-
公开(公告)号:US20240048974A1
公开(公告)日:2024-02-08
申请号:US18231566
申请日:2023-08-08
Applicant: Apple Inc.
Inventor: Jarkko L. Kneckt , Debashis Dash , Elliot S. Briggs , Nisan Reuven , Qi Wang , Sidharth R. Thakur , Su Khiong Yong , Yong Liu , Tianyu Wu
IPC: H04W12/037 , H04W12/02
CPC classification number: H04W12/037 , H04W12/02
Abstract: Techniques are disclosed for obfuscation in a privacy beacon. An example method includes the first device receiving, from a second communication device, a beacon frame comprising a medium access control (MAC) header and an encrypted beacon frame field, the MAC header comprising an obfuscated timing synchronization field (TSF). The first device can select a key for de-obfuscating the TSF based at least in part on information associated with the beacon frame. The first device can de-obfuscate the TSF based at least in part on the key. The first device can decrypt the encrypted beacon frame field of the beacon frame based at least in part on information associated with the de-obfuscated TSF.
-
公开(公告)号:US11864267B2
公开(公告)日:2024-01-02
申请号:US17935049
申请日:2022-09-23
Applicant: Apple Inc.
Inventor: Raj S. Chaugule , Anish Kumar Goyal , Elliot S. Briggs , Li Li , Zexing Shi
Abstract: This Application describes mechanisms to transfer cellular service plans and associated credentials efficiently between wireless devices. Information regarding transferability of cellular services for SIMs/eSIMs to a wireless device are obtained from locally stored or remotely accessible cellular service information and/or associated mobile network operator (MNO) information. Access to network-based servers to determine transferability and/or to effect transfer can use non-cellular connections when available. Transferability information can be presented to a user to narrow selection of cellular service plans to transfer.
-
公开(公告)号:US11044276B2
公开(公告)日:2021-06-22
申请号:US16105489
申请日:2018-08-20
Applicant: Apple Inc.
Inventor: Elliot S. Briggs , Jason A. Novak , Samuel D. Post , Zhu Ji
IPC: H04L29/06 , H04L12/24 , H04W12/06 , H04W48/04 , H04W12/37 , H04W12/63 , H04W12/68 , H04W12/122 , H04W88/08 , H04W76/27 , H04W88/02 , H04W64/00
Abstract: A wireless device determines a location, identifies a mobile network operator (MNO), and/or experiences a network event. In some instances, the wireless device recognizes a base station as being operated by the MNO. Based on the location, the MNO and/or the network event, the wireless device determines a security action. The security action can include one or more of: (i) ignoring a network command associated with the network event, (ii) providing an alert notification via a user interface of the wireless device alerting a user of a security risk associated with the location, MNO, and/or network event, or (iii) ignoring communication from the base station temporarily or for an indefinite period of time. In some instances, the security action includes proceeding with normal communication with the base station at the location using network services of the MNO.
-
公开(公告)号:US10129283B1
公开(公告)日:2018-11-13
申请号:US15610230
申请日:2017-05-31
Applicant: Apple Inc.
Inventor: Elliot S. Briggs , Zhu Ji
IPC: H04W4/00 , H04W36/00 , H04L29/06 , H04W12/12 , H04W36/08 , H04W48/02 , H04W12/02 , H04W40/00 , H04W72/00 , H04W84/04
CPC classification number: H04L63/1425 , H04W12/02 , H04W12/12 , H04W36/0094 , H04W36/08 , H04W48/02 , H04W84/042
Abstract: A device observes base station signals and identifies those that are suspicious and those that are normal. The device avoids communication with the sources of suspicious signals. A rogue base station may be the source of suspicious signals. A system operated by a mobile network operator is a source of normal signals. A rogue operator and the mobile network operator have different goals and those differences are the basis of embodiments provided herein to detect the rogue base station. The observations are characterized by message rates, waveform accuracy, cell parameters, and synchronization level.
-
公开(公告)号:US20240406906A1
公开(公告)日:2024-12-05
申请号:US18325213
申请日:2023-05-30
Applicant: Apple Inc.
Inventor: Jarkko L. Kneckt , Charles F. Dominguez , Daniel R. Borges , Debashis Dash , Elliot S. Briggs , Ilan Evron , Nisan Reuven , Sidharth R. Thakur , Su Khiong Yong , Tianyu Wu , Udi Atar , Yong Liu
IPC: H04W60/04
Abstract: An electronic device is described. This electronic device may associate with a second electronic device (such as an access point) in a WLAN. While associating or associated with the second electronic device, the electronic device may receive, from the second electronic device, an AID corresponding to the electronic device for use when communicating frames in the WLAN. Moreover, while associated with the second electronic device, the electronic device may obtain a second AID corresponding to the electronic device for use when communicating second frames in the WLAN, where the associating includes replacing the AID with the second AID. Note that obtaining the second AID may include: the electronic device selecting the second AID from a predefined set of AIDs, which were previously received from the second electronic device; or the electronic device receiving, from the second electronic device, the second AID.
-
公开(公告)号:US20240049208A1
公开(公告)日:2024-02-08
申请号:US18231704
申请日:2023-08-08
Applicant: Apple Inc.
Inventor: Jarkko L. Kneckt , Debashis Dash , Elliot S. Briggs , Nisan Reuven , Qi Wang , Sidharth R. Thakur , Su Khiong Yong , Yong Liu , Tianyu Wu
IPC: H04W72/044 , H04L5/00
CPC classification number: H04W72/0466 , H04L5/0055
Abstract: Techniques are directed toward secure scrambling. An example method includes receiving, by a first communication device a physical layer protocol data unit (PPDU) frame from a second communication device. The first communication device can determine a PPDU frame type based at least in part on a preamble of the PPDU frame. The first communication device can apply a PPDU frame type-based key and a determined service field value to implement a descrambling process for a medium access control (MAC) header of the PPDU frame. The first communication device can descramble a payload based at least in part on de-obfuscating the MAC header. The first communication device selecting a scrambler seed for scrambling an acknowledgement (ACK) message. The first communication device scrambling the ACK message based on the selected scrambler seed.
-
公开(公告)号:US20240048542A1
公开(公告)日:2024-02-08
申请号:US18231703
申请日:2023-08-08
Applicant: Apple Inc.
Inventor: Jarkko L. Kneckt , Debashis Dash , Elliot S. Briggs , Nisan Reuven , Qi Wang , Sidharth R. Thakur , Su Khiong Yong , Yong Liu , Tianyu Wu
IPC: H04L9/40
CPC classification number: H04L63/0485
Abstract: Techniques are directed toward secure scrambling. An example method includes a first device encrypting a payload to be included in a physical layer protocol data unit (PPDU) frame. The determining a PPDU frame type based at least in part on an association with a second device. The first device can select a key based at least in part on the association with second device. The first device can encrypt a payload to be included in a physical layer protocol data unit (PPDU) frame. The first device can determine a PPDU frame type based at least in part on an association with a second communication device. The first device can obfuscate the field of the MAC header. The first device can scramble the encrypted payload using a service field value. The first device can transmit the PPDU frame to the second device.
-
公开(公告)号:US20240048533A1
公开(公告)日:2024-02-08
申请号:US18231691
申请日:2023-08-08
Applicant: Apple Inc.
Inventor: Jarkko L. Kneckt , Debashis Dash , Elliot S. Briggs , Nisan Reuven , Qi Wang , Sidharth R. Thakur , Su Khiong Yong , Yong Liu , Tianyu Wu
CPC classification number: H04L63/0428 , H04L69/22
Abstract: Techniques are provided for medium access control header obfuscation. One example method includes a first device encrypting a data payload using a first encryption algorithm. The first device can encrypt a field of a medium access control (MAC) header using a second encryption algorithm, different from the first encryption algorithm. The first device can generate a data frame comprising the encrypted MAC header field and the encrypted payload. The first device can transmit the data frame to a second communication device.
-
公开(公告)号:US11895495B2
公开(公告)日:2024-02-06
申请号:US17057622
申请日:2018-06-22
Applicant: Apple Inc.
Inventor: Xiangying Yang , Elliot S. Briggs , Samuel D. Post , Yannick L. Sierra , Fangli Xu , Dawei Zhang , Haijing Hu , Huarui Liang , Li Li , Lijia Zhang , Shu Guo , Yuqin Chen
IPC: H04W12/069 , H04W76/27 , H04W12/73 , H04W12/108 , H04W74/08
CPC classification number: H04W12/069 , H04W12/108 , H04W12/73 , H04W74/0833 , H04W76/27
Abstract: This disclosure relates to techniques, base stations, and user equipment devices (UEs) for performing base station authentication through access stratum signaling transmissions. The UE may operate in idle mode and may receive an authentication message from a base station through the wireless interface while operating in idle mode. The UE may determine whether a signature comprised within the authentication message is valid, and the UE may continue a connection procedure with the base station based on a determination that the signature is valid. If it is determined that the signature is invalid, the UE may designate the base station as a barred base station and may perform cell re-selection. The authentication message may be one of a radio resource control (RRC) connection setup message, a special RRC message, a media access control (MAC) message, or a random access channel (RACH) message comprising a random access response (RAR) message.
-
公开(公告)号:US20230147562A1
公开(公告)日:2023-05-11
申请号:US17949910
申请日:2022-09-21
Applicant: Apple Inc.
Inventor: Jarkko L Kneckt , Charles F. Dominguez , Daniel R. Borges , Debashis Dash , Elliot S. Briggs , Sidharth R. Thakur , Su Khiong Yong , Yong Liu
IPC: H04W12/037 , H04W12/06
CPC classification number: H04W12/037 , H04W12/06
Abstract: Systems, methods, and mechanisms for a privacy enhanced basic service set (BSS), including privacy enhancements for both access points and wireless stations as well as privacy enchantments for authentication, association, and discovery operations. Further, the systems, methods, and mechanisms disclosed may continue to support legacy wireless stations and are thus, backward compatible. A station may communicate with a legacy BSS of a wireless network to transition to a PE BSS of the wireless network. The station may receive, from the PE BSS of the wireless network, an encrypted beacon, wherein the encrypted beacon is decoded based on information received from the legacy BSS and perform, with the PE BSS of the wireless network, an encrypted handshake procedure to authenticate and associate with the PE BSS of the wireless network.
-
-
-
-
-
-
-
-
-