Processing

Please wait...

Settings

Settings

Goto Application

1. WO2020198216 - METHODS, APPARATUS AND SYSTEMS FOR SECURED RADIO RESOURCE CONTROL (RRC) SIGNALING OVER A PC5 INTERFACE FOR UNICAST COMMUNICATION

Publication Number WO/2020/198216
Publication Date 01.10.2020
International Application No. PCT/US2020/024443
International Filing Date 24.03.2020
IPC
H04L 29/06 2006.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
29Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/-H04L27/136
02Communication control; Communication processing
06characterised by a protocol
H04W 4/46 2018.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
4Services specially adapted for wireless communication networks; Facilities therefor
30Services specially adapted for particular environments, situations or purposes
40for vehicles, e.g. vehicle-to-pedestrians
46for vehicle-to-vehicle communication
H04W 12/00 2009.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
12Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
H04W 12/04 2009.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
12Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
04Key management
H04W 12/10 2009.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
12Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
10Integrity
CPC
H04L 63/0428
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
04for providing a confidential data exchange among entities communicating through data packet networks
0428wherein the data content is protected, e.g. by encrypting or encapsulating the payload
H04L 63/045
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
04for providing a confidential data exchange among entities communicating through data packet networks
0428wherein the data content is protected, e.g. by encrypting or encapsulating the payload
045wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
H04W 12/0013
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
12Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity ; ; Protecting confidentiality; Key management; Integrity; Mobile application security; Using identity modules; Secure pairing of devices; Context aware security; Lawful interception
001Protecting confidentiality, e.g. by encryption or ciphering
0013of user plane, e.g. user traffic
H04W 12/0017
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
12Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity ; ; Protecting confidentiality; Key management; Integrity; Mobile application security; Using identity modules; Secure pairing of devices; Context aware security; Lawful interception
001Protecting confidentiality, e.g. by encryption or ciphering
0017of control plane, e.g. signalling traffic
H04W 12/0401
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
12Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity ; ; Protecting confidentiality; Key management; Integrity; Mobile application security; Using identity modules; Secure pairing of devices; Context aware security; Lawful interception
04Key management ; , e.g. by generic bootstrapping architecture [GBA]
0401Key generation or derivation
H04W 12/04071
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
12Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity ; ; Protecting confidentiality; Key management; Integrity; Mobile application security; Using identity modules; Secure pairing of devices; Context aware security; Lawful interception
04Key management ; , e.g. by generic bootstrapping architecture [GBA]
0407without using a trusted network node as anchor
04071Key exchange, e.g. between nodes
Applicants
  • IDAC HOLDINGS, INC. [US]/[US]
Inventors
  • PERRAS, Michelle
  • FERDI, Samir
  • FREDA, Martino
  • AHMAD, Saad
Agents
  • BERKOWITZ, Eric
Priority Data
62/824,00126.03.2019US
Publication Language English (EN)
Filing Language English (EN)
Designated States
Title
(EN) METHODS, APPARATUS AND SYSTEMS FOR SECURED RADIO RESOURCE CONTROL (RRC) SIGNALING OVER A PC5 INTERFACE FOR UNICAST COMMUNICATION
(FR) PROCÉDÉS, APPAREIL ET SYSTÈMES POUR UNE SIGNALISATION DE COMMANDE DE RESSOURCES RADIO (RRC) SÉCURISÉE SUR UNE INTERFACE PC5 POUR UNE COMMUNICATION EN MONODIFFUSION
Abstract
(EN)
Method, apparatus and systems are disclosed that may be implemented in a Wireless Transmit/Receive Unit (WTRU) for unicast communication with another WTRU. The method may include sending, by the WTRU to the other WTRU via a PC5 interface, a communication request indicating first security information for the WTRU and receiving, by the WTRU from the other WTRU via the PC5 interface, information which is integrity protected indicating second security information for the other WTRU. The method may also include deriving, by the WTRU from the indicated second security information, a first set of security keys for communication via a first layer using the U-plane and a second set of security keys for communication via a second layer using the C-plane; and sending, by the WTRU to the other WTRU via the PC5 interface, a message that is at least integrity protected using the derived first set of keys.
(FR)
L'invention concerne un procédé, un appareil et des systèmes qui peuvent être mis en oeuvre dans une unité d'émission/réception sans fil (WTRU) pour une communication en monodiffusion avec une autre WTRU. Le procédé peut comprendre l'envoi, par la WTRU à l'autre WTRU par l'intermédiaire d'une interface PC5, d'une demande de communication indiquant des premières informations de sécurité pour la WTRU et la réception, par la WTRU de l'autre WTRU par l'intermédiaire de l'interface PC5, des informations qui sont protégées d'intégrité indiquant des secondes informations de sécurité pour l'autre WTRU. Le procédé peut également comprendre la dérivation, par la WTRU à partir des secondes informations de sécurité indiquées, d'un premier ensemble de clés de sécurité pour une communication par l'intermédiaire d'une première couche à l'aide du plan U et d'un second ensemble de clés de sécurité pour une communication par l'intermédiaire d'une seconde couche à l'aide du plan C ; et l'envoi, par la WTRU à l'autre WTRU par l'intermédiaire de l'interface PC5, d'un message qui est au moins protégé de l'intégrité à l'aide du premier ensemble de clés dérivé.
Latest bibliographic data on file with the International Bureau