Security procedures for the cellular internet of things
A related and user equipment technology, applied in security devices, network data management, electrical components, etc., can solve problems such as not indicating HLR or HSS, non-existence, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0035] As mentioned above, battery efficiency safety may involve several issues. Some of these issues may be relevant in that certain embodiments may address them through extensions to subscriber profiles for CIoT purposes. Another issue involves deriving different keys for use with different servers, but this can be addressed in conjunction with or separately from the other issues.
[0036] Certain embodiments may address the issue of encryption policies in GPRS access networks. For example, some embodiments may include fields in a GPRS subscriber profile. This field may determine the minimum strength(s) for the encryption algorithm(s) to be used between the UE with this subscription and the SGSN. For 3G and 4G subscriptions, this field may not be required. This field may determine the total minimum strength for all encryption algorithms or the respective minimum strength for each corresponding encryption algorithm. Other ways of indicating minimum strength are also allow...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

