Patent classifications
H04W12/0433
METHOD AND APPARATUS FOR PROVIDING AKMA SERVICE IN WIRELESS COMMUNICATION SYSTEM
According to an embodiment of a present disclosure, a method performed by AKMA anchor function (AAnF) in a wireless communication system is provided. The method may include: receiving, from an application function (AF), a message for requesting authentication and key management for applications (AKMA) application key for a user equipment (UE); checking whether the AAnF provides AKMA service to the AF based on a local policy; and based on a result of the checking, determining whether to derive the requested AKMA application key for the UE.
METHOD AND APPARATUS FOR PROVIDING AKMA SERVICE IN WIRELESS COMMUNICATION SYSTEM
According to an embodiment of a present disclosure, a method performed by AKMA anchor function (AAnF) in a wireless communication system is provided. The method may include: receiving, from an application function (AF), a message for requesting authentication and key management for applications (AKMA) application key for a user equipment (UE); checking whether the AAnF provides AKMA service to the AF based on a local policy; and based on a result of the checking, determining whether to derive the requested AKMA application key for the UE.
Systems and methods for reducing wi-fi station power
A system for reducing power consumption in a wireless network includes a station (e.g., Wi-Fi sensor) and an access point in wireless communication with the station. The station has at least a low-power sleep mode and an active mode. The system can be configured to assign a static Internet Protocol (IP) address to the station and disable re-negotiation of an encryption key while the station is in sleep mode. The system can further be configured to force the station to communicate via 802.11g and to transmit data to a proxy service while in active mode before returning to sleep mode upon receiving a response from the proxy service. Further, an association timeout period associated with the station can be configured to be at least twice as long as a wake-up period associated with the station.
Systems and methods for reducing wi-fi station power
A system for reducing power consumption in a wireless network includes a station (e.g., Wi-Fi sensor) and an access point in wireless communication with the station. The station has at least a low-power sleep mode and an active mode. The system can be configured to assign a static Internet Protocol (IP) address to the station and disable re-negotiation of an encryption key while the station is in sleep mode. The system can further be configured to force the station to communicate via 802.11g and to transmit data to a proxy service while in active mode before returning to sleep mode upon receiving a response from the proxy service. Further, an association timeout period associated with the station can be configured to be at least twice as long as a wake-up period associated with the station.
Techniques to facilitate fast roaming between a mobile network operator public wireless wide area access network and an enterprise private wireless wide area access network
Presented herein are techniques to facilitate fast roaming between a mobile network operator-public (MNO-public) wireless wide area (WWA) access network and an enterprise private WWA access network. In one example, a method is provided that may include generating, by an authentication node, authentication material for a user equipment (UE) based on the UE being connected to a public WWA access network, wherein the public WWA access network is associated with a mobile network operator, and the authentication node and the UE are associated with an enterprise entity; obtaining, by the authentication node, an indication that the UE is attempting to access a private WWA access network associated with the enterprise entity; and providing, by the authentication node, the authentication material for the UE, wherein the authentication material facilitates connection establishment between the UE and the private WWA access network.
Techniques to facilitate fast roaming between a mobile network operator public wireless wide area access network and an enterprise private wireless wide area access network
Presented herein are techniques to facilitate fast roaming between a mobile network operator-public (MNO-public) wireless wide area (WWA) access network and an enterprise private WWA access network. In one example, a method is provided that may include generating, by an authentication node, authentication material for a user equipment (UE) based on the UE being connected to a public WWA access network, wherein the public WWA access network is associated with a mobile network operator, and the authentication node and the UE are associated with an enterprise entity; obtaining, by the authentication node, an indication that the UE is attempting to access a private WWA access network associated with the enterprise entity; and providing, by the authentication node, the authentication material for the UE, wherein the authentication material facilitates connection establishment between the UE and the private WWA access network.
Key distribution method, key receiving method, first key management system, and first network element
The present invention disclose a key distribution method. The method includes obtaining, by a first key management system, a shared key of a first network element, where the shared key of the first network element is generated according to a key parameter obtained after the first network element performs authentication or a root key of the first network element; obtaining a service key, where the service key is used to perform encryption and/or integrity protection on communication data in a first service between the first network element and a second network element; performing encryption and/or integrity protection on the service key by using the shared key of the first network element, to generate a first security protection parameter; and sending the first security protection parameter to the first network element. According to present invention, data can be protected against an eavesdropping attack in a sending process.
Key distribution method, key receiving method, first key management system, and first network element
The present invention disclose a key distribution method. The method includes obtaining, by a first key management system, a shared key of a first network element, where the shared key of the first network element is generated according to a key parameter obtained after the first network element performs authentication or a root key of the first network element; obtaining a service key, where the service key is used to perform encryption and/or integrity protection on communication data in a first service between the first network element and a second network element; performing encryption and/or integrity protection on the service key by using the shared key of the first network element, to generate a first security protection parameter; and sending the first security protection parameter to the first network element. According to present invention, data can be protected against an eavesdropping attack in a sending process.
METHOD AND SYSTEM FOR DATA TRANSMISSION, CHIP, ELECTRONIC DEVICE, AND COMPUTER READABLE STORAGE MEDIUM
The present disclosure provides a method and system for data transmission, chip, an electronic device, and a computer readable storage medium. The method applied at a first Bluetooth end includes: establishing a point-to-point connection with a second Bluetooth end; acquiring identity information of the second Bluetooth end through the point-to-point connection; and sending broadcast isochronous group information BIGInfo to the second Bluetooth end through the point-to-point connection when the identity information of the second Bluetooth end is verified, to enable the second Bluetooth end to receive a data stream of a broadcast isochronous group BIG sent by the first Bluetooth end according to the BIGInfo.
First network node, second network node, wireless device and methods therein for handling broadcast information
A method for handling broadcast information is described. A first network node (111) operating in a wireless communications network (100) determines (403) one or more decryption keys (K1, K2, K3) to be provided to a wireless device (131) in the wireless communications network (100). The decryption keys enable the wireless device (131) to decrypt information to be broadcasted by a second network node (112) in the wireless communications network (100). The information comprises a plurality of subsets of positioning information. Each of the subsets is to be, or is, encrypted with a different encryption key based on a respective type of subscription for wireless devices (131, 132, 133) in the wireless communications network (100). The determined decryption keys are based on at least one type of subscription of the wireless device (131). The first network node (111) then initiates (404) providing the determined to the wireless device (131).