US Patent Application 18027681. DISTRIBUTED UNIT NODE, USER EQUIPMENT, AND METHODS IN A WIRELESS COMMUNICATIONS NETWORK simplified abstract

From WikiPatents
Jump to navigation Jump to search

DISTRIBUTED UNIT NODE, USER EQUIPMENT, AND METHODS IN A WIRELESS COMMUNICATIONS NETWORK

Organization Name

Telefonaktiebolaget LM Ericsson (publ)

Inventor(s)

Prajwol Kumar Nakarmi of Sollentuna (SE)

Oumer Teyab of Solna (SE)

DISTRIBUTED UNIT NODE, USER EQUIPMENT, AND METHODS IN A WIRELESS COMMUNICATIONS NETWORK - A simplified explanation of the abstract

This abstract first appeared for US patent application 18027681 titled 'DISTRIBUTED UNIT NODE, USER EQUIPMENT, AND METHODS IN A WIRELESS COMMUNICATIONS NETWORK

Simplified Explanation

This patent application describes a method performed by a Distributed Unit (DU) node for handling a message in a communication between a User Equipment (UE), the DU node, and a Central Unit (CU) node.

  • The DU node obtains a secondary security key from a network node, which is associated with the DU node.
  • The DU node receives a message from either the UE or the CU node, which is security protected with either a first security key or the secondary security key, or both.
  • The DU node cannot use the message when it is security protected with the first security key.
  • The DU node determines that at least a part of the message is security protected with the secondary security key.
  • The DU node uses the part of the message that is security protected with the secondary security key.


Original Abstract Submitted

A method performed by a Distributed Unit, DU, node for handling a message in a communication between a User Equipment, UE, the DU node and a Central Unit, CU, node. The DU node obtains a secondary security key from a network node. The secondary security key is associated with the DU node. The DU node receives the message from the UE or the CU node. The message is security protected with one or both of a first security key, and the secondary security key. The message or a part of the message, is not possible to use by the DU node when security protected with the first security key. The DU node determines that at least a part of the message is security protected with the secondary security key. The DU node uses the at least the part of the message security protected with the secondary security key.