Apparatus and method for signaling enhanced security context for session encryption and integrity keys

    公开(公告)号:AU2011239422A1

    公开(公告)日:2012-11-08

    申请号:AU2011239422

    申请日:2011-04-15

    Applicant: QUALCOMM INC

    Abstract: Disclosed is a method for establishing an enhanced security context between a remote station and a serving network. In the method, the remote station forwards a first message to the serving network, wherein the first message includes an information element signaling that the remote station supports an enhanced security context. The remote station generates at least one session key, in accordance with the enhanced security context, using the information element. The remote station receives, in response to the first message, a second message having an indication that the serving network supports the enhanced security context. The remote station, in response to the second message, has wireless communications protected by the at least one session key.

    APPARATUS AND METHOD FOR SIGNALING ENHANCED SECURITY CONTEXT FOR SESSION ENCRYPTION AND INTEGRITY KEYS

    公开(公告)号:CA2795358A1

    公开(公告)日:2011-10-20

    申请号:CA2795358

    申请日:2011-04-15

    Applicant: QUALCOMM INC

    Abstract: Disclosed is a method for establishing an enhanced security context between a remote station and a serving network. In the method, the remote station forwards a first message to the serving network, wherein the first message includes an information element signaling that the remote station supports an enhanced security context. The remote station generates at least one session key, in accordance with the enhanced security context, using the information element. The remote station receives, in response to the first message, a second message having an indication that the serving network supports the enhanced security context. The remote station, in response to the second message, has wireless communications protected by the at least one session key.

    SEÑALIZACIÓN DE CAPACIDAD DE PROTECCIÓN DE INTEGRIDAD DEL PLANO DE USUARIO (UP IP) EN SISTEMAS 5G / 4G

    公开(公告)号:AR120081A1

    公开(公告)日:2022-02-02

    申请号:ARP200102637

    申请日:2020-09-22

    Applicant: QUALCOMM INC

    Abstract: Métodos, sistemas y dispositivos para admitir la protección de la integridad del plano del usuario (UP IP) para las comunicaciones con una red de acceso por radio (RAN). Pueden incluir indicar si un dispositivo inalámbrico admite o no UP IP a través del acceso por radio terrestre al sistema de telecomunicaciones móviles universal (UMTS) evolucionado (eUTRA) al incluir indicaciones de soporte de UP IP en los elementos de información (IE) de capacidad de seguridad del equipo de usuario (UE). Reivindicación 1: Un método para admitir la protección de la integridad del plano del usuario (UP IP) para las comunicaciones con una red de acceso por radio (RAN) caracterizado porque comprende: determinar, mediante un procesador de un dispositivo inalámbrico, si el dispositivo inalámbrico admite UP IP para conexiones de acceso por radio terrestre al sistema de telecomunicaciones móviles universal (UMTS) evolucionado (eUTRA) establecidas entre el dispositivo inalámbrico y una RAN; generar, mediante el procesador, un primer elemento de información (IE) de capacidad de seguridad que incluye una primera indicación de soporte de UP IP, en donde la primera indicación de soporte de UP IP indica si el dispositivo inalámbrico admite UP IP para conexiones de eUTRA establecidas entre el dispositivo inalámbrico y la RAN; y enviar, mediante el procesador, el primer IE de capacidad de seguridad a una estación base.

    IDENTITY PRIVACY IN WIRELESS NETWORKS

    公开(公告)号:AU2020202972B2

    公开(公告)日:2021-05-20

    申请号:AU2020202972

    申请日:2020-05-05

    Applicant: QUALCOMM INC

    Abstract: Systems and techniques are disclosed to protect a user equipment's international mobile subscriber identity by providing a privacy mobile subscriber identity instead. In an attach attempt to a serving network, the UE provides the PMSI instead of IMSI, protecting the IMSI from exposure. The PMSI is determined between a home network server and the UE so that intermediate node elements in the serving network do not have knowledge of the relationship between the PMSI and the IMSI. Upon receipt of the PMSI in the attach request, the server generates a next PMSI to be used in a subsequent attach request and sends the next PMSI to the UE for confirmation. The UE confirms the next PMSI to synchronize between the UE and server and sends an acknowledgment token to the server. The UE and the server then each update local copies of the current and next PMSI values.

    VEHICLE-TO-EVERYTHING REATTACH TIMING

    公开(公告)号:CA3028230C

    公开(公告)日:2021-02-16

    申请号:CA3028230

    申请日:2017-07-13

    Applicant: QUALCOMM INC

    Abstract: Methods, systems, and devices for wireless communication are described. A user equipment (UE) may establish a connection to a base station for wireless communications with a network that supports vehicle based communications. The UE may identify a boundary time for the base station. The boundary time may be associated with a periodic schedule when UEs connected to the base station and participating in the vehicle based communications over the network perform a disconnect procedure and a reattach procedure. The UE may perform the disconnect procedure and the reattach procedure at the boundary time.

    Network architecture and security with encrypted client device contexts

    公开(公告)号:AU2016318200B2

    公开(公告)日:2020-09-10

    申请号:AU2016318200

    申请日:2016-06-13

    Applicant: QUALCOMM INC

    Abstract: In an aspect, a network may support a number of client devices. In such a network, a client device transmits a request to communicate with a network, establishes a security context, and receives one or more encrypted client device contexts from the network. An encrypted client device context enables reconstruction of a context at the network for communication with the client device, where the context includes network state information associated with the client device. The client device transmits a message (e.g., including an uplink data packet) to the network that includes at least one encrypted client device context. Since the network device can reconstruct the context for the client device based on an encrypted client device context, the network device can reduce an amount of the context maintained at the network device in order to support a greater number of client devices.

    Procedimiento y aparato para vincular la autenticación de abonados y la autenticación de dispositivos en sistemas de comunicación

    公开(公告)号:ES2774921T3

    公开(公告)日:2020-07-23

    申请号:ES11757437

    申请日:2011-06-16

    Applicant: QUALCOMM INC

    Abstract: Un procedimiento operativo en un dispositivo (202), que comprende: realizar (706) una autenticación de abonado con una entidad de red (324) en base a un intercambio de acuerdo de autenticación de claves, AKA, entre el dispositivo y la entidad de red, llevada a cabo en mensajes de estrato de no acceso, NAS; realizar (708) una autenticación de dispositivo del dispositivo (202) con la entidad de red (324), llevada a cabo en los mismos mensajes de NAS usados para la autenticación de abonado basada en AKA, donde el dispositivo (202) está dotado previamente (702) de una clave específica de dispositivo (202) que se usa para la autenticación de dispositivo; generar (710) una clave de seguridad que vincula la autenticación de abonado y la autenticación de dispositivo; y usar (712) la clave de seguridad para asegurar las comunicaciones entre el dispositivo (202) y una red de servicio (108).

    INCORPORATING NETWORK POLICIES IN KEY GENERATION

    公开(公告)号:SG11202001600PA

    公开(公告)日:2020-04-29

    申请号:SG11202001600P

    申请日:2018-09-29

    Applicant: QUALCOMM INC

    Abstract: The present disclosure provides techniques that may be applied, for example, for providing network policy information in a secure manner. In some cases, a UE may receive a first message for establishing a secure connection with a network, wherein the first message comprises network policy information, generate a first key based in part on the network policy information, and use the first key to verify the network policy information.

Patent Agency Ranking