-
公开(公告)号:US11528137B2
公开(公告)日:2022-12-13
申请号:US16669426
申请日:2019-10-30
Applicant: QUALCOMM Incorporated
Inventor: Soo Bum Lee , Adrian Edward Escott , Gavin Bernard Horn , Anand Palanigounder
IPC: H04L9/30 , H04L29/06 , H04W76/11 , H04W8/02 , H04W60/00 , H04W12/02 , H04W12/06 , H04L9/08 , H04W12/033 , H04W12/106
Abstract: Methods, systems, and devices for wireless communications are described. A user equipment (UE) may receive a system parameter identified by a network entity (e.g., a public key generator (PKG)), and receive a cell identifier during a connection procedure between the UE and a base station in wireless communication with the UE. The cell identifier may be associated with the base station. The UE may encrypt at least a portion of a message associated with the connection procedure using the cell identifier and the system parameter. In some examples, the portion of the message may include private information. The UE may transmit the message to the base station as part of the connection procedure.
-
公开(公告)号:US11503461B2
公开(公告)日:2022-11-15
申请号:US16612085
申请日:2018-02-13
Applicant: QUALCOMM Incorporated
Inventor: Huichun Liu , Keiichi Kubota , Soo Bum Lee
IPC: H04W12/037 , H04W76/27 , H04L9/14 , H04W72/04 , H04W12/106 , H04W12/0431 , H04W80/02
Abstract: Techniques for refreshing security keys for enciphering and deciphering packets in a wireless communications system are provided. An exemplary method generally includes transmitting, while in a state with no dedicated resources allocated to the UE, a first message to request resumption of a radio resource control (RRC) connection, the first message encrypted using a first set of one or more keys, receiving, in response to the first message, a second message encrypted using the first set of one or more keys or a second set of one or more keys, determining, based on an indication in the second message or received prior to the second message, whether portions of the second message are encrypted using the second set of one or more keys, and processing the second message using the first set of one or more keys or the second set of one or more keys, based on the determination.
-
公开(公告)号:US11463875B2
公开(公告)日:2022-10-04
申请号:US16856467
申请日:2020-04-23
Applicant: QUALCOMM Incorporated
Inventor: Soo Bum Lee , Adrian Edward Escott , Anand Palanigounder , Gavin Bernard Horn
IPC: H04W12/06 , H04W12/106 , H04W76/27
Abstract: A user equipment (UE) may receive system information from a base station and may calculate a hash value using the system information as input to a hashing function. Similarly, prior to transmitting the system information, a valid base station may calculate a hash value using the system information as input to a hashing function. The base station may transmit the calculated hash value (e.g., which represent or be included in a set of hash values) to the UE in an access stratum (AS) security mode command (SMC) message. The UE may determine whether the received system information was modified based on the hash value (e.g., by comparing the UE calculated hash value and the set of hash values received from the base station in the AS SMC). If the UE indicates a mismatch of hash information, the base station may re-transmit the system information (e.g., in an integrity protected message).
-
公开(公告)号:US11452067B2
公开(公告)日:2022-09-20
申请号:US17014911
申请日:2020-09-08
Applicant: QUALCOMM Incorporated
Inventor: Ozcan Ozturk , Soo Bum Lee , Gavin Bernard Horn
IPC: H04W68/00 , H04W12/06 , H04W76/11 , H04L9/32 , H04W76/25 , H04W12/037 , H04W12/106
Abstract: This disclosure provides systems, methods and apparatus, including computer programs encoded on computer storage media, for encrypting paging information transmitted to a user equipment (UE) in a paging message. In one aspect, a base station (BS) encrypts paging information and transmits a paging message to one of a UE or another BS for transmission to the UE. The paging message includes the encrypted paging information. A UE receives the paging message from a BS including the encrypted paging information. The UE decrypts the encrypted paging information to identify paging information, and determines whether to communicate with the BS based on the paging information. The paging information may be encrypted and the encrypted paging information decrypted based on information configured or obtained during at least one of a registration procedure or a radio access network (RAN)-based Notification Area Update (RNAU). Confidentiality of paging information in paging messages may thereby be improved.
-
15.
公开(公告)号:US11290382B2
公开(公告)日:2022-03-29
申请号:US16414625
申请日:2019-05-16
Applicant: QUALCOMM Incorporated
Inventor: Soo Bum Lee , Gavin Bernard Horn , John Nasielski , Stefano Faccin
Abstract: A gateway device detects a trigger associated with a device and, in response, identifies an application service associated with the device, obtains a traffic network policy associated with the application service, and obtains a network access token based on the traffic network policy. The network access token facilitates validating and/or mapping a downlink data packet obtained at the gateway device in user-plane traffic that is destined for the device. The network access token is sent to an entity in control-plane signaling. Subsequently, the gateway device obtains a downlink data packet including the network access token. The gateway device verifies the network access token and/or maps the downlink data packet to the device using data obtained from the network access token. The network access token may be removed from the downlink data packet before the downlink data packet is sent to the device according to the mapping.
-
公开(公告)号:US11251968B2
公开(公告)日:2022-02-15
申请号:US16563275
申请日:2019-09-06
Applicant: QUALCOMM Incorporated
Inventor: Soo Bum Lee , Stefano Faccin , Anand Palanigounder , Miguel Griot , Adrian Edward Escott
IPC: H04L9/32 , H04W12/02 , H04L29/06 , H04W12/069 , H04W12/084
Abstract: The present disclosure provides techniques that may be applied, for example, in a multi-slice network for maintaining privacy when attempting to access the network. An exemplary method generally includes transmitting a registration request message to a serving network to register with the serving network; receiving a first confirmation message indicating a secure connection with the serving network has been established; transmitting, after receiving the first confirmation message, a secure message to the serving network comprising an indication of at least one configured network slice that the UE wants to communicate over, wherein the at least one configured network slice is associated with a privacy flag that is set; and receiving a second confirmation message from the serving network indicating that the UE is permitted to communicate over the at least one configured network slice.
-
公开(公告)号:US11082849B2
公开(公告)日:2021-08-03
申请号:US15082919
申请日:2016-03-28
Applicant: QUALCOMM Incorporated
Inventor: Soo Bum Lee , Gavin Bernard Horn , John Smee , Rajesh Pankaj , Thomas Rouse
IPC: H04L9/32 , H04W12/08 , H04W12/30 , H04W12/06 , H04L29/06 , G06F21/10 , H04W76/14 , H04L29/08 , H04W88/02 , H04W88/08
Abstract: A device obtains proof of its authority to use a first set of selectively activated features (first proof). An authorization server signs the first proof with its private key. The device sends a request to use a network service to a network node. The device sends the first proof to the network node. The network node validates the first proof using a public key of the authorization server. The network node grants the request to use the network service. The device sends a request for proof of authority for the network node to provide the network service (second proof). The device obtains the second proof, signed by another authorization server, and validates the second proof before using the network service. The first proof and the second proof each include a list of selectively activated features, where the selectively activated features are needed to use or provide the network service.
-
公开(公告)号:US11006274B2
公开(公告)日:2021-05-11
申请号:US15360544
申请日:2016-11-23
Applicant: QUALCOMM Incorporated
Inventor: Lenaig Genevieve Chaponniere , Gavin Bernard Horn , Stefano Faccin , John Nasielski , Soo Bum Lee
Abstract: Systems and techniques enable an improved network selection procedure. Providers maintain preferred networks lists provisioned to UEs. The preferred networks lists include WLAN RATs, and for each entry coverage area and type of supported services. UEs include multiple credentials for connectivity via providers and potentially multiple transceivers supporting multiple active services. A UE triggers a network selection procedure whenever a new service is initiated. A credential is selected. The UE builds a list of network/RAT combinations from preferred networks lists and filters this list, removing entries that do not support the new service. The UE takes the context of the UE into consideration, further filtering the list. The remaining entries are scanned and a network/RAT combination selected. The UE determines whether registering with the selected network/RAT combination causes an interruption to an ongoing service. If not, the UE registers on the selection. If so, the UE engages in interruption resolution.
-
公开(公告)号:US10952051B2
公开(公告)日:2021-03-16
申请号:US15460142
申请日:2017-03-15
Applicant: QUALCOMM Incorporated
Inventor: Soo Bum Lee , Stefano Faccin , Gavin Bernard Horn
IPC: G06F7/04 , G06F15/16 , H04L29/06 , H04W4/70 , H04L9/32 , H04L29/08 , H04W12/04 , H04W12/06 , H04W12/08 , H04W48/18 , H04W72/04
Abstract: Connectionless data transfer is disclosed. Authentication of a device and network node may be performed when data is sent from the device to an application server of an application service provider via a selected network. The transfer of data may take place in an absence of an existing device context between the network node interacting with the device and the core network through which the data travels. State management overhead and signaling overhead may be reduced by use of the exemplary aspects disclosed herein. For example, the device does not need to perform an authentication and key agreement (AKA) procedure to transfer the data and an existing (or pre-existing) device context need not be maintained at the core network.
-
公开(公告)号:US10772145B2
公开(公告)日:2020-09-08
申请号:US15913016
申请日:2018-03-06
Applicant: QUALCOMM Incorporated
Inventor: Karl Georg Hampel , Hong Cheng , Soo Bum Lee , Gavin Bernard Horn , Vincent Douglas Park
IPC: H04W76/15 , H04L12/741 , H04B7/155 , H04W24/02 , H04W88/16 , H04W92/20 , H04W84/04 , H04W88/04 , H04W40/24 , H04W36/08 , H04B7/26 , H04W40/02
Abstract: A user equipment (UE) may experience poor communication with a network access device, and the network access device may configure the UE to connect to, and route communications through, one or more relay nodes (e.g., which may be another UE, a network operator-deployed relay, etc.). Techniques are described whereby these relay nodes may autonomously form a wireless backhaul network. Sequential implementations are considered such that the size of the wireless backhaul network may scale efficiently. In some examples, the wireless backhaul network may form by reusing existing connectivity establishment procedures. Importantly, the proposed techniques enable a relay to possess (e.g., be configured with) functionality that may traditionally be associated with a UE, base station, and gateway. Such multi-faceted functionality may enable the described sequential formation of wireless backhaul networks with tree topology.
-
-
-
-
-
-
-
-
-