METHOD TO AUTHENTICATE PEERS IN AN INFRASTRUCTURE-LESS PEER-TO-PEER NETWORK
    91.
    发明申请
    METHOD TO AUTHENTICATE PEERS IN AN INFRASTRUCTURE-LESS PEER-TO-PEER NETWORK 审中-公开
    认证基础设施较少的对等网络中的对等方法

    公开(公告)号:US20160135045A1

    公开(公告)日:2016-05-12

    申请号:US14539275

    申请日:2014-11-12

    Abstract: Methods, systems, apparatuses, and devices are described for authenticating in a network. A mobile device may establish a group account with an authentication server associated with the group. Upon successfully completing group account establishment, the mobile device receives a group authentication token that includes information associated with the authentication server, the group, the mobile device, a group key, versioning information, etc. The mobile device may use the group authentication token to authenticate with another mobile device that is a member of the same group. The versioning information may support backwards-compatibility between the group authentication tokens having different versions.

    Abstract translation: 描述了用于在网络中认证的方法,系统,设备和设备。 移动设备可以与与该组相关联的认证服务器建立组帐户。 在成功完成组帐户建立之后,移动设备接收包括与认证服务器,组,移动设备,组密钥,版本信息等相关联的信息的组认证令牌。移动设备可以使用组认证令牌 与作为同一组成员的另一个移动设备进行身份验证。 版本信息可能支持具有不同版本的组认证令牌之间的向后兼容性。

    USER-PLANE SECURITY FOR NEXT GENERATION CELLULAR NETWORKS
    92.
    发明申请
    USER-PLANE SECURITY FOR NEXT GENERATION CELLULAR NETWORKS 审中-公开
    用户平面安全下一代蜂窝网络

    公开(公告)号:US20160127897A1

    公开(公告)日:2016-05-05

    申请号:US14923223

    申请日:2015-10-26

    Abstract: Securing user-plane data traffic between a device and a packet data network gateway (P-GW) may be accomplished at the device (e.g., chip component, client device) by obtaining, at the device, a first shared key, and obtaining, at the device, a second shared key based on the first shared key. The second shared key may be for securing user-plane data traffic during transit between the device and the P-GW. The second shared key is shared by the device and the P-GW. The data traffic may be secured based on the second shared key to produce first secured data traffic. The first secured data traffic may be sent to the P-GW via an access node. The P-GW and the access node are distinct network entities. The second shared key is unknown to the access node. The P-GW obtains the second shared key from a network entity that is distinct from the device.

    Abstract translation: 可以通过在设备处获得第一共享密钥来在设备(例如,芯片组件,客户端设备)上实现设备和分组数据网络网关(P-GW)之间的用户平面数据业务的保护, 在设备处,基于第一共享密钥的第二共享密钥。 第二共享密钥可以用于在设备和P-GW之间的传输期间保护用户平面数据流量。 第二个共享密钥由设备和P-GW共享。 可以基于第二共享密钥来保护数据业务以产生第一安全数据业务。 可以经由接入节点将第一安全数据业务发送到P-GW。 P-GW和接入节点是不同的网络实体。 第二个共享密钥对于接入节点是未知的。 P-GW从与设备不同的网络实体获取第二共享密钥。

    METHODS AND SYSTEMS FOR AUTHENTICATION INTEROPERABILITY
    93.
    发明申请
    METHODS AND SYSTEMS FOR AUTHENTICATION INTEROPERABILITY 审中-公开
    验证互用性的方法和系统

    公开(公告)号:US20160112869A1

    公开(公告)日:2016-04-21

    申请号:US14918470

    申请日:2015-10-20

    CPC classification number: H04W12/04 H04L63/061 H04L63/08 H04W12/06

    Abstract: Systems, methods, and computer readable mediums for authenticating a device perform a method of receiving, at a second device, a first authentication protocol reauthentication response for the device, the authentication response including a reauthentication master session key (rMSK), transmitting, at the second device, a second first authentication protocol reauthentication response to a first access point based on the reauthentication master session key, generating, at the second device, a first pairwise master key (PMK) based on the reauthentication master session key, generating, at the second device, a key message to include the first pairwise master key, and transmitting, at the second device, the key message to the second access point.

    Abstract translation: 用于认证设备的系统,方法和计算机可读介质执行在第二设备处接收设备的第一认证协议重新认证响应的方法,所述认证响应包括重新认证主会话密钥(rMSK),在 基于所述重新认证主会话密钥对第一接入点进行第二第一认证协议重新认证响应,在所述第二设备处,基于所述重新认证主会话密钥生成第一成对主密钥(PMK),在所述第二设备 第二设备,包括第一成对主密钥的密钥消息,以及在第二设备将密钥消息发送到第二接入点。

    UE-BASED NETWORK SUBSCRIPTION MANAGEMENT
    94.
    发明申请
    UE-BASED NETWORK SUBSCRIPTION MANAGEMENT 有权
    基于UE的网络订阅管理

    公开(公告)号:US20160021635A1

    公开(公告)日:2016-01-21

    申请号:US14596953

    申请日:2015-01-14

    Abstract: Methods, systems, and devices for wireless communication are described. A user equipment (UE) may obtain identification information for a device and may assist in establishing credentials by which the device accesses a wireless network. The UE may establish a connection with the wireless network using its own credentials, and register the device to access the wireless network by associating the identification information for the device with the credentials of the UE. The UE may receive or establish credentials by which the device accesses the wireless network and may communicate these credentials to the device over a local connection. In some cases, the UE may authenticate the device's identification information to determine whether the device is allowed to be registered with the wireless network.

    Abstract translation: 描述了用于无线通信的方法,系统和设备。 用户设备(UE)可以获得设备的识别信息,并且可以帮助建立设备访问无线网络的凭证。 UE可以使用其自己的凭证与无线网络建立连接,并通过将设备的识别信息与UE的凭证相关联来注册该设备来接入无线网络。 UE可以接收或建立凭证,通过该凭证,设备访问无线网络并且可以通过本地连接将这些凭证传送到设备。 在某些情况下,UE可认证设备的识别信息,以确定设备是否被允许向无线网络注册。

    REDUCING BROADCAST DUPLICATION IN HYBRID WIRELESS MESH PROTOCOL ROUTING
    95.
    发明申请
    REDUCING BROADCAST DUPLICATION IN HYBRID WIRELESS MESH PROTOCOL ROUTING 有权
    在混合无线网路协议路由中减少广播复用

    公开(公告)号:US20150334629A1

    公开(公告)日:2015-11-19

    申请号:US14279717

    申请日:2014-05-16

    CPC classification number: H04W40/12 H04L45/123 H04W40/02 H04W40/244 H04W84/18

    Abstract: Methods, systems, and devices related to wireless communication via a mesh network are described. In particular, the disclosure is directed to selecting a path between two nodes in a wireless mesh network based on consideration of type of data requested and a determination whether an intermediate node, within a predetermined range of the requesting node, is actively broadcasting the requested data. Such opportunistic consideration in selecting a path between two nodes may avoid unnecessary activation of additional broadcasting nodes and reduce the risk of triggering interference between multiple nodes broadcasting duplicate data.

    Abstract translation: 描述了通过网状网络与无线通信相关的方法,系统和设备。 具体地,本公开涉及基于对所请求的数据的类型的考虑以及在请求节点的预定范围内的中间节点是否正在积极地广播所请求的数据来确定无线网状网络中的两个节点之间的路径 。 在选择两个节点之间的路径时的这种机会考虑可以避免附加广播节点的不必要的激活,并且降低触发多个节点之间的广播重复数据的干扰的风险。

    Security for multi-link operation in a wireless local area network (WLAN)

    公开(公告)号:US12250741B2

    公开(公告)日:2025-03-11

    申请号:US18466052

    申请日:2023-09-13

    Abstract: This disclosure provides methods, devices and systems related multi-link wireless communication. A method may include establishing, between the first WLAN device and a second WLAN device, a multi-link association that enables a first wireless communication link and a second wireless communication link. The method may include determining a temporal key for the multi-link association. The method may include encrypting a first and second media access control (MAC) protocol data unit (MPDU) based on the temporal key. The method may include preparing a first frame including the encrypted first MPDU and a second frame including the encrypted second MPDU. The method may include assigning packet numbers from a set of sequential packet numbers to the first and second frames. The method may include transmitting the first frame over the first wireless communication link and the second frame over the second wireless communication link.

    Techniques for identifying aerial vehicles in mobile networks

    公开(公告)号:US12250544B2

    公开(公告)日:2025-03-11

    申请号:US17141051

    申请日:2021-01-04

    Abstract: Some aspects described herein relate to provisioning aerial vehicles with identifiers, certificates, or other credentials for communicating based on a mobile network. The UAV can transmit a request to register with the mobile network, where the request includes at least a hardware identifier of the UAV. The UAV may receive, from a component of the mobile network, a response to the request, where the response includes a unique UAV identifier, a UAV certificate, and a network certificate generated by at least one of the component of the mobile network or a unmanned aircraft system service supplier (USS).

    Access stratum (AS) security for a centralized radio access network (C-RAN)

    公开(公告)号:US12127047B2

    公开(公告)日:2024-10-22

    申请号:US16380104

    申请日:2019-04-10

    CPC classification number: H04W36/0038 H04W12/041 H04W12/0471 H04W76/27

    Abstract: Techniques for secure control plane communications between a User Equipment (UE) and a gNB are provided. A RAN network entity decides to handover a UE from a source base station (BS) to a target BS, wherein the RAN network entity controls a plurality of BSs including at least one of the source BS or the target BS, and wherein at least a portion of a control plane (CP) protocol layer is implemented at the target BS. The network entity generates at least one key specific to the target BS, based on a master key and a freshness parameter, the master key associated with the network entity. The network entity transmits an indication of the at least one key to the target BS, wherein the target BS exchanges control signaling with the UE based on the CP protocol layer using the at least one key.

    Method and apparatus for multiple registrations

    公开(公告)号:US12052358B2

    公开(公告)日:2024-07-30

    申请号:US18094868

    申请日:2023-01-09

    CPC classification number: H04L9/088 H04W12/04

    Abstract: A user device having a security context with a first network based on a first key may establish a security context with a second network. In a method, the user device may generate a key identifier based on the first key and a network identifier of the second network. The user device may forward the key identifier to the second network for forwarding to the first network by the second network to enable the first network to identify the first key at the first network. The user device may receive a key count from the second network. The key count may be associated with a second key forwarded to the second network from the first network. The user device may generate the second key based on the first key and the received key count thereby establishing a security context between the second network and the user device.

Patent Agency Ranking