-
公开(公告)号:US11297492B2
公开(公告)日:2022-04-05
申请号:US17042859
申请日:2018-03-27
Applicant: Apple Inc.
Inventor: Xiangying Yang , Lijia Zhang , Dawei Zhang , Huarui Liang , Shu Guo , Rohan C. Malthankar , Krisztian Kiss
IPC: H04L29/06 , H04W12/02 , H04W12/00 , H04W12/04 , H04W12/72 , H04W12/0433 , H04W12/041 , H04W12/033 , H04W12/40
Abstract: Techniques to protect subscriber identity in messages communicated between a user equipment (UE) and a cellular wireless network entity by using multiple ephemeral asymmetric keys are disclosed. The UE determines multiple ephemeral UE public and secret key pairs, while the cellular wireless network entity provides a network public key to the UE. The network public key may be updated over time. Multiple encryption keys based on the multiple ephemeral UE secret keys and the public network key are derived and used to encrypt a subscription permanent identifier (SUPI) to generate multiple subscription concealed identifiers (SUCIs). Each SUCI is used only once for messages communicated to a cellular wireless network and discarded after use. New SUCI are generated when the network public key is updated.
-
公开(公告)号:US20220086814A1
公开(公告)日:2022-03-17
申请号:US17536303
申请日:2021-11-29
Applicant: Apple Inc.
Inventor: Johnson O. Sebeni , Yang Li , Zhu Ji , Yuchul Kim , Wei Zeng , Dawei Zhang , Haijing Hu , Xiangying Yang , Li Su
Abstract: A downlink control information (DCI), such as a blanking DCI (bDCI) message may be transmitted by a base station (e.g., eNB) and received by a mobile device (e.g., UE). The bDCI may indicate that the eNB will not transmit a subsequent DCI to the UE for a duration of time. The UE may be in continuous reception mode or connected discontinuous reception (C-DRX) mode. The UE may therefore determine to enter a sleep state or take other action. The bDCI may specify an explicit blanking duration, or an index indicating a blanking duration from a lookup table, and/or the blanking duration (and/or a blanking duration offset value) may be determined in advance, e.g., semi-statically. When the UE is in C-DRX mode, the UE may be configured such that either the sleep/wake period of the C-DRX mode or the blanking period of the bDCI may take precedence over the other.
-
113.
公开(公告)号:US11133839B2
公开(公告)日:2021-09-28
申请号:US16783358
申请日:2020-02-06
Applicant: Apple Inc.
Inventor: Wei Zeng , Haijing Hu , Dawei Zhang , Xiangying Yang , Haitong Sun , Christian W. Mucke
Abstract: Apparatuses, systems, and methods for a wireless device to detect intermodulation issues and configure a transmission scheme to remedy detected intermodulation issues. The wireless device may perform measurements on a downlink carrier while one uplink carrier is scheduled for the wireless device. The wireless device may also perform measurements on the downlink carrier while two uplink carriers are scheduled for the wireless device. The wireless device may provide information based on those measurements to a serving base station. The base station may determine that an intermodulation issue is occurring at the wireless device based on the information provided, and may configure the wireless device to use a single uplink carrier at a time based at least in part on the intermodulation issue.
-
公开(公告)号:US11095420B2
公开(公告)日:2021-08-17
申请号:US16789797
申请日:2020-02-13
Applicant: Apple Inc.
Inventor: Yuchul Kim , Wei Zeng , Xiangying Yang , Haijing Hu , Dawei Zhang
Abstract: Techniques are disclosed relating to preemption indicators in the context of multiplexing different services on wireless physical layer frames. In some embodiments, a preemption indication is transmitted to indicate resources used by a preempting transmission. The preemption indication may be used when preemption is enabled, e.g., as indicated by an RRC message. The preemption indication may be common to multiple UEs. The resources used by the preempting transmission may overlap with other transmissions. In various embodiments, the disclosed techniques may facilitate signal preemption, e.g., by a low-latency, high-reliability data service.
-
115.
公开(公告)号:US11064352B2
公开(公告)日:2021-07-13
申请号:US16889722
申请日:2020-06-01
Applicant: Apple Inc.
Inventor: Xiangying Yang
Abstract: Methods and apparatus for dynamic file system management of an embedded Universal Integrated Circuit Card (eUICC) in response to changes for electronic Subscriber Identity Modules (eSIMs) on the eUICC are disclosed herein. Hardware specific file information, e.g., hardware-based eUICC parameters, which may apply to multiple eSIMs and/or multiple Mobile Network Operators (MNOs), is included in a default eUICC file system. MNO specific information, e.g., MNO-specified parameters, is included in eSIMs. Customized eUICC level files are created, stored, modified and/or replaced based on a combination of default eUICC files and MNO specific information extracted from an eSIM at installation and/or in response to a change of state of the eSIM, such as when enabling, disabling, or updating the eSIM on the eUICC.
-
116.
公开(公告)号:US10985926B2
公开(公告)日:2021-04-20
申请号:US16117642
申请日:2018-08-30
Applicant: Apple Inc.
Inventor: Xiangying Yang , Avinash Narasimhan , Li Li , David I. Ahn , Jean-Marc Padova , Clark P. Mueller , David T. Haggerty
Abstract: Embodiments provided herein identify a certificate issuer (CI) to be relied on as a trusted third party by an electronic subscriber identity module (eSIM) server in remote SIM provisioning (RSP) transactions with an embedded universal integrated circuit card (eUICC). In an RSP ecosystem, multiple CIs may exist. Parties rely on public key infrastructure (PKI) techniques for establishment of trust. Trust may be established based on a trusted third party such as a CI. Parties need to agree on the CI in order for some PKI techniques to be useful. Embodiments provided herein describe approaches for an eUICC and an eSIM server to arrive at an agreed-on CI. Candidate or negotiated CIs may be indicated on a public key identifier (PKID) list. A PKID list is distributed, in some embodiments, by means of a discovery server, via an activation code (AC) and/or during the establishment of a profile provisioning session.
-
公开(公告)号:US10973070B2
公开(公告)日:2021-04-06
申请号:US16905636
申请日:2020-06-18
Applicant: Apple Inc.
Inventor: Wei Zeng , Haijing Hu , Yuchul Kim , Dawei Zhang , Xiangying Yang , Zhu Ji , Yang Li , Beibei Wang , Jia Tang , Sami M. Almalfouh , Johnson O. Sebeni , Wei Zhang , Tianyan Pu , Vijay Venkataraman , Christian W. Mucke
Abstract: Apparatuses, systems, and methods for a wireless device to perform substantially concurrent communications with a next generation network node and a legacy network node. The wireless device may be configured to establish a first wireless link with a first cell according to a RAT, where the first cell operates in a first system bandwidth and establish a second wireless link with a second cell according to a RAT, where the second cell operates in a second system bandwidth. Further, the wireless device may be configured to perform uplink activity for both the first RAT and the second RAT by TDM uplink data for the first RAT and uplink data for the second RAT if uplink activity is scheduled according to both the first RAT and the second RAT.
-
公开(公告)号:US10797889B2
公开(公告)日:2020-10-06
申请号:US15940786
申请日:2018-03-29
Applicant: Apple Inc.
Inventor: Xiangying Yang
IPC: H04L29/06 , H04L9/32 , H04L9/00 , G06F16/955 , H04W12/00
Abstract: A digital letter of approval (DLOA) is used by a subscription manager (SM) server to determine whether a device is compliant with requirements for an application to be provisioned. If the device is compliant, the application is provisioned to the device or to an embedded universal integrated circuit card (eUICC) included in the device. To increase the security of the device DLOA, the device DLOA is linked to the eUICC, in some embodiments. The linkage may be based on one or more platform label fields in the device DLOA. A database is consulted, in some embodiments, to confirm a relationship between the device and the eUICC identified in the device DLOA. In some embodiments, the eUICC signs the device DLOA and the device DLOA with eUICC signature is sent to the SM server. In some embodiments, the device provides a device signature on the DLOA independent of the eUICC.
-
公开(公告)号:US20200281002A1
公开(公告)日:2020-09-03
申请号:US16855851
申请日:2020-04-22
Applicant: Apple Inc.
Inventor: Yang Li , Wei Zeng , Zhu Ji , Beibei Wang , Jia Tang , Yuchul Kim , Haijing Hu , Dawei Zhang , Xiangying Yang , Sami M. Almalfouh , Johnson O. Sebeni , Wei Zhang , Tianyan Pu
Abstract: Apparatuses, systems, and methods for a wireless device to perform simultaneous uplink activity for multiple RATs in the same carrier using frequency division multiplexing. The wireless device may establish a first wireless link with a first base station according to a first radio access technology (RAT) and a second wireless link with a second base station according to a second RAT. The first base station may provide a first cell operating in a first system bandwidth and the second base station may provide a second cell operating in a second system bandwidth. The wireless device may determine whether the wireless device has uplink activity scheduled according to both the first RAT and the second RAT. If so, the wireless device may perform uplink activity for both the first RAT and the second RAT in the first system bandwidth using frequency division multiplexing.
-
120.
公开(公告)号:US20200235914A1
公开(公告)日:2020-07-23
申请号:US16733515
申请日:2020-01-03
Applicant: Apple Inc.
Inventor: Dawei Zhang , Fangli Xu , Haijing Hu , Huarui Liang , Lijia Zhang , Robert K. Kitchens , Samuel D. Post , Shu Guo , Xiangying Yang , Yannick L. Sierra , Yuqin Chen
Abstract: Apparatuses, systems, and methods for generating and utilizing improved initialization vectors (IVs) when performing encryption and authentication in wireless communications. In some scenarios, a wireless communication device may generate one or more pseudorandom multi-bit values, e.g., using a respective plurality of key derivation functions (KDFs). A first portion of each value may be used as a respective key for encryption or authentication of traffic on the user plane or the control plane. A second portion of each value may be used as a nonce value in a respective IV for use with a respective key for encryption or authentication of traffic on the user plane or the control plane. In some scenarios, the nonce values may instead be generated as part of an additional pseudorandom value (e.g., by executing an additional KDF), from which all of the IVs may be drawn.
-
-
-
-
-
-
-
-
-