Patent classifications
H04W12/043
INFORMATION OBTAINING METHOD AND APPARATUS
This application provides an information obtaining method and an apparatus. The method includes: sending a first initial NAS message including a non-cleartext information element protected using a first root key from a terminal to a source mobility management network element; receiving a second root key and first indication information from the source mobility management network element, where the first indication information indicates that the second root key is an updated key; sending second indication information and third indication information to the terminal based on the first indication information, where the second indication information indicates the terminal to update the first root key stored by the terminal to obtain the second root key, and the third indication information indicates the terminal to resend the initial NAS message; receiving a second initial NAS message including the non-cleartext information element protected using the second root key from the terminal.
MOBILE TERMINAL TO REQUEST AN AUTHENTICATION TO RECEIVE AN EXCHANGING KEY FOR REMOTELY ACCESSING CONTENT
A source apparatus and a conditional access apparatus are disclosed. The source apparatus may transmit a command to the conditional access apparatus. The conditional access apparatus may transmit a response to the command to the source apparatus. When a time elapsed between transmission of the command by the source apparatus and reception of the response by the source apparatus does not exceed a predetermined round trip time (RTT), a first authorization signal to permit the conditional access apparatus to decrypt encrypted content may be generated. Additionally, whenever a non-RTT condition is met, a second authorization signal to permit the conditional access apparatus to decrypt the content may be generated.
Home Controlled Network Slice Privacy
A wireless device (12) performs authentication (14) with a home network (10H) of the wireless device (12). The wireless device (12) encrypts a network slice identifier (24) with cryptographic key material (22) that is available from the authentication (14) with the home network (10H) and that is shared between the wireless device (12) and the home network (10H). The wireless device (12) transmits a message (20) that includes the encrypted network slice identifier (26). In some embodiments, a network node in a serving network (10S) of the wireless device (12) receives the message (20) and decrypts, or requests decryption of, the encrypted network slice identifier (26) using cryptographic key material (22) that is available to the wireless device (12) from authentication (14) of the wireless device (12) with the home network (10H) and that is shared between the wireless device (12) and the home network (10H).
Home Controlled Network Slice Privacy
A wireless device (12) performs authentication (14) with a home network (10H) of the wireless device (12). The wireless device (12) encrypts a network slice identifier (24) with cryptographic key material (22) that is available from the authentication (14) with the home network (10H) and that is shared between the wireless device (12) and the home network (10H). The wireless device (12) transmits a message (20) that includes the encrypted network slice identifier (26). In some embodiments, a network node in a serving network (10S) of the wireless device (12) receives the message (20) and decrypts, or requests decryption of, the encrypted network slice identifier (26) using cryptographic key material (22) that is available to the wireless device (12) from authentication (14) of the wireless device (12) with the home network (10H) and that is shared between the wireless device (12) and the home network (10H).
AMF REALLOCATION HANDLING USING UE EXCEPTIONS TO SECURITY CONTEXT RULES
A UE having a security context with an Initial AMF is able to accept an unprotected AUTHRQ, under certain circumstances, for a limited time. In one embodiment, a UE considers the security context to be temporary, which invokes rules or exceptions different than a permanent security context, such as the acceptance of an unprotected AUTHRQ from a Target AMF. The network may indicate to the UE the temporary status, or the UE may assume it. Alternatively, the UE may enable exceptions to the defined rules associated with the security context. In one embodiment, the UE receives a plurality of partial registration acceptance messages, each indicating a specific task or aspect of the overall registration has been completed. The UE may mark its security context temporary, or enable exceptions to the rules 10 associated with it, until a partial registration acceptance messages indicates AMF re-allocation is complete or is not required. In another embodiment, the UE accepts unprotected authentication messages from the network until the Registration procedure is completed, enabling a Target AMF to successfully send it an unprotected AUTHRQ.
Multi-device wireless connection method and device
A multi-device wireless connection method and a device. The method includes obtaining device information corresponding to a first account, selecting a second device according to a user-triggered selection instruction and the device information corresponding to the first account, where the second device is a device to which the first account is logged in, sending a pairing request to the server, where the pairing request comprises identification information of the second device, receiving pairing information sent by the server, where the pairing information is used for pairing between the first device and the second device, where the pairing information comprises a first random number which is generated by the server, or by the second device and sent to the server, and performing, by the first device, pairing with the second device according to the pairing information, and implementing a wireless connection between the first device and the second device.
Obtaining device posture of a third party managed device
Techniques are disclosed to obtain device posture of a third party managed device. In various embodiments, a unique identifier of the third party managed device is embedded in a registration communication sent from a third party managed device to an access node associated with a first party management entity. The registration communication is sent from the third party managed device to the access node. The access node is configured to store data associating the unique identifier with the third party managed device, and to use the unique identifier to obtain from the third party management entity device posture information for the third party managed device.
WIERLESS SCREEN MIRRORING METHOD AND DEVICE BASED ON IP NETWORK CONNECTION
The present disclosure provides a wireless screen mirroring method based on IP network connection. The method applied to a screen projection receiving and sending device includes: broadcasting a Wi-Fi beacon based on the Wi-Fi direct connection protocol, detecting the Wi-Fi beacon from the receiving device, sending a Wi-Fi detection request to the receiving device, receiving and responding to the detection request, sending a connection information for establishing a handshake used to establish an RTSP connection and complete the Miracast handshake protocol to the sending device, the sending device gets connection information, according to the connection information for establishing a handshake, analyzing the information and sending alarm information used to indicate that the receiving device has completed the connection. The present disclosure combines the advantages of network connection, wired network and Miracast standard to realize a more stable screen projection method based on wired network or wireless network.
AUTHENTICATION IN A WIRELESS COMMUNICATIONS NETWORK
A method and apparatus for authenticating a mobile device in a second network when the mobile device is already authenticated in a first network. An authentication device in the first network generates an authentication master key associated with the mobile device using a first nonce generated by the authentication device and a second nonce generated by the mobile device. The generated authentication master key is sent to a second authentication device in the second network, where is usable by the second authentication device to authenticate the mobile device in the second network.
SIGNALING IN DUAL CONNECTIVITY MOBILE COMMUNICATION NETWORKS
There is disclosed a method of a User Equipment, UE, in a 3rd Generation Partnership Project, 3GPP, compliant mobile communications network supporting dual connectivity, and a corresponding UE. The method comprises detecting a signalled reconfiguration procedure of a Data Radio Bearer, DRB, having or changing to a DRB type in which downlink, DL, data is received from only serving cells of a Secondary Cell Group, SCG, connected to a Secondary eNB, SeNB, via an SCG DRB, or in which DL data is received from a SCG and also from serving cells of a Master Cell Group, MCG, connected to a Master eNB, MeNB, via a split DRB. If a DRB reconfiguration procedure type including one or more of: a handover; an SCG change; and DRB type change; is detected, the method further comprises: deciding one or more required layer 2 DRB-related actions resulting from the DRB reconfiguration based on: the initial DRB configuration; the final DRB configuration; and relevant DRB reconfiguration procedure types; and performing said decided layer 2 DRB-related actions.