17593676. Security Key Generation for Handling Data Transmissions from User Devices in an Inactive State simplified abstract (Apple Inc.)

From WikiPatents
Jump to navigation Jump to search

Security Key Generation for Handling Data Transmissions from User Devices in an Inactive State

Organization Name

Apple Inc.

Inventor(s)

Fangli Xu of Beijing (CN)

Shu Guo of Beijing (CN)

Yuqin Chen of Beijing (CN)

Haijing Hu of Los Gatos CA (US)

Huarui Liang of Beijing (CN)

Dawei Zhang of Saratoga CA (US)

Security Key Generation for Handling Data Transmissions from User Devices in an Inactive State - A simplified explanation of the abstract

This abstract first appeared for US patent application 17593676 titled 'Security Key Generation for Handling Data Transmissions from User Devices in an Inactive State

Simplified Explanation

The abstract describes a technique for security key derivation in a wireless system. Here is a simplified explanation of the abstract:

  • The technique involves sending a message from a first node to a first user device, which includes a value called the Next Hop Chaining Counter (NCC).
  • The access stratum (AS) resources associated with the first user device are released.
  • A node key is derived based on the NCC value.
  • A message is received from the first user device without allocating AS resources to it.
  • The received message is unscrambled using the NCC value.

Potential Applications:

  • This technique can be applied in wireless communication systems, such as cellular networks, to enhance security during data transmission.

Problems Solved:

  • The technique addresses the need for secure key derivation in wireless systems, ensuring that transmitted data remains confidential and protected from unauthorized access.

Benefits:

  • Enhanced security: The technique provides a secure method for deriving keys, ensuring the confidentiality of transmitted data.
  • Efficient resource allocation: By releasing AS resources and not allocating them for certain messages, the technique optimizes resource utilization in the wireless system.


Original Abstract Submitted

An example technique for security key derivation in a wireless system includes: sending a radio resource control (RRC) suspend message from a first node, to a first user device, the RRC suspend message including a first next hop (NH) chaining counter (NCC) value; releasing access stratum (AS) resources associated with the first user device; deriving a first node key based on the first NCC value; receiving a first uplink message from the first user device without allocating AS resources to the first user device; and unscrambling the first uplink message based on the first NCC value.