-
公开(公告)号:US20230007471A1
公开(公告)日:2023-01-05
申请号:US17865677
申请日:2022-07-15
Applicant: Telefonaktiebolaget LM Ericsson (publ)
Inventor: Prajwol Kumar NAKARMI , Pasi Saarinen , Monica Wifvesson
IPC: H04W12/033 , H04L9/32 , H04W12/40 , H04W12/041 , H04W12/72 , H04W12/0433 , H04W76/11 , H04W8/18
Abstract: In order to ensure that a Subscription Concealed Identifier, SUCI, is calculated in the Universal Subscriber Identity Module, USIM, part of a User Equipment, UE, when intended, when a SUCI-Calculation-Indicator is set to a value indicating that the SUCI should be calculated in the USIM, a network node sets proprietary information, which is not known to a Mobile Equipment, ME, part of the UE, as required for calculation of the SUCI. The USIM facilitates calculation of the SUCI in the ME part of the UE only when the SUCI-Calculation-Indicator is set to a value indicating that the SUCI should be calculated in the ME. When the SUCI-Calculation-Indicator is set to a value indicating that the SUCI should be calculated in the USIM, the ME part deletes any locally stored information required for calculation of the SUCI.
-
公开(公告)号:US20220150691A1
公开(公告)日:2022-05-12
申请号:US17431802
申请日:2020-01-03
Applicant: Telefonaktiebolaget LM Ericsson (publ)
Inventor: Oumer TEYEB , Gunnar MILDH , Prajwol Kumar NAKARMI
IPC: H04W12/03 , H04W12/106
Abstract: A method and apparatus for a first IAB node for securely communicating with at least one second IAB node is provided. A secure connection with a node of a network is established. A message is received, from the node, indicating a secure messaging protocol to use to communicate with the at least one second IAB node, the message including one of at least one nonce or a key. A control message to be sent to the at least one second IAB node is transformed into a secure control message using the secure messaging protocol. The secure control message is transmitted to the at least one second IAB node.
-
公开(公告)号:US20220014914A1
公开(公告)日:2022-01-13
申请号:US17487626
申请日:2021-09-28
Applicant: Telefonaktiebolaget LM Ericsson (publ)
Inventor: Vesa LEHTOVIRTA , Prajwol Kumar NAKARMI , Monica WIFVESSON
Abstract: A method for re-establishing a Radio Resource Control (RRC) connection between a UE and a target eNB. The method is performed by the UE. The method includes the UE receiving an RRC Connection Reestablishment message from the target eNB, the RRC Connection Reestablishment message including a DL authentication token which has been generated by an MME and has had a Non Access Stratum integrity key as input. The method also includes the UE authenticating the received DL authentication token.
-
公开(公告)号:US20210075778A1
公开(公告)日:2021-03-11
申请号:US16951614
申请日:2020-11-18
Applicant: Telefonaktiebolaget LM Ericsson (publ)
Inventor: Prajwol Kumar NAKARMI , Noamen BEN HENDA , Christine JOST , Vesa TORVINEN
Abstract: A method performed by a network node of a serving public land mobile network, PLMN, associated with a user equipment, UE, comprising: obtaining a secret identifier that uniquely identifies the UE, wherein the secret identifier is a secret that is shared between the UE and at least a home PLMN of the UE and that is shared by the home PLMN with the network node; and performing an operation related to the UE using the secret identifier. Other methods, computer programs, computer program products, network nodes and a serving PLMN are also disclosed.
-
公开(公告)号:US20200323011A1
公开(公告)日:2020-10-08
申请号:US16306409
申请日:2018-01-24
Applicant: Telefonaktiebolaget LM Ericsson (publ)
Inventor: Vesa LEHTOVIRTA , Prajwol Kumar NAKARMI , Monica WIFVESSON
IPC: H04W76/19 , H04W76/25 , H04W8/08 , H04W12/06 , H04L9/32 , H04W12/10 , H04W12/04 , H04W76/11 , H04W76/27 , H04W76/30
Abstract: A method for re-establishing a Radio Resource Control, RRC, connection between a User Equipment (1), UE, and a target evolved NodeB (3), target eNB, the method being performed by the target eNB and comprising: receiving an RRC connection re-establishment request from the UE (1), wherein the RRC connection re-establishment request includes an authentication token generated with a Non Access Stratum integrity key as input; sending a verification message to a Mobility Management Entity (4), MME, wherein the verification message includes the received authentication token; receiving a response from the MME, of verification of the authentication token. Disclosed are also methods for the UE, MME, and a source eNB, as well as the apparatus themselves and computer programs and computer program products therefore.
-
公开(公告)号:US20200213840A1
公开(公告)日:2020-07-02
申请号:US16811629
申请日:2020-03-06
Applicant: Telefonaktiebolaget LM Ericsson (publ)
Inventor: Prajwol Kumar NAKARMI , Pasi SAARINEN , Monica WIFVESSON
Abstract: In order to ensure that a Subscription Concealed Identifier, SUCI, is calculated in the Universal Subscriber Identity Module, USIM, part of a User Equipment, UE, when intended, when a SUCI-Calculation-Indicator is set to a value indicating that the SUCI should be calculated in the USIM, a network node sets proprietary information, which is not known to a Mobile Equipment, ME, part of the UE, as required for calculation of the SUCI. The USIM facilitates calculation of the SUCI in the ME part of the UE only when the SUCI-Calculation-Indicator is set to a value indicating that the SUCI should be calculated in the ME. When the SUCI-Calculation-Indicator is set to a value indicating that the SUCI should be calculated in the USIM, the ME part deletes any locally stored information required for calculation of the SUCI.
-
7.
公开(公告)号:US20190014509A1
公开(公告)日:2019-01-10
申请号:US15752443
申请日:2017-12-22
Applicant: Telefonaktiebolaget LM Ericsson (publ)
Inventor: Prajwol Kumar NAKARMI , Noamen BEN HENDA , Gunnar MILDH , Monica WIFVESSON
Abstract: According to an exemplary aspect, there is provided a method of operating a communication device, the method comprising receiving (121) an indication of whether a first key that is used for encrypting communications on a first radio link with a communication network is to be reused for encrypting communications on a second radio link with the communication network; and if the received indication indicates that the first key is to be reused, determining (123) whether to operate according to the received indication and reuse the first key for encrypting communications on the second radio link.
-
公开(公告)号:US20230164562A1
公开(公告)日:2023-05-25
申请号:US18095607
申请日:2023-01-11
Applicant: Telefonaktiebolaget LM Ericsson (publ)
Inventor: Monica WIFVESSON , Prajwol Kumar NAKARMI , Karl NORRMAN , Vesa Torvinen
IPC: H04W12/106 , H04W8/24 , H04W28/18 , H04W60/00 , H04W12/033 , H04W12/041
CPC classification number: H04W12/106 , H04W8/24 , H04W28/18 , H04W60/00 , H04W12/033 , H04W12/041
Abstract: A method for operating a User Equipment (UE) is disclosed, the UE configured to connect to a communication network. The method comprises: indicating to the communication network an Integrity Protection for User Plane (IPUP) mode supported by the UE when requesting registration with the communication network. The IPUP mode comprises one of: use of Integrity Protection for User Plane data exchanged with the UE, non-use of Integrity Protection for User Plane data exchanged with the UE, or use of Integrity Protection for User Plane data, and non-use of Confidentiality Protection for User Plane data.
-
公开(公告)号:US20220210121A1
公开(公告)日:2022-06-30
申请号:US17570793
申请日:2022-01-07
Applicant: Telefonaktiebolaget LM Ericsson (publ)
Inventor: Pasi SAARINEN , Prajwol Kumar NAKARMI
Abstract: A wireless device requests a network slice from a network by, first, identifying at least one network slice to be requested. Based on a mapping method that is specific to the wireless device, the wireless device forms a slice pseudonym for the or each network slice to be requested. The wireless device then transmits a request message to the network, wherein the request message comprises the or each slice pseudonym. The network node receives the request message sent by the wireless device, wherein the request message comprises at least one slice pseudonym. Based on a mapping method that is used by the wireless device and that is specific to the wireless device, the network node identifies at least one requested network slice from the or each received slice pseudonym. The network node then permits use of the requested network slice.
-
公开(公告)号:US20210153010A1
公开(公告)日:2021-05-20
申请号:US16633908
申请日:2018-07-17
Applicant: Telefonaktiebolaget LM Ericsson (publ)
Inventor: Vesa TORVINEN , Noamen BEN HENDA , David CASTELLANOS ZAMORA , Prajwol Kumar NAKARMI , Pasi SAARINEN , Monica WIFVESSON
IPC: H04W12/033 , H04W12/72 , H04W12/0433 , H04L9/32
Abstract: A method performed by an authentication server for provisioning a user equipment (1), UE. The method comprises: obtaining a message authentication code, MAC, based on a provisioning key specific to the UE to the UE and a privacy key of a home network (3) of the UE, wherein the provisioning key is a shared secret between the authentication server (14) and the UE and the privacy key comprises a public key of the home network; and transmitting the privacy key and the MAC to the UE. Methods performed by a de-concealing server and the UE, respectively are also disclosed as well as authentication servers, de-concealing servers and UEs. A computer program and a memory circuitry (13) are also disclosed.
-
-
-
-
-
-
-
-
-