Refreshing security keys in 5G wireless systems

    公开(公告)号:US11503461B2

    公开(公告)日:2022-11-15

    申请号:US16612085

    申请日:2018-02-13

    Abstract: Techniques for refreshing security keys for enciphering and deciphering packets in a wireless communications system are provided. An exemplary method generally includes transmitting, while in a state with no dedicated resources allocated to the UE, a first message to request resumption of a radio resource control (RRC) connection, the first message encrypted using a first set of one or more keys, receiving, in response to the first message, a second message encrypted using the first set of one or more keys or a second set of one or more keys, determining, based on an indication in the second message or received prior to the second message, whether portions of the second message are encrypted using the second set of one or more keys, and processing the second message using the first set of one or more keys or the second set of one or more keys, based on the determination.

    Detection of system information modification using access stratum security mode command

    公开(公告)号:US11463875B2

    公开(公告)日:2022-10-04

    申请号:US16856467

    申请日:2020-04-23

    Abstract: A user equipment (UE) may receive system information from a base station and may calculate a hash value using the system information as input to a hashing function. Similarly, prior to transmitting the system information, a valid base station may calculate a hash value using the system information as input to a hashing function. The base station may transmit the calculated hash value (e.g., which represent or be included in a set of hash values) to the UE in an access stratum (AS) security mode command (SMC) message. The UE may determine whether the received system information was modified based on the hash value (e.g., by comparing the UE calculated hash value and the set of hash values received from the base station in the AS SMC). If the UE indicates a mismatch of hash information, the base station may re-transmit the system information (e.g., in an integrity protected message).

    Secure paging for service prioritization

    公开(公告)号:US11452067B2

    公开(公告)日:2022-09-20

    申请号:US17014911

    申请日:2020-09-08

    Abstract: This disclosure provides systems, methods and apparatus, including computer programs encoded on computer storage media, for encrypting paging information transmitted to a user equipment (UE) in a paging message. In one aspect, a base station (BS) encrypts paging information and transmits a paging message to one of a UE or another BS for transmission to the UE. The paging message includes the encrypted paging information. A UE receives the paging message from a BS including the encrypted paging information. The UE decrypts the encrypted paging information to identify paging information, and determines whether to communicate with the BS based on the paging information. The paging information may be encrypted and the encrypted paging information decrypted based on information configured or obtained during at least one of a registration procedure or a radio access network (RAN)-based Notification Area Update (RNAU). Confidentiality of paging information in paging messages may thereby be improved.

    Efficient policy enforcement for downlink traffic using network access tokens—control-plane approach

    公开(公告)号:US11290382B2

    公开(公告)日:2022-03-29

    申请号:US16414625

    申请日:2019-05-16

    Abstract: A gateway device detects a trigger associated with a device and, in response, identifies an application service associated with the device, obtains a traffic network policy associated with the application service, and obtains a network access token based on the traffic network policy. The network access token facilitates validating and/or mapping a downlink data packet obtained at the gateway device in user-plane traffic that is destined for the device. The network access token is sent to an entity in control-plane signaling. Subsequently, the gateway device obtains a downlink data packet including the network access token. The gateway device verifies the network access token and/or maps the downlink data packet to the device using data obtained from the network access token. The network access token may be removed from the downlink data packet before the downlink data packet is sent to the device according to the mapping.

    Network access privacy
    16.
    发明授权

    公开(公告)号:US11251968B2

    公开(公告)日:2022-02-15

    申请号:US16563275

    申请日:2019-09-06

    Abstract: The present disclosure provides techniques that may be applied, for example, in a multi-slice network for maintaining privacy when attempting to access the network. An exemplary method generally includes transmitting a registration request message to a serving network to register with the serving network; receiving a first confirmation message indicating a secure connection with the serving network has been established; transmitting, after receiving the first confirmation message, a secure message to the serving network comprising an indication of at least one configured network slice that the UE wants to communicate over, wherein the at least one configured network slice is associated with a privacy flag that is set; and receiving a second confirmation message from the serving network indicating that the UE is permitted to communicate over the at least one configured network slice.

    Validating authorization for use of a set of features of a device

    公开(公告)号:US11082849B2

    公开(公告)日:2021-08-03

    申请号:US15082919

    申请日:2016-03-28

    Abstract: A device obtains proof of its authority to use a first set of selectively activated features (first proof). An authorization server signs the first proof with its private key. The device sends a request to use a network service to a network node. The device sends the first proof to the network node. The network node validates the first proof using a public key of the authorization server. The network node grants the request to use the network service. The device sends a request for proof of authority for the network node to provide the network service (second proof). The device obtains the second proof, signed by another authorization server, and validates the second proof before using the network service. The first proof and the second proof each include a list of selectively activated features, where the selectively activated features are needed to use or provide the network service.

    Service-based network selection
    18.
    发明授权

    公开(公告)号:US11006274B2

    公开(公告)日:2021-05-11

    申请号:US15360544

    申请日:2016-11-23

    Abstract: Systems and techniques enable an improved network selection procedure. Providers maintain preferred networks lists provisioned to UEs. The preferred networks lists include WLAN RATs, and for each entry coverage area and type of supported services. UEs include multiple credentials for connectivity via providers and potentially multiple transceivers supporting multiple active services. A UE triggers a network selection procedure whenever a new service is initiated. A credential is selected. The UE builds a list of network/RAT combinations from preferred networks lists and filters this list, removing entries that do not support the new service. The UE takes the context of the UE into consideration, further filtering the list. The remaining entries are scanned and a network/RAT combination selected. The UE determines whether registering with the selected network/RAT combination causes an interruption to an ongoing service. If not, the UE registers on the selection. If so, the UE engages in interruption resolution.

    Autonomous formation for backhaul networks

    公开(公告)号:US10772145B2

    公开(公告)日:2020-09-08

    申请号:US15913016

    申请日:2018-03-06

    Abstract: A user equipment (UE) may experience poor communication with a network access device, and the network access device may configure the UE to connect to, and route communications through, one or more relay nodes (e.g., which may be another UE, a network operator-deployed relay, etc.). Techniques are described whereby these relay nodes may autonomously form a wireless backhaul network. Sequential implementations are considered such that the size of the wireless backhaul network may scale efficiently. In some examples, the wireless backhaul network may form by reusing existing connectivity establishment procedures. Importantly, the proposed techniques enable a relay to possess (e.g., be configured with) functionality that may traditionally be associated with a UE, base station, and gateway. Such multi-faceted functionality may enable the described sequential formation of wireless backhaul networks with tree topology.

Patent Agency Ranking