TECHNIQUES FOR DERIVING SECURITY KEYS FOR A CELLULAR NETWORK BASED ON PERFORMANCE OF AN EXTENSIBLE AUTHENTICATION PROTOCOL (EAP) PROCEDURE

    公开(公告)号:US20230031581A1

    公开(公告)日:2023-02-02

    申请号:US17958923

    申请日:2022-10-03

    Abstract: Techniques are described for wireless communication. A method for wireless communication at a user equipment (UE) includes performing an extensible authentication protocol (EAP) procedure with an authentication server via an authenticator. The EAP procedure is based at least in part on a set of authentication credentials exchanged between the UE and the authentication server. The method also includes deriving, as part of performing the EAP procedure, a master session key (MSK) and an extended master session key (EMSK) that are based at least in part on the authentication credentials and a first set of parameters; determining a network type associated with the authenticator; and performing, based at least in part on the determined network type, at least one authentication procedure with the authenticator. The at least one authentication procedure is based on an association of the MSK or the EMSK with the determined network type.

    Techniques for deriving security keys for a cellular network based on performance of an extensible authentication protocol (EAP) procedure

    公开(公告)号:US11463871B2

    公开(公告)日:2022-10-04

    申请号:US16586464

    申请日:2019-09-27

    Abstract: Techniques are described for wireless communication. A method for wireless communication at a user equipment (UE) includes performing an extensible authentication protocol (EAP) procedure with an authentication server via an authenticator. The EAP procedure is based at least in part on a set of authentication credentials exchanged between the UE and the authentication server. The method also includes deriving, as part of performing the EAP procedure, a master session key (MSK) and an extended master session key (EMSK) that are based at least in part on the authentication credentials and a first set of parameters; determining a network type associated with the authenticator; and performing, based at least in part on the determined network type, at least one authentication procedure with the authenticator. The at least one authentication procedure is based on an association of the MSK or the EMSK with the determined network type.

    Encrypting network slice selection assistance information

    公开(公告)号:US11350272B2

    公开(公告)日:2022-05-31

    申请号:US16669372

    申请日:2019-10-30

    Abstract: Methods, systems, and devices for wireless communications are described. A user equipment (UE) may participate in a registration procedure with an access and mobility management function (AMF). The UE may transmit to the AMF, as part of the registration procedure, an indication of one or more single network slice selection assistance information (S-NSSAI) or a network slice selection assistance information (NSSAI). Following, the UE may receive a control message from the AMF, wherein the control message includes one or more encrypted S-NSSAI values or an encrypted NSSAI value based on the indication. The UE may then transmit the encrypted S-NSSAI or the encrypted NSSAI to a base station as part of a message.

    RELAY SIDELINK COMMUNICATIONS FOR SECURE LINK ESTABLISHMENT

    公开(公告)号:US20210345104A1

    公开(公告)日:2021-11-04

    申请号:US17244434

    申请日:2021-04-29

    Abstract: Methods, systems, and devices for wireless communications are described that enable establishment of secure communications and security keys for a remote user equipment (UE) and a relay UE to perform relayed sidelink communications in which the remote UE communicates with a network via the relay UE. To establish secure communications for the direct communications between the relay UE and the remote UE, one or more security keys may be established encryption and decryption of communications. To establish the security keys, the relay UE may forward a request for direct communications to a key management function (e.g., a ProSe key management function (PKMF)) in a control plane of a core network (e.g., in a control plane message to the PKMF via an access and mobility function (AMF)). The PKMF may derive relay keys and return information related to the relay keys to the relay UE the remote UE.

    INFORMATION PROTECTION TO DETECT FAKE BASE STATIONS

    公开(公告)号:US20200236554A1

    公开(公告)日:2020-07-23

    申请号:US16743927

    申请日:2020-01-15

    Abstract: Methods, systems, and devices for wireless communications are described. In some systems, devices may use information protection to detect fake base stations. A base station verified by a network may transmit first information to a user equipment (UE) in an unprotected message. If a fake base station intercepts and modifies the message before relaying the message to the UE, the UE may receive different information than the transmitted first information. The UE may then transmit an indication of the received information to the verified base station in a protected message. In some cases, based on the indication, the verified base station may re-transmit the first information to the UE in a message protected against modification by the fake base station. If the UE determines that the initially received information is different from the information received in the protected retransmission, the UE identifies message modification by the fake base station.

    METHOD, APPARATUS, AND SYSTEM FOR REESTABLISHING RADIO COMMUNICATION LINKS DUE TO RADIO LINK FAILURE

    公开(公告)号:US20200015310A1

    公开(公告)日:2020-01-09

    申请号:US16575200

    申请日:2019-09-18

    Abstract: One feature pertains to a method that includes establishing a radio communication connection with a first radio access node (RAN) that uses control plane signaling connections to carry user plane data. The method also includes determining that the wireless communication device is experiencing radio link failure (RLF) with the first RAN and that the radio communication connection should be reestablished with a second RAN. A reestablishment request message is transmitted to the second RAN that includes parameters that enable a core network node communicatively coupled to the second RAN to authenticate the wireless communication device and allow or reject reestablishment of the radio communication connection. The parameters include at least a message authentication code (MAC) based in part on one or more bits of a non-access stratum (NAS) COUNT value maintained at the wireless communication device.

Patent Agency Ranking