TELEFONAKTIEBOLAGET LM ERICSSON (PUBL) (20240276211). METHODS, APPARATUSES, COMPUTER PROGRAMS AND CARRIERS FOR SECURITY MANAGEMENT BEFORE HANDOVER FROM 5G TO 4G SYSTEM simplified abstract

From WikiPatents
Jump to navigation Jump to search

METHODS, APPARATUSES, COMPUTER PROGRAMS AND CARRIERS FOR SECURITY MANAGEMENT BEFORE HANDOVER FROM 5G TO 4G SYSTEM

Organization Name

TELEFONAKTIEBOLAGET LM ERICSSON (PUBL)

Inventor(s)

Monica Wifvesson of LUND (SE)

Noamen Ben Henda of VÄLLINGBY (SE)

Vesa Lehtovirta of ESPOO (FI)

Christine Jost of DALBY (SE)

METHODS, APPARATUSES, COMPUTER PROGRAMS AND CARRIERS FOR SECURITY MANAGEMENT BEFORE HANDOVER FROM 5G TO 4G SYSTEM - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240276211 titled 'METHODS, APPARATUSES, COMPUTER PROGRAMS AND CARRIERS FOR SECURITY MANAGEMENT BEFORE HANDOVER FROM 5G TO 4G SYSTEM

    • Simplified Explanation:**

The patent application describes a key management system that ensures security when transferring a user equipment from a 5G wireless communication system to a 4G wireless communication system. This system prevents the 4G system from accessing the security information used in the 5G system.

    • Key Features and Innovation:**
  • Key management system for secure transfer of user equipment between 5G and 4G systems.
  • Achieves backward security to prevent 4G system from obtaining 5G security information.
  • Enables activation of security before handover to maintain data integrity.
    • Potential Applications:**

This technology can be applied in telecommunications, mobile networks, and data security industries.

    • Problems Solved:**
  • Prevents unauthorized access to security information during handover between different generation wireless systems.
  • Ensures data confidentiality and integrity during the transition process.
    • Benefits:**
  • Enhanced security for user equipment handover.
  • Protection of sensitive information during system transitions.
  • Seamless integration between different generation wireless systems.
    • Commercial Applications:**

Potential commercial uses include mobile network operators, device manufacturers, and cybersecurity companies. This technology can improve data protection during network transitions and enhance overall system security.

    • Questions about the Technology:**

1. How does the key management system ensure backward security during the handover process? 2. What are the specific security measures implemented to prevent the 4G system from accessing 5G security information?


Original Abstract Submitted

a key management is provided that enables security activation before handing over a user equipment from a source 5g wireless communication system, i.e., a next generation system (ngs), to a target 4g wireless communication system, i.e., a evolved packet system (eps)/long term evolution (lte). the key management achieves backward security, i.e., prevents the target 4g wireless communication system from getting knowledge of 5g security information used in the source 5g wireless communication system.