Identity privacy in wireless networks

    公开(公告)号:US11496891B2

    公开(公告)日:2022-11-08

    申请号:US16287308

    申请日:2019-02-27

    Abstract: Systems and techniques are disclosed to protect a user equipment's international mobile subscriber identity by providing a privacy mobile subscriber identity instead. In an attach attempt to a serving network, the UE provides the PMSI instead of IMSI, protecting the IMSI from exposure. The PMSI is determined between a home network server and the UE so that intermediate node elements in the serving network do not have knowledge of the relationship between the PMSI and the IMSI. Upon receipt of the PMSI in the attach request, the server generates a next PMSI to be used in a subsequent attach request and sends the next PMSI to the UE for confirmation. The UE confirms the next PMSI to synchronize between the UE and server and sends an acknowledgment token to the server. The UE and the server then each update local copies of the current and next PMSI values.

    Techniques for routing ID update
    34.
    发明授权

    公开(公告)号:US11172426B2

    公开(公告)日:2021-11-09

    申请号:US16592518

    申请日:2019-10-03

    Abstract: Certain aspects of the present disclosure relate to methods and apparatus for updating a routing ID associated with a user equipment in a wireless network. An exemplary method generally includes receiving a downlink control plane message including updated configuration information for a Unified Data Management (UDM) entity in the network; determining whether a universal subscriber identification module (USIM) of the UE supports one or more parameters stored in the USIM to be updated; based on the determination, storing the received configuration information in at least one of: the USIM if the USIM supports the one or more parameters to be updated; or memory of the UE if the USIM does not support the one or more parameters to be updated; generating an identifier for the UE based on the stored updated configuration information; and transmitting at least one message using the generated identifier.

    Transfer of security protected configuration data from HPLMN

    公开(公告)号:US11172360B2

    公开(公告)日:2021-11-09

    申请号:US15892067

    申请日:2018-02-08

    Abstract: Protected configuration data may be sent to user equipment subscribed to a first wireless communication network by a second wireless communication network with which the user equipment is registered. The first wireless communication network may protect the configuration data based on at least one first key when sending the data to the second wireless communication network. The second wireless communication network may send the configuration data to user equipment in messages protected by at least one second key. User equipment receives the message from the second wireless communication network, extracts the configuration data using the at least one second key, determines whether the configuration data has been altered at least in part based on the at least one first key, and applies the configuration data if the configuration data has not been altered. The protected configuration data may be sent in an information element of a control plane message.

    Information protection to detect fake base stations

    公开(公告)号:US11070981B2

    公开(公告)日:2021-07-20

    申请号:US16743927

    申请日:2020-01-15

    Abstract: Methods, systems, and devices for wireless communications are described. In some systems, devices may use information protection to detect fake base stations. A base station verified by a network may transmit first information to a user equipment (UE) in an unprotected message. If a fake base station intercepts and modifies the message before relaying the message to the UE, the UE may receive different information than the transmitted first information. The UE may then transmit an indication of the received information to the verified base station in a protected message. In some cases, based on the indication, the verified base station may re-transmit the first information to the UE in a message protected against modification by the fake base station. If the UE determines that the initially received information is different from the information received in the protected retransmission, the UE identifies message modification by the fake base station.

    DETECTION OF SYSTEM INFORMATION MODIFICATION USING ACCESS STRATUM SECURITY MODE COMMAND

    公开(公告)号:US20200344605A1

    公开(公告)日:2020-10-29

    申请号:US16856467

    申请日:2020-04-23

    Abstract: A user equipment (UE) may receive system information from a base station and may calculate a hash value using the system information as input to a hashing function. Similarly, prior to transmitting the system information, a valid base station may calculate a hash value using the system information as input to a hashing function. The base station may transmit the calculated hash value (e.g., which represent or be included in a set of hash values) to the UE in an access stratum (AS) security mode command (SMC) message. The UE may determine whether the received system information was modified based on the hash value (e.g., by comparing the UE calculated hash value and the set of hash values received from the base station in the AS SMC). If the UE indicates a mismatch of hash information, the base station may re-transmit the system information (e.g., in an integrity protected message).

    Secure signaling before performing an authentication and key agreement

    公开(公告)号:US10588019B2

    公开(公告)日:2020-03-10

    申请号:US15345077

    申请日:2016-11-07

    Abstract: Techniques are described for wireless communication. A wireless device may generate a secured query message based at least in part on a security credential of the wireless device. The secured query message may be generated prior to performing an authentication and key agreement (AKA) with a network. The wireless device may transmit the secured query message to the network, and receive a response to the secured query message. The wireless device may then determine whether or not to perform the AKA with the network based on the received response (e.g., the wireless device may determine whether or not the response is associated with the security credential of the wireless communication device and a network security credential of the network). The wireless device may establish a secure connection with the network or refrain from considering the response based on the determination.

    APPARATUS AND METHOD FOR MOBILITY PROCEDURE INVOLVING MOBILITY MANAGEMENT ENTITY RELOCATION

    公开(公告)号:US20200037155A1

    公开(公告)日:2020-01-30

    申请号:US16591419

    申请日:2019-10-02

    Abstract: A device that identifies entry into a new service area, transmits a service area update request to a network device associated with a network, receives a control plane message from the network indicating control plane device relocation or a key refresh due to a service area change in response to transmitting the service area update request, and derives a first key based in part on data included in the control plane message and a second key shared between the device and a key management device. Another device that receives a handover command from a network device associated with a network, the handover command indicating a new service area, derives a first key based on data included in the handover command and on a second key shared between the device and a key management device, and sends a handover confirmation message that is secured based on the first key.

    Method, apparatus, and system for reestablishing radio communication links due to radio link failure

    公开(公告)号:US10462837B2

    公开(公告)日:2019-10-29

    申请号:US15443981

    申请日:2017-02-27

    Abstract: One feature pertains to a method that includes establishing a radio communication connection with a first radio access node (RAN) that uses control plane signaling connections to carry user plane data. The method also includes determining that the wireless communication device is experiencing radio link failure (RLF) with the first RAN and that the radio communication connection should be reestablished with a second RAN. A reestablishment request message is transmitted to the second RAN that includes parameters that enable a core network node communicatively coupled to the second RAN to authenticate the wireless communication device and allow or reject reestablishment of the radio communication connection. The parameters include at least a message authentication code (MAC) based in part on one or more bits of a non-access stratum (NAS) COUNT value maintained at the wireless communication device.

Patent Agency Ranking