17593676. Security Key Generation for Handling Data Transmissions from User Devices in an Inactive State simplified abstract (Apple Inc.)
Contents
Security Key Generation for Handling Data Transmissions from User Devices in an Inactive State
Organization Name
Inventor(s)
Haijing Hu of Los Gatos CA (US)
Dawei Zhang of Saratoga CA (US)
Security Key Generation for Handling Data Transmissions from User Devices in an Inactive State - A simplified explanation of the abstract
This abstract first appeared for US patent application 17593676 titled 'Security Key Generation for Handling Data Transmissions from User Devices in an Inactive State
Simplified Explanation
The abstract describes a technique for security key derivation in a wireless system. Here is a simplified explanation of the abstract:
- The technique involves sending a message from a first node to a first user device, which includes a value called the Next Hop Chaining Counter (NCC).
- The access stratum (AS) resources associated with the first user device are released.
- A node key is derived based on the NCC value.
- A message is received from the first user device without allocating AS resources to it.
- The received message is unscrambled using the NCC value.
Potential Applications:
- This technique can be applied in wireless communication systems, such as cellular networks, to enhance security during data transmission.
Problems Solved:
- The technique addresses the need for secure key derivation in wireless systems, ensuring that transmitted data remains confidential and protected from unauthorized access.
Benefits:
- Enhanced security: The technique provides a secure method for deriving keys, ensuring the confidentiality of transmitted data.
- Efficient resource allocation: By releasing AS resources and not allocating them for certain messages, the technique optimizes resource utilization in the wireless system.
Original Abstract Submitted
An example technique for security key derivation in a wireless system includes: sending a radio resource control (RRC) suspend message from a first node, to a first user device, the RRC suspend message including a first next hop (NH) chaining counter (NCC) value; releasing access stratum (AS) resources associated with the first user device; deriving a first node key based on the first NCC value; receiving a first uplink message from the first user device without allocating AS resources to the first user device; and unscrambling the first uplink message based on the first NCC value.