-
公开(公告)号:US11895495B2
公开(公告)日:2024-02-06
申请号:US17057622
申请日:2018-06-22
Applicant: Apple Inc.
Inventor: Xiangying Yang , Elliot S. Briggs , Samuel D. Post , Yannick L. Sierra , Fangli Xu , Dawei Zhang , Haijing Hu , Huarui Liang , Li Li , Lijia Zhang , Shu Guo , Yuqin Chen
IPC: H04W12/069 , H04W76/27 , H04W12/73 , H04W12/108 , H04W74/08
CPC classification number: H04W12/069 , H04W12/108 , H04W12/73 , H04W74/0833 , H04W76/27
Abstract: This disclosure relates to techniques, base stations, and user equipment devices (UEs) for performing base station authentication through access stratum signaling transmissions. The UE may operate in idle mode and may receive an authentication message from a base station through the wireless interface while operating in idle mode. The UE may determine whether a signature comprised within the authentication message is valid, and the UE may continue a connection procedure with the base station based on a determination that the signature is valid. If it is determined that the signature is invalid, the UE may designate the base station as a barred base station and may perform cell re-selection. The authentication message may be one of a radio resource control (RRC) connection setup message, a special RRC message, a media access control (MAC) message, or a random access channel (RACH) message comprising a random access response (RAR) message.
-
公开(公告)号:US11863982B2
公开(公告)日:2024-01-02
申请号:US18150771
申请日:2023-01-05
Applicant: Apple Inc.
Inventor: Xiangying Yang , Huarui Liang , Lijia Zhang , Shu Guo , Haijing Hu , Fangli Xu , Yuqin Chen , Dawei Zhang , Li Li
IPC: H04W12/122 , H04W12/069 , H04W12/72 , H04W12/0433 , H04W12/03 , H04W12/041 , H04L9/08 , H04L9/16 , H04L9/32 , H04W12/02
CPC classification number: H04W12/069 , H04L9/0822 , H04L9/0825 , H04L9/0844 , H04L9/0891 , H04L9/16 , H04L9/3228 , H04W12/02 , H04W12/03 , H04W12/041 , H04W12/0433 , H04W12/122 , H04W12/72
Abstract: Techniques to protect a subscriber identity, by encrypting a subscription permanent identifier (SUPI) to form one-time use subscription concealed identifiers (SUCIs) using a set of one-time ephemeral asymmetric keys, generated by a user equipment (UE), and network provided keys are disclosed. Encryption of the SUPI to form the SUCIs can mitigate snooping by rogue network entities, such as fake base stations. The UE is restricted from providing the unencrypted SUPI over an unauthenticated connection to a network entity. In some instances, the UE uses a trusted symmetric fallback encryption key KFB or trusted asymmetric fallback public key PKFB to verify messages from an unauthenticated network entity and/or to encrypt the SUPI to form a fallback SUCIFB for communication of messages with the unauthenticated network entity.
-
公开(公告)号:US11736948B2
公开(公告)日:2023-08-22
申请号:US17147410
申请日:2021-01-12
Applicant: Apple Inc.
Inventor: Jean-Marc Padova , Xiangying Yang
IPC: H04M1/66 , H04W12/72 , H04W12/069 , H04W8/20 , H04W88/02
CPC classification number: H04W12/72 , H04W8/20 , H04W12/069 , H04W88/02
Abstract: Embodiments described herein relate to eligibility checking for transfer of one or more electronic subscriber identity modules (eSIMs) between two mobile wireless devices. Eligibility to transfer an eSIM to an eUICC of a target device can depend on whether the eUICC of the target device satisfies certain security requirements for the eSIMs to be transferred. The mobile wireless devices can obtain a transfer eligibility result based on communication with one or more network-based servers that can determine compatibility for eSIM transfer.
-
公开(公告)号:US20230095157A1
公开(公告)日:2023-03-30
申请号:US17993215
申请日:2022-11-23
Applicant: Apple Inc.
Inventor: Wei Zeng , Haijing Hu , Yuchul Kim , Dawei Zhang , Xiangying Yang , Zhu Ji , Yang Li , Beibei Wang , Jia Tang , Sami M. Almalfouh , Johnson O. Sebeni , Wei Zhang , Tianyan Pu , Vijay Venkataraman , Christian W. Mucke
Abstract: Apparatuses, systems, and methods for a wireless device to perform substantially concurrent communications with a next generation network node and a legacy network node. The wireless device may be configured to stablish a first wireless link with a first cell according to a RAT, where the first cell operates in a first system bandwidth and establish a second wireless link with a second cell according to a RAT, where the second cell operates in a second system bandwidth. Further, the wireless device may be configured to perform uplink activity for both the first RAT and the second RAT by TDM uplink data for the first RAT and uplink data for the second RAT if uplink activity is scheduled according to both the first RAT and the second RAT.
-
公开(公告)号:US11589228B2
公开(公告)日:2023-02-21
申请号:US17054148
申请日:2018-05-11
Applicant: Apple Inc.
Inventor: Xiangying Yang , Huarui Liang , Lijia Zhang , Shu Guo , Haijing Hu , Fangli Xu , Yuqin Chen , Dawei Zhang , Li Li
IPC: H04W12/122 , H04W12/069 , H04W12/72 , H04W12/0433 , H04W12/03 , H04W12/041 , H04L9/08 , H04L9/16 , H04L9/32 , H04W12/02
Abstract: Techniques to protect a subscriber identity, by encrypting a subscription permanent identifier (SUPI) to form one-time use subscription concealed identifiers (SUCIs) using a set of one-time ephemeral asymmetric keys, generated by a user equipment (UE), and network provided keys are disclosed. Encryption of the SUPI to form the SUCIs can mitigate snooping by rogue network entities, such as fake base stations. The UE is restricted from providing the unencrypted SUPI over an unauthenticated connection to a network entity. In some instances, the UE uses a trusted symmetric fallback encryption key KFB or trusted asymmetric fallback public key PKFB to verify messages from an unauthenticated network entity and/or to encrypt the SUPI to form a fallback SUCIFB for communication of messages with the unauthenticated network entity.
-
公开(公告)号:US20220418030A1
公开(公告)日:2022-12-29
申请号:US17776449
申请日:2020-01-31
Applicant: Apple Inc.
Inventor: Shu Guo , Xiangying Yang , Fangli Xu , Yuqin Chen , Huarui Liang , Haijing Hu , Dawei Zhang
IPC: H04W76/19 , H04W76/30 , H04W12/106
Abstract: Embodiments are presented herein of apparatuses, systems, and methods for a user equipment device (UE) and/or cellular network to resume a connection. To resume the connection, the UE may transmit a fully protected connection resume message, e.g., which may include protection for a resume cause field.
-
公开(公告)号:US11533770B2
公开(公告)日:2022-12-20
申请号:US17201604
申请日:2021-03-15
Applicant: Apple Inc.
Inventor: Wei Zeng , Haijing Hu , Yuchul Kim , Dawei Zhang , Xiangying Yang , Zhu Ji , Yang Li , Beibei Wang , Jia Tang , Sami M. Almalfouh , Johnson O. Sebeni , Wei Zhang , Tianyan Pu , Vijay Venkataraman , Christian W. Mucke
Abstract: Apparatuses, systems, and methods for a wireless device to perform substantially concurrent communications with a next generation network node and a legacy network node. The wireless device may be configured to stablish a first wireless link with a first cell according to a RAT, where the first cell operates in a first system bandwidth and establish a second wireless link with a second cell according to a RAT, where the second cell operates in a second system bandwidth. Further, the wireless device may be configured to perform uplink activity for both the first RAT and the second RAT by TDM uplink data for the first RAT and uplink data for the second RAT if uplink activity is scheduled according to both the first RAT and the second RAT.
-
公开(公告)号:US11516003B2
公开(公告)日:2022-11-29
申请号:US17211749
申请日:2021-03-24
Applicant: Apple Inc.
Inventor: Xiangying Yang , Jean-Marc Padova
Abstract: Embodiments described herein relate to credential wrapping for secure transfer of electronic SIMs (eSIMs) between wireless devices. Transfer of an eSIM from a source device to a target device includes re-encryption of sensitive eSIM data, e.g., eSIM encryption keys, financial transaction credentials, transit authority credentials, and the like, using new encryption keys that include ephemeral elements applicable to a single, particular transfer session between the source device and the target device. The sensitive eSIM data encrypted with a symmetric key (Ks) is re-wrapped with a new header that includes a version of Ks encrypted with a new key encryption key (KEK) and information to derive KEK by the target device. The re-encrypted sensitive SIM data is formatted with additional eSIM data into a new bound profile package (BPP) to transfer the eSIM from the source device to the target device.
-
公开(公告)号:US20220303254A1
公开(公告)日:2022-09-22
申请号:US17598224
申请日:2021-06-15
Applicant: Apple Inc.
Inventor: Shu Guo , Fangli Xu , Yuqin Chen , Xiangying Yang , Huarui Liang , Haijing Hu , Chunhai Yao , Dawei Zhang , Yushu Zhang , Zhibin Wu
Abstract: The present application relates to devices and components including apparatus, systems, and methods for secured user equipment communications over a user equipment relay. In some embodiments, symmetric or asymmetric encryption may be used for the secured user equipment communications.
-
公开(公告)号:US20220278835A1
公开(公告)日:2022-09-01
申请号:US17437798
申请日:2020-04-03
Applicant: Apple Inc.
Inventor: Shu Guo , Dawei Zhang , Fangli Xu , Haijing Hu , Huarui Liang , Xiangying Yang , Yuqin Chen
IPC: H04L9/08 , H04W12/041
Abstract: Apparatuses, systems, and methods for application function (AF) key generation and AF key renewal. A user equipment device (UE) may communicate with an application function (AF) via a radio access network (RAN) using a first AF key and determine that the first AF key has expired. The UE may derive a second AF key based on at least an Architecture for Authentication and Key Management for Applications (AKMA) anchor key (KAKMA) and a counter parameter and communicate with the AF via the RAN using the second AF key. At least one of the UE, the AF, and/or an AKMA Anchor Function (AAnF) may be configured to monitor expiration of the first AF key based on an associated lifetime of the first AF key. The first and second AF keys may be derived using a key derivation function that includes at least one variable parameter.
-
-
-
-
-
-
-
-
-