Patent classifications
H04W12/106
Identity-based encryption of a message associated with a connection procedure
Methods, systems, and devices for wireless communications are described. A user equipment (UE) may receive a system parameter identified by a network entity (e.g., a public key generator (PKG)), and receive a cell identifier during a connection procedure between the UE and a base station in wireless communication with the UE. The cell identifier may be associated with the base station. The UE may encrypt at least a portion of a message associated with the connection procedure using the cell identifier and the system parameter. In some examples, the portion of the message may include private information. The UE may transmit the message to the base station as part of the connection procedure.
Identity-based encryption of a message associated with a connection procedure
Methods, systems, and devices for wireless communications are described. A user equipment (UE) may receive a system parameter identified by a network entity (e.g., a public key generator (PKG)), and receive a cell identifier during a connection procedure between the UE and a base station in wireless communication with the UE. The cell identifier may be associated with the base station. The UE may encrypt at least a portion of a message associated with the connection procedure using the cell identifier and the system parameter. In some examples, the portion of the message may include private information. The UE may transmit the message to the base station as part of the connection procedure.
Determining and ameliorating wireless telecommunication network functionalities that are impaired when using end-to-end encryption
Disclosed here is a system and method to determine which wireless telecommunication network functionalities are impaired when using end-to-end encryption and to ameliorate the impairment of the functionality. The system receives a request from a sender device to communicate with a receiver device, where the request indicates whether the sender device is capable of an end-to-end encryption. The system determines whether the receiver device is capable of the end-to-end encryption, and whether the receiver device is associated with a functionality provided by a wireless telecommunication network that is impaired when the end-to-end encryption is used. Upon determining that the receiver device is not capable of the end-to-end encryption or that the receiver device is associated with the functionality that is impaired, the system performs an action to ameliorate the impairment to the functionality.
Determining and ameliorating wireless telecommunication network functionalities that are impaired when using end-to-end encryption
Disclosed here is a system and method to determine which wireless telecommunication network functionalities are impaired when using end-to-end encryption and to ameliorate the impairment of the functionality. The system receives a request from a sender device to communicate with a receiver device, where the request indicates whether the sender device is capable of an end-to-end encryption. The system determines whether the receiver device is capable of the end-to-end encryption, and whether the receiver device is associated with a functionality provided by a wireless telecommunication network that is impaired when the end-to-end encryption is used. Upon determining that the receiver device is not capable of the end-to-end encryption or that the receiver device is associated with the functionality that is impaired, the system performs an action to ameliorate the impairment to the functionality.
Integrity Protection of Radio Resource Control Message
A method performed by a wireless device (12) for use in a wireless communication system (10). The method comprises: receiving (W2100) signaling (22) indicating how the wireless device (12) is to generate a message authentication code, MAC, (20) for integrity protecting a Radio Resource Control, RRC, message (18) that 5 requests resumption of an RRC connection; generating (W2110) the MAC according to the signaling; and transmitting (W2120) the RRC message and the generated MAC. Further methods, a wireless devices, network nodes, computer programs, carriers and a communication system are also disclosed.
Integrity Protection of Radio Resource Control Message
A method performed by a wireless device (12) for use in a wireless communication system (10). The method comprises: receiving (W2100) signaling (22) indicating how the wireless device (12) is to generate a message authentication code, MAC, (20) for integrity protecting a Radio Resource Control, RRC, message (18) that 5 requests resumption of an RRC connection; generating (W2110) the MAC according to the signaling; and transmitting (W2120) the RRC message and the generated MAC. Further methods, a wireless devices, network nodes, computer programs, carriers and a communication system are also disclosed.
EMBEDDED UNIVERSAL INTEGRATED CIRCUIT CARD (eUICC) PROFILE CONTENT MANAGEMENT
A mobile network operator (MNO) uses a provisioning server to update or install profile content in a profile or electronic subscriber identity module (eSIM). In an exemplary embodiment, the profile is present on a secure element such as an embedded universal integrated circuit card (eUICC) in a wireless device. One or more MNOs use the provisioning server to perform profile content management on profiles in the eUICC. In some embodiments, an MNO has a trust relationship with the provisioning server. In some other embodiments, the MNO does not have a trust relationship with the provisioning server and protects payload targeted for an MNO-associated profile using an over the air (OTA) key.
EMBEDDED UNIVERSAL INTEGRATED CIRCUIT CARD (eUICC) PROFILE CONTENT MANAGEMENT
A mobile network operator (MNO) uses a provisioning server to update or install profile content in a profile or electronic subscriber identity module (eSIM). In an exemplary embodiment, the profile is present on a secure element such as an embedded universal integrated circuit card (eUICC) in a wireless device. One or more MNOs use the provisioning server to perform profile content management on profiles in the eUICC. In some embodiments, an MNO has a trust relationship with the provisioning server. In some other embodiments, the MNO does not have a trust relationship with the provisioning server and protects payload targeted for an MNO-associated profile using an over the air (OTA) key.
Access rejection method, apparatus and system, and storage medium and processor
Disclosed are an access rejection method, apparatus and system, where the access rejection method includes: a first base station receives an access request from a terminal; and the first base station sends an access rejection message to the terminal; where the access rejection message at least carries: a check value generated based on a key of the terminal and at least part of contents of the access rejection message. And further disclosed are related computer storage media and processors.
BLOCKCHAIN AUTHENTICATOR FOR DYNAMIC SPECTRUM SHARING AND BLOCKCHAIN CYBERSECURITY SERVICES
Blockchain algorithms may be used to authenticate frequency changes and create a log of when DSS frequencies were modified. This approach may allow for a secure log that will detail the history of when frequencies were changed by the frequency owner or a delegated third party to perform spectrum access sharing (SAS) services.