-
公开(公告)号:WO2019241999A1
公开(公告)日:2019-12-26
申请号:PCT/CN2018/092396
申请日:2018-06-22
Applicant: APPLE INC. , XU, Fangli
Inventor: XU, Fangli , YANG, Xiangying , BRIGGS, Elliot S. , POST, Samuel D. , SIERRA, Yannick L. , ZHANG, Dawei , HU, Haijing , LIANG, Huarui , LI, Li , ZHANG, Lijia , GUO, Shu , CHEN, Yuqin
IPC: H04W12/06
Abstract: This disclosure relates to techniques, base stations, and user equipment devices (UEs) for performing base station authentication through access stratum signaling transmissions. The UE may operate in idle mode and may receive an authentication message from a base station through the wireless interface while operating in idle mode. The UE may determine whether a signature comprised within the authentication message is valid, and the UE may continue a connection procedure with the base station based on a determination that the signature is valid. If it is determined that the signature is invalid, the UE may designate the base station as a barred base station and may perform cell re-selection. The authentication message may be one of a radio resource control (RRC) connection setup message, a special RRC message, a media access control (MAC) message, or a random access channel (RACH) message comprising a random access response (RAR) message.
-
公开(公告)号:WO2019183097A2
公开(公告)日:2019-09-26
申请号:PCT/US2019/022975
申请日:2019-03-19
Applicant: APPLE INC.
Inventor: HARIHARAN, Sriram , SIERRA, Yannick L. , JACOBS, Frederic
Abstract: Techniques are disclosed relating to using a device to gain access to another system. In some embodiments, a first mobile device performs a pairing operation with a control unit that controls access to a system, the pairing operation including the first mobile device establishing a first cryptographic key with the control unit. The first mobile device receives a request to enable a second mobile device to communicate with the control unit, and in response to receiving the request, the first mobile device generates a second cryptographic key from the first cryptographic key. The first mobile device provides the second cryptographic key to the second mobile device. The second mobile device is configured to send a beacon including a payload encrypted with the second cryptographic key, and the encrypted payload is usable to authenticate the second mobile device to the control unit.
-