Processing

Please wait...

Settings

Settings

Goto Application

1. WO2020139509 - INTEGRITY PROTECTION FOR FREQUENT SMALL DATA TRANSMISSION

Publication Number WO/2020/139509
Publication Date 02.07.2020
International Application No. PCT/US2019/063577
International Filing Date 27.11.2019
Chapter 2 Demand Filed 27.10.2020
IPC
H04W 12/10 2009.1
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
12Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
10Integrity
H04L 9/06 2006.1
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9Arrangements for secret or secure communication
06the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
H04L 12/801 2013.1
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
12Data switching networks
70Packet switching systems
801Flow control or congestion control
H04L 29/06 2006.1
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
29Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/-H04L27/136
02Communication control; Communication processing
06characterised by a protocol
CPC
H04L 69/166
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
69Application independent communication protocol aspects or techniques in packet data networks
16Transmission control protocol/internet protocol [TCP/IP] or user datagram protocol [UDP]
166IP fragmentation or TCP segmentation aspects
H04L 9/3242
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9Cryptographic mechanisms or cryptographic; arrangements for secret or secure communication
32including means for verifying the identity or authority of a user of the system ; or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
3236using cryptographic hash functions
3242involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
H04W 12/1006
Applicants
  • APPLE INC. [US]/[US]
Inventors
  • SHRESTHA, Bharat
  • HAN, Jaemin
  • KOLEKAR, Abhijeet Ashok
Agents
  • HOOD, Jeffrey C.
Priority Data
62/785,54227.12.2018US
62/824,12626.03.2019US
Publication Language English (en)
Filing Language English (EN)
Designated States
Title
(EN) INTEGRITY PROTECTION FOR FREQUENT SMALL DATA TRANSMISSION
(FR) PROTECTION D'INTÉGRITÉ POUR TRANSMISSION FRÉQUENTE DE PETITES DONNÉES
Abstract
(EN) Packet protection is described. Data of a group of packets is concatenated with a security key and a sequence number of the packet. A hash mark of the concatenated data is calculated and sent with data or control information in a packet. If each packet has reserved bits, at least some of the packets each has data, a least a portion of the hash mark, and a header having: a first bit that indicates if the hash mark is present, and a second bit that indicates if the packet is used to determine the hash mark. Otherwise, a separate control packet is sent that contains the hash mark, a first sequence number of the group of packets, and a PDU type indicating that the control packet is an integrity protection packet for the group of PDCP packets.
(FR) La présente invention concerne la protection de paquets. Des données d'un groupe de paquets sont concaténées à l'aide d'une clé de sécurité et d'un numéro de séquence du paquet. Une marque de hachage des données concaténées est calculée et envoyée avec des données ou des informations de commande dans un paquet. Si chaque paquet comporte des bits réservés, au moins certains des paquets ont chacun des données, au moins une partie de la marque de hachage, et un en-tête comprenant : un premier bit qui indique si la marque de hachage est présente, et un second bit qui indique si le paquet est utilisé pour déterminer la marque de hachage. Sinon, un paquet de commande séparé est envoyé et il contient la marque de hachage, un premier numéro de séquence du groupe de paquets, et un type de PDU indiquant que le paquet de commande est un paquet de protection d'intégrité pour le groupe de paquets PDCP.
Latest bibliographic data on file with the International Bureau