-
公开(公告)号:WO2022087964A1
公开(公告)日:2022-05-05
申请号:PCT/CN2020/124831
申请日:2020-10-29
Applicant: APPLE INC.
Inventor: GUO, Shu , ZHANG, Dawei , XU, Fangli , HU, Haijing , LIANG, Huarui , CHEN, Yuqin
IPC: H04W12/00
Abstract: A user equipment (UE) establishes a first type of connection to a first public land mobile network (PLMN), the first type of connection having a first non-access stratum (NAS) Count pair corresponding to a first NAS security context associated with the first PLMN, establishes a second type of connection to a second PLMN, wherein a previous second type of connection was established with the first PLMN, wherein the previous second type of connection has a second NAS Count pair corresponding to the first NAS security context, wherein the second type of connection has a third NAS Count pair corresponding to a second NAS security context associated with the second PLMN and deregisters the previous second type of connection with the first PLMN to reset the second NAS count pair at the first PLMN.
-
12.
公开(公告)号:WO2022021367A1
公开(公告)日:2022-02-03
申请号:PCT/CN2020/106308
申请日:2020-07-31
Applicant: APPLE INC. , XU, Fangli
Inventor: ZHANG, Dawei , HU, Haijing , LIANG, Huarui , GUO, Shu , CHEN, Yuqin
Abstract: An example technique for security key derivation in a wireless system includes: receiving a radio resource control (RRC) suspend message from a first node, the RRC suspend message including a first next hop (NH) chaining counter (NCC) value, entering a RRC inactive state, deriving a first node key based on the first NCC value, generating a first uplink message for transmission in the RRC inactive state based on the first node key, and transmitting the first uplink message to a node while in the RRC inactive state.
-
公开(公告)号:WO2023272705A1
公开(公告)日:2023-01-05
申请号:PCT/CN2021/104113
申请日:2021-07-01
Applicant: APPLE INC.
Inventor: WU, Zhibin , XU, Fangli , HU, Haijing , PALLE VENKATA, Naveen Kumar R. , NUGGEHALLI, Pavan , ROSSBACH, Ralf , VANGALA, Sarma V. , GUO, Shu
Abstract: The present application relates to devices and components including apparatus, systems, and methods for secure random access in wireless communication systems.
-
14.
公开(公告)号:WO2022236596A1
公开(公告)日:2022-11-17
申请号:PCT/CN2021/092830
申请日:2021-05-10
Applicant: APPLE INC.
Inventor: GUO, Shu , ZHANG, Dawei , XU, Fangli , HU, Haijing , LIANG, Huarui , AGNEL, Mona , ROSSBACH, Ralf , MANITHARA VAMANAN, Sudeep , CHEN, Yuqin
Abstract: Disclosed are embodiments for authentication and authorization in a 5G network between an edge enabler client (EEC) of a UE and an edge configuration server (ECS). The embodiment include performing primary authentication with the 5G network to obtain a K AUSF; generating a K edge and a K edge ID using the K AUSF and a subscription permanent identifier (SUPI); providing the Kedge and the K edge ID to the EEC to cause it to compute a MAC EEC using the K edge and an EEC ID; and sending to the ECS an application registration request, the application registration request including the EEC ID, MACEEC, and K edge ID.
-
15.
公开(公告)号:WO2022021323A1
公开(公告)日:2022-02-03
申请号:PCT/CN2020/106198
申请日:2020-07-31
Applicant: APPLE INC. , XU, Fangli
Inventor: ZHANG, Dawei , HU, Haijing , LIANG, Huarui , GUO, Shu , CHEN, Yuqin
IPC: H04L29/06
Abstract: An example technique for security key derivation in a wireless system includes: sending a radio resource control (RRC) suspend message from a first node, to a first user device, the RRC suspend message including a first next hop (NH) chaining counter (NCC) value; releasing access stratum (AS) resources associated with the first user device; deriving a first node key based on the first NCC value; receiving a first uplink message from the first user device without allocating AS resources to the first user device; and unscrambling the first uplink message based on the first NCC value.
-
公开(公告)号:WO2021226929A1
公开(公告)日:2021-11-18
申请号:PCT/CN2020/090229
申请日:2020-05-14
Applicant: APPLE INC. , YAO, Chunhai
Inventor: YE, Chunxuan , ZHANG, Dawei , XU, Fangli , HU, Haijing , SUN, Haitong , HE, Hong , CUI, Jie , OTERI, Oghenekome , GUO, Shu , ZENG, Wei , YANG, Weidong , TANG, Yang , KIM, Yuchul , CHEN, Yuqin , ZHANG, Yushu
IPC: H04W72/04
Abstract: Methods to enhance the coverage of NR systems for coverage-limited wireless devices are disclosed. A serving base station may configure a coverage-limited UE with parameters for the UE to operate in a coverage enhancement mode through RRC signaling, DCI, or RAR grant. The UE may use the configuration parameters to determine whether to enter into the coverage enhancement mode when connecting and communicating with the serving base station. The configuration parameters may configure the UE to exploit both time diversity and frequency diversity to extend and enhance coverage when receiving the PDSCH and PDCCH channels, when transmitting the PUSCH and PUCCH channel, and when transmitting PUSCH Msg3 during random access. Advantageously, the base station may flexibly and dynamically configure the UE with coverage enhancement parameters to extend the coverage of the UE using time diversity and frequency diversity gains as the UE moves around.
-
公开(公告)号:WO2021203301A1
公开(公告)日:2021-10-14
申请号:PCT/CN2020/083775
申请日:2020-04-08
Applicant: APPLE INC. , CHEN, Yuqin
Inventor: BREINING, Birgit , ZHANG, Dawei , XU, Fangli , HU, Haijing , XING, Longda , NOOLU, Rama Diwakara Rao , GURUMOORTHY, Sethuraman , GUO, Shu , LOVLEKAR, Srirang A , WU, Zhibin
Abstract: The exemplary embodiments relate to a computer-readable storage medium, a device, an integrated circuit and a method that perform operations related to a first user equipment (UE) configured with a side link (SL) connection with a second UE. The operations include generating an SL counter check request including at least a first count for data transmissions from the first UE to the second UE as determined by the first UE. The operations further include transmitting the request to the second UE and receiving a counter check response to the request, the response comprising at least a second count for data transmissions from the first UE to the second UE as determined by the second UE. The operations further include determining a first difference between the first count and the second count and, when the first difference exceeds a threshold, releasing the SL connection with the second UE.
-
公开(公告)号:WO2023060406A1
公开(公告)日:2023-04-20
申请号:PCT/CN2021/123142
申请日:2021-10-11
Applicant: APPLE INC. , LIANG, Huarui
Inventor: YANG, Weidong , ZHANG, Dawei , HU, Haijing , NUGGEHALLI, Pavan , ROSSBACH, Ralf , GUO, Shu , VAMANAN, Sudeep Manithara , GUPTA, Vivek G , ZENG, Wei
IPC: H04L1/00
Abstract: A user plane function (UPF) of a core network is configured to receive an Internet Protocol (IP) packet including a flow label comprising a plurality of sub-fields, the plurality of sub-fields including an application data unit (ADU) identifier (ID) field for an ADU to which the IP packet belongs, map the IP packet to a quality of service (QoS) flow based on the flow label and transmit the IP packet to a base station with a tag including information from the plurality of sub-fields, the information including an ADU ID.
-
公开(公告)号:WO2022233029A1
公开(公告)日:2022-11-10
申请号:PCT/CN2021/092126
申请日:2021-05-07
Applicant: APPLE INC.
Inventor: GUO, Shu , ZHANG, Dawei , XU, Fangli , HU, Haijing , LIANG, Huarui , CHEN, Lanpeng , QIAO, Xiaoyu , CHEN, Yuqin
IPC: H04W12/04
Abstract: A user equipment (UE) is configured to join a multicast broadcast service (MBS) session. The UE sends, to a network function, a protocol data unit (PDU) modification request comprising a request to join a multicast broadcast service (MBS) session, generates a first key (K MBS-UE), receives a PDU session modification complete message comprising an encrypted second key (K MBS) and a key identification (KID) corresponding to the K MBS and decrypts the KMBS using the K MBS-UE.
-
公开(公告)号:WO2022174399A1
公开(公告)日:2022-08-25
申请号:PCT/CN2021/076956
申请日:2021-02-19
Applicant: APPLE INC.
Inventor: GUO, Shu , ZHANG, Dawei , HU, Haijing , DUO, Hao , LIANG, Huarui , CHEN, Lanpeng , AGNEL, Mona , ROSSBACH, Ralf , MANITHARA VAMANAN, Sudeep , QIAO, Xiaoyu
IPC: H04W12/06
Abstract: A user equipment (UE) may attempt to access an edge data network. The UE generates a first credential based on a second credential that was generated for a procedure between the UE and a network. The UE then generates an identifier corresponding to the first credential and generates a message authentication code based on the first credential and a count, wherein the count is associated with an identifier of an edge network client running on the UE. The UE then transmits an application registration request message to a server associated with an edge data network, the application registration request message including the count, the message authentication code, the identifier corresponding to the first credential, and a public land mobile network identifier (PLMN ID) of the network. The UE then receives an authentication accept message or an authentication reject message from the server associated with the edge data network.
-
-
-
-
-
-
-
-
-