Patent classifications
H04W36/0038
RADIO NETWORK NODE, USER EQUIPMENT (UE) AND METHODS PERFORMED THEREIN
Embodiments herein relate to for example a method performed by a radio network node for handling a communication of a user equipment, UE, in a wireless communication network. The radio network node transmits a handover command for handing over the UE, from a source cell to a target cell, wherein a security parameter for encrypting data communicated between the radio network node and the UE is retained during the handover. Furthermore, the radio network node maintains a sequence number status for reception and/or transmission of a signalling radio bearer of the UE during the handover from the source cell to the target cell, and/or at a fallback from the target cell to the source cell, when the UE triggers the fallback to the source cell.
AUTHENTICATION EVENT PROCESSING METHOD, APPARATUS, AND SYSTEM
Embodiments of this application disclose example authentication event processing methods and apparatuses. One example method includes receiving, by a unified data management network element, a second authentication event processing request from an authentication server network element. The unified data management network element can then query an authentication event corresponding to the second information. The unified data management network element can then process the authentication event. The unified data management network element can then send a third authentication event processing request to a unified data repository network element. The unified data management network element can then receive a third authentication event processing response from the unified data repository network element. The unified data management network element can then send a second authentication event processing response to the authentication server network element.
Methods, systems, and devices for federated blockchain-enabled handover authentication
Aspects of the subject disclosure may include, for example, authenticating, by a federated blockchain controller, a user equipment located within a cell coverage area of a network that includes heterogeneous cells. The federated blockchain controller can provide encryption data to the user equipment and corresponding authentication information to one or more multi-access edge computing (MEC) devices associated with the heterogeneous cells to enable secure and efficient handovers for the user equipment amongst the heterogeneous cells, without a need for additional handover reauthentication procedures. Other embodiments are disclosed.
METHOD AND DEVICE FOR CONFIGURING DATA TRANSMISSION
The disclosure relates to a fifth generation (5G) or sixth generation (6G) communication system for supporting a higher data transmission rate. A method and a device for configuring data transmission are provided. The method includes transmitting a first message to a second node, the first message being used for the first node to provide configuration information for a user to the second node, or used for the first node to request the configuration information for the user from the second node, and/or receiving a second message from the second node, the second message being used for the second node to provide the configuration information for the user to the first node, or used for the second node to request the configuration information for the user from the first node, to avoid unnecessary signaling overhead.
Method for controlling wireless local area network aggregation and associated equipment
The present disclosure relates to a pre-5.sup.th-Generation (5G) or 5G communication system to be provided for supporting higher data rates Beyond 4.sup.th-Generation (4G) communication system such as Long Term Evolution (LTE). The present invention provides a method for controlling Wireless Local Area Network (WLAN) aggregation and an associated equipment. The method comprises the following steps of: acquiring, by a first radio access network node, WLAN information about a User Equipment (UE); and, controlling, by the first radio access network node, WLAN aggregation for the UE according to the acquired WLAN information. A second radio access network node decides whether to maintain a WT and/or whether to establish WLAN aggregation for the UE when the UE moves to a first radio access network; and, the second radio access network node transmits information about whether to maintain the WT and/or indication information about whether to establish the WLAN aggregation for the UE. The WT receives UE context reference information transmitted by the first radio access network node; and, the WT indexes a UE context according to the received UE context reference information. With the present invention, the WLAN aggregation performance in a UE mobility scenario can be improved.
Apparatus and method for network security
The present disclosure relates to a 5th generation (5G) or pre-5G communication system for supporting a higher data transfer rate beyond a 4th generation (4G) communication system, such as long-term evolution (LTE). According to various embodiments of the present disclosure, a security method of a mobility management apparatus of a second system in a wireless environment may comprise the steps of: receiving a handover request for a terminal connected to a first system; transmitting the handover request to a base station of the second system; and receiving a handover ACK including security information generated by the base station of the second system and transmitting the same to the first system.
Method and apparatus for multiple registrations
A user device having a security context with a first network based on a first key may establish a security context with a second network. In a method, the user device may generate a key identifier based on the first key and a network identifier of the second network. The user device may forward the key identifier to the second network for forwarding to the first network by the second network to enable the first network to identify the first key at the first network. The user device may receive a key count from the second network. The key count may be associated with a second key forwarded to the second network from the first network. The user device may generate the second key based on the first key and the received key count thereby establishing a security context between the second network and the user device.
MBS Security in UE Mobility
In response to a UE in a wireless network leaving a multicast group to which the user equipment belonged or switching between multiple access nodes belonging to the multicast group, sending by an access node a rekeying token for UE(s) in the multicast group to use to access data for the multicast group. The access node generates key(s) based at least on the rekeying token. The access node multicasts traffic to the UE(s) in the multicast group using the key(s). In response to an other UE in a wireless network leaving a multicast group to which a UE belongs or switching by the UE between multiple access nodes belonging to the multicast group, receiving, at the UE from an access node, a rekeying token to use. The UE generates key(s) based at least on the rekeying token and receives multicast traffic using the key(s).
Method, Apparatus and System for Key Derivation
Method, apparatus and systems are provided for key derivation. A target base station receives multiple keys derived by a source base station, where the keys correspond to cells of the target base station. The target base station selects a key corresponding to the target cell after obtaining information regarding a target cell that a user equipment (UE) is to access. An apparatus for key derivation and a communications system are also provided.
Apparatus, system and method for DC (dual connectivity)
A UE (10) provides information on potential S′eNB(s). The information is forwarded from an MeNB (20_1) to an M′eNB (20_2) such that the M′eNB (20_2) can determine, before the handover happens, whether the M′eNB (20_2) will configure a new SeNB (S′eNB) and which S′eNB the M′eNB (20_2) will configure. In one of options, the MeNB (20_1) derives a key S′-KeNB for communication protection between the UE (10) and the S′eNB (30_1), and send the S′-KeNB to the M′eNB (20_2). In another option, the M′eNB (20_2) derives the S′-KeNB from a key KeNB* received from the MeNB (20_1). The M′eNB (20_2) sends the S′-KeNB to the S′eNB (30_1). Moreover, there are also provided several variations to perform SeNB Release, SeNB Addition, Bearer Modification and the like, in which the order and/or timing thereof can be different during the handover procedure.