17593666. Techniques for Security Key Generation by User Devices for Data Transmission in an Inactive State simplified abstract (Apple Inc.)

From WikiPatents
Jump to navigation Jump to search

Techniques for Security Key Generation by User Devices for Data Transmission in an Inactive State

Organization Name

Apple Inc.

Inventor(s)

Fangli Xu of Beijing (CN)

Shu Guo of Beijing (CN)

Yuqin Chen of Beijing (CN)

Haijing Hu of Los Gatos CA (US)

Huarui Liang of Huarui (CN)

Dawei Zhang of Saratoga CA (US)

Techniques for Security Key Generation by User Devices for Data Transmission in an Inactive State - A simplified explanation of the abstract

This abstract first appeared for US patent application 17593666 titled 'Techniques for Security Key Generation by User Devices for Data Transmission in an Inactive State

Simplified Explanation

The abstract describes a technique for security key derivation in a wireless system. Here is a simplified explanation of the abstract:

  • The technique involves receiving a message from a first node called a radio resource control (RRC) suspend message.
  • The RRC suspend message contains a value called the first next hop (NH) chaining counter (NCC).
  • Upon receiving the RRC suspend message, the system enters a state called RRC inactive state.
  • In the RRC inactive state, a key called the first node key is derived based on the value of the first NCC.
  • Using the first node key, a message called the first uplink message is generated for transmission in the RRC inactive state.
  • The first uplink message is then transmitted to a node while the system is still in the RRC inactive state.

Potential applications of this technology:

  • Wireless communication systems that require secure key derivation.
  • Networks where nodes need to transmit messages while in an inactive state.

Problems solved by this technology:

  • Ensures secure key derivation in wireless systems.
  • Allows nodes to transmit messages even when in an inactive state.

Benefits of this technology:

  • Enhanced security in wireless systems.
  • Improved efficiency by allowing message transmission in an inactive state.


Original Abstract Submitted

An example technique for security key derivation in a wireless system includes: receiving a radio resource control (RRC) suspend message from a first node, the RRC suspend message including a first next hop (NH) chaining counter (NCC) value, entering a RRC inactive state, deriving a first node key based on the first NCC value, generating a first uplink message for transmission in the RRC inactive state based on the first node key, and transmitting the first uplink message to a node while in the RRC inactive state.