Radio link recovery for user equipment

    公开(公告)号:US11523280B2

    公开(公告)日:2022-12-06

    申请号:US16953933

    申请日:2020-11-20

    Inventor: Suresh P. Nair

    Abstract: In response to a radio link failure between given user equipment and a source access node of a communication system during a data transfer operation over a control plane, a method is provided for recovering the radio link for the given user equipment through a target access node of the communication system. The radio link recovery is enabled via a mobility management node of the communication system using a non-access stratum security context previously established between the given user equipment and the mobility management node.

    Security in intersystem mobility
    4.
    发明授权

    公开(公告)号:US10512005B2

    公开(公告)日:2019-12-17

    申请号:US15822907

    申请日:2017-11-27

    Abstract: In accordance with the occurrence of a mobility event whereby user equipment moves from accessing a source network to accessing a target network in a communication system environment, the user equipment sends a control plane message to the target network comprising an integrity verification parameter associated with the source network and an integrity verification parameter associated with the target network. By providing integrity verification parameters for both the source network and the target network in an initial message sent by the user equipment to the mobility management element of the target network, the mobility management element of the target network can verify the user equipment on its own or seek the assistance of the source network.

    SECURITY MANAGEMENT WITH COMPROMISED-EQUIPMENT DETECTION IN A COMMUNICATION SYSTEM

    公开(公告)号:US20240056476A1

    公开(公告)日:2024-02-15

    申请号:US18446889

    申请日:2023-08-09

    CPC classification number: H04L63/145 H04L63/1425

    Abstract: Techniques for security management with compromised-equipment detection in a communication system are disclosed. For example, a method comprises causing intentional introduction of one or more errors in at least one communication protocol layer of a communication network, wherein the communication network has a plurality of user equipment connected thereto via at least one access point. The method further comprises causing verification of one or more received error indicators against one or more expected error indicators to decide whether any of: (i) the plurality of user equipment; (ii) the at least one access point; or (iii) one or more network entities, may be compromised. In other examples, verifications may be correlated with other logs including, for example, security event logs.

    RADIO LINK RECOVERY FOR USER EQUIPMENT

    公开(公告)号:US20210099877A1

    公开(公告)日:2021-04-01

    申请号:US16953933

    申请日:2020-11-20

    Inventor: Suresh P. Nair

    Abstract: In response to a radio link failure between given user equipment and a source access node of a communication system during a data transfer operation over a control plane, a method is provided for recovering the radio link for the given user equipment through a target access node of the communication system. The radio link recovery is enabled via a mobility management node of the communication system using a non-access stratum security context previously established between the given user equipment and the mobility management node.

    Security management in communication systems with provisioning based mechanism to identify information elements

    公开(公告)号:US10826946B2

    公开(公告)日:2020-11-03

    申请号:US16014358

    申请日:2018-06-21

    Abstract: In a communication system comprising a first network operatively coupled to a second network, wherein the first network comprises a first security edge protection proxy element operatively coupled to a second security edge protection proxy element of the second network, a method comprises provisioning at least a given one of the first and second security edge protection proxy elements with configuration information that enables the given security edge protection proxy element to identify at least one security operation to be applied to at least one information element in a received message before sending the message to the other one of the first and second security edge protection proxy elements.

Patent Agency Ranking