminal can use the same key information with the new MN.
  • Manner 2 The first base station generates first key information based on unused first security information, where the first key information belongs to the master node key information and is used by the first base station as a master node.
  • the first base station derives KgNB by itself using unused ⁇ NCC, NH ⁇ information.
  • the first base station acquires the first security information in at least one of the following ways:
  • the first base station acquires the first security information from the second base station; for example, the first security information is carried in the first indication information, and the first base station receives the first security information After the instruction information, the first security information is obtained from the first instruction information.
  • the first base station acquires the first security information from a first core network element.
  • the first base station obtains the first security information from an AMF.
  • the first safety information includes NCC information and / or NH information.
  • the first base station serves as the primary node to generate fourth key information, and the fourth The key information belongs to the secondary node key information; the first base station sends the fourth key information to the second base station.
  • the first base station After the roles of the first base station and the second base station are changed, the first base station generates a new S-KgNB and sends the new S-KgNB to the second base station for use.
  • the first key information (such as KgNB *) is sent to the terminal by the first base station, so that the terminal can use the same key information with the new MN.
  • the first security information is sent to the terminal by the first base station or the second base station, so that the terminal can derive first key information (such as KgNB *) based on the first security information.
  • the information sent by the second base station to the first base station includes the first indication information, and may further include first security information and / or first key information
  • the first base station may pass the first An interface (Xn interface) between the base station and the second base station receives the first instruction information and / or the first security information and / or the first key information sent by the second base station; or, the first A base station receives the first indication information and / or the first security information and / or the first key information from the second base station forwarded by the network element of the first core network; or the first base station receives the first The first security information sent by the core network element, and the first instruction information and / or the first key information forwarded from the second base station.
  • the first core network element may be AMF.
  • the first core network element may send its own information to the first base station, or it may forward the information from the second base station to the first base station.
  • the content sent by the second base station to the network element of the first core network may be any information in the first instruction information, the first security information, and the first key information (such as any 1 information or any 2 information or 3 information).
  • Information the content sent by the first core network element to the first base station may be any of the first indication information, the first security information, and the first key information (such as any 1 information or any 2 information or 3 Messages).
  • the MN sends a role change request message to the AMF, and the AMF sends a role change request message to the SN, which carries the first security information NCC and NH.
  • the first indication information carries a role change request message and is indirectly sent to the SN through the AMF, during which the AMF can generate the latest NCC and NH for the target SN to use.
  • the first key information or the second security information is transmitted by the first base station or the second base station.
  • the base station sends to the terminal; or the first key information or the second security information is transparently transmitted to the terminal by the first core network element through the first base station or the second base station.
  • the first core network element may be AMF.
  • the second security information is NCC information corresponding to a currently used key or a new key.
  • the first key information or the second security information is used by the terminal to perform a process of communicating with the first base station based on the first key information, or based on the second
  • the security information derives a new secret key, and communicates with the first base station based on the new secret key.
  • the derived new key KgNB
  • the integrity of the control plane and / or user plane and / or the encryption key to communicate with the base station, instead of directly using KgNB for communication.
  • the types of the MN and the SN may be the same or different.
  • one of the MN and the SN is an NR base station (gNB), and the other is an LTE base station (eNB).
  • MN and SN are both NR base stations (gNB).
  • MN and SN are both LTE base stations (eNBs).
  • KgNB its corresponding key
  • KeNB its corresponding key
  • FIG. 11 is a second schematic flowchart of a base station handover method according to an embodiment of the present application. As shown in FIG. 11, the base station handover method includes the following steps:
  • the MN sends a role change request message to the SN.
  • the role transition request message includes first indication information, where the first indication information is used to instruct execution of a conversion process between the primary node and the secondary node, and the first indication information carries first key information (KgNB *),
  • the first key information (KgNB *) is derived by the MN in a horizontal or vertical mode by the method shown in FIG. 6.
  • the SN sends a confirmation message to the MN.
  • This step is optional.
  • the MN sends a role change notification message to the UE.
  • the role change notification message carries the first key information (KgNB *).
  • the UE sends a confirmation message to the MN.
  • This step is optional.
  • the MN when the MN and the SN coexist, the MN provides KgNB * for the SN. Since the key used by the SN is the key belonging to the master node, the SN can use the key as the master node to work.
  • FIG. 12 is a third flowchart of a base station handover method according to an embodiment of the present application. As shown in FIG. 12, the base station handover method includes the following steps:
  • the MN sends a role change request message to the SN.
  • the role transition request message includes first indication information, where the first indication information is used to instruct execution of a transition process between the primary node and the secondary node.
  • the SN sends a role change notification message to the AMF.
  • the AMF returns a message to the SN, which carries the unused first security information ⁇ NCC, NH ⁇ .
  • the SN sends a confirmation message to the MN.
  • the MN sends a role change notification message to the UE, where the message carries unused first security information ⁇ NCC, NH ⁇ .
  • the SN sends a role change notification message to the UE, where the message carries unused first security information ⁇ NCC, NH ⁇ .
  • FIG. 13 is a schematic structural composition diagram of a base station switching device according to an embodiment of the present application. As shown in FIG. 13, the device includes:
  • the receiving unit 1301 is configured to receive first instruction information sent by a second base station, where the first instruction information is used to instruct execution of a conversion process between a primary node and a secondary node, where the first base station is a secondary node, and the first The second base station is the master node.
  • the first indication information carries first key information, and the first key information belongs to the master node key information and is used by the first base station as a master node.
  • the first key information is generated by the second base station in the following manner:
  • the first key information is generated according to the currently used second key information.
  • the device further includes:
  • the security processing unit 1302 is configured to perform integrity protection and / or generate an encryption protection key based on the first key information.
  • the device further includes:
  • the first generating unit 1303 is configured to generate third key information, where the third key information belongs to the master node key information, and the third key information is different from the first key information.
  • the device further includes:
  • the second generating unit 1304 is configured to generate first key information based on the unused first security information, where the first key information belongs to the master node key information and is used by the first base station as the master node.
  • the device further includes:
  • the acquiring unit 1305 is configured to acquire the first security information from the second base station; and / or acquire the first security information from a first core network element.
  • the first security information is carried in the first instruction information, and the obtaining unit acquires the first security information from the first instruction information generated by the second base station.
  • the first security information includes NCC information and / or NH information.
  • the device further includes:
  • a third generating unit 1306, configured to generate fourth key information, where the fourth key information belongs to the secondary node key information
  • the sending unit 1307 is configured to send the fourth key information to the second base station.
  • the receiving unit 1301 is configured to receive the first instruction information and / or the first security sent by the second base station through an interface between the first base station and the second base station.
  • Information and / or first key information or receiving the first indication information and / or first security information and / or first key information from the second base station and forwarded by the first core network element; Or, receive the first security information sent by the network element of the first core network, and the first indication information and / or the first key information forwarded from the second base station.
  • the first key information or the second security information is sent to the terminal by the first base station or the second base station; or the first key information or the second security information is sent by the The first core network element is transparently transmitted to the terminal through the first base station or the second base station.
  • the second security information is NCC information corresponding to a currently used key or a new key.
  • the first key information or the second security information is used by the terminal to perform a process of communicating with the first base station based on the first key information, or derived based on the second security information.
  • a new secret key and communicating with the first base station based on the new secret key.
  • FIG. 14 is a schematic structural diagram of a communication device 600 according to an embodiment of the present application.
  • the communication device may be a network device.
  • the communication device 600 shown in FIG. 14 includes a processor 610, and the processor 610 may call and run a computer program from a memory to implement the method in the embodiment of the present application.
  • the communication device 600 may further include a memory 620.
  • the processor 610 may call and run a computer program from the memory 620 to implement the method in the embodiment of the present application.
  • the memory 620 may be a separate device independent of the processor 610, or may be integrated in the processor 610.
  • the communication device 600 may further include a transceiver 630, and the processor 610 may control the transceiver 630 to communicate with other devices, and specifically, may send information or data to other devices, or receive other Information or data sent by the device.
  • the transceiver 630 may include a transmitter and a receiver.
  • the transceiver 630 may further include antennas, and the number of antennas may be one or more.
  • the communication device 600 may specifically be a network device according to the embodiment of the present application, and the communication device 600 may implement a corresponding process implemented by the network device in each method of the embodiment of the present application. For brevity, details are not described herein again. .
  • the communication device 600 may specifically be a mobile terminal / terminal device according to the embodiment of the present application, and the communication device 600 may implement a corresponding process implemented by the mobile terminal / terminal device in each method of the embodiment of the present application, for simplicity , Will not repeat them here.
  • FIG. 15 is a schematic structural diagram of a chip according to an embodiment of the present application.
  • the chip 700 shown in FIG. 15 includes a processor 710, and the processor 710 may call and run a computer program from a memory to implement the method in the embodiment of the present application.
  • the chip 700 may further include a memory 720.
  • the processor 710 may call and run a computer program from the memory 720 to implement the method in the embodiment of the present application.
  • the memory 720 may be a separate device independent of the processor 710, or may be integrated in the processor 710.
  • the chip 700 may further include an input interface 730.
  • the processor 710 may control the input interface 730 to communicate with other devices or chips. Specifically, the processor 710 may obtain information or data sent by the other devices or chips.
  • the chip 700 may further include an output interface 740.
  • the processor 710 may control the output interface 740 to communicate with other devices or chips. Specifically, the processor 710 may output information or data to the other devices or chips.
  • the chip may be applied to the network device in the embodiment of the present application, and the chip may implement the corresponding process implemented by the network device in each method of the embodiment of the present application.
  • the chip may be applied to the network device in the embodiment of the present application, and the chip may implement the corresponding process implemented by the network device in each method of the embodiment of the present application.
  • the chip can be applied to the mobile terminal / terminal device in the embodiments of the present application, and the chip can implement the corresponding process implemented by the mobile terminal / terminal device in each method of the embodiments of the present application. For simplicity, here No longer.
  • the chip mentioned in the embodiments of the present application may also be referred to as a system-level chip, a system chip, a chip system or a system-on-chip.
  • FIG. 16 is a schematic block diagram of a communication system 900 according to an embodiment of the present application. As shown in FIG. 16, the communication system 900 includes a terminal device 910 and a network device 920.
  • the terminal device 910 may be used to implement the corresponding functions implemented by the terminal device in the foregoing method
  • the network device 920 may be used to implement the corresponding functions implemented by the network device in the foregoing method.
  • the processor in the embodiment of the present application may be an integrated circuit chip and has a signal processing capability.
  • each step of the foregoing method embodiment may be completed by using an integrated logic circuit of hardware in a processor or an instruction in a form of software.
  • the above processor may be a general-purpose processor, a digital signal processor (DSP), an application specific integrated circuit (ASIC), an off-the-shelf programmable gate array (Field, Programmable Gate Array, FPGA), or other Programming logic devices, discrete gate or transistor logic devices, discrete hardware components.
  • DSP digital signal processor
  • ASIC application specific integrated circuit
  • FPGA off-the-shelf programmable gate array
  • Various methods, steps, and logical block diagrams disclosed in the embodiments of the present application can be implemented or executed.
  • a general-purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
  • the steps of the method disclosed in combination with the embodiments of the present application may be directly implemented by a hardware decoding processor, or may be performed by using a combination of hardware and software modules in the decoding processor.
  • the software module may be located in a mature storage medium such as a random access memory, a flash memory, a read-only memory, a programmable read-only memory, or an electrically erasable programmable memory, a register, and the like.
  • the storage medium is located in a memory, and the processor reads the information in the memory and completes the steps of the foregoing method in combination with its hardware.
  • the memory in the embodiment of the present application may be a volatile memory or a non-volatile memory, or may include both volatile and non-volatile memory.
  • the non-volatile memory may be a read-only memory (ROM), a programmable read-only memory (PROM), an erasable programmable read-only memory (EPROM), and an electronic memory. Erase programmable read-only memory (EPROM, EEPROM) or flash memory.
  • the volatile memory may be Random Access Memory (RAM), which is used as an external cache.
  • RAM Static Random Access Memory
  • DRAM Dynamic Random Access Memory
  • Synchronous Dynamic Random Access Memory Synchronous Dynamic Random Access Memory
  • SDRAM double data rate synchronous dynamic random access memory
  • Double SDRAM, DDR SDRAM enhanced synchronous dynamic random access memory
  • Enhanced SDRAM, ESDRAM synchronous connection dynamic random access memory
  • Synchronous DRAM Synchronous Dynamic Random Access Memory
  • Enhanced SDRAM Enhanced SDRAM, ESDRAM
  • synchronous connection dynamic random access memory Synchrobus RAM, SLDRAM
  • Direct Rambus RAM Direct Rambus RAM
  • the memory in the embodiment of the present application may also be a static random access memory (static RAM, SRAM), a dynamic random access memory (dynamic RAM, DRAM), Synchronous dynamic random access memory (SDRAM), double data rate synchronous dynamic random access memory (Double SDRAM, DDR SDRAM), enhanced synchronous dynamic random access memory (enhanced SDRAM, ESDRAM), synchronous connection Dynamic random access memory (synch link DRAM, SLDRAM) and direct memory bus random access memory (Direct RAMbus RAM, DR RAM) and so on. That is, the memories in the embodiments of the present application are intended to include, but not limited to, these and any other suitable types of memories.
  • An embodiment of the present application further provides a computer-readable storage medium for storing a computer program.
  • the computer-readable storage medium can be applied to the network device in the embodiment of the present application, and the computer program causes the computer to execute the corresponding process implemented by the network device in each method in the embodiment of the present application. No longer.
  • the computer-readable storage medium may be applied to the mobile terminal / terminal device in the embodiment of the present application, and the computer program causes the computer to execute a corresponding process implemented by the mobile terminal / terminal device in each method in the embodiment of the present application.
  • the computer program causes the computer to execute a corresponding process implemented by the mobile terminal / terminal device in each method in the embodiment of the present application.
  • An embodiment of the present application further provides a computer program product, including computer program instructions.
  • the computer program product can be applied to the network device in the embodiment of the present application, and the computer program instruction causes the computer to execute a corresponding process implemented by the network device in each method in the embodiment of the present application. More details.
  • the computer program product can be applied to a mobile terminal / terminal device in the embodiments of the present application, and the computer program instructions cause the computer to execute a corresponding process implemented by the mobile terminal / terminal device in each method in the embodiments of the present application, For brevity, I will not repeat them here.
  • the embodiment of the present application also provides a computer program.
  • the computer program may be applied to a network device in the embodiment of the present application.
  • the computer program When the computer program is run on a computer, the computer is caused to execute a corresponding process implemented by the network device in each method in the embodiment of the present application. , Will not repeat them here.
  • the computer program may be applied to a mobile terminal / terminal device in the embodiment of the present application.
  • the computer program When the computer program is run on a computer, the computer executes each method in the embodiment of the application by the mobile terminal / terminal device. The corresponding processes are not repeated here for brevity.
  • the disclosed systems, devices, and methods may be implemented in other ways.
  • the device embodiments described above are only schematic.
  • the division of the unit is only a logical function division.
  • multiple units or components may be combined or Can be integrated into another system, or some features can be ignored or not implemented.
  • the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, which may be electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, may be located in one place, or may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the objective of the solution of this embodiment.
  • the functional units in the embodiments of the present application may be integrated into one processing unit, or each of the units may exist separately physically, or two or more units may be integrated into one unit.
  • the functions are implemented in the form of software functional units and sold or used as independent products, they can be stored in a computer-readable storage medium.
  • the technical solution of this application is essentially a part that contributes to the existing technology or a part of the technical solution can be embodied in the form of a software product.
  • the computer software product is stored in a storage medium, including Several instructions are used to cause a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the method described in the embodiments of the present application.
  • the aforementioned storage media include: U disk, mobile hard disk, read-only memory (Read-Only Memory) ROM, random access memory (Random Access Memory, RAM), magnetic disks or optical disks and other media that can store program codes .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请实施例提供一种基站切换方法及装置、网络设备,包括:第一基站接收第二基站发送的第一指示信息,所述第一指示信息用于指示执行主节点与辅节点之间的转换过程,所述第一基站为辅节点,所述第二基站为主节点。

Description

一种基站切换方法及装置、网络设备 技术领域
本申请实施例涉及移动通信技术领域,具体涉及一种基站切换方法及装置、网络设备。
背景技术
低时延高可靠通信(URLLC,Ultra Reliable and Low Latency Communication)是未来的重要通信方式。为了提高数据传输的可靠性,终端与网络之间的通信可以采用双链路或多链路的形式,这样能够保障数据在至少一条链路上成功地传输。
双连接(DC,Dual Connectivity)网络能够实现双链路的通信,在DC网络下,当终端(UE,User Equipment)进行迁移时,如果两个传输链路同时进行切换,或者一条链路的切换还没完成又发生另一条链路的切换,则会造成在短暂时间内有数据完全中断的现象。
发明内容
本申请实施例提供一种基站切换方法及装置、网络设备。
本申请实施例提供的基站切换方法,包括:
第一基站接收第二基站发送的第一指示信息,所述第一指示信息用于指示执行主节点与辅节点之间的转换过程,所述第一基站为辅节点,所述第二基站为主节点。
本申请实施例提供的基站切换装置,包括:
接收单元,用于接收第二基站发送的第一指示信息,所述第一指示信息用于指示执行主节点与辅节点之间的转换过程,所述第一基站为辅节点,所述第二基站为主节点。
本申请实施例提供的网络设备,包括处理器和存储器。该存储器用于存储计算机程序,该处理器用于调用并运行该存储器中存储的计算机程序,执行上述的基站切换方法。
本申请实施例提供的芯片,用于实现上述的基站切换方法。
具体地,该芯片包括:处理器,用于从存储器中调用并运行计算机程序,使得安装有该芯片的设备执行上述的基站切换方法。
本申请实施例提供的计算机可读存储介质,用于存储计算机程序,该计算机程序使得计算机执行上述的基站切换方法。
本申请实施例提供的计算机程序产品,包括计算机程序指令,该计算机程序指令使得计算机执行上述的基站切换方法。
本申请实施例提供的计算机程序,当其在计算机上运行时,使得计算机执行上述的基站切换方法。
通过上述技术方案,第一基站接收第二基站发送的第一指示信息,所述第一指示信息用于指示执行主节点与辅节点之间的转换过程,所述第一基站为辅节点,所述第二基站为主节点,从而实现了将DC网络中的主节点和辅节点进行角色切换,这种角色切换的过程能够保证始终有节点能够正常的进行数据传输,因而避免了终端移动时 的数据中断的发生,进一步,解决了角色切换过程中以及角色切换完成后各节点的秘钥如何使用的问题。
附图说明
此处所说明的附图用来提供对本申请的进一步理解,构成本申请的一部分,本申请的示意性实施例及其说明用于解释本申请,并不构成对本申请的不当限定。在附图中:
图1是本申请实施例提供的一种通信***架构的示意性图;
图2是本申请实施例提供的DC网络架构图;
图3是本申请实施例提供的MN添加SN的流程图;
图4是本申请实施例提供的MN修改SN的流程图;
图5是本申请实施例提供的SN侧的秘钥派生的示意图;
图6是本申请实施例提供的秘钥派生的水平和垂直衍生示意图;
图7是本申请实施例提供的基于N2接口的切换流程图;
图8是本申请实施例提供的基于Xn接口的切换流程图;
图9为本申请实施例提供的基站切换方法的流程示意图一;
图10为本申请实施例提供的通过AMF转发信息的示意图;
图11为本申请实施例提供的基站切换方法的流程示意图二;
图12为本申请实施例提供的基站切换方法的流程示意图三;
图13为本申请实施例提供的基站切换装置的结构组成示意图;
图14是本申请实施例提供的一种通信设备示意性结构图;
图15是本申请实施例的芯片的示意性结构图;
图16是本申请实施例提供的一种通信***的示意性框图。
具体实施方式
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。
本申请实施例的技术方案可以应用于各种通信***,例如:全球移动通讯(Global System of Mobile communication,GSM)***、码分多址(Code Division Multiple Access,CDMA)***、宽带码分多址(Wideband Code Division Multiple Access,WCDMA)***、通用分组无线业务(General Packet Radio Service,GPRS)、长期演进(Long Term Evolution,LTE)***、LTE频分双工(Frequency Division Duplex,FDD)***、LTE时分双工(Time Division Duplex,TDD)、通用移动通信***(Universal Mobile Telecommunication System,UMTS)、全球互联微波接入(Worldwide Interoperability for Microwave Access,WiMAX)通信***或5G***等。
示例性的,本申请实施例应用的通信***100如图1所示。该通信***100可以包括网络设备110,网络设备110可以是与终端设备120(或称为通信终端、终端)通信的设备。网络设备110可以为特定的地理区域提供通信覆盖,并且可以与位于该覆盖区域内的终端设备进行通信。可选地,该网络设备110可以是GSM***或CDMA***中的基站(Base Transceiver Station,BTS),也可以是WCDMA***中的基站(NodeB,NB),还可以是LTE***中的演进型基站(Evolutional Node B,eNB或eNodeB),或者是云无线接入网络(Cloud Radio Access Network,CRAN)中的无线控制器,或者该网 络设备可以为移动交换中心、中继站、接入点、车载设备、可穿戴设备、集线器、交换机、网桥、路由器、5G网络中的网络侧设备或者未来演进的公共陆地移动网络(Public Land Mobile Network,PLMN)中的网络设备等。
该通信***100还包括位于网络设备110覆盖范围内的至少一个终端设备120。作为在此使用的“终端设备”包括但不限于经由有线线路连接,如经由公共交换电话网络(Public Switched Telephone Networks,PSTN)、数字用户线路(Digital Subscriber Line,DSL)、数字电缆、直接电缆连接;和/或另一数据连接/网络;和/或经由无线接口,如,针对蜂窝网络、无线局域网(Wireless Local Area Network,WLAN)、诸如DVB-H网络的数字电视网络、卫星网络、AM-FM广播发送器;和/或另一终端设备的被设置成接收/发送通信信号的装置;和/或物联网(Internet of Things,IoT)设备。被设置成通过无线接口通信的终端设备可以被称为“无线通信终端”、“无线终端”或“移动终端”。移动终端的示例包括但不限于卫星或蜂窝电话;可以组合蜂窝无线电电话与数据处理、传真以及数据通信能力的个人通信***(Personal Communications System,PCS)终端;可以包括无线电电话、寻呼机、因特网/内联网接入、Web浏览器、记事簿、日历以及/或全球定位***(Global Positioning System,GPS)接收器的PDA;以及常规膝上型和/或掌上型接收器或包括无线电电话收发器的其它电子装置。终端设备可以指接入终端、用户设备(User Equipment,UE)、用户单元、用户站、移动站、移动台、远方站、远程终端、移动设备、用户终端、终端、无线通信设备、用户代理或用户装置。接入终端可以是蜂窝电话、无绳电话、会话启动协议(Session Initiation Protocol,SIP)电话、无线本地环路(Wireless Local Loop,WLL)站、个人数字处理(Personal Digital Assistant,PDA)、具有无线通信功能的手持设备、计算设备或连接到无线调制解调器的其它处理设备、车载设备、可穿戴设备、5G网络中的终端设备或者未来演进的PLMN中的终端设备等。
可选地,终端设备120之间可以进行终端直连(Device to Device,D2D)通信。
可选地,5G***或5G网络还可以称为新无线(New Radio,NR)***或NR网络。
图1示例性地示出了一个网络设备和两个终端设备,可选地,该通信***100可以包括多个网络设备并且每个网络设备的覆盖范围内可以包括其它数量的终端设备,本申请实施例对此不做限定。
可选地,该通信***100还可以包括网络控制器、移动管理实体等其他网络实体,本申请实施例对此不作限定。
应理解,本申请实施例中网络/***中具有通信功能的设备可称为通信设备。以图1示出的通信***100为例,通信设备可包括具有通信功能的网络设备110和终端设备120,网络设备110和终端设备120可以为上文所述的具体设备,此处不再赘述;通信设备还可包括通信***100中的其他设备,例如网络控制器、移动管理实体等其他网络实体,本申请实施例中对此不做限定。
应理解,本文中术语“***”和“网络”在本文中常被可互换使用。本文中术语“和/或”,仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。另外,本文中字符“/”,一般表示前后关联对象是一种“或”的关系。
为便于理解本申请实施例的技术方案,以下对本申请实施例相关的技术进行解释说明。
参照图2,图2为主接入网(M-RAN,Master RAN)节点和辅接入网(S-RAN,Secondary RAN)节点形成的DC网络架构,可以看出B3隧道(N3Tunnel)和空口各自分开,形成两条链路进行冗余传输,这样数据可以在一个时间点有至少一路数据传输 成功的可能性进一步增加。
在DC场景下,当UE进行迁移时,如果两个传输链路同时进行切换,或者第一链路的切换还没完成又发生第二链路的切换,则会造成在短暂时间内有数据完全中断的现象。因此,为了避免UE移动时的数据中断的发生,需要一种无中断的切换方式。
DC网络中的切换具有如下两种:
1、辅节点(SN,Secondary Node)的添加/修改/删除:此场景不会影响到MN的数据传输,因此数据传输不会中断;
2、主节点(MN,Master Node)的切换(改变):此场景进一步分为1)MN和SN同时改变,和2)MN改变SN不变。对于1),数据传输会有中断,对于2)数据可以在切换过程中一直在SN上正常传输不会有中断。因此对于URLLC的切换必须使用2)。
参照图3和图4,图3为MN添加SN的流程图,图4为MN修改SN的流程图,然而,目前还没有一个机制可以将MN和SN进行角色转换,本申请实施例可以实现MN和SN之间的角色转换,并解决相关的秘钥使用问题。
MN与SN进行角色切换(可以认为先添加了一个SN,然后把这个SN变成MN)所使用的秘钥和正常的切换流程(可以认为是从一个MN切到另一个MN)所使用的秘钥的机制不一样。对于前者(MN与SN进行角色切换),当MN添加SN时,SN侧使用的秘钥是通过图5所示的派生方法生成的S-KgNB,这与普通的MN切换流程生成的秘钥不一样。对于后者(正常的切换流程),切换的秘钥是使用{NCC,NH}信息来派生的,参照图6。
图6为秘钥派生的水平和垂直衍生,当基站有未使用的{NCC,NH}信息时,在切换时就会使用未使用的该信息派生出新的秘钥KgNB,如果没有则根据当前使用的KgNB派生出KgNB*,即水平衍生。进一步,基于N2接口的切换可以参照图7所示,基于Xn接口的切换可以参照图8所示。
图9为本申请实施例提供的基站切换方法的流程示意图一,如图9所示,所述基站切换方法包括以下步骤:
步骤901:第一基站接收第二基站发送的第一指示信息,所述第一指示信息用于指示执行主节点与辅节点之间的转换过程,所述第一基站为辅节点,所述第二基站为主节点。
这里,第一基站和第二基站是DC网络中的两个基站,或者是多连接网络中的两个基站,其中,第一基站为SN,第二基站为MN,MN决定与SN进行角色转换,则MN向SN发送第一指示信息,所述第一指示信息用于指示执行主节点与辅节点之间的转换过程。
本申请实施例中,在角色切换过程中以及角色切换过程后,各节点的秘钥可以通过以下方式实现。
方式一:所述第一指示信息携带第一秘钥信息,所述第一秘钥信息属于主节点秘钥信息,供所述第一基站作为主节点使用。
这里,MN派生KgNB*发送给SN供SN使用,使第一基站变作为MN工作。
本申请实施例中,所述第一秘钥信息由所述第二基站通过以下方式生成:
如果有未使用的第一安全信息,则基于所述未使用的第一安全信息生成所述第一秘钥信息;
如果没有未使用的第一安全信息,则根据当前使用的第二秘钥信息生成所述第一秘钥信息。
这里,所述第一安全信息包括NCC(Next hop Chaining Counter)信息和NH(Next Hop)信息。
参照图6,KgNB*可以通过水平或垂直模式衍生。
本申请实施例中,所述第一基站获得第一秘钥信息(如KgNB*)后,可以基于所述第一秘钥信息进行完整性保护和/或进行加密保护秘钥的生成。
在一实施方式中,所述第一基站与所述第二基站执行完主节点与辅节点之间的转换过程后,所述第一基站作为主节点生成第三秘钥信息,所述第三秘钥信息属于主节点秘钥信息,其中,所述第三秘钥信息与所述第一秘钥信息不同。
举个例子,第一基站在完成与第二基站的角色转换后,第一基站作为新的MN派生出新的KgNB,该KgNB用于避免原MN(也即第二基站)知道其秘钥。
在一实施方式中,所述第一基站与所述第二基站执行完主节点与辅节点之间的转换过程后,所述第一基站作为主节点生成第四秘钥信息,所述第四秘钥信息属于辅节点秘钥信息;所述第一基站将所述第四秘钥信息发送给所述第二基站。
举个例子,当第一基站与第二基站进行角色转变后,第一基站作为新的MN派生新的S-KgNB发给第二基站使用。
在一实施方式中,所述第一秘钥信息(如KgNB*)由所述第一基站或所述第二基站发送给终端,从而终端可以与新的MN使用一致的秘钥信息。
方式二:所述第一基站基于未使用的第一安全信息生成第一秘钥信息,所述第一秘钥信息属于主节点秘钥信息,供所述第一基站作为主节点使用。
这里,第一基站通过未使用的{NCC,NH}信息自己派生出KgNB。
本申请实施例中,所述第一基站通过以下至少一种方式获取所述第一安全信息:
1)所述第一基站从所述第二基站获取所述第一安全信息;例如:所述第一安全信息携带在所述第一指示信息中,所述第一基站接收到所述第一指示信息后,从所述第一指示信息中获取所述第一安全信息。
2)所述第一基站从第一核心网网元获取所述第一安全信息。例如:所述第一基站从AMF获取所述第一安全信息。
这里,所述第一安全信息包括NCC信息和/或NH信息。
在一实施方式中,所述第一基站与所述第二基站执行完主节点与辅节点之间的转换过程后,所述第一基站作为主节点生成第四秘钥信息,所述第四秘钥信息属于辅节点秘钥信息;所述第一基站将所述第四秘钥信息发送给所述第二基站。
举个例子,当第一基站与第二基站进行角色转变后,第一基站作为新的MN派生新的S-KgNB发给第二基站使用。
在一实施方式中,所述第一秘钥信息(如KgNB*)由所述第一基站发送给终端,从而终端可以与新的MN使用一致的秘钥信息。或者,所述第一安全信息由所述第一基站或所述第二基站发送给终端,从而终端可以基于所述第一安全信息派生第一秘钥信息(如KgNB*)。
上述方案中,第二基站向第一基站发送的信息包括第一指示信息,此外,还可以进一步包括第一安全信息和/或第一秘钥信息,所述第一基站可以通过所述第一基站和所述第二基站之间的接口(Xn接口)接收所述第二基站发送的所述第一指示信息和/或第一安全信息和/或第一秘钥信息;或者,所述第一基站接收第一核心网网元转发的来自所述第二基站的所述第一指示信息和/或第一安全信息和/或第一秘钥信息;或者,所述第一基站接收第一核心网网元发送的第一安全信息,以及转发的来自所述第二基站的第一指示信息和/或第一秘钥信息。这里,第一核心网网元可以是AMF。这里,第一核心网网元可以向第一基站发送自身的信息,也可以向第一基站转发来自第二基站的信息。其中,第二基站向第一核心网网元发送的内容可以是第一指示信息、第一安全信息以及第一秘钥信息中的任意信息(如任意1个信息或任意2个信息或3个信息),第一核心网网元 向第一基站发送的内容可以是第一指示信息、第一安全信息以及第一秘钥信息中的任意信息(如任意1个信息或任意2个信息或3个信息)。
参照图10,MN向AMF发送角色转换请求消息,AMF再向SN发送角色转换请求消息,其中携带第一安全信息NCC和NH。这里,第一指示信息携带角色转换请求消息中通过AMF间接发给SN,期间AMF可以生成最新的NCC和NH给目标SN使用。
本申请实施例中,为了使终端能够与新的MN(也即第一基站)之间进行正常通信,所述第一秘钥信息或第二安全信息由所述第一基站或所述第二基站发送给终端;或者,所述第一秘钥信息或第二安全信息由所述第一核心网网元通过所述第一基站或所述第二基站透传给终端。这里,第一核心网网元可以是AMF。其中,所述第二安全信息为当前使用的秘钥或新的秘钥对应的NCC信息。
基于此,所述第一秘钥信息或所述第二安全信息用于所述终端执行如下过程:基于所述第一秘钥信息与所述第一基站进行通信,或者,基于所述第二安全信息派生新的秘钥,并基于所述新的秘钥与所述第一基站进行通信。这里,派生的新的秘钥(KgNB)需要进一步计算出控制面和/或用户面的完整性和/或加密秘钥来与基站进行通信的,而不是直接使用KgNB进行通信。
本申请实施例的技术方案中,MN和SN的类型可以相同,也可以不同,例如:MN和SN中的一个是NR基站(gNB),另一个是LTE基站(eNB)。再例如:MN和SN都是NR基站(gNB)。又例如:MN和SN都是LTE基站(eNB)。
对于gNB而言,其对应的秘钥记作KgNB,对于eNB而言,其对应的秘钥记作KeNB。
图11为本申请实施例提供的基站切换方法的流程示意图二,如图11所示,所述基站切换方法包括以下步骤:
1、MN向SN发送角色转换请求消息。
这里,角色转换请求消息包括第一指示信息,所述第一指示信息用于指示执行主节点与辅节点之间的转换过程,所述第一指示信息携带第一秘钥信息(KgNB*),第一秘钥信息(KgNB*)是MN通过如图6所示的方法通过水平或垂直模式衍生。
2、SN向MN发送确认消息。
本步骤为可选的步骤。
3、MN向UE发送角色转换通知消息。
这里,角色转换通知消息携带第一秘钥信息(KgNB*)。
4、UE向MN发送确认消息。
本步骤为可选的步骤。
上述过程中,MN和SN共存的情况下,MN为SN提供KgNB*,由于SN使用的秘钥是属于主节点的秘钥,因而是SN可以使用该秘钥作为主节点进行工作。
图12为本申请实施例提供的基站切换方法的流程示意图三,如图12所示,所述基站切换方法包括以下步骤:
1、MN向SN发送角色转换请求消息。
这里,角色转换请求消息包括第一指示信息,所述第一指示信息用于指示执行主节点与辅节点之间的转换过程。
2、SN向AMF发送角色转换通知消息。
3、AMF向SN回复消息,其中,携带未使用的第一安全信息{NCC,NH}。
4、SN向MN发送确认消息。
5a、MN向UE发送角色转换通知消息,其中,携带未使用的第一安全信息{NCC,NH}。
5b、SN向UE发送角色转换通知消息,其中,携带未使用的第一安全信息{NCC,NH}。
上述步骤5a和5b为可选的。
图13为本申请实施例提供的基站切换装置的结构组成示意图,如图13所示,所述装置包括:
接收单元1301,用于接收第二基站发送的第一指示信息,所述第一指示信息用于指示执行主节点与辅节点之间的转换过程,所述第一基站为辅节点,所述第二基站为主节点。
在一实施方式中,所述第一指示信息携带第一秘钥信息,所述第一秘钥信息属于主节点秘钥信息,供所述第一基站作为主节点使用。
在一实施方式中,所述第一秘钥信息由所述第二基站通过以下方式生成:
如果有未使用的第一安全信息,则基于所述未使用的第一安全信息生成所述第一秘钥信息;
如果没有未使用的第一安全信息,则根据当前使用的第二秘钥信息生成所述第一秘钥信息。
在一实施方式中,所述装置还包括:
安全处理单元1302,用于基于所述第一秘钥信息进行完整性保护和/或进行加密保护秘钥的生成。
在一实施方式中,所述装置还包括:
第一生成单元1303,用于生成第三秘钥信息,所述第三秘钥信息属于主节点秘钥信息,其中,所述第三秘钥信息与所述第一秘钥信息不同。
在一实施方式中,所述装置还包括:
第二生成单元1304,用于基于未使用的第一安全信息生成第一秘钥信息,所述第一秘钥信息属于主节点秘钥信息,供所述第一基站作为主节点使用。
在一实施方式中,所述装置还包括:
获取单元1305,用于从所述第二基站获取所述第一安全信息;和/或,从第一核心网网元获取所述第一安全信息。
在一实施方式中,所述第一安全信息携带在所述第一指示信息中,所述获取单元从所述第二基站发生的所述第一指示信息中获取所述第一安全信息。
在一实施方式中,所述第一安全信息包括NCC信息和/或NH信息。
在一实施方式中,所述装置还包括:
第三生成单元1306,用于生成第四秘钥信息,所述第四秘钥信息属于辅节点秘钥信息;
发送单元1307,用于将所述第四秘钥信息发送给所述第二基站。
在一实施方式中,所述接收单元1301,用于通过所述第一基站和所述第二基站之间的接口接收所述第二基站发送的所述第一指示信息和/或第一安全信息和/或第一秘钥信息;或者,接收第一核心网网元转发的来自所述第二基站的所述第一指示信息和/或第一安全信息和/或第一秘钥信息;或者,接收第一核心网网元发送的第一安全信息,以及转发的来自所述第二基站的第一指示信息和/或第一秘钥信息。
在一实施方式中,所述第一秘钥信息或第二安全信息由所述第一基站或所述第二基站发送给终端;或者,所述第一秘钥信息或第二安全信息由所述第一核心网网元通过所述第一基站或所述第二基站透传给终端。进一步,所述第二安全信息为当前使用的秘钥或新的秘钥对应的NCC信息。
所述第一秘钥信息或所述第二安全信息用于所述终端执行如下过程:基于所述第一秘钥信息与所述第一基站进行通信,或者,基于所述第二安全信息派生新的秘钥, 并基于所述新的秘钥与所述第一基站进行通信。
本领域技术人员应当理解,本申请实施例的上述基站切换装置的相关描述可以参照本申请实施例的基站切换方法的相关描述进行理解。
图14是本申请实施例提供的一种通信设备600示意性结构图。该通信设备可以是网络设备,图14所示的通信设备600包括处理器610,处理器610可以从存储器中调用并运行计算机程序,以实现本申请实施例中的方法。
可选地,如图14所示,通信设备600还可以包括存储器620。其中,处理器610可以从存储器620中调用并运行计算机程序,以实现本申请实施例中的方法。
其中,存储器620可以是独立于处理器610的一个单独的器件,也可以集成在处理器610中。
可选地,如图14所示,通信设备600还可以包括收发器630,处理器610可以控制该收发器630与其他设备进行通信,具体地,可以向其他设备发送信息或数据,或接收其他设备发送的信息或数据。
其中,收发器630可以包括发射机和接收机。收发器630还可以进一步包括天线,天线的数量可以为一个或多个。
可选地,该通信设备600具体可为本申请实施例的网络设备,并且该通信设备600可以实现本申请实施例的各个方法中由网络设备实现的相应流程,为了简洁,在此不再赘述。
可选地,该通信设备600具体可为本申请实施例的移动终端/终端设备,并且该通信设备600可以实现本申请实施例的各个方法中由移动终端/终端设备实现的相应流程,为了简洁,在此不再赘述。
图15是本申请实施例的芯片的示意性结构图。图15所示的芯片700包括处理器710,处理器710可以从存储器中调用并运行计算机程序,以实现本申请实施例中的方法。
可选地,如图15所示,芯片700还可以包括存储器720。其中,处理器710可以从存储器720中调用并运行计算机程序,以实现本申请实施例中的方法。
其中,存储器720可以是独立于处理器710的一个单独的器件,也可以集成在处理器710中。
可选地,该芯片700还可以包括输入接口730。其中,处理器710可以控制该输入接口730与其他设备或芯片进行通信,具体地,可以获取其他设备或芯片发送的信息或数据。
可选地,该芯片700还可以包括输出接口740。其中,处理器710可以控制该输出接口740与其他设备或芯片进行通信,具体地,可以向其他设备或芯片输出信息或数据。
可选地,该芯片可应用于本申请实施例中的网络设备,并且该芯片可以实现本申请实施例的各个方法中由网络设备实现的相应流程,为了简洁,在此不再赘述。
可选地,该芯片可应用于本申请实施例中的移动终端/终端设备,并且该芯片可以实现本申请实施例的各个方法中由移动终端/终端设备实现的相应流程,为了简洁,在此不再赘述。
应理解,本申请实施例提到的芯片还可以称为***级芯片,***芯片,芯片***或片上***芯片等。
图16是本申请实施例提供的一种通信***900的示意性框图。如图16所示,该通信***900包括终端设备910和网络设备920。
其中,该终端设备910可以用于实现上述方法中由终端设备实现的相应的功能,以及该网络设备920可以用于实现上述方法中由网络设备实现的相应的功能为了简洁,在 此不再赘述。
应理解,本申请实施例的处理器可能是一种集成电路芯片,具有信号的处理能力。在实现过程中,上述方法实施例的各步骤可以通过处理器中的硬件的集成逻辑电路或者软件形式的指令完成。上述的处理器可以是通用处理器、数字信号处理器(Digital Signal Processor,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现成可编程门阵列(Field Programmable Gate Array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。可以实现或者执行本申请实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。结合本申请实施例所公开的方法的步骤可以直接体现为硬件译码处理器执行完成,或者用译码处理器中的硬件及软件模块组合执行完成。软件模块可以位于随机存储器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质位于存储器,处理器读取存储器中的信息,结合其硬件完成上述方法的步骤。
可以理解,本申请实施例中的存储器可以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(Read-Only Memory,ROM)、可编程只读存储器(Programmable ROM,PROM)、可擦除可编程只读存储器(Erasable PROM,EPROM)、电可擦除可编程只读存储器(Electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(Random Access Memory,RAM),其用作外部高速缓存。通过示例性但不是限制性说明,许多形式的RAM可用,例如静态随机存取存储器(Static RAM,SRAM)、动态随机存取存储器(Dynamic RAM,DRAM)、同步动态随机存取存储器(Synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(Double Data Rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(Enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(Synchlink DRAM,SLDRAM)和直接内存总线随机存取存储器(Direct Rambus RAM,DR RAM)。应注意,本文描述的***和方法的存储器旨在包括但不限于这些和任意其它适合类型的存储器。
应理解,上述存储器为示例性但不是限制性说明,例如,本申请实施例中的存储器还可以是静态随机存取存储器(static RAM,SRAM)、动态随机存取存储器(dynamic RAM,DRAM)、同步动态随机存取存储器(synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(double data rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(synch link DRAM,SLDRAM)以及直接内存总线随机存取存储器(Direct Rambus RAM,DR RAM)等等。也就是说,本申请实施例中的存储器旨在包括但不限于这些和任意其它适合类型的存储器。
本申请实施例还提供了一种计算机可读存储介质,用于存储计算机程序。
可选的,该计算机可读存储介质可应用于本申请实施例中的网络设备,并且该计算机程序使得计算机执行本申请实施例的各个方法中由网络设备实现的相应流程,为了简洁,在此不再赘述。
可选地,该计算机可读存储介质可应用于本申请实施例中的移动终端/终端设备,并且该计算机程序使得计算机执行本申请实施例的各个方法中由移动终端/终端设备实现的相应流程,为了简洁,在此不再赘述。
本申请实施例还提供了一种计算机程序产品,包括计算机程序指令。
可选的,该计算机程序产品可应用于本申请实施例中的网络设备,并且该计算机程序指令使得计算机执行本申请实施例的各个方法中由网络设备实现的相应流程,为了简 洁,在此不再赘述。
可选地,该计算机程序产品可应用于本申请实施例中的移动终端/终端设备,并且该计算机程序指令使得计算机执行本申请实施例的各个方法中由移动终端/终端设备实现的相应流程,为了简洁,在此不再赘述。
本申请实施例还提供了一种计算机程序。
可选的,该计算机程序可应用于本申请实施例中的网络设备,当该计算机程序在计算机上运行时,使得计算机执行本申请实施例的各个方法中由网络设备实现的相应流程,为了简洁,在此不再赘述。
可选地,该计算机程序可应用于本申请实施例中的移动终端/终端设备,当该计算机程序在计算机上运行时,使得计算机执行本申请实施例的各个方法中由移动终端/终端设备实现的相应流程,为了简洁,在此不再赘述。
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的***、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请所提供的几个实施例中,应该理解到,所揭露的***、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个***,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(Read-Only Memory,)ROM、随机存取存储器(Random Access Memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应所述以权利要求的保护范围为准。

Claims (33)

  1. 一种基站切换方法,所述方法包括:
    第一基站接收第二基站发送的第一指示信息,所述第一指示信息用于指示执行主节点与辅节点之间的转换,所述第一基站为辅节点,所述第二基站为主节点。
  2. 根据权利要求1所述的方法,其中,所述第一指示信息携带第一秘钥信息,所述第一秘钥信息属于主节点秘钥信息,供所述第一基站作为主节点使用。
  3. 根据权利要求2所述的方法,其中,所述第一秘钥信息由所述第二基站通过以下方式生成:
    如果有未使用的第一安全信息,则基于所述未使用的第一安全信息生成所述第一秘钥信息;
    如果没有未使用的第一安全信息,则根据当前使用的第二秘钥信息生成所述第一秘钥信息。
  4. 根据权利要求2或3所述的方法,其中,所述方法还包括:
    所述第一基站基于所述第一秘钥信息进行完整性保护和/或进行加密保护秘钥的生成。
  5. 根据权利要求2至4任一项所述的方法,其中,所述第一基站与所述第二基站执行完主节点与辅节点之间的转换过程后,
    所述第一基站作为主节点生成第三秘钥信息,所述第三秘钥信息属于主节点秘钥信息,其中,所述第三秘钥信息与所述第一秘钥信息不同。
  6. 根据权利要求1所述的方法,其中,所述方法还包括:
    所述第一基站基于未使用的第一安全信息生成第一秘钥信息,所述第一秘钥信息属于主节点秘钥信息,供所述第一基站作为主节点使用。
  7. 根据权利要求6所述的方法,其中,所述方法还包括:
    所述第一基站从所述第二基站获取所述第一安全信息;和/或,
    所述第一基站从第一核心网网元获取所述第一安全信息。
  8. 根据权利要求7所述的方法,其中,所述第一基站从所述第二基站获取所述第一安全信息的情况,所述第一安全信息携带在所述第一指示信息中。
  9. 根据权利要求3、6至8任一项所述的方法,其中,所述第一安全信息包括NCC信息和/或NH信息。
  10. 根据权利要求1至9任一项所述的方法,其中,所述第一基站与所述第二基站执行完主节点与辅节点之间的转换过程后,
    所述第一基站作为主节点生成第四秘钥信息,所述第四秘钥信息属于辅节点秘钥信息;
    所述第一基站将所述第四秘钥信息发送给所述第二基站。
  11. 根据权利要求1至10任一项所述的方法,其中,
    所述第一基站通过所述第一基站和所述第二基站之间的接口接收所述第二基站发送的所述第一指示信息和/或第一安全信息和/或第一秘钥信息;或者,
    所述第一基站接收第一核心网网元转发的来自所述第二基站的所述第一指示信息和/或第一安全信息和/或第一秘钥信息;或者,
    所述第一基站接收第一核心网网元发送的第一安全信息,以及转发的来自所述第二基站的第一指示信息和/或第一秘钥信息。
  12. 根据权利要求2至11任一项所述的方法,其中,
    所述第一秘钥信息或第二安全信息由所述第一基站或所述第二基站发送给终端; 或者,
    所述第一秘钥信息或第二安全信息由所述第一核心网网元通过所述第一基站或所述第二基站透传给终端。
  13. 根据权利要求12所述的方法,其中,所述第二安全信息为当前使用的秘钥或新的秘钥对应的NCC信息。
  14. 根据权利要求12或13所述的方法,其中,所述第一秘钥信息或所述第二安全信息用于所述终端执行如下过程:基于所述第一秘钥信息与所述第一基站进行通信,或者,基于所述第二安全信息派生新的秘钥,并基于所述新的秘钥与所述第一基站进行通信。
  15. 一种基站切换装置,所述装置包括:
    接收单元,用于接收第二基站发送的第一指示信息,所述第一指示信息用于指示执行主节点与辅节点之间的转换过程,所述第一基站为辅节点,所述第二基站为主节点。
  16. 根据权利要求15所述的装置,其中,所述第一指示信息携带第一秘钥信息,所述第一秘钥信息属于主节点秘钥信息,供所述第一基站作为主节点使用。
  17. 根据权利要求16所述的装置,其中,所述第一秘钥信息由所述第二基站通过以下方式生成:
    如果有未使用的第一安全信息,则基于所述未使用的第一安全信息生成所述第一秘钥信息;
    如果没有未使用的第一安全信息,则根据当前使用的第二秘钥信息生成所述第一秘钥信息。
  18. 根据权利要求16或17所述的装置,其中,所述装置还包括:
    安全处理单元,用于基于所述第一秘钥信息进行完整性保护和/或进行加密保护秘钥的生成。
  19. 根据权利要求16至18任一项所述的装置,其中,所述装置还包括:
    第一生成单元,用于生成第三秘钥信息,所述第三秘钥信息属于主节点秘钥信息,其中,所述第三秘钥信息与所述第一秘钥信息不同。
  20. 根据权利要求15所述的装置,其中,所述装置还包括:
    第二生成单元,用于基于未使用的第一安全信息生成第一秘钥信息,所述第一秘钥信息属于主节点秘钥信息,供所述第一基站作为主节点使用。
  21. 根据权利要求20所述的装置,其中,所述装置还包括:
    获取单元,用于从所述第二基站获取所述第一安全信息;和/或,从第一核心网网元获取所述第一安全信息。
  22. 根据权利要求21所述的装置,其中,所述第一安全信息携带在所述第一指示信息中,所述获取单元从所述第二基站发生的所述第一指示信息中获取所述第一安全信息。
  23. 根据权利要求17、20至22任一项所述的装置,其中,所述第一安全信息包括NCC信息和/或NH信息。
  24. 根据权利要求15至23任一项所述的装置,其中,所述装置还包括:
    第三生成单元,用于生成第四秘钥信息,所述第四秘钥信息属于辅节点秘钥信息;
    发送单元,用于将所述第四秘钥信息发送给所述第二基站。
  25. 根据权利要求15至24任一项所述的装置,其中,所述接收单元,用于通过所述第一基站和所述第二基站之间的接口接收所述第二基站发送的所述第一指示信息和/或第一安全信息和/或第一秘钥信息;或者,接收第一核心网网元转发的来自所 述第二基站的所述第一指示信息和/或第一安全信息和/或第一秘钥信息;或者,接收第一核心网网元发送的第一安全信息,以及转发的来自所述第二基站的第一指示信息和/或第一秘钥信息。
  26. 根据权利要求16至25任一项所述的装置,其中,
    所述第一秘钥信息或第二安全信息由所述第一基站或所述第二基站发送给终端;或者,
    所述第一秘钥信息或第二安全信息由所述第一核心网网元通过所述第一基站或所述第二基站透传给终端。
  27. 根据权利要求26所述的装置,其中,所述第二安全信息为当前使用的秘钥或新的秘钥对应的NCC信息。
  28. 根据权利要求26或27所述的装置,其中,所述第一秘钥信息或所述第二安全信息用于所述终端执行如下过程:基于所述第一秘钥信息与所述第一基站进行通信,或者,基于所述第二安全信息派生新的秘钥,并基于所述新的秘钥与所述第一基站进行通信。
  29. 一种网络设备,包括:处理器和存储器,该存储器用于存储计算机程序,所述处理器用于调用并运行所述存储器中存储的计算机程序,执行如权利要求1至14中任一项所述的方法。
  30. 一种芯片,包括:处理器,用于从存储器中调用并运行计算机程序,使得安装有所述芯片的设备执行如权利要求1至14中任一项所述的方法。
  31. 一种计算机可读存储介质,用于存储计算机程序,所述计算机程序使得计算机执行如权利要求1至14中任一项所述的方法。
  32. 一种计算机程序产品,包括计算机程序指令,该计算机程序指令使得计算机执行如权利要求1至14中任一项所述的方法。
  33. 一种计算机程序,所述计算机程序使得计算机执行如权利要求1至14中任一项所述的方法。
PCT/CN2018/098673 2018-08-03 2018-08-03 一种基站切换方法及装置、网络设备 WO2020024296A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2018/098673 WO2020024296A1 (zh) 2018-08-03 2018-08-03 一种基站切换方法及装置、网络设备
CN201880091251.1A CN111869262B (zh) 2018-08-03 2018-08-03 一种基站切换方法及装置、网络设备

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2018/098673 WO2020024296A1 (zh) 2018-08-03 2018-08-03 一种基站切换方法及装置、网络设备

Publications (1)

Publication Number Publication Date
WO2020024296A1 true WO2020024296A1 (zh) 2020-02-06

Family

ID=69230779

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/098673 WO2020024296A1 (zh) 2018-08-03 2018-08-03 一种基站切换方法及装置、网络设备

Country Status (2)

Country Link
CN (1) CN111869262B (zh)
WO (1) WO2020024296A1 (zh)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101932016A (zh) * 2009-06-18 2010-12-29 中兴通讯股份有限公司 一种在基站间切换的方法及装置
CN103947275A (zh) * 2011-10-04 2014-07-23 三星电子株式会社 在移动宽带网络环境中信号通知并处理控制信息的方法和***
CN104254066A (zh) * 2013-06-28 2014-12-31 华为技术有限公司 状态信息传递、去激活的方法、站点设备和终端设备
WO2016131323A1 (zh) * 2015-07-01 2016-08-25 中兴通讯股份有限公司 一种控制双连接x2状态报告发送的方法、装置及辅基站
CN108293214A (zh) * 2015-11-18 2018-07-17 瑞典爱立信有限公司 用于改变用于无线设备的主节点的无线通信***、无线设备、网络节点及其中的方法

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9756531B2 (en) * 2013-09-30 2017-09-05 Lg Electronics Inc. Method for determining radio resource control configuration in a wireless communication system supporting dual connectivity and apparatus thereof
WO2015115458A1 (ja) * 2014-01-31 2015-08-06 京セラ株式会社 基地局、ユーザ端末、及び通信制御方法
KR101819409B1 (ko) * 2014-03-06 2018-01-16 닛본 덴끼 가부시끼가이샤 이중 연결성을 위한 장치, 시스템 및 방법

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101932016A (zh) * 2009-06-18 2010-12-29 中兴通讯股份有限公司 一种在基站间切换的方法及装置
CN103947275A (zh) * 2011-10-04 2014-07-23 三星电子株式会社 在移动宽带网络环境中信号通知并处理控制信息的方法和***
CN104254066A (zh) * 2013-06-28 2014-12-31 华为技术有限公司 状态信息传递、去激活的方法、站点设备和终端设备
WO2016131323A1 (zh) * 2015-07-01 2016-08-25 中兴通讯股份有限公司 一种控制双连接x2状态报告发送的方法、装置及辅基站
CN108293214A (zh) * 2015-11-18 2018-07-17 瑞典爱立信有限公司 用于改变用于无线设备的主节点的无线通信***、无线设备、网络节点及其中的方法

Also Published As

Publication number Publication date
CN111869262B (zh) 2022-01-18
CN111869262A (zh) 2020-10-30

Similar Documents

Publication Publication Date Title
WO2020164016A1 (zh) 小区切换的方法和设备
WO2019242722A1 (zh) 一种测量控制方法及装置、终端设备
WO2020154994A1 (zh) 小区切换方法、终端设备和网络设备
WO2020061931A1 (zh) 一种切换上报的方法、终端设备及网络设备
US11229079B2 (en) Information configuration method and terminal
US11785517B2 (en) Method and apparatus for distinguishing between data formats, and communication device
WO2020227870A1 (zh) 一种切换方法及装置、通信设备
WO2020155157A1 (zh) 切换过程中安全信息的处理方法及装置、网络设备、终端
WO2020024301A1 (zh) 一种保证数传输可靠性的方法及装置、网络设备
WO2020082247A1 (zh) 一种安全算法的处理方法及装置、终端
WO2020113520A1 (zh) 用于建立连接的方法、网络设备和终端设备
WO2020000174A1 (zh) 一种核心网选择方法及装置、终端设备、网络设备
WO2020061851A1 (zh) 无线通信方法和基站
US20210227385A1 (en) Wireless communication method and device
WO2020024296A1 (zh) 一种基站切换方法及装置、网络设备
WO2020082327A1 (zh) 一种切换过程中的信令交互方法及装置、网络设备
WO2020061943A1 (zh) 一种数据传输方法、终端设备及网络设备
US20220182895A1 (en) Wireless communication method and apparatus, and network device
CN111989951B (zh) 一种数据转发方法及装置、网络设备
WO2020107340A1 (zh) 一种数据处理方法、设备及存储介质
WO2020043010A1 (zh) 一种ui显示方法、终端设备及装置
WO2020097819A1 (zh) 切换时数据传输的方法、装置、芯片及计算机程序
WO2020082336A1 (zh) 无线通信的方法、终端设备和网络设备
WO2020124540A1 (zh) 一种数据包重排序方法、电子设备及存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18928805

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18928805

Country of ref document: EP

Kind code of ref document: A1