Patent classifications
H04W12/10
NODE HANDOVER METHOD AND APPARATUS
Embodiments of this application provide a node handover method and an apparatus. A source secondary node receives first handover information and determines to perform an uninterrupted node handover. The source secondary node performs, in a process of the uninterrupted node handover, first processing on first data received by the source secondary node, to obtain second data, and sends the second data to a terminal device. The source secondary node performs second processing on the first data to obtain third data in the process of the uninterrupted node handover, and sends fourth data to the terminal device via a target secondary node. According to some embodiments provided in this application, a communication delay of the terminal device can be reduced, and user experience of the terminal device can be improved.
Protecting WLCP message exchange between TWAG and UE
A method of protecting WLAN Control Protocol (WLCP) message exchange between a Trusted WLAN Access Gateway (TWAG)(112) of a Trusted WLAN Access Network (TWAN)(110) and a User Equipment (UE)(101) are provided. The method comprises deriving, by an Authentication, Authorization, and Accounting, (AAA) Server(103) of an Evolved Packet Core (EPC) network which is interfaced with the TWAN, and by the UE, a Master Session Key (MSK) and an Extended MSK (EMSK), sending, from the AAA Server to a Trusted WLAN AAA Proxy (TWAP)(113) of the TWAN and an Access Point (AP)(111) of the TWAN, the MSK or a key derived from at least the MSK, and deriving, by the TWAN or by the AAA Server, and by the UE, from the MSK, the EMSK, or the key derived from at least the MSK or the EMSK, a key for protecting the WLCP message exchange.—Corresponding devices, computer programs, and computer program products are further provided.
Protecting WLCP message exchange between TWAG and UE
A method of protecting WLAN Control Protocol (WLCP) message exchange between a Trusted WLAN Access Gateway (TWAG)(112) of a Trusted WLAN Access Network (TWAN)(110) and a User Equipment (UE)(101) are provided. The method comprises deriving, by an Authentication, Authorization, and Accounting, (AAA) Server(103) of an Evolved Packet Core (EPC) network which is interfaced with the TWAN, and by the UE, a Master Session Key (MSK) and an Extended MSK (EMSK), sending, from the AAA Server to a Trusted WLAN AAA Proxy (TWAP)(113) of the TWAN and an Access Point (AP)(111) of the TWAN, the MSK or a key derived from at least the MSK, and deriving, by the TWAN or by the AAA Server, and by the UE, from the MSK, the EMSK, or the key derived from at least the MSK or the EMSK, a key for protecting the WLCP message exchange.—Corresponding devices, computer programs, and computer program products are further provided.
Systems and methods for a cryptographically guaranteed vehicle identity
Systems, devices and methodologies for generating a vehicle identification hash value and verifying the integrity of the vehicle. The vehicle identification hash value is generated based on hashes provided by each vehicle component. The generated overall vehicle identification hash value may be dynamic and reflects changes that occur to the vehicle at the component level.
Systems and methods for a cryptographically guaranteed vehicle identity
Systems, devices and methodologies for generating a vehicle identification hash value and verifying the integrity of the vehicle. The vehicle identification hash value is generated based on hashes provided by each vehicle component. The generated overall vehicle identification hash value may be dynamic and reflects changes that occur to the vehicle at the component level.
DETECTING MAN-IN-THE-MIDDLE ATTACKS IN ADAPTIVE STREAMING
Systems and methods for adaptively streaming video content to a wireless transmit/receive unit (WTRU) or wired transmit/receive unit may comprise obtaining a media presentation description that comprises a content authenticity, requesting a key for a hash-based message authentication code; receiving the key for the hash-based message authentication code, determining a determined hash for a segment of the media presentation description, requesting a reference hash for the segment from a server, receiving the reference hash for the segment from the server, and comparing the reference hash to the determined hash to determine whether the requested hash matches the determined hash.
DETECTING MAN-IN-THE-MIDDLE ATTACKS IN ADAPTIVE STREAMING
Systems and methods for adaptively streaming video content to a wireless transmit/receive unit (WTRU) or wired transmit/receive unit may comprise obtaining a media presentation description that comprises a content authenticity, requesting a key for a hash-based message authentication code; receiving the key for the hash-based message authentication code, determining a determined hash for a segment of the media presentation description, requesting a reference hash for the segment from a server, receiving the reference hash for the segment from the server, and comparing the reference hash to the determined hash to determine whether the requested hash matches the determined hash.
COMMUNICATION NETWORK, COMMUNICATION NETWORK NODE, USER EQUIPMENT, METHOD
The present disclosure generally pertains to a communication network for providing a distributed ledger having a plurality of network nodes comprising circuitry configured to: provide a passenger profile of a passenger to a roaming mobility service provider in response to a booking request, wherein the passenger profile is provided from a home mobility service provider; and provide passenger information based on the passenger profile to a transport operator for allowing a passenger to use a mobility service of the roaming mobility service provider.
User Plane Security Enforcement Information Determining Method, Apparatus, and System
A user plane security enforcement information determining method and an apparatus are provided, to ensure a security requirement of transmitted data of a remote device. In this application, a session management network element may receive a first request for creating a relay-type session of a first terminal device. Then, the session management network element determines first user plane security enforcement information of the session based on first information, and sends the first user plane security enforcement information of the session to an access network device, where the first user plane security enforcement information of the session is for determining a first user plane security activation status of the session between the first terminal device and the access network device.
5G new radio—avoiding redundant as security checks
Apparatuses, systems, and methods for a wireless device to perform methods for improvements to security checks in a fifth generation (5G) New Radio (NR) network, including mechanisms to avoid redundant access stratum (AS) security checks. The wireless device may determine that an on-demand system information block (SIB) request is pending transmission and may buffer the on-demand SIB in response to determining that a connection establishment procedure will be initiated within a specified time period. The wireless device may then perform a unified security procedure for the on-demand SIB request and the connection establishment procedure, including confirming connection security. Further, in response to confirming connection security, the wireless device may use an on-demand SIB received from the network without confirming a corresponding on-demand SIB signature.