Abstract:
Disclosed are embodiments for authentication and authorization in a 5G network between an edge enabler client (EEC) of a UE and an edge configuration server (ECS). The embodiment include performing primary authentication with the 5G network to obtain a K AUSF; generating a K edge and a K edge ID using the K AUSF and a subscription permanent identifier (SUPI); providing the Kedge and the K edge ID to the EEC to cause it to compute a MAC EEC using the K edge and an EEC ID; and sending to the ECS an application registration request, the application registration request including the EEC ID, MACEEC, and K edge ID.
Abstract:
A network receives an indication of user consent from a user equipment (UE) to access UE information for the purposes of edge computing. The network receives an indication of user consent from a UE, the user consent corresponding to a network function acquiring UE information, receives the UE information and performs operations related to establishing a connection between the UE and an edge data network.
Abstract:
An example technique for security key derivation in a wireless system includes: sending a radio resource control (RRC) suspend message from a first node, to a first user device, the RRC suspend message including a first next hop (NH) chaining counter (NCC) value; releasing access stratum (AS) resources associated with the first user device; deriving a first node key based on the first NCC value; receiving a first uplink message from the first user device without allocating AS resources to the first user device; and unscrambling the first uplink message based on the first NCC value.
Abstract:
A device level lock policy, which applies to all smart secure platform (SSP) applications of a mobile device, is used to determine whether a particular SSP application can be activated. A tamper resistant hardware secure element (SE) includes a primary platform with a low level operating system (OS) and one or more SSP applications within one or more secondary platform bundles that include secondary platforms with high level OSs specific to the secondary platform bundles. The low level OS enforces the device level lock policy for all secondary platform bundles by verifying whether a lock policy for the SSP application is consistent with the device level lock policy. When verification succeeds, activation is allowed, and when verification fails, activation is disallowed. Subscription identifiers are not provided in unencrypted form to processing circuitry of the mobile device external to the tamper resistant hardware SE to provide subscriber identity privacy protection.
Abstract:
A device, system, and method performs a Voice over Long Term Evolution (LTE) (VoLTE) call setup procedure. The device includes a transceiver establishing a connection with a LTE network and an Internet Protocol (IP) Multimedia Subsystem (IMS). The device includes a processor executing a VoLTE call application with a further user equipment, receiving an input to execute the VoLTE call application, and generating a data packet including an indication to trigger a dedicated bearer establishment procedure. The transceiver transmits the data packet to one of the LTE network and the IMS. The indication triggers the dedicated bearer establishment procedure to be performed during a Session Initiation Protocol (SIP) signal exchange procedure.
Abstract translation:设备,系统和方法执行长语演进(Voice-over Long Evolution Evolution,LTE)(VoLTE)呼叫建立过程。 该设备包括建立与LTE网络和因特网协议(IP)多媒体子系统(IMS)的连接的收发机。 该设备包括执行VoLTE呼叫应用与另一用户设备的处理器,接收执行VoLTE呼叫应用的输入,以及生成包括用于触发专用承载建立过程的指示的数据分组。 收发器将数据包发送到LTE网络和IMS之一。 指示触发在会话发起协议(SIP)信号交换过程中执行的专用承载建立过程。
Abstract:
Techniques are disclosed relating to informing a network that a UE desires packet-switched voice communication. In one embodiment, a method includes receiving first information from a UE device requesting voice communication over a packet-switched network. In this embodiment, the method further includes transmitting, in response to the first information, second information to a base station serving the UE device, wherein the second information indicates that the UE device is requesting voice communication over the packet-switched network. In this embodiment, the transmitting is performed prior to establishment of a dedicated bearer by the base station for the UE device. In this embodiment, the second information operates to configure communications between the base station and the UE device to provide a particular quality of service for the packet-switched voice communication using the dedicated bearer.
Abstract:
An approach is described for a base station to generate a first message and a second message. The base station transmits the first message and the second message to a user equipment (UE). The first message is associated with a cell supported by the base station and includes a first public land mobile network (PLMN) identity index and a first list of one or more network slices supported by a first PLMN associated with the first PLMN identity index. The second message is associated with one or more neighboring cells, and includes the first PLMN identity index and a second list of one or more network slice data associated the first PLMN as supported by the one or more neighboring cells. In addition, at least one of the one or more network slice data in the second list includes a sub-list of one or more neighboring cell data.
Abstract:
MBS key distribution includes processing group information associated with an MB session context received from an AF. At least a portion of the group information comprises a TMGI. A plurality of session join requests received from a plurality of UEs are processed. Each of the plurality of session join requests include the TMGI and are associated with the MB session context. A request associated with the MB session context for transmission to an MB-SMF is encoded. A response associated with the MB session context received from the MB-SMF is processed. The response includes a key derived for each of a portion of the plurality of UEs using a UE ID and the TMGI. A DL NAS message and an N2 message are encoded for the plurality of UEs and a base station, respectively. The DL NAS message and the N2 message include the derived key.
Abstract:
Systems and methods provide packet data convergence protocol (PDCP) user plane (UP) integrity protection (IP) for a user equipments (UE) and radio access network (RAN) nodes operating in Evolved Universal Terrestrial Radio Access -New Radio dual connectivity (EN-DC). In an attach procedure, a UE may indicate a UE security capability for support of relay node (RN) PDCP UP IP used in LTE. Based on the UE security capability, a master e Node B (MeNB) security capability, and a secondary g Node B (SgNB) security capability, the MeNB may determine whether to use UP IP between the UE and the MeNB, the UE and the SgNB, and/or in a split bearer between the MeNB and the SgNB.
Abstract:
The present application relates to devices and components including apparatus, systems, and methods for secured user equipment communications over a user equipment relay. In some embodiments, symmetric or asymmetric encryption may be used for the secured user equipment communications.