US Patent Application 18027681. DISTRIBUTED UNIT NODE, USER EQUIPMENT, AND METHODS IN A WIRELESS COMMUNICATIONS NETWORK simplified abstract
DISTRIBUTED UNIT NODE, USER EQUIPMENT, AND METHODS IN A WIRELESS COMMUNICATIONS NETWORK
Organization Name
Telefonaktiebolaget LM Ericsson (publ)
Inventor(s)
Prajwol Kumar Nakarmi of Sollentuna (SE)
DISTRIBUTED UNIT NODE, USER EQUIPMENT, AND METHODS IN A WIRELESS COMMUNICATIONS NETWORK - A simplified explanation of the abstract
This abstract first appeared for US patent application 18027681 titled 'DISTRIBUTED UNIT NODE, USER EQUIPMENT, AND METHODS IN A WIRELESS COMMUNICATIONS NETWORK
Simplified Explanation
This patent application describes a method performed by a Distributed Unit (DU) node for handling a message in a communication between a User Equipment (UE), the DU node, and a Central Unit (CU) node.
- The DU node obtains a secondary security key from a network node, which is associated with the DU node.
- The DU node receives a message from either the UE or the CU node, which is security protected with either a first security key or the secondary security key, or both.
- The DU node cannot use the message when it is security protected with the first security key.
- The DU node determines that at least a part of the message is security protected with the secondary security key.
- The DU node uses the part of the message that is security protected with the secondary security key.
Original Abstract Submitted
A method performed by a Distributed Unit, DU, node for handling a message in a communication between a User Equipment, UE, the DU node and a Central Unit, CU, node. The DU node obtains a secondary security key from a network node. The secondary security key is associated with the DU node. The DU node receives the message from the UE or the CU node. The message is security protected with one or both of a first security key, and the secondary security key. The message or a part of the message, is not possible to use by the DU node when security protected with the first security key. The DU node determines that at least a part of the message is security protected with the secondary security key. The DU node uses the at least the part of the message security protected with the secondary security key.