ENHANCED SECURITY FOR ACCESS STRATUM TRANSMISSION

    公开(公告)号:WO2019241999A1

    公开(公告)日:2019-12-26

    申请号:PCT/CN2018/092396

    申请日:2018-06-22

    Abstract: This disclosure relates to techniques, base stations, and user equipment devices (UEs) for performing base station authentication through access stratum signaling transmissions. The UE may operate in idle mode and may receive an authentication message from a base station through the wireless interface while operating in idle mode. The UE may determine whether a signature comprised within the authentication message is valid, and the UE may continue a connection procedure with the base station based on a determination that the signature is valid. If it is determined that the signature is invalid, the UE may designate the base station as a barred base station and may perform cell re-selection. The authentication message may be one of a radio resource control (RRC) connection setup message, a special RRC message, a media access control (MAC) message, or a random access channel (RACH) message comprising a random access response (RAR) message.

    SECURITY KEY GENERATION FOR HANDLING DATA TRANSMISSIONS FROM USER DEVICES IN AN INACTIVE STATE

    公开(公告)号:WO2022021323A1

    公开(公告)日:2022-02-03

    申请号:PCT/CN2020/106198

    申请日:2020-07-31

    Abstract: An example technique for security key derivation in a wireless system includes: sending a radio resource control (RRC) suspend message from a first node, to a first user device, the RRC suspend message including a first next hop (NH) chaining counter (NCC) value; releasing access stratum (AS) resources associated with the first user device; deriving a first node key based on the first NCC value; receiving a first uplink message from the first user device without allocating AS resources to the first user device; and unscrambling the first uplink message based on the first NCC value.

    MBS-KEY DISTRIBUTION AND TRAFFIC PROTECTION
    4.
    发明申请

    公开(公告)号:WO2022087979A1

    公开(公告)日:2022-05-05

    申请号:PCT/CN2020/124922

    申请日:2020-10-29

    Applicant: APPLE INC.

    Abstract: MBS key distribution includes processing group information associated with an MB session context received from an AF. At least a portion of the group information comprises a TMGI. A plurality of session join requests received from a plurality of UEs are processed. Each of the plurality of session join requests include the TMGI and are associated with the MB session context. A request associated with the MB session context for transmission to an MB-SMF is encoded. A response associated with the MB session context received from the MB-SMF is processed. The response includes a key derived for each of a portion of the plurality of UEs using a UE ID and the TMGI. A DL NAS message and an N2 message are encoded for the plurality of UEs and a base station, respectively. The DL NAS message and the N2 message include the derived key.

    USER PLANE INTEGRITY PROTECTION CONFIGURATION IN EN-DC

    公开(公告)号:WO2022087969A1

    公开(公告)日:2022-05-05

    申请号:PCT/CN2020/124865

    申请日:2020-10-29

    Applicant: APPLE INC.

    Abstract: Systems and methods provide packet data convergence protocol (PDCP) user plane (UP) integrity protection (IP) for a user equipments (UE) and radio access network (RAN) nodes operating in Evolved Universal Terrestrial Radio Access -New Radio dual connectivity (EN-DC). In an attach procedure, a UE may indicate a UE security capability for support of relay node (RN) PDCP UP IP used in LTE. Based on the UE security capability, a master e Node B (MeNB) security capability, and a secondary g Node B (SgNB) security capability, the MeNB may determine whether to use UP IP between the UE and the MeNB, the UE and the SgNB, and/or in a split bearer between the MeNB and the SgNB.

    IDENTITY-BASED MESSAGE INTEGRITY PROTECTION AND VERIFICATION FOR WIRELESS COMMUNICATION

    公开(公告)号:WO2020010515A1

    公开(公告)日:2020-01-16

    申请号:PCT/CN2018/095137

    申请日:2018-07-10

    Abstract: Techniques for identity-based message integrity protection and verification between a user equipment (UE) and a wireless network entity, include use of signatures derived from identity-based keys. To protect against attacks from rogue network entities before activation of a security context with a network entity, the UE verifies integrity of messages by checking a signature using an identity-based public key PK ID derived by the UE based on (i) an identity value (ID) of the network entity and (ii) a separate public key PK PKG of a private key generator (PKG) server. The network entity generates signatures for messages using an identity-based private key SK ID obtained from the PKG server, which generates the identity-based private key SK ID using (i) the ID value of the network entity and (ii) a private key SK PKG that is known only by the PKG server and corresponds to the public key PK PKG .

Patent Agency Ranking