Physical layer security management
    111.
    发明授权

    公开(公告)号:US11228911B2

    公开(公告)日:2022-01-18

    申请号:US16845157

    申请日:2020-04-10

    Abstract: Various embodiments include methods, components and wireless devices configured to provide physical layer security in a communication system. In various embodiments, a wireless device processor may receive a first signature from a base station. The wireless device processor may determine a second signature based on the first signature. The wireless device processor may receive from the base station a communication that has been modified using a second signature determined by the base station. The wireless device processor may perform a matching operation to determine whether its second signature matches the second signature used to modify the base station communication. The wireless device processor may enable communications with the base station in response to determining that the second signature determined by its processor matches the second signature used to modify the communication.

    RELAY SIDELINK COMMUNICATIONS FOR SECURE LINK ESTABLISHMENT

    公开(公告)号:US20210345104A1

    公开(公告)日:2021-11-04

    申请号:US17244434

    申请日:2021-04-29

    Abstract: Methods, systems, and devices for wireless communications are described that enable establishment of secure communications and security keys for a remote user equipment (UE) and a relay UE to perform relayed sidelink communications in which the remote UE communicates with a network via the relay UE. To establish secure communications for the direct communications between the relay UE and the remote UE, one or more security keys may be established encryption and decryption of communications. To establish the security keys, the relay UE may forward a request for direct communications to a key management function (e.g., a ProSe key management function (PKMF)) in a control plane of a core network (e.g., in a control plane message to the PKMF via an access and mobility function (AMF)). The PKMF may derive relay keys and return information related to the relay keys to the relay UE the remote UE.

    VALIDATING AUTHORIZATION FOR USE OF A SET OF FEATURES OF A DEVICE

    公开(公告)号:US20210337386A1

    公开(公告)日:2021-10-28

    申请号:US17372263

    申请日:2021-07-09

    Abstract: A device obtains proof of its authority to use a first set of selectively activated features (first proof). An authorization server signs the first proof with its private key. The device sends a request to use a network service to a network node. The device sends the first proof to the network node. The network node validates the first proof using a public key of the authorization server. The network node grants the request to use the network service. The device sends a request for proof of authority for the network node to provide the network service (second proof). The device obtains the second proof, signed by another authorization server, and validates the second proof before using the network service. The first proof and the second proof each include a list of selectively activated features, where the selectively activated features are needed to use or provide the network service.

    KEY PROVISIONING FOR BROADCAST CONTROL CHANNEL PROTECTION IN A WIRELESS NETWORK

    公开(公告)号:US20210195563A1

    公开(公告)日:2021-06-24

    申请号:US16723783

    申请日:2019-12-20

    Abstract: Methods, systems, and devices for wireless communications are described. A user equipment (UE) may communicate with a base station in a wireless communications system. The base station may transmit signaling to the UE over a broadcast channel. The base station may transmit control signaling to the UE that indicates a broadcast root key. The UE may identify the broadcast root key for a wireless network corresponding to the base station. The base station may transmit an encrypted broadcast transmission. The UE may receive the encrypted broadcast transmission from the base station, and the UE may decrypt the encrypted broadcast transmission to obtain broadcast information based on a cell-specific key derived from the broadcast root key.

    SECURITY FOR MULTI-LINK OPERATION IN A WIRELESS LOCAL AREA NETWORK (WLAN)

    公开(公告)号:US20210100051A1

    公开(公告)日:2021-04-01

    申请号:US17033168

    申请日:2020-09-25

    Abstract: This disclosure provides methods, devices and systems related multi-link wireless communication. A method may include establishing, between the first WLAN device and a second WLAN device, a multi-link association that enables a first wireless communication link and a second wireless communication link. The method may include determining a temporal key for the multi-link association. The method may include encrypting a first and second media access control (MAC) protocol data unit (MPDU) based on the temporal key. The method may include preparing a first frame including the encrypted first MPDU and a second frame including the encrypted second MPDU. The method may include assigning packet numbers from a set of sequential packet numbers to the first and second frames. The method may include transmitting the first frame over the first wireless communication link and the second frame over the second wireless communication link.

    Jammer Detection and Mitigation
    118.
    发明申请

    公开(公告)号:US20210067265A1

    公开(公告)日:2021-03-04

    申请号:US17005931

    申请日:2020-08-28

    Abstract: Methods for detecting and responding to detecting a non-benign network entity (e.g., jammer, etc.) that targets physical layer channels in a communication network. A wireless device may receive a physical downlink control channel (PDCCH) and a demodulation reference signal (DMRS) from a network entity, determine radio signal strength indicator (RSSI) for the received PDCCH, determine a signal to noise ratio (SNR) for the DMRS, determine whether the RSSI satisfies a first threshold, and determine whether the DMRS SNR satisfies a second threshold.

    Subsystem for authorization and activation of features

    公开(公告)号:US10740490B2

    公开(公告)日:2020-08-11

    申请号:US16414643

    申请日:2019-05-16

    Abstract: One or more selectively activated features needed at a device to use a network service may be identified. Authorization information and feature activation key(s) associated with features that the device has been authorized to activate may be obtained at the device. The feature activation key(s) may be used to activate and/or maintain activation of the authorized features that match the selectively activated feature(s) needed to use the network service. An authorization server may obtain a request to activate one or more selectively activated features of a device. The authorization server may verify that the selectively activated feature(s) are authorized to be used at the device based on an authorization agreement obtained at the authorization server. The authorization server may send proof that the device is authorized to use the selectively activated feature(s) and may send feature activation key(s) based on the authorization agreement in response to the request.

Patent Agency Ranking