Samsung electronics co., ltd. (20240129737). METHOD AND APPARATUS FOR SELECTING SELECTIVE SECURITY MODE AND FLOW MANAGEMENT IN A WIRELESS COMMUNICATION SYSTEM simplified abstract
Contents
- 1 METHOD AND APPARATUS FOR SELECTING SELECTIVE SECURITY MODE AND FLOW MANAGEMENT IN A WIRELESS COMMUNICATION SYSTEM
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 METHOD AND APPARATUS FOR SELECTING SELECTIVE SECURITY MODE AND FLOW MANAGEMENT IN A WIRELESS COMMUNICATION SYSTEM - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Potential Applications
- 1.6 Problems Solved
- 1.7 Benefits
- 1.8 Potential Commercial Applications
- 1.9 Possible Prior Art
- 1.10 How does the method ensure backward compatibility with older network technologies?
- 1.11 What are the potential challenges in implementing the preferred selective security mode across different network architectures?
- 1.12 Original Abstract Submitted
METHOD AND APPARATUS FOR SELECTING SELECTIVE SECURITY MODE AND FLOW MANAGEMENT IN A WIRELESS COMMUNICATION SYSTEM
Organization Name
Inventor(s)
Aneesh Deshmukh of Bangalore (IN)
Anshuman Nigam of Bangalore (IN)
METHOD AND APPARATUS FOR SELECTING SELECTIVE SECURITY MODE AND FLOW MANAGEMENT IN A WIRELESS COMMUNICATION SYSTEM - A simplified explanation of the abstract
This abstract first appeared for US patent application 20240129737 titled 'METHOD AND APPARATUS FOR SELECTING SELECTIVE SECURITY MODE AND FLOW MANAGEMENT IN A WIRELESS COMMUNICATION SYSTEM
Simplified Explanation
The disclosure pertains to a method for selecting a selective security mode in a 5G or 6G communication system based on the capabilities of the user equipment and the network entities. The preferred selective security mode is applied to incoming data packets if at least one of the network entities supports it.
- Core network entity selects a selective security mode based on UE capability and preferred mode.
- Core network entity checks if both RAN and core network support the preferred selective security mode.
- Core network entity applies the preferred selective security to incoming data packets based on encryption status.
Potential Applications
The technology described in the patent application could be applied in:
- Next-generation communication systems
- Network security protocols
- Data encryption technologies
Problems Solved
This technology addresses the following issues:
- Ensuring secure data transmission in advanced communication systems
- Optimizing security protocols based on network capabilities
Benefits
The benefits of this technology include:
- Enhanced data security in 5G and 6G networks
- Efficient utilization of selective security modes
- Improved network performance and reliability
Potential Commercial Applications
The potential commercial applications of this technology could be seen in:
- Telecommunication companies
- Network equipment manufacturers
- Cybersecurity firms
Possible Prior Art
One possible prior art for this technology could be the implementation of selective security modes in previous generations of communication systems.
Unanswered Questions
How does the method ensure backward compatibility with older network technologies?
The patent application does not specify how the technology maintains compatibility with legacy systems.
What are the potential challenges in implementing the preferred selective security mode across different network architectures?
The patent application does not address the potential obstacles that may arise when deploying the preferred selective security mode in diverse network environments.
Original Abstract Submitted
the disclosure relates to a fifth generation (5g) communication system or a sixth generation (6g) communication system for supporting higher data rates beyond a fourth generation (4g) communication system such as long term evolution (lte). a method performed by a core network entity for selecting a selective security mode for applying selective security is provided. the method receives first information block from ran . the first information block includes ue capability to support selective security and preferred selective security mode. further, core network entity may determine if ran and core network entity are capable of supporting the preferred selective security mode. finally, the core network entity applies the preferred selective security on the one or more incoming data packets based on the encryption status of the incoming data packets, when at least one of ran and core network entity supports the preferred selective security mode.