-
1.
公开(公告)号:US20250142331A1
公开(公告)日:2025-05-01
申请号:US19012615
申请日:2025-01-07
Applicant: NOKIA TECHNOLOGIES OY
Inventor: Suresh NAIR , Ranganathan MAVUREDDI DHANASEKARAN , Laurent THIEBAUT
IPC: H04W12/06 , H04W12/041 , H04W12/72
Abstract: Methods, computer program products, and apparatuses are provided for enabling a user equipment (UE) to connect to the wireless access network that support non-seamless wireless local area network (WLAN) offload (NSWO), such as using the UE's fifth generation (5G) credentials. An apparatus may include a processor and a memory storing computer program code configured to cause the apparatus to request, by the UE, a wireless connection to a network entity; receive, by the UE, from the network entity, an identity request; and in response to the identity request, cause transmission, by the UE, an identity response including a UE identifier to the network entity such that the UE is configured to establish a security context with the network entity upon successful authentication using the UE identifier.
-
公开(公告)号:US20250097875A1
公开(公告)日:2025-03-20
申请号:US18966295
申请日:2024-12-03
Applicant: Nokia Technologies Oy
Inventor: Jing PING , Suresh P NAIR , Ranganathan MAVUREDDI DHANASEKARAN
IPC: H04W60/04 , H04W12/041 , H04W12/06 , H04W84/04
Abstract: Embodiments of the present disclosure relate to path switch between relays and security procedures. A terminal device obtains a selection policy for selecting a RSC from a plurality of RSCs, an RSC of the plurality of RSCs being associated with an indicator for indicating whether the RSC supports a CP security procedure or an UP security procedure. Based on determining that path switching from a source relay terminal device with a source RSC is triggered, the terminal device selects a target RSC based on the selection policy, a source indicator being associated with the source RSC, and a plurality of indicators being associated with the plurality of RSCs. The terminal device selects, for the path switching, a target relay terminal device based on the target RSC. As such, the service continuity after path switching between relays can be improved and delay or disruptions to the service can be avoided.
-
公开(公告)号:US20250056466A1
公开(公告)日:2025-02-13
申请号:US18785489
申请日:2024-07-26
Applicant: Nokia Technologies Oy
Inventor: Ranganathan MAVUREDDI DHANASEKARAN
Abstract: According to an aspect, there is provided an apparatus configured to perform the following. The apparatus receive a downlink, DL, non-access stratum, NAS, transport message comprising a plurality of payload containers. The plurality of payload containers comprise a user equipment parameters update, UPU, transparent container and one or more non-UPU payload containers. The UPU transparent container comprises a re-registration, REG, flag having a true value indicating that re-registration of the apparatus is requested. The apparatus sends the plurality of payload containers to respective upper layers for processing. The apparatus triggers the re-registration following detection of completion of the one or more respective processes associated with the one or more non-UPU payload containers.
-
公开(公告)号:US20240388902A1
公开(公告)日:2024-11-21
申请号:US18664221
申请日:2024-05-14
Applicant: Nokia Technologies Oy
Inventor: Saurabh KHARE , Sung Hwan WON , Ranganathan MAVUREDDI DHANASEKARAN
IPC: H04W12/06
Abstract: There is provided an apparatus comprising means for determining, on insertion of a universal subscriber identity module, USIM, in a mobile equipment, that at least one counter stored at the mobile equipment is invalid and means for, based on the determining, providing an indication to a core network to cause an authentication procedure between the mobile equipment and the core network.
-
5.
公开(公告)号:US20240224028A1
公开(公告)日:2024-07-04
申请号:US18399548
申请日:2023-12-28
Applicant: Nokia Technologies Oy
Inventor: Saurabh KHARE , Ranganathan MAVUREDDI DHANASEKARAN , Pallab GUPTA
IPC: H04W12/06 , H04W12/082 , H04W36/14 , H04W76/11
CPC classification number: H04W12/06 , H04W12/082 , H04W36/144 , H04W76/11 , H04W84/12
Abstract: Techniques are disclosed for managing reauthentication and revocation in a communication network environment. In one example, a method comprises receiving, at a first network entity (e.g., an NSWOF), a request from a second network entity (e.g., a UDM) of a communication network to which user equipment is subscribed (e.g., HN), wherein the received request is for a reauthentication or a revocation of the user equipment in accordance with wireless local area network access. The first network entity identifies the user equipment based on information about the user equipment (e.g., UE context) previously stored by the first network entity. The first network entity sends at least a portion of the received request toward the user equipment, and then continues to participate in the reauthorization or revocation based on the request.
-
公开(公告)号:US20220330026A1
公开(公告)日:2022-10-13
申请号:US17716587
申请日:2022-04-08
Applicant: Nokia Technologies Oy
Inventor: Nuno Manuel KIILERICH PRATAS , Lianghai JI , Berthold PANZNER , Faranaz SABOURI-SICHANI , Ranganathan MAVUREDDI DHANASEKARAN , Panagiotis SPAPIS , Daniel MEDINA
IPC: H04W12/122 , H04L1/18 , H04W12/106
Abstract: Apparatus and method for counter measures for attacking messages are provided. Solution comprises communicating (500) with another apparatus utilising sidelink transmissions, monitoring (502) for an attacking sidelink message based on the content or timing of received messages and entering (504) a defensive mode to mitigate the attack when one or more received messages has been detected as attacking sidelink messages.
-
公开(公告)号:US20250133393A1
公开(公告)日:2025-04-24
申请号:US18689738
申请日:2023-01-04
Applicant: Nokia Technologies Oy
Inventor: Jing PING , Ranganathan MAVUREDDI DHANASEKARAN
IPC: H04W12/033 , H04L9/06 , H04W12/106
Abstract: Example embodiments of the present disclosure relate to UP traffic handling for emergency case. A first terminal device determines that UP traffic is to be communicated between the first terminal device and a second terminal device without confidentiality protection. The first terminal device determines that the UP traffic is to be communicated between the first terminal device and the second terminal device without integrity protection or with a partial integrity protection. The first terminal device transmits, to the second terminal device, a message indicating that the UP traffic is to be communicated without the confidentiality protection or the integrity protection, or without the confidentiality protection and with the partial integrity protection. In turn, the first terminal device communicates the UP traffic between the first terminal device and the second terminal device without the confidentiality protection or the integrity protection, or without the confidentiality protection and with the partial integrity protection.
-
公开(公告)号:US20240340772A1
公开(公告)日:2024-10-10
申请号:US18295507
申请日:2023-04-04
Applicant: Nokia Technologies Oy
Inventor: Saurabh KHARE , Pallab GUPTA , Ranganathan MAVUREDDI DHANASEKARAN
IPC: H04W48/14 , H04W12/041 , H04W12/106 , H04W60/04
CPC classification number: H04W48/14 , H04W12/041 , H04W12/106 , H04W60/04 , H04W84/042
Abstract: Embodiments of the present disclosure relate to devices, methods, apparatuses and computer readable storage media of Steering of Roaming (SoR) enhancement during registration reject. The method comprises transmitting, from a terminal device to an AMF, a registration request at least indicating that a SoR update is supported in a registration reject message, the AMF being associated with a VPLMN on which the terminal device intends to camp; and receiving the registration reject message including a request of acknowledgement, SoR information and a MAC-I of a home network.
-
公开(公告)号:US20240251241A1
公开(公告)日:2024-07-25
申请号:US18411469
申请日:2024-01-12
Applicant: Nokia Technologies Oy
Inventor: Ranganathan MAVUREDDI DHANASEKARAN
IPC: H04W12/06 , H04W12/0433 , H04W12/72 , H04W60/04
CPC classification number: H04W12/06 , H04W12/0433 , H04W12/72 , H04W60/04
Abstract: An apparatus comprising means for obtaining a subscription permanent identifier for said apparatus in a primary authentication process; means for obtaining a root session key; means for generating an Authentication and Key Management for Applications (AKMA) key based on said root session key; means for generating a temporary identifier for the AKMA key at least partly based on a first routing indicator value obtained from a Unified Data Management (UDM) function; means for initiating, in response to receiving a request from the UDM function to update the temporary identifier for the AKMA key using a second routing indicator value without a request to re-register the temporary identifier for the AKMA key updated based on the second routing indicator value, a re-registration process of the temporary identifier for the AKMA key using at least said subscription permanent identifier and the second routing indicator value.
-
公开(公告)号:US20240056302A1
公开(公告)日:2024-02-15
申请号:US18447098
申请日:2023-08-09
Applicant: Nokia Technologies Oy
Inventor: Markus STAUFER , Peter SCHNEIDER , Ranganathan MAVUREDDI DHANASEKARAN
CPC classification number: H04L9/321 , H04L9/0819
Abstract: There is provided an apparatus, method and computer program for causing a first apparatus to: obtain an identifier of a cryptographic key according to a first security communication protocol; signal, to a second apparatus, a first authentication request according to a second security communication protocol, the first authentication request comprising the identifier of the cryptographic key and a first verifying information according to a second security communication protocol, wherein the first verifying information comprises a first value calculated using the cryptographic key; receive, from the second apparatus, an authentication response according to the second security communication protocol, the authentication response comprising a second verifying information according to the second security communication protocol, wherein the second verifying information comprises a second value; and verify the second apparatus for the second security communication protocol using the second value and the cryptographic key.
-
-
-
-
-
-
-
-
-