ENHANCED SECURITY FOR ACCESS STRATUM TRANSMISSION

    公开(公告)号:WO2019241999A1

    公开(公告)日:2019-12-26

    申请号:PCT/CN2018/092396

    申请日:2018-06-22

    Abstract: This disclosure relates to techniques, base stations, and user equipment devices (UEs) for performing base station authentication through access stratum signaling transmissions. The UE may operate in idle mode and may receive an authentication message from a base station through the wireless interface while operating in idle mode. The UE may determine whether a signature comprised within the authentication message is valid, and the UE may continue a connection procedure with the base station based on a determination that the signature is valid. If it is determined that the signature is invalid, the UE may designate the base station as a barred base station and may perform cell re-selection. The authentication message may be one of a radio resource control (RRC) connection setup message, a special RRC message, a media access control (MAC) message, or a random access channel (RACH) message comprising a random access response (RAR) message.

    SHARING SYSTEM ACCESS USING A MOBILE DEVICE
    12.
    发明申请

    公开(公告)号:WO2019183097A2

    公开(公告)日:2019-09-26

    申请号:PCT/US2019/022975

    申请日:2019-03-19

    Applicant: APPLE INC.

    Abstract: Techniques are disclosed relating to using a device to gain access to another system. In some embodiments, a first mobile device performs a pairing operation with a control unit that controls access to a system, the pairing operation including the first mobile device establishing a first cryptographic key with the control unit. The first mobile device receives a request to enable a second mobile device to communicate with the control unit, and in response to receiving the request, the first mobile device generates a second cryptographic key from the first cryptographic key. The first mobile device provides the second cryptographic key to the second mobile device. The second mobile device is configured to send a beacon including a payload encrypted with the second cryptographic key, and the encrypted payload is usable to authenticate the second mobile device to the control unit.

Patent Agency Ranking