Methods and Apparatus for Differencitating Security Configurations in a Radio Local Area Network
    2.
    发明申请
    Methods and Apparatus for Differencitating Security Configurations in a Radio Local Area Network 有权
    用于区分无线局域网安全配置的方法和装置

    公开(公告)号:US20150319652A1

    公开(公告)日:2015-11-05

    申请号:US14650388

    申请日:2012-12-24

    Abstract: Methods and apparatus are provided for differentiating security configurations in a radio local area network. A method can comprises: at a base station, sending a handover request to a local access point for initiating a handover of a user equipment from the base station to the local access point, the handover request comprising an indication of a scheme of security configuration to be used for protecting a communication between the base station and the user equipment. The method can further comprise, at the base station, forwarding to the user equipment a handover command received from the local access point, wherein the indication is comprised in the handover command by the local access point. The method can further comprise communicating with the user equipment according to the scheme of security configuration after the user equipment is handover to the local access point.

    Abstract translation: 提供了用于区分无线电局域网中的安全配置的方法和装置。 一种方法可以包括:在基站处,向本地接入点发送切换请求,用于发起用户设备从基站到本地接入点的切换,所述切换请求包括安全配置方案的指示, 用于保护基站和用户设备之间的通信。 该方法还可以包括在基站向用户设备转发从本地接入点接收到的切换命令,其中该指示由本地接入点包括在切换命令中。 该方法还可以包括在用户设备切换到本地接入点之后,根据安全配置的方案与用户设备进行通信。

    Method and Apparatus for Diverse Security Handling in an Enhanced Local Area Network
    3.
    发明申请
    Method and Apparatus for Diverse Security Handling in an Enhanced Local Area Network 有权
    用于增强型局域网中不同安全性处理的方法和装置

    公开(公告)号:US20160050186A1

    公开(公告)日:2016-02-18

    申请号:US14779258

    申请日:2013-04-01

    CPC classification number: H04L63/0428 H04L63/18 H04W12/02

    Abstract: A method for diverse security handling may comprise: maintaining a first connection between a user equipment and a first network node, and a second connection between the user equipment and a second network node which has a third connection with the first network node; setting an indicator in a packet to indicate whether a destination of user data in the packet is the first network node or the second network node; and transmitting the packet from the user equipment to the first network node via the first connection.

    Abstract translation: 用于各种安全处理的方法可以包括:维护用户设备和第一网络节点之间的第一连接,以及用户设备与具有与第一网络节点的第三连接的第二网络节点之间的第二连接; 在分组中设置指示符,以指示分组中的用户数据的目的地是第一网络节点还是第二网络节点; 以及经由所述第一连接将所述分组从所述用户设备发送到所述第一网络节点。

    Methods and apparatus for differencitating security configurations in a radio local area network

    公开(公告)号:US09794836B2

    公开(公告)日:2017-10-17

    申请号:US14650388

    申请日:2012-12-24

    Abstract: Methods and apparatus are provided for differentiating security configurations in a radio local area network. A method can comprises: at a base station, sending a handover request to a local access point for initiating a handover of a user equipment from the base station to the local access point, the handover request comprising an indication of a scheme of security configuration to be used for protecting a communication between the base station and the user equipment. The method can further comprise, at the base station, forwarding to the user equipment a handover command received from the local access point, wherein the indication is comprised in the handover command by the local access point. The method can further comprise communicating with the user equipment according to the scheme of security configuration after the user equipment is handover to the local access point.

    Methods and Apparatus for Generating Keys in Device-to-Device Communications
    5.
    发明申请
    Methods and Apparatus for Generating Keys in Device-to-Device Communications 有权
    用于在设备到设备通信中生成密钥的方法和装置

    公开(公告)号:US20160134418A1

    公开(公告)日:2016-05-12

    申请号:US14898881

    申请日:2013-06-26

    Abstract: Methods and apparatus are provided for securing device-to-device communications. A method can comprise: at an access network apparatus, obtaining from a core network apparatus and storing a first key shared between a first user equipment and the core network apparatus for device-to-device communications of the first user equipment; receiving from a second user equipment, a request for generating a second key for a device-to-device communication between the first user equipment and the second user equipment; in response to the request, generating the second key based on the first key and security parameters; and sending the second key to the second user equipment.

    Abstract translation: 提供了用于确保设备到设备通信的方法和设备。 一种方法可以包括:在接入网络设备处,从核心网络设备获得并存储在第一用户设备和核心网络设备之间共享的第一密钥,用于第一用户设备的设备到设备通信; 从第二用户设备接收生成用于第一用户设备和第二用户设备之间的设备到设备通信的第二密钥的请求; 响应于该请求,基于第一密钥和安全参数生成第二密钥; 以及将所述第二密钥发送到所述第二用户设备。

    Method and device of generating a key for device-to-device communication between a first user equipment and a second user equipment

    公开(公告)号:US10341859B2

    公开(公告)日:2019-07-02

    申请号:US14433725

    申请日:2012-10-19

    Abstract: A method of generating a key for D2D communication between a first user equipment and a second user equipment in a first radio access node is disclosed. In an exemplary embodiment, the method may comprise: receiving a request for D2D key generation from the first user equipment which is served by the first radio access node; determining whether the second user equipment is served by the first radio access node; when it is determined that the second user equipment is served by the first radio access node, generating a first random number and a second random number; generating a first D2D key based on the first random number and a second D2D key based on the second random number; sending the first D2D key and the second random number to the second user equipment; and sending the second D2D key and the first random number to the first user equipment; and when it is determined that the second user equipment is not served by the first radio access node, determining a second radio access node which serves the second user equipment; generating a first random number; generating a first D2D key based on the first random number; sending the first D2D key to the second radio access node; receiving a second D2D key from the second radio access node; and sending the second D2D key and the first random number to the first user equipment.

Patent Agency Ranking