Qualcomm incorporated (20240187850). METHODS AND SYSTEMS FOR SECURING DOWNLINK CONTROL INFORMATION WITH SECRET KEYS simplified abstract

From WikiPatents
Revision as of 17:48, 9 June 2024 by Wikipatents (talk | contribs) (Creating a new page)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

METHODS AND SYSTEMS FOR SECURING DOWNLINK CONTROL INFORMATION WITH SECRET KEYS

Organization Name

qualcomm incorporated

Inventor(s)

Ahmed Elshafie of San Diego CA (US)

Alexandros Manolakos of Athens (GR)

METHODS AND SYSTEMS FOR SECURING DOWNLINK CONTROL INFORMATION WITH SECRET KEYS - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240187850 titled 'METHODS AND SYSTEMS FOR SECURING DOWNLINK CONTROL INFORMATION WITH SECRET KEYS

Simplified Explanation

Some aspects of the present disclosure disclose methods and systems directed to securing downlink control information (DCI) using secret keys available to both a user equipment (UE) and a base station (BS). In some aspects, the base station may secure a DCI using one or more secret keys. The secret keys may be generated by the BS and the UE based on an estimation of a radio channel connecting the UE to the BS, and/or the secret keys may be generated at the BS using upper layer encryption techniques and shared with the UE. Upon receiving the DCI, the UE can extract the contents of the secured DCI using the secret keys.

  • Base station and user equipment share secret keys for securing downlink control information.
  • Secret keys may be generated based on radio channel estimation or upper layer encryption techniques.
  • User equipment can extract secured DCI contents using the shared secret keys.

Potential Applications

This technology can be applied in secure communication systems, such as 5G networks, where downlink control information needs to be protected from unauthorized access.

Problems Solved

This technology solves the problem of unauthorized access to downlink control information, ensuring secure communication between the base station and user equipment.

Benefits

- Enhanced security in communication systems - Efficient extraction of downlink control information - Improved privacy protection for users

Potential Commercial Applications

"Securing Downlink Control Information Using Secret Keys" can find applications in telecommunications, network security, and data encryption industries.

Possible Prior Art

One possible prior art could be the use of encryption keys in communication systems to secure data transmission between devices. Another could be the use of channel estimation techniques to optimize communication performance.

What is the impact of this technology on network security?

This technology significantly enhances network security by ensuring that downlink control information is securely transmitted between the base station and user equipment, reducing the risk of unauthorized access and potential data breaches.

How does this innovation improve communication efficiency in wireless networks?

By utilizing secret keys shared between the base station and user equipment, this innovation streamlines the process of securing and extracting downlink control information, leading to more efficient communication in wireless networks.


Original Abstract Submitted

some aspects of the present disclosure disclose methods and systems directed to securing downlink control information (dci) using secret keys available to both a user equipment (ue) and a base station (bs). in some aspects, the base station may secure a dci using one or more secret keys. the secret keys may be generated by the bs and the ue based on an estimation of a radio channel connecting the ue to the bs, and/or the secret keys may be generated at the bs using upper layer encryption techniques and shared with the ue. upon receiving the dci, the ue can extract the contents of the secured dci using the secret keys.