APPARATUS, SYSTEM, AND METHOD FOR MONITORING NETWORK SECURITY AND PERFORMANCE

    公开(公告)号:US20230180005A1

    公开(公告)日:2023-06-08

    申请号:US17927680

    申请日:2022-03-15

    申请人: MAGDATA INC.

    IPC分类号: H04W12/121 H04W12/033

    CPC分类号: H04W12/121 H04W12/033

    摘要: One aspect of the present invention discloses a method by which a network security monitoring apparatus monitors a 5G network. The method by which a network monitoring apparatus monitors a 5G network, according to one aspect of the present invention, comprises the steps of: mirroring and receiving a packet transmitted from a user terminal to a 5G core network and transmitted to a common network through at least one security module; and calculating an index related to network performance by monitoring the mirrored packet, wherein the at least one security module is located between a user plane function (UPF)-related module of the 5G core network and the common network and performs a security-related operation on data from the user terminal, and the network monitoring apparatus is located between the UPF-related module of the 5G core network and the common network and calculates the index related to the network performance according to mirroring of the packet transmitted through the at least one security module.

    SELECTIVE USER PLANE PROTECTION IN 5G VIRTUAL RAN

    公开(公告)号:US20230179996A1

    公开(公告)日:2023-06-08

    申请号:US17911682

    申请日:2020-03-18

    IPC分类号: H04W12/033

    CPC分类号: H04W12/033

    摘要: Systems and methods for selective User Plane protection in a 5G virtual RAN are provided. A method performed by a gNB Central Unit (gNB-CU) for communicating with a gNB-Distributed Unit (gNB-DU) includes determining whether to selectively encrypt a PDU to be sent to the gNB-DU if the PDU is not otherwise encrypted. In response to determining to selectively encrypt, the method includes encrypting the PDU to be sent to the gNB-DU. In response to determining to not selectively encrypt, the method includes passing the PDU to be sent to the gNB-DU. In this way, additional security is provided while performance impact is minimized. In some embodiments, this provides a lower overhead on the gNB-CU-UP side compared to applying a generic protection of all PDUs. Additionally, the latency overhead is limited since a secure session establishment and handshake is confined to the gNB-CU-UP-SEG domain instead of gNB-CU-UP to gNB-DU.

    CROSS NETWORK SHARING SYSTEM
    65.
    发明公开

    公开(公告)号:US20230156054A1

    公开(公告)日:2023-05-18

    申请号:US18091426

    申请日:2022-12-30

    申请人: T1V, Inc.

    摘要: A system includes a common display, a display computer to run collaboration software connected to the common display that drives the common display, the display computer being on a first network, a first mobile device to run a sharing application and a streaming application, the first mobile device being on a second network, separate from the first network, the streaming application to convert a display of the mobile device into stream data, a control channel between the mobile device and the display computer, and a stream channel between the display computer and the mobile device. The mobile device sends stream data directly to the display computer, wherein the display computer is to display the stream data on the common display. The stream channel may be directly between the mobile device and the display computer or may be over a relay server.

    METHOD AND DEVICE FOR SELECTIVE USER PLANE SECURITY IN WIRELESS COMMUNICATION SYSTEM

    公开(公告)号:US20230145440A1

    公开(公告)日:2023-05-11

    申请号:US18092690

    申请日:2023-01-03

    IPC分类号: H04W12/033

    CPC分类号: H04W12/033

    摘要: An example security processing method includes receiving data packets at a packet data convergence protocol (PDCP) layer from an upper layer and parsing header information of each of the data packets to determine a length of each of the plurality of headers within the corresponding header information and whether a security header is present or absent in the corresponding data packets. The method further includes identifying corresponding header information of the data packets in which the security header is present based on the determination. The method further includes encrypting, based on the determined header lengths, only each of the plurality of headers of the identified corresponding header information in which the security header is present, and thereafter transmitting the one or more data packets to a lower layer after adding information regarding each of the encrypted headers along with their encryption length into a PDCP header.

    ENABLING ROAMING WITH AUTHENTICATION AND KEY MANAGEMENT FOR APPLICATIONS

    公开(公告)号:US20230136693A1

    公开(公告)日:2023-05-04

    申请号:US17515238

    申请日:2021-10-29

    摘要: Apparatuses, methods, and systems are disclosed for enabling roaming with authentication and key management for applications. An apparatus includes a processor that determines a serving network of a user equipment (“UE”) device, the serving network comprising a visited public land mobile network (“VPLMN”) that is different from a home PLMN (“HPLMN”) associated with the UE. The processor selects a network function within the serving network for provisioning an authentication and key management for applications (“AKMA”) security context for an application function (“AF”) based on a name for the serving network. The apparatus includes a transceiver that sends the security context to the network function.

    MOVEMENT VERIFICATION SYSTEM AND METHOD

    公开(公告)号:US20230123643A1

    公开(公告)日:2023-04-20

    申请号:US17768578

    申请日:2020-10-14

    申请人: SweatCo Limited

    IPC分类号: H04W12/033 G01C22/00 H04L9/32

    摘要: Movement verification methods and systems 1 are disclosed. These methods and systems are configured to determine user movement that is characterised by a sequence of repeated user actions—such as steps or bicycle crank revolutions. A user mobile device 10 is positioned in proximity to a user so as to register the movement of that user. The user mobile device comprising a sensor set 17 and is configured to generate from that sensor set an unverified set of movement data resulting from user movement. A movement verifier 5 is in communication with the mobile user device 10. The movement verifier 5 is configured to receive the unverified set of movement data from the user mobile device 10 and apply a movement verification function that compares the unverified set of movement data against a model so as to verify user movement that is characterised by a sequence of repeated user actions, such as steps.

    Security key generation techniques
    69.
    发明授权

    公开(公告)号:US11632245B2

    公开(公告)日:2023-04-18

    申请号:US17159656

    申请日:2021-01-27

    申请人: ZTE Corporation

    发明人: Jianxun Al He Huang

    摘要: Techniques are described to generate a first security key when a user equipment operating in an inactive state initiates a data transmission or a procedure to resume network connection. The first security key is generated based on a second security key associated with a first network node and a counter value, and the first security key is associated with a second network node and is used to generate user plane security keys to transmit data to or to receive data from one or more network nodes.

    Physical layer security with component carrier switching

    公开(公告)号:US11627575B2

    公开(公告)日:2023-04-11

    申请号:US17342440

    申请日:2021-06-08

    摘要: The base station may transmit, to a UE, a configuration of a set of secure RSs for each CC of a set of CCs and at least one RE, and instruct the UE to select a subset of CCs from a set of CCs. The base station and the UE may measure the set of secure RS across the at least one RE, and select the subset of CCs from the set of CCs based on the measurement. The base station and the UE may communicate with each other on the subset of CCs. The base station and the UE may communicate with each other on a first CC of the subset of CCs, and switch the CC from the first CC to a second CC of the subset of CCs to communicate with each other, based on a number of ACKs/NACKs transmitted or a pattern.