Prevention of replay attack in long term evolution device-to-device discovery

    公开(公告)号:AU2015231950B2

    公开(公告)日:2019-05-02

    申请号:AU2015231950

    申请日:2015-01-30

    Applicant: QUALCOMM INC

    Abstract: Methods, systems, and devices are described for device-to-device (D2D) wireless communication. A device may receive a timing variable from a network while the device is in a connected mode. The device may then use the timing variable for D2D discovery message authentication. The device may compare the timing variable with a local timing variable to determine whether a difference between the two variables is within a maximum allowable offset. The device may announce the D2D discovery message to another device when the difference is within the maximum allowable offset.

    Method and apparatus for reestablishing radio communication links due to radio link failure

    公开(公告)号:AU2017355355A1

    公开(公告)日:2019-04-11

    申请号:AU2017355355

    申请日:2017-10-30

    Applicant: QUALCOMM INC

    Abstract: One feature pertains to a method that includes establishing a radio communication connection with a first radio access node (RAN) that uses control plane signaling connections to carry user plane data. The method also includes determining that the wireless communication device is experiencing radio link failure (RLF) with the first RAN and that the radio communication connection should be reestablished with a second RAN. A reestablishment request message is transmitted to the second RAN that includes parameters that enable a core network node communicatively coupled to the second RAN to authenticate the wireless communication device and allow or reject reestablishment of the radio communication connection. The parameters include at least a message authentication code (MAC) based in part on one or more bits of a non-access stratum (NAS) COUNT value maintained at the wireless communication device.

    SECURITY KEY DERIVATION FOR HANDOVER

    公开(公告)号:CA3067886A1

    公开(公告)日:2019-01-31

    申请号:CA3067886

    申请日:2018-07-16

    Applicant: QUALCOMM INC

    Abstract: Methods, systems, and devices for wireless communication are described that support security key derivation for handover. A network entity (e.g., an access and mobility function (AMF)) may establish an access stratum (AS) key to ensure secure communications between a user equipment (UE) and a base station. If the UE relocates to a new network entity (e.g., target network entity), the initial network entity (e.g., source network entity) may perform a handover procedure to the target network entity. In some aspects, the network entities may derive a unified AS key for the handover procedure. Additionally, the network entities may utilize one or more intermediate keys (e.g., refreshed intermediate keys) derived from, in part, respective freshness parameters for the handover procedure. The target network entity may then utilize the derived intermediate keys to derive the AS key for the handover procedure and establish communications with the UE.

    Enhanced non-access stratum security

    公开(公告)号:AU2017258596A1

    公开(公告)日:2018-10-04

    申请号:AU2017258596

    申请日:2017-03-27

    Applicant: QUALCOMM INC

    Abstract: A user equipment (UE) may be configured to transmit a registration message to a network to establish a secure connection for non-access stratum (NAS) messages between the network and a UE, the secure connection based at least in part on a UE identifier and security capabilities of the UE included in the registration message. The UE may then exchange NAS messages with the network over the secure connection. The UE may also establish, in response to the registration message, an authentication protocol with the network and encrypt subsequent NAS messages based in part on the authentication protocol.

    ACCESS STRATUM SECURITY FOR EFFICIENT PACKET PROCESSING

    公开(公告)号:CA3033019A1

    公开(公告)日:2018-03-29

    申请号:CA3033019

    申请日:2017-09-22

    Applicant: QUALCOMM INC

    Abstract: Certain aspects of the present disclosure provide techniques for managing security keys for enciphering and deciphering packets transmitted in a wireless communications system. According to certain aspects, a method of wireless communication by a user equipment (UE) is provided. The method generally includes obtaining an indication of a key area identifier (ID) of a first cell node, wherein the key area ID identifies a set of cell nodes that are associated with a network node that uses a first key for enciphering or deciphering messages and communicating a first set of messages with the first cell node using the first key for enciphering or deciphering the first set of messages.

    VEHICLE-TO-EVERYTHING REATTACH TIMING

    公开(公告)号:CA3028230A1

    公开(公告)日:2018-01-18

    申请号:CA3028230

    申请日:2017-07-13

    Applicant: QUALCOMM INC

    Abstract: Methods, systems, and devices for wireless communication are described. A user equipment (UE) may establish a connection to a base station for wireless communications with a network that supports vehicle based communications. The UE may identify a boundary time for the base station. The boundary time may be associated with a periodic schedule when UEs connected to the base station and participating in the vehicle based communications over the network perform a disconnect procedure and a reattach procedure. The UE may perform the disconnect procedure and the reattach procedure at the boundary time.

    APPARATUS AND METHOD FOR SIGNALING ENHANCED SECURITY CONTEXT FOR SESSION ENCRYPTION AND INTEGRITY KEYS

    公开(公告)号:CA2795358C

    公开(公告)日:2017-12-19

    申请号:CA2795358

    申请日:2011-04-15

    Applicant: QUALCOMM INC

    Abstract: Disclosed is a method for establishing an enhanced security context between a remote station and a serving network. In the method, the remote station forwards a first message to the serving network, wherein the first message includes an information element signaling that the remote station supports an enhanced security context. The remote station generates at least one session key, in accordance with the enhanced security context, using the information element. The remote station receives, in response to the first message, a second message having an indication that the serving network supports the enhanced security context. The remote station, in response to the second message, has wireless communications protected by the at least one session key.

    Identity privacy in wireless networks

    公开(公告)号:AU2016226500A1

    公开(公告)日:2017-08-10

    申请号:AU2016226500

    申请日:2016-02-22

    Applicant: QUALCOMM INC

    Abstract: Systems and techniques are disclosed to protect a user equipment's international mobile subscriber identity by providing a privacy mobile subscriber identity instead. In an attach attempt to a serving network, the UE provides the PMSI instead of IMSI, protecting the IMSI from exposure. The PMSI is determined between a home network server and the UE so that intermediate node elements in the serving network do not have knowledge of the relationship between the PMSI and the IMSI. Upon receipt of the PMSI in the attach request, the server generates a next PMSI to be used in a subsequent attach request and sends the next PMSI to the UE for confirmation. The UE confirms the next PMSI to synchronize between the UE and server and sends an acknowledgment token to the server. The UE and the server then each update local copies of the current and next PMSI values.

    PREVENTION OF REPLAY ATTACK IN LONG TERM EVOLUTION DEVICE-TO-DEVICE DISCOVERY

    公开(公告)号:SG11201606473QA

    公开(公告)日:2016-10-28

    申请号:SG11201606473Q

    申请日:2015-01-30

    Applicant: QUALCOMM INC

    Abstract: Methods, systems, and devices are described for device-to-device (D2D) wireless communication. A device may receive a timing variable from a network while the device is in a connected mode. The device may then use the timing variable for D2D discovery message authentication. The device may compare the timing variable with a local timing variable to determine whether a difference between the two variables is within a maximum allowable offset. The device may announce the D2D discovery message to another device when the difference is within the maximum allowable offset.

Patent Agency Ranking