H04W12/106

Information transmission method, network device and terminal device

Provided are an information transmission method, a network device and a terminal device. The method comprises: a first network device obtains indication information, the indication information being used for indicating integrity protection (IP) check failure of data on a data radio bearer (DRB); the first network device sends the indication information to a second network device. In embodiments of the present application, by means of the indication information, the second network device can update a secret key of the terminal device during the IP check failure of data on the DRB, or the second network device can release RRC connection of the DRB. In this way, the potential safety hazard is eliminated, the communication security is ensured, and therefore, the success rate of data transmission is improved.

Method and apparatus for accelerating ciphering and deciphering in wireless communication system
11553558 · 2023-01-10 · ·

An apparatus and a method capable of effectively providing services in a mobile communication system, and a data processing method of a data reception apparatus are provided. The apparatus and method includes obtaining, by a first lower packet data convergence protocol (PDCP) layer and a second lower PDCP layer, a plurality of PDCP packet data units (PDUs) based on data received from a first base station (BS) and a second BS, parallel deciphering, by the first and second lower PDCP layers, the plurality of PDCP PDUs, transmitting, from the first and second lower PDCP layers to an upper PDCP layer, the plurality of deciphered PDCP PDUs, and reordering, by the upper PDCP layer, the plurality of deciphered PDCP PDUs.

Real-time soft combining, CRC validation, and MIC validation of decrypted packets

The apparatus receives a first PDU and a first CRC that is based on the first PDU. The first PDU is encrypted based on a first nonce. The apparatus decrypts the first PDU to obtain a first payload and a first cipher stream. The apparatus soft combines the decrypted first payload with a decrypted set of payloads. The set of payloads have been encrypted based on at least one nonce different than the first nonce. The apparatus generates a second CRC based on the soft combined decrypted payloads and based on the first cipher stream. The apparatus determines whether the generated second CRC for the soft combined decrypted payloads passes a CRC check against the first CRC.

Real-time soft combining, CRC validation, and MIC validation of decrypted packets

The apparatus receives a first PDU and a first CRC that is based on the first PDU. The first PDU is encrypted based on a first nonce. The apparatus decrypts the first PDU to obtain a first payload and a first cipher stream. The apparatus soft combines the decrypted first payload with a decrypted set of payloads. The set of payloads have been encrypted based on at least one nonce different than the first nonce. The apparatus generates a second CRC based on the soft combined decrypted payloads and based on the first cipher stream. The apparatus determines whether the generated second CRC for the soft combined decrypted payloads passes a CRC check against the first CRC.

METHOD AND DEVICE FOR HEADER COMPRESSION OR DECOMPRESSION PROCEDURE SUPPORTING CELL GROUP ACTIVATION OR DEACTIVATION IN NEXT-GENERATION MOBILE COMMUNICATION SYSTEM
20230217306 · 2023-07-06 ·

The disclosure relates to a 5G or 6G communication system for supporting a higher data transmission rate. A method performed by a terminal in a wireless communication system is provided. The method includes identifying whether a packet data convergence protocol (PDCP) entity is suspended in case that the PDCP entity re-establishment is requested from an upper layer, identifying whether an indicator is configured for indicating that an uplink data compression (UDC) is continuously used and a PDCP service data unit (SDU) is compressed, for an acknowledged mode (AM) data radio bearer (DRB) whose the PDCP entity is not suspended, and submitting the PDCP SDU, in case that the indicator is configured for indicating that the UDC is continuously used and the PDCP SDU is compressed.

METHOD AND DEVICE FOR HEADER COMPRESSION OR DECOMPRESSION PROCEDURE SUPPORTING CELL GROUP ACTIVATION OR DEACTIVATION IN NEXT-GENERATION MOBILE COMMUNICATION SYSTEM
20230217306 · 2023-07-06 ·

The disclosure relates to a 5G or 6G communication system for supporting a higher data transmission rate. A method performed by a terminal in a wireless communication system is provided. The method includes identifying whether a packet data convergence protocol (PDCP) entity is suspended in case that the PDCP entity re-establishment is requested from an upper layer, identifying whether an indicator is configured for indicating that an uplink data compression (UDC) is continuously used and a PDCP service data unit (SDU) is compressed, for an acknowledged mode (AM) data radio bearer (DRB) whose the PDCP entity is not suspended, and submitting the PDCP SDU, in case that the indicator is configured for indicating that the UDC is continuously used and the PDCP SDU is compressed.

UE and devices for detach handling
11696250 · 2023-07-04 · ·

Devices, methods, use user equipment (UE), core network devices, evolved node B (eNB), and storage media for UE provisioning are described. In one embodiment, processing circuitry of a mobility management entity (MME) decodes a non-access stratum (NAS) message comprising a detach request associated with a first user equipment (UE) and determines that the detach request is received from the UE without integrity protection. The MME then analyzes one or more additional criteria associated with the detach request in response to confirmation that the detach request message is received from the UE without the integrity protection, and manages an evolved packet system (EPS) mobility management (EMM) registration state for the first UE based on analysis of the one or more additional criteria. Various different criteria and associated EMM registration state management operations are described. Additional corresponding UE operations are also described.

UE and devices for detach handling
11696250 · 2023-07-04 · ·

Devices, methods, use user equipment (UE), core network devices, evolved node B (eNB), and storage media for UE provisioning are described. In one embodiment, processing circuitry of a mobility management entity (MME) decodes a non-access stratum (NAS) message comprising a detach request associated with a first user equipment (UE) and determines that the detach request is received from the UE without integrity protection. The MME then analyzes one or more additional criteria associated with the detach request in response to confirmation that the detach request message is received from the UE without the integrity protection, and manages an evolved packet system (EPS) mobility management (EMM) registration state for the first UE based on analysis of the one or more additional criteria. Various different criteria and associated EMM registration state management operations are described. Additional corresponding UE operations are also described.

Electronic interaction authentication and verification, and related systems, devices, and methods
11695782 · 2023-07-04 · ·

Systems, devices, and methods are disclosed for exchanging electronic information over a communication network and, more specifically, to authenticating and verifying data integrity between two or more interacting users exchanging information. A client computing device generates a split secret that is transmitted to a server via two distinct communication channels. The split secret is generated based on a public key of a public-private key pair generated by the client computing device based on a unique identifier. Validity of the public key can authenticate source identity.

Electronic interaction authentication and verification, and related systems, devices, and methods
11695782 · 2023-07-04 · ·

Systems, devices, and methods are disclosed for exchanging electronic information over a communication network and, more specifically, to authenticating and verifying data integrity between two or more interacting users exchanging information. A client computing device generates a split secret that is transmitted to a server via two distinct communication channels. The split secret is generated based on a public key of a public-private key pair generated by the client computing device based on a unique identifier. Validity of the public key can authenticate source identity.