Integrity protection with message authentication codes having different lengths

A technology of integrity protection and message authentication code, which is applied in the field of integrity protection of wireless communication, and can solve problems such as unverified/authenticated messages and communication failures

Pending Publication Date: 2021-09-07
GOOGLE LLC
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In both scenarios, the receiving UE cannot verify / authenticate the message due to a mismatch between XMAC-I and MAC-I and therefore ignores / discards the message
Ultimately, in this scenario, the communication between the base station and the UE is not possible

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Integrity protection with message authentication codes having different lengths
  • Integrity protection with message authentication codes having different lengths
  • Integrity protection with message authentication codes having different lengths

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] In general, the techniques of this disclosure allow user equipment (UE) and base stations to use consistent message authentication code (MAC) lengths for integrity protection, thereby allowing authentication / verification of messages in wireless communication networks. Thus, the disclosed technique avoids scenarios where communication is not possible due to lack of authentication. Furthermore, the disclosed techniques can avoid suboptimal system design in which all user equipments and base stations must use a default, relatively short MAC length regardless of their MAC length capabilities. Therefore, in scenarios where both the user equipment and the base station support more robust integrity protection, the integrity protection can be enhanced.

[0019] These techniques are discussed below with reference to fifth generation (5G) radio access ("NR") networks and sometimes Evolved Universal Terrestrial Radio Access (EUTRA) networks as examples. Furthermore, these example...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method in a user device that supports a plurality of message authentication code (MAC) lengths for integrity protection of wireless communications includes receiving, from a base station, a first message including an information element (1002), determining, based on the information element, that a first MAC length of the plurality of MAC lengths is to be used for integrity protection (1004) and, thereafter, generating a second message including a MAC having the first MAC length (1006). The method also includes transmitting the second message to the base station (1008).

Description

technical field [0001] The present disclosure relates to integrity protection for wireless communications, and more particularly, to wireless communications systems that support two or more different message authentication code lengths. Background technique [0002] The background description provided herein is for the purpose of generally presenting the context of the disclosure. The work of the presently named inventors, to the extent described in this Background section, and in respect of aspects that may not otherwise conform to the description of the prior art at the time of filing, is not admitted, either expressly or implicitly, to the present disclosure current technology. [0003] Wireless communication networks typically employ integrity protection techniques to prevent or mitigate network attacks, such as "forgery" attacks that mimic valid messages. For example, in some cellular systems, the transmitting device uses specific integrity protection algorithms and i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L29/06H04W12/106
CPCH04L9/3242H04L63/123H04L2209/80H04W12/106H04W76/27
Inventor 吴志祥
Owner GOOGLE LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products