-
公开(公告)号:US20220303941A1
公开(公告)日:2022-09-22
申请号:US17593599
申请日:2020-07-23
Applicant: Apple Inc.
Inventor: Fangli XU , Chunhai YAO , Clive E. ROGERS , Dawei ZHANG , Haijing HU , Haitong SUN , Longda XING , Murtaza A. SHIKARI , Sarma V. VANGALA , Sethuraman GURUMOORTHY , Srirang A. LOVLEKAR , Wei ZENG , Yuchul KIM , Yuqin CHEN , Yushu ZHANG , Zhibin WU
Abstract: A user equipment (UE) configured to monitor paging occasions of a network. The UE operates in a paging discontinuous reception (DRX) cycle, wherein the DRX cycle includes a paging occasion (PO). The UE determines a location in time for a wake-up signal (WUS) occasion associated with the PO and determines whether to utilize an active mode or a sleep mode during the PO based on an indication included in a WUS received during the WUS occasion.
-
公开(公告)号:US20220303897A1
公开(公告)日:2022-09-22
申请号:US17593451
申请日:2020-07-23
Applicant: Apple Inc.
Inventor: Fangli XU , Chunhai YAO , Clive E. RODGERS , Dawei ZHANG , Haijing HU , Haitong SUN , Longda XING , Murtaza A. SHIKARI , Sarma V. VANGALA , Sethuraman GURUMOORTHY , Srirang A. LOVLEKAR , Wei ZENG , Yuchul KIM , Yuqin CHEN , Yushu ZHANG , Zhibin WU
Abstract: A user equipment (UE) is configured to utilize wake up signaling during paging operations. The operates in a paging discontinuous reception (DRX) cycle, wherein the paging DRX cycle includes a paging occasion (PO). The UE receives a wake-up signal (WUS) during a WUS occasion that is associated with the PO and selects a mode of operation to utilize during the PO based on the WUS.
-
公开(公告)号:US20210092603A1
公开(公告)日:2021-03-25
申请号:US17054148
申请日:2018-05-11
Applicant: Apple Inc.
Inventor: Xiangying YANG , Huarui LIANG , Lijia ZHANG , Shu GUO , Haijing HU , Fangli XU , Yuqin CHEN , Dawei ZHANG , Li LI
Abstract: Techniques to protect a subscriber identity, by encrypting a subscription permanent identifier (SUPI) to form one-time use subscription concealed identifiers (SUCIs) using a set of one-time ephemeral asymmetric keys, generated by a user equipment (UE), and network provided keys are disclosed. Encryption of the SUPI to form the SUCIs can mitigate snooping by rogue network entities, such as fake base stations. The UE is restricted from providing the unencrypted SUPI over an unauthenticated connection to a network entity. In some instances, the UE uses a trusted symmetric fallback encryption key KFB or trusted asymmetric fallback public key PKFB to verify messages from an unauthenticated network entity and/or to encrypt the SUPI to form a fallback SUCIFB for communication of messages with the unauthenticated network entity.
-
94.
公开(公告)号:US20200021993A1
公开(公告)日:2020-01-16
申请号:US16293521
申请日:2019-03-05
Applicant: Apple Inc.
Inventor: Xiangying YANG , Shu GUO , Lijia ZHANG , Qian SUN , Huarui LIANG , Fangli XU , Yuqin CHEN , Haijing HU , Dawei ZHANG , Hao DUO , Lanpeng CHEN
Abstract: Techniques for identity-based message integrity protection and verification between a user equipment (UE) and a wireless network entity, include use of signatures derived from identity-based keys. To protect against attacks from rogue network entities before activation of a security context with a network entity, the UE verifies integrity of messages by checking a signature using an identity-based public key PKID derived by the UE based on (i) an identity value (ID) of the network entity and (ii) a separate public key PKPKG of a private key generator (PKG) server. The network entity generates signatures for messages using an identity-based private key SKID obtained from the PKG server, which generates the identity-based private key SKID using (i) the ID value of the network entity and (ii) a private key SKPKG that is known only by the PKG server and corresponds to the public key PKPKG.
-
-
-