-
71.
公开(公告)号:US20160381543A1
公开(公告)日:2016-12-29
申请号:US14900305
申请日:2014-06-13
Applicant: NEC CORPORATION
Inventor: Xiaowei ZHANG , Anand Raghawa PRASAD
Abstract: A method of performing a secure discovery of devices in ProSe communication by a requesting device (21) and the receiving device (22), including requesting a ProSe service request to a ProSe server (24) from the requesting device, performing verification on the requesting and receiving devices by the ProSe server, performing a discovery procedure by the ProSe server to obtain location information of the receiving device, and sending a ProSe service result to the requesting device. The performing discovery procedure includes sending the ProSe service request to a receiving device, performing source verification to see if the request is from an authorized ProSe server and checking discovery criteria to see whether the discovery criteria should have the requested service by the receiving device, and sending a accept message to the ProSe server, if the performing source verification and the checking discovery criteria are successful.
Abstract translation: 一种执行由请求设备(21)和接收设备(22)进行的ProSe通信中的设备的安全发现的方法,包括从请求设备向ProSe服务器(24)请求ProSe服务请求,对请求者进行验证 以及由ProSe服务器接收设备,由ProSe服务器执行发现过程以获得接收设备的位置信息,以及向请求设备发送ProSe服务结果。 执行发现过程包括向接收设备发送ProSe服务请求,执行源验证以查看请求是否来自授权的ProSe服务器,并检查发现标准,以查看发现标准是否应具有接收设备所请求的服务;以及 如果执行源验证和检查发现标准成功,则向ProSe服务器发送接受消息。
-
公开(公告)号:US20160315938A1
公开(公告)日:2016-10-27
申请号:US15105310
申请日:2014-12-18
Applicant: NEC Corporation
Inventor: Andreas KUNZ , Xiaowei ZHANG , Anand Raghawa PRASAD
IPC: H04L29/06
CPC classification number: H04L63/0892 , H04L63/0807 , H04L63/10 , H04L65/1016 , H04L65/1073 , H04L65/608 , H04L67/02 , H04L2463/141 , H04W12/06 , H04W12/12
Abstract: There is provided a solution as to how the authentication and thus the authorization of the webRTC IMS Client can be achieved in the IMS of the mobile network operator. The WIC (20) is using an ID to register with IMS, which may be an IMPU, an IMPI, gGRUU etc. The WIC (20) may be preconfigured by the WWSF (30) with the eP-CSCF (40) address and authentication information, but if not, then this information should be retrieved via the WWSF (30) or from the IMS directly or via other device management procedures e.g. OMA DM. It is further assumed that the subscriber has already a valid webRTC account/membership and this can be validated, authenticated and authorized by the WWSF (30).
Abstract translation: 提供了关于如何在移动网络运营商的IMS中实现webRTC IMS Client的认证以及授权的解决方案。 WIC(20)正在使用ID来注册IMS,IMS可以是IMPU,IMPI,gGRUU等.WIC(20)可以由具有eP-CSCF(40)地址的WWSF(30)预先配置, 认证信息,但是如果没有,那么该信息应该通过WWSF(30)或者从IMS直接或通过其他设备管理程序例如 OMA DM。 进一步假设用户已经有一个有效的webRTC账户/会员资格,这可以被WWSF验证,认证和授权(30)。
-
公开(公告)号:US20160149876A1
公开(公告)日:2016-05-26
申请号:US14899785
申请日:2014-06-13
Applicant: NEC CORPORATION
Inventor: Xiaowei ZHANG , Anand Raghawa PRASAD
IPC: H04L29/06
CPC classification number: H04L63/06 , H04L9/0833 , H04L9/088 , H04L9/3242 , H04L63/08 , H04L2209/80 , H04W4/80 , H04W12/02 , H04W12/10 , H04W76/10 , H04W76/14
Abstract: A method of performing authentication and authorization in Proximity based Service (ProSe) communication by a requesting device (31) which sends a request of a communication and a receiving device (32) which receives the request from the requesting device (31) and (32), the method including deriving session keys Kpc and Kpi from an unique key Kp at the requesting and receiving devices (31) and (32), using the session keys Kpc and Kpi for ProSe communication setup and direct communication between the requesting and receiving devices (31) and (32), starting the direct communication with the requesting and receiving devices (31) and (32). The key Kpc is confidentiality key and the key Kpi is integrity protection key.
Abstract translation: 一种通过发送通信请求的请求设备(31)和接收来自请求设备(31)和(32)的请求的接收设备(32)的请求设备(ProSe)通信中的认证和授权的方法, ),该方法包括使用用于ProSe通信建立的会话密钥Kpc和Kpi来在请求和接收设备(31)和(32)处从唯一密钥Kp导出会话密钥Kpc和Kpi,以及请求和接收设备之间的直接通信 (31)和(32),开始与请求和接收设备(31)和(32)的直接通信。 密钥Kpc是机密密钥,密钥Kpi是完整性保护密钥。
-
74.
公开(公告)号:US20150358816A1
公开(公告)日:2015-12-10
申请号:US14760319
申请日:2013-12-04
Applicant: NEC CORPORATION
Inventor: Xiaowei ZHANG , Anand Raghawa PRASAD
CPC classification number: H04W12/06 , H04L63/02 , H04L63/065 , H04L63/08 , H04L63/0869 , H04L63/0884 , H04L63/104 , H04W4/70 , H04W12/04
Abstract: Each of a group of MTC UEs (10—1 to 10_n) is configured with a first group key (Kgr) for a group GW (20) to authenticate each of the MTC UEs (10—1 to 10_n) as a member of the group. The group GW (20) is also configured with the first group key (Kgr) for authenticating each of the MTC UEs (10—1 to 10_n) as the member of the group. The group GW (20) can be configured with a second group key (Kgw) for an MME (30) to determine whether or not to allow the group GW (20) to broadcast a message to the MTC UEs (10—1 to 10_n).
Abstract translation: 一组MTC UE(10-1至10_n)中的每一个被配置有用于组GW(20)的第一组密钥(Kgr),以将每个MTC UE(10-1至10_n)认证为 组。 组GW(20)还配置有用于认证每个MTC UE(10-1至10_n)作为组的成员的第一组密钥(Kgr)。 组GW(20)可以配置有用于MME(30)的第二组密钥(Kgw),以确定是否允许组GW(20)向MTC UE(10-1至10_n)广播消息 )。
-
公开(公告)号:US20150319172A1
公开(公告)日:2015-11-05
申请号:US14648798
申请日:2013-12-04
Applicant: NEC CORPORATION
Inventor: Xiaowei ZHANG , Anand Raghawa PRASAD
CPC classification number: H04L63/0869 , H04L63/065 , H04W4/70 , H04W12/0052 , H04W12/02 , H04W12/04 , H04W12/06
Abstract: An SCS (60) sends out a trigger message for activating a group of MTC devices (10—1 to 10—n) through a network. An HSS (40) verifies whether or not to transfer the trigger message to the given MTC devices (10—1 to 10—n) based on subscription information of the group. A group GW (20) broadcasts the trigger message. Further, An MME (30) concatenates DL (downlink) messages addressed to the MTC devices (10—1 to 10—n). The group GW (20) distributes, to the MTC devices (10—1 to 10—n), the DL messages included in the concatenated message. Furthermore, the group GW (20) concatenates UL (uplink) messages received from the MTC devices (10—1 to 10—n). The MME (30) processes the UL messages included in the concatenated message.
Abstract translation: SCS(60)通过网络发送用于激活一组MTC设备(10-1至10-n)的触发消息。 HSS(40)基于组的订阅信息来验证是否将触发消息传送到给定的MTC设备(10-1至10-n)。 组GW(20)广播触发消息。 此外,MME(30)连接到寻址到MTC设备(10-1至10-n)的DL(下行链路)消息。 组GW(20)向MTC设备(10-1至10-n)分发包括在级联消息中的DL消息。 此外,组GW(20)连接从MTC设备(10-1至10-n)接收的UL(上行链路)消息。 MME(30)处理包括在级联消息中的UL消息。
-
公开(公告)号:US20240259803A1
公开(公告)日:2024-08-01
申请号:US18631247
申请日:2024-04-10
Applicant: NEC Corporation
Inventor: Sander DE KIEVIT , Anand Raghawa PRASAD , Sheeba Backia Mary BASKARAN
Abstract: An apparatus is provided. The apparatus includes a memory storing one or more instructions and a processor. The processor execute the one or more instructions to: receive update information from an external apparatus, the update information corresponding to a network communication; obtain a Subscription Concealed Identifier (SUCI) based on the update information; and transmit the SUCI to the external apparatus.
-
77.
公开(公告)号:US20230076879A1
公开(公告)日:2023-03-09
申请号:US17985256
申请日:2022-11-11
Applicant: NEC CORPORATION
Inventor: Sheeba Backia Mary BASKARAN , Sivakamy LAKSHMINARAYANAN , Anand Raghawa PRASAD , Sivabalan ARUMUGAM , Hironori ITO , Takahito YOSHIZAWA
Abstract: A communication terminal (10) includes control means for generating a subscription concealed identifier (SUCI) including a subscription permanent identifier (SUPI) concealed using a predetermined protection scheme, and a protection scheme identifier identifying the protection scheme, and transmission means for sending the SUCI to a first network apparatus during a registration procedure, the SUCI being sent for a second network apparatus to de-conceal the SUPI from the SUCI based on the protection scheme used to generate the SUCI.
-
公开(公告)号:US20220159537A1
公开(公告)日:2022-05-19
申请号:US17587228
申请日:2022-01-28
Applicant: NEC Corporation
Inventor: Xiaowei ZHANG , Anand Raghawa PRASAD
IPC: H04W36/28 , H04W76/27 , H04W12/041 , H04W12/0433 , H04W28/08
Abstract: An SeNB (30) informs an MeNB (20) that it can configure bearers for the given UE (10). At this time, the MeNB (20) manages the DRB status, and then sends a key S-KeNB to the SeNB (30). The MeNB (20) also sends a KSI for the S-KeNB to both of the UE (10) and the SeNB (30). After this procedure, the MeNB (20) informs an EPC (MME (40) and S-GW (50)) about the new bearer configured at the SeNB (30), such that the S-GW 50 can start offloading the bearer(s) to the SeNB 30. Prior to the offloading, the EPC network entity (MME (40) or S-GW (50)) performs verification that: 1) whether the request is coming from authenticated source (MeNB); and 2) whether the SeNB (30) is a valid eNB to which the traffic can be offload.
-
公开(公告)号:US20220132379A1
公开(公告)日:2022-04-28
申请号:US17568779
申请日:2022-01-05
Applicant: NEC Corporation
Inventor: Xiaowei ZHANG , Anand Raghawa PRASAD
IPC: H04W36/00
Abstract: A UE (10) provides information on potential S′eNB(s). The information is forwarded from an MeNB (20_1) to an M′eNB (20_2) such that the M′eNB (20_2) can determine, before the handover happens, whether the M′eNB (20_2) will configure a new SeNB (S′eNB) and which S′eNB the M′eNB (20_2) will configure. In one of options, the MeNB (20_1) derives a key S′-KeNB for communication protection between the UE (10) and the S′eNB (30_1), and send the S′-KeNB to the M′eNB (20_2). In another option, the M′eNB (20_2) derives the S′-KeNB from a key KeNB* received from the MeNB (20_1). The M′eNB (20_2) sends the S′-KeNB to the S′eNB (30_1). Moreover, there are also provided several variations to perform SeNB Release, SeNB Addition, Bearer Modification and the like, in which the order and/or timing thereof can be different during the handover procedure.
-
公开(公告)号:US20220095113A1
公开(公告)日:2022-03-24
申请号:US17540455
申请日:2021-12-02
Applicant: NEC Corporation
Inventor: Hironori ITO , Anand Raghawa PRASAD , Sivabalan ARUMUGAM , Takahito YOSHIZAWA , Sivakamy LAKSHMINARAYANAN , Sheeba Backia Mary BASKARAN
IPC: H04W12/106
Abstract: A method for integrity protection scheme by a mobile communication device or a core network entity according to a first exemplary aspect of the present disclosure includes configuring settings and parameters for integrity protection for user data with another party; receiving user plane data from the other party, calculating Message Authentication Code for Integrity (MAC-I) for a part of the data and checking integrity of the part of the data.
-
-
-
-
-
-
-
-
-