Patent classifications
H04W12/75
TRANSMITTING A COMPLEMENT OF USER PARAMETERS TO A COMMUNICATIONS DEVICE
Briefly, example methods, apparatuses, and/or articles of manufacture may be implemented, in whole or in part, using one or more computing devices to obtain, from a communications device, an identifier of the communications device transmitted via a communications network. The communications network may transmit a request for one or more parameters unique to a subscriber of the communications network. The method may also include processing signals indicative of the requested one or more parameters in response to the subscriber entering the one or more parameters into a graphical user interface of the communications device. The method may further include transmitting, to the communications device, one or more signals to provide a complement of subscriber parameters.
TRANSMITTING A COMPLEMENT OF USER PARAMETERS TO A COMMUNICATIONS DEVICE
Briefly, example methods, apparatuses, and/or articles of manufacture may be implemented, in whole or in part, using one or more computing devices to obtain, from a communications device, an identifier of the communications device transmitted via a communications network. The communications network may transmit a request for one or more parameters unique to a subscriber of the communications network. The method may also include processing signals indicative of the requested one or more parameters in response to the subscriber entering the one or more parameters into a graphical user interface of the communications device. The method may further include transmitting, to the communications device, one or more signals to provide a complement of subscriber parameters.
COMMUNICATION METHOD, APPARATUS, AND SYSTEM
A communication method and apparatus are provided. The method includes: Second user equipment sends a second message, first user equipment sends a first message to a network device in response to the second message, to request to perform identity verification on the second user equipment, and the network device verifies whether an identity of the second user equipment is valid, and sends, to the first user equipment, a verification result indicating whether the identity of the second user equipment is valid. Alternatively, the first user equipment sends a third message for request the second user equipment to reply with information used for remote identification, and the second user equipment replies with a fourth message, where the fourth message includes the information used for remote identification on the second user equipment, and the third message and the fourth message are encrypted by using corresponding keys.
COMMUNICATION METHOD, APPARATUS, AND SYSTEM
A communication method and apparatus are provided. The method includes: Second user equipment sends a second message, first user equipment sends a first message to a network device in response to the second message, to request to perform identity verification on the second user equipment, and the network device verifies whether an identity of the second user equipment is valid, and sends, to the first user equipment, a verification result indicating whether the identity of the second user equipment is valid. Alternatively, the first user equipment sends a third message for request the second user equipment to reply with information used for remote identification, and the second user equipment replies with a fourth message, where the fourth message includes the information used for remote identification on the second user equipment, and the third message and the fourth message are encrypted by using corresponding keys.
FACILITATING DEVICE FINGERPRINTING THROUGH ASSIGNMENT OF FUZZY DEVICE IDENTIFIERS
Various device attributes associated with a current event may be obtained. Similarity metrics may be determined that indicate a degree of similarity between the device attributes that are associated with the current event and stored device attributes that are associated with previous events and previously created fuzzy device identifiers. A fuzzy device identifier may be assigned to the current event based at least in part on a comparison of the similarity metrics with a threshold. If none of the similarity metrics compare favorably with the threshold, then a new fuzzy device identifier may be created for the current event. However, if at least one of the similarity metrics compares favorably with the threshold, then the previously created fuzzy device identifier whose stored device attributes are most similar to the device attributes that are associated with the current event may be assigned to the current event.
Authentication mechanism for 5G technologies
Embodiments of this disclosure provide techniques for securely communicating an IMSI over the air from a UE to an SeAN, as well as for securely validating an unencrypted IMSI that the SeAN receives from the home network, during authentication protocols. In particular, the UE may either encrypt the IMSI assigned to the UE using an IMSI encryption key (K.sub.IMSIenc) or compute a hash of the IMSI assigned to the UE using an IMSI integrity key (K.sub.IMSIint), and then send the encrypted IMSI or the hash of the IMSI to the serving network. The encrypted IMSI or hash of the encrypted IMSI may then be used by the SeAN to validate an unencrypted IMSI that was previously received from an HSS in the home network of the UE.
Authentication mechanism for 5G technologies
Embodiments of this disclosure provide techniques for securely communicating an IMSI over the air from a UE to an SeAN, as well as for securely validating an unencrypted IMSI that the SeAN receives from the home network, during authentication protocols. In particular, the UE may either encrypt the IMSI assigned to the UE using an IMSI encryption key (K.sub.IMSIenc) or compute a hash of the IMSI assigned to the UE using an IMSI integrity key (K.sub.IMSIint), and then send the encrypted IMSI or the hash of the IMSI to the serving network. The encrypted IMSI or hash of the encrypted IMSI may then be used by the SeAN to validate an unencrypted IMSI that was previously received from an HSS in the home network of the UE.
TECHNIQUE FOR RELAYING CONTROL MESSAGES BETWEEN A CORE NETWORK ENTITY AND RADIO DEVICES
A technique for relaying control messages between a core network entity of a communications network and radio devices served by the base station of the communications network is described. As to a method aspect of the technique, each of the control messages is relayed from one of the radio devices to the core network entity or from the core network entity to one of the radio devices. Each of the relayed control messages comprises an identifier that is indicative of at least one of the respective one of the radio devices and a user thereof. The control messages are stored at the base station, wherein the identifier is replaced in each of the stored control messages by a placeholder value that is independent of at least one of the respective one of the radio devices and the user thereof.
Method and apparatus for supporting security in RRC inactive state in wireless communication system
A method and apparatus for supporting security in a radio resource control (RRC) inactive state in a wireless communication system is provided. A user equipment (UE) receives information on multiple security variables, of which each variable is mapped to each of multiple counter values, respectively. The UE calculates a security parameter and/or updating a UE identifier (ID) based on a security variable among the security variables which is mapped to a corresponding counter value among the multiple counter values, and transmits a radio resource control (RRC) resume request message including the calculated security parameter and/or the updated UE ID. The counter value may be increase whenever a timer expires or an RRC reject message is received as a response to the RRC resume request message.
UE and devices for detach handling
Devices, methods, use user equipment (UE), core network devices, evolved node B (eNB), and storage media for UE provisioning are described. In one embodiment, processing circuitry of a mobility management entity (MME) decodes a non-access stratum (NAS) message comprising a detach request associated with a first user equipment (UE) and determines that the detach request is received from the UE without integrity protection. The MME then analyzes one or more additional criteria associated with the detach request in response to confirmation that the detach request message is received from the UE without the integrity protection, and manages an evolved packet system (EPS) mobility management (EMM) registration state for the first UE based on analysis of the one or more additional criteria. Various different criteria and associated EMM registration state management operations are described. Additional corresponding UE operations are also described.