H04W12/033

METHODS FOR REPORTING ENCRYPTION CAPABILITY

A method according to some embodiments include reporting, by a beamformee, an encryption capability indicator to a beamformer, wherein the encryption capability indicator is indicative of a capability of the beamformee to encrypt a feedback frame. The method may also include receiving, by the beamformee from the beamformer, an announcement frame in response to the beamformer receiving an indication that the beamformee is capable of encrypting the feedback frame, and then sending, by the beamformee, an encrypted feedback frame.

METHODS FOR REPORTING ENCRYPTION CAPABILITY

A method according to some embodiments include reporting, by a beamformee, an encryption capability indicator to a beamformer, wherein the encryption capability indicator is indicative of a capability of the beamformee to encrypt a feedback frame. The method may also include receiving, by the beamformee from the beamformer, an announcement frame in response to the beamformer receiving an indication that the beamformee is capable of encrypting the feedback frame, and then sending, by the beamformee, an encrypted feedback frame.

5G Non-Seamless Wireless Local Area Network Offload

Embodiments may include a user equipment (UE) configured to obtain a Mobile Subscriber Identification Number (MSIN) from an International Mobile Subscriber Identity (IMSI) of the UE, encrypt the MSIN to generate a Subscription Concealed Identifier (SUCI) in a Network Access Identifier (NAI) format, and send the SUCI to the non-3GPP access network for authentication of the UE, and a network element of a home 3GPP network configured to receive, by a 5G Non-seamless WLAN Offload (NSWO) Function, an authentication request including the SUCI from the non-3GPP access network, determine, by the 5G NSWO Function, based on the SUCI, that the UE should be authenticated by an authentication function of the home 3GPP network, and provide the authentication request including the SUCI to the authentication function of the home 3GPP network for processing based on the determination that the UE should be authenticated by the authentication function.

5G Non-Seamless Wireless Local Area Network Offload

Embodiments may include a user equipment (UE) configured to obtain a Mobile Subscriber Identification Number (MSIN) from an International Mobile Subscriber Identity (IMSI) of the UE, encrypt the MSIN to generate a Subscription Concealed Identifier (SUCI) in a Network Access Identifier (NAI) format, and send the SUCI to the non-3GPP access network for authentication of the UE, and a network element of a home 3GPP network configured to receive, by a 5G Non-seamless WLAN Offload (NSWO) Function, an authentication request including the SUCI from the non-3GPP access network, determine, by the 5G NSWO Function, based on the SUCI, that the UE should be authenticated by an authentication function of the home 3GPP network, and provide the authentication request including the SUCI to the authentication function of the home 3GPP network for processing based on the determination that the UE should be authenticated by the authentication function.

Methods for integrity protection of user plane data

A method (200) for operating a User Equipment (UE) is disclosed, the UE configured to connect to a communication network. The method comprises: indicating to the communication network an Integrity Protection for User Plane (IPUP) mode supported by the UE when requesting registration with the communication network (202). The IPUP mode comprises one of: use of Integrity Protection for User Plane data exchanged with the UE (202a), non-use of Integrity Protection for User Plane data exchanged with the UE (202b), or use of Integrity Protection for User Plane data, and non-use of Confidentiality Protection for User Plane data (202c). Also disclosed are an apparatus for operating a UE, methods and apparatus for operating a radio access node and a core node of a communication network, and a computer program operable to carry out methods for operating a UE, a radio access node and/or a core node of a communication network.

Methods for integrity protection of user plane data

A method (200) for operating a User Equipment (UE) is disclosed, the UE configured to connect to a communication network. The method comprises: indicating to the communication network an Integrity Protection for User Plane (IPUP) mode supported by the UE when requesting registration with the communication network (202). The IPUP mode comprises one of: use of Integrity Protection for User Plane data exchanged with the UE (202a), non-use of Integrity Protection for User Plane data exchanged with the UE (202b), or use of Integrity Protection for User Plane data, and non-use of Confidentiality Protection for User Plane data (202c). Also disclosed are an apparatus for operating a UE, methods and apparatus for operating a radio access node and a core node of a communication network, and a computer program operable to carry out methods for operating a UE, a radio access node and/or a core node of a communication network.

Dynamic encryption for scheduled message delivery

Techniques and architectures enable a wireless communications system to receive and transmit a message for which a user of a mobile device has specified to be delivered on a particular date and time to a contact in an address book of the user. Further, the network securely stores the message by encrypting the message with a strength of encryption that is based on the length of time that the message will be stored before its scheduled delivery.

Dynamic encryption for scheduled message delivery

Techniques and architectures enable a wireless communications system to receive and transmit a message for which a user of a mobile device has specified to be delivered on a particular date and time to a contact in an address book of the user. Further, the network securely stores the message by encrypting the message with a strength of encryption that is based on the length of time that the message will be stored before its scheduled delivery.

Operator authentication with a vehicle using different pathways

In accordance with one or more embodiments described herein, a method is provided. The method includes receiving a request to assume control of a vehicle generated by a candidate operator via a first communication pathway. The method obtains a key from an onboard controller of the vehicle and communicates the key to the candidate operator via a second communication pathway that is different from the first communication pathway. The method determines the candidate operator to be a confirmed operator based at least in part on obtaining the key from the candidate operator via the first communication pathway.

Operator authentication with a vehicle using different pathways

In accordance with one or more embodiments described herein, a method is provided. The method includes receiving a request to assume control of a vehicle generated by a candidate operator via a first communication pathway. The method obtains a key from an onboard controller of the vehicle and communicates the key to the candidate operator via a second communication pathway that is different from the first communication pathway. The method determines the candidate operator to be a confirmed operator based at least in part on obtaining the key from the candidate operator via the first communication pathway.