TECHNIEQUES FOR DERIVING SECURITY KEYS FOR A CELLULAR NETWORK BASED ON PERFORMANCE OF AN EXTENSIBLE AUTHENTICATION PROTOCOL (EAP) PROCEDURE

    公开(公告)号:US20200029212A1

    公开(公告)日:2020-01-23

    申请号:US16586464

    申请日:2019-09-27

    Abstract: Techniques are described for wireless communication. A method for wireless communication at a user equipment (UE) includes performing an extensible authentication protocol (EAP) procedure with an authentication server via an authenticator. The EAP procedure is based at least in part on a set of authentication credentials exchanged between the UE and the authentication server. The method also includes deriving, as part of performing the EAP procedure, a master session key (MSK) and an extended master session key (EMSK) that are based at least in part on the authentication credentials and a first set of parameters; determining a network type associated with the authenticator; and performing, based at least in part on the determined network type, at least one authentication procedure with the authenticator. The at least one authentication procedure is based on an association of the MSK or the EMSK with the determined network type.

    IDENTITY PRIVACY IN WIRELESS NETWORKS
    44.
    发明申请

    公开(公告)号:US20190394640A1

    公开(公告)日:2019-12-26

    申请号:US16287308

    申请日:2019-02-27

    Abstract: Systems and techniques are disclosed to protect a user equipment's international mobile subscriber identity by providing a privacy mobile subscriber identity instead. In an attach attempt to a serving network, the UE provides the PMSI instead of IMSI, protecting the IMSI from exposure. The PMSI is determined between a home network server and the UE so that intermediate node elements in the serving network do not have knowledge of the relationship between the PMSI and the IMSI. Upon receipt of the PMSI in the attach request, the server generates a next PMSI to be used in a subsequent attach request and sends the next PMSI to the UE for confirmation. The UE confirms the next PMSI to synchronize between the UE and server and sends an acknowledgment token to the server. The UE and the server then each update local copies of the current and next PMSI values.

    AUTHENTICATION IN SECURE USER PLANE LOCATION (SUPL) SYSTEMS
    46.
    发明申请
    AUTHENTICATION IN SECURE USER PLANE LOCATION (SUPL) SYSTEMS 有权
    安全用户平面设备(SUPL)系统的认证

    公开(公告)号:US20140094147A1

    公开(公告)日:2014-04-03

    申请号:US14097070

    申请日:2013-12-04

    Abstract: A particular method includes generating, at a secure user plane location (SUPL) server, a message to be sent to a mobile device, the message including: a server certificate including an identifier of the SUPL server and a public key of the SUPL server; and a request for a device certificate of the mobile device. The method also includes receiving a reply from the mobile device that includes a device certificate of the mobile device; and authenticating the mobile device as associated with a SUPL user based on the device certificate.

    Abstract translation: 特定方法包括在安全用户平面位置(SUPL)服务器处生成要发送到移动设备的消息,该消息包括:包括SUPL服务器的标识符和SUPL服务器的公钥的服务器证书; 以及对移动设备的设备证书的请求。 该方法还包括从移动设备接收包括移动设备的设备证书的回复; 以及基于所述设备证书将所述移动设备认证为与SUPL用户相关联。

    Method and apparatus for multiple registrations

    公开(公告)号:US12052358B2

    公开(公告)日:2024-07-30

    申请号:US18094868

    申请日:2023-01-09

    CPC classification number: H04L9/088 H04W12/04

    Abstract: A user device having a security context with a first network based on a first key may establish a security context with a second network. In a method, the user device may generate a key identifier based on the first key and a network identifier of the second network. The user device may forward the key identifier to the second network for forwarding to the first network by the second network to enable the first network to identify the first key at the first network. The user device may receive a key count from the second network. The key count may be associated with a second key forwarded to the second network from the first network. The user device may generate the second key based on the first key and the received key count thereby establishing a security context between the second network and the user device.

Patent Agency Ranking