MBS-KEY DISTRIBUTION AND TRAFFIC PROTECTION
    1.
    发明申请

    公开(公告)号:WO2022087979A1

    公开(公告)日:2022-05-05

    申请号:PCT/CN2020/124922

    申请日:2020-10-29

    Applicant: APPLE INC.

    Abstract: MBS key distribution includes processing group information associated with an MB session context received from an AF. At least a portion of the group information comprises a TMGI. A plurality of session join requests received from a plurality of UEs are processed. Each of the plurality of session join requests include the TMGI and are associated with the MB session context. A request associated with the MB session context for transmission to an MB-SMF is encoded. A response associated with the MB session context received from the MB-SMF is processed. The response includes a key derived for each of a portion of the plurality of UEs using a UE ID and the TMGI. A DL NAS message and an N2 message are encoded for the plurality of UEs and a base station, respectively. The DL NAS message and the N2 message include the derived key.

    USER PLANE INTEGRITY PROTECTION CONFIGURATION IN EN-DC

    公开(公告)号:WO2022087969A1

    公开(公告)日:2022-05-05

    申请号:PCT/CN2020/124865

    申请日:2020-10-29

    Applicant: APPLE INC.

    Abstract: Systems and methods provide packet data convergence protocol (PDCP) user plane (UP) integrity protection (IP) for a user equipments (UE) and radio access network (RAN) nodes operating in Evolved Universal Terrestrial Radio Access -New Radio dual connectivity (EN-DC). In an attach procedure, a UE may indicate a UE security capability for support of relay node (RN) PDCP UP IP used in LTE. Based on the UE security capability, a master e Node B (MeNB) security capability, and a secondary g Node B (SgNB) security capability, the MeNB may determine whether to use UP IP between the UE and the MeNB, the UE and the SgNB, and/or in a split bearer between the MeNB and the SgNB.

    IDENTITY-BASED MESSAGE INTEGRITY PROTECTION AND VERIFICATION FOR WIRELESS COMMUNICATION

    公开(公告)号:WO2020010515A1

    公开(公告)日:2020-01-16

    申请号:PCT/CN2018/095137

    申请日:2018-07-10

    Abstract: Techniques for identity-based message integrity protection and verification between a user equipment (UE) and a wireless network entity, include use of signatures derived from identity-based keys. To protect against attacks from rogue network entities before activation of a security context with a network entity, the UE verifies integrity of messages by checking a signature using an identity-based public key PK ID derived by the UE based on (i) an identity value (ID) of the network entity and (ii) a separate public key PK PKG of a private key generator (PKG) server. The network entity generates signatures for messages using an identity-based private key SK ID obtained from the PKG server, which generates the identity-based private key SK ID using (i) the ID value of the network entity and (ii) a private key SK PKG that is known only by the PKG server and corresponds to the public key PK PKG .

    ENHANCED SECURITY FOR ACCESS STRATUM TRANSMISSION

    公开(公告)号:WO2019241999A1

    公开(公告)日:2019-12-26

    申请号:PCT/CN2018/092396

    申请日:2018-06-22

    Abstract: This disclosure relates to techniques, base stations, and user equipment devices (UEs) for performing base station authentication through access stratum signaling transmissions. The UE may operate in idle mode and may receive an authentication message from a base station through the wireless interface while operating in idle mode. The UE may determine whether a signature comprised within the authentication message is valid, and the UE may continue a connection procedure with the base station based on a determination that the signature is valid. If it is determined that the signature is invalid, the UE may designate the base station as a barred base station and may perform cell re-selection. The authentication message may be one of a radio resource control (RRC) connection setup message, a special RRC message, a media access control (MAC) message, or a random access channel (RACH) message comprising a random access response (RAR) message.

    MEC AUTHENTICATION BETWEEN EDGE ENABLER CLIENT AND EDGE CONFIGURATION OR ENABLER SERVER BASED ON AKMA

    公开(公告)号:WO2022236606A1

    公开(公告)日:2022-11-17

    申请号:PCT/CN2021/092848

    申请日:2021-05-10

    Applicant: APPLE INC.

    Abstract: Disclosed are embodiments of a user equipment (UE) configured to communicate in a 5G network and to perform authentication between an edge enabler client (EEC) of the UE and an edge configuration server (ECS) or an edge enabler server (EES) based on an architecture for authentication and key management for applications (AKMA). The techniques include performing primary authentication with the 5G network to obtain a K AUSF; generating a K AKMA and an A-KID; providing to the EEC the K AKMA and an EEC identifier (ID) for the EEC to generate a K edge, the K AKMA and the EEC ID being used by the EEC to compute a MAC EEC; and sending to the ECS or the EES an application registration request, the application registration request including the EEC ID, the MAC EEC, and the A-KID.

Patent Agency Ranking